会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 5. 发明授权
    • System and method for obfuscating constants in a computer program
    • 用于在计算机程序中模糊常数的系统和方法
    • US08874928B2
    • 2014-10-28
    • US12263183
    • 2008-10-31
    • Pierre BetouinMathieu CietAugustin J. Farrugia
    • Pierre BetouinMathieu CietAugustin J. Farrugia
    • G06F11/30G06F12/14G06F21/12G06F9/45
    • G06F21/125G06F8/41G06F8/42G06F8/427G06F8/433G06F8/434
    • Disclosed herein are systems, computer-implemented methods, and tangible computer-readable media for obfuscating constants in a binary. The method includes generating a table of constants, allocating an array in source code, compiling the source code to a binary, transforming the table of constants to match Pcode entries in an indirection table so that each constant in the table of constants can be fetched by an entry in the indirection table. A Pcode is a data representation of a set of instructions populating the indirection table with offsets toward the table of constants storing the indirection table in the allocated array in the compiled binary. The method further includes populating the indirection table with offsets equivalent to the table of constants, and storing the indirection table in the allocated array in the compiled binary. Constants can be of any data type. Constants can be one byte each or more than one byte each. In one aspect, the method further includes splitting constants into two or more segments, treating each segment as a separate constant when transforming the table of constants, and generating a function to retrieve and reconstruct the split constants.
    • 这里公开的是系统,计算机实现的方法和用于在二进制文件中混淆常数的有形计算机可读介质。 该方法包括生成常量表,在源代码中分配数组,将源代码编译为二进制,将常数表变换为匹配间接表中的Pcode条目,以使常数表中的每个常数可以由 间接表中的条目。 Pcode是填充间接表的一组指令的数据表示,其具有偏向于在编译的二进制文件中分配的阵列中存储间接表的常数表的偏移。 该方法还包括使用与常数表相当的偏移量来填充间接表,并将该间接表存储在编译后的二进制数组中。 常量可以是任何数据类型。 常量可以是一个字节,也可以是一个以上的字节。 在一个方面,该方法还包括将常数分成两个或更多个段,当变换常数表时,将每个段作为单独的常数来处理,以及生成检索和重构分裂常数的函数。
    • 6. 发明授权
    • System and method for authentication using a shared table and sorting exponentiation
    • 使用共享表进行身份验证的系统和方法,并排序求幂
    • US08407248B2
    • 2013-03-26
    • US13244068
    • 2011-09-23
    • Pierre BetouinMathieu CietAugustin J. Farrugia
    • Pierre BetouinMathieu CietAugustin J. Farrugia
    • G06F7/00G06F17/30
    • G06F21/31
    • Disclosed herein are systems, computer-implemented methods, and computer-readable media for authentication using a shared table. The method receives an authentication challenge from a first entity including an accumulator with an initial value, lists of elements in a shared table, and a list of sorting algorithms, each sorting algorithm is associated with one of the lists of elements and modified to include embedded instructions operating on the accumulator. The method then generates a temporary table for each list of elements in the shared table by copying elements from the shared table as indicated in each respective list of elements, each temporary table being associated with one sorting algorithm in the list of sorting algorithms. The method sorts each generated temporary table with the associated sorting algorithm, thereby updating the accumulator with the embedded instructions. Finally, the method transmits the updated accumulator to the first entity for verification.
    • 本文公开了系统,计算机实现的方法和用于使用共享表进行认证的计算机可读介质。 该方法从包括具有初始值的累加器,共享表中的元素列表和排序算法列表的第一实体接收认证挑战,每个排序算法与元素列表中的一个相关联并被修改为包括嵌入 在累加器上操作的指令。 然后,该方法通过从每个相应的元素列表中指示的从共享表中复制元素来生成共享表中的每个元素列表的临时表,每个临时表与排序算法列表中的一个排序算法相关联。 该方法使用相关联的排序算法对每个生成的临时表进行排序,从而用嵌入式指令更新累加器。 最后,该方法将更新的累加器发送到第一实体进行验证。
    • 9. 发明申请
    • SYSTEM AND METHOD FOR AUTHENTICATION USING A SHARED TABLE AND SORTING EXPONENTIATION
    • 使用共享表和分配引用进行认证的系统和方法
    • US20100153450A1
    • 2010-06-17
    • US12334732
    • 2008-12-15
    • Pierre BetouinMathieu CietAugustin J. Farrugia
    • Pierre BetouinMathieu CietAugustin J. Farrugia
    • G06F17/30
    • G06F21/31
    • Disclosed herein are systems, computer-implemented methods, and computer-readable media for authentication using a shared table. The method receives an authentication challenge from a first entity including an accumulator with an initial value, lists of elements in a shared table, and a list of sorting algorithms, each sorting algorithm is associated with one of the lists of elements and modified to include embedded instructions operating on the accumulator. The method then generates a temporary table for each list of elements in the shared table by copying elements from the shared table as indicated in each respective list of elements, each temporary table being associated with one sorting algorithm in the list of sorting algorithms. The method sorts each generated temporary table with the associated sorting algorithm, thereby updating the accumulator with the embedded instructions. Finally, the method transmits the updated accumulator to the first entity for verification.
    • 本文公开了系统,计算机实现的方法和用于使用共享表进行认证的计算机可读介质。 该方法从包括具有初始值的累加器,共享表中的元素列表和排序算法列表的第一实体接收认证挑战,每个排序算法与元素列表中的一个相关联并被修改为包括嵌入 在累加器上操作的指令。 然后,该方法通过从每个相应的元素列表中指示的从共享表中复制元素来生成共享表中的每个元素列表的临时表,每个临时表与排序算法列表中的一个排序算法相关联。 该方法使用相关联的排序算法对每个生成的临时表进行排序,从而用嵌入式指令更新累加器。 最后,该方法将更新的累加器发送到第一实体进行验证。