US7331062B2
(en)
*
|
2002-08-30 |
2008-02-12 |
Symantec Corporation |
Method, computer software, and system for providing end to end security protection of an online transaction
|
FR2857473B1
(fr)
*
|
2003-07-11 |
2005-09-16 |
Oberthur Card Syst Sa |
Procede de securisation de l'execution d'un programme informatique, notamment dans une carte a microcircuit
|
US8832842B1
(en)
*
|
2003-10-07 |
2014-09-09 |
Oracle America, Inc. |
Storage area network external security device
|
US7350079B2
(en)
|
2003-11-20 |
2008-03-25 |
International Business Machines Corporation |
Apparatus and method for inter-program authentication using dynamically-generated public/private key pairs
|
US7376970B2
(en)
*
|
2004-02-20 |
2008-05-20 |
Microsoft Corporation |
System and method for proactive computer virus protection
|
US20050223993A1
(en)
*
|
2004-04-08 |
2005-10-13 |
Blomiley Eric R |
Deposition apparatuses; methods for assessing alignments of substrates within deposition apparatuses; and methods for assessing thicknesses of deposited layers within deposition apparatuses
|
US8219811B2
(en)
*
|
2004-09-21 |
2012-07-10 |
Nuance Communications, Inc. |
Secure software execution such as for use with a cell phone or mobile device
|
US8015595B2
(en)
*
|
2004-09-23 |
2011-09-06 |
Igt |
Methods and apparatus for negotiating communications within a gaming network
|
US8156488B2
(en)
|
2004-10-20 |
2012-04-10 |
Nokia Corporation |
Terminal, method and computer program product for validating a software application
|
JP2008520030A
(ja)
*
|
2004-11-12 |
2008-06-12 |
ディスクレティックス・テクノロジーズ・リミテッド |
データを安全に記憶する方法、デバイス、及びシステム
|
US7827608B2
(en)
*
|
2005-02-08 |
2010-11-02 |
International Business Machines Corporation |
Data leak protection system, method and apparatus
|
US20060195689A1
(en)
*
|
2005-02-28 |
2006-08-31 |
Carsten Blecken |
Authenticated and confidential communication between software components executing in un-trusted environments
|
US20060236100A1
(en)
*
|
2005-04-19 |
2006-10-19 |
Guruprasad Baskaran |
System and method for enhanced layer of security to protect a file system from malicious programs
|
US8015415B1
(en)
*
|
2005-05-31 |
2011-09-06 |
Adobe Systems Incorporated |
Form count licensing
|
WO2006133222A2
(en)
*
|
2005-06-07 |
2006-12-14 |
Vmware, Inc. |
Constraint injection system for immunizing software programs against vulnerabilities and attacks
|
US7895651B2
(en)
|
2005-07-29 |
2011-02-22 |
Bit 9, Inc. |
Content tracking in a network security system
|
US8984636B2
(en)
|
2005-07-29 |
2015-03-17 |
Bit9, Inc. |
Content extractor and analysis system
|
US8272058B2
(en)
|
2005-07-29 |
2012-09-18 |
Bit 9, Inc. |
Centralized timed analysis in a network security system
|
DE602005002652T2
(de)
*
|
2005-08-05 |
2008-07-10 |
Sap Ag |
System und Verfahren für das Erneuern von Schlüsseln, welche in Public-Key Kryptographie genutzt werden
|
US7647636B2
(en)
*
|
2005-08-24 |
2010-01-12 |
Microsoft Corporation |
Generic RootKit detector
|
US8219829B2
(en)
*
|
2005-12-08 |
2012-07-10 |
Intel Corporation |
Scheme for securing locally generated data with authenticated write operations
|
WO2007089786A2
(en)
*
|
2006-01-30 |
2007-08-09 |
Sudhakar Govindavajhala |
Identifying unauthorized privilege escalations
|
US8510596B1
(en)
|
2006-02-09 |
2013-08-13 |
Virsec Systems, Inc. |
System and methods for run time detection and correction of memory corruption
|
US8443354B1
(en)
*
|
2006-03-29 |
2013-05-14 |
Symantec Corporation |
Detecting new or modified portions of code
|
US20080034350A1
(en)
*
|
2006-04-05 |
2008-02-07 |
Conti Gregory R |
System and Method for Checking the Integrity of Computer Program Code
|
US20080022378A1
(en)
*
|
2006-06-21 |
2008-01-24 |
Rolf Repasi |
Restricting malicious libraries
|
WO2008001322A2
(en)
*
|
2006-06-30 |
2008-01-03 |
International Business Machines Corporation |
Message handling at a mobile device
|
US8010995B2
(en)
|
2006-09-08 |
2011-08-30 |
International Business Machines Corporation |
Methods, systems, and computer program products for implementing inter-process integrity serialization
|
WO2008042989A2
(en)
*
|
2006-10-03 |
2008-04-10 |
Snapin Software Inc. |
Systems and methods for storing or performing functions within removable memory
|
US20080134321A1
(en)
*
|
2006-12-05 |
2008-06-05 |
Priya Rajagopal |
Tamper-resistant method and apparatus for verification and measurement of host agent dynamic data updates
|
US8126506B2
(en)
*
|
2007-02-14 |
2012-02-28 |
Nuance Communications, Inc. |
System and method for securely managing data stored on mobile devices, such as enterprise mobility data
|
US8375219B2
(en)
*
|
2007-10-24 |
2013-02-12 |
Microsoft Corporation |
Program and operation verification
|
US8250475B2
(en)
*
|
2007-12-14 |
2012-08-21 |
International Business Machines Corporation |
Managing icon integrity
|
JP5050893B2
(ja)
*
|
2008-02-08 |
2012-10-17 |
大日本印刷株式会社 |
Icカードへの攻撃検知方法、icカードおよびicカード用プログラム
|
US7921195B2
(en)
*
|
2008-06-09 |
2011-04-05 |
International Business Machines Corporation |
Optimizing service processing based on business information, operational intelligence, and self-learning
|
DE102008046639B4
(de)
|
2008-09-09 |
2011-02-24 |
Adrian Dr. Spalka |
Verfahren zur Bereitstellung mindestens einer Leistung über ein Serversystem
|
JP5255991B2
(ja)
*
|
2008-10-24 |
2013-08-07 |
株式会社日立製作所 |
情報処理装置、及びコンピュータプログラム
|
EP2278514B1
(de)
*
|
2009-07-16 |
2018-05-30 |
Alcatel Lucent |
System und Verfahren zur Bereitstellung von sicheren virtuellen Maschinen
|
KR101047884B1
(ko)
*
|
2009-08-11 |
2011-07-08 |
주식회사 안철수연구소 |
가상 환경을 이용한 데이터 보호 방법과 장치 및 이 방법을 수행하는 프로그램이 기록된 컴퓨터로 읽을 수 있는 기록매체
|
JP5440053B2
(ja)
*
|
2009-09-14 |
2014-03-12 |
ソニー株式会社 |
情報処理装置及び情報処理方法、並びにコンピューター・プログラム
|
KR101089157B1
(ko)
*
|
2010-03-05 |
2011-12-02 |
주식회사 안철수연구소 |
클라이언트 가상화를 이용한 서버의 논리적 망분리 시스템 및 방법
|
US9098333B1
(en)
|
2010-05-07 |
2015-08-04 |
Ziften Technologies, Inc. |
Monitoring computer process resource usage
|
US8782435B1
(en)
|
2010-07-15 |
2014-07-15 |
The Research Foundation For The State University Of New York |
System and method for validating program execution at run-time using control flow signatures
|
RU2449348C1
(ru)
*
|
2010-11-01 |
2012-04-27 |
Закрытое акционерное общество "Лаборатория Касперского" |
Система и способ для антивирусной проверки на стороне сервера скачиваемых из сети данных
|
US20130061328A1
(en)
*
|
2011-09-06 |
2013-03-07 |
Broadcom Corporation |
Integrity checking system
|
KR101295428B1
(ko)
*
|
2011-09-09 |
2013-08-23 |
주식회사 팬택 |
스마트 단말기에서 어플리케이션의 권한정보 관리 장치 및 제어 방법
|
JP5964077B2
(ja)
|
2012-02-27 |
2016-08-03 |
三菱重工業株式会社 |
制御プログラム管理システム、及び制御プログラムの変更方法
|
US8938796B2
(en)
|
2012-09-20 |
2015-01-20 |
Paul Case, SR. |
Case secure computer architecture
|
DE102013201937A1
(de)
*
|
2013-02-06 |
2014-08-07 |
Areva Gmbh |
Vorrichtung und Verfahren zur Erkennung von unbefugten Manipulationen des Systemzustandes einer Steuer- und Regeleinheit einer kerntechnischen Anlage
|
US20160055331A1
(en)
*
|
2013-03-28 |
2016-02-25 |
Irdeto B.V. |
Detecting exploits against software applications
|
KR102368170B1
(ko)
|
2013-09-12 |
2022-02-25 |
버섹 시스템즈, 인코포레이션 |
멀웨어의 자동화된 런타임 검출
|
CN107077412B
(zh)
|
2014-06-24 |
2022-04-08 |
弗塞克系统公司 |
单层或n层应用的自动化根本原因分析
|
US10354074B2
(en)
|
2014-06-24 |
2019-07-16 |
Virsec Systems, Inc. |
System and methods for automated detection of input and output validation and resource management vulnerability
|
ES2905268T3
(es)
|
2014-07-30 |
2022-04-07 |
Siemens Ag |
Protección de un componente de automatización contra manipulaciones de programa mediante coincidencia de firmas
|
US9398019B2
(en)
*
|
2014-08-07 |
2016-07-19 |
Vmware, Inc. |
Verifying caller authorization using secret data embedded in code
|
US9411979B2
(en)
|
2014-08-07 |
2016-08-09 |
Vmware, Inc. |
Embedding secret data in code
|
US10922402B2
(en)
|
2014-09-29 |
2021-02-16 |
Vmware, Inc. |
Securing secret data embedded in code against compromised interrupt and exception handlers
|
US9449189B1
(en)
|
2015-11-03 |
2016-09-20 |
International Business Machines Corporation |
Protection of state data in computer system code
|
US11409870B2
(en)
|
2016-06-16 |
2022-08-09 |
Virsec Systems, Inc. |
Systems and methods for remediating memory corruption in a computer application
|
DE102016219848A1
(de)
*
|
2016-10-12 |
2018-04-12 |
Siemens Aktiengesellschaft |
Verfahren und Vorrichtung zum Bereitstellen einer gesicherten Kommunikation innerhalb eines echtzeitfähigen Kommunikationsnetzwerkes
|
WO2020010515A1
(en)
*
|
2018-07-10 |
2020-01-16 |
Apple Inc. |
Identity-based message integrity protection and verification for wireless communication
|
JP7105640B2
(ja)
|
2018-07-10 |
2022-07-25 |
キヤノン株式会社 |
画像処理装置、その制御方法、及びプログラム
|
JP7283551B2
(ja)
*
|
2019-09-27 |
2023-05-30 |
日本電気株式会社 |
ホワイトリスト生成装置、ホワイトリスト生成方法、及び、ホワイトリスト生成プログラム
|
WO2022140400A1
(en)
*
|
2020-12-22 |
2022-06-30 |
Protectedby.Ai, Inc. |
System and method for securing computer code using dynamically generated digital signatures
|
CA3210145A1
(en)
*
|
2021-03-19 |
2022-09-22 |
Zachary Nathan Fister |
Security device computation matching
|
CN113886862B
(zh)
*
|
2021-12-06 |
2022-04-15 |
粤港澳大湾区数字经济研究院(福田) |
一种可信计算系统及基于可信计算系统的资源处理方法
|