-
1.
公开(公告)号:US11748432B2
公开(公告)日:2023-09-05
申请号:US17582541
申请日:2022-01-24
申请人: Deacon Johnson
发明人: Deacon Johnson
IPC分类号: G06F16/00 , G06F16/954 , G06F21/16 , G06F40/197 , G06F3/0482 , G06F21/60 , G06F3/048 , G06F21/10 , G06F21/62 , G06F3/0484 , H04L67/306 , H04W4/02
CPC分类号: G06F16/954 , G06F3/048 , G06F3/0482 , G06F3/0484 , G06F21/10 , G06F21/16 , G06F21/60 , G06F21/6218 , G06F21/6245 , G06F40/197 , H04L67/306 , G06F2221/0724 , G06F2221/0748 , H04W4/025
摘要: A system and method are disclosed for controlling metadata associated with content on an electronic device that includes displaying interface screens for user entry of metadata control instructions, accepting user instructions, modifying metadata of applicable content, and associating the modified metadata with the applicable content. The system can export and/or store the applicable content along with modified metadata. The system can automatically modify metadata according to one or more profiles. Relevant profiles can be determined based on the export mechanism, destination or type of content. The system can add watermarks to indicate metadata modification. The system can display metadata for user modification. The content can include photos, videos or other content. The system can display metadata and geolocation indicators for each content item that indicate whether that item has associated metadata and geolocation information. The user can selectively modify metadata of selected content.
-
公开(公告)号:US20190245833A1
公开(公告)日:2019-08-08
申请号:US16236522
申请日:2018-12-30
申请人: Shape Security, Inc.
发明人: JARROD OVERSON , SIYING YANG
CPC分类号: H04L63/0428 , G06F8/51 , G06F9/45516 , G06F9/45529 , G06F21/14 , G06F2221/0748 , H04L63/0407 , H04L63/0471 , H04L63/1433 , H04L67/02
摘要: A computer implemented method for improving security of a server computer that is configured to deliver computer program instructions to a remote client computer, and comprising, using an intermediary computer that is topologically interposed between the server computer and the remote client computer is provided. The intermediary computer is configured to intercept a first set of source code instructions from the server computer. The intermediary computer identifies first party operations that include operations on objects and the objects themselves. The intermediary computer identifies a first set of operations within the first party operations that are configured to define values for one or more objects based on one or more constants. The intermediary computer then generates a second set of operations, where the second set of operations are configured to define same values for the one or more objects, when executed by a web browser on the client computer. The intermediary computer transforms the first party operations into transformed first party operations by substituting the first set of operations with the second set of operations. The intermediary computer generates a second set of source code instructions that are based on the first set of source code instructions and the transformed first party operations. The intermediary computer then sends the second set of source code instructions to the client computer.
-
公开(公告)号:US20180129794A1
公开(公告)日:2018-05-10
申请号:US15575815
申请日:2015-11-20
发明人: Yunfeng LIU
CPC分类号: G06F21/14 , G06F9/44521 , G06F21/6281 , G06F2221/0748
摘要: The present disclosure provides a method for protecting a dex file from being decompiled in an Android system. The method comprises the following content: 1) loading a dex file into an inaccessible memory of an Android system; and 2) during execution, by performing reference execution, preventing the dex file from being found. In the method for protecting a dex file from be ing decompiled in an Android system in the present disclosure, a dex file is loaded into an inaccessible memory by means of a reference method, so that the dex file is prevented from being locally downloaded tor being copied and propagated; during execution, by means of reference execution, a decompiling person is prevented from finding the dex file so that the decompiling person cannot perform reverse engineering, thereby protecting an Android program from being decompiled.
-
公开(公告)号:US09846787B2
公开(公告)日:2017-12-19
申请号:US14633701
申请日:2015-02-27
申请人: INTEL CORPORATION
CPC分类号: G06F21/71 , G06F21/10 , G06F21/57 , G06F2221/0748 , G06F2221/0797 , H04L9/3234
摘要: An apparatus and method are described for implementing a trusted dynamic launch and trusted platform module (TPM) using a secure enclave. For example, a computer-implemented method according to one embodiment of the invention comprises: initializing a secure enclave in response to a first command, the secure enclave comprising a trusted software execution environment which prevents software executing outside the enclave from having access to software and data inside the enclave; and executing a trusted platform module (TPM) from within the secure enclave, the trusted platform module securely reading data from a set of platform control registers (PCR) in a processor or chipset component into a memory region allocated to the secure enclave.
-
公开(公告)号:US09665699B2
公开(公告)日:2017-05-30
申请号:US14657395
申请日:2015-03-13
申请人: Wil Michiels , Jan Hoogerbrugge , Joachim Trescher
发明人: Wil Michiels , Jan Hoogerbrugge , Joachim Trescher
CPC分类号: G06F21/14 , G06F21/72 , G06F2221/0748 , H04L9/0631 , H04L2209/16
摘要: A non-transitory machine-readable storage medium encoded with instructions for execution by a keyed encryption operation by a cryptographic system mapping an input message having an encoded portion and a padding portion to an output message, including: instructions for receiving a padding value k; instructions for receiving the input message, wherein the padding portion has a size indicated by the padding value k; instructions for computing a first portion of the encryption operation to produce a first portion output; instructions for computing a compensation factor corresponding to the padding portion of the input message; and instructions for compensating the first portion output based upon the compensation factor.
-
公开(公告)号:US09639675B2
公开(公告)日:2017-05-02
申请号:US14880310
申请日:2015-10-12
CPC分类号: G06F21/14 , G06F8/70 , G06F11/3688 , G06F2221/0724 , G06F2221/0746 , G06F2221/0748 , G06F2221/2123 , G06F2221/2127
摘要: Removing high level logic structure from a source program. Two or more source program fields are characterized by their respective value characteristics. A first field is mapped, with respect to the source program, to a second field having similar value characteristics as the first field. A target program is then created by replacing, in the source program, the first field with the second field and replacing each first field value with a corresponding second field value thereby preserving the value characteristics of the source program.
-
公开(公告)号:US20170033921A1
公开(公告)日:2017-02-02
申请号:US14814007
申请日:2015-07-30
申请人: NXP B.V.
发明人: Wil Michiels , Jan Hoogerbrugge , Philippe Teuwen
CPC分类号: H04L9/002 , G06F21/105 , G06F21/14 , G06F21/72 , G06F2221/0748 , H04L9/0625 , H04L9/0631 , H04L2209/046 , H04L2209/16
摘要: A method for a keyed cryptographic operation by a cryptographic system mapping an input message to an output message, including: receiving input data for the keyed cryptographic operation; calculating a first mask value based upon the input data; and applying the first mask value to a first intermediate value of the keyed cryptographic operation.
摘要翻译: 一种用于通过将输入消息映射到输出消息的加密系统进行密钥加密操作的方法,包括:接收密钥加密操作的输入数据; 基于输入数据计算第一掩模值; 以及将所述第一掩码值应用于所述密钥密码操作的第一中间值。
-
公开(公告)号:US20160350520A1
公开(公告)日:2016-12-01
申请号:US14725801
申请日:2015-05-29
申请人: NXP B.V.
发明人: Wil Michiels , Jan Hoogerbrugge , Philippe Teuwen
CPC分类号: G06F21/14 , G06F21/72 , G06F2221/0748 , H04L9/002 , H04L9/06 , H04L9/0631 , H04L2209/08 , H04L2209/16
摘要: A non-transitory machine-readable storage medium encoded with instructions for execution by a keyed cryptographic operation by a cryptographic system mapping an input message to an output message, including: instructions for receiving input data for a round of the keyed cryptographic operation; instructions for determining the order of computing output portions for the round of the cryptographic function based upon portions of the input data; and instructions for computing the portions of the output data in the determined order based upon the input data.
摘要翻译: 一种非暂时的机器可读存储介质,其编码有用于通过将输入消息映射到输出消息的加密系统通过密钥加密操作执行的指令,包括:用于接收用于一轮密钥加密操作的输入数据的指令; 用于基于所述输入数据的部分来确定所述加密函数的所述一轮计算输出部分的顺序的指令; 以及用于基于输入数据以确定的顺序计算输出数据的部分的指令。
-
公开(公告)号:US20160328543A1
公开(公告)日:2016-11-10
申请号:US14815540
申请日:2015-07-31
申请人: NXP B.V.
发明人: Jan Hoogerbrugge , Wil Michiels
CPC分类号: G06F21/14 , G06F21/629 , G06F2221/0748 , H04L9/302 , H04L9/3066 , H04L2209/046
摘要: A method of obscuring the input and output of a modular exponentiation function, including: receiving modular exponentiation parameters including an exponent e having N bits and a modulus m; generating randomly a pre-multiplier; calculating a post-multiplier based upon the pre-multiplier, exponent e, and modulus m; multiplying an input to the modular exponentiation function by the pre-multiplier; performing the modular exponentiation function; and multiplying the output of the modular exponentiation function by the post-multiplier, wherein multiplying an input to the modular exponentiation function by the pre-multiplier, performing the modular exponentiation function, and multiplying the output of the modular exponentiation function by the post-multiplier are split variable operations.
摘要翻译: 一种模糊模幂函数的输入和输出的方法,包括:接收包括具有N位和模数m的指数e的模幂运算参数; 随机生成预乘数; 基于预乘数,指数e和模数m计算后乘数; 通过预乘数将输入与模幂运算函数相乘; 执行模幂运算; 并将乘幂函数乘以后乘法器,其中通过预乘数将输入与模幂运算函数相乘,执行模幂运算函数,并将模幂运算函数的输出乘以后乘法器 是分割变量操作。
-
公开(公告)号:US20160132667A1
公开(公告)日:2016-05-12
申请号:US14894919
申请日:2014-05-30
申请人: JSCRAMBLER S.A.
发明人: Antonio Pedro Freitas Fortuna dos Santos , Rui Miguel Silvares Ribeiro , Filipe Manuel Gomes Silva
CPC分类号: G06F21/12 , G06F21/10 , G06F21/125 , G06F21/14 , G06F2221/0704 , G06F2221/0748 , H04L9/0822 , H04L9/0866 , H04L9/14
摘要: A method and system for generating a protected version of the digital content is disclosed. The method includes obfuscating the digital content to yield a functionally equivalent obfuscated digital content, encrypting the obfuscated digital content using at least one device or non-device parameter, generating a decryption logic to be used for generating a decryption key based upon the at least one device or non-device parameter, and concatenating the encrypted digital content and the decryption logic to generate the protected version of the digital content.
摘要翻译: 公开了一种用于产生数字内容的受保护版本的方法和系统。 该方法包括对数字内容进行模糊处理以产生功能上等效的模糊数字内容,使用至少一个设备或非设备参数对混淆的数字内容进行加密,生成解密逻辑,用于基于至少一个设备生成解密密钥 设备或非设备参数,并且连接加密的数字内容和解密逻辑以产生数字内容的受保护版本。
-
-
-
-
-
-
-
-
-