Method of obfuscating a code
    1.
    发明授权
    Method of obfuscating a code 有权
    混淆代码的方法

    公开(公告)号:US09465926B2

    公开(公告)日:2016-10-11

    申请号:US12869622

    申请日:2010-08-26

    Abstract: A method of obfuscating a code is provided, wherein the method comprises performing a first level obfuscating technique on a code to generate a first obfuscated code, and performing a second level obfuscating technique on the first obfuscated code. In particular, the code may be a software code or a software module. Furthermore, the first level obfuscating technique and the second obfuscating may be different. In particular, the second level obfuscating technique may perform a deobfuscation.

    Abstract translation: 提供了一种混淆代码的方法,其中所述方法包括对代码执行第一级混淆技术以产生第一混淆代码,以及对所述第一混淆代码执行第二级混淆技术。 特别地,代码可以是软件代码或软件模块。 此外,第一级混淆技术和第二混淆可以是不同的。 特别地,第二级混淆技术可以执行去混淆。

    METHOD OF OBFUSCATING A CODE
    2.
    发明申请
    METHOD OF OBFUSCATING A CODE 有权
    OBFUSCAING代码的方法

    公开(公告)号:US20110055592A1

    公开(公告)日:2011-03-03

    申请号:US12869622

    申请日:2010-08-26

    Abstract: A method of obfuscating a code is provided, wherein the method comprises performing a first level obfuscating technique on a code to generate a first obfuscated code, and performing a second level obfuscating technique on the first obfuscated code. In particular, the code may be a software code or a software module. Furthermore, the first level obfuscating technique and the second obfuscating may be different. In particular, the second level obfuscating technique may perform a deobfuscation.

    Abstract translation: 提供了一种混淆代码的方法,其中所述方法包括对代码执行第一级混淆技术以产生第一混淆代码,以及对所述第一混淆代码执行第二级混淆技术。 特别地,代码可以是软件代码或软件模块。 此外,第一级混淆技术和第二混淆可以是不同的。 特别地,第二级混淆技术可以执行去混淆。

    Enrollment of Physically Unclonable Functions
    3.
    发明申请
    Enrollment of Physically Unclonable Functions 有权
    注册身体不可克隆的功能

    公开(公告)号:US20120131340A1

    公开(公告)日:2012-05-24

    申请号:US12950748

    申请日:2010-11-19

    CPC classification number: H04L9/3278 H04L9/3242 H04L9/3271 H04L9/3273

    Abstract: Aspects of the present disclosure are directed toward a method that includes a physically-unclonable function (PUF) device that receives a communication that includes a first challenge value, a second challenge value and a remote message authenticity value. The method includes the generation of additional challenge-response pairs in a secure manner. The additional challenge-response pairs are securely communicated between the PUF device and an authenticating server or other device for subsequent use in authentication.

    Abstract translation: 本公开的方面涉及一种包括物理不可克隆功能(PUF)设备的方法,该设备接收包括第一挑战值,第二询问值和远程消息真实性值的通信。 该方法包括以安全的方式产生附加的挑战 - 响应对。 附加的挑战 - 响应对在PUF设备和认证服务器或其他设备之间安全地通信,以供随后在认证中使用。

    Enrollment of physically unclonable functions
    4.
    发明授权
    Enrollment of physically unclonable functions 有权
    注册身体不可克隆的功能

    公开(公告)号:US08694778B2

    公开(公告)日:2014-04-08

    申请号:US12950748

    申请日:2010-11-19

    CPC classification number: H04L9/3278 H04L9/3242 H04L9/3271 H04L9/3273

    Abstract: Aspects of the present disclosure are directed toward a method that includes a physically-unclonable function (PUF) device that receives a communication that includes a first challenge value, a second challenge value and a remote message authenticity value. The method includes the generation of additional challenge-response pairs in a secure manner. The additional challenge-response pairs are securely communicated between the PUF device and an authenticating server or other device for subsequent use in authentication.

    Abstract translation: 本公开的方面涉及一种包括物理不可克隆功能(PUF)设备的方法,该设备接收包括第一挑战值,第二询问值和远程消息真实性值的通信。 该方法包括以安全的方式产生附加的挑战 - 响应对。 附加的挑战 - 响应对在PUF设备和认证服务器或其他设备之间安全地通信,以供随后在认证中使用。

    Secure pairing for wired or wireless communications devices
    5.
    发明授权
    Secure pairing for wired or wireless communications devices 有权
    有线或无线通信设备的安全配对

    公开(公告)号:US08813188B2

    公开(公告)日:2014-08-19

    申请号:US11574758

    申请日:2005-08-31

    Abstract: Pairing is achieved between a host communications device and a peripheral communications device, in order to establish an ad hoc wireless or wired network. A device identification, relating uniquely to the peripheral device, is displayed on the host device. In order to accept the pairing, the user confirms that the device identification displayed on the host device matches that printed on the peripheral device, and then completes the pairing procedure by pressing a key on the peripheral device, or, if Near Field Communication (NFC) techniques are implemented in the devices, by placing the peripheral device in contact with, or sufficiently close to, the host device. Thus, secure pairing is achieved, without requiring a complex user interface on the peripheral device.

    Abstract translation: 在主机通信设备和外围通信设备之间实现配对,以便建立自组织无线或有线网络。 在主机设备上显示与外围设备唯一相关的设备标识。 为了接受配对,用户确认主机上显示的设备标识与外围设备上打印的设备相符,然后按外围设备上的键完成配对过程,或者如果近场通信(NFC) )技术通过将外围设备与主机设备接触或足够接近来实现在设备中。 因此,实现安全配对,而不需要在外围设备上的复杂的用户界面。

    Secure Pairing for Wired or Wireless Communications Devices
    6.
    发明申请
    Secure Pairing for Wired or Wireless Communications Devices 有权
    有线或无线通信设备的安全配对

    公开(公告)号:US20080320587A1

    公开(公告)日:2008-12-25

    申请号:US11574758

    申请日:2005-08-31

    Abstract: Pairing is achieved between a host communications device and a peripheral communications device, in order to establish an ad hoc wireless or wired network. A device identification, relating uniquely to the peripheral device, is displayed on the host device. In order to accept the pairing, the user confirms that th.—device identification displayed on the host device matches that printed on the peripheral diwice, and then completes the pairing procedure by pressing a key on the peripheral device, or, if Near Field Communication (NFC) techniques are implemented in the devices, by placing the peripheral device in contact with, or sufficiently close to, the host device. Thus, secure pairing is achieved, without requiring a complex user interface on the peripheral device.

    Abstract translation: 在主机通信设备和外围通信设备之间实现配对,以便建立自组织无线或有线网络。 在主机设备上显示与外围设备唯一相关的设备标识。 为了接受配对,用户确认主机上显示的设备标识符与打印在外围设备上的设备相符,然后通过按下外围设备上的密钥完成配对过程,或者如果近场通信 (NFC)技术通过将外围设备与主机设备接触或充分接近来实现在设备中。 因此,实现安全配对,而不需要在外围设备上的复杂的用户界面。

    Electronic component
    7.
    发明授权
    Electronic component 有权
    电子元器件

    公开(公告)号:US08990519B2

    公开(公告)日:2015-03-24

    申请号:US13306835

    申请日:2011-11-29

    Inventor: Philippe Teuwen

    CPC classification number: G06F21/629 G06F17/50

    Abstract: An electronic component is provided having a plurality of functionalities. The electronic component comprises a control logic, and a non-volatile storage element. The control logic is coupled to the non-volatile storage element and is adapted for storing values in the non-volatile storage element based on an external input signal to the electronic component, each value being indicative for one or more functionalities of the plurality of functionalities. The control logic is adapted for controlling the availability of the plurality of functionalities based on one or more values stored in the non-volatile storage element and for outputting a confirmation signal being indicative for the availability of the plurality of functionalities.

    Abstract translation: 提供具有多个功能的电子部件。 电子部件包括控制逻辑和非易失性存储元件。 控制逻辑耦合到非易失性存储元件,并且适于基于到电子元件的外部输入信号将值存储在非易失性存储元件中,每个值指示多个功能的一个或多个功能 。 控制逻辑适于基于存储在非易失性存储元件中的一个或多个值来控制多个功能的可用性,并且用于输出指示多个功能的可用性的确认信号。

    Watermarking of a processing module
    8.
    发明授权
    Watermarking of a processing module 有权
    处理模块的水印

    公开(公告)号:US08209543B2

    公开(公告)日:2012-06-26

    申请号:US12088717

    申请日:2006-09-25

    Inventor: Philippe Teuwen

    CPC classification number: G06F21/16

    Abstract: The present invention relates to a method for watermarking a processing module. The processing module is designed to process an electronic signal and form a processed signal involving steps of applying a first functional operator to cause a significant alteration to the processed signal. The first operator is embedded in the processing module. Additionally, a second functional operator is provided to co-operate with the first operator-so the alteration is essentially cancelled. The second operator-is adapted to act as an extractable identifier serving as a watermark for the processing module. An advantage with the method is the fact that since the first and the second operators are implemented as functional processing blocks, conventional debugging tools cannot be used to attack the processing module.

    Abstract translation: 本发明涉及一种用于对处理模块进行水印处理的方法。 处理模块被设计为处理电子信号并形成处理的信号,该信号涉及应用第一功能运算符以对处理的信号进行显着改变的步骤。 第一个操作员嵌入在处理模块中。 此外,提供第二功能操作器以与第一操作者合作,因此改变基本上被取消。 第二运算符适于作为用作处理模块的水印的可提取标识符。 该方法的优点在于,由于第一和第二运算符被实现为功能处理块,所以传统的调试工具不能用于攻击处理模块。

    Watermarking of a Processing Module
    10.
    发明申请
    Watermarking of a Processing Module 有权
    处理模块的水印

    公开(公告)号:US20080256361A1

    公开(公告)日:2008-10-16

    申请号:US12088717

    申请日:2006-09-25

    Inventor: Philippe Teuwen

    CPC classification number: G06F21/16

    Abstract: The present invention relates to a method, for watermarking a processing module (105), said processing module (105) being configured to process an electronic signal thereby forming a processed signal, comprising the steps of applying a first functional operator (104) arranged to cause a significant alternation to said processed signal, said first operator (104) being embedded in said processing module (105), and arranging a second functional operator (109) configured to co-operate with said first operator (104) such that said alternation is essentially cancelled. The second operator (109) is adapted to act as an extractable identifier serving as a watermark for said processing module (105). An advantage with the method is the fact that since the first and the second operators are implemented as functional processing blocks, conventional debugging tools can not be used to attack the processing module.

    Abstract translation: 本发明涉及一种用于对处理模块(105)进行水印处理的方法,所述处理模块(105)被配置为处理电子信号从而形成经处理的信号,包括以下步骤:应用第一功能操作器(104) 导致所述处理信号的显着变化,所述第一操作器(104)嵌入在所述处理模块(105)中,并且布置配置为与所述第一操作器(104)协作的第二功能操作器(109),使得所述交替 基本上被取消了。 第二运算符(109)适于作为用作所述处理模块(105)的水印的可提取标识符。 该方法的优点在于,由于第一和第二运算符被实现为功能处理块,所以传统的调试工具不能用于攻击处理模块。

Patent Agency Ranking