Patents by Inventor Jerome Witmann
Jerome Witmann has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8356295Abstract: A technique for making post-signing modifications to a digitally-signed software application without invalidating the signature can be used to enhance a user experience when downloading the software application. An extension module extends the length of a signature section at the end of an executable file for the digitally-signed software application to form a storage section. A header adjustment module adjusts the header to indicate size of the storage section appended at the end of the executable file. A data insertion module inserts post-signing data into the storage section, and the validity of the digital signature is maintained without requiring the file to be re-signed after insertion of the post-signing data. Thus, a software vendor can add into the software user-specific data after the file has been signed, while still maintaining the signature's validity, so the software can be downloaded with minimal interruption to the user.Type: GrantFiled: February 16, 2006Date of Patent: January 15, 2013Assignee: Symantec CorporationInventors: Ben Francis Yaldwyn, Jérôme Witmann
-
Patent number: 7555780Abstract: The present invention discloses an improved information security system and method. A polymorphic engine is used to enhance the security features of a software application and the data generated by or made available to the application and/or the operating system. The polymorphic engine operates to randomly alter the standard executable code of the original application while preserving its functional characteristics. Each polymorphed instance of the application differs from any other instance of the same application in form only. Various other security features operate to protect the polymorphic engine itself and/or the polymorphed code generated therefrom. These other security features include: just-in-time instruction code decryption; virtual CPU instruction code pre-processing; call mutation; stack manipulation; secure hook-capture of device input; secure display device output; application level decryption of encrypted hardware data streams; and a dynamic, randomly configured graphical keypad interface.Type: GrantFiled: February 16, 2005Date of Patent: June 30, 2009Assignee: Symantec CorporationInventors: David Tucker, Matt A. Crump, Jerome Witmann
-
Patent number: 7409713Abstract: A method of protecting application program software includes steps of (a) actuating a tracer function to copy 21 to n instructions from the API code; (b) storing and executing the instructions; and (c) returning to the next instruction (2(1 to n)+1) of the API code, where 21 to n represents the number of instructions and n is the maximum number of instructions describing the API code.Type: GrantFiled: December 2, 2003Date of Patent: August 5, 2008Assignee: Xtreamlok Pty. LtdInventor: Jerome Witmann
-
Patent number: 7171693Abstract: The present invention discloses an improved information security system and method. A polymorphic engine is used to enhance the security features of a software application and the data generated by or made available to the application and/or the operating system. The polymorphic engine operates to randomly alter the standard executable code of the original application while preserving its functional characteristics. Each polymorphed instance of the application differs from any other instance of the same application in form only. Various other security features operate to protect the polymorphic engine itself and/or the polymorphed code generated therefrom. These other security features include: just-in-time instruction code decryption; virtual CPU instruction code pre-processing; call mutation; stack manipulation; secure hook-capture of device input; secure display device output; application level decryption of encrypted hardware data streams; and a dynamic, randomly configured graphical keypad interface.Type: GrantFiled: May 14, 2001Date of Patent: January 30, 2007Assignee: Xtreamlok Pty LtdInventors: David Tucker, Matt A. Crump, Jerome Witmann
-
Publication number: 20060184798Abstract: A technique for making post-signing modifications to a digitally-signed software application without invalidating the signature can be used to enhance a user experience when downloading the software application. An extension module extends the length of a signature section at the end of an executable file for the digitally-signed software application to form a storage section. A header adjustment module adjusts the header to indicate size of the storage section appended at the end of the executable file. A data insertion module inserts post-signing data into the storage section, and the validity of the digital signature is maintained without requiring the file to be re-signed after insertion of the post-signing data. Thus, a software vendor can add into the software user-specific data after the file has been signed, while still maintaining the signature's validity, so the software can be downloaded with minimal interruption to the user.Type: ApplicationFiled: February 16, 2006Publication date: August 17, 2006Inventors: Ben Yaldwyn, Jerome Witmann
-
Publication number: 20060075260Abstract: The present invention discloses an improved information security system and method. A polymorphic engine is used to enhance the security features of a software application and the data generated by or made available to the application and/or the operating system. The polymorphic engine operates to randomly alter the standard executable code of the original application while preserving its functional characteristics. Each polymorphed instance of the application differs from any other instance of the same application in form only. Various other security features operate to protect the polymorphic engine itself and/or the polymorphed code generated therefrom. These other security features include: just-in-time instruction code decryption; virtual CPU instruction code pre-processing; call mutation; stack manipulation; secure hook-capture of device input; secure display device output; application level decryption of encrypted hardware data streams; and a dynamic, randomly configured graphical keypad interface.Type: ApplicationFiled: February 16, 2005Publication date: April 6, 2006Inventors: David Tucker, Matt Crump, Jerome Witmann
-
Publication number: 20060059111Abstract: An authentication method for securely disclosing confidential information over the internet using a three way authentication between the user, the user's registered computer and the transacting entity, such as a bank or other financial institution. The authenticating method applies another layer of security to internet transactions and provides a solution against phishing scams.Type: ApplicationFiled: September 10, 2004Publication date: March 16, 2006Inventors: David Tucker, Brook Lewis, Jerome Witmann, Matthew Keen, Craig Lucas
-
Publication number: 20050289511Abstract: The present invention discloses an improved information security system and method. A polymorphic engine is used to enhance the security features of a software application and the data generated by or made available to the application and/or the operating system. The polymorphic engine operates to randomly alter the standard executable code of the original application while preserving its functional characteristics. Each polymorphed instance of the application differs from any other instance of the same application in form only. Various other security features operate to protect the polymorphic engine itself and/or the polymorphed code generated therefrom. These other security features include: just-in-time instruction code decryption; virtual CPU instruction code pre-processing; call mutation; stack manipulation; secure hook-capture of device input; secure display device output; application level decryption of encrypted hardware data streams; and a dynamic, randomly configured graphical keypad interface.Type: ApplicationFiled: February 16, 2005Publication date: December 29, 2005Inventors: David Tucker, Matt Crump, Jerome Witmann
-
Publication number: 20050257054Abstract: The present invention discloses an improved information security system and method. A polymorphic engine is used to enhance the security features of a software application and the data generated by or made available to the application and/or the operating system. The polymorphic engine operates to randomly alter the standard executable code of the original application while preserving its functional characteristics. Each polymorphed instance of the application differs from any other instance of the same application in form only. Various other security features operate to protect the polymorphic engine itself and/or the polymorphed code generated therefrom. These other security features include: just-in-time instruction code decryption; virtual CPU instruction code pre-processing; call mutation; stack manipulation; secure hook-capture of device input; secure display device output; application level decryption of encrypted hardware data streams; and a dynamic, randomly configured graphical keypad interface.Type: ApplicationFiled: February 16, 2005Publication date: November 17, 2005Inventors: David Tucker, Matt Crump, Jerome Witmann
-
Publication number: 20050120236Abstract: A method of protecting application program software includes steps of (a) actuating a tracer function to copy 21 to n instructions from the API code; (b) storing and executing the instructions; and (c) returning to the next instruction (2(1 to n)+1) of the API code, where 21 to n represents the number of instructions and n is the maximum number of instructions describing the API code.Type: ApplicationFiled: December 2, 2003Publication date: June 2, 2005Applicant: Xtreamlok Pty LtdInventor: Jerome Witmann
-
Publication number: 20020016918Abstract: The present invention discloses an improved information security system and method. A polymorphic engine is used to enhance the security features of a software application and the data generated by or made available to the application and/or the operating system. The polymorphic engine operates to randomly alter the standard executable code of the original application while preserving its functional characteristics. Each polymorphed instance of the application differs from any other instance of the same application in form only. Various other security features operate to protect the polymorphic engine itself and/or the polymorphed code generated therefrom. These other security features include: just-in-time instruction code decryption; virtual CPU instruction code pre-processing; call mutation; stack manipulation; secure hook-capture of device input; secure display device output; application level decryption of encrypted hardware data streams; and a dynamic, randomly configured graphical keypad interface.Type: ApplicationFiled: May 14, 2001Publication date: February 7, 2002Inventors: David Tucker, Matt A. Crump, Jerome Witmann