G06F21/125

Systems and methods for securing and controlling access to electronic data, electronic systems, and digital accounts
11586711 · 2023-02-21 · ·

A system and method of securing a computing device with a remote computer security service includes: identifying a computing device that is subscribed to a remote computer security service, wherein the computing device comprises an anti-authentication application instance provided by the remote computer security service based on the subscription; identifying an occurrence of an anti-authentication action involving the computing device based on anti-authentication policy set to a subscriber anti-authentication account with the remote computer security service for the computing device; responsively to the anti-authentication action, automatically performing by the remote security service or the anti-authentication application instance one or more anti-authentication protective services by protectively altering the computing device based on the anti-authentication policy, wherein the computing device is altered to a protected state from a normal state based on the performance of the one or more anti-authentication protective services.

Protecting commercial off-the-shelf program binaries from piracy using hardware enclaves

This disclosure describes systems and methods for protecting commercial off-the-shelf software program code from piracy. A software program may include multiple image files having code and data. A platform may modify the executable file such that the data may be placed at a location in memory that is an arbitrary distance from the code. The platform may encrypt the code and provide it to a computing device comprising a hardware enclave. The computing device may load the encrypted code into the hardware enclave but load the data into memory outside the hardware enclave. The computing device may request a decryption key from an authentication server using a hash of the hardware enclave signed by a processor. The authentication server may provide the decryption key if it verifies the signature and the hash. The computing device may decrypt the code and mark the hardware enclave as non-readable.

PROTECTING COMMERCIAL OFF-THE-SHELF PROGRAM BINARIES FROM PIRACY USING HARDWARE ENCLAVES
20230044383 · 2023-02-09 ·

This disclosure describes systems and methods for protecting commercial off-the-shelf software program code from piracy. A software program may include an executable file having code and data. A platform may modify the executable file such that the data may be placed at a location in memory that is an arbitrary distance from the code. The platform may modify the executable file to include a separation header. The separation header may indicate that the data can be placed at an arbitrary distance in the memory from the code. The separation header may indicate that the code should be loaded into a hardware enclave and that the data should be loaded outside of the hardware enclave. The platform may encrypt the code and provide it to a computing device. The computing device may load the encrypted code into the hardware enclave but load the data into memory outside the hardware enclave.

Methods for managing verification and validation of third-party code and devices thereof
11615181 · 2023-03-28 · ·

The disclosed technology relates to verifying and validating a received executable function to be executed on a function as a service platform (FaaS), by applying one or more verification and validation techniques prior to runtime. The verified and validated executable function is temporarily stored. The temporarily stored verified and validated executable function is executed on the FaaS platform at the runtime.

Electronic device for protecting application from abnormal environment and operating method thereof

Provided is a method of protecting an application from reverse engineering. The method includes registering, in an electronic device, a handler capable of being called as a preset fault is generated in the application, after the handler is registered, executing a protection code for generating the preset fault in the application, determining whether an environment where the application is executed is an abnormal environment, based on whether the handler has been called as the protection code is executed, and performing an operation for protecting the application, based on a result of the determination.

Blockchain based vehicle control

A vehicle control method of starting and shutting down an engine, in which a processor receives a blockchain update comprising a first transaction with instructions to perform an engine startup or shutdown; the blockchain update is validated; an engine startup or shutdown is performed based on the validated blockchain update; where the engine startup or shutdown is delayed based on validating a predetermined number of subsequent blockchain updates, including a second transaction with instructions to perform the engine startup or shutdown.

SYSTEM TO DETECT AUTOMATED WEB SUBMISSIONS

A system to identify automated submissions of web pages, such as those submitted by bots, in real time. The system comprising a processor configured to update an initial version of a requested web page with at least one hidden field, transmit the updated web page to the client, then, upon receipt parse the completed web page, and identify if a data entry is associated with the at least one hidden field. Where a data entry is associated with the at least one hidden field, the system blocks the transmission of the completed web page to the server. Where a data entry is not associated with the at least one hidden field the system removes the at least one hidden field, and transmits the final web page to the server.

Method for licensing a tool chain
11663301 · 2023-05-30 · ·

A method for the usage-based licensing of one or more applications in a container, wherein the container comprises a license module, an application queries the presence of an application license via the license module and is only executed if an application license is present. In the license module, a linking of one or more application licenses with a unique identifier is stored, and the container comprises a settlement module, which retrieves a usage unit from an external license source. For the duration of an obtained usage unit, the settlement module provides the unique identifier in a secure data storage so that all applications linked with the unique identifier can be executed. A computer system and a computer program product are also provided.

Systems and methods for localized file transfer with file degradation

Systems and methods for redeeming digital files are disclosed. In particular, the systems and methods relate to localized sharing of digital files such that the digital file is degraded when the file is redeemed. The digital file can include a plurality of bits, and bits of the digital file can be removed upon each transfer and/or access of the digital file. When a quantity of bits in the digital file falls below a predetermined threshold, the digital file can be deactivated. The systems can include an application that degrade the digital file. The degradation can include file compression, bitrate reduction, and/or removal of parity bits from the digital file. Security measures, such as private/public encryption keys, are also disclosed herein.

Tokenizing Digital Assets with Restrictions on a Blockchain
20220327225 · 2022-10-13 ·

An electronic device receives, from a user, a restriction that restricts how sound of a digital asset plays to non-owners of the digital asset that is tokenized as a non-fungible token (NFT). One or more electronic devices tokenize the digital asset as the NFT on a blockchain that stores the restriction how the sound of the digital asset plays to the non-owners of the NFT.