Locking changing hard disk content to a hardware token
    21.
    发明申请
    Locking changing hard disk content to a hardware token 失效
    将更改的硬盘内容锁定到硬件令牌

    公开(公告)号:US20070179896A1

    公开(公告)日:2007-08-02

    申请号:US11640485

    申请日:2006-12-18

    IPC分类号: G06Q99/00

    摘要: A method for preventing unauthorized use of a software program on a computing device includes updating a state of a software program on a computing device to an updated state. Transmitting an update signal from the software program to a hardware token coupled to the computing device and updating a state of the hardware token to an updated state in response to the received update signal. Performing a first cryptographic check using the updated state of the software program and the updated state of the hardware token with the hardware token. Transmitting the first cryptographic check from the hardware token to the software program and performing a second cryptographic check using the state of the hardware token and the state of the software program with the computing device. Comparing the second cryptographic check to the first cryptographic check with the computing device, and preventing the software program from running on the computing device if the first cryptographic check does not match the second cryptographic check.

    摘要翻译: 一种用于防止在计算设备上未经授权使用软件程序的方法包括将计算设备上的软件程序的状态更新到更新状态。 将更新信号从软件程序发送到耦合到计算设备的硬件令牌,并响应于所接收到的更新信号将硬件令牌的状态更新到更新状态。 使用硬件令牌的软件程序的更新状态和硬件令牌的更新状态来执行第一密码检查。 将第一加密检查从硬件令牌发送到软件程序,并使用硬件令牌的状态和使用计算设备的软件程序的状态执行第二加密检查。 将第二加密检查与计算设备进行比较,并且如果第一加密检查与第二加密检查不匹配,则防止软件程序在计算设备上运行。

    Method of metering and protecting computer software
    22.
    发明授权
    Method of metering and protecting computer software 失效
    计算和保护计算机软件的方法

    公开(公告)号:US5826011A

    公开(公告)日:1998-10-20

    申请号:US636338

    申请日:1996-04-23

    摘要: A method of protecting computer software on installation is provided by providing an installation media containing an installation program supplied to the user along with an hardware security electrical device (HSED). The HSED must be connected to the user's computer before the software from the installation media can be entered on the user's computer. The HSED contains a variety of secret installation data which is used to install a program to be protected. In general the secret installation data is checked to see if a specific HSED is present and if it contains information to enable the installation process for that particular piece of software to continue. The exact nature of the secret installation data will depend on the process used for protection. The HSED is also used in a method of metering the amount of computer service used such that payment can be made at the time of delivery of the HSED to the end user.

    摘要翻译: 通过提供包含与硬件安全电气设备(HSED)一起提供给用户的安装程序的安装介质来提供安装时保护计算机软件的方法。 必须将HSED连接到用户的计算机,然后才能在用户的计算机上输入安装介质上的软件。 HSED包含各种秘密安装数据,用于安装要保护的程序。 一般来说,秘密安装数据被检查以查看特定的HSED是否存在,并且是否包含用于使该特定软件的安装过程能够继续的信息。 秘密安装数据的确切性质将取决于用于保护的过程。 HSED也用于计量使用的计算机服务量的方法,使得可以在向最终用户发送HSED时进行支付。

    PROTECTING GUEST VIRTUAL MACHINE MEMORY
    23.
    发明申请
    PROTECTING GUEST VIRTUAL MACHINE MEMORY 失效
    保护客户虚拟机记忆

    公开(公告)号:US20120233378A1

    公开(公告)日:2012-09-13

    申请号:US13045232

    申请日:2011-03-10

    申请人: Laszlo Elteto

    发明人: Laszlo Elteto

    IPC分类号: G06F12/00

    摘要: A hypervisor runs on a host computer system and defines at least one virtual machine. An address space of the virtual machine resides on physical memory of the host computer system under control of the hypervisor. A guest operating system runs in the virtual machine. At least one of a host operating system and the hypervisor sets parts of the address space of the host computer system corresponding to parts of the address space of the virtual machine to a locked state in which those parts can be read but not written to.

    摘要翻译: 虚拟机管理程序在主机计算机系统上运行,并定义至少一个虚拟机。 虚拟机的地址空间驻留在主机计算机系统的物理内存上,在管理程序的控制下。 客户机操作系统在虚拟机中运行。 主机操作系统和管理程序中的至少一个将与虚拟机的地址空间的一部分相对应的主计算机系统的地址空间的部分设置为可以读取但不写入的部分的锁定状态。

    Database obfuscation system and method
    24.
    发明授权
    Database obfuscation system and method 有权
    数据库混淆系统和方法

    公开(公告)号:US08117221B2

    公开(公告)日:2012-02-14

    申请号:US12616247

    申请日:2009-11-11

    IPC分类号: G06F17/30

    CPC分类号: G06F21/6227 G06F21/105

    摘要: A system and method for obfuscating a database's schema while preserving its functionality by modifying the original table names, column names, table order, column order, and/or data character set such that the standard order of the original characters is maintained.

    摘要翻译: 一种用于模糊数据库模式的系统和方法,同时通过修改原始表名,列名,表顺序,列顺序和/或数据字符集来保持其功能,从而保持原始字符的标准顺序。

    System and methods for detecting rollback
    25.
    发明申请
    System and methods for detecting rollback 有权
    用于检测回滚的系统和方法

    公开(公告)号:US20090265348A1

    公开(公告)日:2009-10-22

    申请号:US12148189

    申请日:2008-04-16

    申请人: Laszlo Elteto

    发明人: Laszlo Elteto

    IPC分类号: G06F7/02

    摘要: In an embodiment of a method of and system for detecting rollback of usage data, the usage data is recording in a database. A sequence value in the database is repeatedly advanced. A copy of the sequence value is repeatedly saved to protected storage. The copy of the sequence value in the protected storage is compared with the sequence value in the database, and it is determined whether the result of the comparison is consistent with normal operation of the database since the previous save to protected storage.

    摘要翻译: 在用于检测使用数据的回滚的方法和系统的实施例中,使用数据是在数据库中进行记录。 数据库中的序列值被重复提前。 将序列值的副本重复保存到受保护的存储。 将受保护存储器中的序列值的副本与数据库中的序列值进行比较,并确定比较的结果是否与先前保存到受保护存储的数据库的正常操作一致。

    Method and apparatus for providing secure communications between a computer and a smart card chip
    26.
    发明申请
    Method and apparatus for providing secure communications between a computer and a smart card chip 审中-公开
    用于在计算机和智能卡芯片之间提供安全通信的方法和装置

    公开(公告)号:US20050182934A1

    公开(公告)日:2005-08-18

    申请号:US11040201

    申请日:2005-01-21

    申请人: Laszlo Elteto

    发明人: Laszlo Elteto

    IPC分类号: H04L9/00 H04L9/08 H04L9/30

    CPC分类号: H04L9/0825 H04L9/0838

    摘要: A method of securing communications between a host computer and a token having a smart card processor, which token is communicatively coupled to the host computer via a USB-compliant interface, includes the steps of requesting token information when the token is coupled to the host computer, and initializing communications with the token, including establishing an encryption key between the token and the host computer. The encryption key is established between the token and the host computer by the steps of receiving a token public key Kpu from the token, encrypting a random key Kr with the token public key Kpu and transmitting the encrypted random key EKpu(Kr) to the token.

    摘要翻译: 一种保护主计算机和具有智能卡处理器的令牌之间的通信的方法,该令牌通过USB兼容接口通信地耦合到主计算机,包括以下步骤:当令牌耦合到主计算机时请求令牌信息 ,并初始化与令牌的通信,包括在令牌和主机之间建立加密密钥。 通过从令牌接收令牌公开密钥Kpu,用令牌公开密钥Kpu加密随机密钥Kr,并且发送加密的随机密钥E KPU,在令牌和主计算机之间建立加密密钥, SUB(Kr)到令牌。

    Method and system for secure distribution of protected data using
elliptic curve systems
    27.
    发明授权
    Method and system for secure distribution of protected data using elliptic curve systems 失效
    使用椭圆曲线系统对受保护数据进行安全分配的方法和系统

    公开(公告)号:US5737424A

    公开(公告)日:1998-04-07

    申请号:US658072

    申请日:1996-06-04

    摘要: A method and system for secure distribution of protected data using elliptic curve systems includes a program to unlock software. The user obtains an encrypted unlocking code from a processing center and enters it into the unlocking program, which decrypts the message, yielding the unlocking code, then uses the unlocking code to unlock the software. To encrypt the unlocking code, the processing center selects an appropriate unlocking code using information received from the user, selects an elliptic curve to use, selects a first point on the elliptic curve having an index corresponding to the information to be encrypted, generates a delta key and a center key and the finite field inverse of the center key, selects a second point on the elliptic curve which is the product of the inverse of the center key and the first point, and generates an index of the second point, which, with the delta key, is the encrypted information. To decrypt the unlocking code, the user system generates the center key, selects a point on the elliptic curve having an index corresponding to the received point index, selects a second point on the elliptic curve which is the product of the first point and the center key, and generates the index of the second point, which is the decrypted unlocking code.

    摘要翻译: 使用椭圆曲线系统来保护数据的安全分发的方法和系统包括解锁软件的程序。 用户从处理中心获取加密的解锁代码,并将其输入解锁程序,解锁该消息,产生解锁码,然后使用解锁码解锁软件。 为了加密解锁码,处理中心使用从用户接收的信息选择适当的解锁码,选择要使用的椭圆曲线,选择具有与要加密的信息相对应的索引的椭圆曲线上的第一点,生成三角形 键和中心键和中心键的有限域反相,选择椭圆曲线上的第二点,该第二点是中心键与第一点的倒数的乘积,并生成第二点的指标, 使用delta键,是加密信息。 为了解密解密码,用户系统生成中心键,选择椭圆曲线上具有与接收到的点索引对应的索引的点,选择作为第一点和中心的乘积的椭圆曲线上的第二点 键,并生成第二个点的索引,这是解密的解锁码。