会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Dynamic linking library (DLL) replacement in an embedded operating system environment
    • 在嵌入式操作系统环境中动态链接库(DLL)替换
    • US08997074B1
    • 2015-03-31
    • US11537551
    • 2006-09-29
    • Gen ChenZhentao Huang
    • Gen ChenZhentao Huang
    • G06F9/44G06F21/56
    • G06F21/568G06F21/54
    • Techniques for replacing ROM-based (Read-Only Memory) DLLs (Dynamic Link Libraries) in a Windows CE type embedded operating system such that the target DLL is replaceable by the hook DLL, and the target DLL is callable by the hook DLL but not callable directly by any other applications after loading of the hook DLL. The techniques enable replacement irrespective whether the hook DLL and the target DLL have the same name and irrespective of which DLL is loaded first. The techniques change the file name of the target DLL in a list of loaded DLL modules by a trusted program that executes in the full kernel mode.
    • 在Windows CE类型嵌入式操作系统中替换基于ROM(只读存储器)DLL(动态链接库)的技术,使得目标DLL可由钩子DLL替换,并且目标DLL可由钩子DLL调用,但不是 在挂载DLL后,可以直接由任何其他应用程序调用。 无论钩DLL和目标DLL是否具有相同的名称,并且无论首先加载哪个DLL,这些技术都能够进行替换。 该技术通过在完整内核模式下执行的可信程序来更改加载的DLL模块列表中目标DLL的文件名。
    • 2. 发明授权
    • Dynamic encryption arrangement with a wireless device and methods therefor
    • 使用无线设备进行动态加密安排及其方法
    • US09025770B1
    • 2015-05-05
    • US11770623
    • 2007-06-28
    • WeiChao DaiChao FangZhentao Huang
    • WeiChao DaiChao FangZhentao Huang
    • H04K1/00H04L9/06
    • H04L9/065H04L9/0863H04L9/0877H04L2209/80
    • A method for encrypting a file using a combination of an electronic device and a protection communication-enabled (PCE) wireless device is provided. The method includes using an encryption/decryption engine executing on the electronic device to encrypt a first flag string, which is a binary string stored in a header of the file, with a digest value to create an encrypted flag string. The digest value is associated with the PCE wireless device, which is a device having a transmission application program installed thereon for enabling interaction between the PCE wireless device and the encryption/decryption engine. The method also includes encrypting at least a portion of the file using the digest value and a first password provided by a user, thereby generating an encrypted file that includes an encrypted version of at least a portion of the file, the encrypted flag string, and the first flag string.
    • 提供了一种使用电子设备和保护通信使能(PCE)无线设备的组合来加密文件的方法。 该方法包括使用在电子设备上执行的加密/解密引擎来加密作为文件头部存储的二进制字符串的第一标志字符串,并具有摘要值以创建加密的标志字符串。 摘要值与PCE无线设备相关联,PCE无线设备是其上安装有传输应用程序的设备,用于实现PCE无线设备与加密/解密引擎之间的交互。 该方法还包括使用摘要值和由用户提供的第一密码对文件的至少一部分进行加密,从而生成加密文件,该加密文件包括文件的至少一部分的加密版本,加密的标记串和 第一个标志字符串。
    • 3. 发明授权
    • Community based restore of computer files
    • 基于社区的计算机文件恢复
    • US08825606B1
    • 2014-09-02
    • US13348901
    • 2012-01-12
    • Zhengbao ZhangZhentao HuangZhihe ZhangQiang Zhuo
    • Zhengbao ZhangZhentao HuangZhihe ZhangQiang Zhuo
    • G06F7/00G06F17/00
    • G06F21/568G06F11/1435G06F11/1451G06F11/1461G06F11/2094G06F21/552
    • A computer network includes endpoint computers and a file history server with a file history database. An endpoint agent in an endpoint computer detects file access events in the endpoint computer and generates file activity data for storage in the file history database. The file activity data may include file access event information of file access events and file information of files involved in the file access events. The endpoint agent may consult the file history database to locate a duplicate of a damaged file in another endpoint computer, and restore the damaged file using the duplicate. A backup and restore program may also consult the file history database to determine whether or not to make a backup copy of a file involved in a file access event.
    • 计算机网络包括端点计算机和具有文件历史数据库的文件历史服务器。 端点计算机中的端点代理检测端点计算机中的文件访问事件,并生成用于存储在文件历史数据库中的文件活动数据。 文件活动数据可以包括文件访问事件的文件访问事件信息和文件访问事件中涉及的文件的文件信息。 端点代理可以查询文件历史数据库,以在另一个端点计算机中找到损坏的文件的副本,并使用该副本还原损坏的文件。 备份和恢复程序还可以查阅文件历史数据库,以确定是否对文件访问事件涉及的文件进行备份。
    • 4. 发明授权
    • Backup and restore of user data for mobile telephone
    • 备份和恢复手机用户数据
    • US07729690B1
    • 2010-06-01
    • US11355846
    • 2006-02-15
    • Zhentao HuangJun Lu
    • Zhentao HuangJun Lu
    • H04M1/725H04M3/00H04B1/38
    • H04M1/72522G06F11/1451G06F11/1466H04M1/274516H04M2250/14
    • A mobile telephone includes an application processor, internal memory, an external memory card, a backup software module and a restore software module. User data is stored in the internal memory. The backup software module detects changes in the user data, resulting in modified user data. The modified user data is stored onto the external memory card. When the user data is erased from the internal drive or the wireless device needs to be reset the restore software module reads the modified user data from the external memory card and writes the modified user data back onto the internal memory. In this fashion, any modified user data is not lost when the wireless device is reset.
    • 移动电话包括应用处理器,内部存储器,外部存储卡,备份软件模块和恢复软件模块。 用户数据存储在内部存储器中。 备份软件模块检测用户数据的更改,导致修改的用户数据。 经修改的用户数据存储在外部存储卡上。 当用户数据从内部驱动器擦除或无线设备需要复位时,恢复软件模块从外部存储卡读取修改后的用户数据,并将修改后的用户数据写回内部存储器。 以这种方式,当无线设备被复位时,任何修改的用户数据都不会丢失。
    • 5. 发明授权
    • Android application classification using common functions
    • Android应用程序分类使用常用功能
    • US09349002B1
    • 2016-05-24
    • US13904291
    • 2013-05-29
    • Lei ZhangZhentao HuangFranson Fang
    • Lei ZhangZhentao HuangFranson Fang
    • G06F21/56
    • G06F21/56G06F21/563G06F21/564
    • Known malicious Android applications are collected and their functions are extracted. Similarity values are calculated between pairs of functions and those functions with a low similarity value are grouped together and assigned a unique similarity identifier. A common set of functions or common set of similarity identifiers are identified within the applications. If at least one function in the common set is determined to be malicious then the common set is added to a blacklist database either by adding functions or by adding similarity identifiers. To classify an unknown Android application, first the functions in the application are extracted. These functions are then compared to the set of functions identified in the blacklist database. If each function in the set of functions is present (either by matching or by similarity) in the group of extracted functions from the unknown application then the unknown application is classified as malicious.
    • 收集已知的恶意Android应用程序,并提取其功能。 在函数对之间计算相似度值,并且将具有低相似性值的那些函数分组在一起并且分配唯一的相似性标识符。 在应用程序中识别一组常用的相似性标识符集。 如果公共集中的至少一个功能被确定为恶意的,则通过添加功能或添加相似性标识符将公用集添加到黑名单数据库。 要分类一个未知的Android应用程序,首先提取应用程序中的功能。 然后将这些功能与黑名单数据库中标识的功能集进行比较。 如果该组函数中的每个函数在来自未知应用程序的提取函数组中存在(通过匹配或相似性),则未知应用程序被分类为恶意的。
    • 6. 发明授权
    • Secured application package files for mobile computing devices
    • 用于移动计算设备的安全应用程序包文件
    • US08892876B1
    • 2014-11-18
    • US13451807
    • 2012-04-20
    • Zhentao HuangShuhua ChenYinfeng Qiu
    • Zhentao HuangShuhua ChenYinfeng Qiu
    • G06F21/00G06F21/62
    • G06F21/6218G06F21/6209
    • An ANDROID application package (APK) file for an application is repackaged into a secured APK file to protect a Dalvik executable (DEX) file of the application. The DEX file is encrypted to generate an encrypted DEX file that is included in the secured APK file along with a stub DEX file. The secured APK file is received in a mobile computing device where the stub DEX file is started to start a wrapper Activity. The wrapper Activity replaces an APK class loader of a mobile operating system of the mobile computing device with a decryptor class loader. The decryptor class loader decrypts the encrypted DEX file to recover the DEX file, and loads classes of the DEX file into a Dalvik virtual machine. The original Activity of the application is then started to provide the functionality of the application in the mobile computing device.
    • 应用程序的ANDROID应用程序包(APK)文件被重新打包到安全的APK文件中,以保护应用程序的Dalvik可执行文件(DEX)文件。 DEX文件被加密以生成加密的DEX文件,其中包含在安全的APK文件中以及存根DEX文件。 安全的APK文件被接收在移动计算设备中,其中启动存根DEX文件以启动包装器活动。 包装器活动用解密器类加载器替换移动计算设备的移动操作系统的APK类加载器。 解密器类加载器解密加密的DEX文件以恢复DEX文件,并将DEX文件的类加载到Dalvik虚拟机中。 然后开始应用程序的原始活动以在移动计算设备中提供应用的功能。