会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • SOFTWARE WATERMARKING TECHNIQUES
    • 软件水印技术
    • US20110214188A1
    • 2011-09-01
    • US12946796
    • 2010-11-15
    • Christian Sven COLLBERGClark David THOMBORSON
    • Christian Sven COLLBERGClark David THOMBORSON
    • G06F21/00
    • G06F21/16
    • A method and system for watermarking software is disclosed. In one aspect, the method and system include providing an input sequence and storing a watermark in the state of a software object as the software object is being run with the input sequence. In another aspect, the method and system verify the integrity or origin of a program by watermarking the program. The watermark is stored as described above. In this aspect, the method and system also include building a recognizer concurrently with the input sequence and the watermark. The recognizer can extract the watermark from other dynamically allocated data and is kept separately from the program. The recognizer is adapted to check for a number. In another aspect, the software is watermarked by embedding a watermark in a static string and applying an obfuscation technique to convert the static string into executable code. In another aspect, the watermark is chosen from a class of graphs having a plurality of members and applied to the software. Each member of the class of graphs has at least one property that is capable of being tested by integrity-testing software.
    • 公开了一种用于水印软件的方法和系统。 一方面,该方法和系统包括提供一个输入序列,并且当软件对象正在使用输入序列运行​​时,在软件对象的状态下存储水印。 在另一方面,该方法和系统通过对程序进行水印来验证程序的完整性或起源。 如上所述地存储水印。 在这方面,该方法和系统还包括与输入序列和水印同时构建识别器。 识别器可以从其他动态分配的数据中提取水印,并与程序分开保存。 识别器适用于检查数字。 在另一方面,通过将静态字符串嵌入水印并应用混淆技术来将静态字符串转换为可执行代码来对软件进行水印。 在另一方面,水印是从具有多个成员的图表类型中选出的,并应用于该软件。 图形类的每个成员至少有一个属性可以通过完整性测试软件进行测试。
    • 2. 发明授权
    • Obfuscation techniques for enhancing software security
    • 用于增强软件安全性的混淆技术
    • US06668325B1
    • 2003-12-23
    • US09095346
    • 1998-06-09
    • Christian Sven CollbergClark David ThomborsonDouglas Wai Kok Low
    • Christian Sven CollbergClark David ThomborsonDouglas Wai Kok Low
    • G06F1214
    • G06F21/14
    • The present invention provides obfuscation techniques for enhancing software security. In one embodiment, a method for obfuscation techniques for enhancing software security includes selecting a subset of code (e.g., compiled source code of an application) to obfuscate, and obfuscating the selected subset of the code. The obfuscating includes applying an obfuscating transformation to the selected subset of the code. The transformed code can be weakly equivalent to the untransformed code. The applied transformation can be selected based on a desired level of security (e.g., resistance to reverse engineering). The applied transformation can include a control transformation that can be creating using opaque constructs, which can be constructed using aliasing and concurrency techniques. Accordingly, the code can be obfuscated for enhanced software security based on a desired level of obfuscation (e.g., based on a desired potency, resilience, and cost).
    • 本发明提供了用于增强软件安全性的混淆技术。 在一个实施例中,一种用于增强软件安全性的混淆技术的方法包括选择代码的子集(例如,应用程序的编译源代码)来模糊和混淆所选代码的子集。 混淆包括将模糊化变换应用于所选择的代码子集。 转换的代码可能与未转换的代码相当。 可以基于期望的安全级别(例如,抵抗逆向工程)来选择所应用的变换。 所应用的变换可以包括可以使用不透明构造创建的控制变换,其可以使用混叠和并发技术来构造。 因此,可以基于期望的混淆水平(例如,基于期望的效力,弹性和成本)来对代码进行模糊处理以增强软件安全性。