会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Methods and devices for instruction level software encryption
    • 用于指令级软件加密的方法和设备
    • US08341426B2
    • 2012-12-25
    • US12653224
    • 2009-12-10
    • Stéphane OnnoMohamed KarroumiAntoine Monsifrot
    • Stéphane OnnoMohamed KarroumiAntoine Monsifrot
    • G06F12/14
    • G06F21/14G06F21/125G06F2221/2107H01L2924/30107H04L9/0637H04L9/0656H01L2924/00
    • A method of encrypting compiled computer code instructions to be decrypted instruction by instruction during execution. The computer code instructions are encrypted using a chaining mode so that an encrypted instruction depends on the values of the instruction, the value of the preceding instruction and a pseudo-random number. As it may happen that the instruction can be arrived at from more than one preceding instruction, at least one of the preceding instructions is associated with a random number compensator for use during decryption of the encrypted instruction, so that the decryption of the encrypted instruction yields the same result regardless of which the preceding instruction was. Also provided are an encryption device, a decryption device and method, and a digital support medium storing encrypted compiled computer code instructions.
    • 在执行期间通过指令加密编译的计算机代码指令以进行解密指令的方法。 使用链接模式来加密计算机代码指令,使得加密指令取决于指令的值,前一条指令的值和伪随机数。 可能发生的是,可以从多于一个的先前指令得到指令,所述前述指令中的至少一个与加密指令的解密期间使用的随机数补偿器相关联,从而加密指令的解密产生 相同的结果,不管前面的说明是什么。 还提供了加密装置,解密装置和方法以及存储加密编译的计算机代码指令的数字支持介质。
    • 3. 发明授权
    • Methods and devices for a chained encryption mode
    • 用于链接加密模式的方法和设备
    • US08259934B2
    • 2012-09-04
    • US12592696
    • 2009-12-01
    • Mohamed KarroumiStéphane OnnoAntoine Monsifrot
    • Mohamed KarroumiStéphane OnnoAntoine Monsifrot
    • H04K1/00
    • H04L9/0637H04L2209/24
    • An encryption chaining mode takes plaintext block N, generates encryption key N by combining, preferably by XOR, encryption key N-1 and plaintext block N-1 and encrypts plaintext block N using an encryption algorithm with encryption key N to output ciphertext block N. Encryption key for the first plaitnext block is generated by XOR-ing a random Initialization vector and a random intialization key K. In a preferred embodiment, initialization key K is subkeys resulting form a key schedule algorithm and encryption key N-1 is only one of the subkeys. Encryption key for the first plaintext block is generated by XOR-ing a random Initialization vector and one subkey resulting form a key schedule algorithm. Also provided is a corresponding decryption method, an encryption device, a decryption device.
    • 加密链接模式采用明文块N,优选地通过XOR,加密密钥N-1和明文块N-1组合来生成加密密钥N,并且使用具有加密密钥N的加密算法加密明文块N.以输出密文块N. 通过对随机初始化向量和随机初始化密钥K进行XOR生成,生成第一第一嵌段的加密密钥。在优选实施例中,初始化密钥K是由密钥调度算法产生的子密钥,加密密钥N-1仅为 子项。 第一个明文块的加密密钥是由一个随机的初始化向量和一个子密钥进行XOR生成的,形成密钥调度算法。 还提供了相应的解密方法,加密装置,解密装置。
    • 5. 发明申请
    • Methods and devices for a chained encryption mode
    • 用于链接加密模式的方法和设备
    • US20100150344A1
    • 2010-06-17
    • US12592696
    • 2009-12-01
    • Mohamed KarroumiStéphane OnnoAntoine Monsifrot
    • Mohamed KarroumiStéphane OnnoAntoine Monsifrot
    • H04L9/14
    • H04L9/0637H04L2209/24
    • An encryption chaining mode takes plaintext block N, generates encryption key N by combining, preferably by XOR, encryption key N−1 and plaintext block N−1 and encrypts plaintext block N using an encryption algorithm with encryption key N to output ciphertext block N. Encryption key for the first plaintext block is generated by XOR-ing a random Initialization vector and a random initialization key K. In a preferred embodiment, initialization key K is subkeys resulting from a key schedule algorithm and encryption key N−1 is only one of the subkeys. Encryption key for the first plaintext block is generated by XOR-ing a random Initialization vector and one subkey resulting from a key schedule algorithm. Also provided is a corresponding decryption method, an encryption device, a decryption device.
    • 加密链接模式采用明文块N,优选地通过XOR,加密密钥N-1和明文块N-1组合来生成加密密钥N,并且使用具有加密密钥N的加密算法对明文块N进行加密,以输出密文块N. 通过对随机初始化向量和随机初始化密钥K进行XOR生成第一明文块的加密密钥。在优选实施例中,初始化密钥K是由密钥调度算法产生的子密钥,加密密钥N-1只是 子项。 通过对由密钥调度算法产生的随机初始化向量和一个子密钥进行XOR生成第一明文块的加密密钥。 还提供了相应的解密方法,加密装置,解密装置。
    • 6. 发明授权
    • Presence-based access control
    • 基于存在的访问控制
    • US07861294B2
    • 2010-12-28
    • US11337767
    • 2006-01-23
    • Stéphane OnnoAlain DurandEric Diehl
    • Stéphane OnnoAlain DurandEric Diehl
    • G06F21/20
    • G06F21/35
    • To access services on a device, such as a computer, a user has a portable device in two parts: a plug adapted to be inserted in a USB port and a transponder that remains about his person. In a preferred embodiment, an access manager verifies that first the plug and then the transponder are identified. If so, the access manager verifies if plug and transponder have to be paired and if they have the proper access rights for the desired service. Only then is access given. In a further embodiment, more than one transponder is needed to access a certain service. It can thus be appreciated that the invention provides a flexible and secure way to secure access to services.
    • 为了访问诸如计算机的设备上的服务,用户具有两部分的便携式设备:适于插入USB端口的插头和保持在他的人身上的应答器。 在优选实施例中,访问管理器首先验证插头然后识别应答器。 如果是这样,访问管理器验证插头和转发器是否必须配对,并且是否具有所需服务的正确访问权限。 只有这样才能获得访问权限。 在另一实施例中,需要多于一个应答器来访问特定服务。 因此可以理解,本发明提供了一种灵活和安全的方式来确保对服务的访问。