会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • COMPUTER INPUT DEVICE
    • 计算机输入设备
    • WO2009133412A1
    • 2009-11-05
    • PCT/GB2009/050464
    • 2009-05-05
    • UNIVERSITY OF TEESSIDESPEARS, IainBRUNTON, TimothyTANG, Wen
    • SPEARS, IainBRUNTON, TimothyTANG, Wen
    • G06F3/01
    • G06F3/0325G06F3/038
    • Computer input apparatus comprising: an image capture device; and a marker member comprising at least two reference indicia, at least a first reference indicium being arranged to emit or reflect light having a first spectral characteristic, and at least a second reference indicium being arranged to emit or reflect light having a second spectral characteristic different from the first spectral characteristic, the image capture device being arranged to distinguish light of said first spectral characteristic from light of said second spectral characteristic thereby to distinguish the at least a first reference indicium from the at least a second reference indicium, the apparatus being configured to capture an image of the at least two reference indicia and to determine by means of said image a position and orientation of the marker member with respect to a reference frame.
    • 计算机输入装置,包括:图像捕获装置; 以及标记构件,其包括至少两个参考标记,至少第一参考标记布置成发射或反射具有第一光谱特征的光,并且至少第二参考标记布置成发射或反射具有不同的第二光谱特性的光 从第一光谱特征,图像捕获装置被布置成将所述第一光谱特征的光与所述第二光谱特征的光区分开,从而区分至少第一参考标记与至少第二参考标记,所述装置被配置 以捕获所述至少两个参考标记的图像,并且通过所述图像确定所述标记构件相对于参考框架的位置和取向。
    • 4. 发明申请
    • METHOD AND APPARATUS FOR ENCRYPTING AND DECRYPTING SOFTWARE
    • 加密和分解软件的方法和装置
    • WO2008141992A1
    • 2008-11-27
    • PCT/EP2008/055912
    • 2008-05-14
    • SIEMENS AKTIENGESELLSCHAFTTANG, WenHU, Jian Jun
    • TANG, WenHU, Jian Jun
    • G06F21/22H04L9/08
    • G06F21/602G06F21/14H04L9/085
    • The present invention relates to the field of computer security, and particularly to a method and an apparatus for encrypting and decrypting software. The decryption process of the present invention comprises the following steps: step 201, selecting t factors of a threshold secret key from n paragraphs of a second software cipher text at random, restoring a first software cipher text and an secret key cipher text PSK from the second software cipher text, wherein n is a positive integer greater than 1, t is a positive integer less than or equal to n ; step 202, extracting said secret key cipher text PSK, calculating a second secret key according to said t factors of the threshold secret key, and using the second secret key to decrypt the secret key cipher text PSK into the first secret key SK; and step 203, decrypting said first software cipher text using said first secret key SK, so as to obtain the software's plaintext. The beneficial effects of the present invention are that it enhances the protection of the software encrypting key, and makes it more difficult for a cracker to crack the software by way of tracking the software' s loading process.
    • 本发明涉及计算机安全领域,特别涉及用于加密和解密软件的方法和装置。 本发明的解密过程包括以下步骤:步骤201,随机从第二软件密文的n个段选择阈值秘密密钥的t因子,从第一软件密文文本和秘密密钥密文文本PSK中恢复 第二软件密文,其中n是大于1的正整数,t是小于或等于n的正整数; 步骤202,提取所述秘密密钥密文PSK,根据所述阈值秘密密钥的所述t因子计算第二密钥,并使用所述第二秘密密钥将所述密钥密码文件PSK解密为所述第一秘密密钥SK; 以及步骤203,使用所述第一秘密密钥SK解密所述第一软件密文,以获得软件的明文。 本发明的有益效果是它增强了对软件加密密钥的保护,并且使得破解者通过跟踪软件加载过程来破解软件变得更加困难。