-
公开(公告)号:US20230196195A1
公开(公告)日:2023-06-22
申请号:US17982896
申请日:2022-11-08
申请人: IRDETO B.V.
发明人: Thomas HICKIE , Shufei HE
IPC分类号: G06N20/00
CPC分类号: G06N20/00
摘要: A method for identifying whether a classification system is configured to use a specific machine-learning classification model, the method comprising: using the classification system to generate, for each test sample in a predetermined test set that comprises a plurality of test samples, a corresponding classification result; and identifying either (i) that the classification system is using the specific machine-learning classification model if, for each test sample in the test set, the corresponding classification result matches a classification result produced for that test sample using the specific machine-learning classification model or (ii) that the classification system is not using the specific machine-learning classification model if there is a test sample in the test set for which the corresponding classification result does not match the classification result produced for that test sample using the specific machine-learning classification model; wherein the test set is associated with the specific machine-learning classification model and, for each test sample in the test set, there is a corresponding small modification for that test sample that causes a change in the classification result produced for that test sample using the specific machine-learning classification model.
-
公开(公告)号:US11606211B2
公开(公告)日:2023-03-14
申请号:US16489389
申请日:2018-03-08
申请人: IRDETO B.V.
发明人: Clifford Liem , John O'Connor
摘要: A method of operating a system, wherein the system comprises a plurality of components, the method comprising: maintaining a distributed ledger, wherein the distributed ledger comprises data records, wherein each data record stores information concerning one or more respective components of the plurality of components; at least one component of the plurality of components processing the information stored in one or more respective data records of the distributed ledger to determine whether the system meets one or more respective security criteria; and one or both of: (i) the at least one component performing a respective first action if the at least one component determines that the system meets the one or more respective security criteria; and (ii) the at least one component performing a respective second action if the at least one component determines that the system does not meet the one or more respective security criteria.
-
公开(公告)号:US20230066210A1
公开(公告)日:2023-03-02
申请号:US17973987
申请日:2022-10-26
申请人: IRDETO B.V.
发明人: Ron Vandergeest
摘要: A system and method is provided for implementing platform security on a consumer electronic device having an open development platform. The device is of the type which includes an abstraction layer operable between device hardware and application software. A secured software agent is provided for embedding within the abstraction layer forming the operating system. The secured software agent is configured to limit access to the abstraction layer by either blocking loadable kernel modules from loading, blocking writing to the system call table or blocking requests to attach debug utilities to certified applications or kernel components.
-
公开(公告)号:US20220318373A1
公开(公告)日:2022-10-06
申请号:US17705727
申请日:2022-03-28
申请人: Irdeto B.V.
发明人: Tomasz FRYDRYCH , Michail GRESHISHCHEV , Jakub JANOWSKI , Peter MEERWALD-STADLER , Duncan OGILVIE , Piotr SKRZYPCZAK , Markus SPITZLINGER , Grzegorz TERLIKOWSKI
IPC分类号: G06F21/52
摘要: There is described a method of enabling identification of the execution state of an item of software at runtime. The method comprises receiving from one or more clients one or more respective labelled sets of invocation data generated at the one or more clients by the execution of an executable of the item of software configured to cause the collection of invocation data at runtime for one or more callable units of the item of software, wherein each labelled set of invocation data comprises a label indicating an execution state of the item of software during a respective portion of runtime and invocation data corresponding to said respective portion of runtime; training, based on said collection of invocation data, an identification algorithm to identify the execution state of the item of software from collected invocation data of the item of software. There is also described a related method of identifying the execution state of an executable during a portion of runtime, as well as related apparatus and computer programs.
-
公开(公告)号:US20220114241A1
公开(公告)日:2022-04-14
申请号:US17069952
申请日:2020-10-14
申请人: IRDETO B.V.
发明人: Arnoud VAN FOREEST , Kimon TSITSIKAS , Vyacheslav SHOSHIN , Chunqui LU , Lin YUAN , Yu DUAN , Maksym KOSHEL , Kostiantyn SHEVCHENKO , Svetislav MOMCILOVIC , Vladimir ZIVKOVIC
摘要: A method for detection of modification of an item of content, the method comprising: obtaining, for the item of content, a respective first value of each attribute in a set of one or more attributes of the item of content, the set of one or more attributes selected such that, for each of one or more predetermined types of modification, said type of modification affects the value of at least one attribute in the set of one or more attributes; performing a watermark decoding operation on the item of content; and in response to the watermark decoding operation producing payload data from the item of content: determining that the one or more predetermined types of modification have not been applied to the item of content if, for each attribute in the set of one or more attributes, the respective first value for that attribute matches a respective second value for that attribute determined using the payload; or determining that a modification has been applied to the item of content if, for at least one attribute in the set of one or more attributes, the respective first value for that attribute does not match a respective second value for that attribute determined using the payload.
-
公开(公告)号:US20220083630A1
公开(公告)日:2022-03-17
申请号:US17537566
申请日:2021-11-30
申请人: Irdeto B.V.
发明人: Robert Krten
摘要: A method for a computer to execute an item of software, the method comprising: the computer executing one or more security modules; the computer executing the item of software, said executing the item of software comprising, at at least one point during execution of the item of software at which a predetermined function is to be performed, attempting to perform the predetermined function by: sending, to an address system, a request for an address of instructions for carrying out the predetermined function, the request comprising an identifier of the predetermined function; receiving, from the address system in response to the request, an address generated by the address system based, at least in part, on (a) the identifier and (b) verification data provided to the address system from at least one of the one or more security modules; and continuing execution of the item of software at the address received from the address system.
-
公开(公告)号:US11176300B2
公开(公告)日:2021-11-16
申请号:US16266043
申请日:2019-02-02
申请人: IRDETO B.V.
发明人: Gerard Johan Dekker
IPC分类号: G06F30/30 , H01L27/00 , G06F21/00 , G06F30/337 , H01L27/02 , G06F30/39 , G06F30/32 , G06F21/14 , G06F21/73 , G06F111/20
摘要: Systems and methods for producing individualized processing chips, each individualized processing chip being arranged to carry out a common processing operation are disclosed. A processing chip design is received, wherein the common processing operation is specified, at least in part, by the processing chip design. For each individualized processing chip the processing chip design is individualized to produce an individualized processing chip design, in accordance with an individualized set of transformations for the individualized processing chip, by including a respective set of modifications as part of the individualized processing chip design that implement the individualized set of transformations. Each transformation of the individualized set of transformations is a transform for an interconnect, specified in the processing chip design, of at least two logic cells specified in the processing chip design. For each individualized processing chip the individualized processing chip design is provided for fabrication of the individualized processing chip according to the individualized processing chip design. The individualized set of transformations for one individualized chip is different to the individualized set of transformations for at least one other individualized chip.
-
98.
公开(公告)号:US11093656B2
公开(公告)日:2021-08-17
申请号:US16190199
申请日:2018-11-14
申请人: Irdeto B.V.
发明人: Philip Allan Eisen
摘要: A change-tolerant method of generating a fingerprint of a computing environment based on asset parameters associated components of the computing environment. Asset parameters are grouped into multiple subsets based on characteristics of the components. A share is generated for each asset parameter of the category to produce a plurality of shares. A secret sharing algorithm is applied to the subsets to generate a plurality of candidate identifiers corresponding to the plurality of subsets of shares. A candidate identifier is selected from the plurality of candidate identifiers as a final identifier for each category based at least in part on a frequency of occurrence of that candidate identifier. The final identifiers are combined into a fingerprint corresponding to the computing environment, wherein the fingerprint is provides verification of the plurality of components without requiring individual verification of any shares in the plurality of shares.
-
公开(公告)号:US20210173922A1
公开(公告)日:2021-06-10
申请号:US17178383
申请日:2021-02-18
申请人: IRDETO B.V.
发明人: Ron Vandergeest
摘要: A system and method is provided for implementing platform security on a consumer electronic device having an open development platform. The device is of the type which includes an abstraction layer operable between device hardware and application software. A secured software agent is provided for embedding within the abstraction layer forming the operating system. The secured software agent is configured to limit access to the abstraction layer by either blocking loadable kernel modules from loading, blocking writing to the system call table or blocking requests to attach debug utilities to certified applications or kernel components.
-
公开(公告)号:US11032625B2
公开(公告)日:2021-06-08
申请号:US16529606
申请日:2019-08-01
申请人: IRDETO B.V.
发明人: Lau Zuydervelt , Vladimir {hacek over (Z)}ivković , Maksym Koshel , Lucas Catranis , Yu Duan , Chunqiu Lu , Lin Yuan , Kimon Tsitsikas , Vyacheslav Shoshin
IPC分类号: H04N7/167 , H04N21/8358 , H04N21/8352 , G06T1/00
摘要: Watermarking of a content stream is accomplished in a session-based manner to provide watermarking based on a uniquely generated manifest that will result in a stream that allows for unique identification of information. The manifest specifies a sequence of watermarks for successive segments of a content stream designated for a specific receiver. The system and method leverages existing content distribution infrastructure and has many of the benefits of conventional head-end watermarking, allows unique identification of small segments of the data stream and reduces content distribution network storage requirements. Groups of nodes can be provided with unique watermark patterns and detection and watermark pattern reconfiguration can be accomplished in an iterative manner to find a specific node without the need to create unique watermark patterns for each node.
-
-
-
-
-
-
-
-
-