Patents by Inventor Csaba Andras Moritz
Csaba Andras Moritz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11582211Abstract: An example process includes breaking content into multiple fragments; and transmitting at least two of the multiple fragments over different physical channels in order to isolate the at least two fragments during transmission. The example process may include generating session keys; encrypting at least some of the fragments using different session keys; and associating, with each fragment, a session key used to encrypt a different fragment to produce fragment/session key pairs.Type: GrantFiled: November 13, 2019Date of Patent: February 14, 2023Assignee: BLUERISC, INC.Inventor: Csaba Andras Moritz
-
Patent number: 11507671Abstract: An example process includes: identifying, by one or more processing devices, candidate code in executable code based on a static analysis of the executable code, where the candidate code includes code that is vulnerable to attack or the candidate code being on a path to code that is vulnerable to attack, where information related to the attack is based, at least in part, on the candidate code; customizing, by one or more processing devices, a healing template based on the information to produce a customized healing template; and inserting, by one or more processing devices, the customized healing template into a version of the executable code at a location that is based on a location of the candidate code in the executable code, where the customized healing template includes code that is executable to inhibit the attack.Type: GrantFiled: July 29, 2020Date of Patent: November 22, 2022Assignee: BLUERISC, INC.Inventors: Csaba Andras Moritz, Kristopher Carver, Jeffry Gummeson
-
Patent number: 11507669Abstract: An example process includes identifying, by one or more processing devices, a location in computer code that is subject to vulnerability, where the location corresponds to a memory access that is repeatable and that operates on a particular type of variable; and performing processes, by one or more processing devices, to heal the vulnerability. The memory access may be part of a system-to-system or a user-to-system interaction that is repeatable.Type: GrantFiled: June 27, 2016Date of Patent: November 22, 2022Assignee: BlueRISC, Inc.Inventors: Csaba Andras Moritz, Kristopher Carver, Jeffry Gummeson
-
Patent number: 11163857Abstract: A processor system comprising: performing a compilation process on a computer program; encoding an instruction with a selected encoding; encoding the security mutation information in an instruction set architecture of a processor; and executing a compiled computer program in the processor using an added mutation instruction, wherein executing comprises executing a mutation instruction to enable decoding another instruction. A processor system with a random instruction encoding and randomized execution, providing effective defense against offline and runtime security attacks including software and hardware reverse engineering, invasive microprobing, fault injection, and high-order differential and electromagnetic power analysis.Type: GrantFiled: August 2, 2019Date of Patent: November 2, 2021Assignee: BLUERISC, INC.Inventors: Csaba Andras Moritz, Saurabh Chheda, Kristopher Carver
-
Patent number: 11153286Abstract: An example method performed by one or more processing devices includes: generating encrypted content at a sender device using one or more first keys that are available from a key provider; and outputting the encrypted content to a recipient device over one or more channels; where the key provider enables access, following authorization, by the recipient device to one or more second keys for decrypting the encrypted content; and where an entity that enables the channel is unaffiliated with the key provider.Type: GrantFiled: April 23, 2020Date of Patent: October 19, 2021Assignee: BLUERISC, INC.Inventor: Csaba Andras Moritz
-
Publication number: 20210019378Abstract: A method, for use in a DRM context, wherein digital rights enforcing processing is embedded into the rights object. A method, for use in a DRM context, wherein digital rights enforcing is downloaded to a device related to a content access. A processor framework, containing a VISC engine and executing digital rights enforcing codes, wherein the rights enforcing codes are downloaded. A digital rights management framework, wherein a rights enforcing code is downloaded related to a content access.Type: ApplicationFiled: July 1, 2020Publication date: January 21, 2021Applicant: III Holdings 2, LLCInventors: Raksit Ashok, Kristopher Carver, Saurabh Chedda, Jared Eldredge, Csaba Andras Moritz
-
Patent number: 10839085Abstract: An example process includes: identifying, by one or more processing devices, candidate code in executable code based on a static analysis of the executable code, where the candidate code includes code that is vulnerable to attack or the candidate code being on a path to code that is vulnerable to attack, where information related to the attack is based, at least in part, on the candidate code; customizing, by one or more processing devices, a healing template based on the information to produce a customized healing template; and inserting, by one or more processing devices, the customized healing template into a version of the executable code at a location that is based on a location of the candidate code in the executable code, where the customized healing template includes code that is executable to inhibit the attack.Type: GrantFiled: February 11, 2019Date of Patent: November 17, 2020Assignee: BLUERISC, INC.Inventors: Csaba Andras Moritz, Kristopher Carver, Jeffry Gummeson
-
Patent number: 10706144Abstract: An example process that is performed by one or more processing devices uses one or more system states to detect cyber-attacks. The example process includes the following operations: generating a first graph that models states based on information obtained from an electronic device; and performing a correlation of the first graph with one or more second graphs to detect a possibility of a cyber-attack against the electronic device.Type: GrantFiled: September 9, 2016Date of Patent: July 7, 2020Assignee: BlueRISC, Inc.Inventors: Csaba Andras Moritz, Kristopher Carver, Santosh Khasanvis, Jeffry Gummeson
-
Patent number: 10666627Abstract: An example method performed by one or more processing devices includes: generating encrypted content at a sender device using one or more first keys that are available from a key provider; and outputting the encrypted content to a recipient device over one or more channels; where the key provider enables access, following authorization, by the recipient device to one or more second keys for decrypting the encrypted content; and where an entity that enables the channel is unaffiliated with the key provider.Type: GrantFiled: January 16, 2019Date of Patent: May 26, 2020Assignee: BlueRISC, Inc.Inventor: Csaba Andras Moritz
-
Publication number: 20200034519Abstract: A processor system comprising: performing a compilation process on a computer program; encoding an instruction with a selected encoding; encoding the security mutation information in an instruction set architecture of a processor; and executing a compiled computer program in the processor using an added mutation instruction, wherein executing comprises executing a mutation instruction to enable decoding another instruction. A processor system with a random instruction encoding and randomized execution, providing effective defense against offline and runtime security attacks including software and hardware reverse engineering, invasive microprobing, fault injection, and high-order differential and electromagnetic power analysis.Type: ApplicationFiled: August 2, 2019Publication date: January 30, 2020Inventors: Csaba Andras Moritz, Saurabh Chheda, Kristopher Carver
-
Patent number: 10516524Abstract: An example process includes breaking content into multiple fragments; and transmitting at least two of the multiple fragments over different physical channels in order to isolate the at least two fragments during transmission. The example process may include generating session keys; encrypting at least some of the fragments using different session keys; and associating, with each fragment, a session key used to encrypt a different fragment to produce fragment/session key pairs.Type: GrantFiled: January 15, 2019Date of Patent: December 24, 2019Assignee: BlueRISC, Inc.Inventor: Csaba Andras Moritz
-
Patent number: 10430565Abstract: A processor system comprising: performing a compilation process on a computer program; encoding an instruction with a selected encoding; encoding the security mutation information in an instruction set architecture of a processor; and executing a compiled computer program in the processor using an added mutation instruction, wherein executing comprises executing a mutation instruction to enable decoding another instruction. A processor system with a random instruction encoding and randomized execution, providing effective defense against offline and runtime security attacks including software and hardware reverse engineering, invasive microprobing, fault injection, and high-order differential and electromagnetic power analysis.Type: GrantFiled: February 27, 2018Date of Patent: October 1, 2019Assignee: BlueRISC, Inc.Inventors: Csaba Andras Moritz, Saurabh Chheda, Kristopher Carver
-
Patent number: 10248792Abstract: An example process includes: identifying, by one or more processing devices, candidate code in executable code based on a static analysis of the executable code, where the candidate code includes code that is vulnerable to attack or the candidate code being on a path to code that is vulnerable to attack, where information related to the attack is based, at least in part, on the candidate code; customizing, by one or more processing devices, a healing template based on the information to produce a customized healing template; and inserting, by one or more processing devices, the customized healing template into a version of the executable code at a location that is based on a location of the candidate code in the executable code, where the customized healing template includes code that is executable to inhibit the attack.Type: GrantFiled: August 10, 2017Date of Patent: April 2, 2019Assignee: BlueRISC, Inc.Inventors: Csaba Andras Moritz, Kristopher Carver, Jeffry Gummeson
-
Patent number: 10230702Abstract: An example method performed by one or more processing devices includes: generating encrypted content at a sender device using one or more first keys that are available from a key provider; and outputting the encrypted content to a recipient device over one or more channels; where the key provider enables access, following authorization, by the recipient device to one or more second keys for decrypting the encrypted content; and where an entity that enables the channel is unaffiliated with the key provider.Type: GrantFiled: August 15, 2016Date of Patent: March 12, 2019Assignee: BlueRISC, Inc.Inventor: Csaba Andras Moritz
-
Patent number: 10225075Abstract: An example process includes breaking content into multiple fragments and transmitting at least two of the multiple fragments over different physical channels in order to isolate the at least two fragments during transmission. The example process may include generating session keys; encrypting at least some of the fragments using different session keys; and associating, with each fragment, a session key used to encrypt a different fragment to produce fragment/session key pairs.Type: GrantFiled: August 15, 2016Date of Patent: March 5, 2019Assignee: BlueRISC, Inc.Inventor: Csaba Andras Moritz
-
Publication number: 20180349573Abstract: A processor system comprising: performing a compilation process on a computer program; encoding an instruction with a selected encoding; encoding the security mutation information in an instruction set architecture of a processor; and executing a compiled computer program in the processor using an added mutation instruction, wherein executing comprises executing a mutation instruction to enable decoding another instruction. A processor system with a random instruction encoding and randomized execution, providing effective defense against offline and runtime security attacks including software and hardware reverse engineering, invasive microprobing, fault injection, and high-order differential and electromagnetic power analysis.Type: ApplicationFiled: February 27, 2018Publication date: December 6, 2018Inventors: Csaba Andras Moritz, Saurabh Chheda, Kristopher Carver
-
Patent number: 10101978Abstract: A system, for use with a compiler architecture framework, includes performing a statically speculative compilation process to extract and use speculative static information, encoding the speculative static information in an instruction set architecture of a processor, and executing a compiled computer program using the speculative static information, wherein executing supports static speculation driven mechanisms and controls.Type: GrantFiled: December 9, 2015Date of Patent: October 16, 2018Assignee: III HOLDINGS 2, LLCInventor: Csaba Andras Moritz
-
Patent number: 9940445Abstract: A processor system comprising: performing a compilation process on a computer program; encoding an instruction with a selected encoding; encoding the security mutation information in an instruction set architecture of a processor; and executing a compiled computer program in the processor using an added mutation instruction, wherein executing comprises executing a mutation instruction to enable decoding another instruction. A processor system with a random instruction encoding and randomized execution, providing effective defense against offline and runtime security attacks including software and hardware reverse engineering, invasive microprobing, fault injection, and high-order differential and electromagnetic power analysis.Type: GrantFiled: June 25, 2015Date of Patent: April 10, 2018Assignee: BlueRISC, Inc.Inventors: Csaba Andras Moritz, Saurabh Chheda, Kristopher Carver
-
Patent number: 9754112Abstract: An example process includes: identifying, by one or more processing devices, candidate code in executable code based on a static analysis of the executable code, where the candidate code includes code that is vulnerable to attack or the candidate code being on a path to code that is vulnerable to attack, where information related to the attack is based, at least in part, on the candidate code; customizing, by one or more processing devices, a healing template based on the information to produce a customized healing template; and inserting, by one or more processing devices, the customized healing template into a version of the executable code at a location that is based on a location of the candidate code in the executable code, where the customized healing template includes code that is executable to inhibit the attack.Type: GrantFiled: November 24, 2014Date of Patent: September 5, 2017Assignee: BlueRISC, Inc.Inventors: Csaba Andras Moritz, Kristopher Carver, Jeffrey Gummeson
-
Patent number: 9411964Abstract: An example process includes identifying, by one or more processing devices, a location in computer code that is subject to vulnerability, where the location corresponds to a memory access that is repeatable and that operates on a particular type of variable; and performing processes, by one or more processing devices, to heal the vulnerability. The memory access may be part of a system-to-system or a user-to-system interaction that is repeatable.Type: GrantFiled: November 24, 2014Date of Patent: August 9, 2016Assignee: BlueRISC, Inc.Inventors: Csaba Andras Moritz, Kristopher Carver, Jeffry Gummeson