Partitioning a data stream using embedded anchors
    2.
    发明授权
    Partitioning a data stream using embedded anchors 有权
    使用嵌入式锚点分割数据流

    公开(公告)号:US08234413B2

    公开(公告)日:2012-07-31

    申请号:US13152110

    申请日:2011-06-02

    IPC分类号: G06F15/16

    CPC分类号: G06F17/30156

    摘要: Selecting a segment boundary within block b is disclosed. A first anchor location j|j+1 is identified wherein a value of f(b[j−A+1 . . . j+B]) satisfies a constraint and wherein A and B are non-negative integers. A segment boundary location k|k+1 is determined wherein k is greater than minimum distance from j.

    摘要翻译: 公开了在块b内选择段边界。 识别第一锚定位置j | j + 1,其中f(b [j-A + 1 ... j + B])的值满足约束,并且其中A和B是非负整数。 确定分段边界位置k | k + 1,其中k大于距j的最小距离。

    PARTITIONING A DATA STREAM USING EMBEDDED ANCHORS
    3.
    发明申请
    PARTITIONING A DATA STREAM USING EMBEDDED ANCHORS 有权
    使用嵌入式锚杆分割数据流

    公开(公告)号:US20110302326A1

    公开(公告)日:2011-12-08

    申请号:US13152110

    申请日:2011-06-02

    IPC分类号: G06F15/16

    CPC分类号: G06F17/30156

    摘要: Selecting a segment boundary within block b is disclosed. A first anchor location j|j+1 is identified wherein a value of f(b[j−A+1 . . . j+B]) satisfies a constraint and wherein A and B are non-negative integers. A segment boundary location k|k+1 is determined wherein k is greater than minimum distance from j.

    摘要翻译: 公开了在块b内选择段边界。 识别第一锚定位置j | j + 1,其中f(b [j-A + 1 ... j + B])的值满足约束,并且其中A和B是非负整数。 确定分段边界位置k | k + 1,其中k大于距j的最小距离。

    Software Self-Defense Systems and Methods
    4.
    发明申请
    Software Self-Defense Systems and Methods 有权
    软件自卫系统与方法

    公开(公告)号:US20110035733A1

    公开(公告)日:2011-02-10

    申请号:US12854685

    申请日:2010-08-11

    IPC分类号: G06F9/45 G06F12/14

    摘要: Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.

    摘要翻译: 公开了用于保护计算机程序免于未经授权的分析和修改的系统和方法。 混淆变换可以应用于计算机程序的本地结构,控制图和/或数据结构,以使程序更难于理解和/或修改。 防篡改机制可以并入计算机程序中,以检测篡改程序操作的尝试。 一旦检测到篡改计算机程序的尝试,则计算机程序将其报告给外部代理,停止正常操作,和/或反转由所尝试的篡改所做的任何修改。 计算机程序也可以加水印以便于其所有者的识别。 混淆,防篡改和水印变换可以应用于计算机程序的源代码,目标代码或可执行映像。

    Software self-defense systems and methods
    7.
    发明授权
    Software self-defense systems and methods 有权
    软件自卫系统和方法

    公开(公告)号:US07430670B1

    公开(公告)日:2008-09-30

    申请号:US09629546

    申请日:2000-07-31

    IPC分类号: G06F12/14

    摘要: Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.

    摘要翻译: 公开了用于保护计算机程序免于未经授权的分析和修改的系统和方法。 混淆变换可以应用于计算机程序的本地结构,控制图和/或数据结构,以使程序更难于理解和/或修改。 防篡改机制可以并入计算机程序中,以检测篡改程序操作的尝试。 一旦检测到篡改计算机程序的尝试,则计算机程序将其报告给外部代理,停止正常操作,和/或反转由所尝试的篡改所做的任何修改。 计算机程序也可以加水印以便于其所有者的识别。 混淆,防篡改和水印变换可以应用于计算机程序的源代码,目标代码或可执行映像。