会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 121. 发明授权
    • System and method for modulus obfuscation
    • 模糊模糊系统和方法
    • US08300809B2
    • 2012-10-30
    • US13222245
    • 2011-08-31
    • Mathieu CietAugustin J. FarrugiaNicholas T. Sullivan
    • Mathieu CietAugustin J. FarrugiaNicholas T. Sullivan
    • H04L9/00
    • H04L9/00H04L2209/16
    • Disclosed herein are methods for obfuscating data via a modulus operation. A client device receives input data, stores an operation value, performs a modulus obfuscation on the operation value, performs a modulus operation on the operation value and the input data, performs a modulus transformation on the operation value and the input data to obtain client output data, and checks if the client output data matches corresponding server output data. A corresponding server device receives input data, performs a modulus transformation on the input data to obtain a result, performs a plain operation on the result and an operation value to obtain server output data, and checks if the server output data matches corresponding client output data from the client device. The client and/or server can optionally authenticate the client input data and the server input data if the server output data matches the client output data.
    • 这里公开的是通过模数运算来模糊数据的方法。 客户机接收输入数据,存储操作值,对运算值进行模糊混淆,对运算值和输入数据进行模运算,对运算值和输入数据进行模变换,得到客户输出 数据,并检查客户端输出数据是否匹配相应的服务器输出数据。 相应的服务器设备接收输入数据,对输入数据进行模数变换以获得结果,对结果执行简单操作,并获取操作值以获取服务器输出数据,并检查服务器输出数据是否与相应的客户端输出数据相匹配 从客户端设备。 如果服务器输出数据与客户端输出数据匹配,则客户端和/或服务器可以可选地认证客户端输入数据和服务器输入数据。
    • 124. 发明授权
    • Computer object code obfuscation using boot installation
    • 使用引导安装的计算机对象代码模糊
    • US08176337B2
    • 2012-05-08
    • US12047207
    • 2008-03-12
    • Mathieu CietJulien LerougeAugustin J. Farrugia
    • Mathieu CietJulien LerougeAugustin J. Farrugia
    • G06F12/14G06F9/45G06F11/00
    • G06F21/14G06F21/577
    • In the field of computer software, obfuscation techniques for enhancing software security are applied to compiled (object) software code. The obfuscation results here in different versions (instances) of the obfuscated code being provided to different installations (recipient computing devices). The complementary code execution uses a boot loader or boot installer-type program at each installation which contains the requisite logic. Typically, the obfuscation results in a different instance of the obfuscated code for each intended installation (recipient) but each instance being semantically equivalent to the others. This is accomplished in one version by generating a random value or other parameter during the obfuscation process, and using the value to select a particular version of the obfuscating process, and then communicating the value along with boot loader or installer program software. This boot loader then selects which particular process to use for the code execution at the time of installation in accordance with the value. This results in different versions of the obfuscated code being provided to each recipient installation, which further enhances security of the code against reverse engineering by hackers.
    • 在计算机软件领域,用于增强软件安全性的混淆技术应用于编译(对象)软件代码。 这里的混淆结果在不同版本(实例)的混淆代码提供给不同的安装(收件人计算设备)。 互补代码执行在每个安装时使用引导加载程序或引导安装程序类型程序,其中包含必需的逻辑。 通常,混淆导致每个预期安装(接收者)的混淆代码的不同实例,但每个实例在语义上等同于其他安装。 这在一个版本中通过在混淆过程中产生随机值或其他参数来实现,并且使用该值来选择混淆过程的特定版本,然后与引导加载程序或安装程序软件一起传送该值。 然后,该引导加载程序根据该值选择在安装时用于执行代码的特定进程。 这导致了向每个接收方安装提供了不同版本的混淆代码,这进一步增强了代码的安全性,防止了黑客的反向工程。
    • 125. 发明授权
    • Systems and methods for implementing block cipher algorithms on attacker-controlled systems
    • 用于在攻击者控制的系统上实现块密码算法的系统和方法
    • US08175265B2
    • 2012-05-08
    • US12203120
    • 2008-09-02
    • Mathieu CietAugustin J. FarrugiaFilip Toma Paun
    • Mathieu CietAugustin J. FarrugiaFilip Toma Paun
    • H04L9/00
    • H04L9/002H04L9/0618H04L9/0631H04L2209/043H04L2209/122H04L2209/125H04L2209/16
    • Systems and methods for an implementation of block cipher algorithms (e.g., AES) use lookup tables to obscure key information, increasing difficulty for those with privileged access to a system performing the AES algorithm to obtain such key information. The implementation encodes round key information into a first plurality of tables (T1), which when used for lookup operations also complete SubBytes operations, and output state in an encoded format. A Shiftrows operation is performed arithmetically on the state output from the T1 table lookups. A second plurality of tables (T2) are used to perform a polynomial multiplication portion of MixColumns to state from Shiftrows, and an XOR portion of MixColumns is performed arithmetically on the columns outputted from using the T2 tables. Encoding from the T1 tables is made to match a decoding built into the T2 tables. Subsets of the T1 tables use the same T2 tables, reducing a memory footprint for the T2 tables. Multiple AES keys can be embedded in different sets of T1 tables that encode for the same set of T2 tables.
    • 用于实现块密码算法(例如,AES)的系统和方法使用查找表来遮蔽密钥信息,增加对执行AES算法的系统具有特权访问权限的那些人获得这种密钥信息的难度。 该实施方式将循环密钥信息编码到第一多个表(T1)中,当用于查找操作时也完成子字节操作,并且以编码格式输出状态。 从T1表查找的状态输出上进行Shiftrows操作。 第二多个表(T2)用于执行MixColumns的多项式乘法部分从Shiftrows状态,并且MixColumns的XOR部分在使用T2表输出的列上进行算术运算。 使T1表格的编码与T2表中内置的解码相匹配。 T1表的子集使用相同的T2表,减少了T2表的内存占用。 可以将多个AES密钥嵌入到为同一组T2表编码的不同的T1表中。
    • 126. 发明申请
    • SYSTEM AND METHOD FOR AUTHENTICATION USING A SHARED TABLE AND SORTING EXPONENTIATION
    • 使用共享表和分配引用进行认证的系统和方法
    • US20120079589A1
    • 2012-03-29
    • US13244068
    • 2011-09-23
    • Pierre BetouinMathieu CietAugustin J. Farrugia
    • Pierre BetouinMathieu CietAugustin J. Farrugia
    • G06F21/00
    • G06F21/31
    • Disclosed herein are systems, computer-implemented methods, and computer-readable media for authentication using a shared table. The method receives an authentication challenge from a first entity including an accumulator with an initial value, lists of elements in a shared table, and a list of sorting algorithms, each sorting algorithm is associated with one of the lists of elements and modified to include embedded instructions operating on the accumulator. The method then generates a temporary table for each list of elements in the shared table by copying elements from the shared table as indicated in each respective list of elements, each temporary table being associated with one sorting algorithm in the list of sorting algorithms. The method sorts each generated temporary table with the associated sorting algorithm, thereby updating the accumulator with the embedded instructions. Finally, the method transmits the updated accumulator to the first entity for verification.
    • 本文公开了系统,计算机实现的方法和用于使用共享表进行认证的计算机可读介质。 该方法从包括具有初始值的累加器,共享表中的元素列表和排序算法列表的第一实体接收认证挑战,每个排序算法与元素列表中的一个相关联并被修改为包括嵌入 在累加器上操作的指令。 然后,该方法通过从每个相应的元素列表中指示的从共享表中复制元素来生成共享表中的每个元素列表的临时表,每个临时表与排序算法列表中的一个排序算法相关联。 该方法使用相关联的排序算法对每个生成的临时表进行排序,从而用嵌入式指令更新累加器。 最后,该方法将更新的累加器发送到第一实体进行验证。
    • 130. 发明申请
    • SYSTEM AND METHOD FOR MODULUS OBFUSCATION
    • 用于模块化的系统和方法
    • US20110320806A1
    • 2011-12-29
    • US13222245
    • 2011-08-31
    • Mathieu CietAugustin J. FarrugiaNicholas T. Sullivan
    • Mathieu CietAugustin J. FarrugiaNicholas T. Sullivan
    • H04L9/00
    • H04L9/00H04L2209/16
    • Disclosed herein are methods for obfuscating data via a modulus operation. A client device receives input data, stores an operation value, performs a modulus obfuscation on the operation value, performs a modulus operation on the operation value and the input data, performs a modulus transformation on the operation value and the input data to obtain client output data, and checks if the client output data matches corresponding server output data. A corresponding server device receives input data, performs a modulus transformation on the input data to obtain a result, performs a plain operation on the result and an operation value to obtain server output data, and checks if the server output data matches corresponding client output data from the client device. The client and/or server can optionally authenticate the client input data and the server input data if the server output data matches the client output data.
    • 这里公开的是通过模数运算来模糊数据的方法。 客户机接收输入数据,存储操作值,对运算值进行模糊混淆,对运算值和输入数据进行模运算,对运算值和输入数据进行模变换,得到客户输出 数据,并检查客户端输出数据是否匹配相应的服务器输出数据。 相应的服务器设备接收输入数据,对输入数据进行模数变换以获得结果,对结果执行简单操作,并获取操作值以获取服务器输出数据,并检查服务器输出数据是否与相应的客户端输出数据相匹配 从客户端设备。 如果服务器输出数据与客户端输出数据匹配,则客户端和/或服务器可以可选地认证客户端输入数据和服务器输入数据。