$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Computer software authentication, protection, and security system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-012/14
출원번호 US-0679077 (1996-07-12)
우선권정보 AU-0009866 (1996-05-15)
발명자 / 주소
  • Drake Christopher Nathan,AUX
출원인 / 주소
  • Drake
  • Christopher N., GBX
대리인 / 주소
    Albert
인용정보 피인용 횟수 : 431  인용 특허 : 10

초록

A software-based computer security enhancing process and graphical software-authenticity method, and a method to apply aspects of the two are disclosed. The process provides protection against certain attacks on executable software by persons or other software used on the computer. Software using th

대표청구항

[ I claim:] [2.] A method of altering an original executable program to form an altered executable program having increased security, said method comprising the steps of:(a) inserting obfuscating code into a first number of predetermined areas of said executable program; and,(b) encrypting portions

이 특허에 인용된 특허 (10)

  1. Houser Peter B. (Poway CA) Adler James M. (Ocean Beach CA), Electronic document verification system and method.
  2. Krajewski ; Jr. Marjan (Acton MA) Chipchak John C. (Dracut MA) Chodorow David A. (Groton MA) Trostle Jonathan T. (Lexington MA) Baldwin Peter T. (Rowley MA), Electronic information network user authentication and authorization system.
  3. Moore James W. (Potomac MD), Hybrid encryption method and system for protecting reusable software components.
  4. Colvill Robert H. (Surrey GB2) Lowther Derek R (Hampshire GB2) Shenton Colin N. (Surrey GB2) Shillito Robert T. (Somerset GB2) Trinder Rosemary (Suffolk GB2) Wallis Andrew F. (Bath GB2), Image handling facilitating computer aided design and manufacture of documents.
  5. Ozzie Raymond E. (Manchester by the Sea MA) Patey Eric M. (Rockport MA) Kaufman Charles W. (Northboro MA) Beckhardt Steven R. (Nashua NH), Method and apparatus for establishing a protected channel between a user and a computer system.
  6. Shamir Adi (Rehovot ILX), Method and apparatus for protecting visual information with printed cryptographic watermarks.
  7. Rubin Robert J. (Richardson TX), Systems and methods for protecting software from unlicensed copying and use.
  8. Hoffman Ned (Berkeley CA) Pare ; Jr. David F. (Berkeley CA) Lee Jonathan A. (Berkeley CA), Tokenless identification system for authorization of electronic transactions and electronic transmissions.
  9. Johri Abhai (Gaithersburg MD) Luckenbaugh Gary L. (Gaithersburg MD), Trusted path mechanism for an operating system.
  10. Carson Mark E. (Rockville MD) Johri Abhai (Gaithersburg MD), Trusted path mechanism for virtual terminal environments.

이 특허를 인용한 특허 (431)

  1. Nam, Choong-Hee, Anti keylog editor of activex base.
  2. Sabella, Vito; Khoo, Aaron; Gu, Chao, Anti-debugger comprising spatially and temporally separate detection and response portions.
  3. Goldsmid, Aaron Payne; Ben-Zvi, Nir; Chintalapati, Sekhar P.; Dhillon, Karan Singh; Ide, Nathan; Linsley, David John; Xie, Ping, Anti-debugging protection of binaries with proxy code execution.
  4. Koji Takeda JP; Kazuo Saito JP; Kenichiro Kigo JP, Apparatus and method for data capsule generation.
  5. Henry, G. Glenn; Crispin, Thomas A.; Elliott, Timothy A.; Parks, Terry, Apparatus and method for generating a cryptographic key schedule in a microprocessor.
  6. Crispin, Thomas A.; Henry, G. Glenn; Martin de Nicolas, Arturo; Parks, Terry, Apparatus and method for performing transparent block cipher cryptographic functions.
  7. Henry, G. Glenn; Crispin, Thomas A.; Parks, Terry, Apparatus and method for performing transparent cipher block chaining mode cryptographic functions.
  8. Henry, G. Glenn; Crispin, Thomas A.; Parks, Terry, Apparatus and method for performing transparent cipher feedback mode cryptographic functions.
  9. Henry, G. Glenn; Crispin, Thomas A.; Parks, Terry, Apparatus and method for performing transparent output feedback mode cryptographic functions.
  10. Henry, G. Glenn; Crispin, Thomas A.; Parks, Terry, Apparatus and method for providing user-generated key schedule in a microprocessor cryptographic engine.
  11. Yi, Jeong Hyun; Jung, Jin Hyuk, Apparatus for tamper protection of application code based on self modification and method thereof.
  12. Rindborg,Tom; Hal��n,Joacim, Arrangement and method of execution of code.
  13. Sallam, Ahmed Said, Atomic detection and repair of kernel memory.
  14. Sallam, Ahmed Said, Atomic detection and repair of kernel memory.
  15. Hall, Robert J., Augmented reality gaming via geographic messaging.
  16. Hall, Robert J., Augmented reality gaming via geographic messaging.
  17. Luo,Chenghui; Zhao,Jian, Authenticating executable code and executions thereof.
  18. Durst, David I.; Kaish, Norman; Fraser, Jay, Authentication method and system.
  19. Fraser, Jay, Authentication method and system.
  20. Fraser, Jay; Weber, Lawrence, Authentication method and system.
  21. Goldsmid, Aaron; Xie, Ping; Miller, Scott; Zvi, Nir Ben; Ide, Nathan Jeffrey; Mehta, Manoj R., Authentication of binaries in memory with proxy code execution.
  22. Labrou, Yannis; Agre, Jonathan Russell, Authentication services using mobile device.
  23. Debrito, Daniel N., Authorization method.
  24. Vasishth, Karan; Hunter, Kimberley Ann; Brown, Laurie A.; Lawrence, Mark David; Leibmann, Matthias; Beaulieu, Michelle, Automated policy change alert in a distributed enterprise.
  25. Archer, Myla M.; Heitmeyer, Constance L.; Leonard, Elizabeth I.; Gasarch, Carolyn B.; Ding, Wei, Automated tools for building secure software programs.
  26. Lamkin,Allan B.; Blair,Jeff G.; Collart,Todd R., BCA writer serialization management.
  27. Agarwala, Manisha; Swoboda, Gary L., Behavior of trace in non-emulatable code.
  28. Moritz, Elan, Biometric data collection and storage system.
  29. Praca,Denis, Biometric identification method, portable electronic device and electronic device acquiring biometric data therefor.
  30. Karthik, Kaleedhass, Biometric verification for electronic transactions over the web.
  31. Tabuchi Daisuke,JPX ; Shoji Wataru,JPX ; Nakajima Ichiro,JPX, Bossless architecture and digital cell technology for computer programs.
  32. Greschler, David M.; Mysliwy, Owen; Schaefer, Stuart, Business method and system for serving third party software applications.
  33. Naumovich,Gleb; Yalcin,Ezgi; Memon,Nasir D.; Yu,Hong Heather; Sosonkin,Mikhail, Class coalescence for obfuscation of object-oriented software.
  34. Call, Justin, Client/server security by an intermediary rendering modified in-memory objects.
  35. Call, Justin, Client/server security by an intermediary rendering modified in-memory objects.
  36. Stiemens, Alan Walter; Gray, Martin Clive; Sulley, Christopher Edward, Code obfuscation and controlling a processor by emulation.
  37. Teng, Harry H.; Jo, Sung-Chan, Compact optical fingerprint capturing and recognition system.
  38. Colvin, David S., Computer readable storage medium for providing repeated contact with software end-user.
  39. Colvin, David S., Computer readable storage medium for securing software to reduce unauthorized use.
  40. Saunier, Louisa, Computer security method and computer system.
  41. Wiseman,Simon Robert, Computer system protection.
  42. Hasegawa, Eiji; Sakamoto, Takuya, Computer system, central unit, and program execution method.
  43. Gadea, Ivan; Torrubia, Andres M., Computer-implemented method and system for binding digital rights management executable code to a software application.
  44. Torrubia, Andres M.; Roman, Miguel A.; Gadea, Ivan; Sanchez, Pau, Computer-implemented method and system for binding digital rights management executable code to a software application.
  45. Glew, Andrew F.; Gerrity, Daniel A.; Tegreene, Clarence T., Conditional security response using taint vector monitoring.
  46. Tokunaga,Keiichiro, Content data processing system, electronic device apparatus, and server device.
  47. Saito, Makoto, Controlling database copyrights.
  48. Saito, Makoto, Controlling database copyrights.
  49. Saito, Makoto, Controlling database copyrights.
  50. Collart,Todd, Controlling playback of content stored on a portable storage medium.
  51. Reynolds, Mark L., Creating, verifying, managing, and using original digital files.
  52. Saito, Makoto, Data copyright management.
  53. Saito, Makoto, Data copyright management.
  54. Saito, Makoto, Data copyright management system.
  55. Saito,Makoto, Data copyright management system.
  56. Clayton, Ray; Mendoza, Eliel J.; Cochran, Ronn Warren, Data encryption system and method.
  57. Glew, Andrew F.; Gerrity, Daniel A.; Tegreene, Clarence T., Data handling apparatus adapted for scheduling operations according to resource allocation based on entitlement.
  58. Saito, Makoto, Data management.
  59. Saito, Makoto, Data management system.
  60. Saito, Makoto, Data management system.
  61. Saito, Makoto, Data management system.
  62. Ferren, Bran; Jung, Edward K. Y., Data recovery systems.
  63. Ferren, Bran; Jung, Edward K. Y., Data retrieval methods.
  64. Ferren, Bran; Jung, Edward K. Y., Data retrieval systems.
  65. Ferren, Bran; Jung, Edward K. Y., Data retrieval systems.
  66. Polychronakis, Michalis; Keromytis, Angelos D., Detecting return-oriented programming payloads by evaluating data for a gadget address space address and determining whether operations associated with instructions beginning at the address indicate a return-oriented programming payload.
  67. Tripp, Omer, Detecting security vulnerabilities relating to cryptographically-sensitive information carriers when testing computer software.
  68. Austin, David M.; Austin, Wesley L., Detection of observer programs and countermeasures against observer programs.
  69. Austin, Wesley L.; Austin, David M., Detection of observers and countermeasures against observers.
  70. Lewis James R., Determining theft of grammar code.
  71. Trimberger, Stephen M., Deterring reverse engineering.
  72. Amschler, Harald; Gammel, Berndt, Device and method for a secure execution of a program.
  73. Saito, Makoto, Digital content management system and apparatus.
  74. Saito, Makoto, Digital content management system and apparatus.
  75. Saito, Makoto, Digital content management system and apparatus.
  76. Boesgaard Soerensen, Hans Martin, Digital data authentication.
  77. Boesgaard Sørensen, Hans Martin, Digital data authentication.
  78. Safa,John Aram, Digital data protection arrangement.
  79. Suzuki,Yoiti; Nishimura,Ryouichi, Digital watermark system.
  80. Feng, Hsiang-an, Disabling execution of malware having a self-defense mechanism.
  81. Averbuch, Aaron H; Mishra, Manav; Franco, Roberto A.; Sharif, Tariq, Dynamically protecting against web resources associated with undesirable activities.
  82. Harjanto, Dono, Electronic mail sender verification.
  83. Wang, Ynjiun P.; Ding, Joshua C.; Grizzard, James A., Electronic transaction systems and methods therefor.
  84. Wang, Ynjiun P.; Ding, Joshua C.; Grizzard, James A., Electronic transaction systems and methods therefor.
  85. Wang, Ynjiun P.; Ding, Joshua C.; Grizzard, James A., Electronic transaction systems utilizing a PEAD and a private key.
  86. Wang, Xinran; Zhao, Yao, Encoding of sensitive data.
  87. Wang, Xinran; Zhao, Yao, Encoding of sensitive data.
  88. Grupe,Robert, Encrypted data file transmission.
  89. Glew, Andrew F.; Gerrity, Daniel A.; Tegreene, Casey T., Encrypted memory.
  90. Chheda, Saurabh; Carver, Kristopher; Ashok, Raksit, Energy-focused compiler-assisted branch prediction.
  91. Chheda, Saurabh; Carver, Kristopher; Ashok, Raksit, Energy-focused compiler-assisted branch prediction.
  92. Chheda, Saurabh; Carver, Kristopher; Ashok, Raksit, Energy-focused compiler-assisted branch prediction.
  93. Chheda, Saurabh; Carver, Kristopher; Ashok, Raksit, Energy-focused re-compilation of executables and hardware mechanisms based on compiler-architecture interaction and compiler-inserted control.
  94. Chheda, Saurabh; Carver, Kristopher; Ashok, Raksit, Energy-focused re-compilation of executables and hardware mechanisms based on compiler-architecture interaction and compiler-inserted control.
  95. Tracy,Richard P.; Barrett,Hugh; Berman,Lon J.; Catlin,Gary M.; Dimtsios,Thomas G., Enhanced system, method and medium for certifying and accrediting requirements compliance.
  96. Tracy, Richard P.; Barrett, Hugh; Catlin, Gary M., Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing continuous risk assessment.
  97. Tracy,Richard P.; Barrett,Hugh; Catlin,Gary M., Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing robust risk assessment model.
  98. Glew, Andrew F.; Gerrity, Daniel A.; Tegreene, Clarence T., Entitlement vector for library usage in managing resource allocation and scheduling based on usage and priority.
  99. Glew, Andrew F.; Gerrity, Daniel A.; Tegreene, Clarence T., Entitlement vector for library usage in managing resource allocation and scheduling based on usage and priority.
  100. Glew, Andrew F.; Gerrity, Daniel A.; Tegreene, Clarence T., Entitlement vector for managing resource allocation.
  101. Glew, Andrew F.; Gerrity, Daniel A.; Tegreene, Clarence T., Fine-grained security in federated data sets.
  102. Hatlelid, Kristjan E., First computer process and second computer process proxy-executing code from third computer process on behalf of first process.
  103. Lilikov, Andrey; Rule, Donald H.; Hatlelid, Kristjan E.; Zvi, Nir Ben, First computer process and second computer process proxy-executing code on behalf of first process.
  104. Lilikov, Andrey; Rule, Donald H.; Hatlelid, Kristjan E.; Zvi, Nir Ben, First computer process and second computer process proxy-executing code on behalf of first process.
  105. Lelikov, Andrey; Gunyakti, Caglar; Hatlelid, Kristjan E., First computer process and second computer process proxy-executing code on behalf thereof.
  106. Ferren, Bran; Goodall, Eleanor V.; Jung, Edward K. Y., Fluid mediated disk activation and deactivation mechanisms.
  107. Ferren, Bran; Goodall, Eleanor V.; Jung, Edward K. Y., Fluid mediated disk activation and deactivation mechanisms.
  108. Labrou, Yannis; Ji, Lusheng; Agre, Jonathan Russell, Framework and system for purchasing of goods and services.
  109. Mates, John W., Generating a challenge response image including a recognizable image.
  110. Hall, Robert J., Geocast-based situation awareness.
  111. Hall, Robert J, Geographic advertising using a scalable wireless geocast protocol.
  112. Chang,Hoi; Atallah,Mikhail J.; Rice,John R., Guards for application in software tamperproofing.
  113. Cruzado,Edwin D.; Dalzell,William J.; Bernier,Brian R., Hardware key control of debug interface.
  114. Wu, Wei; Fortune, Erik; Bennett, Julie D; Chu, Frank Nian Tzu; El Gammal, Mohammed; Earnshaw, Simon D, Hardware protection.
  115. Teng, Harry H.; Jo, Sung-Chan, High contrast, low distortion optical acquisition system for image capturing.
  116. Godwin,Debbie Ann; Walters,Rodney Eldon, Host-based systematic attack detection tool.
  117. Florencio, Dinei A.; Herley, Cormac E., Image based shared secret proxy for secure password entry.
  118. Chu, Frank Nian Tzu; Wu, Wei; Bennett, Julie D.; El Gammal, Mohammed, Image verification.
  119. Hall, Robert J., Information acquisition using a scalable wireless geocast protocol.
  120. Suzuki, Koji, Information processing apparatus and computer readable medium for preventing unauthorized operation of a program.
  121. Felsher, David Paul, Information record infrastructure, system and method.
  122. Tucker, David; Crump, Matt A.; Witmann, Jerome, Information security method and system.
  123. Tucker,David; Crump,Matt A.; Witmann,Jerome, Information security method and system.
  124. Wu, Wei; Chu, Frank Nian Tzu; Fortune, Erik; Bennett, Julie D; El Gammal, Mohammed; Earnshaw, Simon D, Inhibiting software tampering.
  125. Cowie,Neil Andrew; Muttik,Igor Garrievich; Wolff,Daniel Joseph, Initiating execution of a computer program from an encrypted version of a computer program.
  126. Wu, Wei; Chu, Frank Nian Tzu; Bennett, Julie D; El Gammal, Mohammed; Earnshaw, Simon D; Suwanasuk, Rerkboon, Installation setup.
  127. Glew, Andrew F.; Gerrity, Daniel A.; Tegreene, Clarence T., Instruction set adapted for security risk monitoring.
  128. Jia,Zheng; Shen,Ji, Instruction/data protection employing derived obscuring instruction/data.
  129. Marr,Michael David, Intentional cascade failure.
  130. Zhou, Xiaoming; Hoover, Roger; Shekyan, Sergey; Call, Justin, Intercepting and supervising calls to transformed operations and objects.
  131. Zhou, Xiaoming; Hoover, Roger; Shekyan, Sergey; Call, Justin, Intercepting and supervising, in a runtime environment, calls to one or more objects in a web page.
  132. de Jong,Eduard K., Interleaved data and instruction streams for application program obfuscation.
  133. Tavor Onn,ILX ; Avraham Gila Ben,ILX ; Shevchenko Vadim,ILX, Internet credit card security.
  134. Flowers, John S.; Stracener, Thomas C., Interoperability of vulnerability and intrusion detection systems.
  135. Flowers,John S.; Stracener,Thomas C., Interoperability of vulnerability and intrusion detection systems.
  136. Flowers,John S.; Stracener,Thomas C., Interoperability of vulnerability and intrusion detection systems.
  137. Glew, Andrew F.; Gerrity, Daniel A.; Tegreene, Clarence T., Intrusion detection using taint accumulation.
  138. Rygaard, Christopher A., Jumping application security system.
  139. Hunt, Galen C.; Larus, James R.; Fähndrich, Manuel; Steensgaard, Bjarne; Tarditi, David R.; Zill, Brian, Kernel interface with categorized kernel objects.
  140. Shiomi,Kentaro; Motohara,Akira; Fujiwara,Makoto; Yokoyama,Toshiyuki; Fujimura,Katsuya, LSI design method and verification method.
  141. Ferren, Bran; Jung, Edward K. Y., Limited use data storing device.
  142. Ferren, Bran; Jung, Edward K. Y., Limited use data storing device.
  143. Ferren, Bran; Jung, Edward K. Y., Limited use data storing device.
  144. Ferren, Bran; Jung, Edward K. Y., Limited use memory device with associated information.
  145. Ferren, Bran; Jung, Edward K. Y., Limited use memory device with associated information.
  146. Hall, Robert J., Location-based mobile gaming application and method for implementing the same using a scalable tiered geocast protocol.
  147. Schneider, Jerome L., Malware management through kernel detection during a boot sequence.
  148. Vasishth, Karen; Hunter, Kimberley Ann; Brown, Laurie A.; Lawrence, Mark David; Leibmann, Matthias, Managing elevated rights on a network.
  149. Hodson, Orion; Gunawi, Haryadi; Hunt, Galen C., Master and subordinate operating system kernels for heterogeneous multiprocessor systems.
  150. Hall, Robert J.; Jamison, Richard Robert, Media distribution via a scalable ad hoc geographic protocol.
  151. Ferren, Bran; Jung, Edward K. Y., Memory device activation and deactivation.
  152. Iverson, Vaughn Scott; Richardson, John Whitley, Method and apparatus for authenticating information.
  153. Gasparini,Louis A; Gotlieb,Charles E, Method and apparatus for authentication of users and web sites.
  154. Schmeidler, Yonah; Atkins, Derek; Eichin, Mark W.; Rostcheck, David J., Method and apparatus for content protection in a secure content delivery system.
  155. Friedman,George; Starek,Robert Phillip; Murdock,Carlos A., Method and apparatus for packaging and transmitting data.
  156. Saito, Makoto, Method and apparatus for protecting digital data by double re-encryption.
  157. Gewickey,Greg; Collart,Todd, Method and apparatus for providing content-owner control in a networked device.
  158. Stoltz, Benjamin H.; Hanko, James G., Method and apparatus for remotely administered authentication and access control.
  159. Barron, Dwight L.; Neufeld, E David; Jones, Kevin M.; Bradshaw, Jonathan, Method and apparatus for removing homogeneity from execution environment of computing system.
  160. Colvin, David S., Method and apparatus for repeated contact of software end-user.
  161. Schmeidler, Yonah; Atkins, Derek; Eichin, Mark W.; Rostcheck, David J., Method and apparatus for secure content delivery over broadband access networks.
  162. Torrubia Saez,Andres, Method and apparatus for secure distribution of software.
  163. LeMay, Steven G.; Benbrahim, Jamal; Chen, Xuedong, Method and apparatus for software authentication.
  164. LeMay,Steven G.; Benbrahim,Jamal; Chen,Xuedong, Method and apparatus for software authentication.
  165. Jacobs, Stuart J.; Mannix, Jr., Francis Leo; Christoffel, Thomas William; Belgard, Scott Andrew, Method and apparatus for supporting cryptographic-related activities in a public key infrastructure.
  166. Jacobs,Stuart J.; Mannix, Jr.,Francis Leo; Christoffel,Thomas William; Belgard,Scott Andrew, Method and apparatus for supporting cryptographic-related activities in a public key infrastructure.
  167. Arnold,William C.; Chess,David M.; Morar,John F.; Segal,Alla; Whalley,Ian N.; White,Steve R., Method and apparatus for the automatic determination of potentially worm-like behavior of a program.
  168. Gorman, Steven D., Method and apparatus to reduce the risk of observation of program operation.
  169. Maliszewski,Richard L., Method and apparatus to test an instruction sequence.
  170. Kotler, Hilik; Suchowski, Ron Shay, Method and device for questioning a plurality of computerized devices.
  171. Suchowski, Ron Shay; Kotler, Hilik, Method and device for questioning a plurality of computerized devices.
  172. Suchowski, Ron Shay; Kotler, Hilik, Method and device for scanning a plurality of computerized devices connected to a network.
  173. Todd R. Collart, Method and program product for preventing unauthorized users from using the content of an electronic storage medium.
  174. McKeeth, James, Method and system for authenticating a user of a computer system.
  175. Flowers,John S.; Stracener,Thomas C., Method and system for detecting a vulnerability in a network.
  176. Ferren, Bran; Goodall, Eleanor V.; Jung, Edward K. Y., Method and system for fluid mediated disk activation and deactivation.
  177. Ferren, Bran; Goodall, Eleanor V.; Jung, Edward K. Y., Method and system for fluid mediated disk activation and deactivation.
  178. Ferren, Bran; Goodall, Eleanor V.; Jung, Edward K. Y., Method and system for fluid mediated disk activation and deactivation.
  179. Ferren, Bran; Goodall, Eleanor V.; Jung, Edward K. Y., Method and system for fluid mediated disk activation and deactivation.
  180. Ferren, Bran; Goodall, Eleanor V.; Jung, Edward K. Y., Method and system for fluid mediated disk activation and deactivation.
  181. Ferren, Bran; Goodall, Eleanor V.; Jung, Edward K. Y., Method and system for fluid mediated disk activation and deactivation.
  182. Ferren,Bran; Goodall,Eleanor V.; Jung,Edward K. Y., Method and system for fluid mediated disk activation and deactivation.
  183. Ganapathy Krishnan ; Scott Oyler, Method and system for injecting new code into existing application code.
  184. Joseph, Boby; Freed, Michael; Borella, Michael S., Method and system for network security capable of doing stronger encryption with authorized devices.
  185. Bahar,Reuben, Method and system for prevention of piracy of a given software application via a communications network.
  186. Samuelsson, Anders M. E.; Fakes, Thomas F., Method and system for processing events.
  187. Marinescu, Adrian M.; Braverman, Matthew I.; Seinfeld, Marc E., Method and system for protecting anti-malware programs.
  188. Wille, Robert Baird; Black, Russell Lane, Method and system for protecting native libraries.
  189. Smith,Michael D.; Bala,Vasanth, Method and system for protecting software applications against static and dynamic software piracy techniques.
  190. New, Jr.,John C.; Price,Mark T., Method and system for providing access to computer resources.
  191. Rice, John R.; Atallah, Mikhail J., Method and system for secure computational outsourcing and disguise.
  192. Dorak, Jr., John J.; Cagle, Stephen B.; Spagna, Richard L., Method and system for secure debugging of a secure software module.
  193. Fraser, Neil R., Method and system for securely displaying and confirming request to perform operation on host computer.
  194. Atallah, Mikhail J.; Chang, Hoi, Method and system for tamperproofing software.
  195. Coyne, Patrick J., Method and system for the management of professional services project information.
  196. Coyne, Patrick J., Method and system for the management of professional services project information.
  197. Maenza Glenn J., Method for authenticating digital recording devices.
  198. Saito, Makoto, Method for controlling database copyrights.
  199. Saito,Makoto, Method for controlling database copyrights.
  200. Saito,Makoto, Method for controlling database copyrights.
  201. McKeeth, James, Method for controlling user access to an electronic device.
  202. Bain,Peter, Method for creation of secure simulation models.
  203. Grellier,St��phane, Method for managing commands in several application files and microchip card for implementing said method.
  204. Fischer, Jean-Bernard, Method for monitoring execution of data processing program instructions in a security module.
  205. Colvin,David S., Method for monitoring software using encryption including digital signatures/certificates.
  206. Mishura, Sergii, Method for preventing illegal use of software.
  207. Mishura, Sergii, Method for preventing illegal use of software.
  208. Bala,Vasanth; Smith,Michael D., Method for protecting digital content from unauthorized use by automatically and dynamically integrating a content-protection agent.
  209. Colvin, David S., Method for providing repeated contact with software end-user using authorized administrator.
  210. L'Heureux, David; Hackerd, Craig, Method for remotely managing a remote device using an electronic mail message.
  211. Stephen J. Borza CA, Method for securing communication by selecting an encoding process using a first computer based upon ability of a second computer and deleting the process thereafter.
  212. Colvin, David S., Method for securing software to decrease software piracy.
  213. Colvin, David S., Method for securing software to increase license compliance.
  214. Colvin, David S., Method for securing software to reduce unauthorized use.
  215. Kohiyama, Kiyoshi; Yoshitake, Toshiyuki; Watanabe, Yasuhiro; Morioka, Kiyonori, Method of and apparatus for reproducing information, and security module.
  216. Kohiyama, Kiyoshi; Yoshitake, Toshiyuki; Watanabe, Yasuhiro; Morioka, Kiyonori, Method of and apparatus for reproducing information, and security module.
  217. Kohiyama, Kiyoshi; Yoshitake, Toshiyuki; Watanabe, Yasuhiro; Morioka, Kiyonori, Method of and apparatus for reproducing information, and security module.
  218. Dragne,Livia; Patz,Vivian Edward; Hoogenboezem,Christian, Method of and system for controlling a blasting network.
  219. Rogers, Jr., Cleon L.; Logan, Glen T., Method of identifying and protecting the integrity of a set of source data.
  220. Ferren, Bran; Jung, Edward K. Y., Method of manufacturing a limited use data storing device.
  221. Ferren, Bran; Jung, Edward K. Y., Method of manufacturing a limited use data storing device.
  222. Ferren, Bran; Jung, Edward K. Y., Method of manufacturing a limited use data storing device including structured data and primary and secondary read-support information.
  223. Yamaguchi, Takashi, Method of processing image information and method of preventing forgery of certificates or the like.
  224. Giraud, Nicolas; Rainsard, Stéphane, Method to secure the execution of a program against attacks by radiation or other.
  225. Marsland Tim P., Method, apparatus and computer program product for debugging a computer's boot process.
  226. Alagna, Michael Tony; Obrecht, Mark; Payne, Andy; Norwood, Peter, Method, computer software, and system for providing end to end security protection of an online transaction.
  227. Kraemer, Jeffrey A.; Malver, Debra L., Methods and apparatus providing security for multiple operational states of a computerized device.
  228. Lamkin, Allan B.; Gewickey, Gregory I.; Collart, Todd R., Methods and system for use in network management of content.
  229. Lamkin, Allan B.; Gewickey, Gregory I.; Collart, Todd R., Methods and systems for use in network management of content.
  230. Taylor, Neil W., Methods for detecting executable code which has been altered.
  231. Taylor, Neil W., Methods for detecting executable code which has been altered.
  232. Labrou,Yannis; Ji,Lusheng; Agre,Jonathan Russell, Methods for purchasing of goods and services.
  233. Henry, G. Glenn; Crispin, Thomas A.; Parks, Terry, Microprocessor apparatus and method for enabling configurable data block size in a cryptographic engine.
  234. Henry,G. Glenn; Crispin,Thomas A.; Parks,Terry, Microprocessor apparatus and method for optimizing block cipher cryptographic functions.
  235. Crispin, Thomas A.; Henry, G. Glenn; Parks, Terry, Microprocessor apparatus and method for performing block cipher cryptographic functions.
  236. Crispin,Thomas A.; Henry,G. Glenn; Parks,Terry, Microprocessor apparatus and method for performing block cipher cryptographic functions.
  237. Henry,G. Glenn; Crispin,Thomas A.; Parks,Terry, Microprocessor apparatus and method for providing configurable cryptographic block cipher round results.
  238. Henry, G. Glenn; Crispin, Thomas A.; Parks, Terry, Microprocessor apparatus and method for providing configurable cryptographic key size.
  239. Yang, Siying, Mitigating scripted attacks using dynamic polymorphism.
  240. Matenaar, Felix; Forristal, Jeffrey, Mobile devices with inhibited application debugging and methods of operation.
  241. Ferren, Bran; Jung, Edward K. Y., Modifiable memory devices having limited expected lifetime.
  242. Obrecht, Mark E.; Myers, Robert P.; Hartmann, Alfred C.; Alagna, Nick F.; Pyle, Kevin N.; Sullivan, Scott D.; Little, Michael W., Monitoring computer process resource usage.
  243. Obrecht, Mark E.; Myers, Robert P.; Hartmann, Alfred C.; Alagna, Nick F.; Pyle, Kevin N.; Sullivan, Scott D.; Little, Michael W., Monitoring computer process resource usage.
  244. Hoffberg, Steven M., Multifactorial optimization system and method.
  245. de Jong,Eduard K., Multiple instruction dispatch tables for application program obfuscation.
  246. Lee,Michael G., Network communication authentication.
  247. Keanini, Timothy D.; Quiroga, Martin A.; Buchanan, Brian W.; Flowers, John S., Network security system having a device profiler communicatively coupled to a traffic monitor.
  248. Keanini,Timothy D.; Quiroga,Martin A.; Buchanan,Brian W.; Flowers,John S., Network security system having a device profiler communicatively coupled to a traffic monitor.
  249. Hall, Robert J., Non-interference technique for spatially aware mobile ad hoc networking.
  250. de Jong,Eduard K., Non-linear execution of application program instructions for application program obfuscation.
  251. Tan, Xiaoxi; Gunyakti, Caglar; Liu, Yue; Dhillon, Karan S.; Hatlelid, Kristian E., Obfuscated state store for rights management system and the like.
  252. Tan, Xiaoxi; Gunyakti, Caglar; Liu, Yue; Dhillon, Karan S.; Hatlelid, Kristian E., Obfuscated state store for rights management system and the like.
  253. Tan,Xiaoxi; Gunyakti,Caglar; Liu,Yue; Dhillon,Karan S.; Hatlelid,Kristian E., Obfuscated state store for rights management system and the like.
  254. Shelest, Art; Hartrell, Gregory D., Obfuscating computer code to prevent an attack.
  255. Nicolson, Kenneth Alexander; Asai, Rieko; Sato, Taichi; Matsushima, Hideki, Obfuscation assisting apparatus.
  256. Collberg, Christian Sven; Thomborson, Clark David; Low, Douglas Wai Kok, Obfuscation techniques for enhancing software security.
  257. Michael Hu, Object authentification method using printed binary code and computer registry.
  258. Haselden, J. Kirk; Ivanov, Sergei, Object model document for obfuscating object model therein.
  259. Morgan, Bruce A.; Van Dok, Cornelis K.; Saimo, Daniel M; Varshney, Govind; Zimmermann, Sebastien; Sharif, Tariq, On demand protection against web resources associated with undesirable activities.
  260. Accapadi,Jos Manuel, On-type biometrics fingerprint soft keyboard.
  261. Hunt, Galen C.; Larus, James R.; DeTreville, John D.; Wobber, Edward P.; Abadi, Martin; Jones, Michael B.; Chilimbi, Trishul, Operating-system process construction.
  262. Labrou, Yannis; Ji, Lusheng; Agre, Jonathan Russell; Terriza, Jesus Molina, Opinion registering application for a universal pervasive transaction framework.
  263. Lee, Jong Ik; Shin, Sung Hyu; Lee, Dong Won, Optical fingerprint acquisition apparatus.
  264. Hatlelid,Kristjan E.; London,Uri; Shubin,Vladimir A., Overriding constructors to provide notification in order to detect foreign code.
  265. Castro, Javier; Darche, Blake; Aval, Chiraag, Packet filters in security appliances with modes and intervals.
  266. Kelley,Edward Emile; McAuliffe,Wayne Anthony, Password protection.
  267. Zinda, Eric K.; Olson, Erik B., Peer assembly inspection.
  268. de Jong,Eduard K., Permutation of opcode values for application program obfuscation.
  269. Keanini, Timothy D.; Molitor, Andrew; Gurney, John-Mark; Cooper, Jeremy; Buchanan, Brian, Persistent host determination.
  270. Schaefer, Stuart; Schmeidler, Yonah; Levin, Ilya, Policy based composite file system and method.
  271. Torrubia-Saez, Andres, Polymorphic code generation method and system therefor.
  272. Yang, Siying, Polymorphic security policy action.
  273. Wang, Ynjiun Paul, Portable electronic charge and authorization devices and methods therefor.
  274. Hatlelid, Kristjan E.; London, Uri; Shubin, Vladimir A., Post build process to record stack and call tree information.
  275. Richardson, Ric B., Post-production preparation of an unprotected installation image for downloading as a protected software product.
  276. Lamkin,Allan B.; Collart,Todd R.; Gewickey,Greg, Presentation of media content.
  277. Lamkin,Allan B.; Collart,Todd R.; Gewickey,Greg, Presentation of media content.
  278. Lamkin,Allan B.; Collart,Todd R.; Gewickey,Greg, Presentation of media content from multiple media sources.
  279. Green, David E.; Payne, Richard; Wood, Trevor, Preventing propagation of malicious software during execution in a virtual machine.
  280. McArdle,Mark J.; Johnston,Brent A., Prevention of operating system identification through fingerprinting techniques.
  281. Hunt, Galen C.; Hawblitzel, Chris K.; Larus, James R.; Fahndrich, Manuel A.; Aiken, Mark, Process isolation using protection domains.
  282. Glew, Andrew F.; Gerrity, Daniel A.; Tegreene, Clarence T., Processor configured to allocate resources using an entitlement vector.
  283. Glew, Andrew F.; Gerrity, Daniel A.; Tegreene, Clarence T., Processor operable to ensure code integrity.
  284. Fortune, Erik; Wu, Wei; Bennett, Julie D; El-Gammal, Mohammed, Profile protection.
  285. Arsenault, David Wayne; Dhimitri, William James, Protectable expressions in objects having authorable behaviors and appearances.
  286. Tolpin, David; Boutnaru, Shlomi; Shafet, Yuri, Protecting against malware variants using reconstructed code of malware.
  287. Luo, Chenghui, Protecting mobile code against malicious hosts.
  288. Luo,Chenghui; Zhao,Jian, Protecting mobile code against malicious hosts.
  289. Satish, Sourabh; Mehta, Shreyans; Seshadri, Vijay Anand, Protecting users from accidentally disclosing personal information in an insecure environment.
  290. Harman, David J.; Whittingham, Gary O.; Woolley, Mark A.; Wright, Andrew, Protection of state data in computer system code.
  291. Harman, David J.; Whittingham, Gary O.; Woolley, Mark A.; Wright, Andrew, Protection of state data in computer system code.
  292. Harman, David J.; Whittingham, Gary O.; Woolley, Mark A.; Wright, Andrew, Protection of state data in computer system code.
  293. Wu, Wei; Bennett, Julie D; Chu, Frank Nian-Tzu; El-Gammal, Mohammed; Earnshaw, Simon D, Registry protection.
  294. Ofek,Yoram; Baldi,Mario, Remotely authenticated operation method.
  295. de Jong, Eduard K., Rendering and encryption engine for application program obfuscation.
  296. Zvi, Nir Ben, Renewable integrity rooted system.
  297. Ferren, Bran; Jung, Edward K. Y.; Tegreene, Clarence T., Rotation responsive disk activation and deactivation mechanisms.
  298. Ferren, Bran; Jung, Edward K. Y.; Tegreene, Clarence T., Rotation responsive disk activation and deactivation mechanisms.
  299. Ferren,Bran; Jung,Edward K. Y.; Tegreene,Clarence T., Rotation responsive disk activation and deactivation mechanisms.
  300. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  301. Glew, Andrew F.; Gerrity, Daniel A.; Tegreene, Clarence T., Scheduling threads based on priority utilizing entitlement vectors, weight and usage level.
  302. Hunt, Galen C.; Larus, James R.; Gounares, Alexander G.; Endres, Raymond E., Secure and stable hosting of third-party extensions to web services.
  303. Laczko ; Sr. Frank L. ; Steiss Donald E., Secure computing device including operating system stored in non-relocatable page of memory.
  304. Takekawa, Hiroshi; Takayama, Hisashi; Naka, Ken, Secure device, information processing terminal, integrated circuit, terminal application generation apparatus, application authentication method.
  305. Hall, Robert J., Secure geographic based gaming.
  306. Lioy, Marcello V., Secure input via a touchscreen.
  307. Ganesan, Ravi; Sandhu, Ravinderpal Singh; Cottrell, Andrew Paul; Austin, Kyle, Secure login using augmented single factor split key asymmetric cryptography.
  308. Ganesan, Ravi; Sandhu, Ravinderpal Singh; Cottrell, Andrew Paul; Austin, Kyle, Secure login using single factor split key asymmetric cryptography and an augmenting factor.
  309. Main, Alec; Johnson, Harold J., Secure method and system for biometric verification.
  310. Schwartz, Jonathan D.; Perlin, Eric C.; Hong, James H.; Scallen, Stephen F.; Iskin, Sermet, Secure privilege elevation by way of secure desktop on computing device.
  311. Sima, Caleb; Sullivan, Bryan, Secure web application development and execution environment.
  312. Sima, Caleb; Farley, Timothy, Secure web application development environment.
  313. Michael F. Angelo, Securely generating a computer system password by utilizing an external encryption algorithm.
  314. Moritz, Csaba Andras; Chheda, Saurabh; Carver, Kristopher, Securing microprocessors against information leakage and physical tampering.
  315. Moritz, Csaba Andras; Chheda, Saurabh; Carver, Kristopher, Securing microprocessors against information leakage and physical tampering.
  316. Mukai,Toru; Ishida,Akira; Adachi,Masahiro; Koike,Hideki; Takada,Tetsuji; Tameda,Eiji, Security administration server and its host server.
  317. Labrou,Yannis; Ji,Lusheng; Agre,Jonathan Russell, Security framework and protocol for universal pervasive transactions.
  318. Waterson, David Lynch, Security methods and systems.
  319. Chheda, Saurabh; Carver, Kristopher; Ashok, Raksit, Security of program executables and microprocessors based on compiler-architecture interaction.
  320. Glew, Andrew F.; Gerrity, Daniel A.; Tegreene, Clarence T., Security perimeter.
  321. Fakes, Thomas F.; Samuelsson, Anders M. E., Security policy update supporting at least one security service provider.
  322. Townsend,Steven; Fakes,Thomas, Security-related programming interface.
  323. Weber, Harold J., Selected text obfuscation and encryption in a local, network and cloud computing environment.
  324. Udell,Howard R.; Kappel,Cary S.; Ries,William; Baker,Stuart D.; Sherman,Greg M., Self-destructing document and e-mail messaging system.
  325. Chu, Frank Nian Tzu; Wu, Wei; Bennett, Julie D; El Gammal, Mohammed; Earnshaw, Simon D, Service protection.
  326. Greschler, David M.; Schaefer, Stuart, Serving software applications from servers for client computers.
  327. Greschler, David M.; Schaefer, Stuart, Serving software applications from servers to client computers.
  328. Fink, Stephen; Haviv, Yinnon A.; Hay, Roee; Pistoia, Marco; Segal, Ory; Sharabani, Adi; Sridharan, Manu; Tip, Frank; Tripp, Omer; Weisman, Omri, Simulating black box test results using information from white box testing.
  329. Fink, Stephen; Haviv, Yinnon A.; Hay, Roee; Pistoia, Marco; Segal, Ory; Sharabani, Adi; Sridharan, Manu; Tip, Frank; Tripp, Omer; Weisman, Omri, Simulating black box test results using information from white box testing.
  330. McMichael, Lonny Dean; Khoo, Boo Boon; Sabella, Vito Joseph, Simultaneous tamper-proofing and anti-piracy protection of software.
  331. Johnston, II, Richard Fendall; Strauss, William J.; Pierce, Dean, Software based multi-channel polymorphic data obfuscation.
  332. Wilson, Kelce Steven; Sattler, Jason Dean, Software control flow watermarking.
  333. Lamkin,Allan; Collart,Todd; Blair,Jeff, Software engine for combining video or audio content with programmatic content.
  334. Collard, Arnaud, Software identification.
  335. Chu, Frank Nian Tzu; Wu, Wei; Bennett, Julie D; El Gammal, Mohammed, Software obfuscation.
  336. Bahar, Reuben, Software piracy prevention through remote enforcement of an activation threshold.
  337. Yang, Chungjen, Software protection apparatus and protection method thereof.
  338. Safa, John Aram, Software protection method.
  339. Horning, James J.; Sibert, W. Olin; Tarjan, Robert E.; Maheshwari, Umesh; Home, William G.; Wright, Andrew K.; Matheson, Lesley R.; Owicki, Susan S., Software self-defense systems and methods.
  340. Horning, James J.; Sibert, W. Olin; Tarjan, Robert E.; Maheshwari, Umesh; Horne, William G.; Wright, Andrew K.; Matheson, Lesley R.; Owicki, Susan S., Software self-defense systems and methods.
  341. Horning, James J.; Sibert, W. Olin; Tarjan, Robert E.; Maheshwari, Umesh; Horne, William G.; Wright, Andrew K.; Matheson, Lesley R.; Owicki, Susan S., Software self-defense systems and methods.
  342. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  343. Etchegoyen, Craig S., Software signature tracking.
  344. Marr,Michael David; Baker,Brandon, Static and run-time anti-disassembly and anti-debugging.
  345. Moritz, Csaba Andras, Statically speculative compilation and execution.
  346. Moritz, Csaba Andras, Statically speculative compilation and execution.
  347. Gasparini, Louis A; Harris, William H, System and method for authentication of users and communications received from computer systems.
  348. Gasparinl,Louis A; Gotlieb,Charles E, System and method for authentication of users and web sites.
  349. De Monseignat, Bernard; Moreau, Stéphane, System and method for authentication, data transfer, and protection against phishing.
  350. McKeeth, James, System and method for controlling user access to an electronic device.
  351. McKeeth, James, System and method for controlling user access to an electronic device.
  352. McKeeth, James, System and method for controlling user access to an electronic device.
  353. McKeeth, James, System and method for controlling user access to an electronic device.
  354. McKeeth, James, System and method for controlling user access to an electronic device.
  355. McKeeth, James, System and method for controlling user access to an electronic device.
  356. Garvey, Joseph F.; Himberger, Kevin; Jeffries, Clark D.; Peyravian, Mohammad, System and method for detecting keyboard logging.
  357. Hoffberg, Steven M., System and method for determining contingent relevance.
  358. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  359. Chang, Hoi; Kerschbaum, Florian; Faulkner, Kyle; M'Raïhi, David; Mehlberg, Michael Joseph, System and method for inserting security mechanisms into a software program.
  360. Green, David E.; Payne, Richard; Kilmer, William, System and method for malicious software detection in multiple protocols.
  361. Sandhu, Ravi; deSa, Colin; Ganesan, Karuna, System and method for password throttling.
  362. Kraft, Reiner; Myllymaki, Jussi Petri; Ruvolo, Joann, System and method for preventing automated crawler access to web-based data sources using a dynamic data transcoding scheme.
  363. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  364. Zimman, Christopher William; Hook, James William; Dulai, Dharmender, System and method for providing secure data transmission.
  365. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  366. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  367. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  368. Milliken, Walter Clark, System and method for thwarting buffer overflow attacks using encrypted process pointers.
  369. Milliken, Walter Clark, System and method for thwarting buffer overflow attacks using encrypted process pointers.
  370. Bolding,Joe; Tormey,Dan, System and method of limiting access to protected hardware addresses and processor instructions.
  371. Adams, Stephen Robert, System and method of updating programs and data.
  372. Jin, Hongxia; Lotspiech, Jeffrey Bruce, System and method to proactively detect software tampering.
  373. Jin,Hongxia; Lotspiech,Jeffrey Bruce, System and method to proactively detect software tampering.
  374. Getsin,Evgeniy M; Lewis,Michael J; Collart,Todd R, System, method and article of manufacture for a business layer component in a multimedia synchronization framework.
  375. Lamkin,Allan B.; Collart,Todd R., System, method and article of manufacture for a common cross platform framework for development of DVD-Video content integrated with ROM content.
  376. Getsin,Evgeniy M; Lewis,Michael J; Collart,Todd R, System, method and article of manufacture for a synchronizer component in a multimedia synchronization framework.
  377. Todd R. Collart, System, method and article of manufacture for authorizing the use of electronic content utilizing a laser-centric medium.
  378. Getsin, Evgeniy M.; Lewis, Michael J.; Collart, Todd R., System, method and article of manufacture for java/javascript component in a multimedia synchronization framework.
  379. Getsin, Evgeniy M.; Lewis, Michael J.; Collart, Todd R., System, method and article of manufacture for late synchronization during the execution of a multimedia event on a plurality of client computers.
  380. Getsin, Evgeniy M.; Lamkin, Allan B.; Collart, Todd R.; Lewis, Michael J., System, method and article of manufacture for remote control and navigation of local content.
  381. Getsin,Evgeniy M.; Lamkin,Allan B.; Collart,Todd R.; Lewis,Michael J., System, method and article of manufacture for remote control and navigation of local content.
  382. Lamkin, Allan B.; Collart, Todd R., System, method and article of manufacture for tracking and supporting the distribution of content electronically.
  383. Collart, Todd, System, method and article of manufacture for updating content stored on a portable storage medium.
  384. Collart, Todd R., System, method and article of manufacture for updating content stored on a portable storage medium.
  385. Collart,Todd R., System, method and article of manufacture for updating content stored on a portable storage medium.
  386. Collart, Todd R., System, method and article of manufacturing for authorizing the use of electronic content utilizing a laser-centric medium and a network server.
  387. Davidson, Jack W.; Hiser, Jason D., System, method and computer program product for protecting software via continuous anti-tampering and obfuscation transforms.
  388. Tracy, Richard P.; Smith, Peter A.; Berman, Lon J.; Catlin, Gary M.; Wilson, David J.; Barrett, Hugh; Hall, Jr., Larry L., System, method and medium for certifying and accrediting requirements compliance.
  389. Tracy,Richard P.; Barrett,Hugh; Berman,Lon J.; Catlin,Gary M., System, method and medium for certifying and accrediting requirements compliance.
  390. Harrington,Bradley Ryan; Locke,Kevin Brian, System, method, and computer program product for prohibiting unauthorized access to protected memory regions.
  391. Jin, Hongxia; Myles, Ginger, System, method, and service for detecting improper manipulation of an application.
  392. LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Hart, III, John J., Systems and methods for preventing unauthorized use of digital content.
  393. LeVine,Richard B.; Lee,Andrew R.; Howard,Daniel G.; Goldman,Daniel M.; Hart, III,John J., Systems and methods for preventing unauthorized use of digital content.
  394. Levine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Hart, III, John J., Systems and methods for preventing unauthorized use of digital content.
  395. Jing, Rui; Tian, Xue Feng, Systems and methods for protecting virtual machine program code.
  396. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  397. Merkle, Jr., James A.; LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Pagliarulo, Jeffrey A.; Hart, III, John J.; Bouza, Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  398. Merkle, Jr., James A.; LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Pagliarulo, Jeffrey A.; Hart, III, John J.; Bouza, Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  399. Merkle, Jr.,James A.; LeVine,Richard B.; Lee,Andrew R.; Howard,Daniel G.; Goldman,Daniel M.; Pagliarulo,Jeffrey A.; Hart, III,John J.; Bouza,Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  400. Benson, Glenn S., Systems and methods for trusted path secure communication.
  401. Kramer,Michael; Ray,Kenneth D.; England,Paul; Field,Scott A.; Schwartz,Jonathan D., Systems and methods for verifying trust of executable files.
  402. Home, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Horning, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan S., Systems and methods for watermarking software and other media.
  403. Horne, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Homing, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan, Systems and methods for watermarking software and other media.
  404. Horne, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Horning, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan S., Systems and methods for watermarking software and other media.
  405. Horne, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Horning, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan S., Systems and methods for watermarking software and other media.
  406. Horne, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Horning, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan S., Systems and methods for watermarking software and other media.
  407. Horne, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Horning, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan S., Systems and methods for watermarking software and other media.
  408. Horne, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Horning, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan S., Systems and methods for watermarking software and other media.
  409. Vasishth, Karan; Hunter, Kimberley Ann; Brown, Laurie A.; Lawrence, Mark David; Leibmann, Matthias, Systems and processes for managing policy change in a distributed enterprise.
  410. Vasishth, Karan; Hunter, Kimberley Ann; Brown, Laurie A.; Lawrence, Mark David; Liebmann, Matthias, Systems and processes for managing policy change in a distributed enterprise.
  411. Betouin, Pierre; Ciet, Mathieu; Farrugia, Augustin J., Systems, methods, and computer-readable media for fertilizing machine-executable code.
  412. Glew, Andrew F.; Gerrity, Daniel A.; Tegreene, Clarence T., Taint injection and tracking.
  413. Nardone Joseph M. ; Mangold Richard P. ; Pfotenhauer Jody L. ; Shippy Keith L. ; Aucsmith David W. ; Maliszewski Richard L. ; Graunke Gary L., Tamper resistant methods and apparatus.
  414. Nardone Joseph M. ; Mangold Richard T. ; Pfotenhauer Jody L. ; Shippy Keith L. ; Aucsmith David W. ; Maliszewski Richard L. ; Graunke Gary L., Tamper resistant methods and apparatus.
  415. Hashimoto,Mikio; Teramoto,Keiichi; Saito,Takeshi; Shirakawa,Kenji; Fujimoto,Kensaku, Tamper resistant microprocessor.
  416. Hashimoto,Mikio; Teramoto,Keiichi; Saito,Takeshi; Shirakawa,Kenji; Fujimoto,Kensaku, Tamper resistant microprocessor.
  417. Nardone Joseph M. ; Mangold Richard P. ; Pfotenhauer Jody L. ; Shippy Keith L. ; Aucsmith David W. ; Maliszewski Richard L. ; Graunke Gary L., Tamper resistant player for scrambled contents.
  418. Chapman Richard Alan, Technique for localizing keyphrase-based data encryption and decryption.
  419. Chu, Frank Nian Tzu; Wu, Wei; Bennett, Julie D; El Gammal, Mohammed, Thread protection.
  420. Trostle, Jonathan T., Timing attacks against user logon and network I/O.
  421. Soffer, Aviv; Vaisband, Oleg, User authentication device having multiple isolated host interfaces.
  422. Odom, Gary, User selectable signature.
  423. Perrig, Adrian; Khosla, Pradeep; Seshadri, Arvind; Luk, Mark; van Doorn, Leendert, Verifying integrity and guaranteeing execution of code on untrusted computer platform.
  424. Anckaert, Bertrand; Jakubowski, Mariusz H.; Venkatesan, Ramarathnam, Virtualization for diversified tamper resistance.
  425. Anckaert, Bertrand; Jakubowski, Mariusz H.; Venkatesan, Ramarathnam, Virtualization for diversified tamper resistance.
  426. Marsden, Walter L.; Green, David E., Virus detection by executing e-mail code in a virtual machine.
  427. Marsden, Walter L.; Green, David E., Virus detection by executing electronic message code in a virtual machine.
  428. Marsden, Walter L.; Green, David L., Virus detection by executing electronic message code in a virtual machine.
  429. Freitas Fortuna dos Santos, Antonio Pedro; Silvares Ribeiro, Rui Miguel; Silva, Filipe Manuel Gomes, Web application protection.
  430. Labrou, Yannis; Agre, Jonathan Russell, Wireless computer wallet for physical point of sale (POS) transactions.
  431. Labrou, Yannis; Ji, Lusheng; Agre, Jonathan Russell; Molina Terriza, Jesus; Chen, Wei-lun, Wireless wallet.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로