会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 52. 发明申请
    • PROTECTING STATES OF A CRYPTOGRAPHIC PROCESS USING GROUP AUTOMORPHISMS
    • 使用组自动化保护CRIPTOGRAPHIC过程的状态
    • US20120254625A1
    • 2012-10-04
    • US13076362
    • 2011-03-30
    • Augustin J. FARRUGIAMathieu CietThomas Icart
    • Augustin J. FARRUGIAMathieu CietThomas Icart
    • G06F21/24
    • G06F21/602G06F21/52
    • In the field of computer enabled cryptography, such as a keyed block cipher having a plurality of rounds, the cipher is hardened against an attack by a protection process which obscures the cipher states and/or the round keys using the properties of group field automorphisms and applying multiplicative masks (instead of conventional XOR masks) to the states of the cipher, for encryption or decryption. This is especially advantageous in a “White Box” environment where an attacker has full access to the cipher algorithm, including the algorithm's internal state during its execution. This method and the associated computing apparatus are useful for protection against known attacks on “White Box” ciphers, by eliminating XOR operations with improved masking techniques and increasing complexity of reverse engineering and of attacks.
    • 在诸如具有多个回合的密钥分组密码的计算机启用密码学领域中,使用组域自动生成的属性,使密码状态和/或循环密钥隐藏的保护过程针对攻击进行加密, 将乘法掩码(而不是常规XOR掩码)应用于密码的状态,以进行加密或解密。 这在白盒环境中特别有利,在这种情况下,攻击者可以完全访问密码算法,包括算法执行过程中的内部状态。 该方法和相关联的计算设备对于通过利用改进的掩蔽技术消除XOR操作并增加逆向工程和攻击的复杂性来防止已知的对白盒密码的攻击是有用的。
    • 55. 发明授权
    • Systems and methods for implementing block cipher algorithms on attacker-controlled systems
    • 用于在攻击者控制的系统上实现块密码算法的系统和方法
    • US09031228B2
    • 2015-05-12
    • US13448385
    • 2012-04-16
    • Mathieu CietAugustin J. FarrugiaFilip Toma Paun
    • Mathieu CietAugustin J. FarrugiaFilip Toma Paun
    • H04L9/28H04L9/00H04L9/06
    • H04L9/002H04L9/0618H04L9/0631H04L2209/043H04L2209/122H04L2209/125H04L2209/16
    • Systems and methods for an implementation of block cipher algorithms (e.g., AES) use lookup tables to obscure key information, increasing difficulty of reverse engineering efforts. The implementation encodes round key information into a first plurality of tables (T1), which when used for lookup operations also complete SubBytes operations, and output state in an encoded format. A Shiftrows operation is performed arithmetically on the output state. A second plurality of tables (T2) are used to perform a polynomial multiplication portion of MixColumns operation, and an XOR portion of MixColumns is performed arithmetically on the columns. Encoding from the T1 tables is made to match a decoding built into the T2 tables. Subsets of the T1 tables use the same T2 tables, reducing a memory footprint for the T2 tables. Multiple AES keys can be embedded in different sets of T1 tables that encode for the same set of T2 tables.
    • 用于实施块密码算法(例如,AES)的系统和方法使用查找表来掩盖关键信息,增加了逆向工程努力的难度。 该实施方式将循环密钥信息编码到第一多个表(T1)中,当用于查找操作时也完成子字节操作,并且以编码格式输出状态。 对输出状态进行算术运算。 使用第二多个表(T2)来执行MixColumns操作的多项式乘法部分,并且对列进行算术运算的MixColumn的XOR部分。 使T1表格的编码与T2表中内置的解码相匹配。 T1表的子集使用相同的T2表,减少了T2表的内存占用。 可以将多个AES密钥嵌入到为同一组T2表编码的不同的T1表中。
    • 56. 发明授权
    • Method and apparatus for securing content using encryption with embedded key in content
    • 使用内嵌密钥加密保护内容的方法和装置
    • US08196214B2
    • 2012-06-05
    • US12002098
    • 2007-12-14
    • Augustin J. FarrugiaGianpaolo FasoliMathieu CietBertrand Mollinier Toublet
    • Augustin J. FarrugiaGianpaolo FasoliMathieu CietBertrand Mollinier Toublet
    • G06F21/00
    • H04L63/062G06F21/10H04L9/0827H04L9/0891H04L63/123H04L2209/605
    • Method and apparatus enabled by computer (or equivalent) hardware and software for protection of content such as audio and video to be downloaded or streamed over a computer network such as the Internet. The content is provided to the user via streaming or downloads in encrypted form. The encryption is such that the content key decryption information is transmitted so that it itself is encrypted to be both device and session unique. That is, the key information can be used only to extract the content decryption key for a particular session and for a particular client device such as an audio or video consumer playing device. This prevents any further use or copying of the content other than in that session and for that particular client. The specificity is accomplished by using a device unique identifier and antireplay information which is session specific for encrypting the content key. A typical application is Internet streaming of audio or video to consumers.
    • 用于保护诸如音频和视频的内容的计算机(或等效的)硬件和软件能够通过诸如因特网的计算机网络下载或流式传输的方法和装置。 内容通过加密形式的流式传输或下载提供给用户。 加密是使得内容密钥解密信息被发送,使得其本身被加密成为设备和会话唯一的。 也就是说,密钥信息可以仅用于提取特定会话的内容解密密钥以及用于诸如音频或视频消费者播放设备的特定客户端设备。 这可以防止在该会话和该特定客户端之外的内容的任何进一步的使用或复制。 特异性通过使用设备唯一标识符和反重播信息来实现,该信息是会话专用于加密内容密钥。 典型的应用是将音频或视频的互联网流传输给消费者。
    • 59. 发明授权
    • System and method for obfuscating constants in a computer program
    • 用于在计算机程序中模糊常数的系统和方法
    • US08874928B2
    • 2014-10-28
    • US12263183
    • 2008-10-31
    • Pierre BetouinMathieu CietAugustin J. Farrugia
    • Pierre BetouinMathieu CietAugustin J. Farrugia
    • G06F11/30G06F12/14G06F21/12G06F9/45
    • G06F21/125G06F8/41G06F8/42G06F8/427G06F8/433G06F8/434
    • Disclosed herein are systems, computer-implemented methods, and tangible computer-readable media for obfuscating constants in a binary. The method includes generating a table of constants, allocating an array in source code, compiling the source code to a binary, transforming the table of constants to match Pcode entries in an indirection table so that each constant in the table of constants can be fetched by an entry in the indirection table. A Pcode is a data representation of a set of instructions populating the indirection table with offsets toward the table of constants storing the indirection table in the allocated array in the compiled binary. The method further includes populating the indirection table with offsets equivalent to the table of constants, and storing the indirection table in the allocated array in the compiled binary. Constants can be of any data type. Constants can be one byte each or more than one byte each. In one aspect, the method further includes splitting constants into two or more segments, treating each segment as a separate constant when transforming the table of constants, and generating a function to retrieve and reconstruct the split constants.
    • 这里公开的是系统,计算机实现的方法和用于在二进制文件中混淆常数的有形计算机可读介质。 该方法包括生成常量表,在源代码中分配数组,将源代码编译为二进制,将常数表变换为匹配间接表中的Pcode条目,以使常数表中的每个常数可以由 间接表中的条目。 Pcode是填充间接表的一组指令的数据表示,其具有偏向于在编译的二进制文件中分配的阵列中存储间接表的常数表的偏移。 该方法还包括使用与常数表相当的偏移量来填充间接表,并将该间接表存储在编译后的二进制数组中。 常量可以是任何数据类型。 常量可以是一个字节,也可以是一个以上的字节。 在一个方面,该方法还包括将常数分成两个或更多个段,当变换常数表时,将每个段作为单独的常数来处理,以及生成检索和重构分裂常数的函数。
    • 60. 发明授权
    • System and method for authentication using a shared table and sorting exponentiation
    • 使用共享表进行身份验证的系统和方法,并排序求幂
    • US08407248B2
    • 2013-03-26
    • US13244068
    • 2011-09-23
    • Pierre BetouinMathieu CietAugustin J. Farrugia
    • Pierre BetouinMathieu CietAugustin J. Farrugia
    • G06F7/00G06F17/30
    • G06F21/31
    • Disclosed herein are systems, computer-implemented methods, and computer-readable media for authentication using a shared table. The method receives an authentication challenge from a first entity including an accumulator with an initial value, lists of elements in a shared table, and a list of sorting algorithms, each sorting algorithm is associated with one of the lists of elements and modified to include embedded instructions operating on the accumulator. The method then generates a temporary table for each list of elements in the shared table by copying elements from the shared table as indicated in each respective list of elements, each temporary table being associated with one sorting algorithm in the list of sorting algorithms. The method sorts each generated temporary table with the associated sorting algorithm, thereby updating the accumulator with the embedded instructions. Finally, the method transmits the updated accumulator to the first entity for verification.
    • 本文公开了系统,计算机实现的方法和用于使用共享表进行认证的计算机可读介质。 该方法从包括具有初始值的累加器,共享表中的元素列表和排序算法列表的第一实体接收认证挑战,每个排序算法与元素列表中的一个相关联并被修改为包括嵌入 在累加器上操作的指令。 然后,该方法通过从每个相应的元素列表中指示的从共享表中复制元素来生成共享表中的每个元素列表的临时表,每个临时表与排序算法列表中的一个排序算法相关联。 该方法使用相关联的排序算法对每个生成的临时表进行排序,从而用嵌入式指令更新累加器。 最后,该方法将更新的累加器发送到第一实体进行验证。