会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 81. 发明申请
    • HASH FUNCTION USING A CUE SPORTS GAME PROCESS
    • HASH功能使用CUE SPORTS游戏过程
    • US20100304807A1
    • 2010-12-02
    • US12541850
    • 2009-08-14
    • Benoit Chevallier-MamesMathieu CietAugustin J. Farrugia
    • Benoit Chevallier-MamesMathieu CietAugustin J. Farrugia
    • A63F9/24
    • G06F21/64
    • In the computer data security field, cryptographic hash function processes embodied in a computer system and which are typically keyless, but are highly secure. The processes are based on the type of randomness exhibited by well known table “cue sports” games such as billiards, snooker, and pool played on a billiards table involving the players striking one of a plurality of balls with a cue, the struck ball then hitting other balls, the raised sides of the table, and in some cases one or more balls going into pockets in the corners and/or sides of the table. Computation of the hash value (digest) is the result of providing a model (such as expressed in computer code) of such a game algorithm and using the message as an input to the game algorithm, then executing the game algorithm. A state of the game after one or several “shots” gives the hash digest value of the message.
    • 在计算机数据安全领域中,体现在计算机系统中的加密散列函数过程通常是无钥匙的,但是是高度安全的。 这些过程基于众所周知的表“提示体育”游戏(例如台球,斯诺克和游戏台)上所播放的随机性的类型,该台球在台球桌上演奏,该桌子涉及到具有提示的多个球中的一个击球者,击球 击中其他球,桌子的凸起部分,以及在某些情况下一个或多个球进入桌子的角落和/或侧面的口袋。 哈希值(摘要)的计算是提供这种游戏算法的模型(例如以计算机代码表示)的结果,并且使用该消息作为游戏算法的输入,然后执行游戏算法。 一个或几个“拍摄”之后的游戏状态给出消息的散列摘要值。
    • 83. 发明申请
    • AGGREGATE AND PARALLELIZABLE HASH FUNCTION
    • 集合和并发哈希函数
    • US20100111292A1
    • 2010-05-06
    • US12263071
    • 2008-10-31
    • Pierre BetouinMathieu CietAugustin J. Farrugia
    • Pierre BetouinMathieu CietAugustin J. Farrugia
    • H04L9/28
    • H04L9/0643H04L2209/125
    • A hash provides aggregation properties, and allows distributed and/or concurrent processing. In an example, the hash operates on message M, and produces a multiplicative matrix sequence by substituting a 2×2 matrix A for binary ones and substituting a 2×2 matrix B for binary zeros in M. A and B are selected from SL2(R), R=F2[x]/(P), F2[x] being the set of polynomials degree with coefficients in F2={0,1}, and (P) is the ideal of F2[x] generated by irreducible polynomial P(x) order n=12/4. The matrix sequence is multiplied to produce a 2×2 matrix, h, with n bit length entries. A function converts h into an l×l matrix, Y. Two l×l invertible matrices with randomly chosen F2 entries, P and Q, are accessed. P pre-multiplies Y and Q−1 post-multiplies Y to produce a final hash value. M can be subdivided into m1 . . . mt, corresponding h1 . . . ht can be produced, and the Y matrix produced from a product of h1 . . . ht to get the same hash value. Respective P and Q combinations can be unique to and pre-shared with each entity pair, so only those entities can compute valid hash data. Other hash functions and implementations can be provided according to this example.
    • 散列提供聚合属性,并允许分布式和/或并发处理。 在一个例子中,哈希对消息M进行操作,并且通过将2×2矩阵A代入二进制矩阵A而将2×2矩阵B替换为M中的二进制零,产生乘法矩阵序列.A和B选自SL2( R),R = F2 [x] /(P),F2 [x]是F2 = {0,1}中的系数的多项式度的集合,(P)是不可约生成的F2 [x] 多项式P(x)阶n = 12/4。 将矩阵序列相乘以产生具有n个比特长度条目的2×2矩阵h。 函数将h转换为l×l矩阵Y.访问具有随机选择的F2条目P和Q的两个l×l可逆矩阵。 P预乘以Y和Q-1后乘以Y以产生最终散列值。 M可以细分为m1。 。 。 mt,对应h1。 。 。 可以生产,并且由h1的乘积产生的Y矩阵。 。 。 ht获取相同的哈希值。 各个P和Q组合可以与每个实体对唯一并预先共享,因此只有那些实体可以计算有效的散列数据。 根据本例可以提供其他散列函数和实现。
    • 86. 发明申请
    • COMPUTER OBJECT CODE OBFUSCATION USING BOOT INSTALLATION
    • 使用引导安装的计算机对象代码OBFUSCATION
    • US20090235089A1
    • 2009-09-17
    • US12047207
    • 2008-03-12
    • Mathieu CIETJulien LerougeAugustin J. Farrugia
    • Mathieu CIETJulien LerougeAugustin J. Farrugia
    • G06F21/00
    • G06F21/14G06F21/577
    • In the field of computer software, obfuscation techniques for enhancing software security are applied to compiled (object) software code. The obfuscation results here in different versions (instances) of the obfuscated code being provided to different installations (recipient computing devices). The complementary code execution uses a boot loader or boot installer-type program at each installation which contains the requisite logic. Typically, the obfuscation results in a different instance of the obfuscated code for each intended installation (recipient) but each instance being semantically equivalent to the others. This is accomplished in one version by generating a random value or other parameter during the obfuscation process, and using the value to select a particular version of the obfuscating process, and then communicating the value along with boot loader or installer program software. This boot loader then selects which particular process to use for the code execution at the time of installation in accordance with the value. This results in different versions of the obfuscated code being provided to each recipient installation, which further enhances security of the code against reverse engineering by hackers.
    • 在计算机软件领域,用于增强软件安全性的混淆技术应用于编译(对象)软件代码。 这里的混淆结果在不同版本(实例)的混淆代码提供给不同的安装(收件人计算设备)。 互补代码执行在每个安装时使用引导加载程序或引导安装程序类型程序,其中包含必需的逻辑。 通常,混淆导致每个预期安装(接收者)的混淆代码的不同实例,但每个实例在语义上等同于其他安装。 这在一个版本中通过在混淆过程中产生随机值或其他参数来实现,并且使用该值来选择混淆过程的特定版本,然后与引导加载程序或安装程序软件一起传送该值。 然后,该引导加载程序根据该值选择在安装时用于执行代码的特定进程。 这导致了向每个接收方安装提供了不同版本的混淆代码,这进一步增强了代码的安全性,防止了黑客的反向工程。
    • 87. 发明申请
    • METHOD AND APPARATUS FOR VERIFYING AND DIVERSIFYING RANDOMNESS
    • 用于验证和分散随机的方法和装置
    • US20090208014A1
    • 2009-08-20
    • US12031552
    • 2008-02-14
    • Pierre BetouinMathieu CietAugustin J. FarrugiaGianpaolo Fasoli
    • Pierre BetouinMathieu CietAugustin J. FarrugiaGianpaolo Fasoli
    • H04L9/28G06F7/58
    • G06F7/58H04L9/0662H04L9/3236H04L2209/26H04L2209/603
    • Method and apparatus for ensuring randomness of pseudo-random numbers generated by a conventional computer operating system or electronic device. Typically pseudo-random number generators used in computer operating systems or electronic devices may be penetrated by a hacker (pirate), who penetrates a cryptographic or other supposedly secure process using the random numbers by tampering with the input random numbers, thus making them nonrandom. The present method and apparatus are intended to verify such random numbers to make sure that they are indeed random enough, by applying suitable random tests. Only if the values pass the test are they passed on for use in the cryptographic or other process. If they fail the test, a new set of random numbers is requested from the pseudo-random number generator. These are again tested. Further a diversity function may be applied to the random numbers even if they have passed the random number test in order to improve their randomness. This diversity function is for instance double encryption. An anti-replay feature is also included by which the pool of random numbers is subject to a check on each cycle to make sure that there has been no duplication of the input random numbers.
    • 用于确保由常规计算机操作系统或电子设备产生的伪随机数的随机性的方法和装置。 在计算机操作系统或电子设备中使用的通常的伪随机数生成器可以被黑客(盗版者)穿透,黑客(盗版者)通过篡改输入的随机数来使用随机数进行加密或其他所谓的安全处理,从而使其不随机。 本方法和装置旨在验证这样的随机数,以确保它们确实是随机的,通过应用适当的随机测试。 只有当值通过测试时,它们才被传递以用于加密或其他过程。 如果测试失败,则会从伪随机数发生器请求一组新的随机数。 这些再次测试。 此外,即使已经通过随机数测试来提高其随机性,也可以将分集函数应用于随机数。 这种分集功能是例如双重加密。 还包括反重播功能,通过该功能,随机数池将在每个周期进行检查,以确保输入随机数没有重复。
    • 88. 发明申请
    • Media Storage Structures for Storing Content, Devices for Using Such Structures, Systems for Distributing Such Structures
    • 用于存储内容的媒体存储结构,使用此类结构的设备,用于分发此类结构的系统
    • US20080294901A1
    • 2008-11-27
    • US11752276
    • 2007-05-22
    • Augustin J. FarrugiaGianpaolo FasoliBertrand Mollinier ToubletMathieu Ciet
    • Augustin J. FarrugiaGianpaolo FasoliBertrand Mollinier ToubletMathieu Ciet
    • H04L9/00
    • G06F21/10
    • Some embodiments of the invention provide a content-distribution system for distributing content under a variety of different basis. For instance, in some embodiments, the content-distribution system distributes device-restricted content and device-unrestricted content. Device-restricted content is content that can only be played on devices that the system associates with the particular user. Device-unrestricted content is content that can be played on any device without any restrictions. However, for at least one operation or service other than playback, device-unrestricted content has to be authenticated before this operation or service can be performed on the content. In some embodiments, the system facilitates this authentication by specifying a verification parameter for a piece of device-unrestricted content. The content-distribution system of some embodiments has a set of servers that supply (1) media storage structures that store content, (2) cryptographic keys that are needed to decrypt device-restricted content, and (3) verification parameters that are needed to verify device-unrestricted content. In some embodiments, the device that receives the media storage structure inserts the received cryptographic key or verification parameter in the received media storage structure. In some embodiments, the set of servers also supply cryptographic content keys for the device-unrestricted content. These keys are used to decrypt the content upon arrival, upon first playback, or at some other time. However, some embodiments do not store these cryptographic keys in the media storage structures for the device-unrestricted content.
    • 本发明的一些实施例提供了一种用于在各种不同基础下分发内容的内容分发系统。 例如,在一些实施例中,内容分发系统分发受设备限制的内容和设备无限制的内容。 设备限制内容是只能在系统与特定用户关联的设备上播放的内容。 设备无限制的内容是可以在任何设备上播放的内容,没有任何限制。 然而,对于除播放之外的至少一个操作或服务,在可以对内容执行该操作或服务之前必须认证设备无限制的内容。 在一些实施例中,系统通过为一片设备无限制内容指定验证参数来促进该认证。 一些实施例的内容分发系统具有一组服务器,其提供(1)存储内容的媒体存储结构,(2)解密设备限制的内容所需的密码密钥,以及(3)需要的验证参数 验证设备无限制内容。 在一些实施例中,接收媒体存储结构的设备将接收到的加密密钥或验证参数插入接收到的媒体存储结构中。 在一些实施例中,该组服务器还提供用于设备无限制内容的加密内容密钥。 这些密钥用于在到达时,首次播放时或在其他时间对内容进行解密。 然而,一些实施例不将这些加密密钥存储在用于设备无限制内容的媒体存储结构中。
    • 89. 发明授权
    • Media storage structures for storing content, devices for using such structures, systems for distributing such structures
    • 用于存储内容的媒体存储结构,用于使用这种结构的装置,用于分发这种结构的系统
    • US09311492B2
    • 2016-04-12
    • US13615492
    • 2012-09-13
    • Augustin J. FarrugiaGianpaolo FasoliBertrand Mollinier ToubletMathieu Ciet
    • Augustin J. FarrugiaGianpaolo FasoliBertrand Mollinier ToubletMathieu Ciet
    • G06F21/10G06F21/60
    • H04L9/32G06F21/10G06F21/602
    • Some embodiments of the invention provide a content-distribution system. In some embodiments, the content-distribution system distributes device-restricted content and device-unrestricted content. Device-restricted content is content that can only be played on devices that the system associates with the particular user. Device-unrestricted content is content that can be played on any device without any restrictions. However, for at least one operation or service other than playback, device-unrestricted content has to be authenticated before this operation or service can be performed on the content. In some embodiments, the system facilitates this authentication by specifying a verification parameter for a piece of device-unrestricted content. The content-distribution system of some embodiments has a set of servers that supply (1) media storage structures that store content, (2) cryptographic keys that are needed to decrypt device-restricted content, and (3) verification parameters that are needed to verify device-unrestricted content.
    • 本发明的一些实施例提供内容分发系统。 在一些实施例中,内容分发系统分发设备限制的内容和设备无限制的内容。 设备限制内容是只能在系统与特定用户关联的设备上播放的内容。 设备无限制的内容是可以在任何设备上播放的内容,没有任何限制。 然而,对于除播放之外的至少一个操作或服务,在可以对内容执行该操作或服务之前必须认证设备无限制的内容。 在一些实施例中,系统通过为一片设备无限制内容指定验证参数来促进该认证。 一些实施例的内容分发系统具有一组服务器,其提供(1)存储内容的媒体存储结构,(2)解密设备限制的内容所需的密码密钥,以及(3)需要的验证参数 验证设备无限制的内容。
    • 90. 发明授权
    • Method and apparatus for computer code obfuscation and deobfuscation using boot installation
    • 使用引导安装的计算机代码混淆和去模糊的方法和装置
    • US08881290B2
    • 2014-11-04
    • US13434619
    • 2012-03-29
    • Mathieu CietJulien LerougeAugustin J. Farrugia
    • Mathieu CietJulien LerougeAugustin J. Farrugia
    • G06F11/00G06F12/14G06F12/16G06F21/14G06F21/57
    • G06F21/14G06F21/577
    • In the field of computer software, obfuscation techniques for enhancing software security are applied to compiled (object) software code. The obfuscation results here in different versions (instances) of the obfuscated code being provided to different installations (recipient computing devices). The complementary code execution uses a boot loader or boot installer-type program at each installation which contains the requisite logic. Typically, the obfuscation results in a different instance of the obfuscated code for each intended installation (recipient) but each instance being semantically equivalent to the others. This is accomplished in one version by generating a random value or other parameter during the obfuscation process, and using the value to select a particular version of the obfuscating process, and then communicating the value along with boot loader or installer program software.
    • 在计算机软件领域,用于增强软件安全性的混淆技术应用于编译(对象)软件代码。 这里的混淆结果在不同版本(实例)的混淆代码提供给不同的安装(收件人计算设备)。 互补代码执行在每个安装时使用引导加载程序或引导安装程序类型程序,其中包含必需的逻辑。 通常,混淆导致每个预期安装(接收者)的混淆代码的不同实例,但每个实例在语义上等同于其他安装。 这在一个版本中通过在混淆过程中产生随机值或其他参数来实现,并且使用该值来选择混淆过程的特定版本,然后与引导加载程序或安装程序软件一起传送该值。