Patent application number | Description | Published |
20090074828 | POLY(AMINO ACID) TARGETING MOIETIES - The present invention generally relates to polymers and macromolecules, in particular, to polymers useful in particles such as nanoparticles. One aspect of the invention is directed to a method of developing nanoparticles with desired properties. In one set of embodiments, the method includes producing libraries of nanoparticles having highly controlled properties, which can be formed by mixing together two or more macromolecules in different ratios. One or more of the macromolecules may be a polymeric conjugate of a moiety to a biocompatible polymer. In some cases, the nanoparticle may contain a drug. Other aspects of the invention are directed to methods using nanoparticle libraries. | 03-19-2009 |
20100203142 | AMPHIPHILIC COMPOUND ASSISTED NANOPARTICLES FOR TARGETED DELIVERY - The present invention generally relates to nanoparticles with an amphiphilic component. One aspect of the invention is directed to a method of developing nanoparticles with desired properties. In one set of embodiments, the method includes producing libraries of nanoparticles having highly controlled properties, which can be formed by mixing together two or more macromolecules in different ratios. One or more of the macromolecules may be a polymeric conjugate of a moiety to a biocompatible polymer. In some cases, the nanoparticle may contain a drug. Other aspects of the invention are directed to methods using nanoparticle libraries. | 08-12-2010 |
20100323199 | POLYMERS FOR FUNCTIONAL PARTICLES - The present invention generally relates to polymers and macromolecules, in particular, to block polymers useful in particles such as nanoparticles. One aspect of the invention is directed to a method of developing nanoparticles with desired properties. In one set of embodiments, the method includes producing libraries of nanoparticles having highly controlled properties, which can be formed by mixing together two or more macromolecules in different ratios. One or more of the macromolecules may be a polymeric conjugate of a moiety to a biocompatible polymer. In some cases, the nanoparticle may contain a drug. The moiety, in some embodiments, may have a molecular weight greater than about 1000 Da; for example, the moiety may include a polypeptide or a polynucleotide, such as an aptamer. The moiety may also be a targeting moiety, an imaging moiety, a chelating moiety, a charged moiety, or a therapeutic moiety. Another aspect of the invention is directed to systems and methods of producing such polymeric conjugates. In some embodiments, a solution containing a polymer is contacted with a liquid, such as an immiscible liquid, to form nanoparticles containing the polymeric conjugate. Other aspects of the invention are directed to methods using such libraries, methods of using or administering such polymeric conjugates, methods of promoting the use of such polymeric conjugates, kits involving such polymeric conjugates, or the like. | 12-23-2010 |
20110027172 | DRUG DELIVERY SYSTEM FOR PHARMACEUTICALS AND RADIATION - The present invention provides a drug delivery system for delivery of an agent and a radiopharmaceutical agent. The drug delivery system may specifically target an organ, tissue, cells, extracellular matrix, or intracellular compartment. Typically, the drug delivery system is a particle. Pharmaceutical compositions comprising the inventive particles are also provided. The present invention provides methods of preparing and using the inventive particles and pharmaceutical compositions. The inventive particles are useful in treating and diagnosing a variety of diseases including cancer. The inventive particles are also useful in tracking particles in vivo. | 02-03-2011 |
20110300219 | NANOSTRUCTURES FOR DRUG DELIVERY - The present invention provides compositions, preparations, formulations, kits, and methods useful for treating subjects having cancer or at risk of developing cancer. Some embodiments of the invention may comprise a composition comprising a plurality of particles comprising a platinum(IV) therapeutically active precursor. | 12-08-2011 |
20130130348 | Polymers for Functional Particles - A method includes producing libraries of nanoparticles having highly controlled properties, which can be formed by mixing together two or more macromolecules in different ratios. One or more of the macromolecules may be a polymeric conjugate of a moiety to a biocompatible polymer. The nanoparticle may contain a drug. The moiety may include a polypeptide or a polynucleotide, such as an aptamer. The moiety may be a targeting moiety, an imaging moiety, a chelating moiety, a charged moiety, or a therapeutic moiety. Another aspect is directed to systems and methods of producing such polymeric conjugates. In some embodiments, a solution containing a polymer is contacted with a liquid, such as an immiscible liquid, to form nanoparticles containing the polymeric conjugate. Other methods use such libraries, use or administer such polymeric conjugates, or promote the use of such polymeric conjugates. Kits involving such polymeric conjugates are also described. | 05-23-2013 |
20140079776 | Nanostructures for Drug Delivery - The present invention provides compositions, preparations, formulations, kits, and methods useful for treating subjects having cancer or at risk of developing cancer. Some embodiments of the invention may comprise a composition comprising a plurality of particles comprising a platinum(IV) therapeutically active precursor. | 03-20-2014 |
20150157737 | Polymers for Functional Particles - A method includes producing libraries of nanoparticles having highly controlled properties, which can be formed by mixing together two or more macromolecules in different ratios. One or more of the macromolecules may be a polymeric conjugate of a moiety to a biocompatible polymer. The nanoparticle may contain a drug. The moiety may include a polypeptide or a polynucleotide, such as an aptamer. The moiety may be a targeting moiety, an imaging moiety, a chelating moiety, a charged moiety, or a therapeutic moiety. Another aspect is directed to systems and methods of producing such polymeric conjugates. In some embodiments, a solution containing a polymer is contacted with a liquid, such as an immiscible liquid, to form nanoparticles containing the polymeric conjugate. Other methods use such libraries, use or administer such polymeric conjugates, or promote the use of such polymeric conjugates. Kits involving such polymeric conjugates are also described. | 06-11-2015 |
Patent application number | Description | Published |
20130062003 | METHOD AND APPARATUS FOR FORMING MATERIALS WITH LOW DUCTILITY - The invention provides an apparatus and a method of forming a material of low ductility including providing a first sheet made from a material of low ductility, providing an integrated forming device comprising a heat source and a forming element, and moving the forming element relative to the first sheet along a forming direction while simultaneously heating a localized portion of the first sheet along the forming direction at a substantially constant predetermined distance in front of the forming element. The predetermined distance is selected so as to yield a predetermined temperature to achieve a predetermined ductility at the localized portion of the first sheet when the forming element reaches the localized portion of the first sheet. | 03-14-2013 |
20130087540 | LASER-BASED LAP WELDING OF SHEET METAL COMPONENTS USING LASER INDUCED PROTUBERANCES TO CONTROL GAP - A method for laser welding first and second components is provided including moving a laser beam across a portion of a surface of the first component at a speed sufficient to generate protuberances on the surface of the first component by means of a humping effect, juxtaposing said first and second components such that opposed surfaces of the first and second components are separated by said protuberances on the surface of the first component, and laser welding said first and second components by scanning the laser beam in a region in which said surfaces are separated by said protuberances. The height of the protuberances can be controlled by controlling a scanning speed of the laser beam. | 04-11-2013 |
20130270233 | LASER BEAM WELDING - A process is provided for laser beam welding of surface treated steel components. Two steel components, at least one of which is a surface treated steel component, are relatively arranged to form a joint that is to be welded. Using a laser beam, the two steel components are irradiated along the joint so as to heat materials within each of the two steel components to a welding temperature, and thereby form a weld pool. During welding a metallic constituent is introduced into a leading edge of the weld pool, in front of the laser beam along a welding direction. The introduced metallic constituent combines with a species, which is released into the weld pool from the surface treated steel component, to form a compound that is stable within the weld pool at the welding temperature. | 10-17-2013 |
20140246129 | PRODUCT AND PROCESS BY LOCALIZED HEAT TREATMENT OF SHEET STEEL - A process for localized hardening of steel sheet components includes scanning a laser beam in a scan direction across a predetermined portion of the steel sheet component. The laser beam selectively heats material within the predetermined portion of the steel sheet component to a temperature of austenitizing transformation. During scanning of the laser beam across the predetermined portion, a source of external cooling is applied to the material within the predetermined portion and immediately behind the laser beam along the scan direction of the laser beam. The source of external cooling is selected to cool the material at a sufficiently rapid rate to form a locally hardened region that is defined substantially within the predetermined portion. Subsequent to applying the source of external cooling, the material within the predetermined portion of the steel sheet component is allowed to cool to ambient temperature. | 09-04-2014 |
Patent application number | Description | Published |
20120206363 | PORTABLE ELECTRONIC DEVICE AND METHOD OF CONTROLLING SAME - A method includes detecting a first touch at a first location, and a second touch at a second location, on a touch-sensitive display of an electronic device. In response to detecting the first and second touches, a first section of a virtual keyboard having a first boundary associated with the first location and a second section of the virtual keyboard having a second boundary associated with the second location are displayed on the touch-sensitive display. | 08-16-2012 |
20130265201 | Compact Broadband Antenna - A compact broadband antenna is disclosed. In various embodiments, the broadband antenna comprises a folded inverted F radiator. The folded inverted F radiator comprises a first L-shaped element comprising an arm portion and a rectangular portion, a feed element coupled to a feed source and to the L-shaped element and a shorting element coupled to ground. In some embodiments, the antenna further comprises a second L-shaped arm providing an additional current path to enhance performance of the antenna. In other embodiments, the antenna further comprises a capacitive coupling patch comprising a rectangular portion that is substantially coplanar with said rectangular portion of the L-shaped element. | 10-10-2013 |
20140029213 | TRANSMISSION LINE FOR MOBILE ELECTRONIC DEVICE - According to embodiments described in the specification, a method and mobile electronic device are provided for tuning an antenna. The mobile electronic device comprises an electrical ground member supporting at least one antenna; a housing containing the electrical ground member and having a conductive ring defining the perimeter of the housing; and a conductive tuning member disposed between the conductive ring and the electrical ground member, for transforming an impedance between the electrical ground member and the conductive ring; wherein the conductive tuning member is connected to the conductive ring by a first short, and to the electrical ground member by a second short. | 01-30-2014 |
20140198058 | ELECTRONIC DEVICE WITH TOUCH-SENSITIVE DISPLAY AND GESTURE-DETECTION - A method includes utilizing transmitters and receivers, performing detection of objects spaced from an electronic device, when an object that is spaced from the electronic device is detected, continuing performing detection of objects, when no object is detected, discontinuing performing detection of objects, and utilizing touch sensors of the touch-sensitive display, performing touch detection. | 07-17-2014 |
20140198059 | ELECTRONIC DEVICE WITH TOUCH-SENSITIVE DISPLAY AND GESTURE-DETECTION - A method includes utilizing transmitters and receivers in an electronic device to detect at least one object spaced from a touch-sensitive display of the electronic device, determining first signal values utilizing touch sensors of the touch-sensitive display to obtain baseline noise values when no touch is detected and the transmitters are transmitting, and when a touch is detected, applying the baseline noise values to second signal values to reduce the effect of noise when identifying the touch location. | 07-17-2014 |
20140198073 | ELECTRONIC DEVICE INCLUDING THREE-DIMENSIONAL GESTURE DETECTING DISPLAY - An electronic device includes a display, a plurality of antennae arranged and constructed to emit a signal and to receive backscatter from the signal, and a processor operably coupled to the antennae to utilize the received backscatter to detect location and at least one of size and shape of an object spaced from the display. | 07-17-2014 |
20150097633 | 60 GHZ INTEGRATED CIRCUIT TO PRINTED CIRCUIT BOARD TRANSITIONS - Embodiments are directed to a transition structure for interfacing an integrated circuit chip and a substrate, comprising: a co-planar waveguide (CPW) structure formed based on ground-signal-ground (GSG) pads on the integrated circuit chip, a grounded co-planar waveguide (CPWG) structure coupled to the GSG pads, and a microstrip coupled to the CPWG structure. | 04-09-2015 |
20150097634 | MILLIMETER-WAVE BROADBAND TRANSITION OF MICROSTRIP LINE ON THIN TO THICK SUBSTRATES - Embodiments are directed to a structure comprising: a first substrate section having a first thickness, a second substrate section having a second thickness different from the first thickness, a plurality of vias configured to couple a first ground plane associated with the first substrate section and a second ground plane associated with the second substrate section, and a microstrip comprising: a first section associated with the first substrate section and having a first width, a second section associated with the second substrate section and having a second width different from the first width, and a taper between the first width and the second width. | 04-09-2015 |
20160079652 | MOBILE DEVICE WITH TRI-BAND ANTENNAS INCORPORATED INTO A METAL BACK SIDE - A mobile device with tri-band antennas incorporated into a metal back side thereof is provided. The device comprises: a back side comprising a face and opposing ends; an edge extending from the face: a conducting central portion; antennas located at the opposing ends, each of the antennas electrically separated from the conducting central portion, and each comprising: a first respective radiating arm located at least partially on the face, and at least two further respective radiating arms extending from the first respective radiating arm, the at least two further respective radiating arms located on the edge, the radiating arms configured to resonate in at least three frequency ranges; one or more antenna feeds connected to each of the antennas; and, a switch configured to select one or more of the antennas for operation. | 03-17-2016 |
20160079655 | WIDEBAND ANTENNA FOR MOBILE SYSTEM WITH METAL BACK COVER - A device is set forth, comprising: a metallic back cover having interior and exterior portions; a chassis disposed on the interior portion of said metallic back cover for mounting components; a metallic edge ring surrounding said metallic back cover and said chassis; a gap extending through the exterior portion of the back cover and through the edge, for defining one dimension of an antenna conducting plane; a ground plane covering the chassis such that said antenna conducting plane and ground plane wrap around the chassis and components mounted thereon; an antenna feed extending through the ground plane to the antenna conducting plane; and a shorting pin connecting the ground plane to the antenna conducting plane. | 03-17-2016 |
Patent application number | Description | Published |
20120301013 | ENHANCED OBJECT RECONSTRUCTION - Processing images includes projecting an infra-red pattern onto a three-dimensional object and producing a first image, a second image, and a third image of the three-dimensional object while the pattern is projected on the three-dimensional object. The first image and the second image include the three-dimensional object and the pattern. The first image and the second image are produced by capturing at a first camera and a second camera, respectively, light filtered through an infra-red filter. The third image includes the three-dimensional object but not the pattern. Processing the images also includes establishing a first-pair correspondence between a portion of pixels in the first image and a portion of pixels in the second image. Processing the images further includes constructing, based on the first-pair correspondence and the third image, a two-dimensional image that depicts a three-dimensional construction of the three-dimensional object. | 11-29-2012 |
20160070967 | Multi-Stage Liveness Determination - A method of determining whether a biometric object is part of a live individual is described. In one such method, image information is acquired from the biometric object by using a sensor, such as an ultrasonic sensor. The image information may be analyzed in at least two analysis stages. One of the analysis stages may be a temporal analysis stage that analyzes changes in the image information obtained during a time period throughout which the biometric object was continuously available to the sensor. For example, a dead/alive stage may analyze differences between image information taken at two different times in order to identify changes from one time to the next. Other stages may focus on aspects of a particular image information set, rather than seeking to assess changes over time. These other stages seek to determine whether an image information set exhibits characteristics similar to those of a live biometric object. | 03-10-2016 |
20160070968 | IMAGE-BASED LIVENESS DETECTION FOR ULTRASONIC FINGERPRINTS - A liveness-detection method and/or system is disclosed. A method of detecting liveness can comprise obtaining a single ultrasonic image of a biometric object. The single ultrasonic image can be subdivided into a plurality of overlapping sample blocks. Feature vectors can be extracted in a spatial domain and a frequency domain from each of the plurality of sample blocks. The feature vectors can be compared from each of the plurality of sample blocks to a classification model. | 03-10-2016 |
Patent application number | Description | Published |
20080199071 | CREATING 3D IMAGES OF OBJECTS BY ILLUMINATING WITH INFRARED PATTERNS - According to a general aspect, processing images includes projecting an infra-red pattern onto a three-dimensional object and producing a first image, a second image, and a third image of the three-dimensional object while the pattern is projected on the three-dimensional object. The first image and the second image include the three-dimensional object and the pattern. The first image and the second image are produced by capturing at a first camera and a second camera, respectively, light filtered through an infra-red filter. The third image includes the three-dimensional object but not the pattern. Processing the images also includes establishing a first-pair correspondence between a portion of pixels in the first image and a portion of pixels in the second image. Processing the images further includes constructing, based on the first-pair correspondence and the third image, a two-dimensional image that depicts a three-dimensional construction of the three-dimensional object. | 08-21-2008 |
20090003686 | ENHANCED OBJECT RECONSTRUCTION - Processing images includes projecting an infra-red pattern onto a three-dimensional object and producing a first image, a second image, and a third image of the three-dimensional object while the pattern is projected on the three-dimensional object. The first image and the second image include the three-dimensional object and the pattern. The first image and the second image are produced by capturing at a first camera and a second camera, respectively, light filtered through an infra-red filter. The third image includes the three-dimensional object but not the pattern. Processing the images also includes establishing a first-pair correspondence between a portion of pixels in the first image and a portion of pixels in the second image. Processing the images further includes constructing, based on the first-pair correspondence and the third image, a two-dimensional image that depicts a three-dimensional construction of the three-dimensional object. | 01-01-2009 |
20140056471 | OBJECT TRACKING USING BACKGROUND AND FOREGROUND MODELS - Various arrangements for modeling a scene are presented. A plurality of images of the scene captured over a period of time may be received, each image comprising a plurality of pixels. A plurality of background models may be created using the plurality of images. At least one background model may be created for each pixel of the plurality of pixels. A plurality of foreground models may be created using the plurality of images. A foreground model may be created for each pixel of at least a first subset of pixels of the plurality of pixels. The background models and the foreground models may be indicative of the scene over the period of time. | 02-27-2014 |
20140056472 | HAND DETECTION, LOCATION, AND/OR TRACKING - Various arrangements for identifying a location of a hand of a person are presented. A group of pixels may be identified in an image of a scene as including the person. A reference point may be set for the group of pixels identified as the person. The hand may be identified as using a local distance maximum from the reference point. An indication, such as coordinates, of the location of the hand may be output based on the local distance. | 02-27-2014 |
Patent application number | Description | Published |
20100228122 | MICROBUBBLE MEDICAL DEVICES - Method and medical devices for generating and stabilizing micro- or nano-bubbles, and systems and methods for therapeutic applications using the bubbles, are provided. The micro-bubbles may be used to enhance therapeutic benefits such as ultrasound-guided precision drug delivery and real-time verification, acoustic activation of large tumour masses, enhanced acoustic activation through longer retention of therapeutic agents at the point of interest, enhancement of high intensity focused ultrasound treatments, light activation of photodynamic drugs at a depth within a patient using extracorporeal light sources, probes, or sonoluminescence, and initiation of time reversal acoustics focused ultrasound to permit highly localized treatment. | 09-09-2010 |
20110167864 | AMMONIA REFRIGERATION SYSTEM - In accordance with the present disclosure there is provided an efficient refrigeration system for cooling an environment using ammonia and sodium thiocyanate using a low grade heat source. The refrigeration system comprises a condenser for condensing vaporous ammonia to liquid ammonia coupled to an evaporator. The condenser condenses the ammonia vapour using a heat exchanger. The evaporator evaporates liquid ammonia to vaporous ammonia by absorbing heat from the cooling environment. An absorber absorbs the vaporous ammonia into an ammonia sodium thiocyanate solution and adsorbs vaporous ammonia on to sodium thiocyanate salts. The absorber is coupled to a regenerator through a solution pump for pumping ammonia sodium thiocyanate solution with dissolved ammonia from the absorber to the regenerator. The regenerator regenerates ammonia vapour from the pumped solution and supplies the regenerated ammonia vapour to the condenser and the concentrated solution back to the absorber. | 07-14-2011 |
20110314844 | METHOD AND APPARATUS FOR WASTE HEAT RECOVERY AND ABSORPTION GASES USED AS WORKING FLUID THEREIN - A method provides for waste heat power generation or heat recovery and for a driving power with an absorption process using low grade heat sources. An apparatus also provides for such waste heat recovery in absorption process and to the used vapor-salt working fluid. A low temperature heat source is used as a heating working medium to heat in a regenerator by heat exchange the absorption liquid working fluid from the absorber and consisting of a salt absorbent and ammonia or carbon dioxide as an absorbed agent to form the absorbent and the superheated high pressure absorbed agent. The superheated and vaporized absorbed agent enters into a turbine to provide energy and generate power via turbine expansion step. After heat release, the resultant low pressure absorbed agent is discharged from the turbine and returns to the absorption step and contacts with the absorbent from the regeneration step to form the absorption liquid which can enter into the next thermodynamic cycle process. | 12-29-2011 |
20140148687 | MICROBUBBLE MEDICAL DEVICES - Method and medical devices for generating and stabilizing micro or nano bubbles, and systems and methods for therapeutic applications using the bubbles, is provided. Two novel bubble generating means are provided: in-line capillary tubes and mix chambers flow focusing, and cross flow bubble generation with optimized bubble detachment means. A method and medical device to stabilize bubble sizes and improve bubble size homogeneity through rectified diffusion is disclosed. A method and system to facilitate acoustic activation of therapeutic agents using ultrasound energy is provided. | 05-29-2014 |
Patent application number | Description | Published |
20160052418 | MULTI-STEP MODEL PREDICTIVE ITERATIVE TECHNIQUES FOR BATTERY SYSTEM PEAK POWER ESTIMATION - An electrified vehicle and method for estimating peak power of a battery system of the electrified vehicle are presented. In one exemplary implementation, the method includes receiving, at a controller of the electrified vehicle, measured current, voltage, and temperature of the battery system and determining, at the controller, operating parameters for the battery system based on the measured current, voltage, and temperature. An initial peak current at a start of a current prediction period for the battery system is determined, at the controller, based on the operating parameters, and an instantaneous peak current of the battery system is determined based on its initial peak current by performing voltage-limited extrapolation of resistances and open-circuit voltage (VLERO) of a battery model for the battery system. The battery system and an electric motor of the electrified vehicle are controlled, by the controller, based on the instantaneous peak current. | 02-25-2016 |
20160054390 | TECHNIQUES FOR ROBUST BATTERY STATE ESTIMATION - More accurate and robust battery state estimation (BSE) techniques for a battery system of an electrified vehicle include estimating a current bias or offset generated by a current sensor and then adjusting the measured current to compensate for the estimated current bias. The techniques obtain nominal parameters for a battery model of the battery system based on a measured temperature and an estimated open circuit voltage (OCV). The techniques use these nominal parameters and the corrected measured current to estimate the OCV, a capacity, and an impedance of the battery system. The techniques utilize the OCV to estimate a state of charge (SOC) of the battery system. The techniques also estimate a state of health (SOH) of the battery system based on its estimated capacity and impedance. The techniques then control the electrified vehicle based on the SOC and/or the SOH. | 02-25-2016 |
Patent application number | Description | Published |
20110214179 | SECURE METHOD AND SYSTEM FOR COMPUTER PROTECTION - Attacks by computer viruses, worm programs, and other hostile software (‘malware’), have become very serious problems for computer systems connected to large communication networks such as the Internet. One potential defence against such attacks is to employ diversity—that is, making each copy of the attacked software different. However, existing diversity techniques do not offer sufficient levels of protection. The invention provides an effective diversity solution by applying tamper resistant software (TRS) encoding techniques, to the communications that take place between software components, with corresponding changes to the code handling those communications. These communications may include, for example, data passed between software routines via parameters or mutually accessible variables, light-weight messages, signals and semaphores passed between threads, and messages passed between software processes. Effective TRS encoding techniques include data-flow encoding and mass-data encoding techniques. | 09-01-2011 |
20160006541 | DATA PROCESSING - A method of processing data according to a first predetermined function, the method comprising: receiving an encoded amount of data, wherein the encoded amount of data is an amount of data that has been encoded using an error control code; and processing the encoded amount of data using a second predetermined function to generate an output; wherein the second redetermined function corresponds to the first redetermined function in that the result of processing, with the second predetermined function, a quantity of data encoded using the error control code equals the result of encoding with the error control code the result of processing the quantity of data with the first predetermined function. | 01-07-2016 |
Patent application number | Description | Published |
20080208560 | System and method of interlocking to protect software - mediated program and device behaviors - A method for rendering software resistant to reverse engineering. Replace at least one first constant (mathematical expression, etc.) in a computational expression with a second mixed mathematical and bitwise-Boolean expression, the first constant being simpler than the second expression and the second expression being based on the value or the variables found in the first constant (or expression). Evaluation of the second mixed mathematical and bitwise-Boolean expression produces a value preserving the value of the first constant, either: with the original value of the first constant or the original value of the result of the first expression, in which case the second mixed mathematical and bitwise-Boolean expression is obtained from the first constant by converting the first constant by mathematical identities; or, in an encoded form, as a new value, which can be converted back to the original value of the first constant by applying an information-preserving decoding function, in which case the second mixed mathematical and bitwise-Boolean expression is obtained from the first constant by modifying the first constant by a combination of conversion according to mathematical identities and transformation according to an information preserving encoding function. | 08-28-2008 |
20080216051 | System and method of interlocking to protect software-mediated program and device behaviours - Methods and devices for thwarting code and control flow based attacks on software. The source code of a subject piece of software is automatically divided into basic blocks of logic. Selected basic blocks are amended so that their outputs are extended. Similarly, other basic blocks are amended such that their inputs are correspondingly extended. The amendments increase or create dependencies between basic blocks such that tampering with one basic block's code causes other basic blocks to malfunction when executed. | 09-04-2008 |
20120192283 | Interlocked Binary Protection Using Whitebox Cryptography - A system and method for transforming a software application comprising binary code and optionally associated data, from an original form to a more secure form. The method includes performing a combination of binary transmutations to the application, and interlocking the transmutations by generating and placing interdependencies between the transmutations, wherein a transmutation is an irreversible change to the application. Different types of the transmutations are applied at varied granularities of the application. The transmutations are applied to the application code and the implanted code as well. The result is a transformed software application which is semantically equivalent to the original software application but is resistant to static and/or dynamic attacks. | 07-26-2012 |
20120246487 | System and Method to Protect Java Bytecode Code Against Static And Dynamic Attacks Within Hostile Execution Environments - A method and system that provides secure modules that can address Java platform weaknesses and protect Java bytecode during execution time. The secure modules are implemented in C/C++ as an example. Because implementation of the security modules is made in C/C++, this enables use of security technology that secures C/C++ software code. | 09-27-2012 |
20140013427 | System And Method Providing Dependency Networks Throughout Applications For Attack Resistance - A method and system is provided to automatically propagate dependencies from one part of a software application to another previously unrelated part. Propagation of essential code functionality and data to other parts of the program serves to augment common arithmetic functions with Mixed Boolean Arithmetic (MBA) formulae that are bound to pre-existing parts of the program. A software application is first analyzed on a compiler level to determine the program properties which hold in the program. Thereafter, conditions are constructed based on these properties and encoded in formulae that encode the condition in data and operations. Real dependencies throughout the application are therefore created such that if a dependency is broken the program will no longer function correctly. | 01-09-2014 |
20140026214 | Method of Securing Non-Native Code - A method to secure a non-native application. The non-native application is processed to obtain an application stub to be triggered within a virtual machine. The processing of the non-native application also provide a native code function upon which the application stub depends. The non-native function is part of a trusted module that extends security services from the trusted module to the virtual machine. The trusted module is a native code application that creates a trusted zone as a root of trustiness extending to the virtual machine by an execution-enabling mechanism between the application tab and the non-native function. | 01-23-2014 |
20150067874 | SECURING ACCESSIBLE SYSTEMS USING CROSS-LINKING - Systems and techniques for securing accessible computer-executable program code and systems are provided. One or more base functions may be generated and blended with existing program code, such that it may be difficult or impossible for a potential attacker to distinguish the base functions from the existing code. The systems and code also may be protected using a variety of other blending and protection techniques, such as fractures, variable dependent coding, dynamic data mangling, and cross-linking, which may be used individually or in combination, and/or may be blended with the base functions. | 03-05-2015 |
20150067875 | SECURING ACCESSIBLE SYSTEMS USING VARIABLE DEPENDENT CODING - Systems and techniques for securing accessible computer-executable program code and systems are provided. One or more base functions may be generated and blended with existing program code, such that it may be difficult or impossible for a potential attacker to distinguish the base functions from the existing code. The systems and code also may be protected using a variety of other blending and protection techniques, such as fractures, variable dependent coding, dynamic data mangling, and cross-linking, which may be used individually or in combination, and/or may be blended with the base functions. | 03-05-2015 |
20150074803 | SYSTEM AND METHOD OF INTERLOCKING TO PROTECT SOFTWARE-MEDIATED PROGRAM AND DEVICE BEHAVIOURS - Methods and devices for thwarting code and control flow based attacks on software. The source code of a subject piece of software is automatically divided into basic blocks of logic. Selected basic blocks are amended so that their outputs are extended. Similarly, other basic blocks are amended such that their inputs are correspondingly extended. The amendments increase or create dependencies between basic blocks such that tampering with one basic block's code causes other basic blocks to malfunction when executed. | 03-12-2015 |
20150082425 | SECURING ACCESSIBLE SYSTEMS USING BASE FUNCTION ENCODING - Systems and techniques for securing accessible computer-executable program code and systems are provided. One or more base functions may be generated and blended with existing program code, such that it may be difficult or impossible for a potential attacker to distinguish the base functions from the existing code. The systems and code also may be protected using a variety of other blending and protection techniques, such as fractures, variable dependent coding, dynamic data mangling, and cross-linking, which may be used individually or in combination, and/or may be blended with the base functions. | 03-19-2015 |
20150113518 | UPDATING SOFTWARE COMPONENTS - A method and system for renewing software at the component-level is provided. A client program includes a base component for loading a software component into at least one loadable region of the program to update the program. Code in the software component is for writing state data associating the state of the update in storage, upon execution of the software component, and testing the state data to verify condition of the updated program and disallowing rollback and roll-forward attacks, the state data comprising hash chain values. The state data for verifying the correctness of the updated program is entangled with application data used for the program functionality. A server includes: an update pool having a plurality of software updates deployed in each client, and a policy control for monitoring and controlling at least one of: the length of time the client runs until the software update is invoked, a chain of the updates; and the granularity of the update. | 04-23-2015 |
20150161384 | SECURED EXECUTION OF A WEB APPLICATION - Methods and nodes for securing execution of a web application by determining that a call dependency from a first to a second function needs to be protected, adding a Partial Execution Stub (PES) function comprising code to establish a communication connection with a trusted module. Methods and nodes for secured execution of a web application by invoking a function of the web application, invoking a Partial Execution Stub (PES) function during execution of the function of the web application, sending, from the PES function, a message call with current execution information to a trusted module and receiving, a verification result from the trusted module. | 06-11-2015 |
20150213239 | SYSTEM AND METHOD OF INTERLOCKING TO PROTECT SOFTWARE-MEDIATED PROGRAM AND DEVICE BEHAVIOURS - Methods and devices for thwarting code and control flow based attacks on software. The source code of a subject piece of software is automatically divided into basic blocks of logic. Selected basic blocks are amended so that their outputs are extended. Similarly, other basic blocks are amended such that their inputs are correspondingly extended. The amendments increase or create dependencies between basic blocks such that tampering with one basic block's code causes other basic blocks to malfunction when executed. | 07-30-2015 |
20150326389 | SECURING ACCESSIBLE SYSTEMS USING DYNAMIC DATA MANGLING - Systems and techniques for securing accessible computer-executable program code and systems are provided. One or more base functions may be generated and blended with existing program code, such that it may be difficult or impossible for a potential attacker to distinguish the base functions from the existing code. The systems and code also may be protected using a variety of other blending and protection techniques, such as fractures, variable dependent coding, dynamic data mangling, and cross-linking, which may be used individually or in combination, and/or may be blended with the base functions. | 11-12-2015 |