Goldsmid
Aaron Goldsmid, New York, NY US
Patent application number | Description | Published |
---|---|---|
20090327711 | AUTHENTICATION OF BINARIES IN MEMORY WITH PROXY CODE EXECUTION - Presented is an anti-tampering method that validates and protects specific sections of a binary file. In one embodiment, this method permits a proxy engine to execute (via emulation by a virtual machine) the protected code on behalf of the binary in kernel mode upon successful completion of an integrity check. The integrity check can optionally check only the specific parts of code that the developer wishes to validate. The integrity check can cross binary boundaries. Moreover, the integrity check can be done on a hard drive or in memory. Furthermore, since the encrypted code is executed by the proxy engine in kernel mode, hackers are further deterred from modifying the code. Additionally, a method of creating a protected binary file is described herein. | 12-31-2009 |
Aaron Goldsmid, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20080229115 | PROVISION OF FUNCTIONALITY VIA OBFUSCATED SOFTWARE - In an example embodiment, executable files are individually encrypted utilizing a symmetric cryptographic key. For each user to be given access to the obfuscated file, the symmetric cryptographic key is encrypted utilizing a public key of a respective public/private key pair. A different public key/private key pair is utilized for each user. Obfuscated files are formed comprising the encrypted executable files and a respective encrypted symmetric cryptographic key. The private keys of the public/private key pairs are stored on respective smart cards. The smart cards are distributed to the users. When a user wants to invoke the functionality of an obfuscated file, the user provides the private key via his/her smart card. The private key is retrieved and is utilized to decrypt the appropriate portion of the obfuscated file. The symmetric cryptographic key obtained therefrom is utilized to decrypt the encrypted executable file. | 09-18-2008 |
20080276314 | SOFTWARE PROTECTION INJECTION AT LOAD TIME - A method to apply a protection mechanism to a binary object includes using operating system resources to load a binary object from a storage medium along with a manifest and a digital signature. Authentication of the binary object is performed using the digital signature and the manifest is read to determine a category of protection for the binary object. The operating system selects a protection mechanism corresponding to the protection category and injects protection mechanism code, along with the binary object into a binary image on computer RAM. When the binary image is accessed, the protection mechanism executes and either allows full access and functionality to the binary object or prevents proper access and operation of the binary object. The protection mechanisms may be updated independently from the information on the storage medium. | 11-06-2008 |
Aaron P. Goldsmid, New York, NY US
Patent application number | Description | Published |
---|---|---|
20140289161 | DYNAMICALLY GUIDED USER REVIEWS - Systems and associated processes for guiding users to provide more useful reviews are described. These systems and processes can provide guided reviews in certain embodiments by presenting questions to a user in the form of an interview. The questions can be relevant to the item being reviewed, and as such, may be specifically and dynamically selected based on the particular item under consideration. Many other criteria may be used to select the types of questions presented to users, examples of which will be described below. Presenting review questions to users can have the effect of reducing or eliminating the “blank page” effect of having to write a review from scratch, with no guidance. Accordingly, review questions can potentially elicit more thorough and useful feedback than existing review systems in some embodiments. | 09-25-2014 |
Aaron Payne Goldsmid, New York, NY US
Patent application number | Description | Published |
---|---|---|
20090293041 | SOFTWARE PROTECTION THROUGH INTERDEPENDENT PARAMETER CLOUD CONSTRAINED SOFTWARE EXECUTION - Methods and a tool or instrument for performing the methods of protecting a computer program with a parameter cloud are disclosed. A parameter cloud comprising a plurality of elements may be created. Called functions of a computer program may have defined expected parameter cloud states so that proper behavior of the called function is achieved when the parameter cloud state is the expected parameter cloud state. An expected parameter cloud state may include a selected set of elements of the parameter cloud having assigned values. Static portions of the called functions may depend on a current parameter cloud state, and calling functions may transform the parameter cloud state prior to calling their respective called functions. The methods and instrument may operate on original source code or post-binary targets of the computer program. A fingerprint may be used to identify a specific computer program from a sequence of state transitions. | 11-26-2009 |
20090319761 | HARDWARE CONSTRAINED SOFTWARE EXECUTION - Restricting execution by a computing device of instructions within an application program. The application program is modified such that execution of the selected instructions is dependent upon a corresponding expected state of one or more hardware components in the computing device. In an embodiment, the application program is modified to place the hardware components in the expected states prior to execution of the corresponding selected instructions. Creating the dependency on the hardware components prevents the unintended or malicious execution of the selected instructions. | 12-24-2009 |
20140128144 | IN-VEHICLE GAMING SYSTEM FOR PASSENGERS - An in-vehicle gaming system may be played by a driver alone, or simultaneously or individually by a driver and/or one or more other users. The in-vehicle gaming system may be activated or controlled by, for example, touch, voice, or gesture. Gameplay is dynamically adjusted based at least in part on environmental factors such that the driver is not distracted from driving the vehicle. Game content is generated based at least in part on environmental factors and user data. | 05-08-2014 |
20140128145 | IN-VEHICLE GAMING SYSTEM FOR A DRIVER - An in-vehicle gaming system may be played by a driver alone, or simultaneously or individually by a driver and/or one or more other users. The in-vehicle gaming system may be activated or controlled by, for example, touch, voice, or gesture. Gameplay is dynamically adjusted based at least in part on environmental factors such that the driver is not distracted from driving the vehicle. Game content is generated based at least in part on environmental factors and user data. | 05-08-2014 |
20140128146 | CUSTOMIZABLE IN-VEHICLE GAMING SYSTEM - An in-vehicle gaming system may be played by a driver alone, or simultaneously or individually by a driver and/or one or more other users. The in-vehicle gaming system may be activated or controlled by, for example, touch, voice, or gesture. Gameplay is dynamically adjusted based at least in part on environmental factors such that the driver is not distracted from driving the vehicle. Game content is generated based at least in part on environmental factors and user data. | 05-08-2014 |
20140256426 | IN-VEHICLE GAMING SYSTEM - An in-vehicle gaming system may be played by a driver alone, or simultaneously or individually by a driver and/or one or more other users. The in-vehicle gaming system may be activated or controlled by, for example, touch, voice, or gesture. Gameplay is dynamically adjusted based at least in part on environmental factors such that the driver is not distracted from driving the vehicle. Game content is generated based at least in part on environmental factors and user data. | 09-11-2014 |
Aaron Payne Goldsmid, San Francisco, CA US
Patent application number | Description | Published |
---|---|---|
20150356570 | PREDICTING INTERACTIONS OF SOCIAL NETWORKING SYSTEM USERS WITH APPLICATIONS - A social networking system provides instructions to third-party application developers for inclusion in applications. When executed, the instructions communicate information from an application to the social networking system describing user interactions with the application. Based on received information describing a user's interaction with an application, the social networking system determines likelihoods of the user performing various types interactions with applications and classifies the user based on the determined likelihoods. A user's interactions with additional applications similar to an application may be used to determine the likelihoods of the user performing different types of interactions with the application. Classifications associated with users may be used as targeting criteria for advertisements, allowing advertisers to target advertisements to users having a threshold likelihood of performing certain types of interactions with an application. | 12-10-2015 |