WO2014046974A3 - Case secure computer architecture - Google Patents

Case secure computer architecture Download PDF

Info

Publication number
WO2014046974A3
WO2014046974A3 PCT/US2013/059629 US2013059629W WO2014046974A3 WO 2014046974 A3 WO2014046974 A3 WO 2014046974A3 US 2013059629 W US2013059629 W US 2013059629W WO 2014046974 A3 WO2014046974 A3 WO 2014046974A3
Authority
WO
WIPO (PCT)
Prior art keywords
computer architecture
secure computer
programs
user
case secure
Prior art date
Application number
PCT/US2013/059629
Other languages
French (fr)
Other versions
WO2014046974A2 (en
Inventor
Paul CASE, Sr.
Original Assignee
Case Paul Sr
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Case Paul Sr filed Critical Case Paul Sr
Publication of WO2014046974A2 publication Critical patent/WO2014046974A2/en
Publication of WO2014046974A3 publication Critical patent/WO2014046974A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/567Computer malware detection or handling, e.g. anti-virus arrangements using dedicated hardware
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/572Secure firmware programming, e.g. of basic input output system [BIOS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2212/00Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
    • G06F2212/10Providing a specific technical effect
    • G06F2212/1052Security improvement

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Storage Device Security (AREA)
  • Stored Programmes (AREA)

Abstract

Two computing subsystems are disclosed, one a control subsystem, the other a user subsystem, each using engines with augmented conventional instruction sets, together with hardware and/or firmware, to compartmentalize execution of user programs to insure their behavior does not exceed defined bounds. Programs hidden in data cannot execute. User programs cannot alter the control program that manages the overall system.
PCT/US2013/059629 2012-09-20 2013-09-13 Case secure computer architecture WO2014046974A2 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US201261703351P 2012-09-20 2012-09-20
US61/703,351 2012-09-20
US201361752127P 2013-01-14 2013-01-14
US61/752,127 2013-01-14

Publications (2)

Publication Number Publication Date
WO2014046974A2 WO2014046974A2 (en) 2014-03-27
WO2014046974A3 true WO2014046974A3 (en) 2014-07-17

Family

ID=50275735

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2013/059629 WO2014046974A2 (en) 2012-09-20 2013-09-13 Case secure computer architecture

Country Status (2)

Country Link
US (2) US8938796B2 (en)
WO (1) WO2014046974A2 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8874477B2 (en) 2005-10-04 2014-10-28 Steven Mark Hoffberg Multifactorial optimization system and method
US8429735B2 (en) 2010-01-26 2013-04-23 Frampton E. Ellis Method of using one or more secure private networks to actively configure the hardware of a computer or microchip
WO2014046974A2 (en) 2012-09-20 2014-03-27 Case Paul Sr Case secure computer architecture
US10063567B2 (en) 2014-11-13 2018-08-28 Virtual Software Systems, Inc. System for cross-host, multi-thread session alignment
CN111782300B (en) * 2020-07-08 2022-02-08 支付宝(杭州)信息技术有限公司 Data processing method, device, equipment and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7269825B1 (en) * 2002-12-27 2007-09-11 Unisys Corporation Method and system for relative address translation
US7389427B1 (en) * 2000-09-28 2008-06-17 Intel Corporation Mechanism to secure computer output from software attack using isolated execution
US20110145923A1 (en) * 2000-05-19 2011-06-16 Vir2Us, Inc. Computer having special purpose subsystems and cyber-terror and virus immunity and protection features
US20110154500A1 (en) * 2009-12-23 2011-06-23 Sahita Ravi L Executing Trusted Applications with Reduced Trusted Computing Base
US8010772B2 (en) * 2007-04-03 2011-08-30 Arm Limited Protected function calling

Family Cites Families (463)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4152761A (en) 1976-07-28 1979-05-01 Intel Corporation Multi-task digital processor employing a priority
US4328542A (en) 1979-11-07 1982-05-04 The Boeing Company Secure implementation of transition machine computer
US4530049A (en) 1982-02-11 1985-07-16 At&T Bell Laboratories Stack cache with fixed size stack frames
US4553202A (en) 1982-05-06 1985-11-12 International Business Machines Corporation User controlled dialog resource switching in a multi-tasking word processor
EP0175487A3 (en) 1984-08-23 1989-03-08 Btg International Limited Software protection device
US4775246A (en) 1985-04-17 1988-10-04 Pitney Bowes Inc. System for detecting unaccounted for printing in a value printing system
US5047925A (en) 1985-05-06 1991-09-10 Motorola, Inc. Logical ring in a virtual single machine
US5075884A (en) 1987-12-23 1991-12-24 Loral Aerospace Corp. Multilevel secure workstation
US5581763A (en) 1988-06-14 1996-12-03 Progressive Technology Inc. Secure architecture and apparatus using an independent computer cartridge
US5057996A (en) 1989-06-29 1991-10-15 Digital Equipment Corporation Waitable object creation system and method in an object based computer operating system
US5136712A (en) 1989-06-29 1992-08-04 Digital Equipment Corporation Temporary object handling system and method in an object based computer operating system
US5129083A (en) 1989-06-29 1992-07-07 Digital Equipment Corporation Conditional object creating system having different object pointers for accessing a set of data structure objects
US5129084A (en) 1989-06-29 1992-07-07 Digital Equipment Corporation Object container transfer system and method in an object based computer operating system
US5187790A (en) 1989-06-29 1993-02-16 Digital Equipment Corporation Server impersonation of client processes in an object based computer operating system
US5297283A (en) 1989-06-29 1994-03-22 Digital Equipment Corporation Object transferring system and method in an object based computer operating system
US4987595A (en) 1989-09-11 1991-01-22 Motorola, Inc. Secure cryptographic processor arrangement
US5469556A (en) 1989-12-12 1995-11-21 Harris Corporation Resource access security system for controlling access to resources of a data processing system
US5029206A (en) * 1989-12-27 1991-07-02 Motorola, Inc. Uniform interface for cryptographic services
US5504814A (en) 1991-07-10 1996-04-02 Hughes Aircraft Company Efficient security kernel for the 80960 extended architecture
FR2683344B1 (en) 1991-10-30 1996-09-20 Bull Sa MULTIPROCESSOR SYSTEM WITH MICROPROGRAMS FOR THE DISTRIBUTION OF PROCESSES TO PROCESSORS.
US5412717A (en) 1992-05-15 1995-05-02 Fischer; Addison M. Computer system security method and apparatus having program authorization information data structures
US5367571A (en) 1992-12-02 1994-11-22 Scientific-Atlanta, Inc. Subscriber terminal with plug in expansion card
US6948070B1 (en) 1995-02-13 2005-09-20 Intertrust Technologies Corporation Systems and methods for secure transaction management and electronic rights protection
US7133845B1 (en) 1995-02-13 2006-11-07 Intertrust Technologies Corp. System and methods for secure transaction management and electronic rights protection
US6157721A (en) 1996-08-12 2000-12-05 Intertrust Technologies Corp. Systems and methods using cryptography to protect secure computing environments
DE69638018D1 (en) 1995-02-13 2009-10-15 Intertrust Tech Corp Systems and procedures for managing secure transactions and protecting electronic rights
US7095854B1 (en) 1995-02-13 2006-08-22 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US5892900A (en) 1996-08-30 1999-04-06 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US7124302B2 (en) 1995-02-13 2006-10-17 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US7069451B1 (en) 1995-02-13 2006-06-27 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US5581700A (en) 1995-08-11 1996-12-03 Dell U.S.A., L.P. Hierarchical multiple password acceptance system
US5870473A (en) 1995-12-14 1999-02-09 Cybercash, Inc. Electronic transfer system and method
JP2000503154A (en) 1996-01-11 2000-03-14 エムアールジェイ インコーポレイテッド System for controlling access and distribution of digital ownership
US5867647A (en) 1996-02-09 1999-02-02 Secure Computing Corporation System and method for securing compiled program code
US5815718A (en) 1996-05-30 1998-09-29 Sun Microsystems, Inc. Method and system for loading classes in read-only memory
US5748736A (en) 1996-06-14 1998-05-05 Mittra; Suvo System and method for secure group communications via multicast or broadcast
US6708274B2 (en) 1998-04-30 2004-03-16 Intel Corporation Cryptographically protected paging subsystem
US6078612A (en) 1997-05-16 2000-06-20 Itt Manufacturing Enterprises, Inc. Radio architecture for an advanced digital radio in a digital communication system
US5949973A (en) 1997-07-25 1999-09-07 Memco Software, Ltd. Method of relocating the stack in a computer system for preventing overrate by an exploit program
US6144739A (en) 1998-01-20 2000-11-07 Motorola, Inc. Computer network protection using cryptographic sealing software agents and objects
US7809138B2 (en) 1999-03-16 2010-10-05 Intertrust Technologies Corporation Methods and apparatus for persistent control and protection of content
US6098171A (en) 1998-03-31 2000-08-01 International Business Machines Corporation Personal computer ROM scan startup protection
US6240493B1 (en) 1998-04-17 2001-05-29 Motorola, Inc. Method and apparatus for performing access censorship in a data processing system
US6865672B1 (en) 1998-05-18 2005-03-08 Spearhead Technologies, Ltd. System and method for securing a computer communication network
US6496871B1 (en) 1998-06-30 2002-12-17 Nec Research Institute, Inc. Distributed agent software system and method having enhanced process mobility and communication in a computer network
US6311270B1 (en) 1998-09-14 2001-10-30 International Business Machines Corporation Method and apparatus for securing communication utilizing a security processor
US6385727B1 (en) 1998-09-25 2002-05-07 Hughes Electronics Corporation Apparatus for providing a secure processing environment
US6321335B1 (en) 1998-10-30 2001-11-20 Acqis Technology, Inc. Password protected modular computer method and device
US6370648B1 (en) 1998-12-08 2002-04-09 Visa International Service Association Computer network intrusion detection
IL143573A0 (en) 1998-12-09 2002-04-21 Network Ice Corp A method and apparatus for providing network and computer system security
US6449652B1 (en) 1999-01-04 2002-09-10 Emc Corporation Method and apparatus for providing secure access to a computer system resource
US6347371B1 (en) 1999-01-25 2002-02-12 Dell Usa, L.P. System and method for initiating operation of a computer system
US6480961B2 (en) 1999-03-02 2002-11-12 Audible, Inc. Secure streaming of digital audio/visual content
US6434627B1 (en) 1999-03-15 2002-08-13 Cisco Technology, Inc. IP network for accomodating mobile users with incompatible network addressing
US6424953B1 (en) 1999-03-19 2002-07-23 Compaq Computer Corp. Encrypting secrets in a file for an electronic micro-commerce system
US6651171B1 (en) 1999-04-06 2003-11-18 Microsoft Corporation Secure execution of program code
US6775779B1 (en) 1999-04-06 2004-08-10 Microsoft Corporation Hierarchical trusted code for content protection in computers
US6804778B1 (en) 1999-04-15 2004-10-12 Gilian Technologies, Ltd. Data quality assurance
US6643777B1 (en) 1999-05-14 2003-11-04 Acquis Technology, Inc. Data security method and device for computer modules
EP1055990A1 (en) 1999-05-28 2000-11-29 Hewlett-Packard Company Event logging in a computing platform
US6981155B1 (en) 1999-07-14 2005-12-27 Symantec Corporation System and method for computer security
US7117532B1 (en) 1999-07-14 2006-10-03 Symantec Corporation System and method for generating fictitious content for a computer
US7461402B1 (en) 1999-07-14 2008-12-02 Symantec Corporation System and method for preventing detection of a selected process running on a computer
US7152239B1 (en) 1999-07-14 2006-12-19 Symantec Corporation System and method for preventing detection of a computer connection to an external device
EP1076279A1 (en) 1999-08-13 2001-02-14 Hewlett-Packard Company Computer platforms and their methods of operation
US7124170B1 (en) 1999-08-20 2006-10-17 Intertrust Technologies Corp. Secure processing unit systems and methods
US6996843B1 (en) 1999-08-30 2006-02-07 Symantec Corporation System and method for detecting computer intrusions
US7065657B1 (en) 1999-08-30 2006-06-20 Symantec Corporation Extensible intrusion detection system
US6647400B1 (en) 1999-08-30 2003-11-11 Symantec Corporation System and method for analyzing filesystems to detect intrusions
US7203962B1 (en) 1999-08-30 2007-04-10 Symantec Corporation System and method for using timestamps to detect attacks
US6826697B1 (en) 1999-08-30 2004-11-30 Symantec Corporation System and method for detecting buffer overflow attacks
US7085936B1 (en) 1999-08-30 2006-08-01 Symantec Corporation System and method for using login correlations to detect intrusions
US6751737B1 (en) 1999-10-07 2004-06-15 Advanced Micro Devices Multiple protected mode execution environments using multiple register sets and meta-protected instructions
US6671811B1 (en) 1999-10-25 2003-12-30 Visa Internation Service Association Features generation for use in computer network intrusion detection
US6769066B1 (en) 1999-10-25 2004-07-27 Visa International Service Association Method and apparatus for training a neural network model for use in computer network intrusion detection
US7281268B2 (en) 1999-11-14 2007-10-09 Mcafee, Inc. System, method and computer program product for detection of unwanted processes
US6859805B1 (en) 1999-11-29 2005-02-22 Actuate Corporation Method and apparatus for generating page-level security in a computer generated report
US7117374B2 (en) 2000-03-24 2006-10-03 Intermec Ip Corp Apparatus and method for gathering and utilizing data
US6957332B1 (en) 2000-03-31 2005-10-18 Intel Corporation Managing a secure platform using a hierarchical executive architecture in isolated execution mode
US6507904B1 (en) 2000-03-31 2003-01-14 Intel Corporation Executing isolated mode instructions in a secure system running in privilege rings
US6678825B1 (en) 2000-03-31 2004-01-13 Intel Corporation Controlling access to multiple isolated memories in an isolated execution environment
US7111176B1 (en) 2000-03-31 2006-09-19 Intel Corporation Generating isolated bus cycles for isolated execution
US7082615B1 (en) 2000-03-31 2006-07-25 Intel Corporation Protecting software environment in isolated execution
US6996710B1 (en) 2000-03-31 2006-02-07 Intel Corporation Platform and method for issuing and certifying a hardware-protected attestation key
US7013484B1 (en) 2000-03-31 2006-03-14 Intel Corporation Managing a secure environment using a chipset in isolated execution mode
US7089418B1 (en) 2000-03-31 2006-08-08 Intel Corporation Managing accesses in a processor for isolated execution
US6831660B1 (en) 2000-06-15 2004-12-14 International Business Machines Corporation Method and apparatus for graphics window clipping management in a data processing system
US6775776B1 (en) 2000-06-27 2004-08-10 Intel Corporation Biometric-based authentication in a nonvolatile memory device
US7051200B1 (en) 2000-06-27 2006-05-23 Microsoft Corporation System and method for interfacing a software process to secure repositories
US7155615B1 (en) 2000-06-30 2006-12-26 Intel Corporation Method and apparatus for providing a secure-private partition on a hard disk drive of a computer system via IDE controller
US6907533B2 (en) 2000-07-14 2005-06-14 Symantec Corporation System and method for computer security using multiple cages
GB0020441D0 (en) 2000-08-18 2000-10-04 Hewlett Packard Co Performance of a service on a computing platform
US7302705B1 (en) 2000-08-30 2007-11-27 International Business Machines Corporation Method and apparatus for tracing a denial-of-service attack back to its source
US7032114B1 (en) 2000-08-30 2006-04-18 Symantec Corporation System and method for using signatures to detect computer intrusions
GB2366692B (en) 2000-08-31 2002-08-14 F Secure Oyj Virus protection in an internet environment
US6628284B1 (en) 2000-09-07 2003-09-30 International Business Machines Corporation Method and apparatus for processing graphics perspective transformations
US7613917B1 (en) 2000-09-18 2009-11-03 Navteq North America, Llc Method and system for mass distribution of geographic data for navigation systems
US7149888B1 (en) * 2000-09-29 2006-12-12 Intel Corporation Method and apparatus for booting the operating environment of an autonomous subsystem in a computer based system without involvement of the main operating system
GB2406416A (en) 2000-10-31 2005-03-30 Advanced Risc Mach Ltd Describing an integrated circuit configuration
GB0026803D0 (en) 2000-11-02 2000-12-20 Multimedia Engineering Company Securized method for communicating and providing services on digital networks and implementing architecture
US7103915B2 (en) 2000-11-13 2006-09-05 Digital Doors, Inc. Data security system and method
US8176563B2 (en) 2000-11-13 2012-05-08 DigitalDoors, Inc. Data security system and method with editor
US7322047B2 (en) 2000-11-13 2008-01-22 Digital Doors, Inc. Data security system and method associated with data mining
US7313825B2 (en) 2000-11-13 2007-12-25 Digital Doors, Inc. Data security system and method for portable device
US6938164B1 (en) 2000-11-22 2005-08-30 Microsoft Corporation Method and system for allowing code to be securely initialized in a computer
GB2376763B (en) 2001-06-19 2004-12-15 Hewlett Packard Co Demonstrating integrity of a compartment of a compartmented operating system
CA2327911A1 (en) 2000-12-08 2002-06-08 Cloakware Corporation Obscuring functions in computer software
US6708086B2 (en) 2000-12-11 2004-03-16 Sue M. Richard Vehicle computer
US7150045B2 (en) 2000-12-14 2006-12-12 Widevine Technologies, Inc. Method and apparatus for protection of electronic media
US6621492B2 (en) 2000-12-18 2003-09-16 International Business Machines Corporation Method and apparatus using primitive bounding volumes to improve the accuracy of BSP-trees
US6624810B2 (en) 2000-12-18 2003-09-23 International Business Machines Corporation Tightened bounding volumes for BSP-trees
US6813522B1 (en) 2000-12-29 2004-11-02 Emc Corporation Method of sharing memory in a multi-processor system including a cloning of code and data
US6947989B2 (en) 2001-01-29 2005-09-20 International Business Machines Corporation System and method for provisioning resources to users based on policies, roles, organizational information, and attributes
US6871232B2 (en) 2001-03-06 2005-03-22 International Business Machines Corporation Method and system for third party resource provisioning management
US6985955B2 (en) 2001-01-29 2006-01-10 International Business Machines Corporation System and method for provisioning resources to users based on roles, organizational information, attributes and third-party information or authorizations
US6917364B2 (en) 2001-01-31 2005-07-12 International Business Machines Corporation Method and apparatus for managing texture memory in a data processing system
US7233998B2 (en) 2001-03-22 2007-06-19 Sony Computer Entertainment Inc. Computer architecture and software cells for broadband networks
US20020141582A1 (en) 2001-03-28 2002-10-03 Kocher Paul C. Content security layer providing long-term renewable security
US7096497B2 (en) 2001-03-30 2006-08-22 Intel Corporation File checking using remote signing authority via a network
AU2002259015A1 (en) 2001-04-24 2002-11-05 Broadcom Corporation Power management system and method
US7207069B2 (en) 2001-06-05 2007-04-17 Hewlett-Packard Development Company, L.P. Branch locking of job tickets to control concurrency
US7073059B2 (en) 2001-06-08 2006-07-04 Hewlett-Packard Development Company, L.P. Secure machine platform that interfaces to operating systems and customized control programs
GB2376765B (en) 2001-06-19 2004-12-29 Hewlett Packard Co Multiple trusted computing environments with verifiable environment identities
GB2376764B (en) 2001-06-19 2004-12-29 Hewlett Packard Co Multiple trusted computing environments
GB2376761A (en) 2001-06-19 2002-12-24 Hewlett Packard Co An arrangement in which a process is run on a host operating system but may be switched to a guest system if it poses a security risk
GB2376762A (en) 2001-06-19 2002-12-24 Hewlett Packard Co Renting a computing environment on a trusted computing platform
GB0114898D0 (en) 2001-06-19 2001-08-08 Hewlett Packard Co Interaction with electronic services and markets
US6865690B2 (en) 2001-06-21 2005-03-08 Northrop Grumman Corporation Voltage conditioner with embedded battery backup
US7073070B2 (en) 2001-06-29 2006-07-04 Intel Corporation Method and apparatus to improve the protection of information presented by a computer
US6928549B2 (en) 2001-07-09 2005-08-09 International Business Machines Corporation Dynamic intrusion detection for computer systems
US7484105B2 (en) 2001-08-16 2009-01-27 Lenovo (Singapore) Ptd. Ltd. Flash update using a trusted platform module
US7308714B2 (en) 2001-09-27 2007-12-11 International Business Machines Corporation Limiting the output of alerts generated by an intrusion detection sensor during a denial of service attack
GB0123415D0 (en) 2001-09-28 2001-11-21 Memquest Ltd Method of writing data to non-volatile memory
US7389537B1 (en) 2001-10-09 2008-06-17 Juniper Networks, Inc. Rate limiting data traffic in a network
GB2382419B (en) 2001-11-22 2005-12-14 Hewlett Packard Co Apparatus and method for creating a trusted environment
US7150043B2 (en) 2001-12-12 2006-12-12 International Business Machines Corporation Intrusion detection method and signature table
US20030126059A1 (en) 2001-12-18 2003-07-03 Hensley Roy Austin Intelectual property (IP) brokering system and method
AU2003202876A1 (en) 2002-01-04 2003-07-24 Internet Security Systems, Inc. System and method for the managed security control of processes on a computer system
ATE322790T1 (en) 2002-01-18 2006-04-15 Stonesoft Corp MONITORING DATA FLOW TO IMPROVE NETWORK SECURITY PROTECTION
US20030187853A1 (en) 2002-01-24 2003-10-02 Hensley Roy Austin Distributed data storage system and method
US7225343B1 (en) 2002-01-25 2007-05-29 The Trustees Of Columbia University In The City Of New York System and methods for adaptive model generation for detecting intrusions in computer systems
US7076803B2 (en) 2002-01-28 2006-07-11 International Business Machines Corporation Integrated intrusion detection services
US7222366B2 (en) 2002-01-28 2007-05-22 International Business Machines Corporation Intrusion event filtering
JP4088082B2 (en) 2002-02-15 2008-05-21 株式会社東芝 Apparatus and program for preventing infection by unknown computer virus
US7529242B1 (en) 2002-02-15 2009-05-05 Symantec Corporation Routing network packets for multi-processor network flow analysis
US7302589B2 (en) 2002-02-20 2007-11-27 Intel Corporation Method for securing memory mapped control registers
US7631196B2 (en) 2002-02-25 2009-12-08 Intel Corporation Method and apparatus for loading a trustable operating system
EP1488313A2 (en) 2002-03-01 2004-12-22 Green Border Technologies Method and system for assured denotation of application semantics
US7788699B2 (en) 2002-03-06 2010-08-31 Vir2Us, Inc. Computer and method for safe usage of documents, email attachments and other content that may contain virus, spy-ware, or malicious code
US7181603B2 (en) 2002-03-12 2007-02-20 Intel Corporation Method of secure function loading
US7095859B2 (en) 2002-03-18 2006-08-22 Lenovo (Singapore) Pte. Ltd. Managing private keys in a free seating environment
ATE263391T1 (en) 2002-03-26 2004-04-15 Soteres Gmbh PROCEDURES FOR PROTECTING THE INTEGRITY OF PROGRAMS
US7890771B2 (en) 2002-04-17 2011-02-15 Microsoft Corporation Saving and retrieving data based on public key encryption
US7487365B2 (en) 2002-04-17 2009-02-03 Microsoft Corporation Saving and retrieving data based on symmetric key encryption
US7139890B2 (en) 2002-04-30 2006-11-21 Intel Corporation Methods and arrangements to interface memory
US6782349B2 (en) 2002-05-03 2004-08-24 International Business Machines Corporation Method and system for updating a root of trust measurement function in a personal computer
US20030226040A1 (en) 2002-06-03 2003-12-04 International Business Machines Corporation Controlling access to data stored on a storage device of a trusted computing platform system
US7367055B2 (en) 2002-06-11 2008-04-29 Motorola, Inc. Communication systems automated security detection based on protocol cause codes
US7085933B2 (en) 2002-06-11 2006-08-01 Lenvo (Singapore) Pte, Ltd. Computer system apparatus and method for improved assurance of authentication
US7103914B2 (en) 2002-06-17 2006-09-05 Bae Systems Information Technology Llc Trusted computer system
US7120788B2 (en) 2002-06-20 2006-10-10 Intel Corporation Method and system for shutting down and restarting a computer system
US7743257B2 (en) 2002-06-27 2010-06-22 Nxp B.V. Security processor with bus configuration
US7216369B2 (en) 2002-06-28 2007-05-08 Intel Corporation Trusted platform apparatus, system, and method
AU2003278706A1 (en) 2002-08-09 2004-02-25 Alphatech, Inc. Control systems and methods using a partially-observable markov decision process (po-mdp)
US6983323B2 (en) 2002-08-12 2006-01-03 Tippingpoint Technologies, Inc. Multi-level packet screening with dynamically selected filtering criteria
US7152193B2 (en) 2002-08-13 2006-12-19 Lsi Logic Corporation Embedded sequence checking
FR2843819B1 (en) 2002-08-21 2006-11-10 Thomson Licensing Sa ANTI-THEFT SAFETY ELECTRICAL APPARATUS, ANTI-THEFT DEVICE COMPRISING SUCH AN APPARATUS AND A METHOD FOR THE MATCHING OF ELECTRICAL APPARATUS
US7516491B1 (en) 2002-10-17 2009-04-07 Roger Schlafly License tracking system
US7509683B2 (en) 2002-08-26 2009-03-24 Hewlett-Packard Development Company, L.P. System and method for authenticating digital content
US6659779B1 (en) 2002-09-09 2003-12-09 Hewlett-Packard Development Company, L.P. Electronic assembly having a removable power supply
US7209137B2 (en) 2002-09-12 2007-04-24 International Business Machines Corporation Efficient triangular shaped meshes
US6924802B2 (en) 2002-09-12 2005-08-02 International Business Machines Corporation Efficient function interpolation using SIMD vector permute functionality
US7146499B2 (en) 2002-09-30 2006-12-05 International Business Machines Corporation Security system for replicated storage devices on computer networks
US7200758B2 (en) 2002-10-09 2007-04-03 Intel Corporation Encapsulation of a TCPA trusted platform module functionality within a server management coprocessor subsystem
WO2004034229A2 (en) 2002-10-10 2004-04-22 Rocksteady Networks, Inc. System and method for providing access control
US7251829B1 (en) 2002-10-26 2007-07-31 Type80 Security Software, Inc. Data analysis and security system
US7363656B2 (en) 2002-11-04 2008-04-22 Mazu Networks, Inc. Event detection/anomaly correlation heuristics
US7149862B2 (en) 2002-11-18 2006-12-12 Arm Limited Access control in a data processing apparatus
US7231476B2 (en) 2002-11-18 2007-06-12 Arm Limited Function control for a processor
GB2396034B (en) 2002-11-18 2006-03-08 Advanced Risc Mach Ltd Technique for accessing memory in a data processing apparatus
GB2410348B (en) 2002-11-18 2005-12-07 Advanced Risc Mach Ltd Exception types within a secure processing system
GB2396713B (en) 2002-11-18 2005-09-14 Advanced Risc Mach Ltd Apparatus and method for controlling access to a memory unit
GB2396930B (en) 2002-11-18 2005-09-07 Advanced Risc Mach Ltd Apparatus and method for managing access to a memory
RU2005115094A (en) 2002-11-18 2006-01-20 Арм Лимитед (Gb) DISPLAYING VIRTUAL MEMORY ADDRESSES TO PHYSICAL ADDRESSES IN A SYSTEM WITH A PROTECTED DOMAIN AND AN UNsecure DOMAIN
AU2003278350A1 (en) 2002-11-18 2004-06-15 Arm Limited Secure memory for protecting against malicious programs
KR100481614B1 (en) 2002-11-19 2005-04-08 한국전자통신연구원 METHOD AND APPARATUS FOR PROTECTING LEGITIMATE TRAFFIC FROM DoS AND DDoS ATTACKS
US7660998B2 (en) 2002-12-02 2010-02-09 Silverbrook Research Pty Ltd Relatively unique ID in integrated circuit
KR100680626B1 (en) 2002-12-20 2007-02-09 인터내셔널 비지네스 머신즈 코포레이션 Secure system and method for san management in a non-trusted server environment
US20040143749A1 (en) 2003-01-16 2004-07-22 Platformlogic, Inc. Behavior-based host-based intrusion prevention system
US7055008B2 (en) 2003-01-22 2006-05-30 Falconstor Software, Inc. System and method for backing up data
US7237109B2 (en) 2003-01-28 2007-06-26 Fisher- Rosemount Systems, Inc. Integrated security in a process plant having a process control system and a safety system
US7159086B2 (en) 2003-01-29 2007-01-02 Steven Bress Systems and methods for creating exact copies of computer long-term storage devices
US7322042B2 (en) 2003-02-07 2008-01-22 Broadon Communications Corp. Secure and backward-compatible processor and secure software execution thereon
US7249162B2 (en) 2003-02-25 2007-07-24 Microsoft Corporation Adaptive junk message filtering system
US8020192B2 (en) 2003-02-28 2011-09-13 Michael Wright Administration of protection of data accessible by a mobile device
US7219148B2 (en) 2003-03-03 2007-05-15 Microsoft Corporation Feedback loop for spam prevention
US7509644B2 (en) 2003-03-04 2009-03-24 Secure 64 Software Corp. Operating system capable of supporting a customized execution environment
GB2399902A (en) 2003-03-28 2004-09-29 Hewlett Packard Development Co Security in trusted computing systems
US7788724B2 (en) 2003-04-10 2010-08-31 Symantec Corporation System and method for detecting malicious applications
US7814310B2 (en) 2003-04-12 2010-10-12 Cavium Networks IPsec performance optimization
US7657757B2 (en) 2003-04-30 2010-02-02 Freescale Semiconductor, Inc. Semiconductor device and method utilizing variable mode control with block ciphers
US7409722B2 (en) 2003-05-01 2008-08-05 Sun Microsystems, Inc. Control status register access to enable domain reconfiguration
US7203874B2 (en) * 2003-05-08 2007-04-10 Micron Technology, Inc. Error detection, documentation, and correction in a flash memory device
US8086844B2 (en) 2003-06-03 2011-12-27 Broadcom Corporation Online trusted platform module
US7269702B2 (en) 2003-06-06 2007-09-11 Microsoft Corporation Trusted data store for use in connection with trusted computer operating system
US7089373B2 (en) 2003-06-12 2006-08-08 International Business Machines Corporation Shadow register to enhance lock acquisition
WO2005003907A2 (en) 2003-06-26 2005-01-13 Ebay Inc. Method and apparatus to authenticate and authorize user access to a system
US7392543B2 (en) 2003-06-30 2008-06-24 Symantec Corporation Signature extraction system and method
CN101241735B (en) 2003-07-07 2012-07-18 罗威所罗生股份有限公司 Method for replaying encrypted video and audio content
US7530103B2 (en) 2003-08-07 2009-05-05 Microsoft Corporation Projection of trustworthiness from a trusted environment to an untrusted environment
US7398390B2 (en) 2003-08-08 2008-07-08 Hewlett-Packard Development Company, L.P. Method and system for securing a computer system
US7415703B2 (en) 2003-09-25 2008-08-19 International Business Machines Corporation Loading software on a plurality of processors
US7146529B2 (en) 2003-09-25 2006-12-05 International Business Machines Corporation System and method for processor thread acting as a system service processor
US7236998B2 (en) 2003-09-25 2007-06-26 International Business Machines Corporation System and method for solving a large system of dense linear equations
US7478390B2 (en) 2003-09-25 2009-01-13 International Business Machines Corporation Task queue management of virtual devices using a plurality of processors
US7318218B2 (en) 2003-09-25 2008-01-08 International Business Machines Corporation System and method for processor thread for software debugging
US7516456B2 (en) 2003-09-25 2009-04-07 International Business Machines Corporation Asymmetric heterogeneous multi-threaded operating system
US7523157B2 (en) 2003-09-25 2009-04-21 International Business Machines Corporation Managing a plurality of processors as devices
US7444632B2 (en) 2003-09-25 2008-10-28 International Business Machines Corporation Balancing computational load across a plurality of processors
US7549145B2 (en) 2003-09-25 2009-06-16 International Business Machines Corporation Processor dedicated code handling in a multi-processor environment
US7496917B2 (en) 2003-09-25 2009-02-24 International Business Machines Corporation Virtual devices using a pluarlity of processors
US7389508B2 (en) 2003-09-25 2008-06-17 International Business Machines Corporation System and method for grouping processors and assigning shared memory space to a group in heterogeneous computer environment
US7685436B2 (en) 2003-10-02 2010-03-23 Itt Manufacturing Enterprises, Inc. System and method for a secure I/O interface
US20050091496A1 (en) 2003-10-23 2005-04-28 Hyser Chris D. Method and system for distributed key management in a secure boot environment
US7730318B2 (en) 2003-10-24 2010-06-01 Microsoft Corporation Integration of high-assurance features into an application through application factoring
US7814554B1 (en) 2003-11-06 2010-10-12 Gary Dean Ragner Dynamic associative storage security for long-term memory storage devices
US7290287B2 (en) 2003-11-20 2007-10-30 International Business Machines Corporation Security screening of electronic devices by device identifier
US7350079B2 (en) 2003-11-20 2008-03-25 International Business Machines Corporation Apparatus and method for inter-program authentication using dynamically-generated public/private key pairs
US20050114687A1 (en) 2003-11-21 2005-05-26 Zimmer Vincent J. Methods and apparatus to provide protection for firmware resources
FR2863076B1 (en) 2003-11-28 2006-02-03 Bull Sa HIGH SPEED CRYPTOGRAPHIC SYSTEM WITH MODULAR ARCHITECTURE.
EP1542181A1 (en) 2003-12-11 2005-06-15 Banksys S.A. Electronic data processing device
US7684563B1 (en) 2003-12-12 2010-03-23 Sun Microsystems, Inc. Apparatus and method for implementing a unified hash algorithm pipeline
US7641124B2 (en) 2003-12-17 2010-01-05 Qsecure, Inc. Magnetic data recording device
US8001348B2 (en) 2003-12-24 2011-08-16 Intel Corporation Method to qualify access to a block storage device via augmentation of the device's controller and firmware flow
US8005888B2 (en) 2003-12-30 2011-08-23 Microsoft Corporation Conflict fast consensus
US7472416B2 (en) 2004-01-09 2008-12-30 Cisco Technology, Inc. Preventing network reset denial of service attacks using embedded authentication information
US7178015B2 (en) 2004-01-12 2007-02-13 Hewlett-Packard Development Company, L.P. Security measures in a partitionable computing system
US7356678B2 (en) 2004-01-12 2008-04-08 Hewlett-Packard Development Company, L.P. Security measures in a partitionable computing system
US7296146B2 (en) 2004-01-12 2007-11-13 Hewlett-Packard Development Company, L.P. Security measures in a partitionable computing system
US7487542B2 (en) 2004-01-14 2009-02-03 International Business Machines Corporation Intrusion detection using a network processor and a parallel pattern detection engine
US7836219B1 (en) 2004-02-10 2010-11-16 Pmc-Sierra Us, Inc. System and method for authentication of embedded RAID on a host RAID card
US7577742B1 (en) 2004-02-11 2009-08-18 Adaptec, Inc. Account creation method and apparatus
US7603716B2 (en) 2004-02-13 2009-10-13 Microsoft Corporation Distributed network security service
US7814543B2 (en) 2004-02-13 2010-10-12 Microsoft Corporation System and method for securing a computer system connected to a network from attacks
US7716726B2 (en) 2004-02-13 2010-05-11 Microsoft Corporation System and method for protecting a computing device from computer exploits delivered over a networked environment in a secured communication
US7634655B2 (en) 2004-02-13 2009-12-15 Microsoft Corporation Efficient hash table protection for data transport protocols
US7984304B1 (en) 2004-03-02 2011-07-19 Vmware, Inc. Dynamic verification of validity of executable code
US7574608B2 (en) 2004-03-04 2009-08-11 International Business Machines Corporation Security screening of electronic devices by device-reported data
US7590728B2 (en) 2004-03-10 2009-09-15 Eric White System and method for detection of aberrant network behavior by clients of a network access gateway
US7840763B2 (en) 2004-03-12 2010-11-23 Sca Technica, Inc. Methods and systems for achieving high assurance computing using low assurance operating systems and processes
US7490350B1 (en) 2004-03-12 2009-02-10 Sca Technica, Inc. Achieving high assurance connectivity on computing devices and defeating blended hacking attacks
US7653727B2 (en) 2004-03-24 2010-01-26 Intel Corporation Cooperative embedded agents
US7751601B2 (en) 2004-10-04 2010-07-06 Validity Sensors, Inc. Fingerprint sensing assemblies and methods of making
US8074276B1 (en) 2004-04-19 2011-12-06 Parallels Holdings, Ltd. Method and system for administration of security services within a virtual execution environment (VEE) infrastructure
US7664965B2 (en) 2004-04-29 2010-02-16 International Business Machines Corporation Method and system for bootstrapping a trusted server having redundant trusted platform modules
US20050246529A1 (en) 2004-04-30 2005-11-03 Microsoft Corporation Isolated persistent identity storage for authentication of computing devies
US8266670B1 (en) 2004-05-06 2012-09-11 American Express Travel Related Services Company, Inc. System and method for dynamic security provisioning of data resources
US7546447B2 (en) 2004-05-08 2009-06-09 Intel Corporation Firmware interface runtime environment protection field
US7685644B2 (en) 2004-05-13 2010-03-23 Sap Ag Managing user access to data
WO2005111926A1 (en) 2004-05-18 2005-11-24 Silverbrook Research Pty Ltd Method and apparatus for security document tracking
US8090940B1 (en) 2004-06-01 2012-01-03 Cisco Technology, Inc. Method and system for verifying identification of an electronic message
US7594124B2 (en) 2004-06-09 2009-09-22 Intel Corporation Cross validation of data using multiple subsystems
US7305383B1 (en) 2004-06-10 2007-12-04 Cisco Technology, Inc. Processing system using bitmap array to compress deterministic finite automation state table allowing direct indexing
US7334154B2 (en) 2004-06-18 2008-02-19 Microsoft Corporation Efficient changing of replica sets in distributed fault-tolerant computing system
US7694150B1 (en) 2004-06-22 2010-04-06 Cisco Technology, Inc System and methods for integration of behavioral and signature based security
US7212199B2 (en) 2004-06-24 2007-05-01 International Business Machines Corporation System and method for terrain rendering using a limited memory footprint
US7716494B2 (en) 2004-07-15 2010-05-11 Sony Corporation Establishing a trusted platform in a digital processing system
US7565659B2 (en) 2004-07-15 2009-07-21 International Business Machines Corporation Light weight context switching
US7552326B2 (en) 2004-07-15 2009-06-23 Sony Corporation Use of kernel authorization data to maintain security in a digital processing system
US7581252B2 (en) 2004-07-20 2009-08-25 Lenovo (Singapore) Pte. Ltd. Storage conversion for anti-virus speed-up
US7581253B2 (en) 2004-07-20 2009-08-25 Lenovo (Singapore) Pte. Ltd. Secure storage tracking for anti-virus speed-up
US7627898B2 (en) 2004-07-23 2009-12-01 Microsoft Corporation Method and system for detecting infection of an operating system
US7480931B2 (en) 2004-07-24 2009-01-20 Bbs Technologies, Inc. Volume mount authentication
US7484247B2 (en) 2004-08-07 2009-01-27 Allen F Rozman System and method for protecting a computer system from malicious software
US7702922B2 (en) 2004-08-17 2010-04-20 Microsoft Corporation Physical encryption key system
US7303059B2 (en) 2004-08-19 2007-12-04 Roger D. Pugh Conveyor apparatus for placing articles in a single file
US7240137B2 (en) 2004-08-26 2007-07-03 International Business Machines Corporation System and method for message delivery across a plurality of processors
US7240182B2 (en) 2004-09-16 2007-07-03 International Business Machines Corporation System and method for providing a persistent function server
US7370189B2 (en) 2004-09-30 2008-05-06 Intel Corporation Method and apparatus for establishing safe processor operating points in connection with a secure boot
US7290112B2 (en) 2004-09-30 2007-10-30 International Business Machines Corporation System and method for virtualization of processor resources
US7818781B2 (en) 2004-10-01 2010-10-19 Microsoft Corporation Behavior blocking access control
US7506325B2 (en) 2004-10-07 2009-03-17 International Business Machines Corporation Partitioning processor resources based on memory usage
FR2876482B1 (en) 2004-10-07 2007-01-12 Siemens Transp Systems Soc Par SECURE OUTPUT CONTROL SEND DEVICE
US20060080661A1 (en) 2004-10-07 2006-04-13 International Business Machines Corporation System and method for hiding memory latency
US7720219B1 (en) 2004-10-19 2010-05-18 Oracle America, Inc. Apparatus and method for implementing a hash algorithm word buffer
US7716727B2 (en) 2004-10-29 2010-05-11 Microsoft Corporation Network security device and method for protecting a computing device in a networked environment
US7512699B2 (en) 2004-11-12 2009-03-31 International Business Machines Corporation Managing position independent code using a software framework
US7774462B2 (en) 2004-11-12 2010-08-10 International Business Machines Corporation Apparatus, system, and method for establishing an agency relationship to perform delegated computing tasks
US7784096B2 (en) 2004-11-15 2010-08-24 Microsoft Corporation Outgoing connection attempt limiting to slow down spreading of viruses
US8266676B2 (en) 2004-11-29 2012-09-11 Harris Corporation Method to verify the integrity of components on a trusted platform using integrity database services
US7987356B2 (en) 2004-11-29 2011-07-26 Broadcom Corporation Programmable security platform
US7551615B2 (en) 2004-12-29 2009-06-23 Intel Corporation Method for packet encapsulation and redirection of data packets
US7725703B2 (en) 2005-01-07 2010-05-25 Microsoft Corporation Systems and methods for securely booting a computer with a trusted processing module
US7386708B2 (en) 2005-01-13 2008-06-10 Lenovo (Singapore) Pte Ltd. Secure hardware personalization service
US7540026B1 (en) 2005-01-24 2009-05-26 Symantec Corporation No-execute processor feature global disabling prevention system and method
US7640438B2 (en) 2005-02-15 2009-12-29 Satyam Computer Services Ltd. System and method for protected content rendering
US7490353B2 (en) 2005-02-22 2009-02-10 Kidaro, Inc. Data transfer security
US7836299B2 (en) 2005-03-15 2010-11-16 Microsoft Corporation Virtualization of software configuration registers of the TPM cryptographic processor
US8286233B1 (en) 2005-03-19 2012-10-09 Avaya Inc. Apparatus and method for preventing eavesdropping
US7739517B2 (en) 2005-03-31 2010-06-15 Intel Corporation Hardware-based authentication of a software program
US7752428B2 (en) 2005-03-31 2010-07-06 Intel Corporation System and method for trusted early boot flow
US8161554B2 (en) 2005-04-26 2012-04-17 Cisco Technology, Inc. System and method for detection and mitigation of network worms
US7802111B1 (en) 2005-04-27 2010-09-21 Oracle America, Inc. System and method for limiting exposure of cryptographic keys protected by a trusted platform module
US7571312B2 (en) 2005-05-13 2009-08-04 Intel Corporation Methods and apparatus for generating endorsement credentials for software-based security coprocessors
US7587595B2 (en) 2005-05-13 2009-09-08 Intel Corporation Method and apparatus for providing software-based security coprocessors
US7949766B2 (en) 2005-06-22 2011-05-24 Cisco Technology, Inc. Offload stack for network, block and file input and output
US7594258B2 (en) 2005-06-27 2009-09-22 Yahoo! Inc. Access control systems and methods using visibility tokens with automatic propagation
US7739724B2 (en) 2005-06-30 2010-06-15 Intel Corporation Techniques for authenticated posture reporting and associated enforcement of network access
US8856473B2 (en) * 2005-07-01 2014-10-07 Red Hat, Inc. Computer system protection based on virtualization
US7962766B2 (en) 2005-07-14 2011-06-14 Atmel Corporation Method and system for encryption-based design obfuscation for an integrated circuit
US8225392B2 (en) 2005-07-15 2012-07-17 Microsoft Corporation Immunizing HTML browsers and extensions from known vulnerabilities
US7467285B2 (en) 2005-07-27 2008-12-16 Intel Corporation Maintaining shadow page tables in a sequestered memory region
US7421453B2 (en) 2005-08-16 2008-09-02 International Business Machines Corporation Asynchronous linked data structure traversal
US7735135B1 (en) 2005-08-31 2010-06-08 Juniper Networks, Inc. Hardware-based intrusion detection accelerator
US7765342B2 (en) 2005-09-07 2010-07-27 Florida State University Research Foundation Systems, methods, and computer program products for packing instructions into register files
US7921463B2 (en) 2005-09-30 2011-04-05 Intel Corporation Methods and apparatus for providing an insertion and integrity protection system associated with a wireless communication platform
JP2009512939A (en) 2005-10-21 2009-03-26 ヴァー2アス インコーポレイテッド Computer security method having operating system virtualization that allows multiple operating system instances to securely share a single machine resource
US8074231B2 (en) 2005-10-26 2011-12-06 Microsoft Corporation Configuration of isolated extensions and device drivers
US7620177B2 (en) 2005-10-31 2009-11-17 Hewlett-Packard Development Company, L.P. Secure printing
US7743418B2 (en) 2005-10-31 2010-06-22 Microsoft Corporation Identifying malware that employs stealth techniques
US7613937B2 (en) 2005-10-31 2009-11-03 Hewlett-Packard Development Company, L.P. Method and apparatus for utilizing a microcontroller to provide an automatic order and timing power and reset sequencer
KR100833488B1 (en) 2005-11-25 2008-05-29 한국전자통신연구원 Method and apparatus for storing of intrusion rule
US7490017B2 (en) 2005-11-29 2009-02-10 International Business Machines Corporation Analytical generation of software thermal profiles
US7395174B2 (en) 2005-11-29 2008-07-01 International Business Machines Corporation Generation of software thermal profiles executed on a set of processors using thermal sampling
US7512530B2 (en) 2005-11-29 2009-03-31 International Business Machines Corporation Generation of software thermal profiles for applications in a simulated environment
US7386414B2 (en) 2005-11-29 2008-06-10 International Business Machines Corporation Generation of hardware thermal profiles for a set of processors
US7698089B2 (en) 2005-11-29 2010-04-13 International Business Machines Corporation Generation of software thermal profiles executed on a set of processors using processor activity
US7845008B2 (en) 2005-12-07 2010-11-30 Lenovo (Singapore) Pte. Ltd. Virus scanner for journaling file system
US7900059B2 (en) 2005-12-13 2011-03-01 International Business Machines Corporation Sealing of data for applications
US8046755B2 (en) 2005-12-30 2011-10-25 Sap Ag Deploying software based on a calculated deployment risk level
US7930728B2 (en) 2006-01-06 2011-04-19 Intel Corporation Mechanism to support rights management in a pre-operating system environment
US7877734B2 (en) 2006-01-12 2011-01-25 International Business Machines Corporation Selective profiling of program code executing in a runtime environment
US7266475B1 (en) 2006-02-16 2007-09-04 International Business Machines Corporation Trust evaluation
US8190914B2 (en) 2006-02-28 2012-05-29 Red Hat, Inc. Method and system for designating and handling confidential memory allocations
US7886065B1 (en) 2006-03-28 2011-02-08 Symantec Corporation Detecting reboot events to enable NAC reassessment
US7802232B2 (en) 2006-03-31 2010-09-21 Microsoft Corporation Software robustness through search for robust runtime implementations
US7904278B2 (en) 2006-05-02 2011-03-08 The Johns Hopkins University Methods and system for program execution integrity measurement
US7596430B2 (en) 2006-05-03 2009-09-29 International Business Machines Corporation Selection of processor cores for optimal thermal performance
US8037893B2 (en) 2006-05-03 2011-10-18 International Business Machines Corporation Optimizing thermal performance using thermal flow analysis
US7552346B2 (en) 2006-05-03 2009-06-23 International Business Machines Corporation Dynamically adapting software for reducing a thermal state of a processor core based on its thermal index
US7454547B1 (en) 2006-05-16 2008-11-18 American Megatrends, Inc. Data exchange between a runtime environment and a computer firmware in a multi-processor computing system
US8281402B2 (en) 2006-05-16 2012-10-02 Intel Corporation Network vulnerability assessment of a host platform from an isolated partition in the host platform
US8099605B1 (en) 2006-06-05 2012-01-17 InventSec AB Intelligent storage device for backup system
US8024770B2 (en) 2006-06-21 2011-09-20 Microsoft Corporation Techniques for managing security contexts
US7765392B2 (en) 2006-06-29 2010-07-27 Intel Corporation Method and apparatus for establishing processor as core root of trust for measurement
US7797566B2 (en) 2006-07-11 2010-09-14 Check Point Software Technologies Ltd. Application cluster in security gateway for high availability and load sharing
US8190868B2 (en) 2006-08-07 2012-05-29 Webroot Inc. Malware management through kernel detection
US8141164B2 (en) 2006-08-21 2012-03-20 Citrix Systems, Inc. Systems and methods for dynamic decentralized load balancing across multiple sites
US8190917B2 (en) 2006-09-12 2012-05-29 International Business Machines Corporation System and method for securely saving and restoring a context of a secure program loader
US7660769B2 (en) 2006-09-12 2010-02-09 International Business Machines Corporation System and method for digital content player with secure processing vault
US7945789B2 (en) 2006-09-12 2011-05-17 International Business Machines Corporation System and method for securely restoring a program context from a shared memory
US8095802B2 (en) 2006-09-12 2012-01-10 International Business Machines Corporation System and method for securely saving a program context to a shared memory
GB2442023B (en) 2006-09-13 2011-03-02 Advanced Risc Mach Ltd Memory access security management
US8230509B2 (en) 2006-09-14 2012-07-24 Ca, Inc. System and method for using rules to protect against malware
US8201244B2 (en) 2006-09-19 2012-06-12 Microsoft Corporation Automated malware signature generation
US20080077749A1 (en) * 2006-09-22 2008-03-27 Daniel Scott Cohen Access control of memory space in microprocessor systems
US7712143B2 (en) 2006-09-27 2010-05-04 Blue Ridge Networks, Inc. Trusted enclave for a computer system
US8024691B2 (en) 2006-09-28 2011-09-20 Mcgill University Automata unit, a tool for designing checker circuitry and a method of manufacturing hardware circuitry incorporating checker circuitry
US7620727B2 (en) 2006-09-29 2009-11-17 Sap (Ag) Method and system for management protocol-based data streaming
JP4329801B2 (en) 2006-09-29 2009-09-09 ブラザー工業株式会社 Communication device
US8241115B2 (en) 2006-10-09 2012-08-14 Wms Gaming Inc. Multiple key failover validation in a wagering game machine
WO2008085579A2 (en) 2006-10-25 2008-07-17 Spyrus, Inc. Method and system for deploying advanced cryptographic algorithms
US8108905B2 (en) 2006-10-26 2012-01-31 International Business Machines Corporation System and method for an isolated process to control address translation
US7870336B2 (en) 2006-11-03 2011-01-11 Microsoft Corporation Operating system protection against side-channel attacks on secrecy
US8032764B2 (en) 2006-11-14 2011-10-04 Texas Instruments Incorporated Electronic devices, information products, processes of manufacture and apparatus for enabling code decryption in a secure mode using decryption wrappers and key programming applications, and other structures
US8181248B2 (en) 2006-11-23 2012-05-15 Electronics And Telecommunications Research Institute System and method of detecting anomaly malicious code by using process behavior prediction technique
US8225093B2 (en) 2006-12-05 2012-07-17 Qualcomm Incorporated Providing secure inter-application communication for a mobile operating environment
US7921453B2 (en) 2006-12-22 2011-04-05 Intel Corporation Authenticated distributed detection and inference
US20080155277A1 (en) 2006-12-26 2008-06-26 Mallik Bulusu Hardware partitioned trust
US8209542B2 (en) 2006-12-29 2012-06-26 Intel Corporation Methods and apparatus for authenticating components of processing systems
US8132259B2 (en) 2007-01-04 2012-03-06 International Business Machines Corporation System and method for security planning with soft security constraints
US7840637B2 (en) 2007-02-21 2010-11-23 The Go Daddy Group, Inc. Community web site for creating and maintaining a web hosting community
US8146084B1 (en) 2007-02-21 2012-03-27 Adobe Systems Incorporated Loading applications in non-designated isolation environments
US7752350B2 (en) 2007-02-23 2010-07-06 International Business Machines Corporation System and method for efficient implementation of software-managed cache
US8752032B2 (en) 2007-02-23 2014-06-10 Irdeto Canada Corporation System and method of interlocking to protect software-mediated program and device behaviours
US7934063B2 (en) 2007-03-29 2011-04-26 International Business Machines Corporation Invoking externally assisted calls from an isolated environment
US8127412B2 (en) 2007-03-30 2012-03-06 Cisco Technology, Inc. Network context triggers for activating virtualized computer applications
US7945786B2 (en) 2007-03-30 2011-05-17 Intel Corporation Method and apparatus to re-create trust model after sleep state
US8276164B2 (en) 2007-05-03 2012-09-25 Apple Inc. Data parallel computing on multiple processors
US8286196B2 (en) 2007-05-03 2012-10-09 Apple Inc. Parallel runtime execution on multiple processors
US7908656B1 (en) 2007-04-23 2011-03-15 Network Appliance, Inc. Customized data generating data storage system filter for data security
US8239925B2 (en) 2007-04-26 2012-08-07 Varonis Systems, Inc. Evaluating removal of access permissions
US8001596B2 (en) 2007-05-03 2011-08-16 Microsoft Corporation Software protection injection at load time
US8001390B2 (en) 2007-05-09 2011-08-16 Sony Computer Entertainment Inc. Methods and apparatus for secure programming and storage of data using a multiprocessor in a trusted mode
EP2075696A3 (en) 2007-05-10 2010-01-27 Texas Instruments Incorporated Interrupt- related circuits, systems and processes
US7886150B2 (en) 2007-05-11 2011-02-08 Mips Technologies, Inc. System debug and trace system and method, and applications thereof
US7899987B2 (en) * 2007-05-15 2011-03-01 Sandisk Il Ltd. File storage in a computer system with diverse storage media
US7886162B2 (en) 2007-05-29 2011-02-08 International Business Machines Corporation Cryptographic secure program overlays
US7917605B1 (en) 2007-07-24 2011-03-29 United Services Automobile Association (Usaa) Automated registration and licensing tool
US8108498B2 (en) 2007-07-26 2012-01-31 Dell Products, Lp System and method of enabling access to remote information handling systems
US7877602B2 (en) 2007-07-27 2011-01-25 International Business Machines Corporation Transparent aware data transformation at file system level for efficient encryption and integrity validation of network files
US8060876B2 (en) 2007-08-10 2011-11-15 Intel Corporation Methods and apparatus for creating an isolated partition for a virtual trusted platform module
US7613861B2 (en) 2007-08-14 2009-11-03 Dell Products, Lp System and method of obtaining error data within an information handling system
US8220062B1 (en) 2007-08-16 2012-07-10 Google Inc. Double sand-boxing for flash library
US7941828B2 (en) 2007-08-24 2011-05-10 The Boeing Company Method and apparatus for simultaneous viewing of two isolated data sources
US7827371B2 (en) 2007-08-30 2010-11-02 Intel Corporation Method for isolating third party pre-boot firmware from trusted pre-boot firmware
US7917716B2 (en) 2007-08-31 2011-03-29 Standard Microsystems Corporation Memory protection for embedded controllers
US8131784B1 (en) 2007-09-26 2012-03-06 Network Appliance, Inc. Multiple node quota filter
US7783666B1 (en) 2007-09-26 2010-08-24 Netapp, Inc. Controlling access to storage resources by using access pattern based quotas
US8166304B2 (en) 2007-10-02 2012-04-24 International Business Machines Corporation Support for multiple security policies on a unified authentication architecture
US7996896B2 (en) 2007-10-19 2011-08-09 Trend Micro Incorporated System for regulating host security configuration
US8056121B2 (en) 2007-10-26 2011-11-08 International Business Machines Corporation Virtual universe account protection
US8006103B2 (en) 2007-10-26 2011-08-23 Hewlett-Packard Development Company, L.P. TPM device for multi-processor systems
IL187043A0 (en) 2007-10-30 2008-02-09 Sandisk Il Ltd Secure pipeline manager
US8220029B2 (en) 2007-11-13 2012-07-10 Samsung Electronics Co., Ltd. Method and system for enforcing trusted computing policies in a hypervisor security module architecture
US8171309B1 (en) 2007-11-16 2012-05-01 Marvell International Ltd. Secure memory controlled access
US7733117B1 (en) 2007-11-20 2010-06-08 Freescale Semiconductor, Inc. Method for protecting a security real time clock generator and a device having protection capabilities
US7827326B2 (en) 2007-11-26 2010-11-02 Alcatel-Lucent Usa Inc. Method and apparatus for delegation of secure operating mode access privilege from processor to peripheral
US7730248B2 (en) 2007-12-13 2010-06-01 Texas Instruments Incorporated Interrupt morphing and configuration, circuits, systems and processes
US7827359B2 (en) 2007-12-14 2010-11-02 Spansion Llc Clock encoded pre-fetch to access memory data in clustering network environment
US8205260B2 (en) 2007-12-19 2012-06-19 Symantec Operating Corporation Detection of window replacement by a malicious software program
US7962738B2 (en) 2007-12-20 2011-06-14 Intel Corporation Hypervisor runtime integrity support
US8032942B2 (en) 2007-12-31 2011-10-04 Intel Corporation Configuration of virtual trusted platform module
US8042190B2 (en) 2007-12-31 2011-10-18 Intel Corporation Pre-boot protected memory channel
US7703507B2 (en) 2008-01-04 2010-04-27 Intelligent Tools Ip, Llc Downhole tool delivery system
US7966465B2 (en) 2008-01-17 2011-06-21 Broadcom Corporation Method and system for secure code encryption for PC-slave devices
US8160975B2 (en) 2008-01-25 2012-04-17 Mcafee, Inc. Granular support vector machine with random granularity
US7890591B2 (en) 2008-01-31 2011-02-15 International Business Machines Corporation Method for an efficient electronic messaging system
US8171554B2 (en) 2008-02-04 2012-05-01 Yuval Elovici System that provides early detection, alert, and response to electronic threats
US20090216680A1 (en) 2008-02-26 2009-08-27 Battelle Energy Alliance, Llc Systems and Methods for Performing File Distribution and Purchase
US9015704B2 (en) 2008-03-24 2015-04-21 International Business Machines Corporation Context agent injection using virtual machine introspection
US8135838B2 (en) 2008-04-08 2012-03-13 Geminare Incorporated System and method for providing data and application continuity in a computer system
US8175266B2 (en) 2008-05-07 2012-05-08 Apple Inc. System and method of performing authentication
US8036378B2 (en) 2008-05-07 2011-10-11 Apple Inc. System and method of authentication
US8978132B2 (en) 2008-05-24 2015-03-10 Via Technologies, Inc. Apparatus and method for managing a microprocessor providing for a secure execution mode
US8272059B2 (en) 2008-05-28 2012-09-18 International Business Machines Corporation System and method for identification and blocking of malicious code for web browser script engines
US7966664B2 (en) 2008-06-03 2011-06-21 Hewlett-Packard Development Company, L.P. Error and exception message handling framework
US8185749B2 (en) 2008-09-02 2012-05-22 Apple Inc. System and method for revising boolean and arithmetic operations
US8122235B2 (en) 2008-06-10 2012-02-21 Dell Products, Lp System and method of delaying power-up of an information handling system
US8266597B2 (en) 2008-06-16 2012-09-11 International Business Machines Corporation Dynamically patching computer code using breakpoints
US7984286B2 (en) 2008-06-25 2011-07-19 Intel Corporation Apparatus and method for secure boot environment
US8171336B2 (en) 2008-06-27 2012-05-01 Freescale Semiconductor, Inc. Method for protecting a secured real time clock module and a device having protection capabilities
US8261320B1 (en) 2008-06-30 2012-09-04 Symantec Corporation Systems and methods for securely managing access to data
US8140825B2 (en) 2008-08-05 2012-03-20 International Business Machines Corporation Systems and methods for selectively closing pages in a memory
US8010804B2 (en) 2008-08-08 2011-08-30 International Business Machines Corporation Method to protect secrets against encrypted section attack
US8051467B2 (en) 2008-08-26 2011-11-01 Atmel Corporation Secure information processing
US8086480B2 (en) 2008-09-25 2011-12-27 Ebay Inc. Methods and systems for activity-based recommendations
EP2346428B1 (en) 2008-09-25 2019-11-06 Zeltiq Aesthetics, Inc. Treatment planning systems and methods for body contouring applications
US8209521B2 (en) 2008-10-18 2012-06-26 Micron Technology, Inc. Methods of indirect register access including automatic modification of a directly accessible address register
US8136167B1 (en) 2008-10-20 2012-03-13 Google Inc. Systems and methods for providing image feedback
US8094816B2 (en) 2008-10-21 2012-01-10 Apple Inc. System and method for stream/block cipher with internal random states
US9166797B2 (en) 2008-10-24 2015-10-20 Microsoft Technology Licensing, Llc Secured compartment for transactions
US8051097B2 (en) 2008-12-15 2011-11-01 Apple Inc. System and method for authentication using a shared table and sorting exponentiation
US8213618B2 (en) 2008-12-30 2012-07-03 Intel Corporation Protecting content on client platforms
US8103883B2 (en) 2008-12-31 2012-01-24 Intel Corporation Method and apparatus for enforcing use of danbury key management services for software applied full volume encryption
US8140780B2 (en) 2008-12-31 2012-03-20 Micron Technology, Inc. Systems, methods, and devices for configuring a device
US8281395B2 (en) 2009-01-07 2012-10-02 Micron Technology, Inc. Pattern-recognition processor with matching-data reporting module
US8225110B2 (en) 2009-01-09 2012-07-17 Telefonaktiebolaget Lm Ericsson (Publ) Cryptographic protection of usage restrictions in electronic devices
JP5317807B2 (en) * 2009-04-13 2013-10-16 株式会社日立製作所 File control system and file control computer used therefor
US8191126B2 (en) 2009-05-04 2012-05-29 Indian Institute Of Technology Madras Methods and devices for pattern-based user authentication
US8286004B2 (en) 2009-10-09 2012-10-09 Lsi Corporation Saving encryption keys in one-time programmable memory
US8132073B1 (en) 2009-06-30 2012-03-06 Emc Corporation Distributed storage system with enhanced security
US8255991B1 (en) 2009-08-17 2012-08-28 Google Inc. Computer application pre-permissioning
EP3002683B1 (en) 2009-12-14 2017-07-12 Citrix Systems Inc. Methods and systems for communicating between trusted and non-trusted virtual machines
US8024581B2 (en) 2009-12-18 2011-09-20 CompuGroup Medical AG Computer readable storage medium for generating a pseudonym, computer implemented method and computing device
US8209510B1 (en) 2010-01-13 2012-06-26 Juniper Networks, Inc. Secure pool memory management
JP5463940B2 (en) 2010-02-03 2014-04-09 株式会社リコー Sheet feeding apparatus and image forming apparatus
US8195984B2 (en) 2010-05-26 2012-06-05 Telcordia Technologies, Inc. System and method for a staggered execution environment
US9009386B2 (en) * 2010-12-13 2015-04-14 International Business Machines Corporation Systems and methods for managing read-only memory
US8261085B1 (en) 2011-06-22 2012-09-04 Media Patents, S.L. Methods, apparatus and systems to improve security in computer systems
US8261090B1 (en) 2011-09-28 2012-09-04 Google Inc. Login to a computing device based on facial recognition
US8239918B1 (en) 2011-10-11 2012-08-07 Google Inc. Application marketplace administrative controls
WO2014046974A2 (en) 2012-09-20 2014-03-27 Case Paul Sr Case secure computer architecture

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110145923A1 (en) * 2000-05-19 2011-06-16 Vir2Us, Inc. Computer having special purpose subsystems and cyber-terror and virus immunity and protection features
US7389427B1 (en) * 2000-09-28 2008-06-17 Intel Corporation Mechanism to secure computer output from software attack using isolated execution
US7269825B1 (en) * 2002-12-27 2007-09-11 Unisys Corporation Method and system for relative address translation
US8010772B2 (en) * 2007-04-03 2011-08-30 Arm Limited Protected function calling
US20110154500A1 (en) * 2009-12-23 2011-06-23 Sahita Ravi L Executing Trusted Applications with Reduced Trusted Computing Base

Also Published As

Publication number Publication date
US9122633B2 (en) 2015-09-01
US20140082344A1 (en) 2014-03-20
WO2014046974A2 (en) 2014-03-27
US20150127918A1 (en) 2015-05-07
US8938796B2 (en) 2015-01-20

Similar Documents

Publication Publication Date Title
WO2014046974A3 (en) Case secure computer architecture
IN2014CN04774A (en)
WO2014025492A3 (en) System and method for visualizing an object in a simulated environment
BR112013006110A2 (en) gesture-based interaction with traffic data
WO2011142933A3 (en) Real time mission planning
WO2013093706A3 (en) User interfaces with peep-hole and associate! apparatus and methods
SG10201407589UA (en) Systems and methods for security verification in electronic learning systems and other systems
WO2012021902A3 (en) Methods and systems for interaction through gestures
IN2013MU03647A (en)
MX2016003190A (en) Virtual machine manager facilitated selective code integrity enforcement.
WO2014066580A3 (en) Augmented reality control systems
EP2750032A3 (en) Methods and systems for generation and execution of miniapp of computer application served by cloud computing system
WO2013186638A3 (en) Analyzing user interaction
IN2015DN03806A (en)
WO2012096849A3 (en) System and method for controlling excessive parallelism in multiprocessor systems
WO2011084385A3 (en) Adaptive virtual environment management system
MX2016006736A (en) Method and system for providing loyalty enhanced user interface in a fuel dispensing environment.
GB2520856A (en) Enabling Virtualization of a processor resource
WO2012061090A3 (en) Conditional execution of regular expressions
WO2011086473A3 (en) Hardware virtualization for media processing
MX2016012528A (en) Dispatching multiple threads in a computer.
GB201318024D0 (en) Virtual bios
WO2014194148A3 (en) Systems and methods involving gesture based user interaction, user interface and/or other features
WO2014130773A3 (en) Engagement and experience based ranking
WO2011087892A3 (en) Persistent application activation and timer notifications

Legal Events

Date Code Title Description
122 Ep: pct application non-entry in european phase

Ref document number: 13838179

Country of ref document: EP

Kind code of ref document: A2