会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Hash functions using recurrency and arithmetic
    • 散列函数使用循环和算术
    • US08225100B2
    • 2012-07-17
    • US12263293
    • 2008-10-31
    • Mathieu CietMichael L. CroganAugustin J. FarrugiaNicholas T. Sullivan
    • Mathieu CietMichael L. CroganAugustin J. FarrugiaNicholas T. Sullivan
    • H04L29/06
    • G06F7/723G06F2207/7257H04L9/0643
    • Aspects relate to systems and methods for implementing a hash function using a stochastic and recurrent process, and performing arithmetic operations during the recurrence on portions of a message being hashed. In an example method, the stochastic process is a Galton-Watson process, the message is decomposed into blocks, and the method involves looping for a number of blocks in the message. In each loop, a current hash value is determined based on arithmetic performed on a previous hash value and some aspect of a current block. The arithmetic performed can involve modular arithmetic, such as modular addition and exponentiation. The algorithm can be adjusted to achieve qualities including a variable length output, or to perform fewer or more computations for a given hash. Also, randomizing elements can be introduced into the arithmetic, avoiding a modular reduction until final hash output production.
    • 方面涉及用于使用随机和复现过程来实现散列函数的系统和方法,以及在散列的消息的部分上的重复期间执行算术运算。 在一个示例方法中,随机过程是Galton-Watson过程,消息被分解成块,并且该方法涉及在消息中循环多个块。 在每个循环中,基于对先前哈希值和当前块的某个方面执行的算术来确定当前哈希值。 执行的算术可以涉及模数运算,例如模块加法和乘法运算。 可以调整算法以实现包括可变长度输出的质量,或者为给定散列执行更少或更多的计算。 此外,可以将随机化元素引入算术,避免模块化减少直到最终哈希输出生成。
    • 2. 发明申请
    • HASH FUNCTIONS USING RECURRENCY AND ARITHMETIC
    • 使用回归和算术的HASH函数
    • US20100115230A1
    • 2010-05-06
    • US12263293
    • 2008-10-31
    • Mathieu CietMichael L. CroganAugustin J. FarrugiaNicholas T. Sullivan
    • Mathieu CietMichael L. CroganAugustin J. FarrugiaNicholas T. Sullivan
    • G06F12/08
    • G06F7/723G06F2207/7257H04L9/0643
    • Aspects relate to systems and methods for implementing a hash function using a stochastic and recurrent process, and performing arithmetic operations during the recurrence on portions of a message being hashed. In an example method, the stochastic process is a Galton-Watson process, the message is decomposed into blocks, and the method involves looping for a number of blocks in the message. In each loop, a current hash value is determined based on arithmetic performed on a previous hash value and some aspect of a current block. The arithmetic performed can involve modular arithmetic, such as modular addition and exponentiation. The algorithm can be adjusted to achieve qualities including a variable length output, or to perform fewer or more computations for a given hash. Also, randomizing elements can be introduced into the arithmetic, avoiding a modular reduction until final hash output production.
    • 方面涉及用于使用随机和复现过程来实现散列函数的系统和方法,以及在散列的消息的部分上的重复期间执行算术运算。 在一个示例方法中,随机过程是Galton-Watson过程,消息被分解成块,并且该方法涉及在消息中循环多个块。 在每个循环中,基于对先前哈希值和当前块的某个方面执行的算术来确定当前哈希值。 执行的算术可以涉及模数运算,例如模块加法和乘法运算。 可以调整算法以实现包括可变长度输出的质量,或者为给定散列执行更少或更多的计算。 此外,可以将随机化元素引入算术,避免模块化减少直到最终哈希输出生成。
    • 3. 发明申请
    • SCHEME FOR AUTHENTICATING WITHOUT PASSWORD EXCHANGE
    • 没有密码交换的认证方案
    • US20100100947A1
    • 2010-04-22
    • US12255315
    • 2008-10-21
    • Mathieu CietMichael L. CroganAugustin J. FarrugiaNicholas T. Sullivan
    • Mathieu CietMichael L. CroganAugustin J. FarrugiaNicholas T. Sullivan
    • H04L9/32G06F7/38
    • H04L9/3271H04L2209/80
    • Aspects relate to systems and methods implementing a scheme allowing a Verifier (V) to authenticate a Prover (P). The scheme comprises pre-sharing between V and P a graph of nodes. Each node is associated with a polynomial. V sends P data comprising data for selecting a polynomial of the graph, such as traversal data for proceeding from a known node to another node, a time interval, and a number k. P uses the time interval in an evaluation of the polynomial. P then uses the evaluation as a λ in a Poisson distribution, and determines a value related to a probability that a number of occurrences of an event equals k. P sends the determined value to V. V performs a similar determination to arrive at a comparison value. P authenticates V if the separately determined values match, or otherwise meet expectations. The process can be repeated to increase confidence in authentication.
    • 方面涉及实现允许Verifier(V)验证Prover(P)的方案的系统和方法。 该方案包括在V和P之间预先共享节点图。 每个节点与多项式相关联。 V发送包括用于选择图形的多项式的数据的P数据,例如用于从已知节点进行到另一个节点的遍历数据,时间间隔和数量k。 P在多项式的评估中使用时间间隔。 P然后将评估用作泊松分布中的λ,并且确定与事件的发生次数等于k的概率相关的值。 P将确定的值发送到V.V执行类似的确定以得到比较值。 如果单独确定的值匹配,则P验证V,否则满足期望。 可以重复该过程以增加认证的置信度。
    • 4. 发明申请
    • SYSTEM AND METHOD FOR MODULUS OBFUSCATION
    • 用于模块化的系统和方法
    • US20100054459A1
    • 2010-03-04
    • US12203101
    • 2008-09-02
    • Mathieu CietAugustin J. FarrugiaNicholas T. Sullivan
    • Mathieu CietAugustin J. FarrugiaNicholas T. Sullivan
    • H04L9/28
    • H04L9/00H04L2209/16
    • Disclosed herein are methods for obfuscating data on a client, on a server, and on a client and a server. The method on a client device includes receiving input data, storing an operation value in a secure location, performing a modulus obfuscation on the operation value, performing a modulus operation on the operation value and the input data, performing a modulus transformation on the operation value and the input data to obtain client output data, and checking if the client output data matches corresponding server output data. The method on a server device includes receiving input data, performing a modulus transformation on the input data to obtain a result, performing a plain operation on the result and an operation value to obtain server output data, and checking if the server output data matches corresponding client output data from a client device that (1) receives input data, (2) stores an operation value in a secure location, (3) performs a modulus obfuscation on the operation value, (4) performs a modulus operation on the operation value and the input data, and (5) performs a modulus transformation on the operation value and the input data to obtain client output data. In an optional step applicable to both clients and servers, the method further includes authenticating the client input data and the server input data if the server output data matches the client output data. In one aspect, server input data and client input data pertain to a cryptographic key.
    • 这里公开了用于在客户端,服务器上以及在客户端和服务器上模糊数据的方法。 客户端装置的方法包括接收输入数据,将操作值存储在安全位置,对运算值进行模糊混淆,对运算值和输入数据进行模运算,对运算值进行模变换 和输入数据,以获取客户端输出数据,并检查客户端输出数据是否匹配相应的服务器输出数据。 服务器装置上的方法包括:接收输入数据,对输入数据进行模数变换,得到结果,对结果执行简单操作,得到操作值,得到服务器输出数据,并检查服务器输出数据是否匹配对应 (1)接收输入数据的客户端输出数据,(2)将操作值存储在安全位置,(3)对运算值进行模糊混淆,(4)对运算值进行模运算 和输入数据,(5)对运算值和输入数据进行模变换,得到客户输出数据。 在适用于客户端和服务器的可选步骤中,如果服务器输出数据与客户端输出数据匹配,则该方法还包括验证客户端输入数据和服务器输入数据。 在一个方面,服务器输入数据和客户端输入数据属于加密密钥。
    • 5. 发明授权
    • System and method for modulus obfuscation
    • 模糊模糊系统和方法
    • US08094813B2
    • 2012-01-10
    • US12203101
    • 2008-09-02
    • Mathieu CietAugustin J. FarrugiaNicholas T. Sullivan
    • Mathieu CietAugustin J. FarrugiaNicholas T. Sullivan
    • H04L9/00
    • H04L9/00H04L2209/16
    • Disclosed herein are methods for obfuscating data on a client, on a server, and on a client and a server. The method on a client device includes receiving input data, storing an operation value in a secure location, performing a modulus obfuscation on the operation value, performing a modulus operation on the operation value and the input data, performing a modulus transformation on the operation value and the input data to obtain client output data, and checking if the client output data matches corresponding server output data. The method on a server device includes receiving input data, performing a modulus transformation on the input data to obtain a result, performing a plain operation on the result and an operation value to obtain server output data, and checking if the server output data matches corresponding client output data from a client device that (1) receives input data, (2) stores an operation value in a secure location, (3) performs a modulus obfuscation on the operation value, (4) performs a modulus operation on the operation value and the input data, and (5) performs a modulus transformation on the operation value and the input data to obtain client output data. In an optional step applicable to both clients and servers, the method further includes authenticating the client input data and the server input data if the server output data matches the client output data. In one aspect, server input data and client input data pertain to a cryptographic key.
    • 这里公开了用于在客户端,服务器上以及在客户端和服务器上模糊数据的方法。 客户端装置的方法包括接收输入数据,将操作值存储在安全位置,对运算值进行模糊混淆,对运算值和输入数据进行模运算,对运算值进行模变换 和输入数据,以获取客户端输出数据,并检查客户端输出数据是否匹配相应的服务器输出数据。 服务器装置上的方法包括:接收输入数据,对输入数据进行模数变换,得到结果,对结果执行简单操作,得到操作值,得到服务器输出数据,并检查服务器输出数据是否匹配对应 (1)接收输入数据的客户端输出数据,(2)将操作值存储在安全位置,(3)对运算值进行模糊混淆,(4)对运算值进行模运算 和输入数据,(5)对运算值和输入数据进行模变换,得到客户输出数据。 在适用于客户端和服务器的可选步骤中,如果服务器输出数据与客户端输出数据匹配,则该方法还包括验证客户端输入数据和服务器输入数据。 在一个方面,服务器输入数据和客户端输入数据属于加密密钥。
    • 6. 发明授权
    • System and method for modulus obfuscation
    • 模糊模糊系统和方法
    • US08300809B2
    • 2012-10-30
    • US13222245
    • 2011-08-31
    • Mathieu CietAugustin J. FarrugiaNicholas T. Sullivan
    • Mathieu CietAugustin J. FarrugiaNicholas T. Sullivan
    • H04L9/00
    • H04L9/00H04L2209/16
    • Disclosed herein are methods for obfuscating data via a modulus operation. A client device receives input data, stores an operation value, performs a modulus obfuscation on the operation value, performs a modulus operation on the operation value and the input data, performs a modulus transformation on the operation value and the input data to obtain client output data, and checks if the client output data matches corresponding server output data. A corresponding server device receives input data, performs a modulus transformation on the input data to obtain a result, performs a plain operation on the result and an operation value to obtain server output data, and checks if the server output data matches corresponding client output data from the client device. The client and/or server can optionally authenticate the client input data and the server input data if the server output data matches the client output data.
    • 这里公开的是通过模数运算来模糊数据的方法。 客户机接收输入数据,存储操作值,对运算值进行模糊混淆,对运算值和输入数据进行模运算,对运算值和输入数据进行模变换,得到客户输出 数据,并检查客户端输出数据是否匹配相应的服务器输出数据。 相应的服务器设备接收输入数据,对输入数据进行模数变换以获得结果,对结果执行简单操作,并获取操作值以获取服务器输出数据,并检查服务器输出数据是否与相应的客户端输出数据相匹配 从客户端设备。 如果服务器输出数据与客户端输出数据匹配,则客户端和/或服务器可以可选地认证客户端输入数据和服务器输入数据。
    • 7. 发明申请
    • SYSTEM AND METHOD FOR MODULUS OBFUSCATION
    • 用于模块化的系统和方法
    • US20110320806A1
    • 2011-12-29
    • US13222245
    • 2011-08-31
    • Mathieu CietAugustin J. FarrugiaNicholas T. Sullivan
    • Mathieu CietAugustin J. FarrugiaNicholas T. Sullivan
    • H04L9/00
    • H04L9/00H04L2209/16
    • Disclosed herein are methods for obfuscating data via a modulus operation. A client device receives input data, stores an operation value, performs a modulus obfuscation on the operation value, performs a modulus operation on the operation value and the input data, performs a modulus transformation on the operation value and the input data to obtain client output data, and checks if the client output data matches corresponding server output data. A corresponding server device receives input data, performs a modulus transformation on the input data to obtain a result, performs a plain operation on the result and an operation value to obtain server output data, and checks if the server output data matches corresponding client output data from the client device. The client and/or server can optionally authenticate the client input data and the server input data if the server output data matches the client output data.
    • 这里公开的是通过模数运算来模糊数据的方法。 客户机接收输入数据,存储操作值,对运算值进行模糊混淆,对运算值和输入数据进行模运算,对运算值和输入数据进行模变换,得到客户输出 数据,并检查客户端输出数据是否匹配相应的服务器输出数据。 相应的服务器设备接收输入数据,对输入数据进行模数变换以获得结果,对结果执行简单操作,并获取操作值以获取服务器输出数据,并检查服务器输出数据是否与相应的客户端输出数据相匹配 从客户端设备。 如果服务器输出数据与客户端输出数据匹配,则客户端和/或服务器可以可选地认证客户端输入数据和服务器输入数据。
    • 8. 发明授权
    • Systems and methods for implementing block cipher algorithms on attacker-controlled systems
    • 用于在攻击者控制的系统上实现块密码算法的系统和方法
    • US09031228B2
    • 2015-05-12
    • US13448385
    • 2012-04-16
    • Mathieu CietAugustin J. FarrugiaFilip Toma Paun
    • Mathieu CietAugustin J. FarrugiaFilip Toma Paun
    • H04L9/28H04L9/00H04L9/06
    • H04L9/002H04L9/0618H04L9/0631H04L2209/043H04L2209/122H04L2209/125H04L2209/16
    • Systems and methods for an implementation of block cipher algorithms (e.g., AES) use lookup tables to obscure key information, increasing difficulty of reverse engineering efforts. The implementation encodes round key information into a first plurality of tables (T1), which when used for lookup operations also complete SubBytes operations, and output state in an encoded format. A Shiftrows operation is performed arithmetically on the output state. A second plurality of tables (T2) are used to perform a polynomial multiplication portion of MixColumns operation, and an XOR portion of MixColumns is performed arithmetically on the columns. Encoding from the T1 tables is made to match a decoding built into the T2 tables. Subsets of the T1 tables use the same T2 tables, reducing a memory footprint for the T2 tables. Multiple AES keys can be embedded in different sets of T1 tables that encode for the same set of T2 tables.
    • 用于实施块密码算法(例如,AES)的系统和方法使用查找表来掩盖关键信息,增加了逆向工程努力的难度。 该实施方式将循环密钥信息编码到第一多个表(T1)中,当用于查找操作时也完成子字节操作,并且以编码格式输出状态。 对输出状态进行算术运算。 使用第二多个表(T2)来执行MixColumns操作的多项式乘法部分,并且对列进行算术运算的MixColumn的XOR部分。 使T1表格的编码与T2表中内置的解码相匹配。 T1表的子集使用相同的T2表,减少了T2表的内存占用。 可以将多个AES密钥嵌入到为同一组T2表编码的不同的T1表中。
    • 10. 发明授权
    • Performing boolean logic operations using arithmetic operations by code obfuscation
    • 使用代码混淆的算术运算执行布尔逻辑运算
    • US08707053B2
    • 2014-04-22
    • US13024258
    • 2011-02-09
    • Augustin J. FarrugiaBenoit Chevallier-MamesMathieu CietThomas Icart
    • Augustin J. FarrugiaBenoit Chevallier-MamesMathieu CietThomas Icart
    • G06F12/14
    • G06F21/14
    • Method and apparatus for obfuscating computer software code, to protect against reverse-engineering of the code. The obfuscation here is of the part of the code that performs a Boolean logic operation such as an exclusive OR on two (or more) data variables. In the obfuscated code, each of the two variables is first modified by applying to it a function which deconstructs the value of each of the variables, and then the exclusive OR operation is replaced by an arithmetic operation such as addition, subtraction, or multiplication, which is performed on the two deconstructed variables. The non-obfuscated result is recovered by applying a third function to the value generated by the arithmetic operation. This obfuscation is typically carried out by suitably annotating (modifying) the original source code.
    • 用于模糊计算机软件代码的方法和装置,以防止代码的逆向工程化。 这里的混淆是执行布尔逻辑运算的代码的一部分,例如两个(或多个)数据变量上的异或运算。 在混淆代码中,首先通过对两个变量中的每一个进行修改来解构每个变量的值,然后通过诸如加法,减法或乘法的算术运算来代替异或运算, 这是对两个解构变量进行的。 通过对由算术运算产生的值应用第三函数来恢复未混淆的结果。 这种混淆通常通过适当地注释(修改)原始源代码来执行。