会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明申请
    • System and method of interlocking to protect software - mediated program and device behaviors
    • 联锁的系统和方法,以保护软件介导的程序和设备行为
    • US20080208560A1
    • 2008-08-28
    • US11980392
    • 2007-10-31
    • Harold Joseph JohnsonYuan Xiang GuYongxin Zhou
    • Harold Joseph JohnsonYuan Xiang GuYongxin Zhou
    • G06F9/45
    • G06F21/14G06F21/10G06F21/12G06F21/55G06F2221/0748H04L9/002H04L2209/04H04L2209/046H04L2209/16H04L2209/20
    • A method for rendering software resistant to reverse engineering. Replace at least one first constant (mathematical expression, etc.) in a computational expression with a second mixed mathematical and bitwise-Boolean expression, the first constant being simpler than the second expression and the second expression being based on the value or the variables found in the first constant (or expression). Evaluation of the second mixed mathematical and bitwise-Boolean expression produces a value preserving the value of the first constant, either: with the original value of the first constant or the original value of the result of the first expression, in which case the second mixed mathematical and bitwise-Boolean expression is obtained from the first constant by converting the first constant by mathematical identities; or, in an encoded form, as a new value, which can be converted back to the original value of the first constant by applying an information-preserving decoding function, in which case the second mixed mathematical and bitwise-Boolean expression is obtained from the first constant by modifying the first constant by a combination of conversion according to mathematical identities and transformation according to an information preserving encoding function.
    • 一种用于渲染反向工程的软件的方法。 用计算表达式中的至少一个第一个常数(数学表达式等)替换为第二个混合的数学和位元布尔表达式,第一个常数比第二个表达式简单,而第二个表达式基于值或发现的变量 在第一个常数(或表达式)中。 评估第二个混合数学和比特布尔表达式产生一个保留第一个常数的值的值,或者是:第一个常数的原始值或第一个表达式的结果的原始值,在这种情况下,第二个混合 数学和按位 - 通过用数学标识转换第一个常数从第一个常数获得布尔表达式; 或者以编码形式作为新值,其可以通过应用信息保存解码功能而被转换回到第一常数的原始值,在这种情况下,从第二混合数学和按位布尔表达式 通过根据数学标识的转换和根据信息保存编码功能的变换的组合来修改第一常数的第一常数。
    • 5. 发明授权
    • System and method of interlocking to protect software—mediated program and device behaviors
    • 联锁系统和方法,以保护软件介导的程序和设备行为
    • US08161463B2
    • 2012-04-17
    • US11980392
    • 2007-10-31
    • Harold Joseph JohnsonYuan Xiang GuYongxin Zhou
    • Harold Joseph JohnsonYuan Xiang GuYongxin Zhou
    • G06F9/45G06F12/14
    • G06F21/14G06F21/10G06F21/12G06F21/55G06F2221/0748H04L9/002H04L2209/04H04L2209/046H04L2209/16H04L2209/20
    • A method for rendering software resistant to reverse engineering. Replace at least one first constant (mathematical expression, etc.) in a computational expression with a second mixed mathematical and bitwise-Boolean expression, the first constant being simpler than the second expression and the second expression being based on the value or the variables found in the first constant (or expression). Evaluation of the second mixed mathematical and bitwise-Boolean expression produces a value preserving the value of the first constant, either: with the original value of the first constant or the original value of the result of the first expression, in which case the second mixed mathematical and bitwise-Boolean expression is obtained from the first constant by converting the first constant by mathematical identities; or, in an encoded form, as a new value, which can be converted back to the original value of the first constant by applying an information-preserving decoding function, in which case the second mixed mathematical and bitwise-Boolean expression is obtained from the first constant by modifying the first constant by a combination of conversion according to mathematical identities and transformation according to an information preserving encoding function.
    • 一种用于渲染反向工程的软件的方法。 用计算表达式中的至少一个第一个常数(数学表达式等)替换为第二个混合的数学和位元布尔表达式,第一个常数比第二个表达式简单,而第二个表达式基于值或发现的变量 在第一个常数(或表达式)中。 评估第二个混合数学和比特布尔表达式产生一个保留第一个常数的值的值,或者是:第一个常数的原始值或第一个表达式的结果的原始值,在这种情况下第二个混合 数学和按位 - 通过用数学标识转换第一个常数从第一个常数获得布尔表达式; 或者以编码形式作为新值,其可以通过应用信息保存解码功能而被转换回到第一常数的原始值,在这种情况下,从第二混合数学和按位布尔表达式 通过根据数学标识的转换和根据信息保存编码功能的变换的组合来修改第一常数的第一常数。
    • 7. 发明授权
    • Updating software components in a program
    • 在程序中更新软件组件
    • US09588756B2
    • 2017-03-07
    • US14387215
    • 2012-03-22
    • Clifford LiemHongrui DongSam MartinYuan Xiang GuMichael Weiner
    • Clifford LiemHongrui DongSam MartinYuan Xiang GuMichael Weiner
    • G06F9/44G06F9/445G06F21/57
    • G06F8/65G06F8/656G06F8/658G06F9/44521G06F21/57G06F21/572
    • A method and system for renewing software at the component-level is provided. A client program includes a base component for loading a software component into at least one loadable region of the program to update the program. Code in the software component is for writing state data associating the state of the update in storage, upon execution of the software component, and testing the state data to verify condition of the updated program and disallowing rollback and roll-forward attacks, the state data comprising hash chain values. The state data for verifying the correctness of the updated program is entangled with application data used for the program functionality. A server includes: an update pool having a plurality of software updates deployed in each client, and a policy control for monitoring and controlling at least one of: the length of time the client runs until the software update is invoked, a chain of the updates; and the granularity of the update.
    • 提供了一种在组件级更新软件的方法和系统。 客户端程序包括用于将软件组件加载到程序的至少一个可加载区域中以更新程序的基础组件。 软件组件中的代码用于写入状态数据,将存储器中的更新状态与执行软件组件相关联,并测试状态数据以验证更新程序的状态,并禁止回滚和前滚攻击,状态数据 包括哈希链值。 用于验证更新的程序的正确性的状态数据与用于程序功能的应用程序数据相互纠缠。 服务器包括:具有部署在每个客户端中的多个软件更新的更新池,以及用于监视和控制以下至少之一的策略控制:客户端运行到软件更新被调用的时间长短,更新链 ; 和更新的粒度。
    • 8. 发明申请
    • Simplified management of authentication credentials for unattended applications
    • 简化管理无人值守应用程序的身份验证凭据
    • US20080148373A1
    • 2008-06-19
    • US11640371
    • 2006-12-18
    • Garney David AdamsRobert GrapesYuan Xiang GuRichard Edward Johnston MehanJack Jiequn Rong
    • Garney David AdamsRobert GrapesYuan Xiang GuRichard Edward Johnston MehanJack Jiequn Rong
    • H04L9/32
    • G06F21/62G06F21/31
    • Systems and methods for unattended authentication of software applications to provide these applications with access to shared resources. A server password manager (SPM) module resident on a node also occupied by a requester software application requesting access to resources receives the requestor's request. The SPM module creates a request package containing the requestor's information as well as the node's identifying information. The request package is then transmitted to a credentials manager (CM) module in a CM node. The request package, encrypted by the SPM module with encryption keys previously generated by the CM module, is decrypted by the CM module. The contents are checked against data stored by the CM module regarding the SPM module and the requestor application when these were registered with the CM. If the data matches, then the CM provides credentials which are used to give the requestor application access to the requested resources.
    • 用于软件应用程序的无人值守认证的系统和方法,以便为这些应用程序提供对共享资源的访问。 驻留在请求访问资源的请求者软件应用程序所占用的节点上的服务器密码管理器(SPM)模块接收请求者的请求。 SPM模块创建一个包含请求者信息的请求包以及节点的标识信息。 然后将请求包发送到CM节点中的凭证管理器(CM)模块。 由SPM模块加密的先前由CM模块生成的加密密钥的请求包由CM模块解密。 当CM模块向CM注册时,检查与CM模块存储的关于SPM模块和请求者应用程序的数据的内容。 如果数据匹配,则CM提供用于给请求者应用程序访问所请求的资源的凭证。