Patents by Inventor Grant Stewart Goodes
Grant Stewart Goodes has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11411989Abstract: A method and system to surreptitiously inject data into a data stream over a communication channel including an error correction encoder circuit to apply an error correction scheme to a data stream to create an unfaulted data, a binary to bit value positioner that converts bits in confidential data to corresponding position value of bits in a packet, and a data stream encoder that flips a bit in the unfaulted data based on the binary to bit value positioner to create a bit-faulted data.Type: GrantFiled: May 29, 2020Date of Patent: August 9, 2022Assignee: ARXAN TECHNOLOGIES, INC.Inventor: Grant Stewart Goodes
-
Publication number: 20200296131Abstract: A method and system to surreptitiously inject data into a data stream over a communication channel including an error correction encoder circuit to apply an error correction scheme to a data stream to create an unfaulted data, a binary to bit value positioner that converts bits in confidential data to corresponding position value of bits in a packet, and a data stream encoder that flips a bit in the unfaulted data based on the binary to bit value positioner to create a bit-faulted data.Type: ApplicationFiled: May 29, 2020Publication date: September 17, 2020Applicant: ARXAN TECHNOLOGIES, INC.Inventor: Grant Stewart GOODES
-
Patent number: 10705898Abstract: A method and system to surreptitiously inject data into a data stream over a communication channel including an error correction encoder circuit to apply an error correction scheme to a data stream to create an unfaulted data, a binary to bit value positioner that converts bits in confidential data to corresponding position value of bits in a packet, and a data stream encoder that flips a bit in the unfaulted data based on the binary to bit value positioner to create a bit-faulted data.Type: GrantFiled: April 25, 2018Date of Patent: July 7, 2020Assignee: ARXAN TECHNOLOGIES, INC.Inventor: Grant Stewart Goodes
-
Patent number: 10599855Abstract: A secure and fault-tolerant, or variation-tolerant, method and system to turn a set of N shares into an identifier even when only M shares from this set have a correct value. A secret sharing algorithm is used to generate a number of candidate identifiers from subsets of shares associated with asset parameters of a collection of assets. The most frequently occurring candidate identifier is then determined to be the final identifier. The method has particular applicability in the fields of node locking and fingerprinting.Type: GrantFiled: November 9, 2018Date of Patent: March 24, 2020Assignee: IRDETO B.V.Inventors: Phillip Alan Eisen, Michael James Wiener, Grant Stewart Goodes, James Muir
-
Publication number: 20200028833Abstract: A method and system to surreptitiously inject data into a data stream over a communication channel including an error correction encoder circuit to apply an error correction scheme to a data stream to create an unfaulted data, a binary to bit value positioner that converts bits in confidential data to corresponding position value of bits in a packet, and a data stream encoder that flips a bit in the unfaulted data based on the binary to bit value positioner to create a bit-faulted data.Type: ApplicationFiled: April 25, 2018Publication date: January 23, 2020Applicant: ARXAN TECHNOLOGIES, INC.Inventor: Grant Stewart GOODES
-
Publication number: 20190108349Abstract: A secure and fault-tolerant, or variation-tolerant, method and system to turn a set of N shares into an identifier even when only M shares from this set have a correct value. A secret sharing algorithm is used to generate a number of candidate identifiers from subsets of shares associated with asset parameters of a collection of assets. The most frequently occurring candidate identifier is then determined to be the final identifier. The method has particular applicability in the fields of node locking and fingerprinting.Type: ApplicationFiled: November 9, 2018Publication date: April 11, 2019Applicant: Irdeto B.V.Inventors: Phillip Alan Eisen, Michael James Wiener, Grant Stewart Goodes, James Muir
-
Patent number: 10185837Abstract: A flexible software library in which the software modules are defined as an abstract intermediate representation. The flexible library allows security transformation and performance attribute selections to be made by the end-user, rather than the library creator. Furthermore, since the flexible library contains an abstract representation of the software modules, the library can also be provisioned to contain an arbitrary number of named instances, representing specific sets of values for security and performance decisions, along with the corresponding native object-code resulting from those decisions. This permits distribution of software modules in a completely platform-independent manner while avoiding the disclosure of proprietary information, such as source-files.Type: GrantFiled: October 8, 2017Date of Patent: January 22, 2019Assignee: IRDETO B.V.Inventors: Grant Stewart Goodes, Clifford Liem
-
Patent number: 10127387Abstract: A secure and fault-tolerant, or variation-tolerant, method and system to turn a set of N shares into an identifier even when only M shares from this set have a correct value. A secret sharing algorithm is used to generate a number of candidate identifiers from subsets of shares associated with asset parameters of a collection of assets. The most frequently occurring candidate identifier is then determined to be the final identifier. The method has particular applicability in the fields of node locking and fingerprinting.Type: GrantFiled: March 15, 2011Date of Patent: November 13, 2018Assignee: IRDETO B.V.Inventors: Philip Alan Eisen, Michael James Wiener, Grant Stewart Goodes, James Muir
-
Patent number: 9892272Abstract: A flexible software library in which the software modules are defined as an abstract intermediate representation. The flexible library allows security transformation and performance attribute selections to be made by the end-user, rather than the library creator. Furthermore, since the flexible library contains an abstract representation of the software modules, the library can also be provisioned to contain an arbitrary number of named instances, representing specific sets of values for security and performance decisions, along with the corresponding native object-code resulting from those decisions. This permits distribution of software modules in a completely platform-independent manner while avoiding the disclosure of proprietary information, such as source-files.Type: GrantFiled: March 31, 2010Date of Patent: February 13, 2018Assignee: IRDETO B.V.Inventors: Grant Stewart Goodes, Clifford Liem
-
Publication number: 20180032746Abstract: A flexible software library in which the software modules are defined as an abstract intermediate representation. The flexible library allows security transformation and performance attribute selections to be made by the end-user, rather than the library creator. Furthermore, since the flexible library contains an abstract representation of the software modules, the library can also be provisioned to contain an arbitrary number of named instances, representing specific sets of values for security and performance decisions, along with the corresponding native object-code resulting from those decisions. This permits distribution of software modules in a completely platform-independent manner while avoiding the disclosure of proprietary information, such as source-files.Type: ApplicationFiled: October 8, 2017Publication date: February 1, 2018Applicant: IRDETO B.V.Inventors: Grant Stewart Goodes, Clifford Liem
-
Patent number: 9754115Abstract: A system and method is disclosed for securely binding an arbitrary program to an authorized instance of a generic execution platform. Once the binding process occurs, the protected software application will not exhibit correct behavior unless run on the execution platform to which it is bound. The system and method withstands repeated attacks which tamper with the software application and the execution platform. The system and method present a mechanism to bind a program, P, to any un-trusted execution platform, E, which contains a Trusted Signing Authority (TSA). The TSA may take many alternate forms including a trusted platform module, secure processor, kernel driver, and hardened software agents.Type: GrantFiled: March 21, 2011Date of Patent: September 5, 2017Assignee: IRDETO B.V.Inventors: Michael Louis Bodis, Jiayuan Sui, Grant Stewart Goodes, Clifford Liem
-
Patent number: 9639377Abstract: A linker or loader, and associated method, is described, whereby the application of security transformations to object-code modules can be deferred until link or load-time, through, for example, memory relocation, selection from diverse instances of a module, and late-binding of constants. This provides several benefits over conventional source-to-source security transformations. These deferred security transformations can be applied in a very light-weight manner and create many opportunities for diversity in the resulting executable program, enhancing security, while at the same time minimizing the impact on execution performance and correctness, and reducing the complexity of debugging.Type: GrantFiled: March 31, 2010Date of Patent: May 2, 2017Assignee: IRDETO B.V.Inventors: Grant Stewart Goodes, Clifford Liem
-
Publication number: 20140020112Abstract: A method and system for secure dynamic memory management using heap memory, or analogous dynamic memory allocation, that includes initializing a heap memory segment, having a plurality of buffers, within a random access memory. When an allocation request to store data in the heap memory segment is received, one of the buffers is randomly selected. Metadata, containing details of allocated and unallocated buffers of the heap memory segment, is then maintained in a portion of the memory separate from the heap object. According to certain embodiments, the secure heap of the present disclosure can securely implement the functions of those portions of the C/C++ stdlib library related to dynamic memory management, specifically malloc ( ) free ( ) and their variants.Type: ApplicationFiled: March 30, 2011Publication date: January 16, 2014Applicant: IRDETO B.V.Inventor: Grant Stewart Goodes
-
Publication number: 20140007252Abstract: A secure and fault-tolerant, or variation-tolerant, method and system to turn a set of N shares into an identifier even when only M shares from this set have a correct value. A secret sharing algorithm is used to generate a number of candidate identifiers from subsets of shares associated with asset parameters of a collection of assets. The most frequently occurring candidate identifier is then determined to be the final identifier. The method has particular applicability in the fields of node locking and fingerprinting.Type: ApplicationFiled: March 15, 2011Publication date: January 2, 2014Applicant: IRDETO B.V.Inventors: Philip Alan Eisen, Michael James Wiener, Grant Stewart Goodes, James Muir
-
Publication number: 20140006803Abstract: A system and method is disclosed for securely binding an arbitrary program to an authorized instance of a generic execution platform. Once the binding process occurs, the protected software application will not exhibit correct behavior unless run on the execution platform to which it is bound. The system and method withstands repeated attacks which tamper with the software application and the execution platform. The system and method present a mechanism to bind a program, P, to any un-trusted execution platform, E, which contains a Trusted Signing Authority (TSA). The TSA may take many alternate forms including a trusted platform module, secure processor, kernel driver, and hardened software agents.Type: ApplicationFiled: March 21, 2011Publication date: January 2, 2014Applicant: IRDETO B.V.Inventors: Michael Louis Bodis, Jiayuan Sui, Grant Stewart Goodes, Clifford Liem
-
Patent number: 8510726Abstract: A development suite for generating files, such as DRM-protected files, using white-box cryptography. The suite consists of a code generation tool, a data transformation engine, and a white-box data generation tool, and a white-box library. In the white-box cryptography context, the data transformation engine is used to protect the boundary between the cryptographic operation and the surrounding code. In particular, the data transformation engine is used to apply data transformations to the inputs to and outputs from the cryptographic operations. If the user specifies that transformations are required via a white-box parameterization file, the code generation tool puts the information specified by the user into a form the data transformation engine understands, namely as qualifiers on data variables and function prototypes. The data transformation engine then applies the specified transformations, and passes information to the data generation tool regarding which transformations were chosen.Type: GrantFiled: May 25, 2009Date of Patent: August 13, 2013Assignee: Irdeto Canada CorporationInventors: Philip Allan Eisen, Grant Stewart Goodes, Daniel Elie Murdock
-
Publication number: 20130014275Abstract: A linker or loader, and associated method, is described, whereby the application of security transformations to object-code modules can be deferred until link or load-time, through, for example, memory relocation, selection from diverse instances of a module, and late-binding of constants. This provides several benefits over conventional source-to-source security transformations. These deferred security transformations can be applied in a very light-weight manner and create many opportunities for diversity in the resulting executable program, enhancing security, while at the same time minimizing the impact on execution performance and correctness, and reducing the complexity of debugging.Type: ApplicationFiled: March 31, 2010Publication date: January 10, 2013Applicant: IRDETO CANADA CORPORATIONInventors: Grant Stewart Goodes, Clifford Liem
-
Publication number: 20130014274Abstract: A flexible software library in which the software modules are defined as an abstract intermediate representation. The flexible library allows security transformation and performance attribute selections to be made by the end-user, rather than the library creator. Furthermore, since the flexible library contains an abstract representation of the software modules, the library can also be provisioned to contain an arbitrary number of named instances, representing specific sets of values for security and performance decisions, along with the corresponding native object-code resulting from those decisions. This permits distribution of software modules in a completely platform-independent manner while avoiding the disclosure of proprietary information, such as source-files.Type: ApplicationFiled: March 31, 2010Publication date: January 10, 2013Applicant: IRDETO CANADA CORPORATIONInventors: Grant Stewart Goodes, Clifford Liem
-
Publication number: 20110067012Abstract: A development suite for generating files, such as DRM-protected files, using white-box cryptography. The suite consists of a code generation tool, a data transformation engine, and a white-box data generation tool, and a white-box library. In the white-box cryptography context, the data transformation engine is used to protect the boundary between the cryptographic operation and the surrounding code. In particular, the data transformation engine is used to apply data transformations to the inputs to and outputs from the cryptographic operations. If the user specifies that transformations are required via a white-box parameterization file, the code generation tool puts the information specified by the user into a form the data transformation engine understands, namely as qualifiers on data variables and function prototypes. The data transformation engine then applies the specified transformations, and passes information to the data generation tool regarding which transformations were chosen.Type: ApplicationFiled: May 25, 2009Publication date: March 17, 2011Applicant: IRDETO CANADA CORPORATIONInventors: Philip Allan Eisen, Grant Stewart Goodes, Daniel Elie Murdock