会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Software protection injection at load time
    • 加载时软件保护注入
    • US08001596B2
    • 2011-08-16
    • US11743755
    • 2007-05-03
    • Matthias WollnikNir Ben ZviHakki Tunc BostanciJohn Richard McDowellAaron Goldsmid
    • Matthias WollnikNir Ben ZviHakki Tunc BostanciJohn Richard McDowellAaron Goldsmid
    • G06F11/00
    • G06F21/51G06F21/54
    • A method to apply a protection mechanism to a binary object includes using operating system resources to load a binary object from a storage medium along with a manifest and a digital signature. Authentication of the binary object is performed using the digital signature and the manifest is read to determine a category of protection for the binary object. The operating system selects a protection mechanism corresponding to the protection category and injects protection mechanism code, along with the binary object into a binary image on computer RAM. When the binary image is accessed, the protection mechanism executes and either allows full access and functionality to the binary object or prevents proper access and operation of the binary object. The protection mechanisms may be updated independently from the information on the storage medium.
    • 将保护机制应用于二进制对象的方法包括使用操作系统资源将二进制对象与清单和数字签名一起从存储介质加载。 使用数字签名执行二进制对象的认证,读取清单以确定二进制对象的保护类别。 操作系统选择对应于保护类别的保护机制,并将保护机制代码与二进制对象一起注入计算机RAM中的二进制映像。 当访问二进制图像时,保护机制执行,并允许对二进制对象的完全访问和功能,或者阻止二进制对象的正确访问和操作。 可以独立于存储介质上的信息更新保护机制。
    • 2. 发明申请
    • SOFTWARE PROTECTION INJECTION AT LOAD TIME
    • 负载时软件保护注射
    • US20080276314A1
    • 2008-11-06
    • US11743755
    • 2007-05-03
    • MATTHIAS WOLLNIKNir Ben-ZviHakki Tunc BostanciJohn Richard McDowellAaron Goldsmid
    • MATTHIAS WOLLNIKNir Ben-ZviHakki Tunc BostanciJohn Richard McDowellAaron Goldsmid
    • G06F19/00
    • G06F21/51G06F21/54
    • A method to apply a protection mechanism to a binary object includes using operating system resources to load a binary object from a storage medium along with a manifest and a digital signature. Authentication of the binary object is performed using the digital signature and the manifest is read to determine a category of protection for the binary object. The operating system selects a protection mechanism corresponding to the protection category and injects protection mechanism code, along with the binary object into a binary image on computer RAM. When the binary image is accessed, the protection mechanism executes and either allows full access and functionality to the binary object or prevents proper access and operation of the binary object. The protection mechanisms may be updated independently from the information on the storage medium.
    • 将保护机制应用于二进制对象的方法包括使用操作系统资源将二进制对象与清单和数字签名一起从存储介质加载。 使用数字签名执行二进制对象的认证,读取清单以确定二进制对象的保护类别。 操作系统选择对应于保护类别的保护机制,并将保护机制代码与二进制对象一起注入计算机RAM中的二进制映像。 当访问二进制图像时,保护机制执行,并允许对二进制对象的完全访问和功能,或者阻止二进制对象的正确访问和操作。 可以独立于存储介质上的信息更新保护机制。
    • 7. 发明申请
    • Trusted store tamper detection
    • 可信存储篡改检测
    • US20070101131A1
    • 2007-05-03
    • US11265265
    • 2005-11-01
    • Ivan DavtchevKaran DhillonNir ZviAaron GoldsmidPing XieYifat Sagiv
    • Ivan DavtchevKaran DhillonNir ZviAaron GoldsmidPing XieYifat Sagiv
    • H04L9/00
    • G06F21/64
    • A security flag stored in a trusted store is utilized to determine if the trusted store has been subjected to tampering. The security flag is indicative of a globally unique identifier (GUID), the version of the trusted store, and a counter. The security flag is created when the trusted store is created. Each time a critical event occurs, the security flag is updated to indicate the occurrence thereof. The security flag also is stored in a write-once portion of the system registry. At appropriate times, the security flag stored in the trusted store is compared with the corresponding security flag stored in the write-once registry. If the security flags match within a predetermined tolerance, it is determined that the trusted store has not been subjected to tampering. If the security flags do not match, or if a security flag is missing, it is determined that the trusted store has been subjected to tampering.
    • 使用存储在可信存储中的安全标志来确定可信存储是否已经被篡改。 安全标志指示全局唯一标识符(GUID),可信存储的版本和计数器。 创建可信存储时创建安全标志。 每当发生紧急事件时,安全标志被更新以指示其发生。 安全标志也存储在系统注册表的一次写入部分中。 在适当的时间,将存储在可信存储中的安全标志与存储在一次写入注册表中的对应的安全标志进行比较。 如果安全标志在预定公差内匹配,则确定可信存储没有遭受篡改。 如果安全标志不匹配,或者如果安全标志丢失,则确定可信存储已经受到篡改。