Patents by Inventor Csaba Andras Moritz

Csaba Andras Moritz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11582211
    Abstract: An example process includes breaking content into multiple fragments; and transmitting at least two of the multiple fragments over different physical channels in order to isolate the at least two fragments during transmission. The example process may include generating session keys; encrypting at least some of the fragments using different session keys; and associating, with each fragment, a session key used to encrypt a different fragment to produce fragment/session key pairs.
    Type: Grant
    Filed: November 13, 2019
    Date of Patent: February 14, 2023
    Assignee: BLUERISC, INC.
    Inventor: Csaba Andras Moritz
  • Patent number: 11507671
    Abstract: An example process includes: identifying, by one or more processing devices, candidate code in executable code based on a static analysis of the executable code, where the candidate code includes code that is vulnerable to attack or the candidate code being on a path to code that is vulnerable to attack, where information related to the attack is based, at least in part, on the candidate code; customizing, by one or more processing devices, a healing template based on the information to produce a customized healing template; and inserting, by one or more processing devices, the customized healing template into a version of the executable code at a location that is based on a location of the candidate code in the executable code, where the customized healing template includes code that is executable to inhibit the attack.
    Type: Grant
    Filed: July 29, 2020
    Date of Patent: November 22, 2022
    Assignee: BLUERISC, INC.
    Inventors: Csaba Andras Moritz, Kristopher Carver, Jeffry Gummeson
  • Patent number: 11507669
    Abstract: An example process includes identifying, by one or more processing devices, a location in computer code that is subject to vulnerability, where the location corresponds to a memory access that is repeatable and that operates on a particular type of variable; and performing processes, by one or more processing devices, to heal the vulnerability. The memory access may be part of a system-to-system or a user-to-system interaction that is repeatable.
    Type: Grant
    Filed: June 27, 2016
    Date of Patent: November 22, 2022
    Assignee: BlueRISC, Inc.
    Inventors: Csaba Andras Moritz, Kristopher Carver, Jeffry Gummeson
  • Patent number: 11163857
    Abstract: A processor system comprising: performing a compilation process on a computer program; encoding an instruction with a selected encoding; encoding the security mutation information in an instruction set architecture of a processor; and executing a compiled computer program in the processor using an added mutation instruction, wherein executing comprises executing a mutation instruction to enable decoding another instruction. A processor system with a random instruction encoding and randomized execution, providing effective defense against offline and runtime security attacks including software and hardware reverse engineering, invasive microprobing, fault injection, and high-order differential and electromagnetic power analysis.
    Type: Grant
    Filed: August 2, 2019
    Date of Patent: November 2, 2021
    Assignee: BLUERISC, INC.
    Inventors: Csaba Andras Moritz, Saurabh Chheda, Kristopher Carver
  • Patent number: 11153286
    Abstract: An example method performed by one or more processing devices includes: generating encrypted content at a sender device using one or more first keys that are available from a key provider; and outputting the encrypted content to a recipient device over one or more channels; where the key provider enables access, following authorization, by the recipient device to one or more second keys for decrypting the encrypted content; and where an entity that enables the channel is unaffiliated with the key provider.
    Type: Grant
    Filed: April 23, 2020
    Date of Patent: October 19, 2021
    Assignee: BLUERISC, INC.
    Inventor: Csaba Andras Moritz
  • Publication number: 20210019378
    Abstract: A method, for use in a DRM context, wherein digital rights enforcing processing is embedded into the rights object. A method, for use in a DRM context, wherein digital rights enforcing is downloaded to a device related to a content access. A processor framework, containing a VISC engine and executing digital rights enforcing codes, wherein the rights enforcing codes are downloaded. A digital rights management framework, wherein a rights enforcing code is downloaded related to a content access.
    Type: Application
    Filed: July 1, 2020
    Publication date: January 21, 2021
    Applicant: III Holdings 2, LLC
    Inventors: Raksit Ashok, Kristopher Carver, Saurabh Chedda, Jared Eldredge, Csaba Andras Moritz
  • Patent number: 10839085
    Abstract: An example process includes: identifying, by one or more processing devices, candidate code in executable code based on a static analysis of the executable code, where the candidate code includes code that is vulnerable to attack or the candidate code being on a path to code that is vulnerable to attack, where information related to the attack is based, at least in part, on the candidate code; customizing, by one or more processing devices, a healing template based on the information to produce a customized healing template; and inserting, by one or more processing devices, the customized healing template into a version of the executable code at a location that is based on a location of the candidate code in the executable code, where the customized healing template includes code that is executable to inhibit the attack.
    Type: Grant
    Filed: February 11, 2019
    Date of Patent: November 17, 2020
    Assignee: BLUERISC, INC.
    Inventors: Csaba Andras Moritz, Kristopher Carver, Jeffry Gummeson
  • Patent number: 10706144
    Abstract: An example process that is performed by one or more processing devices uses one or more system states to detect cyber-attacks. The example process includes the following operations: generating a first graph that models states based on information obtained from an electronic device; and performing a correlation of the first graph with one or more second graphs to detect a possibility of a cyber-attack against the electronic device.
    Type: Grant
    Filed: September 9, 2016
    Date of Patent: July 7, 2020
    Assignee: BlueRISC, Inc.
    Inventors: Csaba Andras Moritz, Kristopher Carver, Santosh Khasanvis, Jeffry Gummeson
  • Patent number: 10666627
    Abstract: An example method performed by one or more processing devices includes: generating encrypted content at a sender device using one or more first keys that are available from a key provider; and outputting the encrypted content to a recipient device over one or more channels; where the key provider enables access, following authorization, by the recipient device to one or more second keys for decrypting the encrypted content; and where an entity that enables the channel is unaffiliated with the key provider.
    Type: Grant
    Filed: January 16, 2019
    Date of Patent: May 26, 2020
    Assignee: BlueRISC, Inc.
    Inventor: Csaba Andras Moritz
  • Publication number: 20200034519
    Abstract: A processor system comprising: performing a compilation process on a computer program; encoding an instruction with a selected encoding; encoding the security mutation information in an instruction set architecture of a processor; and executing a compiled computer program in the processor using an added mutation instruction, wherein executing comprises executing a mutation instruction to enable decoding another instruction. A processor system with a random instruction encoding and randomized execution, providing effective defense against offline and runtime security attacks including software and hardware reverse engineering, invasive microprobing, fault injection, and high-order differential and electromagnetic power analysis.
    Type: Application
    Filed: August 2, 2019
    Publication date: January 30, 2020
    Inventors: Csaba Andras Moritz, Saurabh Chheda, Kristopher Carver
  • Patent number: 10516524
    Abstract: An example process includes breaking content into multiple fragments; and transmitting at least two of the multiple fragments over different physical channels in order to isolate the at least two fragments during transmission. The example process may include generating session keys; encrypting at least some of the fragments using different session keys; and associating, with each fragment, a session key used to encrypt a different fragment to produce fragment/session key pairs.
    Type: Grant
    Filed: January 15, 2019
    Date of Patent: December 24, 2019
    Assignee: BlueRISC, Inc.
    Inventor: Csaba Andras Moritz
  • Patent number: 10430565
    Abstract: A processor system comprising: performing a compilation process on a computer program; encoding an instruction with a selected encoding; encoding the security mutation information in an instruction set architecture of a processor; and executing a compiled computer program in the processor using an added mutation instruction, wherein executing comprises executing a mutation instruction to enable decoding another instruction. A processor system with a random instruction encoding and randomized execution, providing effective defense against offline and runtime security attacks including software and hardware reverse engineering, invasive microprobing, fault injection, and high-order differential and electromagnetic power analysis.
    Type: Grant
    Filed: February 27, 2018
    Date of Patent: October 1, 2019
    Assignee: BlueRISC, Inc.
    Inventors: Csaba Andras Moritz, Saurabh Chheda, Kristopher Carver
  • Patent number: 10248792
    Abstract: An example process includes: identifying, by one or more processing devices, candidate code in executable code based on a static analysis of the executable code, where the candidate code includes code that is vulnerable to attack or the candidate code being on a path to code that is vulnerable to attack, where information related to the attack is based, at least in part, on the candidate code; customizing, by one or more processing devices, a healing template based on the information to produce a customized healing template; and inserting, by one or more processing devices, the customized healing template into a version of the executable code at a location that is based on a location of the candidate code in the executable code, where the customized healing template includes code that is executable to inhibit the attack.
    Type: Grant
    Filed: August 10, 2017
    Date of Patent: April 2, 2019
    Assignee: BlueRISC, Inc.
    Inventors: Csaba Andras Moritz, Kristopher Carver, Jeffry Gummeson
  • Patent number: 10230702
    Abstract: An example method performed by one or more processing devices includes: generating encrypted content at a sender device using one or more first keys that are available from a key provider; and outputting the encrypted content to a recipient device over one or more channels; where the key provider enables access, following authorization, by the recipient device to one or more second keys for decrypting the encrypted content; and where an entity that enables the channel is unaffiliated with the key provider.
    Type: Grant
    Filed: August 15, 2016
    Date of Patent: March 12, 2019
    Assignee: BlueRISC, Inc.
    Inventor: Csaba Andras Moritz
  • Patent number: 10225075
    Abstract: An example process includes breaking content into multiple fragments and transmitting at least two of the multiple fragments over different physical channels in order to isolate the at least two fragments during transmission. The example process may include generating session keys; encrypting at least some of the fragments using different session keys; and associating, with each fragment, a session key used to encrypt a different fragment to produce fragment/session key pairs.
    Type: Grant
    Filed: August 15, 2016
    Date of Patent: March 5, 2019
    Assignee: BlueRISC, Inc.
    Inventor: Csaba Andras Moritz
  • Publication number: 20180349573
    Abstract: A processor system comprising: performing a compilation process on a computer program; encoding an instruction with a selected encoding; encoding the security mutation information in an instruction set architecture of a processor; and executing a compiled computer program in the processor using an added mutation instruction, wherein executing comprises executing a mutation instruction to enable decoding another instruction. A processor system with a random instruction encoding and randomized execution, providing effective defense against offline and runtime security attacks including software and hardware reverse engineering, invasive microprobing, fault injection, and high-order differential and electromagnetic power analysis.
    Type: Application
    Filed: February 27, 2018
    Publication date: December 6, 2018
    Inventors: Csaba Andras Moritz, Saurabh Chheda, Kristopher Carver
  • Patent number: 10101978
    Abstract: A system, for use with a compiler architecture framework, includes performing a statically speculative compilation process to extract and use speculative static information, encoding the speculative static information in an instruction set architecture of a processor, and executing a compiled computer program using the speculative static information, wherein executing supports static speculation driven mechanisms and controls.
    Type: Grant
    Filed: December 9, 2015
    Date of Patent: October 16, 2018
    Assignee: III HOLDINGS 2, LLC
    Inventor: Csaba Andras Moritz
  • Patent number: 9940445
    Abstract: A processor system comprising: performing a compilation process on a computer program; encoding an instruction with a selected encoding; encoding the security mutation information in an instruction set architecture of a processor; and executing a compiled computer program in the processor using an added mutation instruction, wherein executing comprises executing a mutation instruction to enable decoding another instruction. A processor system with a random instruction encoding and randomized execution, providing effective defense against offline and runtime security attacks including software and hardware reverse engineering, invasive microprobing, fault injection, and high-order differential and electromagnetic power analysis.
    Type: Grant
    Filed: June 25, 2015
    Date of Patent: April 10, 2018
    Assignee: BlueRISC, Inc.
    Inventors: Csaba Andras Moritz, Saurabh Chheda, Kristopher Carver
  • Patent number: 9754112
    Abstract: An example process includes: identifying, by one or more processing devices, candidate code in executable code based on a static analysis of the executable code, where the candidate code includes code that is vulnerable to attack or the candidate code being on a path to code that is vulnerable to attack, where information related to the attack is based, at least in part, on the candidate code; customizing, by one or more processing devices, a healing template based on the information to produce a customized healing template; and inserting, by one or more processing devices, the customized healing template into a version of the executable code at a location that is based on a location of the candidate code in the executable code, where the customized healing template includes code that is executable to inhibit the attack.
    Type: Grant
    Filed: November 24, 2014
    Date of Patent: September 5, 2017
    Assignee: BlueRISC, Inc.
    Inventors: Csaba Andras Moritz, Kristopher Carver, Jeffrey Gummeson
  • Patent number: 9411964
    Abstract: An example process includes identifying, by one or more processing devices, a location in computer code that is subject to vulnerability, where the location corresponds to a memory access that is repeatable and that operates on a particular type of variable; and performing processes, by one or more processing devices, to heal the vulnerability. The memory access may be part of a system-to-system or a user-to-system interaction that is repeatable.
    Type: Grant
    Filed: November 24, 2014
    Date of Patent: August 9, 2016
    Assignee: BlueRISC, Inc.
    Inventors: Csaba Andras Moritz, Kristopher Carver, Jeffry Gummeson