Zaidenberg
Nezer Zaidenberg US
Patent application number | Description | Published |
---|---|---|
20140337637 | METHODS AND SYSTEMS FOR EXECUTING PROTECTED CONTENT - Various embodiments for enabling and protecting execution of encrypted electronic content in a client system. In various embodiments, there is a method for managing the state of the cache memory of the client system. In various embodiments, there is a method for protocol stack validation to confirm readiness of the client system to execute encrypted electronic content. In various embodiments, there is a method for protocol stack execution. | 11-13-2014 |
Nezer Zaidenberg, Jyvaskylan Yliopisto FI
Patent application number | Description | Published |
---|---|---|
20140337637 | METHODS AND SYSTEMS FOR EXECUTING PROTECTED CONTENT - Various embodiments for enabling and protecting execution of encrypted electronic content in a client system. In various embodiments, there is a method for managing the state of the cache memory of the client system. In various embodiments, there is a method for protocol stack validation to confirm readiness of the client system to execute encrypted electronic content. In various embodiments, there is a method for protocol stack execution. | 11-13-2014 |
Nezer Zaidenberg, Hod Hasharon IL
Patent application number | Description | Published |
---|---|---|
20150149732 | SYSTEM AND METHODS FOR CPU COPY PROTECTION OF A COMPUTING DEVICE - The present disclosure relates to techniques for system and methods for software-based management of protected data-blocks insertion into the memory cache mechanism of a computerized device. In particular the disclosure relates to preventing protected data blocks from being altered and evicted from the CPU cache coupled with buffered software execution. The technique is based upon identifying at least one conflicting data-block having a memory mapping indication to a designated memory cache-line and preventing the conflicting data-block from being cached. Functional characteristics of the software product of a vendor, such as gaming or video, may be partially encrypted to allow for protected and functional operability and avoid hacking and malicious usage of non-licensed user. | 05-28-2015 |
20150150084 | SYSTEM AND METHODS FOR REMOTE SOFTWARE AUTHENTICATION OF A COMPUTING DEVICE - The current disclosure relates to techniques for system and methods for software-based management of remote software authentication of at least one entity machine, addressing various vulnerabilities of software authentication based upon the genuinity based scheme. The disclosure is using challenge execution on at least one suspect machine, providing a technique for CPU event monitoring of a combined count of at least two events monitored on the entity machine during execution of the authentication challenge. The authentication challenge allows further detection functionality of virtual machine or a hypervisor installed. The techniques measures execution time of authentication challenge, comparing the received challenge result with the expected challenge result and accordingly rejects or allows the entity machine through the authentication process. | 05-28-2015 |