Patents by Inventor Joseph Martin Mordetsky

Joseph Martin Mordetsky has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210294879
    Abstract: A method for protecting software from tampering includes steps for processing, using a computer, first compiled software stored in a computer memory to generate a cryptographic key, the first compiled software configured to perform software protection functions and defined second functions distinct from the software protection functions when executed by a computer processor, the cryptographic key consisting of a first portion of the first compiled software comprising executable code compiled from the software protection functions, encrypting a second portion of the first compiled software using the cryptographic key to produce second compiled software comprising the first portion in unencrypted form and the second portion encrypted with the cryptographic key, wherein the second portion comprises executable code compiled from the defined second functions, and storing the second compiled software in a computer memory for distribution to a client device.
    Type: Application
    Filed: February 16, 2021
    Publication date: September 23, 2021
    Applicant: Uniloc 2017 LLC
    Inventors: Joseph Martin Mordetsky, Craig Stephen Etchegoyen
  • Publication number: 20100332320
    Abstract: Systems and methods for providing conditional authorization to a plurality of client devices to operate licensed software. A client computer generates and sends a device fingerprint and a license identifier to a license server. The device fingerprint uniquely identifies the client device based on user and non-user configurable parameters relating to the client device. The license server determines if authorization of the licensed software for installation or use at the client software would exceed a limit associated with the license. If authorization would not exceed the limit, the license server sends an unlock key to authorize the client device to install or operate the software. If authorization would exceed the limit, the license server sends an unlock key and ad instructions operable to authorize the client device to install or use the software only in connection with the display of advertisements provided by an ad server.
    Type: Application
    Filed: June 18, 2010
    Publication date: December 30, 2010
    Inventors: Joseph Martin Mordetsky, Craig Stephen Etchegoyen
  • Publication number: 20100325150
    Abstract: A system for tracking the use of an application on a computing device comprises a data collection server. In response to a communication link being available between the data collection server and the computing device, the data collection server is configured to: (1) receive from the computing device, via the communication link, data including (a) an application identifier identifying the application, (b) a device identifier identifying the computing device, and (c) an instrumentation call identifier identifying an instrumentation call performed by the application; (2) access a database storing previously received application identifiers, device identifiers, and instrumentation call identifiers; and (3) update the database to include the received data. A method for tracking the use of an application on a computing device is also disclosed.
    Type: Application
    Filed: June 18, 2010
    Publication date: December 23, 2010
    Inventors: Joseph Martin Mordetsky, Craig Stephen Etchegoyen
  • Publication number: 20100325431
    Abstract: A method for protecting software from tampering includes steps for processing first compiled software stored in a computer memory to generate a first key part, the first compiled software configured to perform software protection functions and defined second functions distinct from the software protection functions when executed, and the first key part consisting of a first portion of the first compiled software comprising executable code compiled from the software protection functions, generating an identifier and a second key part for each of the defined second functions, generating a cryptographic key determined from the first key part and the second key part, encrypting a second portion of the first compiled software using the cryptographic key to produce second compiled software comprising the first portion in unencrypted form and the second portion encrypted with the cryptographic key, wherein the second portion comprises executable code compiled from the defined second functions, and storing the second
    Type: Application
    Filed: June 2, 2010
    Publication date: December 23, 2010
    Inventors: Joseph Martin Mordetsky, Craig Stephen Etchegoyen
  • Publication number: 20100325446
    Abstract: A method for protecting software from tampering includes steps for processing, using a computer, first compiled software stored in a computer memory to generate a cryptographic key, the first compiled software configured to perform software protection functions and defined second functions distinct from the software protection functions when executed by a computer processor, the cryptographic key consisting of a first portion of the first compiled software comprising executable code compiled from the software protection functions, encrypting a second portion of the first compiled software using the cryptographic key to produce second compiled software comprising the first portion in unencrypted form and the second portion encrypted with the cryptographic key, wherein the second portion comprises executable code compiled from the defined second functions, and storing the second compiled software in a computer memory for distribution to a client device.
    Type: Application
    Filed: June 2, 2010
    Publication date: December 23, 2010
    Inventors: Joseph Martin Mordetsky, Craig Stephen Etchegoyen