Patent classifications
G06F2221/2123
Blocking Routine Redirection
Disclosed herein are methods, systems, and computer-readable media for blocking attempts at runtime redirection and attempts to change memory permissions during runtime. The present disclosure describes features that enable runtime detection of an attempt to redirect routines or change memory permissions, and determining whether to allow or deny the attempt. Such features may include changing memory write permissions on memory segments, such as those segments used by dynamic loaders after call associations have been saved or otherwise created. Other features may include swapping the addresses of system routines (e.g., open, read, write, close, etc.) to new routines that perform the same function as well as additional functionality configured to detect attempts to redirect or change memory permissions. Once detected by the new routine during runtime, a determination may be made to deny or allow the call based on a policy.
AUTO-RECORDING OF MEDIA DATA
An image capture system and methods for auto-recording media data are herein disclosed. A method includes selecting an activity-specific monitor based on an activity type. The activity-specific monitor defines one or more auto-recording conditions that, when satisfied, cause the image capture system to record data. The auto-recording conditions are based on an audio profile, a video profile, a motion profile, or any combination thereof. The auto-recording conditions include one or more scene descriptions that correspond to the activity type.
Stack overflow protection by monitoring addresses of a stack of multi-bit protection codes
A hardware monitor circuit includes an electronic control circuit coupled to a processing unit. The electronic control circuit generates multi-bit protection codes and directs operations of the hardware monitor circuit. A bus interface is coupled to an address bus of the processing unit, and the bus interface passes signals associated with a stack structure of the processing unit. The stack structure is arranged to store the multi-bit protection codes in an internal memory coupled to the processing unit. Comparators in the hardware monitor circuit are arranged to accept values from the internal memory and gating logic coupled to the comparators is arranged to generate an error signal when it detects that an address on the address bus read via the bus interface is equal to an address stored in the internal memory. Upon generating the error signal, the processing unit is placed in a secure mode.
Memory device, host device, and memory system
A control circuit causes a first cryptographic module to perform a dummy operation in a command processing period and a data processing period in which a second cryptographic module performs a normal operation while the first cryptographic module does not perform a normal operation.
Obfuscating mobile device passwords through pattern generation
A computer-implemented a method for authenticating a user includes: displaying, by a computer device, a first user interface on a display; receiving, by the computer device, user input defining a first pattern; displaying, by the computer device, a second pattern on the display, wherein the second pattern is different than the first pattern; comparing, by the computer device, the first pattern to a predefined pattern; and based on the comparing, the computer device performing one of: re-displaying the first user interface when the first pattern does not match the predefined pattern; and displaying a second user interface when the first pattern does match the predefined pattern.
System and method for authenticating users
A security application for a computing device, e.g., a mobile phone, allows generation of a secret according to a unique user input (e.g., user credentials). The secret is stored in a directory such that it is retrievable when the unique user input is received via a user interface of a device on which the security application executes or is coupled with. Responsive to receiving an identifier associated with the secret, the security application prompts, e.g., via a user interface of the mobile phone, entry of the unique user input; and, subsequently, verifies the unique user input. Following such verification, the security application provides the secret for use in encoding a communication with a remote computer-based station. Entry of the user credentials may be required prior to the security application generating the secret, and may be responsive to receipt of an invitation (e.g., from the remote computer-based station) to generate it.
Secure circuit integrated with memory layer
An example secure circuit device includes a logic layer with a logic circuit, first and second memory layers, and connectors between the logic layer and the memory layers. The logic circuit executes logic operations in response to being in an unlocked state and does not execute logic operations in response to being in a locked state. The logic circuit is in the unlocked state in response to a security key being accessible and in the locked state when the security key is inaccessible. The first memory layer is disposed over a second memory layer with the first and second memory layers being disposed over the logic layer in a monolithic structure. The security key includes a first security key portion disposed in the first memory layer and a second security key portion disposed in the second memory layer.
SECURE REMOTE IMAGE ANALYSIS BASED ON RANDOMIZED DATA TRANSFORMATION
A non-transitory storage medium stores instructions readable and executable by a first computer (14) to perform an image processing method (100, 200, 400). The method includes: encrypting image data portions to generate encrypted image data portions; transmitting the encrypted image data portions from the first computer to a second server (16) different from the first computer; decrypting encrypted processed image data portions received at the first computer from the second server to produce processed image data portions and generating a processed image from the processed image data portions; and controlling a display device (24) to display the processed image or storing the processed image in a database (30).
Auto-recording of media data
An image capture system and methods for auto-recording media data are herein disclosed. A method includes selecting an activity-specific monitor based on an activity type and capturing data. The activity-specific monitor defines one or more auto-recording conditions that, when satisfied, cause the image capture system to record data. The method includes executing the activity-specific monitor. The activity-specific monitor may receive sensor data, determine whether the one or more auto-recording conditions defined by the activity-specific monitor are met, and output a notification indicating that the one or more auto-recording conditions are met. The method further includes writing a portion of the data captured to the persistent storage of the image capture system.
DYNAMIC RANDOMIZATION OF PASSWORD CHALLENGE
Disclosed herein is a method of performing a password challenge in an embedded system. The method includes receiving a password, scrambling the sub-words of the password pursuant to scramble control codes, retrieving a verification word, scrambling the sub-words of the verification word pursuant to the scramble control codes, and comparing the scrambled sub-words of the password to the scrambled sub-words of the verification word. Access to a secure resource is granted if the scrambled sub-words of the password match the scrambled sub-words of the verification word. The scramble control codes cause random reordering of the sub-words of the password and sub-words of the verification word in a same fashion, and insertion of random delays between the comparison of different sub-words of the password to corresponding sub-words of the verification word.