会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Obfuscating computer program code
    • 模糊计算机程序代码
    • US08393003B2
    • 2013-03-05
    • US12515280
    • 2007-11-20
    • Johan EkerBjörn JohanssonCarl Von Platen
    • Johan EkerBjörn JohanssonCarl Von Platen
    • G04F7/04
    • G06F21/14
    • A computer-implemented method of tamper-protecting computer program code. The method comprises: obtaining an input representation of the computer program code; identifying a conditional program statement for causing a data processing system to selectively execute one of at least a first and a second sets of program statements when said computer program is executed by a data processing system; replacing said identified conditional program statement and the first and second sets of program statements with a set of transformed program statements to obtain obfuscated program code, wherein the set of transformed program statements is adapted to cause the data processing system to execute at least a part of each of the transformed program statements when said computer program is executed by the data processing system.
    • 一种计算机实现的篡改计算机程序代码的方法。 该方法包括:获得计算机程序代码的输入表示; 当数据处理系统执行所述计算机程序时,识别用于使数据处理系统选择性地执行至少第一和第二组程序语句中的一个的条件程序语句; 用一组经变换的程序语句替换所述识别的条件程序语句和第一和第二组程序语句以获得混淆的程序代码,其中所述变换的程序语句集合适于使数据处理系统执行至少一部分 当所述计算机程序由数据处理系统执行时,每个变换的程序语句。
    • 2. 发明申请
    • Obfuscating Computer Program Code
    • 混淆计算机程序代码
    • US20100251378A1
    • 2010-09-30
    • US12515621
    • 2007-12-19
    • Johan EkerBjörn JohanssonCarl von Platen
    • Johan EkerBjörn JohanssonCarl von Platen
    • G06F21/22
    • G06F21/14
    • A computer-implemented method of tamper-protecting a computer program, the method comprising: processing an input representation of the computer program to identify a function call for causing a data processing system to continue execution of the computer program at a predetermined entry point memory address when said computer program is executed by a data processing system; replacing the identified function call with a modified function call, wherein the modified function call includes an algebraic expression for causing the data processing system to compute the entry point memory address when said computer program is executed by the data processing system.
    • 一种用于篡改保护计算机程序的计算机实现的方法,所述方法包括:处理所述计算机程序的输入表示,以识别使数据处理系统在预定入口点存储器地址上继续执行所述计算机程序的功能调用 当所述计算机程序由数据处理系统执行时; 用经修改的函数调用替换所识别的函数调用,其中修改后的函数调用包括代数表达式,用于使数据处理系统在数据处理系统执行所述计算机程序时计算入口点存储器地址。
    • 3. 发明申请
    • Obfuscating Computer Program Code
    • 混淆计算机程序代码
    • US20100199354A1
    • 2010-08-05
    • US12515280
    • 2007-11-20
    • Johan EkerBjörn JohanssonCarl von Platen
    • Johan EkerBjörn JohanssonCarl von Platen
    • G06F21/00
    • G06F21/14
    • A computer-implemented method of tamper-protecting computer program code. The method comprises: obtaining an input representation of the computer program code; identifying a conditional program statement for causing a data processing system to selectively execute one of at least a first and a second sets of program statements when said computer program is executed by a data processing system; replacing said identified conditional program statement and the first and second sets of program statements with a set of transformed program statements to obtain obfuscated program code, wherein the set of transformed program statements is adapted to cause the data processing system to execute at least a part of each of the transformed program statements when said computer program is executed by the data processing system.
    • 一种计算机实现的篡改计算机程序代码的方法。 该方法包括:获得计算机程序代码的输入表示; 当数据处理系统执行所述计算机程序时,识别用于使数据处理系统选择性地执行至少第一和第二组程序语句中的一个的条件程序语句; 用一组经变换的程序语句替换所述识别的条件程序语句和第一和第二组程序语句以获得混淆的程序代码,其中所述变换的程序语句集合适于使数据处理系统执行至少一部分 当所述计算机程序由数据处理系统执行时,每个变换的程序语句。
    • 4. 发明申请
    • Obfuscating Execution Traces of Computer Program Code
    • 计算机程序代码的混淆执行痕迹
    • US20100262839A1
    • 2010-10-14
    • US12664893
    • 2008-06-25
    • Johan EkerBjörn JohanssonCarl Von Platen
    • Johan EkerBjörn JohanssonCarl Von Platen
    • G06F12/14G06F9/44G06F9/45
    • G06F21/52G06F21/14G06F21/16G06F21/755G06F2221/2145
    • A computer-implemented method of generating tamper-protected computer program code. The method comprises obtaining a representation of the computer program code, the computer program being adapted to cause a data processing system to perform a plurality of computational tasks in a first order of execution, each computational task being represented in the representation of the computer program code by at least one program statement; obtaining a plurality of alternative orders of execution of the computational tasks; generating an executable representation of the program code adapted to cause a data processing system to select a randomized order of execution from the plurality of alternative orders of execution and to execute the computational tasks in the selected randomized order of execution.
    • 一种计算机实现的生成防篡改计算机程序代码的方法。 该方法包括获得计算机程序代码的表示,所述计算机程序适于使数据处理系统以第一执行顺序执行多个计算任务,每个计算任务在计算机程序代码的表示中表示 通过至少一个程序语句; 获得执行计算任务的多个替代顺序; 生成所述程序代码的可执行表示,所述程序代码适于使数据处理系统从所述多个替代执行顺序中选择执行的随机化顺序,并以所选择的随机执行顺序执行所述计算任务。
    • 5. 发明授权
    • Obfuscating execution traces of computer program code
    • 模糊计算机程序代码的执行痕迹
    • US08522047B2
    • 2013-08-27
    • US12664893
    • 2008-06-25
    • Johan EkerBjörn JohanssonCarl Von Platen
    • Johan EkerBjörn JohanssonCarl Von Platen
    • G06F12/14
    • G06F21/52G06F21/14G06F21/16G06F21/755G06F2221/2145
    • A computer-implemented method of generating tamper-protected computer program code. The method comprises obtaining a representation of the computer program code, the computer program being adapted to cause a data processing system to perform a plurality of computational tasks in a first order of execution, each computational task being represented in the representation of the computer program code by at least one program statement; obtaining a plurality of alternative orders of execution of the computational tasks; generating an executable representation of the program code adapted to cause a data processing system to select a randomized order of execution from the plurality of alternative orders of execution and to execute the computational tasks in the selected randomized order of execution.
    • 一种计算机实现的生成防篡改计算机程序代码的方法。 该方法包括获得计算机程序代码的表示,所述计算机程序适于使数据处理系统以第一执行顺序执行多个计算任务,每个计算任务在计算机程序代码的表示中表示 通过至少一个程序声明; 获得执行计算任务的多个替代顺序; 生成所述程序代码的可执行表示,所述程序代码适于使数据处理系统从所述多个替代执行顺序中选择执行的随机化顺序,并以所选择的随机执行顺序执行所述计算任务。
    • 6. 发明授权
    • Obfuscating computer program code
    • 模糊计算机程序代码
    • US08286251B2
    • 2012-10-09
    • US12515621
    • 2007-12-19
    • Johan EkerBjörn JohanssonCarl Von Platen
    • Johan EkerBjörn JohanssonCarl Von Platen
    • G06F7/04
    • G06F21/14
    • A computer-implemented method of tamper-protecting a computer program, the method comprising: processing an input representation of the computer program to identify a function call for causing a data processing system to continue execution of the computer program at a predetermined entry point memory address when said computer program is executed by a data processing system; replacing the identified function call with a modified function call, wherein the modified function call includes an algebraic expression for causing the data processing system to compute the entry point memory address when said computer program is executed by the data processing system.
    • 一种用于篡改保护计算机程序的计算机实现的方法,所述方法包括:处理所述计算机程序的输入表示,以识别使数据处理系统在预定入口点存储器地址上继续执行所述计算机程序的功能调用 当所述计算机程序由数据处理系统执行时; 用经修改的函数调用替换所识别的函数调用,其中修改后的函数调用包括代数表达式,用于使数据处理系统在数据处理系统执行所述计算机程序时计算入口点存储器地址。
    • 7. 发明申请
    • Editor/Development Tool for Dataflow Programs
    • 数据流程序的编辑/开发工具
    • US20140013313A1
    • 2014-01-09
    • US13541110
    • 2012-07-03
    • Johan EkerHarald GUSTAFSSONCarl Von PLATEN
    • Johan EkerHarald GUSTAFSSONCarl Von PLATEN
    • G06F9/44
    • G06F8/33G06F8/436G06F11/3604
    • A dataflow source program is processed by a program development tool. Processing includes retrieving stored dataflow source program instructions from a memory. The tool ascertains a target model of computation (e.g., via an indicator embedded within the source program itself) to which the retrieved dataflow source program instructions are intended to conform. A dynamic behavior of the retrieved dataflow source program instructions is analyzed, and a compliance result is produced therefrom that includes an indication of whether the retrieved dataflow source program instructions conform to the target model of computation. The compliance result is then output to a user of the program development tool, so that it can inform and guide the improvement and further development of the program.
    • 数据流源程序由程序开发工具处理。 处理包括从存储器检索存储的数据流源程序指令。 该工具确定所检索的数据流源程序指令旨在符合的目标计算模型(例如,通过嵌入在源程序本身内的指示符)。 分析检索到的数据流源程序指令的动态行为,并从中产生符合性结果,该结果包括检索到的数据流源程序指令是否符合目标计算模型的指示。 然后将合规结果输出给程序开发工具的用户,以便它可以通知和指导程序的改进和进一步开发。
    • 8. 发明申请
    • FEEDBACK LINKER FOR INCREASED DELTA PERFORMANCE
    • 反馈链接提高了DELTA性能
    • US20090172338A1
    • 2009-07-02
    • US12064072
    • 2006-08-17
    • Johan EkerCarl von Platen
    • Johan EkerCarl von Platen
    • G06F12/02
    • G06F8/658
    • A method, system and program for generating an updated memory image including updated program code to be loaded into a storage medium that has stored thereon a current memory image including a current program code version. The method comprises receiving an updated input code comprising a number of segments, wherein each segment is relocatable within the updated memory image; arranging the segments within the updated memory image. The arranging further comprises receiving a representation of the current program code version; performing at least one optimization step adapted to decrease an objective function under at least one predetermined layout constraint, the objective function being indicative of a magnitude of differences between the current program code version and the updated program code version, the layout constraint being indicative of at least one constraint imposed on the arrangement of segments within the memory image.
    • 一种用于生成更新的存储器图像的方法,系统和程序,所述更新的存储器图像包括要被加载到存储有其当前存储器图像的存储介质中的更新的程序代码, 该方法包括接收包括多个段的更新的输入代码,其中每个段可在更新的存储器映像内重新定位; 将片段排列在更新的存储器图像内。 该安排还包括接收当前程序代码版本的表示; 执行适于在至少一个预定布局约束下减小目标函数的至少一个优化步骤,所述目标函数指示当前程序代码版本与更新的程序代码版本之间的差异的大小,布局约束指示在 对存储器图像中的段的排列施加的最小约束。
    • 9. 发明申请
    • Data Handling Among Actors in a Dataflow Programming Environment
    • 数据流编程环境中的数据处理
    • US20130339923A1
    • 2013-12-19
    • US13527568
    • 2012-06-19
    • Charles Chen XuJohan EkerCarl Von Platen
    • Charles Chen XuJohan EkerCarl Von Platen
    • G06F9/44
    • G06F8/433G06F9/4494
    • Processing a dataflow program by a program development tool includes detecting a pair of actors defined by dataflow program instructions, wherein the pair of actors include a producer actor and a consumer actor, the producer actor supplying a data structure to the consumer actor via a path that comprises at least one connection and possibly also intervening other actors. An analysis is performed including analyzing one or more operations of the producer actor that involve the data structure and/or analyzing one or more operations of the consumer actor that involve the data structure. A result of the analysis is used as a basis for selecting a minimal amount of information from among a plurality of data handling possibilities concerning the data structure. A transformed program is produced in which the selected minimal amount of information is caused to be passed from the producer actor to the consumer actor.
    • 通过程序开发工具处理数据流程序包括检测由数据流程序指令定义的一对演员,其中该对演员包括制作者演员和消费者演员,该制作者演员通过以下路径向消费者演员提供数据结构: 包括至少一个连接以及可能还介入的其他演员。 执行分析,包括分析涉及数据结构的生产者行为者的一个或多个操作和/或分析涉及数据结构的消费者行为者的一个或多个操作。 分析结果被用作从与数据结构相关的多个数据处理可能性之中选择最小量的信息的基础。 产生了一个转换的程序,其中所选择的最小量的信息被引导从生产者演员传递给消费者演员。
    • 10. 发明授权
    • Method for exploiting massive parallelism
    • 开发大规模并行性的方法
    • US09189217B2
    • 2015-11-17
    • US14348983
    • 2011-10-03
    • Carl Von PlatenJohan Eker
    • Carl Von PlatenJohan Eker
    • G06F9/45G06F11/00
    • G06F8/456G06F8/452
    • A method of statically testing dependence in a dataflow program is provided, the method comprising receiving a dataflow program which provides parameters, including consumption rates, production rates on connections between actors in the program and a number of initial samples (delays) on the connections, generating from the parameters a model of a precedence graph for the dataflow program representing dependence constraints between distinct firings of the number of actors. For the model, determining a feedback distance between multiple firings of a same actor, determining sets of parallel regions comprising a given number of actor firings of a same actor, composing mutually independent component regions comprising at least a part of the sets of parallel regions, and composing one or more composite regions comprising one or more component regions and/or one or more sets of parallel regions, being composed so that a pre-determined criteria is satisfied.
    • 提供了一种静态测试数据流程序中的依赖性的方法,该方法包括:接收数据流程序,该程序提供参数,包括消耗速率,程序中各参与者之间的连接的生产率以及连接上的多个初始采样(延迟) 从参数生成用于表示参与者数量的不同发射之间的依赖约束的数据流程序的优先图的模型。 对于该模型,确定相同演员的多次发射之间的反馈距离,确定包括相同演员的给定数量的演员发射的并行区域的集合,构成包括平行区域集合的至少一部分的相互独立的组件区域, 并且构成包括一个或多个组分区域和/或一组或多组平行区域的一个或多个复合区域,以使得满足预定标准。