Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 11. Отображено 11.
07-01-2016 дата публикации

DATA PROCESSING

Номер: US20160006541A1
Принадлежит:

A method of processing data according to a first predetermined function, the method comprising: receiving an encoded amount of data, wherein the encoded amount of data is an amount of data that has been encoded using an error control code; and processing the encoded amount of data using a second predetermined function to generate an output; wherein the second redetermined function corresponds to the first redetermined function in that the result of processing, with the second predetermined function, a quantity of data encoded using the error control code equals the result of encoding with the error control code the result of processing the quantity of data with the first predetermined function. 1. A method of processing data according to a first predetermined function , the method comprising:receiving an encoded amount of data, wherein the encoded amount of data is an amount of data that has been encoded using an error control code; andprocessing the encoded amount of data using a second predetermined function to generate an output;wherein the second predetermined function corresponds to the first predetermined function in that the result of processing, with the second predetermined function, a quantity of data encoded using the error control code equals the result of encoding with the error control code the result of processing the quantity of data with the first predetermined function.2. The method of claim 1 , comprising:using the error control code to detect whether there is an error in the received encoded amount of data or whether there is an error in the output and, if an error is detected, performing one or more of:(a) setting the output to be substantially unrelated to the received encoded amount of data;(b) setting the output to be a random value;(c) performing an error correction decoding operation of the error control code on the received encoded amount of data or on the output;(d) ceasing further processing operations.3. A method of enabling a data ...

Подробнее
14-01-2016 дата публикации

AES IMPLEMENTATION WITH ERROR CORRECTION

Номер: US20160012237A1
Принадлежит:

A method of cryptographically processing a block of data, the method comprising: receiving an encoded version of the block of data, wherein the encoded version of the block of data comprises the block of data encoded, at least in part, using an error control code; and processing the encoded version of the block of data using a predetermined function to generate an output, wherein the predetermined function is arranged so that the result of processing, with the predetermined function, a quantity of data encoded, at least in part, using the error control code equals the result of encoding, at least in part, with the error control code the result of performing encryption or decryption of the quantity of data according to the Advanced Encryption Standard, AES. 112-. (canceled)13. A method of cryptographically processing a block of data , the method comprising:receiving an encoded version of the block of data, wherein the encoded version of the block of data comprises the block of data encoded, at least in part, using an error control code; andprocessing the encoded version of the block of data using a predetermined function to generate an output, wherein the predetermined function is arranged so that the result of processing, with the predetermined function, a quantity of data encoded, at least in part, using the error control code equals the result of encoding, at least in part, with the error control code the result of performing encryption or decryption of the quantity of data according to the Advanced Encryption Standard, AES.14. The method of claim 13 , wherein the predetermined function comprises one or more sub-functions claim 13 , wherein each of the sub-functions is arranged so that the result of processing claim 13 , with that sub-function claim 13 , a quantity of data encoded claim 13 , at least in part claim 13 , using the error control code equals the result of encoding claim 13 , at least in part claim 13 , with the error control code the result of ...

Подробнее
18-02-2021 дата публикации

SECURING WEBPAGES, WEBAPPS AND APPLICATIONS

Номер: US20210049248A1
Принадлежит: IRDETO B.V.

A method for securing a webpage or a webapp processed by a browser executing on a client system, the method comprising the browser executing an instance of white-box protected code, wherein execution of the instance of white-box protected code causes the client system to: generate a message comprising message data for use by a control system to perform one or more security tests, the control system communicably connected to the client system via a network; send the message to the control system to enable the control system to perform the one or more security tests using the message data; receive a response from the control system based, at least in part, on the message; and process the response. 1. A method for securing a webpage or a webapp processed by a browser executing on a client system , the method comprising the browser executing an instance of white-box protected code , wherein execution of the instance of white-box protected code causes the client system to:generate a message comprising message data for use by a control system to perform one or more security tests, the control system communicably connected to the client system via a network, wherein at least part of the message data is indicative of an identity of the instance of white-box protected code;send the message to the control system to enable the control system to perform the one or more security tests using the message data;receive a response from the control system based, at least in part, on the message; andprocess the response.2. A method for securing a webpage or a webapp processed by a browser executing on a client system , the method comprising , at a control system communicably connected to the client system via a network:receiving a message from the client system, the message comprising message data for use by the control system to perform one or more security tests, the message generated by an instance of white-box protected code being executed by the browser, wherein at least part of ...

Подробнее
25-02-2021 дата публикации

SECURING SOFTWARE ROUTINES

Номер: US20210056201A1
Принадлежит: IRDETO B.V.

A method of securing a software routine implemented in a software instance executing in an execution environment, the method comprising: initializing a code block of the software instance with a reference to the software routine by storing the reference such that the stored reference is inaccessible to code outside of the code block; and returning a reference to the code block, the reference to the code block used by the software instance outside of the code block to invoke the software routine; wherein the code block is configured to: (a) invoke the software routine using the stored reference, and, (b) after a predetermined number of invocations of the software routine by the code block, modify the stored reference so as to prevent further invocation of the software routine by the code block. 1. A method of securing a software routine implemented in a software instance executing in an execution environment , the method comprising:initializing a code block of the software instance with a reference to the software routine by storing the reference such that the stored reference is inaccessible to code outside of the code block; andreturning a reference to the code block, the reference to the code block used by the software instance outside of the code block to invoke the software routine; (a) invoke the software routine using the stored reference, and,', '(b) after a predetermined number of invocations of the software routine by the code block, modify the stored reference so as to prevent further invocation of the software routine by the code block., 'wherein the code block is configured to2. A method of executing a software routine in a software instance executing in an execution environment , the method comprising: invoking the software routine using a reference to the software routine, the reference to the software routine stored as part of initialization of the code block such that the stored reference is inaccessible to code outside of the code block; and', 'upon ...

Подробнее
12-05-2022 дата публикации

SECURING SOFTWARD ROUTINES

Номер: US20220147618A1
Принадлежит: IRDETO B.V.

A method of securing a software routine implemented in a software instance executing in an execution environment, the method comprising: initializing a code block of the software instance with a reference to the software routine by storing the reference such that the stored reference is inaccessible to code outside of the code block; and returning a reference to the code block, the reference to the code block used by the software instance outside of the code block to invoke the software routine; wherein the code block is configured to: (a) invoke the software routine using the stored reference, and, (b) after a predetermined number of invocations of the software routine by the code block, modify the stored reference so as to prevent further invocation of the software routine by the code block. 1. A method of securing a software routine implemented in a software instance executing in an execution environment , the method comprising:initializing a code block of the software instance by storing corruption data such that the stored corruption data is inaccessible to code outside of the code block; andreturning a reference to the code block, the reference to the code block used by the software instance outside of the code block to invoke the software routine, (i) invoke the software routine, said invocation comprising applying the stored corruption data to modify software routine data, and', '(ii) update the stored corruption data based on the invocation of the software routine,, 'wherein the code block is configured to receive fix-up data corresponding to the stored corruption data, and', 'obtain a result for the software routine by applying the fix-up data to software routine data to thereby compensate for said modification., 'wherein the software instance is configured to2. The method of wherein the step of initializing further comprises:storing a reference to the software routine such that the stored reference is inaccessible to code outside of the code block, ...

Подробнее
27-04-2017 дата публикации

OPTIMIZING AND PROTECTING SOFTWARE

Номер: US20170116396A1
Принадлежит: IRDETO B.V.

A method comprising: carrying out optimization of an item of software in a first intermediate representation; carrying out protection of the item of software in a second intermediate representation different to the first intermediate representation. 1. A method comprising:carrying out optimization of an item of software in a first intermediate representation;carrying out protection of the item of software in a second intermediate representation different to the first intermediate representation.2. The method of wherein carrying out optimization comprises carrying out optimization in the first intermediate representation both before and after carrying out protection in the second intermediate representation.3. The method of further comprising converting the item of software from the first intermediate representation to the second intermediate representation after carrying out optimization and before subsequently carrying out protection claim 2 , and converting from the second intermediate representation to the first intermediate representation after carrying out protection and before subsequently carrying out optimization.4. The method of wherein carrying out protection comprises carrying out protection in the second intermediate representation both before and after carrying out optimization in the first intermediate representation.5. The method of any preceding claim wherein the first intermediate representation is LLVM intermediate representation claim 1 , LLVM IR.6. The method of any preceding claim wherein the optimization comprises optimization for one or more of size claim 1 , runtime speed and runtime memory requirement claim 1 , and usage of core and GPU processors claim 1 , of the item of software.7. The method of any preceding claim wherein carrying out protection of the item of software in a second intermediate representation comprises applying one or more protection techniques to the item of software.8. The method of wherein the one or more protection ...

Подробнее
11-07-2019 дата публикации

Method and Apparatus for Policy-Based Management of Assets

Номер: US20190215342A1
Принадлежит: IRDETO B.V.

A method and system for managing shared use of an asset. An asset device and an owner device accomplish an initial setup procedure to register the owner with the asset. One or more secure policies are then sent from the owner device, or another device authorized to create policies, to one or more user devices. The policies express user conditions and limitations for using the asset. Subsequently, the user device transmits the secure policy to the asset device. Once the policy has been transferred from the user device to the asset device, user associated with the user device can request use of the asset and will be granted the requested use if the requested use is permitted by the policy. 1. A method implemented by one or more computing devices for managing use of an asset , the method comprising:accomplishing a registration procedure between an asset device associated with an asset and an owner device associated with an owner of the asset;transmitting a secure policy associated with the user from a policy owner device to a user device associated with a user, wherein the secure policy expresses conditions and limitations for using the asset and is distinct from cryptographic keys used to secure the communication to the asset.;transmitting the secure policy from user device to the asset device;requesting, by the user device, a specified use of the asset; andgranting the request only when the requested use is permitted by the policy.2. The method of claim 1 , wherein the secure policy is bound to a fingerprint of the user device and further comprising the policy owner device encrypting and signing the policy.3. The method of claim 2 , wherein the policy owner device is controlled by the owner of the asset.4. The method of claim 2 , wherein the policy owner device is controlled by a party other than the owner of the asset who has been given rights to create policies.5. The method of claim 2 , wherein the asset device stores a data structure including a user ID claim 2 , ...

Подробнее
27-12-2018 дата публикации

SECURING WEBPAGES, WEBAPPS AND APPLICATIONS

Номер: US20180373849A1
Принадлежит: IRDETO B.V.

A method for securing a webpage or a webapp processed by a browser executing on a client system, the method comprising the browser executing an instance of white-box protected code, wherein execution of the instance of white-box protected code causes the client system to: generate a message comprising message data for use by a control system to perform one or more security tests, the control system communicably connected to the client system via a network; send the message to the control system to enable the control system to perform the one or more security tests using the message data; receive a response from the control system based, at least in part, on the message; and process the response. 1. A method for securing a webpage or a webapp processed by a browser executing on a client system , the method comprising the browser executing an instance of white-box protected code , wherein execution of the instance of white-box protected code causes the client system to:generate a message comprising message data for use by a control system to perform one or more security tests, the control system communicably connected to the client system via a network;send the message to the control system to enable the control system to perform the one or more security tests using the message data;receive a response from the control system based, at least in part, on the message; andprocess the response.2. A method for securing a webpage or a webapp processed by a browser executing on a client system , the method comprising , at a control system communicably connected to the client system via a network:receiving a message from the client system, the message comprising message data for use by the control system to perform one or more security tests, the message generated by an instance of white-box protected code being executed by the browser;performing the one or more security tests using the message data;generating a response based, at least in part, on the message; andsending the ...

Подробнее
02-10-2014 дата публикации

Data processing

Номер: WO2014154271A1
Принадлежит: IRDETO B.V.

A method of processing data according to a first predetermined function, the method comprising: receiving an encoded amount of data, wherein the encoded amount of data is an amount of data that has been encoded using an error control code; and processing the encoded amount of data using a second predetermined function to generate an output; wherein the second predetermined function corresponds to the first predetermined function in that the result of processing, with the second predetermined function, a quantity of data encoded using the error control code equals the result of encoding with the error control code the result of processing the quantity of data with the first predetermined function.

Подробнее
26-05-2022 дата публикации

Method and Apparatus for Policy-Based Management of Assets

Номер: US20220166802A1
Принадлежит: Irdeto BV

A method and system for managing shared use of an asset. An asset device and an owner device accomplish an initial setup procedure to register the owner with the asset. One or more secure policies are then sent from the owner device, or another device authorized to create policies, to one or more user devices. The policies express user conditions and limitations for using the asset. Subsequently, the user device transmits the secure policy to the asset device. Once the policy has been transferred from the user device to the asset device, user associated with the user device can request use of the asset and will be granted the requested use if the requested use is permitted by the policy.

Подробнее
12-09-2023 дата публикации

Securing software routines

Номер: US11755724B2
Принадлежит: Irdeto BV

A method of securing a software routine implemented in a software instance executing in an execution environment, the method comprising: initializing a code block of the software instance with a reference to the software routine by storing the reference such that the stored reference is inaccessible to code outside of the code block; and returning a reference to the code block, the reference to the code block used by the software instance outside of the code block to invoke the software routine; wherein the code block is configured to: (a) invoke the software routine using the stored reference, and, (b) after a predetermined number of invocations of the software routine by the code block, modify the stored reference so as to prevent further invocation of the software routine by the code block.

Подробнее