Matches 1 - 50 out of 95 1 2 >


Match Document Document Title
10700849 Balanced encoding of intermediate values within a white-box implementation  
A method of implementing a keyed cryptographic operation using a plurality of basic blocks, includes: generating a balanced encoding function; applying the balanced encoding function to the output...
EP2892175B1 SECURE SOFTWARE COMPONENTS ANTI-REVERSE-ENGINEERING BY TABLE INTERLEAVING  
EP2942727B1 RETURN-ORIENTED PROGRAMMING AS AN OBFUSCATION TECHNIQUE  
EP3062256B1 FLEXIBLE INSTRUCTIONS SETS FOR OBFUSCATED VIRTUAL MACHINES  
EP2456121B1 Challenge response based enrollment of physical unclonable functions  
EP2937803B1 CONTROL FLOW FLATTENING FOR CODE OBFUSCATION WHERE THE NEXT BLOCK CALCULATION NEEDS RUN-TIME INFORMATION  
EP2890172B1 Flexible data authentication for an NFC data exchange format NDEF message  
EP2884786B1 Restricting software to authorized wireless environments  
10171234 Wide encoding of intermediate values within a white-box implementation  
A method for a method for mapping an input message to an output message by a keyed cryptographic operation in a cryptographic system, including a plurality of rounds wherein each round has a...
10147086 Digital wallet device for virtual wallet  
A reconfigurable digital wallet device such as a smart card containing a secure element and acting as an instantiation of a subset of a virtual wallet stored in the cloud. The digital wallet...
10102522 Digital wallet bridge  
A smartcard communicating simultaneously with a smart phone and a point of sale, thereby allowing the smartcard to act as a bridge between the point of sale and the smart phone. The smart card is...
10097342 Encoding values by pseudo-random mask  
A method for a keyed cryptographic operation by a cryptographic system mapping an input message to an output message, including: receiving input data for the keyed cryptographic operation;...
EP2876593B1 Method of generating a structure and corresponding structure  
9965401 Method of obfuscating a code  
A method of obfuscating a code is provided, wherein the method comprises performing a first level obfuscating technique on a code to generate a first obfuscated code, and performing a second level...
9953144 Constellation based device binding  
A method of binding a software to a device is disclosed. Accordingly, during a setup of the software in the device, a unique identifier is derived from contents stored in the device and the...
EP2887610B1 Binding mobile device secure software components to the SIM  
9823860 One-time programming in reprogrammable memory  
A portion of a reprogrammable storage device is used to implement permanent data storage. The storage device includes a plurality of electrically erasable memory elements and a controller. The...
9693224 Restricting software to authorized wireless environments  
An apparatus for restricting execution of software is disclosed. The apparatus includes a telecommunication device configured to communicate with a wireless device (e.g., an RFID device) using a...
US20170180119 WIDE ENCODING OF INTERMEDIATE VALUES WITHIN A WHITE-BOX IMPLEMENTATION  
A method for a method for mapping an input message to an output message by a keyed cryptographic operation in a cryptographic system, the keyed cryptographic operation including a plurality of...
EP3182637A1 WIDE ENCODING OF INTERMEDIATE VALUES WITHIN A WHITE-BOX IMPLEMENTATION  
A method for a method for mapping an input message to an output message by a keyed cryptographic operation in a cryptographic system, the keyed cryptographic operation including a plurality of...
9584514 Binding mobile device secure software components to the SIM  
Various embodiments include a method for binding a secure software application to a mobile device wherein the mobile device includes a processor and a subscriber identity module (SIM) card,...
9576116 Secure software components anti-reverse-engineering by table interleaving  
A method of securely implementing functions in a secure software application, including: determining, by a processor, two functions to be implemented by the secure software application; generating...
9563754 Method of generating a structure and corresponding structure  
Disclosed is a method of generating a structure comprising at least one virtual machine, the method comprising: obfuscating a first virtual machine source code, thereby yielding a first obfuscated...
US20170033922 Balanced Encoding of Intermediate Values Within a White-Box Implementation  
A method of implementing a keyed cryptographic operation using a plurality of basic blocks, includes: generating a balanced encoding function; applying the balanced encoding function to the output...
US20170033921 Encoding Values by Pseudo-Random Mask  
A method for a keyed cryptographic operation by a cryptographic system mapping an input message to an output message, including: receiving input data for the keyed cryptographic operation;...
EP3125462A1 BALANCED ENCODING OF INTERMEDIATE VALUES WITHIN A WHITE-BOX IMPLEMENTATION  
A method of implementing a keyed cryptographic operation using a plurality of basic blocks, includes: generating a balanced encoding function; applying the balanced encoding function to the output...
US20170024331 METHOD OF OBFUSCATING A CODE  
A method of obfuscating a code is provided, wherein the method comprises performing a first level obfuscating technique on a code to generate a first obfuscated code, and performing a second level...
US20160379131 FUZZY OPAQUE PREDICATES  
Disclosed are secure processes based upon fuzzy opaque predicates and machines such as processors and non-transitory machine-readable storage mediums encoded with instructions containing fuzzy...
US20160350520 Diversifying Control Flow of White-Box Implementation  
A non-transitory machine-readable storage medium encoded with instructions for execution by a keyed cryptographic operation by a cryptographic system mapping an input message to an output message,...
EP3099002A1 DIVERSIFYING CONTROL FLOW OF WHITE-BOX IMPLEMENTATION  
Various embodiments relate to a method of mapping an input message to an output message, comprising: receiving input data for a round of a keyed cryptographic operation; determining the order of...
9501301 Flexible instruction sets for obfuscated virtual machines  
A method for protecting computer software code is disclosed. In the embodiment, the method involves receiving instructions corresponding to computer software code for an application, the...
9465926 Method of obfuscating a code  
A method of obfuscating a code is provided, wherein the method comprises performing a first level obfuscating technique on a code to generate a first obfuscated code, and performing a second level...
US20160253189 FLEXIBLE INSTRUCTION SETS FOR OBFUSCATED VIRTUAL MACHINES  
A method for protecting computer software code is disclosed. In the embodiment, the method involves receiving instructions corresponding to computer software code for an application, the...
EP3062256A1 FLEXIBLE INSTRUCTIONS SETS FOR OBFUSCATED VIRTUAL MACHINES  
A method for protecting computer software code is disclosed. In the embodiment, the method involves receiving instructions corresponding to computer software code for an application, the...
9419803 Flexible data authentication  
Various exemplary embodiments relate to a method, device, and storage medium including: receiving an NDEF message by an NFC device including a payload and at least one of a digital signature and a...
9411597 Return-oriented programming as an obfuscation technique  
A method for obfuscating functionality of computer software is disclosed. In an embodiment, the method involves determining a first set of instructions needed to perform a target operation and a...
US20160134629 BINDING MOBILE DEVICE SECURE SOFTWARE COMPONENTS TO THE SIM  
Various embodiments include a method for binding a secure software application to a mobile device wherein the mobile device includes a processor and a subscriber identity module (SIM) card,...
9264899 Binding mobile device secure software components to the SIM  
A mobile device, including: a wireless communication interface; a memory storing a secure software application; and a processor in communication with the memory, the processor being configured to:...
US20150324585 RETURN-ORIENTED PROGRAMMING AS AN OBFUSCATION TECHNIQUE  
A method for obfuscating functionality of computer software is disclosed. In an embodiment, the method involves determining a first set of instructions needed to perform a target operation and a...
EP2942727A1 RETURN-ORIENTED PROGRAMMING AS AN OBFUSCATION TECHNIQUE  
A method for obfuscating functionality of computer software is disclosed. In an embodiment, the method involves determining a first set of instructions needed to perform a target operation and a...
EP2937803A1 CONTROL FLOW FLATTENING FOR CODE OBFUSCATION WHERE THE NEXT BLOCK CALCULATION NEEDS RUN-TIME INFORMATION  
A method of obscuring software code including a plurality of basic blocks wherein the basic blocks have an associated identifier (ID), including: determining, by a processor, for a first basic...
EP2884689A3 Random data from GNSS signals and secure random value provisioning for secure software component implementations  
A method for verifying the integrity of navigation data used to produce random values for a white-box cryptography system including: receiving information from a navigation system; verifying the...
US20150278489 CONSTELLATION BASED DEVICE BINDING  
A method of binding a software to a device is disclosed. Accordingly, during a setup of the software in the device, a unique identifier is derived from contents stored in the device and the...
US20150261458 ONE-TIME PROGRAMMING IN REPROGRAMMABLE MEMORY  
A portion of a reprogrammable storage device is used to implement permanent data storage. The storage device includes a plurality of electrically erasable memory elements and a controller. The...
EP2919236A1 One-time programming in reprogrammable memory  
A portion of a reprogrammable storage device is used to implement permanent data storage. The storage device includes a plurality of electrically erasable memory elements and a controller. The...
EP2892175A1 Secure software components anti-reverse-engineering by table interleaving  
A method of securely implementing functions in a secure software application, including: determining, by a processor, two functions to be implemented by the secure software application; generating...
US20150188712 FLEXIBLE DATA AUTHENTICATION  
Various exemplary embodiments relate to a method, device, and storage medium including: receiving an NDEF message by an NFC device including a payload and at least one of a digital signature and a...
US20150186627 SECURE SOFTWARE COMPNENTS ANTI-REVERSE-ENGINEERING BY TABLE INTERLEAVING  
A method of securely implementing functions in a secure software application, including: determining, by a processor, two functions to be implemented by the secure software application; generating...
EP2890172A1 FLEXIBLE DATA AUTHENTICATION FOR AN NFC DATA EXCHANGE FORMAT NDEF MESSAGE  
Various exemplary embodiments relate to a method, device, and storage medium including: receiving an NDEF message by an NFC device including a payload and at least one of a digital signature and a...
US20150181422 BINDING MOBILE DEVICE SECURE SOFTWARE COMPONENTS TO THE SIM  
A mobile device, including: a wireless communication interface; a memory storing a secure software application; and a processor in communication with the memory, the processor being configured to:...


Search
Matches 1 - 50 out of 95 1 2 >
« search again