COLLABORATIVE RECONCILIATION OF APPLICATION TRUSTWORTHINESS
    1.
    发明申请
    COLLABORATIVE RECONCILIATION OF APPLICATION TRUSTWORTHINESS 审中-公开
    应用信息的协同重新配置

    公开(公告)号:WO2010092138A2

    公开(公告)日:2010-08-19

    申请号:PCT/EP2010/051754

    申请日:2010-02-12

    Abstract: A mobile terminal receives trustworthiness information for a software application by receiving a voucher that indicates the trustworthiness of that application as represented by a third party. To ensure the integrity of this information, the mobile terminal authenticates the voucher and verifies that the software application is the one having its trustworthiness indicated by the voucher. Given such indications of trustworthiness, a user of the mobile terminal may decide whether install and run it. If decided in the affirmative, the user may form his or her own basis for the trustworthiness of the software application. Accordingly, the mobile terminal may also create a new voucher that indicates the trustworthiness of the software application as represented by the user. With third parties representing the trustworthiness of software applications in this manner, their development is not hindered by the imposition of security requirements on application developers.

    Abstract translation: 移动终端通过接收指示由第三方表示的该应用的可信赖性的凭单来接收软件应用的可信赖信息。 为了确保该信息的完整性,移动终端对凭证进行身份验证,并验证该软件应用程序是否具有凭证所示的可信赖性。 给定这种可信度的指示,移动终端的用户可以决定是否安装并运行它。 如果确定为肯定的,用户可以形成他或她自己的软件应用的可信赖性的基础。 因此,移动终端还可以创建指示由用户表示的软件应用程序的可信赖性的新凭证。 由于第三方以这种方式代表软件应用程序的可信赖性,因此对应用程序开发人员施加安全要求并不妨碍其开发。

    TECHNIQUE FOR DETERMINING A MALIGN OR NON-MALIGN BEHAVIOR OF AN EXECUTABLE FILE
    2.
    发明申请
    TECHNIQUE FOR DETERMINING A MALIGN OR NON-MALIGN BEHAVIOR OF AN EXECUTABLE FILE 审中-公开
    用于确定可执行文件的恶性或非恶性行为的技术

    公开(公告)号:WO2014008961A1

    公开(公告)日:2014-01-16

    申请号:PCT/EP2012/076161

    申请日:2012-12-19

    Abstract: A technique for determining a malign or non-malign behavior of an executable file is disclosed. In a first method aspect, the method comprises the steps of first acquiring a first behavior profile of the executable file, the first behavior profile comprising a first observable execution trace of the executable file from an emulated environment, second acquiring a second behavior profile of the executable file, the second behavior profile comprising a second observable execution trace of the executable file from a real environment, and comparing the first and second observable execution traces so as to determine the malign or non-malign behavior of the executable file. In another method aspect, the method comprises the steps of receiving a trigger condition, collecting, responsive to the trigger condition, first and second behavior profiles of the executable file from first and second one of two or more file-execution devices, the first and second behavior profiles comprising first and second observable execution traces of the executable file, and the first and second observable execution traces being non-mapped to the first and second file- execution device, respectively.

    Abstract translation: 公开了一种用于确定可执行文件的恶性或非恶性行为的技术。 在第一方法方面,所述方法包括以下步骤:首先获取所述可执行文件的第一行为简档,所述第一行为简档包括来自仿真环境的所述可执行文件的第一可观察执行跟踪,第二获取所述可执行文件的第二行为简档 可执行文件,所述第二行为简档包括来自真实环境的所述可执行文件的第二可观察执行轨迹,以及比较所述第一和第二可观察执行轨迹,以便确定所述可执行文件的恶性或非恶性行为。 在另一方法方面,该方法包括以下步骤:接收触发条件,响应于触发条件,从两个或多个文件执行装置中的第一和第二个文件执行装置收集可执行文件的第一和第二行为简档,第一和 第二行为简档包括可执行文件的第一和第二可观察执行轨迹,并且第一和第二可观察执行轨迹分别被非映射到第一和第二文件执行装置。

    OBFUSCATING COMPUTER PROGRAM CODE
    3.
    发明申请
    OBFUSCATING COMPUTER PROGRAM CODE 审中-公开
    OBFUSCATING计算机程序代码

    公开(公告)号:WO2008074483A1

    公开(公告)日:2008-06-26

    申请号:PCT/EP2007/011156

    申请日:2007-12-19

    CPC classification number: G06F21/14

    Abstract: A computer-implemented method of tamper-protecting a computer program, the method comprising: processing an input representation of the computer program to identify a function call for causing a data processing system to continue execution of the computer program at a predetermined entry point memory address when said computer program is executed by a data processing system; replacing the identified function call with a modified function call, wherein the modified function call includes an algebraic expression for causing the data processing system to compute the entry point memory address when said computer program is executed by the data processing system.

    Abstract translation: 一种用于篡改保护计算机程序的计算机实现的方法,所述方法包括:处理所述计算机程序的输入表示,以识别使数据处理系统在预定入口点存储器地址上继续执行所述计算机程序的功能调用 当所述计算机程序由数据处理系统执行时; 用经修改的函数调用替换所识别的函数调用,其中所述修改的函数调用包括用于使所述数据处理系统在所述数据处理系统执行所述计算机程序时计算入口点存储器地址的代数表达式。

    VIEW SYNTHESIS USING LOW RESOLUTION DEPTH MAPS
    4.
    发明申请
    VIEW SYNTHESIS USING LOW RESOLUTION DEPTH MAPS 审中-公开
    查看使用低分辨率深度的合成

    公开(公告)号:WO2013156250A1

    公开(公告)日:2013-10-24

    申请号:PCT/EP2013/056075

    申请日:2013-03-22

    CPC classification number: H04N13/111 G06T15/205 H04N13/161 H04N19/597

    Abstract: View synthesis is performed based on obtained texture data and a depth map. The resolution of the depth map is lower than that of the texture data by a ratio dw in the x direction and by a ratio dh in the y direction. Texture pixel positions x, y are transformed into non-integer depth map pixel positions by performing divisions x/dw and y/dh and these non-integer depth map pixel positions are rounded to integer depth map pixel positions, and a view is synthesized based at least on the obtained texture data and depth map values at the integer depth map pixel positions and/or adjacent positions.

    Abstract translation: 基于获得的纹理数据和深度图执行视图合成。 深度图的分辨率比纹理数据的分辨率低x方向的比dw和y方向的比dh。 纹理像素位置x,y通过执行分割x / dw和y / dh而变换为非整数深度图像素位置,并且这些非整数深度图像素位置被舍入到整数深度图像素位置,并且基于 至少在整数深度图像素位置和/或相邻位置上获得的纹理数据和深度图值。

    SECURE CLIENT-SIDE AGGREGATION OF WEB APPLICATIONS
    6.
    发明申请
    SECURE CLIENT-SIDE AGGREGATION OF WEB APPLICATIONS 审中-公开
    WEB应用的安全客户端聚合

    公开(公告)号:WO2010102933A2

    公开(公告)日:2010-09-16

    申请号:PCT/EP2010/052682

    申请日:2010-03-03

    CPC classification number: G06F21/629 G06F2221/2141 H04L63/101 H04L67/02

    Abstract: A web browser client includes an aggregated web application runtime environment that controls access by a program fragment of an aggregated web application to a resource therein based upon the originating domain of the program fragment To do so, the aggregated web application runtime environment appends an access attribute to the Document Object Model (DOM) node associated with the resource This access attribute is associated with a plurality of access rights definitions where each access rights definition defines a set of access rights to the resource for program fragments originating from a domain with a specific access rights status Accordingly, the aggregated web application runtime environment sets one or more access rights statuses of the originating domain of the program fragment, and thereafter, grants or denies the program fragment access to the resource based upon one or more sets of access rights defined for that program fragment

    Abstract translation: Web浏览器客户端包括聚合的Web应用运行时环境,其基于节目片段的始发域,将聚合的Web应用的程序片段的访问控制到其中的资源。为此,聚合的Web应用运行时环境附加访问属性 与资源相关联的文档对象模型(DOM)节点此访问属性与多个访问权限定义相关联,其中每个访问权限定义定义了源自具有特定访问权限的域的程序片段的资源的一组访问权限 权利状态因此,聚合的Web应用程序运行时环境设置程序片段的始发域的一个或多个访问权限状态,此后,基于为一个或多个访问权限集合定义的一个或多个访问权限集授予或拒绝对该资源的程序片段访问 那个程序片段

    OBFUSCATING EXECUTION TRACES OF COMPUTER PROGRAM CODE
    7.
    发明申请
    OBFUSCATING EXECUTION TRACES OF COMPUTER PROGRAM CODE 审中-公开
    计算机程序代码的执行跟踪

    公开(公告)号:WO2009003894A1

    公开(公告)日:2009-01-08

    申请号:PCT/EP2008/058091

    申请日:2008-06-25

    Abstract: A computer-implemented method of generating tamper-protected computer program code. The method comprises obtaining a representation of the computer program code, the computer program code being adapted to cause a data processing system to perform a plurality of computational tasks in a first order of execution, each computational task being represented in the representation of the computer program code by at least one program statement; obtaining a plurality of alternative orders of execution of the computational tasks; generating an executable representation of the program code adapted to cause a data processing system to select a randomized order of execution from the plurality of alternative orders of execution and to execute the computational tasks in the selected randomized order of execution.

    Abstract translation: 一种计算机实现的生成防篡改计算机程序代码的方法。 该方法包括获得计算机程序代码的表示,所述计算机程序代码适于使数据处理系统以第一执行顺序执行多个计算任务,每个计算任务在计算机程序的表示中表示 代码至少有一个程序语句; 获得执行计算任务的多个替代顺序; 生成所述程序代码的可执行表示,所述程序代码适于使数据处理系统从所述多个替代执行顺序中选择执行的随机化顺序,并以所选择的随机执行顺序执行所述计算任务。

    OBFUSCATING COMPUTER PROGRAM CODE
    8.
    发明申请
    OBFUSCATING COMPUTER PROGRAM CODE 审中-公开
    OBFUSCATING计算机程序代码

    公开(公告)号:WO2008074382A1

    公开(公告)日:2008-06-26

    申请号:PCT/EP2007/010018

    申请日:2007-11-20

    CPC classification number: G06F21/14

    Abstract: A computer-implemented method of tamper-protecting computer program code. The method comprises: obtaining an input representation of the computer program code; identifying a conditional program statement for causing a data processing system to selectively execute one of at least a first and a second sets of program statements when said computer program is executed by a data processing system; replacing said identified conditional program statement and the first and second sets of program statements with a set of transformed program statements to obtain obfuscated program code, wherein the set of transformed program statements is adapted to cause the data processing system to execute at least a part of each of the transformed program statements when said computer program is executed by the data processing system.

    Abstract translation: 篡改保护计算机程序代码的计算机实现的方法。 该方法包括:获得计算机程序代码的输入表示; 识别用于当所述计算机程序由数据处理系统执行时使数据处理系统选择性地执行至少第一和第二组程序语句中的一个的条件程序语句; 用一组变换的程序语句替换所述识别的条件程序语句和第一和第二组程序语句以获得混淆的程序代码,其中该组变换的程序语句适于使数据处理系统执行至少一部分 当所述计算机程序由数据处理系统执行时,每个转换的程序语句

    METHOD AND ARRANGEMENT FOR PROCESSING A STEREO IMAGE FOR THREE-DIMENSIONAL VIEWING
    10.
    发明申请
    METHOD AND ARRANGEMENT FOR PROCESSING A STEREO IMAGE FOR THREE-DIMENSIONAL VIEWING 审中-公开
    用于处理三维图像的立体图像的方法和装置

    公开(公告)号:WO2010136375A1

    公开(公告)日:2010-12-02

    申请号:PCT/EP2010/056942

    申请日:2010-05-20

    CPC classification number: H04N13/133 H04N13/239 H04N13/25

    Abstract: A method of processing a stereo image for three-dimensional viewing is disclosed. The stereo image comprises a first view captured by a first image acquiring arrangement and a second view captured by a second image acquiring arrangement. The first view has a first information content and the second view has a second information content, the first information content comprising more information than the second information content. The method comprises stereo matching of the first and second view, transferring information data from the first information content to the second view, and producing an updated second view having an updated information content by merging the transferred information data with information data of the second information content. Corresponding computer program product, arrangement and electronic device are also disclosed.

    Abstract translation: 公开了一种处理用于三维观看的立体图像的方法。 立体图像包括由第一图像获取装置捕获的第一视图和由第二图像获取装置捕获的第二视图。 第一视图具有第一信息内容,第二视图具有第二信息内容,第一信息内容包括比第二信息内容更多的信息。 该方法包括第一和第二视图的立体匹配,将信息数据从第一信息内容传送到第二视图,并且通过将传送的信息数据与第二信息内容的信息数据合并来产生具有更新的信息内容的更新的第二视图 。 还公开了相应的计算机程序产品,布置和电子设备。

Patent Agency Ranking