Patent classifications
G06F21/1066
SECURE MACHINE EXECUTABLE CODE DEPLOYMENT AND EXECUTION METHOD AND SYSTEM
Described are various embodiments of a machine executable code deployment method and system. In one such embodiment, a machine executable code deployment method is described to comprise: compiling machine readable code in a secure digital processing environment to produce a unique ephemeral machine executable code instance representative thereof; deploying the unique ephemeral machine executable code instance to a distinct digital processing environment to be executed thereon for a predetermined runtime period, wherein execution of the unique ephemeral machine executable code instance is automatically terminated after the predetermined runtime period; and repeating the deploying for subsequent unique ephemeral machine executable code instances.
Real Time Digital Content Concealment
Methods and systems for performing real time digital content concealment are described herein. A computing device may, in response to detecting a user within view of an image capture device of a client device, perform a first type of text recognition on a first region of digital content and a second type of text recognition on a second region of the digital content, where the first type of text recognition is determined based on a first type of content items contained in the first region and the second type of text recognition is determined based on a second type of content items contained in the second region. Based at least in part on rules corresponding to the user, the computing device may determine content items within the digital content to be concealed, and may modify the digital content to conceal the content items.
Balanced encoding of intermediate values within a white-box implementation
A method of implementing a keyed cryptographic operation using a plurality of basic blocks, includes: generating a balanced encoding function; applying the balanced encoding function to the output of a first basic block; and applying an inverse of the encoding function to the input of a second basic block, wherein the second basic block receives the encoded output of first basic block as an input.
FIRMWARE SECURITY
Examples associated with firmware security are described. One example includes dividing a firmware image into a set of chunks. The chunks are sized to fit into memory blocks of a firmware memory of a device. Members of the set of chunks are assigned to respective memory blocks based on a first security value associated with the device. Members of the set of chunks are stored in their respective memory blocks to create a firmware content. The firmware content is obfuscated.
Secure machine executable code deployment and execution method and system
Described are various embodiments of a machine executable code deployment method and system. In one such embodiment, a machine executable code deployment method is described to comprise: compiling machine readable code in a secure digital processing environment to produce a unique ephemeral machine executable code instance representative thereof; deploying the unique ephemeral machine executable code instance to a distinct digital processing environment to be executed thereon for a predetermined runtime period, wherein execution of the unique ephemeral machine executable code instance is automatically terminated after the predetermined runtime period; and repeating the deploying for subsequent unique ephemeral machine executable code instances.
Real Time Digital Content Concealment
Methods and systems for performing real time digital content concealment are described herein. A computing device may, in response to detecting a user within view of an image capture device of a client device, perform a first type of text recognition on a first region of digital content and a second type of text recognition on a second region of the digital content, where the first type of text recognition is determined based on a first type of content items contained in the first region and the second type of text recognition is determined based on a second type of content items contained in the second region. Based at least in part on rules corresponding to the user, the computing device may determine content items within the digital content to be concealed, and may modify the digital content to conceal the content items.
Systems and Methods for Recognizing Human Actions from Privacy-Preserving Optics
Systems and methods of capturing privacy protected images and performing machine vision tasks are described. An embodiment includes a system that includes an optical component and an image processing application configured to capture distorted video using the optical component, where the optical component includes a set of optimal camera lens parameters *.sub.o learned using machine learning, performing a machine vision task on the distorted video, where the machine vision task includes a set of optimal action recognition parameters *.sub.c learned using the machine learning, and generating a classification based on the machine vision task, where the machine learning is jointly trained to optimize the optical element and the machine vision task.
COMPUTER PROGRAM CODE OBFUSCATION METHODS AND SYSTEMS
Methods and systems for obfuscating computer program code are disclosed. In an embodiment, a method of generating obfuscated binary code from input source code for execution on a target processor comprises: generating a set of random obfuscation transform selections; and iteratively optimizing the obfuscation transform selections until a termination criterion is met. The obfuscation transformation selections may comprise indications of custom instructions which are executable on the co-processor in order to reduce side channel leakage.
Real time digital content concealment
Methods and systems for performing real time digital content concealment are described herein. A computing device may, in response to detecting a user within view of an image capture device of a client device, perform a first type of text recognition on a first region of digital content and a second type of text recognition on a second region of the digital content, where the first type of text recognition is determined based on a first type of content items contained in the first region and the second type of text recognition is determined based on a second type of content items contained in the second region. Based at least in part on rules corresponding to the user, the computing device may determine content items within the digital content to be concealed, and may modify the digital content to conceal the content items.
Authentication-based presentation of virtual content
The disclosed techniques enable virtual content displayed in an experience to be restricted and/or tailored based on a user identification. User information (e.g., login name, authentication credentials such as a password or biometric data, etc.) can be used to determine and/or authenticate an identification of a user that enters and/or consumes an experience via a head-mounted display device or another computing device connected to a head-mounted display device. The user identification can be used to determine which virtual content is displayed to the user as part of an experience. Consequently, different users that enter the same experience can be presented with different virtual content. This enables a creator of the experience to restrict the viewing of confidential and/or sensitive information. This also enables the creator of the experience to tailor or customize the virtual content that is displayed to each user that enters and/or consumes the experience.