US4152761A
(en)
|
1976-07-28 |
1979-05-01 |
Intel Corporation |
Multi-task digital processor employing a priority
|
US4328542A
(en)
|
1979-11-07 |
1982-05-04 |
The Boeing Company |
Secure implementation of transition machine computer
|
US4530049A
(en)
|
1982-02-11 |
1985-07-16 |
At&T Bell Laboratories |
Stack cache with fixed size stack frames
|
US4553202A
(en)
|
1982-05-06 |
1985-11-12 |
International Business Machines Corporation |
User controlled dialog resource switching in a multi-tasking word processor
|
EP0175487A3
(en)
|
1984-08-23 |
1989-03-08 |
Btg International Limited |
Software protection device
|
US4775246A
(en)
|
1985-04-17 |
1988-10-04 |
Pitney Bowes Inc. |
System for detecting unaccounted for printing in a value printing system
|
US5047925A
(en)
|
1985-05-06 |
1991-09-10 |
Motorola, Inc. |
Logical ring in a virtual single machine
|
US5075884A
(en)
|
1987-12-23 |
1991-12-24 |
Loral Aerospace Corp. |
Multilevel secure workstation
|
US5581763A
(en)
|
1988-06-14 |
1996-12-03 |
Progressive Technology Inc. |
Secure architecture and apparatus using an independent computer cartridge
|
US5057996A
(en)
|
1989-06-29 |
1991-10-15 |
Digital Equipment Corporation |
Waitable object creation system and method in an object based computer operating system
|
US5136712A
(en)
|
1989-06-29 |
1992-08-04 |
Digital Equipment Corporation |
Temporary object handling system and method in an object based computer operating system
|
US5129083A
(en)
|
1989-06-29 |
1992-07-07 |
Digital Equipment Corporation |
Conditional object creating system having different object pointers for accessing a set of data structure objects
|
US5129084A
(en)
|
1989-06-29 |
1992-07-07 |
Digital Equipment Corporation |
Object container transfer system and method in an object based computer operating system
|
US5187790A
(en)
|
1989-06-29 |
1993-02-16 |
Digital Equipment Corporation |
Server impersonation of client processes in an object based computer operating system
|
US5297283A
(en)
|
1989-06-29 |
1994-03-22 |
Digital Equipment Corporation |
Object transferring system and method in an object based computer operating system
|
US4987595A
(en)
|
1989-09-11 |
1991-01-22 |
Motorola, Inc. |
Secure cryptographic processor arrangement
|
US5469556A
(en)
|
1989-12-12 |
1995-11-21 |
Harris Corporation |
Resource access security system for controlling access to resources of a data processing system
|
US5029206A
(en)
*
|
1989-12-27 |
1991-07-02 |
Motorola, Inc. |
Uniform interface for cryptographic services
|
US5504814A
(en)
|
1991-07-10 |
1996-04-02 |
Hughes Aircraft Company |
Efficient security kernel for the 80960 extended architecture
|
FR2683344B1
(en)
|
1991-10-30 |
1996-09-20 |
Bull Sa |
MULTIPROCESSOR SYSTEM WITH MICROPROGRAMS FOR THE DISTRIBUTION OF PROCESSES TO PROCESSORS.
|
US5412717A
(en)
|
1992-05-15 |
1995-05-02 |
Fischer; Addison M. |
Computer system security method and apparatus having program authorization information data structures
|
US5367571A
(en)
|
1992-12-02 |
1994-11-22 |
Scientific-Atlanta, Inc. |
Subscriber terminal with plug in expansion card
|
US6948070B1
(en)
|
1995-02-13 |
2005-09-20 |
Intertrust Technologies Corporation |
Systems and methods for secure transaction management and electronic rights protection
|
US7133845B1
(en)
|
1995-02-13 |
2006-11-07 |
Intertrust Technologies Corp. |
System and methods for secure transaction management and electronic rights protection
|
US6157721A
(en)
|
1996-08-12 |
2000-12-05 |
Intertrust Technologies Corp. |
Systems and methods using cryptography to protect secure computing environments
|
DE69638018D1
(en)
|
1995-02-13 |
2009-10-15 |
Intertrust Tech Corp |
Systems and procedures for managing secure transactions and protecting electronic rights
|
US7095854B1
(en)
|
1995-02-13 |
2006-08-22 |
Intertrust Technologies Corp. |
Systems and methods for secure transaction management and electronic rights protection
|
US5892900A
(en)
|
1996-08-30 |
1999-04-06 |
Intertrust Technologies Corp. |
Systems and methods for secure transaction management and electronic rights protection
|
US7124302B2
(en)
|
1995-02-13 |
2006-10-17 |
Intertrust Technologies Corp. |
Systems and methods for secure transaction management and electronic rights protection
|
US7069451B1
(en)
|
1995-02-13 |
2006-06-27 |
Intertrust Technologies Corp. |
Systems and methods for secure transaction management and electronic rights protection
|
US5581700A
(en)
|
1995-08-11 |
1996-12-03 |
Dell U.S.A., L.P. |
Hierarchical multiple password acceptance system
|
US5870473A
(en)
|
1995-12-14 |
1999-02-09 |
Cybercash, Inc. |
Electronic transfer system and method
|
JP2000503154A
(en)
|
1996-01-11 |
2000-03-14 |
エムアールジェイ インコーポレイテッド |
System for controlling access and distribution of digital ownership
|
US5867647A
(en)
|
1996-02-09 |
1999-02-02 |
Secure Computing Corporation |
System and method for securing compiled program code
|
US5815718A
(en)
|
1996-05-30 |
1998-09-29 |
Sun Microsystems, Inc. |
Method and system for loading classes in read-only memory
|
US5748736A
(en)
|
1996-06-14 |
1998-05-05 |
Mittra; Suvo |
System and method for secure group communications via multicast or broadcast
|
US6708274B2
(en)
|
1998-04-30 |
2004-03-16 |
Intel Corporation |
Cryptographically protected paging subsystem
|
US6078612A
(en)
|
1997-05-16 |
2000-06-20 |
Itt Manufacturing Enterprises, Inc. |
Radio architecture for an advanced digital radio in a digital communication system
|
US5949973A
(en)
|
1997-07-25 |
1999-09-07 |
Memco Software, Ltd. |
Method of relocating the stack in a computer system for preventing overrate by an exploit program
|
US6144739A
(en)
|
1998-01-20 |
2000-11-07 |
Motorola, Inc. |
Computer network protection using cryptographic sealing software agents and objects
|
US7809138B2
(en)
|
1999-03-16 |
2010-10-05 |
Intertrust Technologies Corporation |
Methods and apparatus for persistent control and protection of content
|
US6098171A
(en)
|
1998-03-31 |
2000-08-01 |
International Business Machines Corporation |
Personal computer ROM scan startup protection
|
US6240493B1
(en)
|
1998-04-17 |
2001-05-29 |
Motorola, Inc. |
Method and apparatus for performing access censorship in a data processing system
|
US6865672B1
(en)
|
1998-05-18 |
2005-03-08 |
Spearhead Technologies, Ltd. |
System and method for securing a computer communication network
|
US6496871B1
(en)
|
1998-06-30 |
2002-12-17 |
Nec Research Institute, Inc. |
Distributed agent software system and method having enhanced process mobility and communication in a computer network
|
US6311270B1
(en)
|
1998-09-14 |
2001-10-30 |
International Business Machines Corporation |
Method and apparatus for securing communication utilizing a security processor
|
US6385727B1
(en)
|
1998-09-25 |
2002-05-07 |
Hughes Electronics Corporation |
Apparatus for providing a secure processing environment
|
US6321335B1
(en)
|
1998-10-30 |
2001-11-20 |
Acqis Technology, Inc. |
Password protected modular computer method and device
|
US6370648B1
(en)
|
1998-12-08 |
2002-04-09 |
Visa International Service Association |
Computer network intrusion detection
|
IL143573A0
(en)
|
1998-12-09 |
2002-04-21 |
Network Ice Corp |
A method and apparatus for providing network and computer system security
|
US6449652B1
(en)
|
1999-01-04 |
2002-09-10 |
Emc Corporation |
Method and apparatus for providing secure access to a computer system resource
|
US6347371B1
(en)
|
1999-01-25 |
2002-02-12 |
Dell Usa, L.P. |
System and method for initiating operation of a computer system
|
US6480961B2
(en)
|
1999-03-02 |
2002-11-12 |
Audible, Inc. |
Secure streaming of digital audio/visual content
|
US6434627B1
(en)
|
1999-03-15 |
2002-08-13 |
Cisco Technology, Inc. |
IP network for accomodating mobile users with incompatible network addressing
|
US6424953B1
(en)
|
1999-03-19 |
2002-07-23 |
Compaq Computer Corp. |
Encrypting secrets in a file for an electronic micro-commerce system
|
US6651171B1
(en)
|
1999-04-06 |
2003-11-18 |
Microsoft Corporation |
Secure execution of program code
|
US6775779B1
(en)
|
1999-04-06 |
2004-08-10 |
Microsoft Corporation |
Hierarchical trusted code for content protection in computers
|
US6804778B1
(en)
|
1999-04-15 |
2004-10-12 |
Gilian Technologies, Ltd. |
Data quality assurance
|
US6643777B1
(en)
|
1999-05-14 |
2003-11-04 |
Acquis Technology, Inc. |
Data security method and device for computer modules
|
EP1055990A1
(en)
|
1999-05-28 |
2000-11-29 |
Hewlett-Packard Company |
Event logging in a computing platform
|
US6981155B1
(en)
|
1999-07-14 |
2005-12-27 |
Symantec Corporation |
System and method for computer security
|
US7117532B1
(en)
|
1999-07-14 |
2006-10-03 |
Symantec Corporation |
System and method for generating fictitious content for a computer
|
US7461402B1
(en)
|
1999-07-14 |
2008-12-02 |
Symantec Corporation |
System and method for preventing detection of a selected process running on a computer
|
US7152239B1
(en)
|
1999-07-14 |
2006-12-19 |
Symantec Corporation |
System and method for preventing detection of a computer connection to an external device
|
EP1076279A1
(en)
|
1999-08-13 |
2001-02-14 |
Hewlett-Packard Company |
Computer platforms and their methods of operation
|
US7124170B1
(en)
|
1999-08-20 |
2006-10-17 |
Intertrust Technologies Corp. |
Secure processing unit systems and methods
|
US6996843B1
(en)
|
1999-08-30 |
2006-02-07 |
Symantec Corporation |
System and method for detecting computer intrusions
|
US7065657B1
(en)
|
1999-08-30 |
2006-06-20 |
Symantec Corporation |
Extensible intrusion detection system
|
US6647400B1
(en)
|
1999-08-30 |
2003-11-11 |
Symantec Corporation |
System and method for analyzing filesystems to detect intrusions
|
US7203962B1
(en)
|
1999-08-30 |
2007-04-10 |
Symantec Corporation |
System and method for using timestamps to detect attacks
|
US6826697B1
(en)
|
1999-08-30 |
2004-11-30 |
Symantec Corporation |
System and method for detecting buffer overflow attacks
|
US7085936B1
(en)
|
1999-08-30 |
2006-08-01 |
Symantec Corporation |
System and method for using login correlations to detect intrusions
|
US6751737B1
(en)
|
1999-10-07 |
2004-06-15 |
Advanced Micro Devices |
Multiple protected mode execution environments using multiple register sets and meta-protected instructions
|
US6671811B1
(en)
|
1999-10-25 |
2003-12-30 |
Visa Internation Service Association |
Features generation for use in computer network intrusion detection
|
US6769066B1
(en)
|
1999-10-25 |
2004-07-27 |
Visa International Service Association |
Method and apparatus for training a neural network model for use in computer network intrusion detection
|
US7281268B2
(en)
|
1999-11-14 |
2007-10-09 |
Mcafee, Inc. |
System, method and computer program product for detection of unwanted processes
|
US6859805B1
(en)
|
1999-11-29 |
2005-02-22 |
Actuate Corporation |
Method and apparatus for generating page-level security in a computer generated report
|
US7117374B2
(en)
|
2000-03-24 |
2006-10-03 |
Intermec Ip Corp |
Apparatus and method for gathering and utilizing data
|
US6957332B1
(en)
|
2000-03-31 |
2005-10-18 |
Intel Corporation |
Managing a secure platform using a hierarchical executive architecture in isolated execution mode
|
US6507904B1
(en)
|
2000-03-31 |
2003-01-14 |
Intel Corporation |
Executing isolated mode instructions in a secure system running in privilege rings
|
US6678825B1
(en)
|
2000-03-31 |
2004-01-13 |
Intel Corporation |
Controlling access to multiple isolated memories in an isolated execution environment
|
US7111176B1
(en)
|
2000-03-31 |
2006-09-19 |
Intel Corporation |
Generating isolated bus cycles for isolated execution
|
US7082615B1
(en)
|
2000-03-31 |
2006-07-25 |
Intel Corporation |
Protecting software environment in isolated execution
|
US6996710B1
(en)
|
2000-03-31 |
2006-02-07 |
Intel Corporation |
Platform and method for issuing and certifying a hardware-protected attestation key
|
US7013484B1
(en)
|
2000-03-31 |
2006-03-14 |
Intel Corporation |
Managing a secure environment using a chipset in isolated execution mode
|
US7089418B1
(en)
|
2000-03-31 |
2006-08-08 |
Intel Corporation |
Managing accesses in a processor for isolated execution
|
US6831660B1
(en)
|
2000-06-15 |
2004-12-14 |
International Business Machines Corporation |
Method and apparatus for graphics window clipping management in a data processing system
|
US6775776B1
(en)
|
2000-06-27 |
2004-08-10 |
Intel Corporation |
Biometric-based authentication in a nonvolatile memory device
|
US7051200B1
(en)
|
2000-06-27 |
2006-05-23 |
Microsoft Corporation |
System and method for interfacing a software process to secure repositories
|
US7155615B1
(en)
|
2000-06-30 |
2006-12-26 |
Intel Corporation |
Method and apparatus for providing a secure-private partition on a hard disk drive of a computer system via IDE controller
|
US6907533B2
(en)
|
2000-07-14 |
2005-06-14 |
Symantec Corporation |
System and method for computer security using multiple cages
|
GB0020441D0
(en)
|
2000-08-18 |
2000-10-04 |
Hewlett Packard Co |
Performance of a service on a computing platform
|
US7302705B1
(en)
|
2000-08-30 |
2007-11-27 |
International Business Machines Corporation |
Method and apparatus for tracing a denial-of-service attack back to its source
|
US7032114B1
(en)
|
2000-08-30 |
2006-04-18 |
Symantec Corporation |
System and method for using signatures to detect computer intrusions
|
GB2366692B
(en)
|
2000-08-31 |
2002-08-14 |
F Secure Oyj |
Virus protection in an internet environment
|
US6628284B1
(en)
|
2000-09-07 |
2003-09-30 |
International Business Machines Corporation |
Method and apparatus for processing graphics perspective transformations
|
US7613917B1
(en)
|
2000-09-18 |
2009-11-03 |
Navteq North America, Llc |
Method and system for mass distribution of geographic data for navigation systems
|
US7149888B1
(en)
*
|
2000-09-29 |
2006-12-12 |
Intel Corporation |
Method and apparatus for booting the operating environment of an autonomous subsystem in a computer based system without involvement of the main operating system
|
GB2406416A
(en)
|
2000-10-31 |
2005-03-30 |
Advanced Risc Mach Ltd |
Describing an integrated circuit configuration
|
GB0026803D0
(en)
|
2000-11-02 |
2000-12-20 |
Multimedia Engineering Company |
Securized method for communicating and providing services on digital networks and implementing architecture
|
US7103915B2
(en)
|
2000-11-13 |
2006-09-05 |
Digital Doors, Inc. |
Data security system and method
|
US8176563B2
(en)
|
2000-11-13 |
2012-05-08 |
DigitalDoors, Inc. |
Data security system and method with editor
|
US7322047B2
(en)
|
2000-11-13 |
2008-01-22 |
Digital Doors, Inc. |
Data security system and method associated with data mining
|
US7313825B2
(en)
|
2000-11-13 |
2007-12-25 |
Digital Doors, Inc. |
Data security system and method for portable device
|
US6938164B1
(en)
|
2000-11-22 |
2005-08-30 |
Microsoft Corporation |
Method and system for allowing code to be securely initialized in a computer
|
GB2376763B
(en)
|
2001-06-19 |
2004-12-15 |
Hewlett Packard Co |
Demonstrating integrity of a compartment of a compartmented operating system
|
CA2327911A1
(en)
|
2000-12-08 |
2002-06-08 |
Cloakware Corporation |
Obscuring functions in computer software
|
US6708086B2
(en)
|
2000-12-11 |
2004-03-16 |
Sue M. Richard |
Vehicle computer
|
US7150045B2
(en)
|
2000-12-14 |
2006-12-12 |
Widevine Technologies, Inc. |
Method and apparatus for protection of electronic media
|
US6621492B2
(en)
|
2000-12-18 |
2003-09-16 |
International Business Machines Corporation |
Method and apparatus using primitive bounding volumes to improve the accuracy of BSP-trees
|
US6624810B2
(en)
|
2000-12-18 |
2003-09-23 |
International Business Machines Corporation |
Tightened bounding volumes for BSP-trees
|
US6813522B1
(en)
|
2000-12-29 |
2004-11-02 |
Emc Corporation |
Method of sharing memory in a multi-processor system including a cloning of code and data
|
US6947989B2
(en)
|
2001-01-29 |
2005-09-20 |
International Business Machines Corporation |
System and method for provisioning resources to users based on policies, roles, organizational information, and attributes
|
US6871232B2
(en)
|
2001-03-06 |
2005-03-22 |
International Business Machines Corporation |
Method and system for third party resource provisioning management
|
US6985955B2
(en)
|
2001-01-29 |
2006-01-10 |
International Business Machines Corporation |
System and method for provisioning resources to users based on roles, organizational information, attributes and third-party information or authorizations
|
US6917364B2
(en)
|
2001-01-31 |
2005-07-12 |
International Business Machines Corporation |
Method and apparatus for managing texture memory in a data processing system
|
US7233998B2
(en)
|
2001-03-22 |
2007-06-19 |
Sony Computer Entertainment Inc. |
Computer architecture and software cells for broadband networks
|
US20020141582A1
(en)
|
2001-03-28 |
2002-10-03 |
Kocher Paul C. |
Content security layer providing long-term renewable security
|
US7096497B2
(en)
|
2001-03-30 |
2006-08-22 |
Intel Corporation |
File checking using remote signing authority via a network
|
AU2002259015A1
(en)
|
2001-04-24 |
2002-11-05 |
Broadcom Corporation |
Power management system and method
|
US7207069B2
(en)
|
2001-06-05 |
2007-04-17 |
Hewlett-Packard Development Company, L.P. |
Branch locking of job tickets to control concurrency
|
US7073059B2
(en)
|
2001-06-08 |
2006-07-04 |
Hewlett-Packard Development Company, L.P. |
Secure machine platform that interfaces to operating systems and customized control programs
|
GB2376765B
(en)
|
2001-06-19 |
2004-12-29 |
Hewlett Packard Co |
Multiple trusted computing environments with verifiable environment identities
|
GB2376764B
(en)
|
2001-06-19 |
2004-12-29 |
Hewlett Packard Co |
Multiple trusted computing environments
|
GB2376761A
(en)
|
2001-06-19 |
2002-12-24 |
Hewlett Packard Co |
An arrangement in which a process is run on a host operating system but may be switched to a guest system if it poses a security risk
|
GB2376762A
(en)
|
2001-06-19 |
2002-12-24 |
Hewlett Packard Co |
Renting a computing environment on a trusted computing platform
|
GB0114898D0
(en)
|
2001-06-19 |
2001-08-08 |
Hewlett Packard Co |
Interaction with electronic services and markets
|
US6865690B2
(en)
|
2001-06-21 |
2005-03-08 |
Northrop Grumman Corporation |
Voltage conditioner with embedded battery backup
|
US7073070B2
(en)
|
2001-06-29 |
2006-07-04 |
Intel Corporation |
Method and apparatus to improve the protection of information presented by a computer
|
US6928549B2
(en)
|
2001-07-09 |
2005-08-09 |
International Business Machines Corporation |
Dynamic intrusion detection for computer systems
|
US7484105B2
(en)
|
2001-08-16 |
2009-01-27 |
Lenovo (Singapore) Ptd. Ltd. |
Flash update using a trusted platform module
|
US7308714B2
(en)
|
2001-09-27 |
2007-12-11 |
International Business Machines Corporation |
Limiting the output of alerts generated by an intrusion detection sensor during a denial of service attack
|
GB0123415D0
(en)
|
2001-09-28 |
2001-11-21 |
Memquest Ltd |
Method of writing data to non-volatile memory
|
US7389537B1
(en)
|
2001-10-09 |
2008-06-17 |
Juniper Networks, Inc. |
Rate limiting data traffic in a network
|
GB2382419B
(en)
|
2001-11-22 |
2005-12-14 |
Hewlett Packard Co |
Apparatus and method for creating a trusted environment
|
US7150043B2
(en)
|
2001-12-12 |
2006-12-12 |
International Business Machines Corporation |
Intrusion detection method and signature table
|
US20030126059A1
(en)
|
2001-12-18 |
2003-07-03 |
Hensley Roy Austin |
Intelectual property (IP) brokering system and method
|
AU2003202876A1
(en)
|
2002-01-04 |
2003-07-24 |
Internet Security Systems, Inc. |
System and method for the managed security control of processes on a computer system
|
ATE322790T1
(en)
|
2002-01-18 |
2006-04-15 |
Stonesoft Corp |
MONITORING DATA FLOW TO IMPROVE NETWORK SECURITY PROTECTION
|
US20030187853A1
(en)
|
2002-01-24 |
2003-10-02 |
Hensley Roy Austin |
Distributed data storage system and method
|
US7225343B1
(en)
|
2002-01-25 |
2007-05-29 |
The Trustees Of Columbia University In The City Of New York |
System and methods for adaptive model generation for detecting intrusions in computer systems
|
US7076803B2
(en)
|
2002-01-28 |
2006-07-11 |
International Business Machines Corporation |
Integrated intrusion detection services
|
US7222366B2
(en)
|
2002-01-28 |
2007-05-22 |
International Business Machines Corporation |
Intrusion event filtering
|
JP4088082B2
(en)
|
2002-02-15 |
2008-05-21 |
株式会社東芝 |
Apparatus and program for preventing infection by unknown computer virus
|
US7529242B1
(en)
|
2002-02-15 |
2009-05-05 |
Symantec Corporation |
Routing network packets for multi-processor network flow analysis
|
US7302589B2
(en)
|
2002-02-20 |
2007-11-27 |
Intel Corporation |
Method for securing memory mapped control registers
|
US7631196B2
(en)
|
2002-02-25 |
2009-12-08 |
Intel Corporation |
Method and apparatus for loading a trustable operating system
|
EP1488313A2
(en)
|
2002-03-01 |
2004-12-22 |
Green Border Technologies |
Method and system for assured denotation of application semantics
|
US7788699B2
(en)
|
2002-03-06 |
2010-08-31 |
Vir2Us, Inc. |
Computer and method for safe usage of documents, email attachments and other content that may contain virus, spy-ware, or malicious code
|
US7181603B2
(en)
|
2002-03-12 |
2007-02-20 |
Intel Corporation |
Method of secure function loading
|
US7095859B2
(en)
|
2002-03-18 |
2006-08-22 |
Lenovo (Singapore) Pte. Ltd. |
Managing private keys in a free seating environment
|
ATE263391T1
(en)
|
2002-03-26 |
2004-04-15 |
Soteres Gmbh |
PROCEDURES FOR PROTECTING THE INTEGRITY OF PROGRAMS
|
US7890771B2
(en)
|
2002-04-17 |
2011-02-15 |
Microsoft Corporation |
Saving and retrieving data based on public key encryption
|
US7487365B2
(en)
|
2002-04-17 |
2009-02-03 |
Microsoft Corporation |
Saving and retrieving data based on symmetric key encryption
|
US7139890B2
(en)
|
2002-04-30 |
2006-11-21 |
Intel Corporation |
Methods and arrangements to interface memory
|
US6782349B2
(en)
|
2002-05-03 |
2004-08-24 |
International Business Machines Corporation |
Method and system for updating a root of trust measurement function in a personal computer
|
US20030226040A1
(en)
|
2002-06-03 |
2003-12-04 |
International Business Machines Corporation |
Controlling access to data stored on a storage device of a trusted computing platform system
|
US7367055B2
(en)
|
2002-06-11 |
2008-04-29 |
Motorola, Inc. |
Communication systems automated security detection based on protocol cause codes
|
US7085933B2
(en)
|
2002-06-11 |
2006-08-01 |
Lenvo (Singapore) Pte, Ltd. |
Computer system apparatus and method for improved assurance of authentication
|
US7103914B2
(en)
|
2002-06-17 |
2006-09-05 |
Bae Systems Information Technology Llc |
Trusted computer system
|
US7120788B2
(en)
|
2002-06-20 |
2006-10-10 |
Intel Corporation |
Method and system for shutting down and restarting a computer system
|
US7743257B2
(en)
|
2002-06-27 |
2010-06-22 |
Nxp B.V. |
Security processor with bus configuration
|
US7216369B2
(en)
|
2002-06-28 |
2007-05-08 |
Intel Corporation |
Trusted platform apparatus, system, and method
|
AU2003278706A1
(en)
|
2002-08-09 |
2004-02-25 |
Alphatech, Inc. |
Control systems and methods using a partially-observable markov decision process (po-mdp)
|
US6983323B2
(en)
|
2002-08-12 |
2006-01-03 |
Tippingpoint Technologies, Inc. |
Multi-level packet screening with dynamically selected filtering criteria
|
US7152193B2
(en)
|
2002-08-13 |
2006-12-19 |
Lsi Logic Corporation |
Embedded sequence checking
|
FR2843819B1
(en)
|
2002-08-21 |
2006-11-10 |
Thomson Licensing Sa |
ANTI-THEFT SAFETY ELECTRICAL APPARATUS, ANTI-THEFT DEVICE COMPRISING SUCH AN APPARATUS AND A METHOD FOR THE MATCHING OF ELECTRICAL APPARATUS
|
US7516491B1
(en)
|
2002-10-17 |
2009-04-07 |
Roger Schlafly |
License tracking system
|
US7509683B2
(en)
|
2002-08-26 |
2009-03-24 |
Hewlett-Packard Development Company, L.P. |
System and method for authenticating digital content
|
US6659779B1
(en)
|
2002-09-09 |
2003-12-09 |
Hewlett-Packard Development Company, L.P. |
Electronic assembly having a removable power supply
|
US7209137B2
(en)
|
2002-09-12 |
2007-04-24 |
International Business Machines Corporation |
Efficient triangular shaped meshes
|
US6924802B2
(en)
|
2002-09-12 |
2005-08-02 |
International Business Machines Corporation |
Efficient function interpolation using SIMD vector permute functionality
|
US7146499B2
(en)
|
2002-09-30 |
2006-12-05 |
International Business Machines Corporation |
Security system for replicated storage devices on computer networks
|
US7200758B2
(en)
|
2002-10-09 |
2007-04-03 |
Intel Corporation |
Encapsulation of a TCPA trusted platform module functionality within a server management coprocessor subsystem
|
WO2004034229A2
(en)
|
2002-10-10 |
2004-04-22 |
Rocksteady Networks, Inc. |
System and method for providing access control
|
US7251829B1
(en)
|
2002-10-26 |
2007-07-31 |
Type80 Security Software, Inc. |
Data analysis and security system
|
US7363656B2
(en)
|
2002-11-04 |
2008-04-22 |
Mazu Networks, Inc. |
Event detection/anomaly correlation heuristics
|
US7149862B2
(en)
|
2002-11-18 |
2006-12-12 |
Arm Limited |
Access control in a data processing apparatus
|
US7231476B2
(en)
|
2002-11-18 |
2007-06-12 |
Arm Limited |
Function control for a processor
|
GB2396034B
(en)
|
2002-11-18 |
2006-03-08 |
Advanced Risc Mach Ltd |
Technique for accessing memory in a data processing apparatus
|
GB2410348B
(en)
|
2002-11-18 |
2005-12-07 |
Advanced Risc Mach Ltd |
Exception types within a secure processing system
|
GB2396713B
(en)
|
2002-11-18 |
2005-09-14 |
Advanced Risc Mach Ltd |
Apparatus and method for controlling access to a memory unit
|
GB2396930B
(en)
|
2002-11-18 |
2005-09-07 |
Advanced Risc Mach Ltd |
Apparatus and method for managing access to a memory
|
RU2005115094A
(en)
|
2002-11-18 |
2006-01-20 |
Арм Лимитед (Gb) |
DISPLAYING VIRTUAL MEMORY ADDRESSES TO PHYSICAL ADDRESSES IN A SYSTEM WITH A PROTECTED DOMAIN AND AN UNsecure DOMAIN
|
AU2003278350A1
(en)
|
2002-11-18 |
2004-06-15 |
Arm Limited |
Secure memory for protecting against malicious programs
|
KR100481614B1
(en)
|
2002-11-19 |
2005-04-08 |
한국전자통신연구원 |
METHOD AND APPARATUS FOR PROTECTING LEGITIMATE TRAFFIC FROM DoS AND DDoS ATTACKS
|
US7660998B2
(en)
|
2002-12-02 |
2010-02-09 |
Silverbrook Research Pty Ltd |
Relatively unique ID in integrated circuit
|
KR100680626B1
(en)
|
2002-12-20 |
2007-02-09 |
인터내셔널 비지네스 머신즈 코포레이션 |
Secure system and method for san management in a non-trusted server environment
|
US20040143749A1
(en)
|
2003-01-16 |
2004-07-22 |
Platformlogic, Inc. |
Behavior-based host-based intrusion prevention system
|
US7055008B2
(en)
|
2003-01-22 |
2006-05-30 |
Falconstor Software, Inc. |
System and method for backing up data
|
US7237109B2
(en)
|
2003-01-28 |
2007-06-26 |
Fisher- Rosemount Systems, Inc. |
Integrated security in a process plant having a process control system and a safety system
|
US7159086B2
(en)
|
2003-01-29 |
2007-01-02 |
Steven Bress |
Systems and methods for creating exact copies of computer long-term storage devices
|
US7322042B2
(en)
|
2003-02-07 |
2008-01-22 |
Broadon Communications Corp. |
Secure and backward-compatible processor and secure software execution thereon
|
US7249162B2
(en)
|
2003-02-25 |
2007-07-24 |
Microsoft Corporation |
Adaptive junk message filtering system
|
US8020192B2
(en)
|
2003-02-28 |
2011-09-13 |
Michael Wright |
Administration of protection of data accessible by a mobile device
|
US7219148B2
(en)
|
2003-03-03 |
2007-05-15 |
Microsoft Corporation |
Feedback loop for spam prevention
|
US7509644B2
(en)
|
2003-03-04 |
2009-03-24 |
Secure 64 Software Corp. |
Operating system capable of supporting a customized execution environment
|
GB2399902A
(en)
|
2003-03-28 |
2004-09-29 |
Hewlett Packard Development Co |
Security in trusted computing systems
|
US7788724B2
(en)
|
2003-04-10 |
2010-08-31 |
Symantec Corporation |
System and method for detecting malicious applications
|
US7814310B2
(en)
|
2003-04-12 |
2010-10-12 |
Cavium Networks |
IPsec performance optimization
|
US7657757B2
(en)
|
2003-04-30 |
2010-02-02 |
Freescale Semiconductor, Inc. |
Semiconductor device and method utilizing variable mode control with block ciphers
|
US7409722B2
(en)
|
2003-05-01 |
2008-08-05 |
Sun Microsystems, Inc. |
Control status register access to enable domain reconfiguration
|
US7203874B2
(en)
*
|
2003-05-08 |
2007-04-10 |
Micron Technology, Inc. |
Error detection, documentation, and correction in a flash memory device
|
US8086844B2
(en)
|
2003-06-03 |
2011-12-27 |
Broadcom Corporation |
Online trusted platform module
|
US7269702B2
(en)
|
2003-06-06 |
2007-09-11 |
Microsoft Corporation |
Trusted data store for use in connection with trusted computer operating system
|
US7089373B2
(en)
|
2003-06-12 |
2006-08-08 |
International Business Machines Corporation |
Shadow register to enhance lock acquisition
|
WO2005003907A2
(en)
|
2003-06-26 |
2005-01-13 |
Ebay Inc. |
Method and apparatus to authenticate and authorize user access to a system
|
US7392543B2
(en)
|
2003-06-30 |
2008-06-24 |
Symantec Corporation |
Signature extraction system and method
|
CN101241735B
(en)
|
2003-07-07 |
2012-07-18 |
罗威所罗生股份有限公司 |
Method for replaying encrypted video and audio content
|
US7530103B2
(en)
|
2003-08-07 |
2009-05-05 |
Microsoft Corporation |
Projection of trustworthiness from a trusted environment to an untrusted environment
|
US7398390B2
(en)
|
2003-08-08 |
2008-07-08 |
Hewlett-Packard Development Company, L.P. |
Method and system for securing a computer system
|
US7415703B2
(en)
|
2003-09-25 |
2008-08-19 |
International Business Machines Corporation |
Loading software on a plurality of processors
|
US7146529B2
(en)
|
2003-09-25 |
2006-12-05 |
International Business Machines Corporation |
System and method for processor thread acting as a system service processor
|
US7236998B2
(en)
|
2003-09-25 |
2007-06-26 |
International Business Machines Corporation |
System and method for solving a large system of dense linear equations
|
US7478390B2
(en)
|
2003-09-25 |
2009-01-13 |
International Business Machines Corporation |
Task queue management of virtual devices using a plurality of processors
|
US7318218B2
(en)
|
2003-09-25 |
2008-01-08 |
International Business Machines Corporation |
System and method for processor thread for software debugging
|
US7516456B2
(en)
|
2003-09-25 |
2009-04-07 |
International Business Machines Corporation |
Asymmetric heterogeneous multi-threaded operating system
|
US7523157B2
(en)
|
2003-09-25 |
2009-04-21 |
International Business Machines Corporation |
Managing a plurality of processors as devices
|
US7444632B2
(en)
|
2003-09-25 |
2008-10-28 |
International Business Machines Corporation |
Balancing computational load across a plurality of processors
|
US7549145B2
(en)
|
2003-09-25 |
2009-06-16 |
International Business Machines Corporation |
Processor dedicated code handling in a multi-processor environment
|
US7496917B2
(en)
|
2003-09-25 |
2009-02-24 |
International Business Machines Corporation |
Virtual devices using a pluarlity of processors
|
US7389508B2
(en)
|
2003-09-25 |
2008-06-17 |
International Business Machines Corporation |
System and method for grouping processors and assigning shared memory space to a group in heterogeneous computer environment
|
US7685436B2
(en)
|
2003-10-02 |
2010-03-23 |
Itt Manufacturing Enterprises, Inc. |
System and method for a secure I/O interface
|
US20050091496A1
(en)
|
2003-10-23 |
2005-04-28 |
Hyser Chris D. |
Method and system for distributed key management in a secure boot environment
|
US7730318B2
(en)
|
2003-10-24 |
2010-06-01 |
Microsoft Corporation |
Integration of high-assurance features into an application through application factoring
|
US7814554B1
(en)
|
2003-11-06 |
2010-10-12 |
Gary Dean Ragner |
Dynamic associative storage security for long-term memory storage devices
|
US7290287B2
(en)
|
2003-11-20 |
2007-10-30 |
International Business Machines Corporation |
Security screening of electronic devices by device identifier
|
US7350079B2
(en)
|
2003-11-20 |
2008-03-25 |
International Business Machines Corporation |
Apparatus and method for inter-program authentication using dynamically-generated public/private key pairs
|
US20050114687A1
(en)
|
2003-11-21 |
2005-05-26 |
Zimmer Vincent J. |
Methods and apparatus to provide protection for firmware resources
|
FR2863076B1
(en)
|
2003-11-28 |
2006-02-03 |
Bull Sa |
HIGH SPEED CRYPTOGRAPHIC SYSTEM WITH MODULAR ARCHITECTURE.
|
EP1542181A1
(en)
|
2003-12-11 |
2005-06-15 |
Banksys S.A. |
Electronic data processing device
|
US7684563B1
(en)
|
2003-12-12 |
2010-03-23 |
Sun Microsystems, Inc. |
Apparatus and method for implementing a unified hash algorithm pipeline
|
US7641124B2
(en)
|
2003-12-17 |
2010-01-05 |
Qsecure, Inc. |
Magnetic data recording device
|
US8001348B2
(en)
|
2003-12-24 |
2011-08-16 |
Intel Corporation |
Method to qualify access to a block storage device via augmentation of the device's controller and firmware flow
|
US8005888B2
(en)
|
2003-12-30 |
2011-08-23 |
Microsoft Corporation |
Conflict fast consensus
|
US7472416B2
(en)
|
2004-01-09 |
2008-12-30 |
Cisco Technology, Inc. |
Preventing network reset denial of service attacks using embedded authentication information
|
US7178015B2
(en)
|
2004-01-12 |
2007-02-13 |
Hewlett-Packard Development Company, L.P. |
Security measures in a partitionable computing system
|
US7356678B2
(en)
|
2004-01-12 |
2008-04-08 |
Hewlett-Packard Development Company, L.P. |
Security measures in a partitionable computing system
|
US7296146B2
(en)
|
2004-01-12 |
2007-11-13 |
Hewlett-Packard Development Company, L.P. |
Security measures in a partitionable computing system
|
US7487542B2
(en)
|
2004-01-14 |
2009-02-03 |
International Business Machines Corporation |
Intrusion detection using a network processor and a parallel pattern detection engine
|
US7836219B1
(en)
|
2004-02-10 |
2010-11-16 |
Pmc-Sierra Us, Inc. |
System and method for authentication of embedded RAID on a host RAID card
|
US7577742B1
(en)
|
2004-02-11 |
2009-08-18 |
Adaptec, Inc. |
Account creation method and apparatus
|
US7603716B2
(en)
|
2004-02-13 |
2009-10-13 |
Microsoft Corporation |
Distributed network security service
|
US7814543B2
(en)
|
2004-02-13 |
2010-10-12 |
Microsoft Corporation |
System and method for securing a computer system connected to a network from attacks
|
US7716726B2
(en)
|
2004-02-13 |
2010-05-11 |
Microsoft Corporation |
System and method for protecting a computing device from computer exploits delivered over a networked environment in a secured communication
|
US7634655B2
(en)
|
2004-02-13 |
2009-12-15 |
Microsoft Corporation |
Efficient hash table protection for data transport protocols
|
US7984304B1
(en)
|
2004-03-02 |
2011-07-19 |
Vmware, Inc. |
Dynamic verification of validity of executable code
|
US7574608B2
(en)
|
2004-03-04 |
2009-08-11 |
International Business Machines Corporation |
Security screening of electronic devices by device-reported data
|
US7590728B2
(en)
|
2004-03-10 |
2009-09-15 |
Eric White |
System and method for detection of aberrant network behavior by clients of a network access gateway
|
US7840763B2
(en)
|
2004-03-12 |
2010-11-23 |
Sca Technica, Inc. |
Methods and systems for achieving high assurance computing using low assurance operating systems and processes
|
US7490350B1
(en)
|
2004-03-12 |
2009-02-10 |
Sca Technica, Inc. |
Achieving high assurance connectivity on computing devices and defeating blended hacking attacks
|
US7653727B2
(en)
|
2004-03-24 |
2010-01-26 |
Intel Corporation |
Cooperative embedded agents
|
US7751601B2
(en)
|
2004-10-04 |
2010-07-06 |
Validity Sensors, Inc. |
Fingerprint sensing assemblies and methods of making
|
US8074276B1
(en)
|
2004-04-19 |
2011-12-06 |
Parallels Holdings, Ltd. |
Method and system for administration of security services within a virtual execution environment (VEE) infrastructure
|
US7664965B2
(en)
|
2004-04-29 |
2010-02-16 |
International Business Machines Corporation |
Method and system for bootstrapping a trusted server having redundant trusted platform modules
|
US20050246529A1
(en)
|
2004-04-30 |
2005-11-03 |
Microsoft Corporation |
Isolated persistent identity storage for authentication of computing devies
|
US8266670B1
(en)
|
2004-05-06 |
2012-09-11 |
American Express Travel Related Services Company, Inc. |
System and method for dynamic security provisioning of data resources
|
US7546447B2
(en)
|
2004-05-08 |
2009-06-09 |
Intel Corporation |
Firmware interface runtime environment protection field
|
US7685644B2
(en)
|
2004-05-13 |
2010-03-23 |
Sap Ag |
Managing user access to data
|
WO2005111926A1
(en)
|
2004-05-18 |
2005-11-24 |
Silverbrook Research Pty Ltd |
Method and apparatus for security document tracking
|
US8090940B1
(en)
|
2004-06-01 |
2012-01-03 |
Cisco Technology, Inc. |
Method and system for verifying identification of an electronic message
|
US7594124B2
(en)
|
2004-06-09 |
2009-09-22 |
Intel Corporation |
Cross validation of data using multiple subsystems
|
US7305383B1
(en)
|
2004-06-10 |
2007-12-04 |
Cisco Technology, Inc. |
Processing system using bitmap array to compress deterministic finite automation state table allowing direct indexing
|
US7334154B2
(en)
|
2004-06-18 |
2008-02-19 |
Microsoft Corporation |
Efficient changing of replica sets in distributed fault-tolerant computing system
|
US7694150B1
(en)
|
2004-06-22 |
2010-04-06 |
Cisco Technology, Inc |
System and methods for integration of behavioral and signature based security
|
US7212199B2
(en)
|
2004-06-24 |
2007-05-01 |
International Business Machines Corporation |
System and method for terrain rendering using a limited memory footprint
|
US7716494B2
(en)
|
2004-07-15 |
2010-05-11 |
Sony Corporation |
Establishing a trusted platform in a digital processing system
|
US7565659B2
(en)
|
2004-07-15 |
2009-07-21 |
International Business Machines Corporation |
Light weight context switching
|
US7552326B2
(en)
|
2004-07-15 |
2009-06-23 |
Sony Corporation |
Use of kernel authorization data to maintain security in a digital processing system
|
US7581252B2
(en)
|
2004-07-20 |
2009-08-25 |
Lenovo (Singapore) Pte. Ltd. |
Storage conversion for anti-virus speed-up
|
US7581253B2
(en)
|
2004-07-20 |
2009-08-25 |
Lenovo (Singapore) Pte. Ltd. |
Secure storage tracking for anti-virus speed-up
|
US7627898B2
(en)
|
2004-07-23 |
2009-12-01 |
Microsoft Corporation |
Method and system for detecting infection of an operating system
|
US7480931B2
(en)
|
2004-07-24 |
2009-01-20 |
Bbs Technologies, Inc. |
Volume mount authentication
|
US7484247B2
(en)
|
2004-08-07 |
2009-01-27 |
Allen F Rozman |
System and method for protecting a computer system from malicious software
|
US7702922B2
(en)
|
2004-08-17 |
2010-04-20 |
Microsoft Corporation |
Physical encryption key system
|
US7303059B2
(en)
|
2004-08-19 |
2007-12-04 |
Roger D. Pugh |
Conveyor apparatus for placing articles in a single file
|
US7240137B2
(en)
|
2004-08-26 |
2007-07-03 |
International Business Machines Corporation |
System and method for message delivery across a plurality of processors
|
US7240182B2
(en)
|
2004-09-16 |
2007-07-03 |
International Business Machines Corporation |
System and method for providing a persistent function server
|
US7370189B2
(en)
|
2004-09-30 |
2008-05-06 |
Intel Corporation |
Method and apparatus for establishing safe processor operating points in connection with a secure boot
|
US7290112B2
(en)
|
2004-09-30 |
2007-10-30 |
International Business Machines Corporation |
System and method for virtualization of processor resources
|
US7818781B2
(en)
|
2004-10-01 |
2010-10-19 |
Microsoft Corporation |
Behavior blocking access control
|
US7506325B2
(en)
|
2004-10-07 |
2009-03-17 |
International Business Machines Corporation |
Partitioning processor resources based on memory usage
|
FR2876482B1
(en)
|
2004-10-07 |
2007-01-12 |
Siemens Transp Systems Soc Par |
SECURE OUTPUT CONTROL SEND DEVICE
|
US20060080661A1
(en)
|
2004-10-07 |
2006-04-13 |
International Business Machines Corporation |
System and method for hiding memory latency
|
US7720219B1
(en)
|
2004-10-19 |
2010-05-18 |
Oracle America, Inc. |
Apparatus and method for implementing a hash algorithm word buffer
|
US7716727B2
(en)
|
2004-10-29 |
2010-05-11 |
Microsoft Corporation |
Network security device and method for protecting a computing device in a networked environment
|
US7512699B2
(en)
|
2004-11-12 |
2009-03-31 |
International Business Machines Corporation |
Managing position independent code using a software framework
|
US7774462B2
(en)
|
2004-11-12 |
2010-08-10 |
International Business Machines Corporation |
Apparatus, system, and method for establishing an agency relationship to perform delegated computing tasks
|
US7784096B2
(en)
|
2004-11-15 |
2010-08-24 |
Microsoft Corporation |
Outgoing connection attempt limiting to slow down spreading of viruses
|
US8266676B2
(en)
|
2004-11-29 |
2012-09-11 |
Harris Corporation |
Method to verify the integrity of components on a trusted platform using integrity database services
|
US7987356B2
(en)
|
2004-11-29 |
2011-07-26 |
Broadcom Corporation |
Programmable security platform
|
US7551615B2
(en)
|
2004-12-29 |
2009-06-23 |
Intel Corporation |
Method for packet encapsulation and redirection of data packets
|
US7725703B2
(en)
|
2005-01-07 |
2010-05-25 |
Microsoft Corporation |
Systems and methods for securely booting a computer with a trusted processing module
|
US7386708B2
(en)
|
2005-01-13 |
2008-06-10 |
Lenovo (Singapore) Pte Ltd. |
Secure hardware personalization service
|
US7540026B1
(en)
|
2005-01-24 |
2009-05-26 |
Symantec Corporation |
No-execute processor feature global disabling prevention system and method
|
US7640438B2
(en)
|
2005-02-15 |
2009-12-29 |
Satyam Computer Services Ltd. |
System and method for protected content rendering
|
US7490353B2
(en)
|
2005-02-22 |
2009-02-10 |
Kidaro, Inc. |
Data transfer security
|
US7836299B2
(en)
|
2005-03-15 |
2010-11-16 |
Microsoft Corporation |
Virtualization of software configuration registers of the TPM cryptographic processor
|
US8286233B1
(en)
|
2005-03-19 |
2012-10-09 |
Avaya Inc. |
Apparatus and method for preventing eavesdropping
|
US7739517B2
(en)
|
2005-03-31 |
2010-06-15 |
Intel Corporation |
Hardware-based authentication of a software program
|
US7752428B2
(en)
|
2005-03-31 |
2010-07-06 |
Intel Corporation |
System and method for trusted early boot flow
|
US8161554B2
(en)
|
2005-04-26 |
2012-04-17 |
Cisco Technology, Inc. |
System and method for detection and mitigation of network worms
|
US7802111B1
(en)
|
2005-04-27 |
2010-09-21 |
Oracle America, Inc. |
System and method for limiting exposure of cryptographic keys protected by a trusted platform module
|
US7571312B2
(en)
|
2005-05-13 |
2009-08-04 |
Intel Corporation |
Methods and apparatus for generating endorsement credentials for software-based security coprocessors
|
US7587595B2
(en)
|
2005-05-13 |
2009-09-08 |
Intel Corporation |
Method and apparatus for providing software-based security coprocessors
|
US7949766B2
(en)
|
2005-06-22 |
2011-05-24 |
Cisco Technology, Inc. |
Offload stack for network, block and file input and output
|
US7594258B2
(en)
|
2005-06-27 |
2009-09-22 |
Yahoo! Inc. |
Access control systems and methods using visibility tokens with automatic propagation
|
US7739724B2
(en)
|
2005-06-30 |
2010-06-15 |
Intel Corporation |
Techniques for authenticated posture reporting and associated enforcement of network access
|
US8856473B2
(en)
*
|
2005-07-01 |
2014-10-07 |
Red Hat, Inc. |
Computer system protection based on virtualization
|
US7962766B2
(en)
|
2005-07-14 |
2011-06-14 |
Atmel Corporation |
Method and system for encryption-based design obfuscation for an integrated circuit
|
US8225392B2
(en)
|
2005-07-15 |
2012-07-17 |
Microsoft Corporation |
Immunizing HTML browsers and extensions from known vulnerabilities
|
US7467285B2
(en)
|
2005-07-27 |
2008-12-16 |
Intel Corporation |
Maintaining shadow page tables in a sequestered memory region
|
US7421453B2
(en)
|
2005-08-16 |
2008-09-02 |
International Business Machines Corporation |
Asynchronous linked data structure traversal
|
US7735135B1
(en)
|
2005-08-31 |
2010-06-08 |
Juniper Networks, Inc. |
Hardware-based intrusion detection accelerator
|
US7765342B2
(en)
|
2005-09-07 |
2010-07-27 |
Florida State University Research Foundation |
Systems, methods, and computer program products for packing instructions into register files
|
US7921463B2
(en)
|
2005-09-30 |
2011-04-05 |
Intel Corporation |
Methods and apparatus for providing an insertion and integrity protection system associated with a wireless communication platform
|
JP2009512939A
(en)
|
2005-10-21 |
2009-03-26 |
ヴァー2アス インコーポレイテッド |
Computer security method having operating system virtualization that allows multiple operating system instances to securely share a single machine resource
|
US8074231B2
(en)
|
2005-10-26 |
2011-12-06 |
Microsoft Corporation |
Configuration of isolated extensions and device drivers
|
US7620177B2
(en)
|
2005-10-31 |
2009-11-17 |
Hewlett-Packard Development Company, L.P. |
Secure printing
|
US7743418B2
(en)
|
2005-10-31 |
2010-06-22 |
Microsoft Corporation |
Identifying malware that employs stealth techniques
|
US7613937B2
(en)
|
2005-10-31 |
2009-11-03 |
Hewlett-Packard Development Company, L.P. |
Method and apparatus for utilizing a microcontroller to provide an automatic order and timing power and reset sequencer
|
KR100833488B1
(en)
|
2005-11-25 |
2008-05-29 |
한국전자통신연구원 |
Method and apparatus for storing of intrusion rule
|
US7490017B2
(en)
|
2005-11-29 |
2009-02-10 |
International Business Machines Corporation |
Analytical generation of software thermal profiles
|
US7395174B2
(en)
|
2005-11-29 |
2008-07-01 |
International Business Machines Corporation |
Generation of software thermal profiles executed on a set of processors using thermal sampling
|
US7512530B2
(en)
|
2005-11-29 |
2009-03-31 |
International Business Machines Corporation |
Generation of software thermal profiles for applications in a simulated environment
|
US7386414B2
(en)
|
2005-11-29 |
2008-06-10 |
International Business Machines Corporation |
Generation of hardware thermal profiles for a set of processors
|
US7698089B2
(en)
|
2005-11-29 |
2010-04-13 |
International Business Machines Corporation |
Generation of software thermal profiles executed on a set of processors using processor activity
|
US7845008B2
(en)
|
2005-12-07 |
2010-11-30 |
Lenovo (Singapore) Pte. Ltd. |
Virus scanner for journaling file system
|
US7900059B2
(en)
|
2005-12-13 |
2011-03-01 |
International Business Machines Corporation |
Sealing of data for applications
|
US8046755B2
(en)
|
2005-12-30 |
2011-10-25 |
Sap Ag |
Deploying software based on a calculated deployment risk level
|
US7930728B2
(en)
|
2006-01-06 |
2011-04-19 |
Intel Corporation |
Mechanism to support rights management in a pre-operating system environment
|
US7877734B2
(en)
|
2006-01-12 |
2011-01-25 |
International Business Machines Corporation |
Selective profiling of program code executing in a runtime environment
|
US7266475B1
(en)
|
2006-02-16 |
2007-09-04 |
International Business Machines Corporation |
Trust evaluation
|
US8190914B2
(en)
|
2006-02-28 |
2012-05-29 |
Red Hat, Inc. |
Method and system for designating and handling confidential memory allocations
|
US7886065B1
(en)
|
2006-03-28 |
2011-02-08 |
Symantec Corporation |
Detecting reboot events to enable NAC reassessment
|
US7802232B2
(en)
|
2006-03-31 |
2010-09-21 |
Microsoft Corporation |
Software robustness through search for robust runtime implementations
|
US7904278B2
(en)
|
2006-05-02 |
2011-03-08 |
The Johns Hopkins University |
Methods and system for program execution integrity measurement
|
US7596430B2
(en)
|
2006-05-03 |
2009-09-29 |
International Business Machines Corporation |
Selection of processor cores for optimal thermal performance
|
US8037893B2
(en)
|
2006-05-03 |
2011-10-18 |
International Business Machines Corporation |
Optimizing thermal performance using thermal flow analysis
|
US7552346B2
(en)
|
2006-05-03 |
2009-06-23 |
International Business Machines Corporation |
Dynamically adapting software for reducing a thermal state of a processor core based on its thermal index
|
US7454547B1
(en)
|
2006-05-16 |
2008-11-18 |
American Megatrends, Inc. |
Data exchange between a runtime environment and a computer firmware in a multi-processor computing system
|
US8281402B2
(en)
|
2006-05-16 |
2012-10-02 |
Intel Corporation |
Network vulnerability assessment of a host platform from an isolated partition in the host platform
|
US8099605B1
(en)
|
2006-06-05 |
2012-01-17 |
InventSec AB |
Intelligent storage device for backup system
|
US8024770B2
(en)
|
2006-06-21 |
2011-09-20 |
Microsoft Corporation |
Techniques for managing security contexts
|
US7765392B2
(en)
|
2006-06-29 |
2010-07-27 |
Intel Corporation |
Method and apparatus for establishing processor as core root of trust for measurement
|
US7797566B2
(en)
|
2006-07-11 |
2010-09-14 |
Check Point Software Technologies Ltd. |
Application cluster in security gateway for high availability and load sharing
|
US8190868B2
(en)
|
2006-08-07 |
2012-05-29 |
Webroot Inc. |
Malware management through kernel detection
|
US8141164B2
(en)
|
2006-08-21 |
2012-03-20 |
Citrix Systems, Inc. |
Systems and methods for dynamic decentralized load balancing across multiple sites
|
US8190917B2
(en)
|
2006-09-12 |
2012-05-29 |
International Business Machines Corporation |
System and method for securely saving and restoring a context of a secure program loader
|
US7660769B2
(en)
|
2006-09-12 |
2010-02-09 |
International Business Machines Corporation |
System and method for digital content player with secure processing vault
|
US7945789B2
(en)
|
2006-09-12 |
2011-05-17 |
International Business Machines Corporation |
System and method for securely restoring a program context from a shared memory
|
US8095802B2
(en)
|
2006-09-12 |
2012-01-10 |
International Business Machines Corporation |
System and method for securely saving a program context to a shared memory
|
GB2442023B
(en)
|
2006-09-13 |
2011-03-02 |
Advanced Risc Mach Ltd |
Memory access security management
|
US8230509B2
(en)
|
2006-09-14 |
2012-07-24 |
Ca, Inc. |
System and method for using rules to protect against malware
|
US8201244B2
(en)
|
2006-09-19 |
2012-06-12 |
Microsoft Corporation |
Automated malware signature generation
|
US20080077749A1
(en)
*
|
2006-09-22 |
2008-03-27 |
Daniel Scott Cohen |
Access control of memory space in microprocessor systems
|
US7712143B2
(en)
|
2006-09-27 |
2010-05-04 |
Blue Ridge Networks, Inc. |
Trusted enclave for a computer system
|
US8024691B2
(en)
|
2006-09-28 |
2011-09-20 |
Mcgill University |
Automata unit, a tool for designing checker circuitry and a method of manufacturing hardware circuitry incorporating checker circuitry
|
US7620727B2
(en)
|
2006-09-29 |
2009-11-17 |
Sap (Ag) |
Method and system for management protocol-based data streaming
|
JP4329801B2
(en)
|
2006-09-29 |
2009-09-09 |
ブラザー工業株式会社 |
Communication device
|
US8241115B2
(en)
|
2006-10-09 |
2012-08-14 |
Wms Gaming Inc. |
Multiple key failover validation in a wagering game machine
|
WO2008085579A2
(en)
|
2006-10-25 |
2008-07-17 |
Spyrus, Inc. |
Method and system for deploying advanced cryptographic algorithms
|
US8108905B2
(en)
|
2006-10-26 |
2012-01-31 |
International Business Machines Corporation |
System and method for an isolated process to control address translation
|
US7870336B2
(en)
|
2006-11-03 |
2011-01-11 |
Microsoft Corporation |
Operating system protection against side-channel attacks on secrecy
|
US8032764B2
(en)
|
2006-11-14 |
2011-10-04 |
Texas Instruments Incorporated |
Electronic devices, information products, processes of manufacture and apparatus for enabling code decryption in a secure mode using decryption wrappers and key programming applications, and other structures
|
US8181248B2
(en)
|
2006-11-23 |
2012-05-15 |
Electronics And Telecommunications Research Institute |
System and method of detecting anomaly malicious code by using process behavior prediction technique
|
US8225093B2
(en)
|
2006-12-05 |
2012-07-17 |
Qualcomm Incorporated |
Providing secure inter-application communication for a mobile operating environment
|
US7921453B2
(en)
|
2006-12-22 |
2011-04-05 |
Intel Corporation |
Authenticated distributed detection and inference
|
US20080155277A1
(en)
|
2006-12-26 |
2008-06-26 |
Mallik Bulusu |
Hardware partitioned trust
|
US8209542B2
(en)
|
2006-12-29 |
2012-06-26 |
Intel Corporation |
Methods and apparatus for authenticating components of processing systems
|
US8132259B2
(en)
|
2007-01-04 |
2012-03-06 |
International Business Machines Corporation |
System and method for security planning with soft security constraints
|
US7840637B2
(en)
|
2007-02-21 |
2010-11-23 |
The Go Daddy Group, Inc. |
Community web site for creating and maintaining a web hosting community
|
US8146084B1
(en)
|
2007-02-21 |
2012-03-27 |
Adobe Systems Incorporated |
Loading applications in non-designated isolation environments
|
US7752350B2
(en)
|
2007-02-23 |
2010-07-06 |
International Business Machines Corporation |
System and method for efficient implementation of software-managed cache
|
US8752032B2
(en)
|
2007-02-23 |
2014-06-10 |
Irdeto Canada Corporation |
System and method of interlocking to protect software-mediated program and device behaviours
|
US7934063B2
(en)
|
2007-03-29 |
2011-04-26 |
International Business Machines Corporation |
Invoking externally assisted calls from an isolated environment
|
US8127412B2
(en)
|
2007-03-30 |
2012-03-06 |
Cisco Technology, Inc. |
Network context triggers for activating virtualized computer applications
|
US7945786B2
(en)
|
2007-03-30 |
2011-05-17 |
Intel Corporation |
Method and apparatus to re-create trust model after sleep state
|
US8276164B2
(en)
|
2007-05-03 |
2012-09-25 |
Apple Inc. |
Data parallel computing on multiple processors
|
US8286196B2
(en)
|
2007-05-03 |
2012-10-09 |
Apple Inc. |
Parallel runtime execution on multiple processors
|
US7908656B1
(en)
|
2007-04-23 |
2011-03-15 |
Network Appliance, Inc. |
Customized data generating data storage system filter for data security
|
US8239925B2
(en)
|
2007-04-26 |
2012-08-07 |
Varonis Systems, Inc. |
Evaluating removal of access permissions
|
US8001596B2
(en)
|
2007-05-03 |
2011-08-16 |
Microsoft Corporation |
Software protection injection at load time
|
US8001390B2
(en)
|
2007-05-09 |
2011-08-16 |
Sony Computer Entertainment Inc. |
Methods and apparatus for secure programming and storage of data using a multiprocessor in a trusted mode
|
EP2075696A3
(en)
|
2007-05-10 |
2010-01-27 |
Texas Instruments Incorporated |
Interrupt- related circuits, systems and processes
|
US7886150B2
(en)
|
2007-05-11 |
2011-02-08 |
Mips Technologies, Inc. |
System debug and trace system and method, and applications thereof
|
US7899987B2
(en)
*
|
2007-05-15 |
2011-03-01 |
Sandisk Il Ltd. |
File storage in a computer system with diverse storage media
|
US7886162B2
(en)
|
2007-05-29 |
2011-02-08 |
International Business Machines Corporation |
Cryptographic secure program overlays
|
US7917605B1
(en)
|
2007-07-24 |
2011-03-29 |
United Services Automobile Association (Usaa) |
Automated registration and licensing tool
|
US8108498B2
(en)
|
2007-07-26 |
2012-01-31 |
Dell Products, Lp |
System and method of enabling access to remote information handling systems
|
US7877602B2
(en)
|
2007-07-27 |
2011-01-25 |
International Business Machines Corporation |
Transparent aware data transformation at file system level for efficient encryption and integrity validation of network files
|
US8060876B2
(en)
|
2007-08-10 |
2011-11-15 |
Intel Corporation |
Methods and apparatus for creating an isolated partition for a virtual trusted platform module
|
US7613861B2
(en)
|
2007-08-14 |
2009-11-03 |
Dell Products, Lp |
System and method of obtaining error data within an information handling system
|
US8220062B1
(en)
|
2007-08-16 |
2012-07-10 |
Google Inc. |
Double sand-boxing for flash library
|
US7941828B2
(en)
|
2007-08-24 |
2011-05-10 |
The Boeing Company |
Method and apparatus for simultaneous viewing of two isolated data sources
|
US7827371B2
(en)
|
2007-08-30 |
2010-11-02 |
Intel Corporation |
Method for isolating third party pre-boot firmware from trusted pre-boot firmware
|
US7917716B2
(en)
|
2007-08-31 |
2011-03-29 |
Standard Microsystems Corporation |
Memory protection for embedded controllers
|
US8131784B1
(en)
|
2007-09-26 |
2012-03-06 |
Network Appliance, Inc. |
Multiple node quota filter
|
US7783666B1
(en)
|
2007-09-26 |
2010-08-24 |
Netapp, Inc. |
Controlling access to storage resources by using access pattern based quotas
|
US8166304B2
(en)
|
2007-10-02 |
2012-04-24 |
International Business Machines Corporation |
Support for multiple security policies on a unified authentication architecture
|
US7996896B2
(en)
|
2007-10-19 |
2011-08-09 |
Trend Micro Incorporated |
System for regulating host security configuration
|
US8056121B2
(en)
|
2007-10-26 |
2011-11-08 |
International Business Machines Corporation |
Virtual universe account protection
|
US8006103B2
(en)
|
2007-10-26 |
2011-08-23 |
Hewlett-Packard Development Company, L.P. |
TPM device for multi-processor systems
|
IL187043A0
(en)
|
2007-10-30 |
2008-02-09 |
Sandisk Il Ltd |
Secure pipeline manager
|
US8220029B2
(en)
|
2007-11-13 |
2012-07-10 |
Samsung Electronics Co., Ltd. |
Method and system for enforcing trusted computing policies in a hypervisor security module architecture
|
US8171309B1
(en)
|
2007-11-16 |
2012-05-01 |
Marvell International Ltd. |
Secure memory controlled access
|
US7733117B1
(en)
|
2007-11-20 |
2010-06-08 |
Freescale Semiconductor, Inc. |
Method for protecting a security real time clock generator and a device having protection capabilities
|
US7827326B2
(en)
|
2007-11-26 |
2010-11-02 |
Alcatel-Lucent Usa Inc. |
Method and apparatus for delegation of secure operating mode access privilege from processor to peripheral
|
US7730248B2
(en)
|
2007-12-13 |
2010-06-01 |
Texas Instruments Incorporated |
Interrupt morphing and configuration, circuits, systems and processes
|
US7827359B2
(en)
|
2007-12-14 |
2010-11-02 |
Spansion Llc |
Clock encoded pre-fetch to access memory data in clustering network environment
|
US8205260B2
(en)
|
2007-12-19 |
2012-06-19 |
Symantec Operating Corporation |
Detection of window replacement by a malicious software program
|
US7962738B2
(en)
|
2007-12-20 |
2011-06-14 |
Intel Corporation |
Hypervisor runtime integrity support
|
US8032942B2
(en)
|
2007-12-31 |
2011-10-04 |
Intel Corporation |
Configuration of virtual trusted platform module
|
US8042190B2
(en)
|
2007-12-31 |
2011-10-18 |
Intel Corporation |
Pre-boot protected memory channel
|
US7703507B2
(en)
|
2008-01-04 |
2010-04-27 |
Intelligent Tools Ip, Llc |
Downhole tool delivery system
|
US7966465B2
(en)
|
2008-01-17 |
2011-06-21 |
Broadcom Corporation |
Method and system for secure code encryption for PC-slave devices
|
US8160975B2
(en)
|
2008-01-25 |
2012-04-17 |
Mcafee, Inc. |
Granular support vector machine with random granularity
|
US7890591B2
(en)
|
2008-01-31 |
2011-02-15 |
International Business Machines Corporation |
Method for an efficient electronic messaging system
|
US8171554B2
(en)
|
2008-02-04 |
2012-05-01 |
Yuval Elovici |
System that provides early detection, alert, and response to electronic threats
|
US20090216680A1
(en)
|
2008-02-26 |
2009-08-27 |
Battelle Energy Alliance, Llc |
Systems and Methods for Performing File Distribution and Purchase
|
US9015704B2
(en)
|
2008-03-24 |
2015-04-21 |
International Business Machines Corporation |
Context agent injection using virtual machine introspection
|
US8135838B2
(en)
|
2008-04-08 |
2012-03-13 |
Geminare Incorporated |
System and method for providing data and application continuity in a computer system
|
US8175266B2
(en)
|
2008-05-07 |
2012-05-08 |
Apple Inc. |
System and method of performing authentication
|
US8036378B2
(en)
|
2008-05-07 |
2011-10-11 |
Apple Inc. |
System and method of authentication
|
US8978132B2
(en)
|
2008-05-24 |
2015-03-10 |
Via Technologies, Inc. |
Apparatus and method for managing a microprocessor providing for a secure execution mode
|
US8272059B2
(en)
|
2008-05-28 |
2012-09-18 |
International Business Machines Corporation |
System and method for identification and blocking of malicious code for web browser script engines
|
US7966664B2
(en)
|
2008-06-03 |
2011-06-21 |
Hewlett-Packard Development Company, L.P. |
Error and exception message handling framework
|
US8185749B2
(en)
|
2008-09-02 |
2012-05-22 |
Apple Inc. |
System and method for revising boolean and arithmetic operations
|
US8122235B2
(en)
|
2008-06-10 |
2012-02-21 |
Dell Products, Lp |
System and method of delaying power-up of an information handling system
|
US8266597B2
(en)
|
2008-06-16 |
2012-09-11 |
International Business Machines Corporation |
Dynamically patching computer code using breakpoints
|
US7984286B2
(en)
|
2008-06-25 |
2011-07-19 |
Intel Corporation |
Apparatus and method for secure boot environment
|
US8171336B2
(en)
|
2008-06-27 |
2012-05-01 |
Freescale Semiconductor, Inc. |
Method for protecting a secured real time clock module and a device having protection capabilities
|
US8261320B1
(en)
|
2008-06-30 |
2012-09-04 |
Symantec Corporation |
Systems and methods for securely managing access to data
|
US8140825B2
(en)
|
2008-08-05 |
2012-03-20 |
International Business Machines Corporation |
Systems and methods for selectively closing pages in a memory
|
US8010804B2
(en)
|
2008-08-08 |
2011-08-30 |
International Business Machines Corporation |
Method to protect secrets against encrypted section attack
|
US8051467B2
(en)
|
2008-08-26 |
2011-11-01 |
Atmel Corporation |
Secure information processing
|
US8086480B2
(en)
|
2008-09-25 |
2011-12-27 |
Ebay Inc. |
Methods and systems for activity-based recommendations
|
EP2346428B1
(en)
|
2008-09-25 |
2019-11-06 |
Zeltiq Aesthetics, Inc. |
Treatment planning systems and methods for body contouring applications
|
US8209521B2
(en)
|
2008-10-18 |
2012-06-26 |
Micron Technology, Inc. |
Methods of indirect register access including automatic modification of a directly accessible address register
|
US8136167B1
(en)
|
2008-10-20 |
2012-03-13 |
Google Inc. |
Systems and methods for providing image feedback
|
US8094816B2
(en)
|
2008-10-21 |
2012-01-10 |
Apple Inc. |
System and method for stream/block cipher with internal random states
|
US9166797B2
(en)
|
2008-10-24 |
2015-10-20 |
Microsoft Technology Licensing, Llc |
Secured compartment for transactions
|
US8051097B2
(en)
|
2008-12-15 |
2011-11-01 |
Apple Inc. |
System and method for authentication using a shared table and sorting exponentiation
|
US8213618B2
(en)
|
2008-12-30 |
2012-07-03 |
Intel Corporation |
Protecting content on client platforms
|
US8103883B2
(en)
|
2008-12-31 |
2012-01-24 |
Intel Corporation |
Method and apparatus for enforcing use of danbury key management services for software applied full volume encryption
|
US8140780B2
(en)
|
2008-12-31 |
2012-03-20 |
Micron Technology, Inc. |
Systems, methods, and devices for configuring a device
|
US8281395B2
(en)
|
2009-01-07 |
2012-10-02 |
Micron Technology, Inc. |
Pattern-recognition processor with matching-data reporting module
|
US8225110B2
(en)
|
2009-01-09 |
2012-07-17 |
Telefonaktiebolaget Lm Ericsson (Publ) |
Cryptographic protection of usage restrictions in electronic devices
|
JP5317807B2
(en)
*
|
2009-04-13 |
2013-10-16 |
株式会社日立製作所 |
File control system and file control computer used therefor
|
US8191126B2
(en)
|
2009-05-04 |
2012-05-29 |
Indian Institute Of Technology Madras |
Methods and devices for pattern-based user authentication
|
US8286004B2
(en)
|
2009-10-09 |
2012-10-09 |
Lsi Corporation |
Saving encryption keys in one-time programmable memory
|
US8132073B1
(en)
|
2009-06-30 |
2012-03-06 |
Emc Corporation |
Distributed storage system with enhanced security
|
US8255991B1
(en)
|
2009-08-17 |
2012-08-28 |
Google Inc. |
Computer application pre-permissioning
|
EP3002683B1
(en)
|
2009-12-14 |
2017-07-12 |
Citrix Systems Inc. |
Methods and systems for communicating between trusted and non-trusted virtual machines
|
US8024581B2
(en)
|
2009-12-18 |
2011-09-20 |
CompuGroup Medical AG |
Computer readable storage medium for generating a pseudonym, computer implemented method and computing device
|
US8209510B1
(en)
|
2010-01-13 |
2012-06-26 |
Juniper Networks, Inc. |
Secure pool memory management
|
JP5463940B2
(en)
|
2010-02-03 |
2014-04-09 |
株式会社リコー |
Sheet feeding apparatus and image forming apparatus
|
US8195984B2
(en)
|
2010-05-26 |
2012-06-05 |
Telcordia Technologies, Inc. |
System and method for a staggered execution environment
|
US9009386B2
(en)
*
|
2010-12-13 |
2015-04-14 |
International Business Machines Corporation |
Systems and methods for managing read-only memory
|
US8261085B1
(en)
|
2011-06-22 |
2012-09-04 |
Media Patents, S.L. |
Methods, apparatus and systems to improve security in computer systems
|
US8261090B1
(en)
|
2011-09-28 |
2012-09-04 |
Google Inc. |
Login to a computing device based on facial recognition
|
US8239918B1
(en)
|
2011-10-11 |
2012-08-07 |
Google Inc. |
Application marketplace administrative controls
|
WO2014046974A2
(en)
|
2012-09-20 |
2014-03-27 |
Case Paul Sr |
Case secure computer architecture
|