会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • METHOD AND DEVICE FOR CODE OBFUSCATION
    • 用于代码欺骗的方法和设备
    • US20110138351A1
    • 2011-06-09
    • US12737730
    • 2009-08-17
    • Antoine MonsifrotFabien Lahoudere
    • Antoine MonsifrotFabien Lahoudere
    • G06F9/44
    • G06F21/14
    • Compiled computer code comprising computer code instructions organised in a plurality of basic blocks is obfuscated by replacing a jump instruction in a first basic block with a function call with at least one parameter, wherein the function call when executed determines the address of the next function to execute in dependence on the parameter; inserting into the compiled computer code an instruction that allocates a value to the parameter, the value being such that the address determined by the function call corresponds to the address of the replace jump instruction. The allocation function is inserted into the computer code in a second basic block, different from the first basic block, preferably using information from a control flow graph. This can ensure that the obfuscated code cannot be disassembled without information from the CFG, while the CFG cannot be generated from the obfuscated code. Also provided is a device for code obfuscation.
    • 包括组织在多个基本块中的计算机代码指令的编译计算机代码通过用具有至少一个参数的函数调用替换第一基本块中的跳转指令而被模糊化,其中当执行时的函数调用将下一个函数的地址确定为 根据参数执行; 在编译的计算机代码中插入向参数分配值的指令,该值指示由功能调用确定的地址对应于替换跳转指令的地址。 分配功能被插入到与第一基本块不同的第二基本块中的计算机代码中,优选地使用来自控制流程图的信息。 这样可以确保在没有来自CFG的信息的情况下,混淆代码不能被拆卸,而不能从混淆代码生成CFG。 还提供了一种用于代码混淆的设备。
    • 2. 发明授权
    • Method and device for code obfuscation
    • 代码混淆的方法和设备
    • US08762966B2
    • 2014-06-24
    • US12737730
    • 2009-08-17
    • Antoine MonsifrotFabien Lahoudere
    • Antoine MonsifrotFabien Lahoudere
    • G06F9/45
    • G06F21/14
    • Compiled computer code comprising computer code instructions organized in a plurality of basic blocks is obfuscated by replacing a jump instruction in a first basic block with a function call with at least one parameter, wherein the function call when executed determines the address of the next function to execute in dependence on the parameter; inserting into the compiled computer code an instruction that allocates a value to the parameter, the value being such that the address determined by the function call corresponds to the address of the replace jump instruction. The allocation function is inserted into the computer code in a second basic block, different from the first basic block, preferably using information from a control flow graph. This can ensure that the obfuscated code cannot be disassembled without information from the CFG, while the CFG cannot be generated from the obfuscated code. Also provided is a device for code obfuscation.
    • 包含组织在多个基本块中的计算机代码指令的编译计算机代码通过用具有至少一个参数的函数调用替换第一基本块中的跳转指令来进行混淆,其中当执行时的功能调用将下一功能的地址确定为 根据参数执行; 在编译的计算机代码中插入向参数分配值的指令,该值指示由函数调用确定的地址对应于替换跳转指令的地址。 分配功能被插入到与第一基本块不同的第二基本块中的计算机代码中,优选地使用来自控制流程图的信息。 这样可以确保在没有来自CFG的信息的情况下,混淆代码不能被拆卸,而不能从混淆代码生成CFG。 还提供了一种用于代码混淆的设备。
    • 4. 发明授权
    • Methods and devices for instruction level software encryption
    • 用于指令级软件加密的方法和设备
    • US08341426B2
    • 2012-12-25
    • US12653224
    • 2009-12-10
    • Stéphane OnnoMohamed KarroumiAntoine Monsifrot
    • Stéphane OnnoMohamed KarroumiAntoine Monsifrot
    • G06F12/14
    • G06F21/14G06F21/125G06F2221/2107H01L2924/30107H04L9/0637H04L9/0656H01L2924/00
    • A method of encrypting compiled computer code instructions to be decrypted instruction by instruction during execution. The computer code instructions are encrypted using a chaining mode so that an encrypted instruction depends on the values of the instruction, the value of the preceding instruction and a pseudo-random number. As it may happen that the instruction can be arrived at from more than one preceding instruction, at least one of the preceding instructions is associated with a random number compensator for use during decryption of the encrypted instruction, so that the decryption of the encrypted instruction yields the same result regardless of which the preceding instruction was. Also provided are an encryption device, a decryption device and method, and a digital support medium storing encrypted compiled computer code instructions.
    • 在执行期间通过指令加密编译的计算机代码指令以进行解密指令的方法。 使用链接模式来加密计算机代码指令,使得加密指令取决于指令的值,前一条指令的值和伪随机数。 可能发生的是,可以从多于一个的先前指令得到指令,所述前述指令中的至少一个与加密指令的解密期间使用的随机数补偿器相关联,从而加密指令的解密产生 相同的结果,不管前面的说明是什么。 还提供了加密装置,解密装置和方法以及存储加密编译的计算机代码指令的数字支持介质。
    • 5. 发明授权
    • Methods and devices for a chained encryption mode
    • 用于链接加密模式的方法和设备
    • US08259934B2
    • 2012-09-04
    • US12592696
    • 2009-12-01
    • Mohamed KarroumiStéphane OnnoAntoine Monsifrot
    • Mohamed KarroumiStéphane OnnoAntoine Monsifrot
    • H04K1/00
    • H04L9/0637H04L2209/24
    • An encryption chaining mode takes plaintext block N, generates encryption key N by combining, preferably by XOR, encryption key N-1 and plaintext block N-1 and encrypts plaintext block N using an encryption algorithm with encryption key N to output ciphertext block N. Encryption key for the first plaitnext block is generated by XOR-ing a random Initialization vector and a random intialization key K. In a preferred embodiment, initialization key K is subkeys resulting form a key schedule algorithm and encryption key N-1 is only one of the subkeys. Encryption key for the first plaintext block is generated by XOR-ing a random Initialization vector and one subkey resulting form a key schedule algorithm. Also provided is a corresponding decryption method, an encryption device, a decryption device.
    • 加密链接模式采用明文块N,优选地通过XOR,加密密钥N-1和明文块N-1组合来生成加密密钥N,并且使用具有加密密钥N的加密算法加密明文块N.以输出密文块N. 通过对随机初始化向量和随机初始化密钥K进行XOR生成,生成第一第一嵌段的加密密钥。在优选实施例中,初始化密钥K是由密钥调度算法产生的子密钥,加密密钥N-1仅为 子项。 第一个明文块的加密密钥是由一个随机的初始化向量和一个子密钥进行XOR生成的,形成密钥调度算法。 还提供了相应的解密方法,加密装置,解密装置。
    • 7. 发明申请
    • METHOD AND DEVICE FOR CONTROLLING DISTRIBUTION OF LICENSES
    • 用于控制许可证分发的方法和装置
    • US20130318624A1
    • 2013-11-28
    • US13984068
    • 2012-02-06
    • Antoine MonsifrotGwenael DoerrOlivier CourtayAntoine RobertMarc Joye
    • Antoine MonsifrotGwenael DoerrOlivier CourtayAntoine RobertMarc Joye
    • G06F21/10
    • G06F21/105G06F21/10
    • A method for controlling distribution of licenses, a license being for an excerpt of a content item, the content item comprising a set of continuous units, each excerpt comprising a subset of the set of continuous units, A device receives an identifier of a receiver of a license, and the license or a request to generate the license, the license or the request to generate the license comprising a content identifier and at least one indicator of the units covered by the license; retrieves stored information regarding licenses previously delivered to the receiver; compares a limit value for the content item with the stored information combined with information from the license or the request to generate the license; and allows the receiver access to the license only if the limit value is not exceeded by the stored information combined with information from the license or the request to generate the license Also provided is the device.
    • 一种用于控制许可证分发的方法,用于内容项目摘录的许可证,所述内容项目包括一组连续单元,每个摘录包括所述一组连续单元的子集。设备接收所述连续单元的接收者的标识符 许可证,许可证或产生许可证的请求,许可证或生成许可证的请求,其包括内容标识符和许可证所涵盖的单元的至少一个指示符; 检索关于先前传送给接收者的许可证的存储信息; 将内容项的限制值与存储的信息结合来自许可证的信息或生成许可证的请求进行比较; 并且只有当存储的信息与来自许可证的信息或生成许可证的请求相结合的限制值不超过时,才允许接收者访问许可证。还提供了该设备。
    • 10. 发明申请
    • Methods and devices for a chained encryption mode
    • 用于链接加密模式的方法和设备
    • US20100150344A1
    • 2010-06-17
    • US12592696
    • 2009-12-01
    • Mohamed KarroumiStéphane OnnoAntoine Monsifrot
    • Mohamed KarroumiStéphane OnnoAntoine Monsifrot
    • H04L9/14
    • H04L9/0637H04L2209/24
    • An encryption chaining mode takes plaintext block N, generates encryption key N by combining, preferably by XOR, encryption key N−1 and plaintext block N−1 and encrypts plaintext block N using an encryption algorithm with encryption key N to output ciphertext block N. Encryption key for the first plaintext block is generated by XOR-ing a random Initialization vector and a random initialization key K. In a preferred embodiment, initialization key K is subkeys resulting from a key schedule algorithm and encryption key N−1 is only one of the subkeys. Encryption key for the first plaintext block is generated by XOR-ing a random Initialization vector and one subkey resulting from a key schedule algorithm. Also provided is a corresponding decryption method, an encryption device, a decryption device.
    • 加密链接模式采用明文块N,优选地通过XOR,加密密钥N-1和明文块N-1组合来生成加密密钥N,并且使用具有加密密钥N的加密算法对明文块N进行加密,以输出密文块N. 通过对随机初始化向量和随机初始化密钥K进行XOR生成第一明文块的加密密钥。在优选实施例中,初始化密钥K是由密钥调度算法产生的子密钥,加密密钥N-1只是 子项。 通过对由密钥调度算法产生的随机初始化向量和一个子密钥进行XOR生成第一明文块的加密密钥。 还提供了相应的解密方法,加密装置,解密装置。