Patents by Inventor Patrik Lantz

Patrik Lantz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11227033
    Abstract: An efficient obfuscation of program control flow, comprising obscuring a control execution flow through a plurality of code blocks of a computer program. It involves obtaining a secret key, initializing a state variable based on the secret key, generating a switching value by processing the state variable through an encoding function, and selecting a code block from among a set of code blocks using the switching value. It further involves executing the block code, which comprises updating the state variable based on a present value of the state variable, and repeating the steps of generating a switching value, selecting a code block, and executing the code block to control execution flow through the set of code blocks.
    Type: Grant
    Filed: July 25, 2017
    Date of Patent: January 18, 2022
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Björn Johansson, Patrik Lantz, Michael Liljenstam
  • Patent number: 11210135
    Abstract: A method to obscure a control execution flow in a computer program includes initializing a state variable, q, and a switching variable, selecting a code block for execution using a present value of the switching variable, executing the code block, updating the state variable based on a present value of the state variable and a block-dependent constant that is associated with the code block to generate an updated state variable, and by applying a state update function to the updated state variable, and updating the switching variable by processing the state variable through a non-injective output function that generates a new value of the switching variable based on the state variable. The operations of selecting the code block, executing the code block, updating the state variable and updating the switching variable are repeated to control execution flow.
    Type: Grant
    Filed: May 29, 2018
    Date of Patent: December 28, 2021
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Björn Johansson, Patrik Lantz, Michael Liljenstam
  • Publication number: 20200151007
    Abstract: A method to obscure a control execution flow in a computer program includes initializing a state variable, q, and a switching variable, selecting a code block for execution using a present value of the switching variable, executing the code block, updating the state variable based on a present value of the state variable and a block-dependent constant that is associated with the code block to generate an updated state variable, and by applying a state update function to the updated state variable, and updating the switching variable by processing the state variable through a non-injective output function that generates a new value of the switching variable based on the state variable. The operations of selecting the code block, executing the code block, updating the state variable and updating the switching variable are repeated to control execution flow.
    Type: Application
    Filed: May 29, 2018
    Publication date: May 14, 2020
    Inventors: Björn JOHANSSON, Patrik LANTZ, Michael LILJENSTAM
  • Publication number: 20190228137
    Abstract: An efficient obfuscation of program control flow, comprising obscuring a control execution flow through a plurality of code blocks of a computer program. It involves obtaining a secret key, initializing a state variable based on the secret key, generating a switching value by processing the state variable through an encoding function, and selecting a code block from among a set of code blocks using the switching value. It further involves executing the block code, which comprises updating the state variable based on a present value of the state variable, and repeating the steps of generating a switching value, selecting a code block, and executing the code block to control execution flow through the set of code blocks.
    Type: Application
    Filed: July 25, 2017
    Publication date: July 25, 2019
    Inventors: Björn JOHANSSON, Patrik LANTZ, Michael LILJENSTAM
  • Publication number: 20180285573
    Abstract: A method and user device for preventing unauthorized viewing of at least one entity, e.g. character, digit, image and/or shape, is provided. The method comprises splitting up the entity in at least two parts, after which one of the split parts are sent to a first display unit and the remaining split part(s) is/are sent to at least one other display unit.
    Type: Application
    Filed: January 29, 2015
    Publication date: October 4, 2018
    Inventors: Patrik LANTZ, Martin HELL, Bjorn JOHANSSON, Bernard SMEETS
  • Publication number: 20150358334
    Abstract: A method, executed by a data processing device, for verifying authenticity of a client program executed on a processing device, the method comprising: receiving one or more messages from the processing device, and verifying authenticity of the client program based on one or more properties of the received messages; repeatedly updating a first part of the client program, wherein different instances of the first part of the client program cause messages sent by the processing device to have respective detectable properties indicative of the instance of the first part of the client program.
    Type: Application
    Filed: June 13, 2013
    Publication date: December 10, 2015
    Inventors: Patrik Lantz, Rickard Bellini, Ulf Mattsson, Bernard Smeets
  • Publication number: 20150193619
    Abstract: A technique for determining a malign or non-malign behavior of an executable file is disclosed. In a first method aspect, the method comprises the steps of first acquiring a first behavior profile of the executable file, the first behavior profile comprising a first observable execution trace of the executable file from an emulated environment, second acquiring a second behavior profile of the executable file, the second behavior profile comprising a second observable execution trace of the executable file from a real environment, and comparing the first and second observable execution traces so as to determine the malign or non-malign behavior of the executable file.
    Type: Application
    Filed: December 19, 2012
    Publication date: July 9, 2015
    Inventors: Patrik Lantz, Bjorn Johansson, Bernard Smeets