G06F21/1066

Mechanism for providing obfuscated code to web application clients
11397795 · 2022-07-26 · ·

A method by one or more network devices for providing obfuscated code to web application clients. The method includes determining a configuration utilized by a web application client based on a header of a web application layer request generated by the web application client, selecting, for providing to the web application client with a web application layer response corresponding to the web application layer request, an obfuscated code from a plurality of obfuscated codes for the configuration utilized by the web application client, where the plurality of obfuscated codes for the configuration utilized by the web application client provide the same intended functionality but are obfuscated differently from each other, and providing the selected obfuscated code to the web application client with the web application response.

Secure machine executable code deployment and execution method and system

Described are various embodiments of a machine executable code deployment method and system. In one such embodiment, a machine executable code deployment method is described to comprise: compiling machine readable code in a secure digital processing environment to produce a unique ephemeral machine executable code instance representative thereof; deploying the unique ephemeral machine executable code instance to a distinct digital processing environment to be executed thereon for a predetermined runtime period, wherein execution of the unique ephemeral machine executable code instance is automatically terminated after the predetermined runtime period; and repeating the deploying for subsequent unique ephemeral machine executable code instances.

Systems, methods, and storage media for creating secured computer code having entangled transformations
11204985 · 2021-12-21 · ·

Systems, methods, and storage media for rendering target code are disclosed. Exemplary implementations may: receive the input code; apply at least one obfuscation transformation to multiple code functions of the input code to create transformed code including transformed code functions; determine a shared constant; determine a function-expression; and replace, for each transformed code function in the transformed code, the transformation parameters with the function expression and the at least one cloaked constant to create target code in which the transformed code functions are entangled to thereby render the target code protected against static analysis attacks.

Method for the computer-aided obfuscation of program code
11341216 · 2022-05-24 · ·

Provided is a method for computer-aided obfuscation of program code, wherein a plurality of calculation steps is implemented in the program code, wherein predetermined calculation steps of the plurality of calculation steps are retrieved in a predetermined order with the execution of the program code, and at least some of the predetermined calculation steps are predefined calculation steps in which a respective first table that is stored in the program code and includes of a plurality of digital first tabular values is accessed in order to read a first tabular value required for the respective predefined calculation step from the first table. As part of the obfuscation of the program code, a dynamic mask formed by a plurality of digital mask values is used, wherein, for any predefined calculation step, another mask value is used to replace the first tabular value from the first table with a second tabular value.

SYSTEM AND METHOD FOR CONTROLLING AND ORGANIZING METADATA ASSOCIATED WITH ON-LINE CONTENT
20220147599 · 2022-05-12 ·

A system and method are disclosed for controlling metadata associated with content on an electronic device that includes displaying interface screens for user entry of metadata control instructions, accepting user instructions, modifying metadata of applicable content, and associating the modified metadata with the applicable content. The system can export and/or store the applicable content along with modified metadata. The system can automatically modify metadata according to one or more profiles. Relevant profiles can be determined based on the export mechanism, destination or type of content. The system can add watermarks to indicate metadata modification. The system can display metadata for user modification. The content can include photos, videos or other content. The system can display metadata and geolocation indicators for each content item that indicate whether that item has associated metadata and geolocation information. The user can selectively modify metadata of selected content.

SYSTEM, METHOD, AND COMPUTER-ACCESSIBLE MEDIUM FOR REGISTER-TRANSFER LEVEL LOCKING AGAINST AN UNTRUSTED FOUNDRY
20220147598 · 2022-05-12 ·

Exemplary system, method, and computer-accessible medium for protecting at least one integrated circuit (IC) design, includes generating an abstract syntax tree (“AST”) based on a hardware description language and a first register-transfer level (RTL) design. The method also includes selecting semantic elements in the AST to lock and locking the selected semantic elements. Additionally, the method includes a procedure for generating a second RTL design.

System and method for controlling and organizing metadata associated with on-line content
11232165 · 2022-01-25 · ·

A system and method are disclosed for controlling metadata associated with content on an electronic device that includes displaying interface screens for user entry of metadata control instructions, accepting user instructions, modifying metadata of applicable content, and associating the modified metadata with the applicable content. The system can export and/or store the applicable content along with modified metadata. The system can automatically modify metadata according to one or more profiles. Relevant profiles can be determined based on the export mechanism, destination or type of content. The system can add watermarks to indicate metadata modification. The system can display metadata for user modification. The content can include photos, videos or other content. The system can display metadata and geolocation indicators for each content item that indicate whether that item has associated metadata and geolocation information. The user can selectively modify metadata of selected content.

Data masking system
11216569 · 2022-01-04 · ·

A data conversion unit that converts all or part of first data including secret target information and a part including the secret target information, into second data for reading or viewing; a masking processing unit that performs masking processing on the second data, thereby generating masking data; a storage unit that stores the masking data; and an output unit that outputs the masking data stored in the storage unit.

SOFTWARE TAMPER RESISTANCE
20210342420 · 2021-11-04 · ·

The present disclosure relates to software tampering resistance. In one aspect, a method for generating protected code is provided, comprising identifying a primary function in code to be obscured, the primary function being a function used to verify the integrity of the code run-time. The method then comprises generating a finite state machine from the primary function, wherein a state of the finite state machine at a given instance defines an element of the primary function to be executed. The method then comprises distributing the finite state machine throughout the code to obscure one or more areas of the code.

Authenticating media data based on steganographic and blockchain techniques

Methods, systems, and devices that support determining whether media data has been altered are described. Captured media data may be segmented into one or more subsets, and cryptographic representations (e.g., hashes) based on the subsets may be written to an immutable ledger, possibly along with metadata and other related data. A block of a blockchain may be created for each entry in the immutable ledger. A set of media data may be validated, if a corresponding immutable ledger exists, based on segmenting the set of media data into one or more subsets in accordance with the segmenting upon capture, creating candidate cryptographic representations (e.g., hashes) based on the subsets, and comparing the candidate cryptographic representations with contents of the corresponding immutable ledger.