Patents by Inventor Lex Aaron Anderson

Lex Aaron Anderson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10503931
    Abstract: A method and apparatus for Dynamic Executable Verification (DEV) is disclosed that includes a random prefix of functions of a binary application, a check function for at least a subset of the functions and a jump table for at least a subset of the functions. DEV provides low-impact dynamic integrity protection to applications that is compatible with standard code signing and verification methods, and ensures that software cannot be tampered with either statically or dynamically without detection.
    Type: Grant
    Filed: May 8, 2017
    Date of Patent: December 10, 2019
    Assignee: ARRIS Enterprises LLC
    Inventor: Lex Aaron Anderson
  • Publication number: 20190188157
    Abstract: A method is provided to dynamically encode data at runtime with a tagged data element in a program associated with an obfuscation algorithm randomly selected during runtime. Instructions for invoking the obfuscation algorithm are generated when a compiler encounters the tagged variable in the source code. At runtime, unencoded data is encoded by the obfuscation algorithm when the unencoded data is copied to the tagged data element; encoded data is re-encoded by the obfuscation algorithm when the encoded data is copied from a differently tagged data element to the tagged data element, wherein the differently tagged data element is associated with a different obfuscation algorithm; and encoded data is decoded by the obfuscation algorithm when the encoded data is copied from the tagged data element to an untagged data element.
    Type: Application
    Filed: December 14, 2017
    Publication date: June 20, 2019
    Inventors: Rafie Shamsaasef, Lex Aaron Anderson
  • Publication number: 20190140834
    Abstract: A system and method for authenticating an application that employs cryptographic keys and functions is provided with white box cryptography employed to secure the application, and to secure communications with the application. The white box includes a transformation of the application and the keys. A secure channel between the white box and a crypto token is used for communications. In some cases, the transformed keys can be employed in authenticating the white box to the crypto token. The presence of a valid crypto token can be periodically determined. In the presence of a valid crypto token, the white box can provide a verifiable message to a remote server. The remote server can verify the message and initiate a service.
    Type: Application
    Filed: November 7, 2017
    Publication date: May 9, 2019
    Inventors: Alexander Medvinsky, Lex Aaron Anderson
  • Publication number: 20180198613
    Abstract: A method for whitebox cryptography is provided for computing an algorithm (m,S) with input m and secret S, using one or more white-box encoded operations. The method includes accepting an encoded input c, where c=Enc(P,m); accepting an encoded secret S?, where S?=Enc(P,S); performing one or more operations on the encoded input c and the encoded secret S? modulo N to obtain an encoded output c?; and decoding the encoded output c? with the private key p to recover an output m? according to m?=Dec(p,c?), such that m?=(m,S).
    Type: Application
    Filed: January 9, 2018
    Publication date: July 12, 2018
    Inventors: Lex Aaron Anderson, Alexander Medvinsky, Rafie Shamsaasef
  • Publication number: 20180167197
    Abstract: A method is provided for generating an output from an input according to a secret using a white-box implementation of a cryptographic function having a first operation, a second operation, and a third operation. The method applies the input to a first operation to generate a first intermediate result, applies the first intermediate result to a second operation to generate a second intermediate result, and applies the second intermediate result to a third operation to generate the output, wherein at least two of the first operation, the second operation, and the third operation is implemented by a plurality of interconnected logic elements, the interconnection of the plurality of logic elements being comprised of one of a non-algebraic interconnection of logic elements and an algebraic interconnection of logic elements having obfuscated boundaries between the at least one of the first operation, the second operation and the third operation.
    Type: Application
    Filed: December 12, 2017
    Publication date: June 14, 2018
    Inventor: Lex Aaron Anderson
  • Publication number: 20180165454
    Abstract: A method is provided to generate a protected program from an original program such that the protected program is less vulnerable than the original program to unauthorised use when installed on a device. The method includes: receiving, at a processor, an original program, wherein the original program takes an input data flow and generates an output data flow. The processor then transforms the original program into a white-box implementation of the original program including encoded functional blocks, and then transforms the white-box implementation of the original program into a node-locked program by further encoding the encoded functional blocks of the program with device specific parameters to provide node-encoded functional blocks, wherein the node-locked program is for use on and is node-locked to the device.
    Type: Application
    Filed: December 9, 2016
    Publication date: June 14, 2018
    Inventor: Lex Aaron Anderson
  • Publication number: 20170323120
    Abstract: A method and apparatus for Dynamic Executable Verification (DEV) is disclosed that includes a random prefix of functions of a binary application, a check function for at least a subset of the functions and a jump table for at least a subset of the functions. DEV provides low-impact dynamic integrity protection to applications that is compatible with standard code signing and verification methods, and ensures that software cannot be tampered with either statically or dynamically without detection.
    Type: Application
    Filed: May 8, 2017
    Publication date: November 9, 2017
    Inventor: Lex Aaron Anderson
  • Publication number: 20160218872
    Abstract: A method is provided for obfuscating program code to prevent unauthorized users from accessing video. The method includes receiving an original program code that provides functionality. The original program code is transformed into obfuscated program code defining a randomized branch encoded version of the original program code. The obfuscated program code is then stored, and a processor receiving input video data flow uses the obfuscated program code to generate an output data flow.
    Type: Application
    Filed: January 27, 2016
    Publication date: July 28, 2016
    Inventor: Lex Aaron Anderson
  • Patent number: 8751822
    Abstract: A method and apparatus 20 for securing executable code embodying a cipher 12 using a metamorphic algorithm 24. The metamorphic algorithm 24 dynamically executes polymorphic primitives 43, each of which implements a functional component 41 of the cryptographic algorithm 12. When a halting condition is met, the output of the cryptographic algorithm 12 occurs.
    Type: Grant
    Filed: December 21, 2010
    Date of Patent: June 10, 2014
    Assignee: Motorola Mobility LLC
    Inventor: Lex Aaron Anderson
  • Publication number: 20120159194
    Abstract: A method and apparatus 20 for securing executable code embodying a cipher 12 using a metamorphic algorithm 24. The metamorphic algorithm 24 dynamically executes polymorphic primitives 43, each of which implements a functional component 41 of the cryptographic algorithm 12. When a halting condition is met, the output of the cryptographic algorithm 12 occurs.
    Type: Application
    Filed: December 21, 2010
    Publication date: June 21, 2012
    Applicant: GENERAL INSTRUMENT CORPORATION
    Inventor: Lex Aaron Anderson