Abstract:
A mobile terminal receives trustworthiness information for a software application by receiving a voucher that indicates the trustworthiness of that application as represented by a third party. To ensure the integrity of this information, the mobile terminal authenticates the voucher and verifies that the software application is the one having its trustworthiness indicated by the voucher. Given such indications of trustworthiness, a user of the mobile terminal may decide whether install and run it. If decided in the affirmative, the user may form his or her own basis for the trustworthiness of the software application. Accordingly, the mobile terminal may also create a new voucher that indicates the trustworthiness of the software application as represented by the user. With third parties representing the trustworthiness of software applications in this manner, their development is not hindered by the imposition of security requirements on application developers.
Abstract:
A technique for determining a malign or non-malign behavior of an executable file is disclosed. In a first method aspect, the method comprises the steps of first acquiring a first behavior profile of the executable file, the first behavior profile comprising a first observable execution trace of the executable file from an emulated environment, second acquiring a second behavior profile of the executable file, the second behavior profile comprising a second observable execution trace of the executable file from a real environment, and comparing the first and second observable execution traces so as to determine the malign or non-malign behavior of the executable file. In another method aspect, the method comprises the steps of receiving a trigger condition, collecting, responsive to the trigger condition, first and second behavior profiles of the executable file from first and second one of two or more file-execution devices, the first and second behavior profiles comprising first and second observable execution traces of the executable file, and the first and second observable execution traces being non-mapped to the first and second file- execution device, respectively.
Abstract:
A computer-implemented method of tamper-protecting a computer program, the method comprising: processing an input representation of the computer program to identify a function call for causing a data processing system to continue execution of the computer program at a predetermined entry point memory address when said computer program is executed by a data processing system; replacing the identified function call with a modified function call, wherein the modified function call includes an algebraic expression for causing the data processing system to compute the entry point memory address when said computer program is executed by the data processing system.
Abstract:
View synthesis is performed based on obtained texture data and a depth map. The resolution of the depth map is lower than that of the texture data by a ratio dw in the x direction and by a ratio dh in the y direction. Texture pixel positions x, y are transformed into non-integer depth map pixel positions by performing divisions x/dw and y/dh and these non-integer depth map pixel positions are rounded to integer depth map pixel positions, and a view is synthesized based at least on the obtained texture data and depth map values at the integer depth map pixel positions and/or adjacent positions.
Abstract:
It is presented a method for creating a disocclusion map used for coding a three- dimensional, 3D, video, the method comprises receiving (800) a pixel-based disocclusion map in which pixels are marked either as disoccluded or not. A block- based disocclusion map is derived (802) based on the pixel-based disocclusion map. An area of the block-based disocclusion map that has been marked as disoccluded is extended (804). It is also presented an encoder (30), a decoder (32) and a system for creating the disocclusion map.
Abstract:
A web browser client includes an aggregated web application runtime environment that controls access by a program fragment of an aggregated web application to a resource therein based upon the originating domain of the program fragment To do so, the aggregated web application runtime environment appends an access attribute to the Document Object Model (DOM) node associated with the resource This access attribute is associated with a plurality of access rights definitions where each access rights definition defines a set of access rights to the resource for program fragments originating from a domain with a specific access rights status Accordingly, the aggregated web application runtime environment sets one or more access rights statuses of the originating domain of the program fragment, and thereafter, grants or denies the program fragment access to the resource based upon one or more sets of access rights defined for that program fragment
Abstract:
A computer-implemented method of generating tamper-protected computer program code. The method comprises obtaining a representation of the computer program code, the computer program code being adapted to cause a data processing system to perform a plurality of computational tasks in a first order of execution, each computational task being represented in the representation of the computer program code by at least one program statement; obtaining a plurality of alternative orders of execution of the computational tasks; generating an executable representation of the program code adapted to cause a data processing system to select a randomized order of execution from the plurality of alternative orders of execution and to execute the computational tasks in the selected randomized order of execution.
Abstract:
A computer-implemented method of tamper-protecting computer program code. The method comprises: obtaining an input representation of the computer program code; identifying a conditional program statement for causing a data processing system to selectively execute one of at least a first and a second sets of program statements when said computer program is executed by a data processing system; replacing said identified conditional program statement and the first and second sets of program statements with a set of transformed program statements to obtain obfuscated program code, wherein the set of transformed program statements is adapted to cause the data processing system to execute at least a part of each of the transformed program statements when said computer program is executed by the data processing system.
Abstract:
A method and user device for preventing unauthorized viewing of at least one entity, e.g. character, digit, image and/or shape, is provided. The method comprises splitting up the entity in at least two parts, after which one of the split parts are sent to a first display unit and the remaining split part(s) is/are sent to at least one other display unit.
Abstract:
A method of processing a stereo image for three-dimensional viewing is disclosed. The stereo image comprises a first view captured by a first image acquiring arrangement and a second view captured by a second image acquiring arrangement. The first view has a first information content and the second view has a second information content, the first information content comprising more information than the second information content. The method comprises stereo matching of the first and second view, transferring information data from the first information content to the second view, and producing an updated second view having an updated information content by merging the transferred information data with information data of the second information content. Corresponding computer program product, arrangement and electronic device are also disclosed.