Patents by Inventor Deian Stefan

Deian Stefan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11354441
    Abstract: Embodiments herein relate to new and useful systems and methods for tokenization across code trust boundaries. An embodiment includes a method for securing data across execution contexts in a computing device. The method includes determining that first data is to be passed from a first code in a first execution context to a second code in a second execution context. The method further includes, based on determining that the first data is to be passed, tokenizing the first data to generate tokenized first data, wherein tokenizing the first data comprises substituting the first data with second data that is based on the first data to secure the first data from the second code, the second data being the tokenized first data. The method further includes passing the tokenized first data from the first code to the second code.
    Type: Grant
    Filed: February 19, 2020
    Date of Patent: June 7, 2022
    Assignee: VMware, Inc.
    Inventors: Deian Stefan, Devon Rifkin, Christian Almenar
  • Patent number: 10929528
    Abstract: A system for intrinsic runtime security includes an application code repository, a security code repository, a trusted execution context, a first sandboxed execution context and a policy enforcement module, operating based on security policy, that enables the first sandboxed execution context to modify objects without enabling unrestricted access of the first sandboxed execution context to original prototypes of the objects.
    Type: Grant
    Filed: August 16, 2019
    Date of Patent: February 23, 2021
    Assignee: VMware, Inc.
    Inventors: Deian Stefan, Devon Rifkin, Christian Almenar
  • Publication number: 20200265165
    Abstract: Embodiments herein relate to new and useful systems and methods for tokenization across code trust boundaries. An embodiment includes a method for securing data across execution contexts in a computing device. The method includes determining that first data is to be passed from a first code in a first execution context to a second code in a second execution context. The method further includes, based on determining that the first data is to be passed, tokenizing the first data to generate tokenized first data, wherein tokenizing the first data comprises substituting the first data with second data that is based on the first data to secure the first data from the second code, the second data being the tokenized first data. The method further includes passing the tokenized first data from the first code to the second code.
    Type: Application
    Filed: February 19, 2020
    Publication date: August 20, 2020
    Inventors: Deian STEFAN, Devon RIFKIN, Christian ALMENAR
  • Publication number: 20190370461
    Abstract: A system for intrinsic runtime security includes an application code repository, a security code repository, a trusted execution context, a first sandboxed execution context and a policy enforcement module, operating based on security policy, that enables the first sandboxed execution context to modify objects without enabling unrestricted access of the first sandboxed execution context to original prototypes of the objects.
    Type: Application
    Filed: August 16, 2019
    Publication date: December 5, 2019
    Inventors: Deian STEFAN, Devon RIFKIN, Christian ALMENAR
  • Patent number: 10387644
    Abstract: A system for intrinsic runtime security includes an application code repository, a security code repository, a trusted execution context, a first sandboxed execution context and a policy enforcement module, operating based on security policy, that enables the first sandboxed execution context to modify objects without enabling unrestricted access of the first sandboxed execution context to original prototypes of the objects.
    Type: Grant
    Filed: September 28, 2018
    Date of Patent: August 20, 2019
    Assignee: GitStar Inc.
    Inventors: Deian Stefan, Devon Rifkin, Christian Almenar
  • Publication number: 20190095617
    Abstract: A system for intrinsic runtime security includes an application code repository, a security code repository, a trusted execution context, a first sandboxed execution context and a policy enforcement module, operating based on security policy, that enables the first sandboxed execution context to modify objects without enabling unrestricted access of the first sandboxed execution context to original prototypes of the objects.
    Type: Application
    Filed: September 28, 2018
    Publication date: March 28, 2019
    Inventors: Deian Stefan, Devon Rifkin, Christian Almenar
  • Patent number: 8763127
    Abstract: A system and method for distinguishing human input events from malware-generated events includes one or more central processing units (CPUs), one or more input devices and memory. The memory includes program code that when executed by the CPU causes the CPU to obtain a first set of input events from a user utilizing the input device. The first input events are used to obtain or derive a feature indicative of the user, such as a multi-dimensional feature vector as provided by a support vector machine. Second input events are then obtained, and the second input events are classified against the feature to determine if either the user or malware initiated the second input events.
    Type: Grant
    Filed: March 13, 2010
    Date of Patent: June 24, 2014
    Assignee: Rutgers, The State University of New Jersey
    Inventors: Danfeng Yao, Deian Stefan, Chehai Wu
  • Publication number: 20110320816
    Abstract: A system and method for distinguishing human input events from malware-generated events includes one or more central processing units (CPUs), one or more input devices and memory. The memory includes program code that when executed by the CPU causes the CPU to obtain a first set of input events from a user utilizing the input device. The first input events are used to obtain or derive a feature indicative of the user, such as a multi-dimensional feature vector as provided by a support vector machine. Second input events are then obtained, and the second input events are classified against the feature to determine if either the user or malware initiated the second input events.
    Type: Application
    Filed: March 13, 2010
    Publication date: December 29, 2011
    Applicant: Rutgers, The State University of New Jersey
    Inventors: Danfeng Yao, Deian Stefan, Chehai Wu