Patents Assigned to Irdeto B.V.
  • Patent number: 11947665
    Abstract: Systems, methods, and storage media for creating secured computer code from original computer code are disclosed. The secured computer code is created from original computer code and has a secured interface between a first code domain and a second code domain of the original computer code, the first code domain including code in a first coding language and the second code domain including code in a second coding language, the first code domain being compiled separately from the second code domain. Exemplary implementations may: identify a code method defined in the first code domain that is declared in the second code domain; create a corresponding code method in the second code domain that has a signature that corresponds to a signature of the code method; and create a transformed code method in the first code domain.
    Type: Grant
    Filed: February 25, 2022
    Date of Patent: April 2, 2024
    Assignee: IRDETO B.V.
    Inventor: Damon Peng
  • Patent number: 11809532
    Abstract: A method for detection of modification of an item of content, the method comprising: obtaining, for the item of content, a respective first value of each attribute in a set of one or more attributes of the item of content, the set of one or more attributes selected such that, for each of one or more predetermined types of modification, said type of modification affects the value of at least one attribute in the set of one or more attributes; performing a watermark decoding operation on the item of content; and in response to the watermark decoding operation producing payload data from the item of content: determining that the one or more predetermined types of modification have not been applied to the item of content if, for each attribute in the set of one or more attributes, the respective first value for that attribute matches a respective second value for that attribute determined using the payload; or determining that a modification has been applied to the item of content if, for at least one attribute i
    Type: Grant
    Filed: October 14, 2020
    Date of Patent: November 7, 2023
    Assignee: Irdeto B.V.
    Inventors: Arnoud Van Foreest, Kimon Tsitsikas, Vyacheslav Shoshin, Chunqiu Lu, Lin Yuan, Yu Duan, Maksym Koshel, Kostiantyn Shevchenko, Svetislav Momcilovic, Vladimir Zivkovic
  • Patent number: 11755724
    Abstract: A method of securing a software routine implemented in a software instance executing in an execution environment, the method comprising: initializing a code block of the software instance with a reference to the software routine by storing the reference such that the stored reference is inaccessible to code outside of the code block; and returning a reference to the code block, the reference to the code block used by the software instance outside of the code block to invoke the software routine; wherein the code block is configured to: (a) invoke the software routine using the stored reference, and, (b) after a predetermined number of invocations of the software routine by the code block, modify the stored reference so as to prevent further invocation of the software routine by the code block.
    Type: Grant
    Filed: January 21, 2022
    Date of Patent: September 12, 2023
    Assignee: Irdeto B.V.
    Inventor: Yaser Eftekhari Roozbehani
  • Patent number: 11727102
    Abstract: There are described computer-implemented methods of obtaining a user input. A first such method comprises: (a) providing access to video content, the video content representing a user interface including a plurality of elements for selection by a user; (b) playing a first portion of the video content to the user; (c) detecting a first user interaction occurring in response to the played first portion of the video content; and (d) determining a first element selected by the user based on one or more properties of the detected first user interaction.
    Type: Grant
    Filed: April 21, 2021
    Date of Patent: August 15, 2023
    Assignee: Irdeto B.V.
    Inventors: Annie Liu, Wim Mooij, Sunitha Ramakrishna, Catherine Chambers
  • Patent number: 11722529
    Abstract: A method and system for managing shared use of an asset. An asset device and an owner device accomplish an initial setup procedure to register the owner with the asset. One or more secure policies are then sent from the owner device, or another device authorized to create policies, to one or more user devices. The policies express user conditions and limitations for using the asset. Subsequently, the user device transmits the secure policy to the asset device. Once the policy has been transferred from the user device to the asset device, user associated with the user device can request use of the asset and will be granted the requested use if the requested use is permitted by the policy.
    Type: Grant
    Filed: February 8, 2022
    Date of Patent: August 8, 2023
    Assignee: Irdeto B.V.
    Inventors: Yaser Eftekhari Roozbehani, Clifford Liem
  • Patent number: 11675880
    Abstract: A method for securing a webpage or a webapp processed by a browser executing on a client system, the method comprising the browser executing an instance of white-box protected code, wherein execution of the instance of white-box protected code causes the client system to: generate a message comprising message data for use by a control system to perform one or more security tests, the control system communicably connected to the client system via a network; send the message to the control system to enable the control system to perform the one or more security tests using the message data; receive a response from the control system based, at least in part, on the message; and process the response.
    Type: Grant
    Filed: November 5, 2020
    Date of Patent: June 13, 2023
    Assignee: Irdeto B.V.
    Inventors: Benjamin Geoffrey Gidley, Catherine Chambers, Yaser Eftekhari Roozbehani, Yegui Cai, Yuan Xiang Gu
  • Patent number: 11637835
    Abstract: Methods and systems for providing secure digital access to services are described. Embodiments include user behavior tracking, learning, and updating one or more contextual access algorithms and thereafter can act as multi-factor authentications. The method may include receiving data for a group of users and initializing a machine learning algorithm with the group data. The method may also collect individual user data and context data periodically, including characteristic behavior data, and update the machine learning algorithm with the individual user data. The method may further calculate a threshold for tolerance based on the updated algorithm, and verify user requests for access to the service. A multi-factor authentication may be presented to the user when the verifications are not acceptable, such as by being below a threshold. A permissions data structure can be generated and used to control access to the service.
    Type: Grant
    Filed: June 17, 2020
    Date of Patent: April 25, 2023
    Assignee: Irdeto B.V.
    Inventors: Clifford Liem, Martin Soukup, Daniel Murdock
  • Patent number: 11606211
    Abstract: A method of operating a system, wherein the system comprises a plurality of components, the method comprising: maintaining a distributed ledger, wherein the distributed ledger comprises data records, wherein each data record stores information concerning one or more respective components of the plurality of components; at least one component of the plurality of components processing the information stored in one or more respective data records of the distributed ledger to determine whether the system meets one or more respective security criteria; and one or both of: (i) the at least one component performing a respective first action if the at least one component determines that the system meets the one or more respective security criteria; and (ii) the at least one component performing a respective second action if the at least one component determines that the system does not meet the one or more respective security criteria.
    Type: Grant
    Filed: March 8, 2018
    Date of Patent: March 14, 2023
    Assignee: Irdeto B.V.
    Inventors: Clifford Liem, John O'Connor
  • Patent number: 11599651
    Abstract: A computer-implemented method, in which an access request in relation to data is received. There is Error Correcting Code (ECC) data relating to the data, and the ECC data is configured to enable correction of multiple-bit errors spanning up to a predetermined number of consecutive bits of the data. The ECC data is configured to enable correction of multiple-bit errors spanning up to a predetermined number of consecutive bits of the data. A first integrity verification verifies the integrity of at least the data. If the first integrity verification procedure fails, an error analysis procedure is performed based on the data and the ECC data. Responsive to generation of corrected data by the error analysis procedure, a second integrity verification verifies the integrity of the corrected data. If the second integrity verification is successful, the access request is allowed using the corrected data.
    Type: Grant
    Filed: July 5, 2018
    Date of Patent: March 7, 2023
    Assignee: Irdeto B.V.
    Inventors: Peter Williams, Andrew Williams, Colin Hutchings
  • Patent number: 11581794
    Abstract: There is described a system comprising mechanical equipment and an apparatus for monitoring and/or controlling the mechanical equipment. The mechanical equipment vibrates at a frequency fvibration in use, and the apparatus is attached to the mechanical equipment such that the apparatus also vibrates when the mechanical equipment is in use. The apparatus comprises an electronics module and a resonant electric generator. The resonant electric generator has a resonant frequency f0 comparable to the vibrational frequency fvibration of the mechanical equipment. The resonant electric generator comprises a magnet having an associated a magnetic field, a coil electrically coupled to the electronics module, and a resilient member. The resilient member is configured, when the apparatus is vibrated at or around the resonant frequency f0, to cause relative oscillation of the coil and the magnet so as to induce an electric current in the coil to thereby power the electronics module.
    Type: Grant
    Filed: May 7, 2020
    Date of Patent: February 14, 2023
    Assignee: IRDETO B.V.
    Inventors: Lawrence John King, Pat Ford, Bevan Watkiss
  • Patent number: 11514159
    Abstract: A system and method is provided for implementing platform security on a consumer electronic device having an open development platform. The device is of the type which includes an abstraction layer operable between device hardware and application software. A secured software agent is provided for embedding within the abstraction layer forming the operating system. The secured software agent is configured to limit access to the abstraction layer by either blocking loadable kernel modules from loading, blocking writing to the system call table or blocking requests to attach debug utilities to certified applications or kernel components.
    Type: Grant
    Filed: December 9, 2021
    Date of Patent: November 29, 2022
    Assignee: Irdeto B.V.
    Inventor: Ron Vandergeest
  • Publication number: 20220318373
    Abstract: There is described a method of enabling identification of the execution state of an item of software at runtime. The method comprises receiving from one or more clients one or more respective labelled sets of invocation data generated at the one or more clients by the execution of an executable of the item of software configured to cause the collection of invocation data at runtime for one or more callable units of the item of software, wherein each labelled set of invocation data comprises a label indicating an execution state of the item of software during a respective portion of runtime and invocation data corresponding to said respective portion of runtime; training, based on said collection of invocation data, an identification algorithm to identify the execution state of the item of software from collected invocation data of the item of software.
    Type: Application
    Filed: March 28, 2022
    Publication date: October 6, 2022
    Applicant: Irdeto B.V.
    Inventors: Tomasz FRYDRYCH, Michail GRESHISHCHEV, Jakub JANOWSKI, Peter MEERWALD-STADLER, Duncan OGILVIE, Piotr SKRZYPCZAK, Markus SPITZLINGER, Grzegorz TERLIKOWSKI
  • Publication number: 20220292351
    Abstract: Disclosed implementations include a depth generation method using a novel teacher-student GAN architecture (TS-GAN) to generate depth images for 2-D images, such as RGB images, where no corresponding depth information is available. An example model consists of two components, a teacher and a student. The teacher consists of a fully convolutional encoder-decoder network as a generator along with a fully convolution classification network as the discriminator. The generator takes 2-D images as inputs and aims to output the corresponding depth images. The teacher learns an initial latent mapping between 2-dimensional and co-registered depth images and the student applies the latent mapping to provide feedback to the classification network for refinement.
    Type: Application
    Filed: March 9, 2022
    Publication date: September 15, 2022
    Applicant: IRDETO B.V.
    Inventors: Ali ETEMAD, Alireza SEPAS-MOGHADDAM, Hardik UPPAL, Michael GREENSPAN, Martin SOUKUP
  • Patent number: 11411826
    Abstract: There is described a method of monitoring a peer-to-peer network. The method comprises: (i) monitoring network traffic between a first peer and the peer-to-peer network so as to identify a first subset of peers in the peer-to-peer network; and (ii) preventing the first peer from communicating with at least one peer in the first subset of peers to thereby cause the first peer to communicate with at least one further peer in the peer-to-peer network so as to enable identification of the at least one further peer.
    Type: Grant
    Filed: March 30, 2015
    Date of Patent: August 9, 2022
    Assignee: Irdeto B.V.
    Inventor: Dmitri Jarnikov
  • Patent number: 11403381
    Abstract: A method of performing biometric authentication for a first user, the method comprising: performing one or more first tests, wherein for each first test, performing said first test comprises: obtaining a respective first input for said first test based on one or more biometric characteristics of the first user; determining that the first user is not a predetermined user when a respective first log-likelihood ratio for a first likelihood and a second likelihood does not exceed a respective first threshold for said first test, wherein the first likelihood is a likelihood of obtaining the respective first input based on a first model in which input is obtained from the predetermined user, and wherein the second likelihood is a likelihood of obtaining the respective first input based on a second model in which input is obtained from one or more users other than the predetermined user; determining that the first user is the predetermined user when the respective first log-likelihood ratio exceeds a respective seco
    Type: Grant
    Filed: May 28, 2020
    Date of Patent: August 2, 2022
    Assignee: Irdeto B.V.
    Inventors: Petrus Lambertus Adrianus Roelse, Shufei He
  • Patent number: 11366748
    Abstract: The disclosure is directed to a method, system and a computer readable medium of fuzzy testing a software system, using a grey-box fuzzy testing framework that optimizes the vulnerability exposure process while addressing security testing challenges. The grey-box fuzzy testing framework, unlike white-box testing, provides a focused and efficient assessment of a software system without analyzing each line of code. The disclosed embodiments provide a robust security mechanism that accumulates information about the system without increasing testing complexity, enabling fast and efficient security testing. The disclosed embodiments use security vulnerability metrics designed to identify vulnerable components in the software systems and ensures thorough testing of these components by assigning weights. A mutation engine may perform small data type mutations at the input's high-level design.
    Type: Grant
    Filed: March 4, 2021
    Date of Patent: June 21, 2022
    Assignee: Irdeto B.V.
    Inventors: Lama Moukahal, Mohammad Zulkernine
  • Patent number: 11354410
    Abstract: There is described a method of protecting an item of software so as to obfuscate a condition which causes a variation in control flow through a portion of the item of software dependent on whether the condition is satisfied, wherein satisfaction of the condition is based on evaluation of one or more condition variables. The method comprises: (i) modifying the item of software such that the control flow through said portion is not dependent on whether the condition is satisfied; and (ii) inserting a plurality of identity transformations into expressions in said portion of the modified item of software, wherein the identity transformations are defined and inserted such that, in the absence of tampering, they maintain the results of the expressions if the condition is satisfied and such that they alter the results of the expressions if the condition is not satisfied, wherein each identity transformation is directly or indirectly dependent on at least one of the one or more condition variables.
    Type: Grant
    Filed: March 30, 2015
    Date of Patent: June 7, 2022
    Assignee: IRDETO B.V.
    Inventors: Yuan Xiang Gu, Harold Johnson
  • Publication number: 20220171697
    Abstract: A method of fuzzy testing a software system, wherein the software system comprises a plurality of callable units and is arranged to receive input for the software system to process, the method comprising: determining, for each callable unit of the plurality of callable units, based on one or more security vulnerability metrics, a target number of times that callable unit is to be tested; initializing a ranked plurality of queues, each queue for storing one or more seeds, said initializing comprising storing one or more initial seeds in a corresponding queue of the ranked plurality of queues; performing a sequence of tests, wherein performing each test comprises: obtaining a seed from the highest ranked non-empty queue; performing a mutation process on the obtained seed to generate a test seed; providing the test seed as input to the software system for the software system to process; and evaluating the processing of the test seed by the software system to generate a result for the test; wherein each queue in
    Type: Application
    Filed: March 4, 2021
    Publication date: June 2, 2022
    Applicant: IRDETO B.V.
    Inventors: Lama MOUKAHAL, Mohammad ZULKERNINE
  • Publication number: 20220166802
    Abstract: A method and system for managing shared use of an asset. An asset device and an owner device accomplish an initial setup procedure to register the owner with the asset. One or more secure policies are then sent from the owner device, or another device authorized to create policies, to one or more user devices. The policies express user conditions and limitations for using the asset. Subsequently, the user device transmits the secure policy to the asset device. Once the policy has been transferred from the user device to the asset device, user associated with the user device can request use of the asset and will be granted the requested use if the requested use is permitted by the policy.
    Type: Application
    Filed: February 8, 2022
    Publication date: May 26, 2022
    Applicant: IRDETO B.V.
    Inventors: Yaser Eftekhari Roozbehani, Clifford Liem
  • Publication number: 20220147618
    Abstract: A method of securing a software routine implemented in a software instance executing in an execution environment, the method comprising: initializing a code block of the software instance with a reference to the software routine by storing the reference such that the stored reference is inaccessible to code outside of the code block; and returning a reference to the code block, the reference to the code block used by the software instance outside of the code block to invoke the software routine; wherein the code block is configured to: (a) invoke the software routine using the stored reference, and, (b) after a predetermined number of invocations of the software routine by the code block, modify the stored reference so as to prevent further invocation of the software routine by the code block.
    Type: Application
    Filed: January 21, 2022
    Publication date: May 12, 2022
    Applicant: IRDETO B.V.
    Inventor: Yaser Eftekhari Roozbehani