|
2024
|
Invention
|
System and method for preventing attacks on a machine learning model based on an internal sate of... |
|
2023
|
Invention
|
Machine learning model protection.
A machine learning model protection method comprising: genera... |
|
2021
|
Invention
|
System and method for continuous user authentication. Methods and systems for continuously authen... |
|
2019
|
Invention
|
Systems, methods and storage media for producing verifiable protected code.
Systems, methods, an... |
|
|
Invention
|
Method and apparatus for implementing a white-box cipher.
An apparatus method and computer media... |
|
|
Invention
|
Systems, methods, and storage media for obfuscating a computer program by representing the contro... |
|
2014
|
Invention
|
System and method of interlocking to protect software-mediated program and device behaviours.
Me... |
|
2013
|
Invention
|
Securing accessible systems using cross-linking.
Systems and techniques for securing accessible ... |
|
|
Invention
|
Securing accessible systems using variable dependent coding. Systems and techniques for securing ... |
|
|
Invention
|
Securing accessible systems using base function encoding. Systems and techniques for securing acc... |
|
|
Invention
|
Securing accessible systems using dynamic data mangling. Systems and techniques for securing acce... |
|
|
Invention
|
Securing accessible systems using cross-linking. Systems and techniques for securing accessible c... |
|
|
Invention
|
Aes implementation with error correction.
A method of cryptographically processing a block of da... |
|
|
Invention
|
Method and system for platform and user application security on a device.
A method and system fo... |
|
2012
|
Invention
|
Secured execution of a web application. Methods and nodes for securing execution of a web applica... |
|
|
Invention
|
Method and system for preventing and detecting security threats. A system and method is provided ... |
|
|
Invention
|
Method for protecting data. In the present disclosure, a hash function is computed over a known i... |
|
|
Invention
|
Updating software components. A method and system for renewing software at the component-level is... |
|
|
Invention
|
Method and system for chain transformation.
A method and system for secure data protection is pr... |
|
|
Invention
|
Method and system for chain transformation. A method and system for secure data protection is pro... |
|
|
Invention
|
Method and apparatus for program flow in software operation. The present disclosure provides a de... |
|
|
Invention
|
System and method for generating and protecting cryptographic keys. In the present disclosure, im... |
|
2011
|
Invention
|
Method and system for enhancing content security. There is provided a method and system for enhan... |
|
2010
|
Invention
|
System and method to protect java bytecode code against static and dynamic attacks within hostile... |
|
|
Invention
|
System and method for efficiently deploying massively diverse program instances to resist differe... |
|
|
Invention
|
Interlocked binary protection using whitebox cryptography. A system and method for transforming a... |
|
|
Invention
|
System and method for protecting cryptographic assets from a white-box attack. A digital signatur... |
|
|
Invention
|
System and method for encapsulating and enabling protection through diverse variations in softwar... |
|
|
Invention
|
Method for linking and loading to protect applications. A linker or loader, and associated method... |
|
|
Invention
|
A system and method for encapsulating and enabling protection through diverse variations in softw... |
|
|
Invention
|
System and method for dynamic, variably-timed operation paths as a resistance to side channel and... |
|
|
Invention
|
System and method for random algorithm selection to dynamically conceal the operation of software... |
|
2009
|
Invention
|
A system and method for aggressive self-modification in dynamic function call systems. Embodiment... |
|
|
Invention
|
Authenticated database connectivity for unattended applications. A custom database connectivity c... |
|
|
Invention
|
System and method for generating white-box implementations of software applications. A developmen... |
|
2003
|
Invention
|
System and method of foiling buffer-overflow and alien-code attacks. The present invention relate... |
|
2002
|
Invention
|
Secure method and system for handling and distributing digital media. A great deal of intellectua... |
|
|
Invention
|
Method and system for sustainable digital watermarking. Digital marks (so-called fingerprints and... |