Movatterモバイル変換


[0]ホーム

URL:


US20200026826A1 - Tiered code obfuscation in a development environment - Google Patents

Tiered code obfuscation in a development environment
Download PDF

Info

Publication number
US20200026826A1
US20200026826A1US16/571,628US201916571628AUS2020026826A1US 20200026826 A1US20200026826 A1US 20200026826A1US 201916571628 AUS201916571628 AUS 201916571628AUS 2020026826 A1US2020026826 A1US 2020026826A1
Authority
US
United States
Prior art keywords
code
glasses
user
decrypted portion
pair
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US16/571,628
Inventor
James K. Hook
Hamish C. Hunt
Nicholas K. Lincoln
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines CorpfiledCriticalInternational Business Machines Corp
Priority to US16/571,628priorityCriticalpatent/US20200026826A1/en
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATIONreassignmentINTERNATIONAL BUSINESS MACHINES CORPORATIONASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: HOOK, JAMES K., LINCOLN, NICHOLAS K., HUNT, HAMISH C.
Publication of US20200026826A1publicationCriticalpatent/US20200026826A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A method for viewing a plurality of encrypted code displayed within an integrated development environment with a pair of augmented reality (AR) glasses. A plurality of user login credentials submitted by a user utilizing the pair of AR glasses to access a plurality of encrypted code. The method may determine the user is authorized to access a portion of the plurality of encrypted code based on the received plurality of user login credentials. The method may further decrypt the portion based on determining the user is authorized to access the portion. The method may further include displaying the decrypted portion on a lens within the pair of AR glasses.

Description

Claims (18)

What is claimed is:
1. A processor-implemented method for viewing encrypted code displayed with a pair of augmented reality (AR) glasses, the method comprising:
decrypting a portion of the encrypted code based on user login credentials associated with a user authorization level, wherein the encrypted code is organized into a plurality of code authorization levels and the decrypted portion corresponds to one or more of the plurality of code authorization levels that are at or below the user authorization level;
displaying the decrypted portion on a lens within the pair of AR glasses;
receiving a command to modify a part of the decrypted portion;
modifying the part of the decrypted portion based on the received command;
changing a code authorization level corresponding to the modified part of the decrypted portion based on the modification; and
updating the display of the decrypted portion on the lens within the pair of AR glasses based on the change to the code authorization level corresponding to the modified part of the decrypted portion.
2. The method ofclaim 1, further comprising receiving the user login credentials through user-interaction with the AR glasses.
3. The method ofclaim 1, wherein updating the display of the decrypted portion includes displaying the modified part of the decrypted portion with a note indicating that the code authorization level corresponding to the modified part changed and a reason why the code authorization level corresponding to the modified part changed.
4. The method ofclaim 1, wherein the pair of AR glasses are configured to decrypt only code corresponding to a subset of the plurality of code authorization levels.
5. The method ofclaim 1, wherein displaying the decrypted portion includes virtually attaching the displayed decrypted portion to an integrated development environment (IDE) displayed on a screen of a separate client device such that the decrypted portion displayed on the lens within the pair of AR glasses appears to be displayed on the screen of the separate client device.
6. The method ofclaim 5, further comprising obscuring the decrypted portion in response to detecting that the lens within the pair of AR glasses is turned away from the screen of the separate client device.
7. A computer program product for viewing encrypted code displayed with a pair of augmented reality (AR) glasses, the computer program product comprising a computer readable storage medium having a computer readable program stored therein, wherein the computer readable program, when executed by a processor, causes the processor to:
decrypt a portion of the encrypted code based on user login credentials associated with a user authorization level, wherein the encrypted code is organized into a plurality of code authorization levels and the decrypted portion corresponds to one or more of the plurality of code authorization levels that are at or below the user authorization level;
display the decrypted portion on a lens within the pair of AR glasses;
receive a command to modify a part of the decrypted portion;
modify the part of the decrypted portion based on the received command;
change a code authorization level corresponding to the modified part of the decrypted portion based on the modification; and
update the display of the decrypted portion on the lens within the pair of AR glasses based on the change to the code authorization level corresponding to the modified part of the decrypted portion.
8. The computer program product ofclaim 7, wherein the program instructions are further configured to cause the processor to receive the user login credentials through user-interaction with the AR glasses.
9. The computer program product ofclaim 7, wherein the program instructions are further configured to cause the processor to update the display of the decrypted portion by displaying the modified part of the decrypted portion with a note indicating that the code authorization level corresponding to the modified part changed and a reason why the code authorization level corresponding to the modified part changed.
10. The computer program product ofclaim 7, wherein the program instructions are further configured to cause the processor to decrypt only code corresponding to a subset of the plurality of code authorization levels.
11. The computer program product ofclaim 7, wherein the program instructions are further configured to cause the processor to display the decrypted portion by virtually attaching the displayed decrypted portion to an integrated development environment (IDE) displayed on a screen of a separate client device such that the decrypted portion displayed on the lens within the pair of AR glasses appears to be displayed on the screen of the separate client device.
12. The computer program product ofclaim 11, wherein the program instructions are further configured to cause the processor to obscure the decrypted portion in response to detecting that the lens within the pair of AR glasses is turned away from the screen of the separate client device.
13. A system for selective obfuscation of code segments, the system comprising:
a pair of augmented reality (AR) glasses comprising:
a pair of lenses; and
a processor communicatively coupled to the pair of lenses and configured to:
decrypt a portion of the encrypted code based on user login credentials associated with a user authorization level, wherein the encrypted code is organized into a plurality of code authorization levels and the decrypted portion corresponds to one or more of the plurality of code authorization levels that are at or below the user authorization level;
direct the pair of lenses to display the decrypted portion; receive a command to modify a part of the decrypted portion;
modify the part of the decrypted portion based on the received command;
change a code authorization level corresponding to the modified part of the decrypted portion based on the modification; and
update the display of the decrypted portion on the pair of lenses based on the change to the code authorization level corresponding to the modified part of the decrypted portion.
14. The system ofclaim 13, wherein the pair of AR glasses further comprise a human interface device configured to receive the user login credentials through user-interaction with the human interface device.
15. The system ofclaim 13, wherein the processor is further configured to update the display of the decrypted portion by displaying the modified part of the decrypted portion with a note indicating that the code authorization level corresponding to the modified part changed and a reason why the code authorization level corresponding to the modified part changed.
16. The system ofclaim 13, wherein the processor is configured to decrypt only code corresponding to a subset of the plurality of code authorization levels.
17. The system ofclaim 13, wherein the processor is further configured to virtually attach the displayed decrypted portion to an integrated development environment (IDE) displayed on a screen of a separate client device such that the decrypted portion displayed on the pair of lenses appears to be displayed on the screen of the separate client device.
18. The computer program product ofclaim 17, wherein the processor is further configured to direct the pair of lenses to obscure the decrypted portion in response to detecting that the pair of lenses are turned away from the screen of the separate client device.
US16/571,6282016-03-302019-09-16Tiered code obfuscation in a development environmentAbandonedUS20200026826A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US16/571,628US20200026826A1 (en)2016-03-302019-09-16Tiered code obfuscation in a development environment

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US15/085,070US10452821B2 (en)2016-03-302016-03-30Tiered code obfuscation in a development environment
US16/571,628US20200026826A1 (en)2016-03-302019-09-16Tiered code obfuscation in a development environment

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US15/085,070ContinuationUS10452821B2 (en)2016-03-302016-03-30Tiered code obfuscation in a development environment

Publications (1)

Publication NumberPublication Date
US20200026826A1true US20200026826A1 (en)2020-01-23

Family

ID=59961052

Family Applications (3)

Application NumberTitlePriority DateFiling Date
US15/085,070Expired - Fee RelatedUS10452821B2 (en)2016-03-302016-03-30Tiered code obfuscation in a development environment
US15/671,676Expired - Fee RelatedUS10042988B2 (en)2016-03-302017-08-08Tiered code obfuscation in a development environment
US16/571,628AbandonedUS20200026826A1 (en)2016-03-302019-09-16Tiered code obfuscation in a development environment

Family Applications Before (2)

Application NumberTitlePriority DateFiling Date
US15/085,070Expired - Fee RelatedUS10452821B2 (en)2016-03-302016-03-30Tiered code obfuscation in a development environment
US15/671,676Expired - Fee RelatedUS10042988B2 (en)2016-03-302017-08-08Tiered code obfuscation in a development environment

Country Status (1)

CountryLink
US (3)US10452821B2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20240086502A1 (en)*2022-09-132024-03-14Arm LimitedMethods of controlling permission on a device

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10452821B2 (en)2016-03-302019-10-22International Business Machines CorporationTiered code obfuscation in a development environment
US10551993B1 (en)*2016-05-152020-02-04Google LlcVirtual reality content development environment
US10586025B2 (en)*2017-09-072020-03-10Salesforce.Com, Inc.Managing the display of hidden proprietary software code to authorized licensed users
US10893043B1 (en)2018-09-122021-01-12Massachusetts Mutual Life Insurance CompanySystems and methods for secure display of data on computing devices
US11042649B1 (en)2018-09-122021-06-22Massachusetts Mutual Life Insurance CompanySystems and methods for secure display of data on computing devices
US11227060B1 (en)2018-09-122022-01-18Massachusetts Mutual Life Insurance CompanySystems and methods for secure display of data on computing devices
US11122079B1 (en)*2019-04-082021-09-14Architecture Technology CorporationObfuscation for high-performance computing systems
US11165557B2 (en)*2019-06-192021-11-02Facebook Technologies, LlcEncryption engine having randomized round scheduling to prevent side channel attacks
WO2021217001A1 (en)*2020-04-232021-10-28Magic Leap, Inc.Processing secure content on a virtual reality system
US12008363B1 (en)*2021-07-142024-06-11International Business Machines CorporationDelivering portions of source code based on a stacked-layer framework
US20230041437A1 (en)*2021-08-042023-02-09Bank Of America CorporationSystem for end-to-end electronic data encryption using an intelligent homomorphic encryped privacy screen
WO2023173908A1 (en)*2022-03-172023-09-21华为云计算技术有限公司Method, apparatus and system for accessing file, and storage medium
US20240176596A1 (en)*2022-11-302024-05-30International Business Machines CorporationVirtual-reality-based software development

Citations (12)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20050204008A1 (en)*2004-03-092005-09-15Marc ShinbroodSystem and method for controlling the downstream preservation and destruction of electronic mail
US20070030528A1 (en)*2005-07-292007-02-08Cataphora, Inc.Method and apparatus to provide a unified redaction system
US20100313239A1 (en)*2009-06-092010-12-09International Business Machines CorporationAutomated access control for rendered output
US8707190B2 (en)*2005-09-152014-04-22The Mathworks, Inc.Locked element for use in a graphical modeling environment
US8867741B2 (en)*2012-04-132014-10-21Xerox CorporationMobile field level encryption of private documents
WO2014206795A1 (en)*2013-06-282014-12-31Koninklijke Philips N.V.System for managing access to medical data
US20150134648A1 (en)*2013-11-122015-05-14International Business Machines CorporationUser-specific search over protected contextual data
WO2016000015A1 (en)*2014-07-022016-01-07Document Corporation Ip Unit TrustMethod and system for selective document redaction
US20160202832A1 (en)*2014-01-132016-07-14Huawei Device Co., Ltd.Method for controlling multiple touchscreens and electronic device
US20160337508A1 (en)*2015-05-152016-11-17Honeywell International Inc.Access control via a mobile device
US20160378999A1 (en)*2015-06-242016-12-29Airwatch LlcDynamic content redaction
US9990474B2 (en)*2016-03-162018-06-05Konica Minolta Laboratory U.S.A., Inc.Access control for selected document contents using document layers and access key sequence

Family Cites Families (22)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6978367B1 (en)*1999-10-212005-12-20International Business Machines CorporationSelective data encryption using style sheet processing for decryption by a client proxy
US7454744B2 (en)*2003-07-032008-11-18International Business Machines CorporationPrivate source code commenting
WO2007020591A2 (en)2005-08-152007-02-22Koninklijke Philips Electronics N.V.System, apparatus, and method for augmented reality glasses for end-user programming
US20070247392A1 (en)2006-04-212007-10-25International Business Machines CorporationMethod for displaying private/secure data
US20090025063A1 (en)2007-07-182009-01-22Novell, Inc.Role-based access control for redacted content
US8689352B2 (en)*2008-12-182014-04-01Sap AgDistributed access control for document centric collaborations
US8430310B1 (en)*2011-05-242013-04-30Google Inc.Wireless directional identification and verification using wearable electronic devices
US8886942B2 (en)2012-12-072014-11-11At&T Intellectual Property I, L.P.Augmented reality based privacy and decryption
US20140173759A1 (en)2012-12-172014-06-19Microsoft CorporationRights-managed code
EP2972561A1 (en)2013-03-152016-01-20Huntington Ingalls IncorporatedSystem and method for providing secure data for display using augmented reality
US9396310B2 (en)2013-07-152016-07-19At&T Intellectual Property I, L.P.Method and apparatus for providing secure image encryption and decryption
US9274756B1 (en)*2013-12-112016-03-01Google Inc.System to visualize additional information on source code
US9137232B2 (en)2014-01-142015-09-15Xerox CorporationMethod and system for controlling access to document data using augmented reality marker
US20160035233A1 (en)2014-07-312016-02-04David B. BreedSecure Testing System and Method
GB2530685A (en)2014-04-232016-03-30Intralinks IncSystems and methods of secure data exchange
US10540907B2 (en)2014-07-312020-01-21Intelligent Technologies International, Inc.Biometric identification headpiece system for test taking
US9767585B1 (en)2014-09-232017-09-19Wells Fargo Bank, N.A.Augmented reality confidential view
WO2016074802A1 (en)2014-11-142016-05-19Telefonaktiebolaget L M Ericsson (Publ)Visual cryptography and obfuscation using augmented reality
US20170091490A1 (en)2015-09-242017-03-30Lunatech, LlcMethods And Systems For Displaying Private Information
US10097557B2 (en)2015-10-012018-10-09Lam Research CorporationVirtual collaboration systems and methods
WO2017066318A1 (en)2015-10-122017-04-20Renesas Electronics America Inc.Secure code delivery
US10452821B2 (en)2016-03-302019-10-22International Business Machines CorporationTiered code obfuscation in a development environment

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20050204008A1 (en)*2004-03-092005-09-15Marc ShinbroodSystem and method for controlling the downstream preservation and destruction of electronic mail
US20070030528A1 (en)*2005-07-292007-02-08Cataphora, Inc.Method and apparatus to provide a unified redaction system
US8707190B2 (en)*2005-09-152014-04-22The Mathworks, Inc.Locked element for use in a graphical modeling environment
US20100313239A1 (en)*2009-06-092010-12-09International Business Machines CorporationAutomated access control for rendered output
US8867741B2 (en)*2012-04-132014-10-21Xerox CorporationMobile field level encryption of private documents
WO2014206795A1 (en)*2013-06-282014-12-31Koninklijke Philips N.V.System for managing access to medical data
US20150134648A1 (en)*2013-11-122015-05-14International Business Machines CorporationUser-specific search over protected contextual data
US20160202832A1 (en)*2014-01-132016-07-14Huawei Device Co., Ltd.Method for controlling multiple touchscreens and electronic device
WO2016000015A1 (en)*2014-07-022016-01-07Document Corporation Ip Unit TrustMethod and system for selective document redaction
US20160337508A1 (en)*2015-05-152016-11-17Honeywell International Inc.Access control via a mobile device
US20160378999A1 (en)*2015-06-242016-12-29Airwatch LlcDynamic content redaction
US9990474B2 (en)*2016-03-162018-06-05Konica Minolta Laboratory U.S.A., Inc.Access control for selected document contents using document layers and access key sequence

Cited By (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20240086502A1 (en)*2022-09-132024-03-14Arm LimitedMethods of controlling permission on a device
GB2624070A (en)*2022-09-132024-05-08Advanced Risc Mach LtdMethods of controlling permission on a device

Also Published As

Publication numberPublication date
US20170286650A1 (en)2017-10-05
US20170337359A1 (en)2017-11-23
US10042988B2 (en)2018-08-07
US10452821B2 (en)2019-10-22

Similar Documents

PublicationPublication DateTitle
US10042988B2 (en)Tiered code obfuscation in a development environment
US9880838B2 (en)Generating and managing applications using any number of different platforms
US10169570B2 (en)Cognitive password pattern checker to enforce stronger, unrepeatable passwords
US10169548B2 (en)Image obfuscation
US12124580B2 (en)HSM self-destruction in a hybrid cloud KMS solution
CN113544674B (en) Secure Execution Client Owner Control for Secure Interface Controls
US20160173502A1 (en)Jurisdictional cloud data access
US9736038B2 (en)Managing change in an information technology environment
US9710656B2 (en)Controlled delivery and assessing of security vulnerabilities
US20170005798A1 (en)Binding software application bundles to a physical execution medium
US11928250B2 (en)Securing visible data
US11580210B2 (en)Password authentication
US10085146B2 (en)Handling instant message delivery media to end user
US12309160B2 (en)Virtual reality enabled internet-of-things device resolution
US12008363B1 (en)Delivering portions of source code based on a stacked-layer framework
HK40057234A (en)Secure execution guest owner controls for secure interface control

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW YORK

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HOOK, JAMES K.;HUNT, HAMISH C.;LINCOLN, NICHOLAS K.;SIGNING DATES FROM 20160324 TO 20160329;REEL/FRAME:050385/0318

STPPInformation on status: patent application and granting procedure in general

Free format text:APPLICATION DISPATCHED FROM PREEXAM, NOT YET DOCKETED

STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPPInformation on status: patent application and granting procedure in general

Free format text:FINAL REJECTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER

STPPInformation on status: patent application and granting procedure in general

Free format text:ADVISORY ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:FINAL REJECTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:ADVISORY ACTION MAILED

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp