会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 5. 发明授权
    • Secure and opaque type library providing secure data protection of variables
    • 安全和不透明的库提供变量的安全数据保护
    • US07254586B2
    • 2007-08-07
    • US10185644
    • 2002-06-28
    • Yuqun ChenRamarathnam VenkatesanMariusz H. Jakubowski
    • Yuqun ChenRamarathnam VenkatesanMariusz H. Jakubowski
    • G06F7/00G06F11/30G06F12/14H04L9/32
    • G06F21/14Y10S707/99931
    • A method, apparatus, and article of manufacture for providing secure and opaque type libraries to automatically provide secure variables within a programming module. A system for providing secure and opaque type libraries to automatically provide secure variables within a programming module. The system includes an OTL selection module, an OTL substitution module, an OTL type library database, a compiler module; and a linker module to create an executable processing module. The OTL selection module randomly selects or generates one of the possible variable obfuscation functions for each declared secure variable. The OTL substitution module substitutes the separate instance of the selected variable obfuscation function for every reference to the declared secure variable. The OTL type library database receives queries from the OTL selection module a database to identify of possible variable obfuscation functions applicable for the variable type corresponding to the declared secure variables.
    • 一种用于提供安全和不透明类型库以在编程模块内自动提供安全变量的方法,装置和制品。 一种用于提供安全和不透明类型库以在编程模块内自动提供安全变量的系统。 该系统包括OTL选择模块,OTL替代模块,OTL类型库数据库,编译器模块; 以及用于创建可执行处理模块的链接器模块。 OTL选择模块随机选择或生成每个声明的安全变量的可能的变量模糊函数之一。 OTL替换模块将所选变量混淆函数的单独实例替换为声明的安全变量的每个引用。 OTL类型库数据库从OTL选择模块接收数据库的查询,以识别适用于与所声明的安全变量相对应的变量类型的可能的变量混淆函数。
    • 8. 发明授权
    • Method and apparatus for producing a message authentication code in a
cipher block chaining operation by using linear combinations of an
encryption key
    • 通过使用加密密钥的线性组合在密码块链接操作中产生消息认证码的方法和装置
    • US6128737A
    • 2000-10-03
    • US62837
    • 1998-04-20
    • Mariusz H. JakubowskiRamarathnam Venkatesan
    • Mariusz H. JakubowskiRamarathnam Venkatesan
    • H04L9/32H04L9/08
    • H04L9/0643H04L9/0637H04L9/3242H04L2209/56
    • A cryptographic technique that not only provides fast and extremely secure encryption and decryption but also assures integrity of a ciphertext message. This technique involves, during message encryption: generating, in response to an incoming plaintext message, an intermediate stream--such as by chaining the message, wherein a predefined portion of the intermediate stream defines a message authentication code (MAC); inserting an encrypted version of the MAC into a predefined portion of a ciphertext message; and generating, in response to the intermediate stream and the encrypted MAC, a remainder of the ciphertext message such that the remainder exhibits a predefined variation, e.g., a pseudo-random sequence, also contained within the encrypted MAC. Decryption proceeds in essentially a reverse fashion. By extending the sequence across the remainder of the ciphertext, any subsequent change to the ciphertext would likely destroy the continuity of the sequence otherwise residing throughout the remainder of the ciphertext. During decryption, any violation to the integrity of the ciphertext can be readily detected by decrypting the MAC contained in the ciphertext and comparing it, for any discrepancies, against a MAC generated from recovered plaintext.
    • 一种加密技术,不仅提供快速和极其安全的加密和解密,而且确保密文消息的完整性。 该技术涉及在消息加密过程中:响应于传入的明文消息,生成中间流(例如通过链接消息),其中中间流的预定义部分定义消息认证码(MAC); 将所述MAC的加密版本插入密文消息的预定义部分; 以及响应于所述中间流和加密的MAC生成所述密文消息的其余部分,使得所述余数呈现还包含在所述加密MAC内的预定义变化,例如伪随机序列。 解密以基本上相反的方式进行。 通过将序列扩展到密文的其余部分,对密文的任何后续更改都可能破坏序列的连续性,否则它们驻留在密文的其余部分。 在解密过程中,通过对密文中包含的MAC进行解密,对于任何差异与从恢复的明文生成的MAC进行比较,可以容易地检测到对密文的完整性的任何违反。
    • 10. 发明授权
    • Code integrity verification that includes one or more cycles
    • 包含一个或多个周期的代码完整性验证
    • US07080249B1
    • 2006-07-18
    • US09670916
    • 2000-09-29
    • Mariusz H. JakubowskiRamarathnam VenkatesanYacov Yacobi
    • Mariusz H. JakubowskiRamarathnam VenkatesanYacov Yacobi
    • G06F1/26
    • G06F21/125H04L9/3242
    • Cyclic verification of code integrity is applied to an object by identifying multiple segments of the object. Each segment is separated into multiple blocks, and a message authentication code (MAC) value of each of these segments is computed. The computed module MAC values are then incorporated into selected ones of the multiple segments (referred to here as “checker segments”), which may also have their MAC values incorporated into other checker segments. A new MAC value for each of the checker segments is then calculated. A new block is added to each of the checker segments that results in restoring the MAC value of the checker segment back to its original value. Thus, the checker segments can be subsequently verified based on the MAC values stored in other segments.
    • 通过识别对象的多个段来对代码完整性进行循环验证。 每个段被分成多个块,并且计算每个这些段的消息认证码(MAC)值。 计算出的模块MAC值然后被合并到多个段中的选定的一个(这里称为“检验器段”),其也可以将它们的MAC值合并到其他检验器段中。 然后计算每个检查器段的新MAC值。 每个检查器段都添加一个新的块,导致检查器段的MAC值恢复到原始值。 因此,随后可以基于存储在其他段中的MAC值验证检验器段。