会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Method and apparatus for computer code obfuscation and deobfuscation using boot installation
    • 使用引导安装的计算机代码混淆和去模糊的方法和装置
    • US08881290B2
    • 2014-11-04
    • US13434619
    • 2012-03-29
    • Mathieu CietJulien LerougeAugustin J. Farrugia
    • Mathieu CietJulien LerougeAugustin J. Farrugia
    • G06F11/00G06F12/14G06F12/16G06F21/14G06F21/57
    • G06F21/14G06F21/577
    • In the field of computer software, obfuscation techniques for enhancing software security are applied to compiled (object) software code. The obfuscation results here in different versions (instances) of the obfuscated code being provided to different installations (recipient computing devices). The complementary code execution uses a boot loader or boot installer-type program at each installation which contains the requisite logic. Typically, the obfuscation results in a different instance of the obfuscated code for each intended installation (recipient) but each instance being semantically equivalent to the others. This is accomplished in one version by generating a random value or other parameter during the obfuscation process, and using the value to select a particular version of the obfuscating process, and then communicating the value along with boot loader or installer program software.
    • 在计算机软件领域,用于增强软件安全性的混淆技术应用于编译(对象)软件代码。 这里的混淆结果在不同版本(实例)的混淆代码提供给不同的安装(收件人计算设备)。 互补代码执行在每个安装时使用引导加载程序或引导安装程序类型程序,其中包含必需的逻辑。 通常,混淆导致每个预期安装(接收者)的混淆代码的不同实例,但每个实例在语义上等同于其他安装。 这在一个版本中通过在混淆过程中产生随机值或其他参数来实现,并且使用该值来选择混淆过程的特定版本,然后与引导加载程序或安装程序软件一起传送该值。
    • 3. 发明授权
    • Computer object code obfuscation using boot installation
    • 使用引导安装的计算机对象代码模糊
    • US08176337B2
    • 2012-05-08
    • US12047207
    • 2008-03-12
    • Mathieu CietJulien LerougeAugustin J. Farrugia
    • Mathieu CietJulien LerougeAugustin J. Farrugia
    • G06F12/14G06F9/45G06F11/00
    • G06F21/14G06F21/577
    • In the field of computer software, obfuscation techniques for enhancing software security are applied to compiled (object) software code. The obfuscation results here in different versions (instances) of the obfuscated code being provided to different installations (recipient computing devices). The complementary code execution uses a boot loader or boot installer-type program at each installation which contains the requisite logic. Typically, the obfuscation results in a different instance of the obfuscated code for each intended installation (recipient) but each instance being semantically equivalent to the others. This is accomplished in one version by generating a random value or other parameter during the obfuscation process, and using the value to select a particular version of the obfuscating process, and then communicating the value along with boot loader or installer program software. This boot loader then selects which particular process to use for the code execution at the time of installation in accordance with the value. This results in different versions of the obfuscated code being provided to each recipient installation, which further enhances security of the code against reverse engineering by hackers.
    • 在计算机软件领域,用于增强软件安全性的混淆技术应用于编译(对象)软件代码。 这里的混淆结果在不同版本(实例)的混淆代码提供给不同的安装(收件人计算设备)。 互补代码执行在每个安装时使用引导加载程序或引导安装程序类型程序,其中包含必需的逻辑。 通常,混淆导致每个预期安装(接收者)的混淆代码的不同实例,但每个实例在语义上等同于其他安装。 这在一个版本中通过在混淆过程中产生随机值或其他参数来实现,并且使用该值来选择混淆过程的特定版本,然后与引导加载程序或安装程序软件一起传送该值。 然后,该引导加载程序根据该值选择在安装时用于执行代码的特定进程。 这导致了向每个接收方安装提供了不同版本的混淆代码,这进一步增强了代码的安全性,防止了黑客的反向工程。
    • 4. 发明授权
    • System and method for obfuscating constants in a computer program
    • 用于在计算机程序中模糊常数的系统和方法
    • US08874928B2
    • 2014-10-28
    • US12263183
    • 2008-10-31
    • Pierre BetouinMathieu CietAugustin J. Farrugia
    • Pierre BetouinMathieu CietAugustin J. Farrugia
    • G06F11/30G06F12/14G06F21/12G06F9/45
    • G06F21/125G06F8/41G06F8/42G06F8/427G06F8/433G06F8/434
    • Disclosed herein are systems, computer-implemented methods, and tangible computer-readable media for obfuscating constants in a binary. The method includes generating a table of constants, allocating an array in source code, compiling the source code to a binary, transforming the table of constants to match Pcode entries in an indirection table so that each constant in the table of constants can be fetched by an entry in the indirection table. A Pcode is a data representation of a set of instructions populating the indirection table with offsets toward the table of constants storing the indirection table in the allocated array in the compiled binary. The method further includes populating the indirection table with offsets equivalent to the table of constants, and storing the indirection table in the allocated array in the compiled binary. Constants can be of any data type. Constants can be one byte each or more than one byte each. In one aspect, the method further includes splitting constants into two or more segments, treating each segment as a separate constant when transforming the table of constants, and generating a function to retrieve and reconstruct the split constants.
    • 这里公开的是系统,计算机实现的方法和用于在二进制文件中混淆常数的有形计算机可读介质。 该方法包括生成常量表,在源代码中分配数组,将源代码编译为二进制,将常数表变换为匹配间接表中的Pcode条目,以使常数表中的每个常数可以由 间接表中的条目。 Pcode是填充间接表的一组指令的数据表示,其具有偏向于在编译的二进制文件中分配的阵列中存储间接表的常数表的偏移。 该方法还包括使用与常数表相当的偏移量来填充间接表,并将该间接表存储在编译后的二进制数组中。 常量可以是任何数据类型。 常量可以是一个字节,也可以是一个以上的字节。 在一个方面,该方法还包括将常数分成两个或更多个段,当变换常数表时,将每个段作为单独的常数来处理,以及生成检索和重构分裂常数的函数。
    • 5. 发明授权
    • System and method for authentication using a shared table and sorting exponentiation
    • 使用共享表进行身份验证的系统和方法,并排序求幂
    • US08407248B2
    • 2013-03-26
    • US13244068
    • 2011-09-23
    • Pierre BetouinMathieu CietAugustin J. Farrugia
    • Pierre BetouinMathieu CietAugustin J. Farrugia
    • G06F7/00G06F17/30
    • G06F21/31
    • Disclosed herein are systems, computer-implemented methods, and computer-readable media for authentication using a shared table. The method receives an authentication challenge from a first entity including an accumulator with an initial value, lists of elements in a shared table, and a list of sorting algorithms, each sorting algorithm is associated with one of the lists of elements and modified to include embedded instructions operating on the accumulator. The method then generates a temporary table for each list of elements in the shared table by copying elements from the shared table as indicated in each respective list of elements, each temporary table being associated with one sorting algorithm in the list of sorting algorithms. The method sorts each generated temporary table with the associated sorting algorithm, thereby updating the accumulator with the embedded instructions. Finally, the method transmits the updated accumulator to the first entity for verification.
    • 本文公开了系统,计算机实现的方法和用于使用共享表进行认证的计算机可读介质。 该方法从包括具有初始值的累加器,共享表中的元素列表和排序算法列表的第一实体接收认证挑战,每个排序算法与元素列表中的一个相关联并被修改为包括嵌入 在累加器上操作的指令。 然后,该方法通过从每个相应的元素列表中指示的从共享表中复制元素来生成共享表中的每个元素列表的临时表,每个临时表与排序算法列表中的一个排序算法相关联。 该方法使用相关联的排序算法对每个生成的临时表进行排序,从而用嵌入式指令更新累加器。 最后,该方法将更新的累加器发送到第一实体进行验证。
    • 6. 发明申请
    • SYSTEM AND METHOD FOR AUTHENTICATION USING A SHARED TABLE AND SORTING EXPONENTIATION
    • 使用共享表和分配引用进行认证的系统和方法
    • US20100153450A1
    • 2010-06-17
    • US12334732
    • 2008-12-15
    • Pierre BetouinMathieu CietAugustin J. Farrugia
    • Pierre BetouinMathieu CietAugustin J. Farrugia
    • G06F17/30
    • G06F21/31
    • Disclosed herein are systems, computer-implemented methods, and computer-readable media for authentication using a shared table. The method receives an authentication challenge from a first entity including an accumulator with an initial value, lists of elements in a shared table, and a list of sorting algorithms, each sorting algorithm is associated with one of the lists of elements and modified to include embedded instructions operating on the accumulator. The method then generates a temporary table for each list of elements in the shared table by copying elements from the shared table as indicated in each respective list of elements, each temporary table being associated with one sorting algorithm in the list of sorting algorithms. The method sorts each generated temporary table with the associated sorting algorithm, thereby updating the accumulator with the embedded instructions. Finally, the method transmits the updated accumulator to the first entity for verification.
    • 本文公开了系统,计算机实现的方法和用于使用共享表进行认证的计算机可读介质。 该方法从包括具有初始值的累加器,共享表中的元素列表和排序算法列表的第一实体接收认证挑战,每个排序算法与元素列表中的一个相关联并被修改为包括嵌入 在累加器上操作的指令。 然后,该方法通过从每个相应的元素列表中指示的从共享表中复制元素来生成共享表中的每个元素列表的临时表,每个临时表与排序算法列表中的一个排序算法相关联。 该方法使用相关联的排序算法对每个生成的临时表进行排序,从而用嵌入式指令更新累加器。 最后,该方法将更新的累加器发送到第一实体进行验证。
    • 10. 发明授权
    • Method and apparatus for verifying and diversifying randomness
    • 验证随机性多样化的方法和装置
    • US08200727B2
    • 2012-06-12
    • US12031552
    • 2008-02-14
    • Pierre BetouinMathieu CietAugustin J. FarrugiaGianpaolo Fasoli
    • Pierre BetouinMathieu CietAugustin J. FarrugiaGianpaolo Fasoli
    • G06F1/02G06F11/30
    • G06F7/58H04L9/0662H04L9/3236H04L2209/26H04L2209/603
    • Method and apparatus for ensuring randomness of pseudo-random numbers generated by a conventional computer operating system or electronic device. Typically pseudo-random number generators used in computer operating systems or electronic devices may be penetrated by a hacker (pirate), who penetrates a cryptographic or other supposedly secure process using the random numbers by tampering with the input random numbers, thus making them nonrandom. The present method and apparatus are intended to verify such random numbers to make sure that they are indeed random enough, by applying suitable random tests. Only if the values pass the test are they passed on for use in the cryptographic or other process. If they fail the test, a new set of random numbers is requested from the pseudo-random number generator. These are again tested. Further a diversity function may be applied to the random numbers even if they have passed the random number test in order to improve their randomness. This diversity function is for instance double encryption. An anti-replay feature is also included by which the pool of random numbers is subject to a check on each cycle to make sure that there has been no duplication of the input random numbers.
    • 用于确保由常规计算机操作系统或电子设备产生的伪随机数的随机性的方法和装置。 在计算机操作系统或电子设备中使用的通常的伪随机数生成器可以被黑客(盗版者)穿透,黑客(盗版者)通过篡改输入的随机数来使用随机数进行加密或其他所谓的安全处理,从而使其不随机。 本方法和装置旨在验证这样的随机数,以确保它们确实是随机的,通过应用适当的随机测试。 只有当值通过测试时,它们才被传递以用于加密或其他过程。 如果测试失败,则会从伪随机数发生器请求一组新的随机数。 这些再次测试。 此外,即使已经通过随机数测试来提高其随机性,也可以将分集函数应用于随机数。 这种分集功能是例如双重加密。 还包括反重播功能,通过该功能,随机数池将在每个周期进行检查,以确保输入随机数没有重复。