AIS receives new patent for invention
Assured Information Security, with local operations at 153 Brooks Road on the Griffiss Business and Technology Park in Rome, has received a new patent from the U.S. Patent and Trademark Office.
This item is available in full to subscribers.
Never miss a story
Subscribe now to get unlimited access to our digital content
AIS receives new patent for invention
ROME — Assured Information Security, with local operations at 153 Brooks Road on the Griffiss Business and Technology Park in Rome, has received a new patent from the U.S. Patent and Trademark Office, expanding the company’s intellectual property and raising its portfolio to 19 issued patents with multiple currently pending.
“Continuing to expand our patent portfolio allows us to bring truly novel technologies to the market,” said Scott Robidoux, chief operating officer at AIS.
“This patent, titled Code Protection, protects and secures sensitive or proprietary interpreted plaintext source code from reverse engineering and tampering,” Robidoux said.
“The idea originated from our company’s Internal Research and Development Program, which gives AIS employees the autonomy to pursue new and innovative ideas,” the chief operating officer added.
Invention is credited to Adam Meily, a principal engineer at AIS.
According to the announcement, the patent, US Patent No. 11,550,883 for Code Protection, describes the invention as: “a method that includes receiving a request to execute bytecode that corresponds to secured program code, the secured program code including an encrypted version of the bytecode.”
“Based on receiving the request to execute the bytecode, the method resolves the request, the resolving including identifying a location on disk of the secured program code.”
“Based on resolving the request, a license file for decrypting the encrypted version of the bytecode for execution is assessed, the license file including an encrypted key-value. The encrypted key-value is used in decrypting the encrypted version of the bytecode to obtain decrypted bytecode, where the decrypting places the decrypted bytecode in working memory, and the decrypted bytecode is executed.”
Comments
No comments on this item Please log in to comment by clicking here