Patents by Inventor Jonathan Emmett

Jonathan Emmett has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9934374
    Abstract: The present disclosure provides a description of a computer implemented method and system for protecting a software program from attack during runtime. The system comprises a plurality of software blocks for providing desired functions during execution of a software program and a trusted address server having a table for mapping predetermined source tokens to destination tokens. The trusted address server couples each of the plurality of software blocks for receipt of predetermined source tokens from any one of the plurality of software blocks, while returning a mapped destination token from the predetermined destination tokens to said any one of the plurality of software blocks in dependence upon the table for mapping predetermined source tokens to destination tokens.
    Type: Grant
    Filed: February 10, 2012
    Date of Patent: April 3, 2018
    Assignee: IRDETO B.V.
    Inventors: Robert Krten, Jonathan Emmett, Clifford Liem
  • Patent number: 9443091
    Abstract: A method of protecting the execution of a cryptographic hash function, such as SHA-256, in a computing environment where inputs, outputs and intermediate values can be observed. The method consists of encoding input messages so that hash function inputs are placed in a transformed domain, and then applying a transformed cryptographic hash function to produce an encoded output digest; the transformed cryptographic hash function implements the cryptographic hash function in the transformed domain.
    Type: Grant
    Filed: March 31, 2011
    Date of Patent: September 13, 2016
    Assignee: Irdeto B.V.
    Inventors: Jonathan Emmett, Philip Allan Eisen, James Muir, Daniel Murdock
  • Publication number: 20160050069
    Abstract: The present disclosure provides a system for media path security includes an authoring system having a content stream transform and corrupter for corrupting content data and providing decorrupting data, a media container for conveying the corrupted content data and decorrupting data, and a client system having a fix-up component for fixing the corrupted content data in dependence upon the decorrupting data. A client system is also provided as having an input for receiving a media container and a fix-up component for fixing the corrupted content data in dependence upon the decorrupting data.
    Type: Application
    Filed: March 28, 2013
    Publication date: February 18, 2016
    Inventors: Andy Griffin, Nick Pelis, Jonathan Emmett, Dan Murdock, Phil Eisen, James Muir, Jianping Wu, Clifford Liem
  • Publication number: 20150113640
    Abstract: The present disclosure provides a description of a computer implemented method and system for protecting a software program from attack during runtime. The system comprises a plurality of software blocks for providing desired functions during execution of a software program and a trusted address server having a table for mapping predetermined source tokens to destination tokens. The trusted address server couples each of the plurality of software blocks for receipt of predetermined source tokens from any one of the plurality of software blocks, while returning a mapped destination token from the predetermined destination tokens to said any one of the plurality of software blocks in dependence upon the table for mapping predetermined source tokens to destination tokens.
    Type: Application
    Filed: February 10, 2012
    Publication date: April 23, 2015
    Applicant: IRDETO CANADA CORPORATION
    Inventors: Robert Krten, Jonathan Emmett, Clifford Liem
  • Publication number: 20140019771
    Abstract: A method of protecting the execution of a cryptographic hash function, such as SHA-256, in a computing environment where inputs, outputs and intermediate values can be observed. The method consists of encoding input messages so that hash function inputs are placed in a transformed domain, and then applying a transformed cryptographic hash function to produce an encoded output digest; the transformed cryptographic hash function implements the cryptographic hash function in the transformed domain.
    Type: Application
    Filed: March 31, 2011
    Publication date: January 16, 2014
    Applicant: IRDETO B.V.
    Inventors: Jonathan Emmett, Philip Allan Eisen, James Muir, Daniel Murdock