-
公开(公告)号:WO2021236446A1
公开(公告)日:2021-11-25
申请号:PCT/US2021/032475
申请日:2021-05-14
Applicant: VISA INTERNATIONAL SERVICE ASSOCIATION
Inventor: AGRAWAL, Shashank , ALPIREZ BOCK, Estuardo , CHEN, Yilei , WATSON, Gaven James
Abstract: A method is disclosed. The method includes receiving, by a user device, an encrypted message from a server computer. The encrypted message is a message encrypted with a master secret key or a key derived from the master secret key. The user device signs the encrypted message with a secure element private key. The user device, using a whitebox, cryptographically recovers a secure element public key from a certified key using a server computer public key. The certified key is certified by the server computer and based on at least the secure element public key. The user device, using the whitebox, cryptographically recovers the encrypted message from the signed encrypted message using the secure element public key. The user device, using the whitebox, decrypts the encrypted message using the master secret key or the key derived from the master secret key in the whitebox to obtain the message.
-
2.
公开(公告)号:WO2021197871A1
公开(公告)日:2021-10-07
申请号:PCT/EP2021/057065
申请日:2021-03-19
Applicant: COSMIAN TECH
Inventor: GRIEDER, Bruno , GENTY, Thibaud , NITULESCU, Anca , SARTORI, Michele
IPC: G06F21/14 , H04L29/06 , G06F21/53 , G06F2221/0797 , H04L2463/061 , H04L2463/103 , H04L63/0442 , H04L63/0823 , H04L67/34 , H04W12/086
Abstract: L'invention concerne un procédé de réception et d'exécution d'un logiciel secret (G) sur des données dans une enclave sécurisée d'un premier dispositif (DO). Ce procédé comprend les étapes suivantes mises en œuvre dans l'enclave sécurisée, à savoir une étape de génération d'une clé publique (B) (101), une étape de réception du logiciel secret chiffré (Gs) provenant d'un deuxième dispositif (AP) (104), une étape de déchiffrement du logiciel secret chiffré (Gs) à partir d'une clé (K;P) dépendante de la clé publique (B) (105), une étape de réception de données (106); et une étape d'exécution du logiciel secret (G) en utilisant les données.
-
公开(公告)号:WO2021080103A1
公开(公告)日:2021-04-29
申请号:PCT/KR2020/005583
申请日:2020-04-28
Applicant: DEEPING SOURCE INC.
Inventor: KIM, Tae Hoon
Abstract: A method for learning a user learning network to recognize obfuscated data created by concealing original data is provided. The method includes steps of: a 2-nd learning device, (a) on condition that a 1-st learning device has performed (i) instructing the obfuscation network to generate obfuscated training data, (ii) inputting (ii-1) the obfuscated training data into, to generate 1-st characteristic information for training, and (ii-2) the training data, to generate 2-nd characteristic information for training, into a learning network for training and (iii) learning the obfuscation network, and acquiring (i) the obfuscated training data and a training data GT, or (ii) obfuscated test data and a test data GT; (b) inputting (i) the obfuscated training data, to generate 3-rd characteristic information for training, or (ii) the obfuscated test data, to generate 4-th characteristic information for training, into the user learning network; and (c) learning the user learning network.
-
公开(公告)号:WO2021034602A1
公开(公告)日:2021-02-25
申请号:PCT/US2020/046157
申请日:2020-08-13
Applicant: MICRON TECHNOLOGY, INC.
Inventor: BRADSHAW, Samuel E. , GUNASEKARAN, Shivasankar , EILERT, Sean Stephen , AKEL, Ameen D. , CUREWITZ, Kenneth Marion
Abstract: A system having multiple devices that can host different versions of an artificial neural network (ANN). In the system, inputs for the ANN can be obfuscated for centralized training of a master version of the ANN at a first computing device. A second computing device in the system includes memory that stores a local version of the ANN and user data for inputting into the local version. The second computing device includes a processor that extracts features from the user data and obfuscates the extracted features to generate obfuscated user data. The second device includes a transceiver that transmits the obfuscated user data. The first computing device includes a memory that stores the master version of the ANN, a transceiver that receives obfuscated user data transmitted from the second computing device, and a processor that trains the master version based on the received obfuscated user data using machine learning.
-
公开(公告)号:WO2021021949A1
公开(公告)日:2021-02-04
申请号:PCT/US2020/044095
申请日:2020-07-29
Applicant: INTERTRUST TECHNOLOGIES CORPORATION
Inventor: MITCHELL, Stephen G.
Abstract: The disclosure relates to systems and methods for managing state using relatively small assistance from protected hardware. Obfuscated code segments may communicate with supporting protected hardware, store encrypted state values in main memory, and/or communicate via secure channels to secure platform hardware components. In various embodiments, consistent state may be achieved, at least in part, by computing secure tag information and storing the secure tag information in a secure and/or otherwise protected device register. Consistent with embodiments disclosed herein, the tag information may be used to derive keys used to encrypt and/or decrypt stored state information. Tag information may further be used in connection with verification operations prior to using the information to derive associated keys.
-
6.
公开(公告)号:WO2021011138A1
公开(公告)日:2021-01-21
申请号:PCT/US2020/037659
申请日:2020-06-14
Applicant: JUNG, Yong-Kyu
Inventor: JUNG, Yong-Kyu
Abstract: A hybrid security-enabled lookahead (SEL) microprocessor is invented for preventing unauthorized persons or computer systems from unauthorized usages of computer systems. The invention protects data generated by the hybrid SEL microprocessor-based computer systems from cyber-attacks without security software. The invention provides real-time protection and continuous detection regardless of unknown or known threats for any type of computer systems. The invention forbids Artificial Intelligence (AI) machines from utilizing malicious data created by attackers. Therefore, the AI machines are not evolved according to intentions of unauthorized devices or persons. The invention dynamically transforms an executable program into a security-enabled compatible program.
-
7.
公开(公告)号:WO2020193583A1
公开(公告)日:2020-10-01
申请号:PCT/EP2020/058229
申请日:2020-03-24
Applicant: BANKS AND ACQUIRERS INTERNATIONAL HOLDING
Inventor: GÉRAUD, Rémi , SYLLA, Mamoudou
Abstract: L'invention se rapporte à un procédé de contrôle de l'exécution d'une application AppO, procédé mis en œuvre au sein de l'application AppO, ladite application AppO s'exécutant sur un dispositif électronique, nommé dispositif d'exécution (B), ledit dispositif d'exécution (B) étant connecté à un dispositif appelant (A) par l'intermédiaire d'un réseau de communication, ledit procédé comprenant les étapes suivantes : - Réception (10) en provenance du dispositif appelant (A), d'une structure de données d'exécution (StrExec), comprenant au moins un d'enregistrement, chaque enregistrement comprenant au moins un champ de données comprenant un nom de fonction codé (CFN_x); - Sauvegarde (20), au sein d'une zone mémoire spécifique (MZone), de ladite structure de données d'exécution (StrExec); - Pour chaque enregistrement courant (CUEnr) de la structure de données d'exécution (StrExec) mise en œuvre (30) d'une fonction portant un nom de fonction décodé (UCFN_x) correspondant au nom de fonction codé (CFN_x), lorsque la fonction portant un nom de fonction décodé (UCFN_x) de l'application AppO peut être associée au nom de fonction codé (CFN_x).
-
公开(公告)号:WO2020157590A1
公开(公告)日:2020-08-06
申请号:PCT/IB2020/050274
申请日:2020-01-14
Applicant: IRDETO B.V.
Inventor: DURAND, Robert , HOYT, Andrew
IPC: G06F21/14
Abstract: Systems, methods, and storage media for obfuscating a computer program by representing the control flow of the computer program as data that is not source code are disclosed. Exemplary implementations may: receive source code of a computer program; parse the source code; extract the control flow of the source code; represent at least a portion of the control flow as a control flow model using a mathematical modeling language; store the control flow model as control flow data that represents the control flow of the program and is not executable code; and remove the at least a portion of the control flow from the source code, to thereby obfuscate the control flow of the source code and render the source code more resistant to tampering.
-
公开(公告)号:WO2020126711A1
公开(公告)日:2020-06-25
申请号:PCT/EP2019/084533
申请日:2019-12-11
Applicant: KONINKLIJKE PHILIPS N.V.
Inventor: HUTSCHEMAEKERS, Paul, Hubert, Matthias , BODLAENDER, Maarten, Peter , GARCIA MORCHON, Oscar
IPC: G06F21/14
Abstract: A computer-implemented method of obfuscating a computer code comprises receiving (1201) an original computer program comprising a plurality of code blocks with computer instructions, the original computer program operable on input data within an input space, the original computer program operable to follow an execution path through the plurality of code blocks when receiving the input data, wherein the input space is segmented into at least one segment according to a segmentation, each segment comprising a subset of the input space containing inputs that correspond to a same execution path. A plurality of updated code blocks is included (1302) in the updated computer program. Selection code is operable 1303, during execution of the updated computer program, to select an updated code block of the plurality of updated code blocks in dependence on the input data. The selection code is included (1304) in the updated computer program.
-
公开(公告)号:WO2020043871A1
公开(公告)日:2020-03-05
申请号:PCT/EP2019/073187
申请日:2019-08-30
Applicant: NAGRAVISION SA , CONAX AS
Inventor: DORÉ, Laurent , MÖNCH, Christian , WYSEUR, Brecht
Abstract: The present disclosure relates to software tampering resistance. In one aspect, a method for generating protected code is provided, comprising identifying a primary function in code to be obscured, the primary function being a function used to verify the integrity of the code run-time. The method then comprises generating a finite state machine from the primary function, wherein a state of the finite state machine at a given instance defines an element of the primary function to be executed. The method then comprises distributing the finite state machine throughout the code to obscure one or more areas of the code.
-
-
-
-
-
-
-
-
-