会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Transformations for software obfuscation and individualization
    • 软件混淆和个性化的转换
    • US08176473B2
    • 2012-05-08
    • US11748191
    • 2007-05-14
    • Matthias JacobMariusz H. Jakubowski
    • Matthias JacobMariusz H. Jakubowski
    • G06F9/44G06F11/30G06F11/00
    • G06F21/14
    • Methods and systems for software obfuscation are disclosed. In one exemplary embodiment, the obfuscation includes integrating the checker code with product code to form integrated code. The product code includes a first portion that provides desired functionalities to a software product, while the checker code includes a second portion that protects the product code from unlicensed use. A generated pseudorandom value is used to select one or more instruction sequences of the integrated code. Following the selection, the instruction sequences may be replaced with equivalent instruction sequences to form a new integrated code. Alternatively, the original integrated code is transformed into new integrated code when the selected instruction sequences are optimized. Additionally, the new integrated code may be compared to the original integrated code by generating output states from each integrated code. The new integrated code is functionally equivalent to the original integrated code if the respective output states match.
    • 公开了用于软件混淆的方法和系统。 在一个示例性实施例中,混淆包括将检验码与产品代码集成以形成集成代码。 产品代码包括向软件产品提供期望的功能的第一部分,而检查代码包括保护产品代码免受非许可使用的第二部分。 生成的伪随机值用于选择集成代码的一个或多个指令序列。 在选择之后,指令序列可以被替换为等效的指令序列以形成新的集成代码。 或者,当所选择的指令序列被优化时,原始集成代码被转换成新的集成代码。 此外,可以通过从每个集成代码生成输出状态来将新的集成代码与原始集成代码进行比较。 如果相应的输出状态匹配,新的集成代码在功能上等同于原始集成代码。
    • 6. 发明申请
    • User Authentication Via Biometric Hashing
    • 用户认证通过生物特征哈希
    • US20080209227A1
    • 2008-08-28
    • US11680433
    • 2007-02-28
    • Ramarathnam VenkatesanMariusz H. Jakubowski
    • Ramarathnam VenkatesanMariusz H. Jakubowski
    • H04L9/00
    • H04L9/3231H04L9/3236H04L2209/80
    • Techniques for authenticating biometric parameters via biometric hashing are described. In one implementation, a biometric parameter of a user (e.g., fingerprint image, blood-vessel pattern, retina scan, etc.) is captured. One or more biometric hashes are produced from the biometric parameter. To generate hashes that appear random, pseudorandom metrics are applied over the biometric parameter. The hashes are stored in association with user information that can be employed to authenticate the user. Subsequently, during authentication, a new biometric parameter is captured and hashes are computed from the parameter. The new biometric hashes are then compared with the predetermined stored hashes. If any of the new hashes are found to be identical, or sufficiently similar, to one or more of the predetermined biometric hashes, the biometric parameter is deemed valid and the user is authenticated.
    • 描述了通过生物测定散列认证生物特征参数的技术。 在一个实现中,捕获用户的生物特征参数(例如,指纹图像,血管图案,视网膜扫描等)。 从生物特征参数产生一个或多个生物特征散列。 为了产生出现随机的散列,伪随机度量被应用于生物特征参数。 与可用于认证用户的用户信息相关联地存储散列。 随后,在认证期间,捕获新的生物特征参数,并根据参数计算哈希值。 然后将新的生物识别散列与预定的存储的哈希进行比较。 如果任何新的散列被发现与一个或多个预定的生物统计学哈希相同或足够相似,则生物特征参数被认为是有效的并且用户被认证。
    • 8. 发明授权
    • BORE-resistant digital goods configuration and distribution methods and arrangements
    • 耐磨数字商品的配置和分销方式和安排
    • US07249105B1
    • 2007-07-24
    • US09525206
    • 2000-03-14
    • Marcus PeinadoMariusz H. JakubowskiRamarathnam Venkatesan
    • Marcus PeinadoMariusz H. JakubowskiRamarathnam Venkatesan
    • G06F99/00H04F1/00
    • G06F21/10G06F2221/0784
    • Break-Once, Run-everywhere (BORE) resistant software configurations and digital goods and content distribution methods and arrangements are provided for use in computer systems and networks. An initial digital good is selectively divided into at least two portions. The first portion is provided to a destination computer, for example, via a CD ROM, floppy disk, or pre-loaded on a hard disk drive. The second portion is operatively modified within a source computer based on unique data associated with the destination computer. The modified second portion is then provided to the destination computer, for example, over a network, along with a key that can be used to operatively modify the first portion to be compatible with the modified second portion. The destination computer then modifies the first portion accordingly, and combines the modified first portion with the modified second portion to produce a modified digital good that is operatively different in configuration, but substantially functionally equivalent to the initial digital good. During subsequent initialization or operation, the modified digital good verifies that the destination computer is properly associated with the key and/or the unique data previously associated with the destination computer.
    • 一次性,无处不在(BORE)运行的软件配置和数字商品和内容分发方法和安排被提供用于计算机系统和网络。 初始数字商品被选择性地分成至少两部分。 第一部分例如经由CD ROM,软盘或预先加载到硬盘驱动器上而被提供给目标计算机。 基于与目的地计算机相关联的唯一数据,在源计算机内可操作地修改第二部分。 修改的第二部分然后例如通过网络提供给目的地计算机,以及可以用于可操作地修改第一部分以与修改的第二部分兼容的密钥。 目的地计算机然后相应地修改第一部分,并且将修改的第一部分与修改的第二部分组合以产生在配置上可操作地不同但在功能上等同于初始数字商品的修改的数字商品。 在随后的初始化或操作期间,修改的数字商品验证目的地计算机是否正确地与密钥和/或先前与目的地计算机相关联的唯一数据相关联。
    • 10. 发明授权
    • Audio watermarking with dual watermarks
    • 具有双重水印的音频水印
    • US07206649B2
    • 2007-04-17
    • US10970499
    • 2004-10-21
    • Darko KirovskiHenrique MalvarMariusz H. Jakubowski
    • Darko KirovskiHenrique MalvarMariusz H. Jakubowski
    • G06F17/00H04K1/00H04L9/32H04N7/16
    • G10L19/018
    • A watermark encoding system encodes an audio signal with both a strong and a weak watermark. The strong watermark identifies the content producer and is designed to survive all typical kinds of processing and malicious attacks. The weak watermark identifies the content as an original and is designed to be significantly removed as a result of most normal signal processing (other than A/D and D/A). The watermark encoding system has a converter to convert an audio signal into frequency and phase components and a mask processor to determine a hearing threshold for corresponding frequency components. The watermark encoding system also has a pattern generator to generate both the strong and weak watermarks and a watermark insertion unit to selectively insert either the strong or weak watermark into the audio signal. The watermark insertion unit adds the strong watermark to the audio signal when the signal exceeds the hearing threshold by a buffer value (e.g., 1–8 dB) and adds the weak watermark insertion unit when the signal falls below the hearing threshold by the buffer value. When the signal falls within the buffer area about the hearing threshold, the insertion unit takes no action. A watermark detecting system is equipped with a watermark detector that determines which block interval of the watermarked audio signal contains a watermark pattern and if the strong or weak watermark is present in that block interval of the signal.
    • 水印编码系统对具有强和弱水印的音频信号进行编码。 强大的水印识别内容制作者,并设计为能够经受所有典型的处理和恶意攻击。 弱水印将内容识别为原件,并且被设计为由于大多数正常信号处理(A / D和D / A除外)而被显着地去除。 水印编码系统具有将音频信号转换为频率和相位分量的转换器,以及掩模处理器,以确定相应频率分量的听力阈值。 水印编码系统还具有生成强弱水印的图案生成器和水印插入单元,以选择性地将强或弱水印插入到音频信号中。 当信号超过听觉阈值的缓冲器值(例如,1-8dB)时,水印插入单元将音频信号强加,并且当信号低于听力阈值时缓冲值加上弱水印插入单元 。 当信号落在关于听力阈值的缓冲区域内时,插入单元不采取任何动作。 水印检测系统配备有水印检测器,其确定水印音频信号的哪个块间隔包含水印图案,以及在该信号的块间隔中是否存在强或弱水印。