会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 51. 发明申请
    • Securing A Computing Environment Against Malicious Entities
    • 确保恶意实体的计算环境
    • US20130254829A1
    • 2013-09-26
    • US13427342
    • 2012-03-22
    • Mariusz H. JakubowskiMarcus Peinado
    • Mariusz H. JakubowskiMarcus Peinado
    • G06F21/00
    • G06F21/53
    • The subject disclosure is directed towards securing network data traffic through a trusted partition of the computing environment. A proxy service may communicate transaction data from a client to security-critical code within the trusted partition, which compares the transaction data to a security policy from a commercial electronic entity. If the transaction data includes malicious content, a security component framework of the trusted partition may reject the transaction data and terminate communications with the client. If the transaction data does not include malicious content, the security component framework may communicate a secured version of the transaction data and retrieve response data from the commercial electronic entity, which may be further communicated back to the client.
    • 本发明涉及通过计算环境的可信分区来保护网络数据流量。 代理服务可以将来自客户端的交易数据传递到受信分区内的安全关键代码,其将交易数据与商业电子实体的安全策略进行比较。 如果事务数据包括恶意内容,则可信分区的安全组件框架可以拒绝交易数据并终止与客户端的通信。 如果交易数据不包括恶意内容,则安全组件框架可以传达交易数据的安全版本,并从商业电子实体检索响应数据,这可以进一步传回给客户端。
    • 54. 发明申请
    • Secure Repository With Layers Of Tamper Resistance And System And Method For Providing Same
    • 安全存储库与防篡改层和系统和方法提供相同
    • US20110239005A1
    • 2011-09-29
    • US13153782
    • 2011-06-06
    • John L. ManferdelliMichael David MarrVinay KrishnaswamyMariusz H. Jakubowski
    • John L. ManferdelliMichael David MarrVinay KrishnaswamyMariusz H. Jakubowski
    • G06F12/14
    • G06F21/10G06F21/14G06F2211/007G06F2221/0748G06F2221/2107
    • A secure repository individualized for a hardware environment and a method and system for providing the same. The secure repository includes a hidden cryptographic key and code that applies the key without requiring access to a copy of the key. The code that implements the secure repository is generated in a manner that is at least partly based on a hardware ID associated with the hardware environment in which the secure repository is to be installed, and may also be based on a random number. Cryptographic functions implemented by the secure repository include decryption of encrypted information and validation of cryptographically signed information. The secure repository may be coupled to an application program, which uses cryptographic services provided by the secure repository, by way of a decoupling interface that provides a common communication and authentication interface for diverse types of secure repositories. The decoupling interface may take the form of a single application programmer interface (API) usable with multiple dynamically linkable libraries.
    • 用于硬件环境的安全存储库以及用于提供硬件环境的方法和系统。 安全存储库包括隐藏的加密密钥和应用密钥而不需要访问密钥副本的代码。 实现安全存储库的代码以至少部分地基于与要安装安全存储库的硬件环境相关联的硬件ID的方式生成,并且还可以基于随机数。 由安全存储库实现的加密功能包括加密信息的解密和加密签名信息的验证。 安全存储库可以耦合到使用由安全存储库提供的加密服务的应用程序,该应用程序通过解耦接口来提供用于不同类型的安全存储库的公共通信和认证接口。 解耦接口可以采用可与多个动态可链接库一起使用的单个应用程序接口(API)的形式。
    • 55. 发明授权
    • System and method of iterative code obfuscation
    • 迭代代码混淆的系统和方法
    • US07587616B2
    • 2009-09-08
    • US11067384
    • 2005-02-25
    • Mariusz H. Jakubowski
    • Mariusz H. Jakubowski
    • G06F5/00
    • G06F21/14G06F8/51
    • A method of code obfuscation includes receiving a block of code. One or more obfuscation algorithms are then iteratively applied to the received code. The obfuscation algorithms are repeatedly applied, such that the output of the previous obfuscation algorithm provides the input to the next obfuscation algorithm. Each obfuscation algorithm may be a relatively simple code transform technique. The same obfuscation algorithm may be applied repeatedly or any combination of a plurality of obfuscation algorithms may be applied in any sequence. The cascading effects of applying rounds of obfuscation algorithms achieve obfuscated code exhibiting a significantly increased level of security that cannot be normally derived from the security of each individual algorithm.
    • 代码混淆的方法包括接收代码块。 然后将一个或多个混淆算法迭代地应用于接收到的代码。 混淆算法被重复应用,使得先前的模糊算法的输出向下一个混淆算法提供输入。 每个混淆算法可以是相对简单的代码变换技术。 可以重复应用相同的混淆算法,或者可以以任何顺序应用多个混淆算法的任何组合。 应用轮次混淆算法的级联效应实现了模糊化代码,其表现出显着增加的安全性水平,其不能正常地从每个单独算法的安全性导出。
    • 57. 发明授权
    • Secure repository with layers of tamper resistance and system and method for providing same
    • 具有防篡改层的安全仓库,并提供相同的系统和方法
    • US07539875B1
    • 2009-05-26
    • US09604174
    • 2000-06-27
    • John L. ManferdelliMichael David MarrVinay KrishnaswamyMariusz H. Jakubowski
    • John L. ManferdelliMichael David MarrVinay KrishnaswamyMariusz H. Jakubowski
    • H04K1/00G06F11/30H04L9/00
    • G06F21/10G06F21/14G06F2211/007G06F2221/0748G06F2221/2107
    • A secure repository individualized for a hardware environment and a method and system for providing the same. The secure repository includes a hidden cryptographic key and code that applies the key without requiring access to a copy of the key. The code that implements the secure repository is generated in a manner that is at least partly based on a hardware ID associated with the hardware environment in which the secure repository is to be installed, and may also be based on a random number. Cryptographic functions implemented by the secure repository include decryption of encrypted information and validation of cryptographically signed information. The secure repository may be coupled to an application program, which uses cryptographic services provided by the secure repository, by way of a decoupling interface that provides a common communication and authentication interface for diverse types of secure repositories. The decoupling interface may take the form of a single application programmer interface (API) usable with multiple dynamically linkable libraries.
    • 用于硬件环境的安全存储库以及用于提供硬件环境的方法和系统。 安全存储库包括隐藏的加密密钥和应用密钥而不需要访问密钥副本的代码。 实现安全存储库的代码以至少部分地基于与要安装安全存储库的硬件环境相关联的硬件ID的方式生成,并且还可以基于随机数。 由安全存储库实现的加密功能包括加密信息的解密和加密签名信息的验证。 安全存储库可以耦合到使用由安全存储库提供的加密服务的应用程序,该应用程序通过解耦接口来提供用于不同类型的安全存储库的公共通信和认证接口。 解耦接口可以采用可与多个动态可链接库一起使用的单个应用程序接口(API)的形式。
    • 59. 发明授权
    • Secure repository with layers of tamper resistance and system and method for providing same
    • 具有防篡改层的安全仓库,并提供相同的系统和方法
    • US07958373B2
    • 2011-06-07
    • US12466295
    • 2009-05-14
    • John L. ManferdelliMichael David MarrVinay KrishnaswamyMariusz H. Jakubowski
    • John L. ManferdelliMichael David MarrVinay KrishnaswamyMariusz H. Jakubowski
    • G06F21/00G06F11/30
    • G06F21/10G06F21/14G06F2211/007G06F2221/0748G06F2221/2107
    • A secure repository individualized for a hardware environment and a method and system for providing the same. The secure repository includes a hidden cryptographic key and code that applies the key without requiring access to a copy of the key. The code that implements the secure repository is generated in a manner that is at least partly based on a hardware ID associated with the hardware environment in which the secure repository is to be installed, and may also be based on a random number. Cryptographic functions implemented by the secure repository include decryption of encrypted information and validation of cryptographically signed information. The secure repository may be coupled to an application program, which uses cryptographic services provided by the secure repository, by way of a decoupling interface that provides a common communication and authentication interface for diverse types of secure repositories. The decoupling interface may take the form of a single application programmer interface (API) usable with multiple dynamically linkable libraries.
    • 用于硬件环境的安全存储库以及用于提供硬件环境的方法和系统。 安全存储库包括隐藏的加密密钥和应用密钥而不需要访问密钥副本的代码。 实现安全存储库的代码以至少部分地基于与要安装安全存储库的硬件环境相关联的硬件ID的方式生成,并且还可以基于随机数。 由安全存储库实现的加密功能包括加密信息的解密和加密签名信息的验证。 安全存储库可以耦合到使用由安全存储库提供的加密服务的应用程序,该应用程序通过解耦接口来提供用于不同类型的安全存储库的公共通信和认证接口。 解耦接口可以采用可与多个动态可链接库一起使用的单个应用程序接口(API)的形式。