Patent classifications
G06F21/1066
CHASSIS INTERNAL DEVICE SECURITY
Methods, systems, and computer programs encoded on computer storage medium, for verifying, by a mask ROM of a CPU of a first computing device and with fused keys included by the CPU, a boot loader that is included by a flash memory of the first computing device, in response to verifying the boot loader, verifying, by the boot loader and with boot loader keys included by the flash memory, a kernel included by the a memory device of the first computing device, in response to verifying the kernel, decrypting, by the kernel using a hidden root key (HRK) included by the CPU of the first computing device, a device unique certification (DUC) included by the flash memory, in response to decrypting the DUC, generating, by the first computing device, a proof-of-possession of the DUC.
Method for training and testing adaption network corresponding to obfuscation network capable of processing data to be concealed for privacy, and training device and testing device using the same
A method for learning an adaption network corresponding to an obfuscation network used for concealing original data is provided. The method includes steps of: (a) on condition that a 1-st learning device has performed or is performing processes of (i) instructing the obfuscation network to obfuscate the training data to generate obfuscated training data, (ii) inputting the obfuscated training data into a learning network to generate 1-st characteristic information for training and inputting the training data into the learning network to generate 2-nd characteristic information for training, and (iii) learning the obfuscation network, a 2-nd learning device performing one of inputting the training data into the adaption network to generate 1-st feature adapted data and inputting test data into the adaption network to generate 2-nd feature adapted data and one of (i) acquiring a 1-st adaption ground truth and learning the adaption network and (ii) learning the adaption network.
Method for learning and testing user learning network to be used for recognizing obfuscated data created by concealing original data to protect personal information and learning device and testing device using the same
A method for learning a user learning network to recognize obfuscated data created by concealing original data is provided. The method includes steps of: a 2-nd learning device, (a) on condition that a 1-st learning device has performed (i) instructing the obfuscation network to generate obfuscated training data, (ii) inputting (ii-1) the obfuscated training data into, to generate 1-st characteristic information for training, and (ii-2) the training data, to generate 2-nd characteristic information for training, into a learning network for training and (iii) learning the obfuscation network, and acquiring (i) the obfuscated training data and a training data GT, or (ii) obfuscated test data and a test data GT; (b) inputting (i) the obfuscated training data, to generate 3-rd characteristic information for training, or (ii) the obfuscated test data, to generate 4-th characteristic information for training, into the user learning network; and (c) learning the user learning network.
METHODS, APPARATUS, AND COMPUTER PROGRAM PRODUCTS FOR PROTECTING SENSITIVE DATA
Methods that can protect sensitive data are provided. One method includes determining, by a processor, whether a user is focusing on an obscured set of sensitive data displayed on a computing device, clarifying the obscurity of a portion of the displayed set of sensitive data in response to determining that the user focusing on the portion of the displayed set of sensitive data, and maintaining the obscurity of one or more other portions of the displayed set of sensitive data in response to determining that the user not focusing on the one or more other portions of the displayed set of sensitive data. Apparatus and computer program products that can include, perform, and/or implement the methods are also provided.
Control flow flattening for code obfuscation where the next block calculation needs run-time information
A method of obscuring software code including a plurality of basic blocks wherein the basic blocks have an associated identifier (ID), including: determining, by a processor, for a first basic block first predecessor basic blocks, wherein first predecessor basic blocks jump to the first basic block and the first basic block jumps to a next basic block based upon a next basic block ID; producing, by the processor, a mask value based upon the IDs of first predecessor basic blocks, wherein the mask value identifies common bits of the IDs of the first predecessor basic blocks; and inserting, by the processor, an instruction in the first basic block to determine a next basic block ID based upon the mask value and an ID of one of the first predecessor basic blocks.
SECURE CALLING CONVENTION SYSTEM AND METHODS
The present disclosure is directed to systems and methods for protecting software application information that is passed between a caller of an API and the logic contained within the API by using a Secure Calling Convention (SCC). The SCC involves performing a cryptographic operation on the information such that the true nature of the information is obfuscated. The SCC prevents a hacker from using the information to reverse-engineer the software application to behave as desired.
Systems and techniques for capture of trusted media data
Methods, systems, and devices that support determining whether media data has been altered are described. Captured media data may be segmented into one or more subsets, and cryptographic representations (e.g., hashes) based on the subsets may be written to an immutable ledger, possibly along with metadata and other related data. A block of a blockchain may be created for each entry in the immutable ledger. A set of media data may be validated, if a corresponding immutable ledger exists, based on segmenting the set of media data into one or more subsets in accordance with the segmenting upon capture, creating candidate cryptographic representations (e.g., hashes) based on the subsets, and comparing the candidate cryptographic representations with contents of the corresponding immutable ledger.
Debuggable obfuscated script
A method for generating debuggable obfuscated script includes embedding into a Web page, a query to a data store of a client for a key disposed within fixed storage of the client, further embedding into the Web page both an encrypted network reference to an un-obfuscated, clear form of a script, the encrypted network reference being decryptable with the key, and also an un-encrypted reference to an obfuscated form of the script and yet further embedding into the Web page, a selection directive selecting and decrypting the encrypted network reference to retrieve the un-obfuscated form upon loading the Web page on the condition that the key is found in the fixed storage, but otherwise selecting the un-encrypted reference to retrieve the obfuscated form. The method additionally includes serving the Web page to the client.
METHOD FOR THE COMPUTER-AIDED OBFUSCATION OF PROGRAM CODE
Provided is a method for computer-aided obfuscation of program code, wherein a plurality of calculation steps is implemented in the program code, wherein predetermined calculation steps of the plurality of calculation steps are retrieved in a predetermined order with the execution of the program code, and at least some of the predetermined calculation steps are predefined calculation steps in which a respective first table that is stored in the program code and includes of a plurality of digital first tabular values is accessed in order to read a first tabular value required for the respective predefined calculation step from the first table. As part of the obfuscation of the program code, a dynamic mask formed by a plurality of digital mask values is used, wherein, for any predefined calculation step, another mask value is used to replace the first tabular value from the first table with a second tabular value.
COMPUTERIZED SYSTEM AND METHOD FOR MODIFYING A MEDIA FILE BY AUTOMATICALLY APPLYING SECURITY FEATURES TO SELECT PORTIONS OF MEDIA FILE CONTENT
Disclosed are systems and methods for improving interactions with and between computers in content providing, generating, securing and/or hosting systems supported by or configured with personal computing devices, servers and/or platforms. The systems interact to identify and retrieve data within or across platforms, which can be used to improve the security and quality of data used in processing interactions between or among processors in such systems. The disclosed systems and methods provide added security features and functionality to media files through computerized, automated encoding and decoding of portions of media file content such that identified portions of the content are obfuscated upon display and communication to other users. The disclosed systems and methods provide a novel, computerized security feature(s) that protects data of media files from unintended exposure to third parties. The disclosed security features automatically prevent personal and/or private information from unwanted viewing and access from unauthenticated users.