Patent classifications
G06F21/1066
LOCAL FILE SECURITY
Disclosed is a system and method for increased security of files stored on local machines. The system and method include a number of checks to ensure that the file is being opened on the local machine where it was created. The checks may include a comparison to a CPUID of the machine on which the file is being opened to a CPUID stored in a script when the file was created. The checks may also include a review of a plurality of memory locations in search of artifacts indicating that the file is being opened on a virtual machine. A server may also check that any messages send from the local machine do not pass through an intermediate server.
Stored image privacy violation detection method and system
Methods and systems for detecting a privacy violation in an image file. A policy to be used by a master imaging application is obtained and a file system is monitored for a digital image modified by a monitored imaging application. It is then determined that the digital image file includes at least some content in violation of a defined setting for the master imaging application and, based on the determination that the digital image file includes at least some content in violation of the defined setting for the master imaging application, taking an action.
COMPUTERIZED SYSTEM AND METHOD FOR MODIFYING A MEDIA FILE BY AUTOMATICALLY APPLYING SECURITY FEATURES TO SELECT PORTIONS OF MEDIA FILE CONTENT
Disclosed are systems and methods for improving interactions with and between computers in content providing, generating, securing and/or hosting systems supported by or configured with personal computing devices, servers and/or platforms. The systems interact to identify and retrieve data within or across platforms, which can be used to improve the security and quality of data used in processing interactions between or among processors in such systems. The disclosed systems and methods provide added security features and functionality to media files through computerized, automated encoding and decoding of portions of media file content such that identified portions of the content are obfuscated upon display and communication to other users. The disclosed systems and methods provide a novel, computerized security feature(s) that protects data of media files from unintended exposure to third parties. The disclosed security features automatically prevent personal and/or private information from unwanted viewing and access from unauthenticated users.
System and method for implementing a trusted dynamic launch and trusted platform module (TPM) using secure enclaves
An apparatus and method are described for implementing a trusted dynamic launch and trusted platform module (TPM) using a secure enclave. For example, a computer-implemented method according to one embodiment of the invention comprises: initializing a secure enclave in response to a first command, the secure enclave comprising a trusted software execution environment which prevents software executing outside the enclave from having access to software and data inside the enclave; and executing a trusted platform module (TPM) from within the secure enclave, the trusted platform module securely reading data from a set of platform control registers (PCR) in a processor or chipset component into a memory region allocated to the secure enclave.
Protecting digital media with nested hashing techniques
Methods, systems, and devices that support determining whether media data has been altered are described. Captured media data may be segmented into one or more subsets, and cryptographic representations (e.g., hashes) based on the subsets may be written to an immutable ledger, possibly along with metadata and other related data. A block of a blockchain may be created for each entry in the immutable ledger. A set of media data may be validated, if a corresponding immutable ledger exists, based on segmenting the set of media data into one or more subsets in accordance with the segmenting upon capture, creating candidate cryptographic representations (e.g., hashes) based on the subsets, and comparing the candidate cryptographic representations with contents of the corresponding immutable ledger.
Electronic device for obfuscating and decoding data and method for controlling same
Disclosed are an electronic device for obfuscating user data and a server for decoding the same. A method for controlling an electronic device according to the present disclosure comprises the steps of: acquiring a security parameter according to data transmitted to an external server; applying an obfuscation algorithm to the data by using the security parameter; and transmitting the data, to which the obfuscation algorithm has been applied, to the external server. Furthermore, in connection with a method for controlling a system comprising an electronic device for obfuscating data and a server for decoding the same according to the present disclosure, a method for controlling the electronic device comprises the steps of: inserting a fingerprint into data; generating multiple pieces of split data having a preset first size on the basis of the data into which the fingerprint has been inserted; applying an obfuscation algorithm to one piece of split data selected from the multiple pieces of split data by using a preset security parameter; and transmitting the split data, to which the obfuscation algorithm has been applied, to the server. In addition, a method for controlling the server comprises the steps of: receiving the multiple pieces of split data, to which the obfuscation algorithm has been applied, from the electronic device; acquiring at least one piece of candidate data on the basis of the received multiple pieces of split data, to which the obfuscation algorithm has been applied; and acquiring data comprising the fingerprint among the at least one piece of candidate data.
Logging from obfuscated code
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for receiving an encrypted version of an obfuscated stack trace representing an error generated by error handling code of obfuscated code executed by a user device, the obfuscated stack trace having obfuscated code element names corresponding to deobfuscated code element names in a deobfuscated version of the code; decrypting the encrypted stack trace to generate an obfuscated stack trace; receiving an encrypted obfuscation log that maps obfuscated code element names of the obfuscated code executed by the user device to deobfuscated code element names in the deobfuscated version of the code; decrypting the encrypted obfuscation log to generate a decrypted obfuscation log; and generating a deobfuscated stack trace using the decrypted obfuscation log, the deobfuscated stack trace having deobfuscated code element names.
Authenticating media data based on metadata encoding
Methods, systems, and devices that support determining whether media data has been altered are described. Captured media data may be segmented into one or more subsets, and cryptographic representations (e.g., hashes) based on the subsets may be written to an immutable ledger, possibly along with metadata and other related data. A block of a blockchain may be created for each entry in the immutable ledger. A set of media data may be validated, if a corresponding immutable ledger exists, based on segmenting the set of media data into one or more subsets in accordance with the segmenting upon capture, creating candidate cryptographic representations (e.g., hashes) based on the subsets, and comparing the candidate cryptographic representations with contents of the corresponding immutable ledger.
System and Method of Governing Content Presentation of Multi-Page Electronic Documents
A method of governing content presentation of multi-page electronic documents includes providing, to a publisher, a document file, which includes a program file, and a text file functionally associated with the program file. The publisher provides the text file to an author, who creates a version of a work of content based on the text file that is parsed into defined units of content. The author provides the units of content of the current version of the work of content to a user, to be viewed by the user on a display device in a sequence determined by the author. Creating the at least one version of the work of content includes enabling a primary secondary action key such that actuation, by the user, of the primary secondary action key advances a reading frame viewable by the user by a number of strings between main pages, plus one.
Method to secure a software code
The present invention relates to method of securing a software code comprising at least one constant value, said method generating a secure software code and comprising the steps of: —determining (S1) by a processor in the software code a constant value to be protected, —inserting (S2) by the processor in the software code an indexed array of values such that the constant value to be protected can be determined from one value of the array, —replacing (S3) by the processor in the software code the constant value to be protected by a replacement variable, —inserting (S4) by the processor in the software code a first sequence of instructions which, when executed at runtime: •computes the index in the array of the value from which the constant value to be protected can be determined, •extracts from said array the value located at said computed index in said array, •from said extracted value, determines the constant value to be protected, •sets the value of said replacement variable equal to the determined constant value.