Patents by Inventor Laurent DORE

Laurent DORE has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11899758
    Abstract: The present disclosure relates to software tampering resistance. In one aspect, a method for generating protected code is provided, comprising identifying a primary function in code to be obscured, the primary function being a function used to verify the integrity of the code run-time. The method then comprises generating a finite state machine from the primary function, wherein a state of the finite state machine at a given instance defines an element of the primary function to be executed. The method then comprises distributing the finite state machine throughout the code to obscure one or more areas of the code.
    Type: Grant
    Filed: August 30, 2019
    Date of Patent: February 13, 2024
    Assignee: Nagravision Sàrl
    Inventors: Laurent Doré, Christian Mönch, Brecht Wyseur
  • Publication number: 20230267067
    Abstract: In overview, methods, computer programs products and devices for securing software are provided. In accordance with the disclosure, a method may comprise attaching a debugger process to a software process. During execution of the software process, operations relevant to the functionality of the code process are carried out within the debugger process. As a result, the debugger process cannot be replaced or subverted without impinging on the functionality of the software process. The software process can therefore be protected from inspection by modified or malicious debugging techniques.
    Type: Application
    Filed: April 26, 2023
    Publication date: August 24, 2023
    Inventors: Laurent DORE, Asfandyar ORAKZAI, Brecht WYSEUR, Yihui XU
  • Patent number: 11669433
    Abstract: In overview, methods, computer programs products and devices for securing software are provided. In accordance with the disclosure, a method may comprise attaching a debugger process to a software process. During execution of the software process, operations relevant to the functionality of the code process are carried out within the debugger process. As a result, the debugger process cannot be replaced or subverted without impinging on the functionality of the software process. The software process can therefore be protected from inspection by modified or malicious debugging techniques.
    Type: Grant
    Filed: May 16, 2022
    Date of Patent: June 6, 2023
    Assignee: Nagravision Sàrl
    Inventors: Laurent Dore, Asfandyar Orakzai, Brecht Wyseur, Yihui Xu
  • Publication number: 20220360442
    Abstract: A system and a method for protecting code are provided. Extraction of code to be protected takes place during an object-to-object transformation and that code is replaced with fake binary code. The extracted code to be protected may then be encrypted or otherwise obscured and stored in a separate region of an object file. A prior source-to-source file transformation can be provided to isolate and mark the code to be protected, and to inject additional source code to handle later decryption.
    Type: Application
    Filed: April 19, 2022
    Publication date: November 10, 2022
    Applicant: NAGRAVISION S.A.
    Inventors: Laurent DORE, Eric PIRET, Yasser BELAIDI, Brecht WYSEUR
  • Publication number: 20220350728
    Abstract: In overview, methods, computer programs products and devices for securing software are provided. In accordance with the disclosure, a method may comprise attaching a debugger process to a software process. During execution of the software process, operations relevant to the functionality of the code process are carried out within the debugger process. As a result, the debugger process cannot be replaced or subverted without impinging on the functionality of the software process. The software process can therefore be protected from inspection by modified or malicious debugging techniques.
    Type: Application
    Filed: May 16, 2022
    Publication date: November 3, 2022
    Inventors: Laurent DORE, Asfandyar ORAKZAI, Brecht WYSEUR, Yihui XU
  • Patent number: 11336448
    Abstract: A system and a method for protecting code are provided. Extraction of code to be protected takes place during an object-to-object transformation and that code is replaced with fake binary code. The extracted code to be protected may then be encrypted or otherwise obscured and stored in a separate region of an object file. A prior source-to-source file transformation can be provided to isolate and mark the code to be protected, and to inject additional source code to handle later decryption.
    Type: Grant
    Filed: June 29, 2017
    Date of Patent: May 17, 2022
    Assignee: NAGRAVISION S.A.
    Inventors: Laurent Dore, Eric Piret, Yasser Belaidi, Brecht Wyseur
  • Patent number: 11244075
    Abstract: A system and a method for monitoring the integrity of code are provided. Dummy code is provided in an on demand decryption area of an object file while runtime code is provided elsewhere (and may be in the same object file or another object file). A compensation area is also provided which is initially blank. During execution, checksums can be calculated based on the result of an exclusive or (XOR) operation between contents of the on demand code decryption area and a compensation area such as a compensation area. As the runtime code populates the on demand code decryption area with the runtime code (potentially with the exception of areas masked to maintain integrity of relocation instructions allowed to remain in the dummy code) the compensation area is populated with the result of an XOR operation between the dummy code and the runtime code. As a result, the checksums will be the same throughout execution as long as integrity of the code has not been compromised.
    Type: Grant
    Filed: September 29, 2017
    Date of Patent: February 8, 2022
    Assignee: NAGRAVISION S.A.
    Inventors: Eric Piret, Wyseur Brecht, Laurent Dore
  • Publication number: 20210342420
    Abstract: The present disclosure relates to software tampering resistance. In one aspect, a method for generating protected code is provided, comprising identifying a primary function in code to be obscured, the primary function being a function used to verify the integrity of the code run-time. The method then comprises generating a finite state machine from the primary function, wherein a state of the finite state machine at a given instance defines an element of the primary function to be executed. The method then comprises distributing the finite state machine throughout the code to obscure one or more areas of the code.
    Type: Application
    Filed: August 30, 2019
    Publication date: November 4, 2021
    Applicant: NAGRAVISION S.A.
    Inventors: Laurent DORÉ, Christian MÖNCH, Brecht WYSEUR
  • Publication number: 20210004315
    Abstract: In overview, methods, computer programs products and devices for securing software are provided. In accordance with the disclosure, a method may comprise attaching a debugger process to a software process. During execution of the software process, operations relevant to the functionality of the code process are carried out within the debugger process. As a result, the debugger process cannot be replaced or subverted without impinging on the functionality of the software process. The software process can therefore be protected from inspection by modified or malicious debugging techniques.
    Type: Application
    Filed: November 27, 2017
    Publication date: January 7, 2021
    Applicant: NAGRAVISION SA
    Inventors: Laurent DORE, Asfandyar ORAKZAI, Brecht WYSEUR, Yihui XU
  • Publication number: 20200019730
    Abstract: A system and a method for monitoring the integrity of code are provided. Dummy code is provided in an on demand decryption area of an object file while runtime code is provided elsewhere (and may be in the same object file or another object file). A compensation area is also provided which is initially blank. During execution, checksums can be calculated based on the result of an exclusive or (XOR) operation between contents of the on demand code decryption area and a compensation area such as a compensation area. As the runtime code populates the on demand code decryption area with the runtime code (potentially with the exception of areas masked to maintain integrity of relocation instructions allowed to remain in the dummy code) the compensation area is populated with the result of an XOR operation between the dummy code and the runtime code. As a result, the checksums will be the same throughout execution as long as integrity of the code has not been compromised.
    Type: Application
    Filed: September 29, 2017
    Publication date: January 16, 2020
    Inventors: Eric PIRET, Wyseur BRECHT, Laurent DORE
  • Publication number: 20190158286
    Abstract: A system and a method for protecting code are provided. Extraction of code to be protected takes place during an object-to-object transformation and that code is replaced with fake binary code. The extracted code to be protected may then be encrypted or otherwise obscured and stored in a separate region of an object file. A prior source-to-source file transformation can be provided to isolate and mark the code to be protected, and to inject additional source code to handle later decryption.
    Type: Application
    Filed: June 29, 2017
    Publication date: May 23, 2019
    Applicant: NAGRAVISION S.A.
    Inventors: Laurent DORE, Eric PIRET, Belaidi YASSER, Brecht WYSEUR