|
US7362775B1
(en)
|
1996-07-02 |
2008-04-22 |
Wistaria Trading, Inc. |
Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management
|
|
US5943422A
(en)
|
1996-08-12 |
1999-08-24 |
Intertrust Technologies Corp. |
Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
|
|
US7143290B1
(en)
|
1995-02-13 |
2006-11-28 |
Intertrust Technologies Corporation |
Trusted and secure techniques, systems and methods for item delivery and execution
|
|
US6658568B1
(en)
|
1995-02-13 |
2003-12-02 |
Intertrust Technologies Corporation |
Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management
|
|
US7069451B1
(en)
|
1995-02-13 |
2006-06-27 |
Intertrust Technologies Corp. |
Systems and methods for secure transaction management and electronic rights protection
|
|
US5892900A
(en)
|
1996-08-30 |
1999-04-06 |
Intertrust Technologies Corp. |
Systems and methods for secure transaction management and electronic rights protection
|
|
US7165174B1
(en)
|
1995-02-13 |
2007-01-16 |
Intertrust Technologies Corp. |
Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management
|
|
EP1515216B1
(en)
|
1995-02-13 |
2014-09-24 |
Intertrust Technologies Corporation |
Systems and methods for secure transaction management and electronic rights protection
|
|
US6948070B1
(en)
|
1995-02-13 |
2005-09-20 |
Intertrust Technologies Corporation |
Systems and methods for secure transaction management and electronic rights protection
|
|
US7124302B2
(en)
|
1995-02-13 |
2006-10-17 |
Intertrust Technologies Corp. |
Systems and methods for secure transaction management and electronic rights protection
|
|
US6157721A
(en)
|
1996-08-12 |
2000-12-05 |
Intertrust Technologies Corp. |
Systems and methods using cryptography to protect secure computing environments
|
|
US7133846B1
(en)
|
1995-02-13 |
2006-11-07 |
Intertrust Technologies Corp. |
Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management
|
|
US7133845B1
(en)
|
1995-02-13 |
2006-11-07 |
Intertrust Technologies Corp. |
System and methods for secure transaction management and electronic rights protection
|
|
US7095854B1
(en)
|
1995-02-13 |
2006-08-22 |
Intertrust Technologies Corp. |
Systems and methods for secure transaction management and electronic rights protection
|
|
US5613004A
(en)
|
1995-06-07 |
1997-03-18 |
The Dice Company |
Steganographic method and device
|
|
US6205249B1
(en)
|
1998-04-02 |
2001-03-20 |
Scott A. Moskowitz |
Multiple transform utilization and applications for secure digital watermarking
|
|
US7664263B2
(en)
|
1998-03-24 |
2010-02-16 |
Moskowitz Scott A |
Method for combining transfer functions with predetermined key creation
|
|
US7095874B2
(en)
|
1996-07-02 |
2006-08-22 |
Wistaria Trading, Inc. |
Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
|
|
US7346472B1
(en)
|
2000-09-07 |
2008-03-18 |
Blue Spike, Inc. |
Method and device for monitoring and analyzing signals
|
|
US7177429B2
(en)
|
2000-12-07 |
2007-02-13 |
Blue Spike, Inc. |
System and methods for permitting open access to data objects and for securing data within the data objects
|
|
US7159116B2
(en)
|
1999-12-07 |
2007-01-02 |
Blue Spike, Inc. |
Systems, methods and devices for trusted transactions
|
|
US5889868A
(en)
|
1996-07-02 |
1999-03-30 |
The Dice Company |
Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
|
|
US7457962B2
(en)
|
1996-07-02 |
2008-11-25 |
Wistaria Trading, Inc |
Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
|
|
US6052780A
(en)
*
|
1996-09-12 |
2000-04-18 |
Open Security Solutions, Llc |
Computer system and process for accessing an encrypted and self-decrypting digital information product while restricting access to decrypted digital information
|
|
US8079086B1
(en)
|
1997-11-06 |
2011-12-13 |
Finjan, Inc. |
Malicious mobile code runtime monitoring system and methods
|
|
US7058822B2
(en)
|
2000-03-30 |
2006-06-06 |
Finjan Software, Ltd. |
Malicious mobile code runtime monitoring system and methods
|
|
US9219755B2
(en)
|
1996-11-08 |
2015-12-22 |
Finjan, Inc. |
Malicious mobile code runtime monitoring system and methods
|
|
US7730317B2
(en)
|
1996-12-20 |
2010-06-01 |
Wistaria Trading, Inc. |
Linear predictive coding implementation of digital watermarks
|
|
US7062500B1
(en)
|
1997-02-25 |
2006-06-13 |
Intertrust Technologies Corp. |
Techniques for defining, using and manipulating rights management data structures
|
|
US6092147A
(en)
*
|
1997-04-15 |
2000-07-18 |
Sun Microsystems, Inc. |
Virtual machine with securely distributed bytecode verification
|
|
US7092914B1
(en)
|
1997-11-06 |
2006-08-15 |
Intertrust Technologies Corporation |
Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information
|
|
US6480959B1
(en)
|
1997-12-05 |
2002-11-12 |
Jamama, Llc |
Software system and associated methods for controlling the use of computer programs
|
|
US6643775B1
(en)
|
1997-12-05 |
2003-11-04 |
Jamama, Llc |
Use of code obfuscation to inhibit generation of non-use-restricted versions of copy protected software applications
|
|
US7809138B2
(en)
*
|
1999-03-16 |
2010-10-05 |
Intertrust Technologies Corporation |
Methods and apparatus for persistent control and protection of content
|
|
US6957341B2
(en)
*
|
1998-05-14 |
2005-10-18 |
Purdue Research Foundation |
Method and system for secure computational outsourcing and disguise
|
|
WO1999064973A1
(en)
*
|
1998-06-10 |
1999-12-16 |
Auckland Uniservices Limited |
Software watermarking techniques
|
|
US6763370B1
(en)
|
1998-11-16 |
2004-07-13 |
Softricity, Inc. |
Method and apparatus for content protection in a secure content delivery system
|
|
US7017188B1
(en)
*
|
1998-11-16 |
2006-03-21 |
Softricity, Inc. |
Method and apparatus for secure content delivery over broadband access networks
|
|
WO2000034845A2
(en)
*
|
1998-12-08 |
2000-06-15 |
Mediadna, Inc. |
A system and method of obfuscating data
|
|
US7526468B2
(en)
*
|
1999-01-08 |
2009-04-28 |
Computer Associates Think, Inc. |
System and method for recursive path analysis of DBMS procedures
|
|
FR2790844B1
(fr)
*
|
1999-03-09 |
2001-05-25 |
Gemplus Card Int |
Procede et dispositif de surveillance du deroulement d'un programme, dispositif programme permettant la surveillance de son programme
|
|
US7664264B2
(en)
|
1999-03-24 |
2010-02-16 |
Blue Spike, Inc. |
Utilizing data reduction in steganographic and cryptographic systems
|
|
US7730169B1
(en)
|
1999-04-12 |
2010-06-01 |
Softricity, Inc. |
Business method and system for serving third party software applications
|
|
US7370071B2
(en)
|
2000-03-17 |
2008-05-06 |
Microsoft Corporation |
Method for serving third party software applications from servers to client computers
|
|
US7263722B1
(en)
*
|
1999-05-12 |
2007-08-28 |
Fraunhofer Crcg, Inc. |
Obfuscation of executable code
|
|
US8099758B2
(en)
|
1999-05-12 |
2012-01-17 |
Microsoft Corporation |
Policy based composite file system and method
|
|
US7421586B2
(en)
*
|
1999-05-12 |
2008-09-02 |
Fraunhofer Gesselschaft |
Protecting mobile code against malicious hosts
|
|
WO2000072112A2
(en)
*
|
1999-05-12 |
2000-11-30 |
Fraunhofer Crcg, Inc. |
Obfuscation of executable code
|
|
US6959384B1
(en)
*
|
1999-12-14 |
2005-10-25 |
Intertrust Technologies Corporation |
Systems and methods for authenticating and protecting the integrity of data streams and other data
|
|
WO2000077596A1
(en)
*
|
1999-06-09 |
2000-12-21 |
Cloakware Corporation |
Tamper resistant software encoding
|
|
US6594761B1
(en)
|
1999-06-09 |
2003-07-15 |
Cloakware Corporation |
Tamper resistant software encoding
|
|
US7152165B1
(en)
|
1999-07-16 |
2006-12-19 |
Intertrust Technologies Corp. |
Trusted storage systems and methods
|
|
WO2001006374A2
(en)
|
1999-07-16 |
2001-01-25 |
Intertrust Technologies Corp. |
System and method for securing an untrusted storage
|
|
US7243236B1
(en)
|
1999-07-29 |
2007-07-10 |
Intertrust Technologies Corp. |
Systems and methods for using cryptography to protect secure and insecure computing environments
|
|
US7770016B2
(en)
|
1999-07-29 |
2010-08-03 |
Intertrust Technologies Corporation |
Systems and methods for watermarking software and other media
|
|
US7430670B1
(en)
|
1999-07-29 |
2008-09-30 |
Intertrust Technologies Corp. |
Software self-defense systems and methods
|
|
EP1531383A3
(en)
*
|
1999-07-30 |
2005-07-27 |
Intertrust Technologies Corp. |
Methods and systems for transaction record delivery using thresholds and multi-stage protocol
|
|
US7475246B1
(en)
|
1999-08-04 |
2009-01-06 |
Blue Spike, Inc. |
Secure personal content server
|
|
US6779114B1
(en)
*
|
1999-08-19 |
2004-08-17 |
Cloakware Corporation |
Tamper resistant software-control flow encoding
|
|
US7406603B1
(en)
|
1999-08-31 |
2008-07-29 |
Intertrust Technologies Corp. |
Data protection systems and methods
|
|
US7757097B2
(en)
|
1999-09-03 |
2010-07-13 |
Purdue Research Foundation |
Method and system for tamperproofing software
|
|
US7287166B1
(en)
*
|
1999-09-03 |
2007-10-23 |
Purdue Research Foundation |
Guards for application in software tamperproofing
|
|
US6985885B1
(en)
|
1999-09-21 |
2006-01-10 |
Intertrust Technologies Corp. |
Systems and methods for pricing and selling digital goods
|
|
US8055894B2
(en)
|
1999-11-09 |
2011-11-08 |
Google Inc. |
Process and streaming server for encrypting a data stream with bandwidth based variation
|
|
US6449719B1
(en)
*
|
1999-11-09 |
2002-09-10 |
Widevine Technologies, Inc. |
Process and streaming server for encrypting a data stream
|
|
US6970849B1
(en)
|
1999-12-17 |
2005-11-29 |
Microsoft Corporation |
Inter-server communication using request with encrypted parameter
|
|
US7047411B1
(en)
|
1999-12-17 |
2006-05-16 |
Microsoft Corporation |
Server for an electronic distribution system and method of operating same
|
|
US6996720B1
(en)
|
1999-12-17 |
2006-02-07 |
Microsoft Corporation |
System and method for accessing protected content in a rights-management architecture
|
|
US6832316B1
(en)
*
|
1999-12-22 |
2004-12-14 |
Intertrust Technologies, Corp. |
Systems and methods for protecting data secrecy and integrity
|
|
AUPQ486599A0
(en)
*
|
1999-12-23 |
2000-02-03 |
Zentronix Pty Ltd |
A method of storing and retrieving miniaturised data
|
|
US20020009198A1
(en)
*
|
2000-01-18 |
2002-01-24 |
Lipton Richard J. |
Method and systems for data security
|
|
JP3888823B2
(ja)
*
|
2000-02-14 |
2007-03-07 |
松下電器産業株式会社 |
半導体集積回路
|
|
US6829710B1
(en)
*
|
2000-03-14 |
2004-12-07 |
Microsoft Corporation |
Technique for producing, through watermarking, highly tamper-resistant executable code and resulting “watermarked” code so formed
|
|
US7054443B1
(en)
*
|
2000-03-27 |
2006-05-30 |
Microsoft Corporation |
System and method for protecting digital goods using random and automatic code obfuscation
|
|
US7080257B1
(en)
*
|
2000-03-27 |
2006-07-18 |
Microsoft Corporation |
Protecting digital goods using oblivious checking
|
|
US7266681B1
(en)
|
2000-04-07 |
2007-09-04 |
Intertrust Technologies Corp. |
Network communications security agent
|
|
US7085839B1
(en)
|
2000-04-07 |
2006-08-01 |
Intertrust Technologies Corporation |
Network content management
|
|
CA2305078A1
(en)
*
|
2000-04-12 |
2001-10-12 |
Cloakware Corporation |
Tamper resistant software - mass data encoding
|
|
US7000119B1
(en)
|
2000-04-20 |
2006-02-14 |
Realnetworks, Inc. |
Instruction/data protection employing derived obscuring instruction/data
|
|
CA2447451C
(en)
*
|
2000-05-12 |
2013-02-12 |
Xtreamlok Pty. Ltd. |
Information security method and system
|
|
US7313692B2
(en)
|
2000-05-19 |
2007-12-25 |
Intertrust Technologies Corp. |
Trust management systems and methods
|
|
US7107448B1
(en)
|
2000-06-04 |
2006-09-12 |
Intertrust Technologies Corporation |
Systems and methods for governing content rendering, protection, and management applications
|
|
US7213266B1
(en)
|
2000-06-09 |
2007-05-01 |
Intertrust Technologies Corp. |
Systems and methods for managing and protecting electronic content and applications
|
|
US7050586B1
(en)
|
2000-06-19 |
2006-05-23 |
Intertrust Technologies Corporation |
Systems and methods for retrofitting electronic appliances to accept different content formats
|
|
US7065652B1
(en)
*
|
2000-06-21 |
2006-06-20 |
Aladdin Knowledge Systems, Ltd. |
System for obfuscating computer code upon disassembly
|
|
US7158953B1
(en)
|
2000-06-27 |
2007-01-02 |
Microsoft Corporation |
Method and system for limiting the use of user-specific software features
|
|
US7539875B1
(en)
*
|
2000-06-27 |
2009-05-26 |
Microsoft Corporation |
Secure repository with layers of tamper resistance and system and method for providing same
|
|
US7051200B1
(en)
|
2000-06-27 |
2006-05-23 |
Microsoft Corporation |
System and method for interfacing a software process to secure repositories
|
|
US6981262B1
(en)
|
2000-06-27 |
2005-12-27 |
Microsoft Corporation |
System and method for client interaction in a multi-level rights-management architecture
|
|
US7171692B1
(en)
|
2000-06-27 |
2007-01-30 |
Microsoft Corporation |
Asynchronous communication within a server arrangement
|
|
US7017189B1
(en)
|
2000-06-27 |
2006-03-21 |
Microsoft Corporation |
System and method for activating a rendering device in a multi-level rights-management architecture
|
|
WO2002001333A2
(en)
*
|
2000-06-27 |
2002-01-03 |
Microsoft Corporation |
System and method for providing an individualized secure repository
|
|
US6891953B1
(en)
|
2000-06-27 |
2005-05-10 |
Microsoft Corporation |
Method and system for binding enhanced software features to a persona
|
|
WO2002003604A2
(en)
*
|
2000-06-29 |
2002-01-10 |
Cachestream Corporation |
Digital rights management
|
|
US20020046045A1
(en)
|
2000-06-30 |
2002-04-18 |
Attila Narin |
Architecture for an electronic shopping service integratable with a software application
|
|
US7225159B2
(en)
|
2000-06-30 |
2007-05-29 |
Microsoft Corporation |
Method for authenticating and securing integrated bookstore entries
|
|
US6938170B1
(en)
*
|
2000-07-17 |
2005-08-30 |
International Business Machines Corporation |
System and method for preventing automated crawler access to web-based data sources using a dynamic data transcoding scheme
|
|
US8443035B2
(en)
*
|
2000-09-01 |
2013-05-14 |
OP40 Holding, Inc. |
System and method for collaboration using web browsers
|
|
US7165175B1
(en)
|
2000-09-06 |
2007-01-16 |
Widevine Technologies, Inc. |
Apparatus, system and method for selectively encrypting different portions of data sent over a network
|
|
US7127615B2
(en)
|
2000-09-20 |
2006-10-24 |
Blue Spike, Inc. |
Security based on subliminal and supraliminal channels for data objects
|
|
US7043473B1
(en)
|
2000-11-22 |
2006-05-09 |
Widevine Technologies, Inc. |
Media tracking system and method
|
|
CA2327911A1
(en)
*
|
2000-12-08 |
2002-06-08 |
Cloakware Corporation |
Obscuring functions in computer software
|
|
US7150045B2
(en)
|
2000-12-14 |
2006-12-12 |
Widevine Technologies, Inc. |
Method and apparatus for protection of electronic media
|
|
FR2818772A1
(fr)
*
|
2000-12-21 |
2002-06-28 |
Bull Cp8 |
Procede de securisation d'un operateur logique ou mathematique implante dans un module electronique a microprocesseur, ainsi que le module electronique et le systeme embarque associes
|
|
JP4252229B2
(ja)
|
2001-03-28 |
2009-04-08 |
ユミルリンク株式会社 |
情報交換システム、情報通信端末、情報交換方法、プログラム、および、記録媒体
|
|
US7580988B2
(en)
*
|
2001-04-05 |
2009-08-25 |
Intertrust Technologies Corporation |
System and methods for managing the distribution of electronic content
|
|
US7136840B2
(en)
*
|
2001-04-20 |
2006-11-14 |
Intertrust Technologies Corp. |
Systems and methods for conducting transactions and communications using a trusted third party
|
|
US7188342B2
(en)
|
2001-04-20 |
2007-03-06 |
Microsoft Corporation |
Server controlled branding of client software deployed over computer networks
|
|
FR2824401A1
(fr)
*
|
2001-05-04 |
2002-11-08 |
Thomson Csf |
Dispositif et procede pour la signature, le marquage et l'authentification de programmes d'ordinateur
|
|
FR2824402A1
(fr)
*
|
2001-05-04 |
2002-11-08 |
Thales Sa |
Dispositif et procede pour la signature, le marquage et l'authenticification de programmes d'ordinateur
|
|
CA2348355A1
(en)
*
|
2001-05-24 |
2002-11-24 |
Cloakware Corporation |
General scheme of using encodings in computations
|
|
US7581103B2
(en)
|
2001-06-13 |
2009-08-25 |
Intertrust Technologies Corporation |
Software self-checking systems and methods
|
|
WO2003003169A2
(en)
*
|
2001-06-28 |
2003-01-09 |
Cloakware Corporation |
Secure method and system for biometric verification
|
|
US7421411B2
(en)
|
2001-07-06 |
2008-09-02 |
Nokia Corporation |
Digital rights management in a mobile communications environment
|
|
US7313824B1
(en)
*
|
2001-07-13 |
2007-12-25 |
Liquid Machines, Inc. |
Method for protecting digital content from unauthorized use by automatically and dynamically integrating a content-protection agent
|
|
US7111285B2
(en)
|
2001-07-17 |
2006-09-19 |
Liquid Machines, Inc. |
Method and system for protecting software applications against static and dynamic software piracy techniques
|
|
US6694435B2
(en)
|
2001-07-25 |
2004-02-17 |
Apple Computer, Inc. |
Method of obfuscating computer instruction streams
|
|
EP1280148A3
(en)
*
|
2001-07-26 |
2003-09-17 |
Irdeto Access B.V. |
Compilation technique and data distribution system using the same
|
|
FR2828303B1
(fr)
*
|
2001-07-31 |
2010-09-03 |
Validy |
Procede pour proteger un logiciel a l'aide d'un principe dit de "renommage" contre son utilisation non autorisee
|
|
FR2828302B1
(fr)
*
|
2001-07-31 |
2010-09-03 |
Validy |
Procede pour proteger un logiciel a l'aide d'un principe dit de "branchement conditionnel" contre son utilisation non autorisee
|
|
FR2828300B1
(fr)
*
|
2001-07-31 |
2010-09-03 |
Validy |
Procede pour proteger un logiciel a l'aide d'un principe dit de "fonctions elementaires" contre son utilisation non autorisee
|
|
FR2828304B1
(fr)
*
|
2001-07-31 |
2010-09-03 |
Validy |
Procede pour proteger un logiciel a l'aide d'un principe dit de "dissociation temporelle" contre son utilisation non autorisee
|
|
FR2828305B1
(fr)
*
|
2001-07-31 |
2010-09-03 |
Validy |
Procede pour proteger un logiciel a l'aide d'un principe dit de "variable" contre son utilisation non autorisee
|
|
US7269740B2
(en)
*
|
2001-08-01 |
2007-09-11 |
Sas Validy |
Method to protect software against unwanted use with a “variable principle”
|
|
US7434064B2
(en)
*
|
2001-08-01 |
2008-10-07 |
Sas Validy |
Method to protect software against unwanted use with a “elementary functions” principle
|
|
US7343494B2
(en)
*
|
2001-08-01 |
2008-03-11 |
Sas Validy |
Method to protect software against unwanted use with a “renaming” principle
|
|
US7502940B2
(en)
*
|
2001-08-01 |
2009-03-10 |
Sas Validy |
Method to protect software against unwanted use with a “conditional branch” principle
|
|
GB0121064D0
(en)
*
|
2001-08-31 |
2001-10-24 |
Transitive Technologies Ltd |
Obtaining translation of generic code representation
|
|
US20070277037A1
(en)
*
|
2001-09-06 |
2007-11-29 |
Randy Langer |
Software component authentication via encrypted embedded self-signatures
|
|
US7210134B1
(en)
*
|
2001-09-06 |
2007-04-24 |
Sonic Solutions |
Deterring reverse-engineering of software systems by randomizing the siting of stack-based data
|
|
ATE381059T1
(de)
*
|
2001-10-31 |
2007-12-15 |
Aplix Corp |
System zum ausführen von zwischenkode, methode zum ausführen von zwischenkode, und computerprogrammprodukt zum ausführen von zwischenkode
|
|
EP1308838A3
(en)
*
|
2001-10-31 |
2007-12-19 |
Aplix Corporation |
Intermediate code preprocessing apparatus, intermediate code execution apparatus, intermediate code execution system, and computer program product for preprocessing or executing intermediate code
|
|
CA2363795A1
(en)
*
|
2001-11-26 |
2003-05-26 |
Cloakware Corporation |
Computer system protection by communication diversity
|
|
US7328345B2
(en)
|
2002-01-29 |
2008-02-05 |
Widevine Technologies, Inc. |
Method and system for end to end securing of content for video on demand
|
|
CA2369304A1
(en)
*
|
2002-01-30 |
2003-07-30 |
Cloakware Corporation |
A protocol to hide cryptographic private keys
|
|
RU2313122C2
(ru)
*
|
2002-03-13 |
2007-12-20 |
Мацусита Электрик Индастриал Ко., Лтд. |
Защищенное устройство
|
|
JP2003280754A
(ja)
*
|
2002-03-25 |
2003-10-02 |
Nec Corp |
隠蔽化ソースプログラム、ソースプログラム変換方法及び装置並びにソース変換プログラム
|
|
JP2003280755A
(ja)
*
|
2002-03-25 |
2003-10-02 |
Nec Corp |
自己復元型プログラム、プログラム生成方法及び装置、情報処理装置並びにプログラム
|
|
US7299292B2
(en)
*
|
2002-03-29 |
2007-11-20 |
Widevine Technologies, Inc. |
Process and streaming server for encrypting a data stream to a virtual smart card client system
|
|
US7287275B2
(en)
|
2002-04-17 |
2007-10-23 |
Moskowitz Scott A |
Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth
|
|
US20030200449A1
(en)
*
|
2002-04-17 |
2003-10-23 |
International Business Machines Corporation |
Method of accessing a shared subroutine of computer system
|
|
US7383570B2
(en)
|
2002-04-25 |
2008-06-03 |
Intertrust Technologies, Corp. |
Secure authentication systems and methods
|
|
US7149899B2
(en)
|
2002-04-25 |
2006-12-12 |
Intertrust Technologies Corp. |
Establishing a secure channel with a human user
|
|
US20030217280A1
(en)
*
|
2002-05-17 |
2003-11-20 |
Keaton Thomas S. |
Software watermarking for anti-tamper protection
|
|
US7272725B2
(en)
*
|
2002-06-25 |
2007-09-18 |
Sas Validy |
Method to protect software against unwanted use with a “temporal dissociation” principle
|
|
US7383443B2
(en)
*
|
2002-06-27 |
2008-06-03 |
Microsoft Corporation |
System and method for obfuscating code using instruction replacement scheme
|
|
US7254586B2
(en)
*
|
2002-06-28 |
2007-08-07 |
Microsoft Corporation |
Secure and opaque type library providing secure data protection of variables
|
|
US7877613B2
(en)
*
|
2002-09-04 |
2011-01-25 |
Fraunhofer-Gesellschaft Zur Foerderung Der Angewandten Forschung E.V. |
Protecting mobile code against malicious hosts
|
|
US7594271B2
(en)
*
|
2002-09-20 |
2009-09-22 |
Widevine Technologies, Inc. |
Method and system for real-time tamper evidence gathering for software
|
|
US7603662B2
(en)
*
|
2002-10-09 |
2009-10-13 |
Microsoft Corporation |
System and method for sensing types of local variables
|
|
JP2004362532A
(ja)
*
|
2002-10-25 |
2004-12-24 |
Matsushita Electric Ind Co Ltd |
透かし挿入装置および透かし取出装置
|
|
US20040083177A1
(en)
*
|
2002-10-29 |
2004-04-29 |
General Instrument Corporation |
Method and apparatus for pre-encrypting VOD material with a changing cryptographic key
|
|
US7150003B2
(en)
*
|
2002-11-25 |
2006-12-12 |
Matsushita Electric Industrial Co., Ltd. |
Class coalescence for obfuscation of object-oriented software
|
|
US7051322B2
(en)
*
|
2002-12-06 |
2006-05-23 |
@Stake, Inc. |
Software analysis framework
|
|
US7149900B2
(en)
*
|
2002-12-12 |
2006-12-12 |
Intel Corporation |
Method of defending software from debugger attacks
|
|
US7797064B2
(en)
|
2002-12-13 |
2010-09-14 |
Stephen Loomis |
Apparatus and method for skipping songs without delay
|
|
US7412532B2
(en)
|
2002-12-13 |
2008-08-12 |
Aol Llc, A Deleware Limited Liability Company |
Multimedia scheduler
|
|
US7912920B2
(en)
|
2002-12-13 |
2011-03-22 |
Stephen Loomis |
Stream sourcing content delivery system
|
|
FR2849232B1
(fr)
*
|
2002-12-24 |
2005-02-25 |
Trusted Logic |
Procede pour la securisation des systemes informatiques incorporant un module d'interpretation de code
|
|
US7584354B2
(en)
*
|
2003-01-31 |
2009-09-01 |
Intel Corporation |
Implementing portable content protection to secure secrets
|
|
US9818136B1
(en)
|
2003-02-05 |
2017-11-14 |
Steven M. Hoffberg |
System and method for determining contingent relevance
|
|
US20060130016A1
(en)
*
|
2003-03-17 |
2006-06-15 |
Wagner John R |
Method of kernal-mode instruction interception and apparatus therefor
|
|
US7356143B2
(en)
|
2003-03-18 |
2008-04-08 |
Widevine Technologies, Inc |
System, method, and apparatus for securely providing content viewable on a secure device
|
|
US7007170B2
(en)
|
2003-03-18 |
2006-02-28 |
Widevine Technologies, Inc. |
System, method, and apparatus for securely providing content viewable on a secure device
|
|
US8510571B1
(en)
|
2003-03-24 |
2013-08-13 |
Hoi Chang |
System and method for inserting security mechanisms into a software program
|
|
US20040199771A1
(en)
*
|
2003-04-04 |
2004-10-07 |
Widevine Technologies, Inc. |
Method for tracing a security breach in highly distributed content
|
|
DE10319435B4
(de)
*
|
2003-04-25 |
2018-07-26 |
Whitecryption Corporation |
Verfahren zur Verarbeitung von Daten zum Schutz eines Softwareprogramms vor Rekonstruktion
|
|
KR100568228B1
(ko)
*
|
2003-05-20 |
2006-04-07 |
삼성전자주식회사 |
고유번호를 이용한 프로그램 탬퍼 방지 방법과 난독처리된 프로그램 업그레이드 방법, 상기 방법을 위한 장치
|
|
EP1629382A4
(en)
|
2003-06-02 |
2011-12-21 |
Liquid Machines Inc |
MANAGING DATA OBJECTS IN DYNAMIC, DISTRIBUTED AND COLLABORATIVE CONTEXTS
|
|
CN1860761B
(zh)
|
2003-06-05 |
2015-09-23 |
英特特拉斯特技术公司 |
用于对等服务编排的可互操作系统和方法
|
|
US20050108562A1
(en)
*
|
2003-06-18 |
2005-05-19 |
Khazan Roger I. |
Technique for detecting executable malicious code using a combination of static and dynamic analyses
|
|
US7519668B2
(en)
*
|
2003-06-20 |
2009-04-14 |
Microsoft Corporation |
Obfuscation of spam filter
|
|
US20050021756A1
(en)
*
|
2003-07-26 |
2005-01-27 |
Grant Bruce K. |
Method of developing, delivering and rendering network applications
|
|
US20050028010A1
(en)
*
|
2003-07-29 |
2005-02-03 |
International Business Machines Corporation |
System and method for addressing denial of service virus attacks
|
|
GB2405958A
(en)
*
|
2003-08-20 |
2005-03-16 |
Macrovision Europ Ltd |
Code obfuscation and controlling a processor by emulation
|
|
US7454323B1
(en)
*
|
2003-08-22 |
2008-11-18 |
Altera Corporation |
Method for creation of secure simulation models
|
|
US7340734B1
(en)
*
|
2003-08-27 |
2008-03-04 |
Nvidia Corporation |
Method and apparatus to make code more difficult to reverse engineer
|
|
US7591021B2
(en)
*
|
2003-09-05 |
2009-09-15 |
Microsoft Corporation |
Object model document for obfuscating object model therein
|
|
JP4568489B2
(ja)
*
|
2003-09-11 |
2010-10-27 |
富士通株式会社 |
プログラム保護方法、プログラム保護プログラムおよびプログラム保護装置
|
|
US7353499B2
(en)
*
|
2003-09-25 |
2008-04-01 |
Sun Microsystems, Inc. |
Multiple instruction dispatch tables for application program obfuscation
|
|
US7424620B2
(en)
*
|
2003-09-25 |
2008-09-09 |
Sun Microsystems, Inc. |
Interleaved data and instruction streams for application program obfuscation
|
|
US20050071656A1
(en)
*
|
2003-09-25 |
2005-03-31 |
Klein Dean A. |
Secure processor-based system and method
|
|
US20050069138A1
(en)
*
|
2003-09-25 |
2005-03-31 |
Sun Microsystems, Inc., A Delaware Corporation |
Application program obfuscation
|
|
US8220058B2
(en)
*
|
2003-09-25 |
2012-07-10 |
Oracle America, Inc. |
Rendering and encryption engine for application program obfuscation
|
|
US7415618B2
(en)
*
|
2003-09-25 |
2008-08-19 |
Sun Microsystems, Inc. |
Permutation of opcode values for application program obfuscation
|
|
US7363620B2
(en)
*
|
2003-09-25 |
2008-04-22 |
Sun Microsystems, Inc. |
Non-linear execution of application program instructions for application program obfuscation
|
|
JP3873047B2
(ja)
*
|
2003-09-30 |
2007-01-24 |
株式会社東芝 |
識別情報埋込装置、識別情報解析装置、識別情報埋込方法、識別情報解析方法及びプログラム
|
|
US7788496B2
(en)
|
2003-10-08 |
2010-08-31 |
Microsoft Corporation |
First computer process and second computer process proxy-executing code on behalf thereof
|
|
US8103592B2
(en)
*
|
2003-10-08 |
2012-01-24 |
Microsoft Corporation |
First computer process and second computer process proxy-executing code on behalf of first process
|
|
US7979911B2
(en)
*
|
2003-10-08 |
2011-07-12 |
Microsoft Corporation |
First computer process and second computer process proxy-executing code from third computer process on behalf of first process
|
|
US7631292B2
(en)
*
|
2003-11-05 |
2009-12-08 |
Microsoft Corporation |
Code individualism and execution protection
|
|
RU2370897C2
(ru)
*
|
2003-12-11 |
2009-10-20 |
Кониклейке Филипс Электроникс Н.В. |
Система блочной криптографической защиты, использующая преобразования для сокрытия основной функции криптографической защиты каждого цикла шифрования
|
|
US7966499B2
(en)
*
|
2004-01-28 |
2011-06-21 |
Irdeto Canada Corporation |
System and method for obscuring bit-wise and two's complement integer computations in software
|
|
FR2866451B1
(fr)
*
|
2004-02-18 |
2008-02-29 |
Cit Alcatel |
Procede et dispositif de transformation d'un systeme d'exploitation en vue de la protection d'un programme informatique contre des intrusions exterieures
|
|
JP4514473B2
(ja)
|
2004-02-23 |
2010-07-28 |
富士通株式会社 |
コンピュータシステム、中央装置及びプログラム実行方法
|
|
US7383583B2
(en)
*
|
2004-03-05 |
2008-06-03 |
Microsoft Corporation |
Static and run-time anti-disassembly and anti-debugging
|
|
JPWO2005098795A1
(ja)
*
|
2004-03-31 |
2008-02-28 |
松下電器産業株式会社 |
コンピュータシステム、コンピュータプログラム及び加算方法
|
|
US8694802B2
(en)
*
|
2004-04-30 |
2014-04-08 |
Apple Inc. |
System and method for creating tamper-resistant code
|
|
NZ533028A
(en)
*
|
2004-05-19 |
2005-09-30 |
Auckland Uniservices Ltd |
Method of introducing digital signature into software
|
|
FR2871255B1
(fr)
*
|
2004-06-04 |
2006-08-04 |
Gemplus Sa |
Procede d'obfuscation de code compile, terminal et logiciel associes
|
|
US7526805B2
(en)
|
2004-06-12 |
2009-04-28 |
Microsoft Corporation |
Thread protection
|
|
US7721340B2
(en)
|
2004-06-12 |
2010-05-18 |
Microsoft Corporation |
Registry protection
|
|
US20050289037A1
(en)
*
|
2004-06-15 |
2005-12-29 |
Smith Joseph B |
Financial asset product and method for implementing same
|
|
CN1977531A
(zh)
*
|
2004-06-28 |
2007-06-06 |
松下电器产业株式会社 |
程序生成装置、程序测试装置、程序执行装置及信息处理系统
|
|
US7694121B2
(en)
*
|
2004-06-30 |
2010-04-06 |
Microsoft Corporation |
System and method for protected operating system boot using state validation
|
|
US7841009B1
(en)
*
|
2004-07-09 |
2010-11-23 |
Angel Secure Networks |
System and method for defending against reverse engineering of software, firmware and hardware
|
|
JPWO2006009081A1
(ja)
*
|
2004-07-16 |
2008-05-01 |
松下電器産業株式会社 |
アプリケーション実行装置及びアプリケーション実行装置のアプリケーション実行方法
|
|
US8631077B2
(en)
|
2004-07-22 |
2014-01-14 |
International Business Machines Corporation |
Duplicate e-mail content detection and automatic doclink conversion
|
|
US20060037005A1
(en)
*
|
2004-08-15 |
2006-02-16 |
Russell Paul F |
Method and apparatus for increasing computer security
|
|
US7890593B2
(en)
*
|
2008-07-17 |
2011-02-15 |
International Business Machines Corporation |
Sectional E-mail Transmission
|
|
US20060041625A1
(en)
|
2004-08-19 |
2006-02-23 |
International Business Machines Corporation |
System and method for sectional e-mail transmission
|
|
US20060041940A1
(en)
*
|
2004-08-21 |
2006-02-23 |
Ko-Cheng Fang |
Computer data protecting method
|
|
US7590589B2
(en)
|
2004-09-10 |
2009-09-15 |
Hoffberg Steven M |
Game theoretic prioritization scheme for mobile ad hoc networks permitting hierarchal deference
|
|
US9609279B2
(en)
|
2004-09-24 |
2017-03-28 |
Google Inc. |
Method and system for providing secure CODECS
|
|
WO2006046187A1
(en)
*
|
2004-10-28 |
2006-05-04 |
Koninklijke Philips Electronics N.V. |
Method and system for obfuscating a cryptographic function
|
|
CN101057245A
(zh)
*
|
2004-11-09 |
2007-10-17 |
皇家飞利浦电子股份有限公司 |
保护dsp算法
|
|
DE102004058882A1
(de)
*
|
2004-12-06 |
2006-06-08 |
Giesecke & Devrient Gmbh |
Erzeugen von Programmcode in einem Ladeformat und Bereitstellen von ausführbarem Programmcode
|
|
EP1674966B1
(en)
*
|
2004-12-22 |
2009-03-11 |
Telefonaktiebolaget L M Ericsson (Publ) |
Watermarking computer program code
|
|
ATE454673T1
(de)
*
|
2004-12-22 |
2010-01-15 |
Ericsson Telefon Ab L M |
Wasserzeichenmarkierung eines computerprogrammcodes mittels äquivalenter mathematischer ausdrücke
|
|
US20060168044A1
(en)
*
|
2005-01-11 |
2006-07-27 |
Yen-Fu Chen |
System and method for display of chained messages in a single email in different orders
|
|
US7689969B1
(en)
*
|
2005-01-18 |
2010-03-30 |
The Mathworks, Inc. |
Obfuscation of automatically generated code
|
|
US20080015999A1
(en)
*
|
2005-02-04 |
2008-01-17 |
Widevine Technologies, Inc. |
Securely ingesting encrypted content into content servers
|
|
WO2006085595A1
(ja)
*
|
2005-02-10 |
2006-08-17 |
Matsushita Electric Industrial Co., Ltd. |
プログラム変換装置及びプログラム実行装置
|
|
JP4675642B2
(ja)
*
|
2005-02-22 |
2011-04-27 |
Kddi株式会社 |
プログラム難読化装置およびその方法ならびにプログラム
|
|
US8020152B2
(en)
*
|
2005-02-24 |
2011-09-13 |
Microsoft Corporation |
Code morphing
|
|
US7587616B2
(en)
*
|
2005-02-25 |
2009-09-08 |
Microsoft Corporation |
System and method of iterative code obfuscation
|
|
US7370190B2
(en)
*
|
2005-03-03 |
2008-05-06 |
Digimarc Corporation |
Data processing systems and methods with enhanced bios functionality
|
|
US7810142B2
(en)
*
|
2005-03-21 |
2010-10-05 |
International Business Machines Corporation |
Auditing compliance with a hippocratic database
|
|
JP4840782B2
(ja)
*
|
2005-03-25 |
2011-12-21 |
パナソニック株式会社 |
プログラム変換装置、セキュア処理装置、コンピュータプログラム及び記録媒体
|
|
US8719786B2
(en)
*
|
2005-03-30 |
2014-05-06 |
Alcatel Lucent |
Method for performing conditionalized N-way merging of source code
|
|
US7805714B2
(en)
*
|
2005-03-30 |
2010-09-28 |
Alcatel-Lucent Usa Inc. |
Technique for constructing syntax-directed search and modifications in program transformation systems
|
|
US7624385B2
(en)
*
|
2005-03-30 |
2009-11-24 |
Alcatel-Lucent Usa Inc. |
Method for handling preprocessing in source code transformation
|
|
US8312297B2
(en)
*
|
2005-04-21 |
2012-11-13 |
Panasonic Corporation |
Program illegiblizing device and method
|
|
US20090217008A1
(en)
*
|
2005-04-21 |
2009-08-27 |
Taichi Sato |
Program conversion device, and secret keeping program
|
|
CN100565541C
(zh)
*
|
2005-04-21 |
2009-12-02 |
松下电器产业株式会社 |
程序变换装置和变换方法
|
|
US20060259903A1
(en)
*
|
2005-05-12 |
2006-11-16 |
Xerox Corporation |
Method for creating unique identification for copies of executable code and management thereof
|
|
US20060259900A1
(en)
*
|
2005-05-12 |
2006-11-16 |
Xerox Corporation |
Method for creating unique identification for copies of executable code and management thereof
|
|
US20070266434A1
(en)
*
|
2006-05-11 |
2007-11-15 |
Reifer Consultants, Inc. |
Protecting Applications Software Against Unauthorized Access, Reverse Engineering or Tampering
|
|
WO2007055729A2
(en)
*
|
2005-05-19 |
2007-05-18 |
Reifer Consultants, Inc. |
Protecting applications software against unauthorized access, reverse engineering or tampering
|
|
JP4669934B2
(ja)
*
|
2005-06-10 |
2011-04-13 |
国立大学法人 奈良先端科学技術大学院大学 |
プログラム変換装置、実行支援装置、それらの方法およびそれらのコンピュータ・プログラム
|
|
US8838974B2
(en)
*
|
2005-07-15 |
2014-09-16 |
The Mathworks, Inc. |
System and method for verifying the integrity of read-only components in deployed mixed-mode applications
|
|
US7620987B2
(en)
*
|
2005-08-12 |
2009-11-17 |
Microsoft Corporation |
Obfuscating computer code to prevent an attack
|
|
WO2007030931A1
(en)
*
|
2005-09-14 |
2007-03-22 |
Tetraglyph Technologies Inc. |
System and method for preventing unauthorized use of digital works
|
|
US8719716B2
(en)
*
|
2005-09-15 |
2014-05-06 |
The Mathworks, Inc. |
Locked element for use in a graphical modeling environment
|
|
JP2007086845A
(ja)
*
|
2005-09-20 |
2007-04-05 |
Kddi Corp |
クライアントサーバシステムおよび同システムにおけるサーバサイドプログラムの実現方法ならびにそのサーバ装置、サーバサイドプログラム
|
|
US8065733B2
(en)
|
2005-09-23 |
2011-11-22 |
Google, Inc. |
Method for evolving detectors to detect malign behavior in an artificial immune system
|
|
US7817608B2
(en)
*
|
2005-09-23 |
2010-10-19 |
Widevine Technologies, Inc. |
Transitioning to secure IP communications for encoding, encapsulating, and encrypting data
|
|
WO2007038245A2
(en)
|
2005-09-23 |
2007-04-05 |
Widevine Technologies, Inc. |
Method for evolving detectors to detect malign behavior in an artificial immune system
|
|
DE102005045852A1
(de)
*
|
2005-09-26 |
2007-04-05 |
Siemens Ag |
Verfahren und System zum Schutz von Quellcode
|
|
US8874477B2
(en)
|
2005-10-04 |
2014-10-28 |
Steven Mark Hoffberg |
Multifactorial optimization system and method
|
|
US9626667B2
(en)
|
2005-10-18 |
2017-04-18 |
Intertrust Technologies Corporation |
Digital rights management engine systems and methods
|
|
US20070185815A1
(en)
|
2005-10-18 |
2007-08-09 |
Intertrust Technologies Corporation |
Digital rights management engine systems and methods
|
|
JP4918544B2
(ja)
*
|
2005-10-28 |
2012-04-18 |
パナソニック株式会社 |
難読化評価方法、難読化評価装置、難読化評価プログラム、記憶媒体および集積回路
|
|
EP1944904A1
(en)
*
|
2005-10-31 |
2008-07-16 |
Matsushita Electric Industrial Co., Ltd. |
Secure processing device, secure processing method, encrypted confidential information embedding method, program, storage medium, and integrated circuit
|
|
US8141149B1
(en)
*
|
2005-11-08 |
2012-03-20 |
Raytheon Oakley Systems, Inc. |
Keyword obfuscation
|
|
US8122122B1
(en)
|
2005-11-08 |
2012-02-21 |
Raytheon Oakley Systems, Inc. |
Event monitoring and collection
|
|
US8463612B1
(en)
|
2005-11-08 |
2013-06-11 |
Raytheon Company |
Monitoring and collection of audio events
|
|
JP4770425B2
(ja)
|
2005-11-24 |
2011-09-14 |
富士ゼロックス株式会社 |
保護済み実行プログラムの作成のためのプログラム、方法及び装置
|
|
US8689016B2
(en)
|
2005-12-02 |
2014-04-01 |
Google Inc. |
Tamper prevention and detection for video provided over a network to a client
|
|
US20090287939A1
(en)
*
|
2005-12-07 |
2009-11-19 |
Matsushita Electric Industrial Co., Ltd. |
Secure device, information processing terminal, server, and authentication method
|
|
NL1030639C2
(nl)
*
|
2005-12-09 |
2007-06-12 |
Antonius Theodorus Ceci Hauzer |
Ventilatiesysteem voor tunneltraject of overdekte weg.
|
|
US8701091B1
(en)
|
2005-12-15 |
2014-04-15 |
Nvidia Corporation |
Method and system for providing a generic console interface for a graphics application
|
|
US7890315B2
(en)
|
2005-12-29 |
2011-02-15 |
Microsoft Corporation |
Performance engineering and the application life cycle
|
|
US20070157311A1
(en)
*
|
2005-12-29 |
2007-07-05 |
Microsoft Corporation |
Security modeling and the application life cycle
|
|
US20070162890A1
(en)
*
|
2005-12-29 |
2007-07-12 |
Microsoft Corporation |
Security engineering and the application life cycle
|
|
US20070156420A1
(en)
*
|
2005-12-29 |
2007-07-05 |
Microsoft Corporation |
Performance modeling and the application life cycle
|
|
US20070192344A1
(en)
*
|
2005-12-29 |
2007-08-16 |
Microsoft Corporation |
Threats and countermeasures schema
|
|
US8526612B2
(en)
*
|
2006-01-06 |
2013-09-03 |
Google Inc. |
Selective and persistent application level encryption for video provided to a client
|
|
US20070180231A1
(en)
*
|
2006-01-31 |
2007-08-02 |
Widevine Technologies, Inc. |
Preventing entitlement management message (EMM) filter attacks
|
|
WO2007091558A1
(ja)
*
|
2006-02-06 |
2007-08-16 |
Matsushita Electric Industrial Co., Ltd. |
プログラム難読化装置
|
|
US7818788B2
(en)
*
|
2006-02-14 |
2010-10-19 |
Microsoft Corporation |
Web application security frame
|
|
US7712137B2
(en)
|
2006-02-27 |
2010-05-04 |
Microsoft Corporation |
Configuring and organizing server security information
|
|
US7891012B1
(en)
|
2006-03-01 |
2011-02-15 |
Nvidia Corporation |
Method and computer-usable medium for determining the authorization status of software
|
|
US8452981B1
(en)
|
2006-03-01 |
2013-05-28 |
Nvidia Corporation |
Method for author verification and software authorization
|
|
US7987514B2
(en)
*
|
2006-04-04 |
2011-07-26 |
Intertrust Technologies Corp. |
Systems and methods for retrofitting electronic appliances to accept different content formats
|
|
US8458673B2
(en)
|
2006-04-26 |
2013-06-04 |
Flexera Software Llc |
Computer-implemented method and system for binding digital rights management executable code to a software application
|
|
EP1850260A1
(en)
|
2006-04-26 |
2007-10-31 |
Macrovision Corporation |
A computer-implemented method and system for binding digital rights management executable code to a software application
|
|
US20070261124A1
(en)
*
|
2006-05-03 |
2007-11-08 |
International Business Machines Corporation |
Method and system for run-time dynamic and interactive identification of software authorization requirements and privileged code locations, and for validation of other software program analysis results
|
|
FR2903508B1
(fr)
*
|
2006-07-10 |
2008-10-17 |
Sagem Defense Securite |
Protection d'un programme interprete par une machine virtuelle
|
|
CN101491001B
(zh)
*
|
2006-07-12 |
2012-03-14 |
耶德托公司 |
数字数据处理单元的防篡改系统和方法
|
|
US8607151B2
(en)
*
|
2006-08-01 |
2013-12-10 |
Nvidia Corporation |
Method and system for debugging a graphics pipeline subunit
|
|
US8436864B2
(en)
*
|
2006-08-01 |
2013-05-07 |
Nvidia Corporation |
Method and user interface for enhanced graphical operation organization
|
|
US8436870B1
(en)
|
2006-08-01 |
2013-05-07 |
Nvidia Corporation |
User interface and method for graphical processing analysis
|
|
US7778800B2
(en)
*
|
2006-08-01 |
2010-08-17 |
Nvidia Corporation |
Method and system for calculating performance parameters for a processor
|
|
US8963932B1
(en)
|
2006-08-01 |
2015-02-24 |
Nvidia Corporation |
Method and apparatus for visualizing component workloads in a unified shader GPU architecture
|
|
US8301890B2
(en)
|
2006-08-10 |
2012-10-30 |
Inside Secure |
Software execution randomization
|
|
US7613907B2
(en)
|
2006-08-11 |
2009-11-03 |
Atmel Corporation |
Embedded software camouflage against code reverse engineering
|
|
US8191131B2
(en)
*
|
2006-08-23 |
2012-05-29 |
International Business Machines Corporation |
Obscuring authentication data of remote user
|
|
US20080271001A1
(en)
*
|
2006-09-11 |
2008-10-30 |
Yo Nonomura |
Method of generating program, information processing device and microcomputer
|
|
US20090249492A1
(en)
*
|
2006-09-21 |
2009-10-01 |
Hans Martin Boesgaard Sorensen |
Fabrication of computer executable program files from source code
|
|
EP2064648A1
(en)
*
|
2006-09-21 |
2009-06-03 |
Hans Martin Boesgaard Sørensen |
Fabrication of computer executable program files from source code
|
|
US7554865B2
(en)
|
2006-09-21 |
2009-06-30 |
Atmel Corporation |
Randomizing current consumption in memory devices
|
|
US8001607B2
(en)
*
|
2006-09-27 |
2011-08-16 |
Direct Computer Resources, Inc. |
System and method for obfuscation of data across an enterprise
|
|
JP4917860B2
(ja)
*
|
2006-10-03 |
2012-04-18 |
Kddi株式会社 |
プログラム難読化方法およびプログラム
|
|
JP4917861B2
(ja)
*
|
2006-10-17 |
2012-04-18 |
Kddi株式会社 |
プログラム解析方法およびプログラム
|
|
US8689193B2
(en)
*
|
2006-11-01 |
2014-04-01 |
At&T Intellectual Property Ii, L.P. |
Method and apparatus for protecting a software application against a virus
|
|
FR2909467A1
(fr)
*
|
2006-12-05 |
2008-06-06 |
Logiways France Sa |
Procede et dispositif de protection d'un systeme de traitement de l'information
|
|
US8468351B2
(en)
|
2006-12-15 |
2013-06-18 |
Codesealer Aps |
Digital data authentication
|
|
DE602006008166D1
(de)
|
2006-12-21 |
2009-09-10 |
Ericsson Telefon Ab L M |
Verschleierung von Computerprogrammcodes
|
|
DE602006007029D1
(de)
*
|
2006-12-21 |
2009-07-09 |
Ericsson Telefon Ab L M |
Verschleierung von Computerprogrammcodes
|
|
US8146102B2
(en)
*
|
2006-12-22 |
2012-03-27 |
Sap Ag |
Development environment for groupware integration with enterprise applications
|
|
CN101578813A
(zh)
*
|
2007-01-11 |
2009-11-11 |
皇家飞利浦电子股份有限公司 |
跟踪实现的拷贝
|
|
US9589115B2
(en)
*
|
2007-01-18 |
2017-03-07 |
Panasonic Intellectual Property Management Co., Ltd. |
Obfuscation assisting apparatus
|
|
US8613080B2
(en)
|
2007-02-16 |
2013-12-17 |
Veracode, Inc. |
Assessment and analysis of software security flaws in virtual machines
|
|
US20080209401A1
(en)
*
|
2007-02-22 |
2008-08-28 |
Microsoft Corporation |
Techniques for integrating debugging with decompilation
|
|
US8752032B2
(en)
*
|
2007-02-23 |
2014-06-10 |
Irdeto Canada Corporation |
System and method of interlocking to protect software-mediated program and device behaviours
|
|
WO2008101340A1
(en)
*
|
2007-02-23 |
2008-08-28 |
Cloakware Corporation |
System and method for interlocking to protect software-mediated program and device behaviours
|
|
US20080229115A1
(en)
*
|
2007-03-16 |
2008-09-18 |
Microsoft Corporation |
Provision of functionality via obfuscated software
|
|
US7797516B2
(en)
|
2007-03-16 |
2010-09-14 |
Atmel Corporation |
Microcontroller with low-cost digital signal processing extensions
|
|
US8370606B2
(en)
|
2007-03-16 |
2013-02-05 |
Atmel Corporation |
Switching data pointers based on context
|
|
US8788848B2
(en)
*
|
2007-03-22 |
2014-07-22 |
Microsoft Corporation |
Optical DNA
|
|
US8837721B2
(en)
*
|
2007-03-22 |
2014-09-16 |
Microsoft Corporation |
Optical DNA based on non-deterministic errors
|
|
US7987380B2
(en)
|
2007-03-27 |
2011-07-26 |
Atmel Rousset S.A.S. |
Methods and apparatus to detect voltage class of a circuit
|
|
US8181039B2
(en)
*
|
2007-04-13 |
2012-05-15 |
Microsoft Corporation |
Disc drive counterfeiting countermeasure
|
|
JP4924177B2
(ja)
*
|
2007-04-23 |
2012-04-25 |
富士ゼロックス株式会社 |
プログラム難読化装置及びプログラム
|
|
US7912894B2
(en)
*
|
2007-05-15 |
2011-03-22 |
Adams Phillip M |
Computerized, copy-detection and discrimination apparatus and method
|
|
US7984288B2
(en)
|
2007-05-21 |
2011-07-19 |
Sercomm Corporation |
Software protection apparatus and protection method thereof
|
|
US8621093B2
(en)
|
2007-05-21 |
2013-12-31 |
Google Inc. |
Non-blocking of head end initiated revocation and delivery of entitlements non-addressable digital media network
|
|
EP1998267A1
(en)
*
|
2007-05-29 |
2008-12-03 |
Sercomm Corporation |
Software protection apparatus and protection method thereof
|
|
US8243924B2
(en)
|
2007-06-29 |
2012-08-14 |
Google Inc. |
Progressive download or streaming of digital media securely through a localized container and communication protocol proxy
|
|
ES2340086T3
(es)
*
|
2007-06-29 |
2010-05-28 |
Telefonaktiebolaget Lm Ericsson (Publ) |
Ofuscacion de los rastros de ejecucion de un codigo de programa de ordenador.
|
|
US8130956B2
(en)
*
|
2007-08-02 |
2012-03-06 |
International Business Machines Corporation |
Efficient and low power encrypting and decrypting of data
|
|
CA2697632C
(en)
*
|
2007-08-06 |
2015-05-12 |
Bernard De Monseignat |
System and method for authentication, data transfer, and protection against phishing
|
|
US8026930B2
(en)
*
|
2007-08-06 |
2011-09-27 |
International Business Machines Corporation |
Preventing viewing by bystanders of information on a display screen
|
|
US8296738B1
(en)
|
2007-08-13 |
2012-10-23 |
Nvidia Corporation |
Methods and systems for in-place shader debugging and performance tuning
|
|
US20090049425A1
(en)
*
|
2007-08-14 |
2009-02-19 |
Aladdin Knowledge Systems Ltd. |
Code Obfuscation By Reference Linking
|
|
US9035957B1
(en)
|
2007-08-15 |
2015-05-19 |
Nvidia Corporation |
Pipeline debug statistics system and method
|
|
US8112636B1
(en)
*
|
2007-11-06 |
2012-02-07 |
Lockheed Martin Corporation |
Protection of code or data from exposure by use of code injection service
|
|
US7765500B2
(en)
*
|
2007-11-08 |
2010-07-27 |
Nvidia Corporation |
Automated generation of theoretical performance analysis based upon workload and design configuration
|
|
CN100474253C
(zh)
*
|
2007-11-22 |
2009-04-01 |
北京飞天诚信科技有限公司 |
.Net程序保护方法及装置
|
|
EP2071483A1
(fr)
*
|
2007-12-07 |
2009-06-17 |
Gemplus |
Procédé de sécurisation de l'éxécution d'un code par masquage itératifs
|
|
WO2009108245A2
(en)
*
|
2007-12-21 |
2009-09-03 |
University Of Virginia Patent Foundation |
System, method and computer program product for protecting software via continuous anti-t ampering and obfuscation transforms
|
|
US8868464B2
(en)
|
2008-02-07 |
2014-10-21 |
Google Inc. |
Preventing unauthorized modification or skipping of viewing of advertisements within content
|
|
US8055668B2
(en)
|
2008-02-13 |
2011-11-08 |
Camouflage Software, Inc. |
Method and system for masking data in a consistent manner across multiple data sources
|
|
US8176337B2
(en)
*
|
2008-03-12 |
2012-05-08 |
Apple Inc. |
Computer object code obfuscation using boot installation
|
|
GB0806284D0
(en)
*
|
2008-04-07 |
2008-05-14 |
Metaforic Ltd |
Profile-guided tamper-proofing
|
|
US8448002B2
(en)
*
|
2008-04-10 |
2013-05-21 |
Nvidia Corporation |
Clock-gated series-coupled data processing modules
|
|
WO2009139650A1
(en)
*
|
2008-05-12 |
2009-11-19 |
Business Intelligence Solutions Safe B.V. |
A data obfuscation system, method, and computer implementation of data obfuscation for secret databases
|
|
US8800048B2
(en)
*
|
2008-05-20 |
2014-08-05 |
Microsoft Corporation |
Software protection through interdependent parameter cloud constrained software execution
|
|
US8434061B2
(en)
*
|
2008-06-06 |
2013-04-30 |
Apple Inc. |
System and method for array obfuscation
|
|
US8429637B2
(en)
*
|
2008-09-02 |
2013-04-23 |
Apple Inc. |
System and method for conditional expansion obfuscation
|
|
US8522015B2
(en)
*
|
2008-06-27 |
2013-08-27 |
Microsoft Corporation |
Authentication of binaries in memory with proxy code execution
|
|
US8069053B2
(en)
*
|
2008-08-13 |
2011-11-29 |
Hartford Fire Insurance Company |
Systems and methods for de-identification of personal data
|
|
US8341141B2
(en)
|
2008-12-16 |
2012-12-25 |
Krislov Clinton A |
Method and system for automated document registration
|
|
US8914351B2
(en)
|
2008-12-16 |
2014-12-16 |
Clinton A. Krislov |
Method and system for secure automated document registration from social media networks
|
|
US8589372B2
(en)
|
2008-12-16 |
2013-11-19 |
Clinton A. Krislov |
Method and system for automated document registration with cloud computing
|
|
JP4905480B2
(ja)
*
|
2009-02-20 |
2012-03-28 |
富士ゼロックス株式会社 |
プログラム難読化プログラム及びプログラム難読化装置
|
|
US20100214894A1
(en)
*
|
2009-02-20 |
2010-08-26 |
Microsoft Corporation |
Optical Medium with Added Descriptor to Reduce Counterfeiting
|
|
US9135948B2
(en)
*
|
2009-07-03 |
2015-09-15 |
Microsoft Technology Licensing, Llc |
Optical medium with added descriptor to reduce counterfeiting
|
|
FR2942558B1
(fr)
|
2009-02-24 |
2014-05-30 |
Eads Europ Aeronautic Defence |
Procede d'obscurcissement d'un programme d'ordinateur.
|
|
FR2942559B1
(fr)
|
2009-02-24 |
2016-05-20 |
European Aeronautic Defence And Space Company - Eads France |
Procede de protection du code source d'un programme d'ordinateur.
|
|
EP2234031A1
(en)
*
|
2009-03-24 |
2010-09-29 |
SafeNet, Inc. |
Obfuscation
|
|
US8929303B2
(en)
*
|
2009-04-06 |
2015-01-06 |
Samsung Electronics Co., Ltd. |
Control and data channels for advanced relay operation
|
|
CN101859330B
(zh)
*
|
2009-04-09 |
2012-11-21 |
辉达公司 |
验证集成电路效能模型的方法
|
|
EP2430584B1
(en)
*
|
2009-05-06 |
2019-11-13 |
Irdeto B.V. |
Interlocked binary protection using whitebox cryptography
|
|
US8914903B1
(en)
|
2009-06-03 |
2014-12-16 |
Amdocs Software System Limited |
System, method, and computer program for validating receipt of digital content by a client device
|
|
US9027143B1
(en)
|
2009-08-26 |
2015-05-05 |
Adobe Systems Incorporated |
System and method for multipronged authentication
|
|
US9524345B1
(en)
|
2009-08-31 |
2016-12-20 |
Richard VanderDrift |
Enhancing content using linked context
|
|
EP2467800B1
(en)
*
|
2009-11-13 |
2021-06-30 |
Irdeto B.V. |
System and method to protect java bytecode code against static and dynamic attacks within hostile execution environments
|
|
EP2343663A1
(fr)
*
|
2009-12-17 |
2011-07-13 |
Gemalto SA |
Procédé de protection polymorphe d'un code exécutable
|
|
US8645930B2
(en)
*
|
2010-01-04 |
2014-02-04 |
Apple Inc. |
System and method for obfuscation by common function and common function prototype
|
|
US9639707B1
(en)
|
2010-01-14 |
2017-05-02 |
Richard W. VanderDrift |
Secure data storage and communication for network computing
|
|
US8887140B2
(en)
*
|
2010-01-15 |
2014-11-11 |
Apple Inc. |
System and method for annotation-driven function inlining
|
|
JP2011150560A
(ja)
*
|
2010-01-22 |
2011-08-04 |
Kddi Corp |
ソフトウェア保護システム、ソフトウェア保護方法、ソフトウェア変換方法およびプログラム
|
|
US11301592B2
(en)
*
|
2010-01-28 |
2022-04-12 |
Pure Storage, Inc. |
Distributed storage with data obfuscation and method for use therewith
|
|
WO2011116446A1
(en)
*
|
2010-03-24 |
2011-09-29 |
Irdeto Canada Corporation |
System and method for random algorithm selection to dynamically conceal the operation of software
|
|
CA2792302A1
(en)
*
|
2010-03-25 |
2011-09-29 |
Irdeto Canada Corporation |
System and method for dynamic, variably-timed operation paths as a resistance to side channel and repeated invocation attacks
|
|
JP2011209801A
(ja)
*
|
2010-03-29 |
2011-10-20 |
Kddi Corp |
ソフトウェアの難読化装置、ソフトウェアの難読化方法およびプログラム
|
|
US9009481B2
(en)
|
2010-03-31 |
2015-04-14 |
Irdeto Canada Corporation |
System and method for protecting cryptographic assets from a white-box attack
|
|
US9152411B2
(en)
*
|
2010-05-12 |
2015-10-06 |
Microsoft Technology Licensing, Llc |
Edge computing platform for delivery of rich internet applications
|
|
EP2402880A1
(en)
*
|
2010-07-01 |
2012-01-04 |
Aladdin Europe GmbH |
Method and device for selectively protecting one of a plurality of methods of a class of an application written in an object-orientated language
|
|
JP2013536535A
(ja)
*
|
2010-08-26 |
2013-09-19 |
マッシブリー パラレル テクノロジーズ, インコーポレイテッド |
並列処理開発環境および関連する方法
|
|
KR101216995B1
(ko)
*
|
2010-12-03 |
2012-12-31 |
충남대학교산학협력단 |
인덱스 테이블 기반 코드 암호화 및 복호화 장치 및 그 방법
|
|
JP5627444B2
(ja)
*
|
2010-12-24 |
2014-11-19 |
Kddi株式会社 |
ソフトウェアの難読化装置、ソフトウェアの難読化方法およびプログラム
|
|
US9195810B2
(en)
|
2010-12-28 |
2015-11-24 |
Microsoft Technology Licensing, Llc |
Identifying factorable code
|
|
EP2482184A1
(en)
*
|
2011-02-01 |
2012-08-01 |
Irdeto B.V. |
Adaptive obfuscated virtual machine
|
|
US8707053B2
(en)
*
|
2011-02-09 |
2014-04-22 |
Apple Inc. |
Performing boolean logic operations using arithmetic operations by code obfuscation
|
|
US8930717B2
(en)
|
2011-03-01 |
2015-01-06 |
Angel Secure Networks, Inc. |
Secure processing module and method for making the same
|
|
US9058482B2
(en)
|
2011-03-01 |
2015-06-16 |
Angel Secure Networks, Inc. |
Controlling user access to electronic resources without password
|
|
CN103858128B
(zh)
*
|
2011-03-24 |
2017-06-16 |
爱迪德技术有限公司 |
提供用于抗攻击的遍及应用的相依性网络的系统和方法
|
|
CA2832752A1
(en)
|
2011-04-11 |
2012-10-18 |
Intertrust Technologies Corporation |
Information security systems and methods
|
|
US20120266249A1
(en)
*
|
2011-04-13 |
2012-10-18 |
Safenet, Inc. |
Automatic Selection of Routines for Protection
|
|
FR2974207B1
(fr)
*
|
2011-04-14 |
2013-05-24 |
In Webo Technologies |
Procede et systeme de securisation d'un logiciel
|
|
US8621237B1
(en)
*
|
2011-06-30 |
2013-12-31 |
Emc Corporation |
Protecting against cryptographic key exposure in source code
|
|
US20130014267A1
(en)
*
|
2011-07-07 |
2013-01-10 |
Farrugia Augustin J |
Computer protocol generation and obfuscation
|
|
WO2013059367A1
(en)
*
|
2011-10-18 |
2013-04-25 |
Paul Marion Hriljac |
Systems and methods of source software code modification
|
|
US9116765B2
(en)
|
2011-10-20 |
2015-08-25 |
Apple Inc. |
System and method for obfuscating data using instructions as a source of pseudorandom values
|
|
WO2013074041A1
(en)
*
|
2011-11-16 |
2013-05-23 |
V-Key Pte. Ltd. |
Cryptographic system and methodology for securing software cryptography
|
|
US8751800B1
(en)
|
2011-12-12 |
2014-06-10 |
Google Inc. |
DRM provider interoperability
|
|
WO2013091709A1
(en)
*
|
2011-12-22 |
2013-06-27 |
Fundació Privada Barcelona Digital Centre Tecnologic |
Method and apparatus for real-time dynamic transformation of the code of a web document
|
|
US8539601B2
(en)
|
2012-01-17 |
2013-09-17 |
Lockheed Martin Corporation |
Secure data storage and retrieval
|
|
CN104396181B
(zh)
|
2012-02-09 |
2018-02-23 |
爱迪德技术有限公司 |
用于生成和保护密码密钥的系统和方法
|
|
US9286063B2
(en)
|
2012-02-22 |
2016-03-15 |
Veracode, Inc. |
Methods and systems for providing feedback and suggested programming methods
|
|
US8661549B2
(en)
*
|
2012-03-02 |
2014-02-25 |
Apple Inc. |
Method and apparatus for obfuscating program source codes
|
|
JP2013186647A
(ja)
*
|
2012-03-07 |
2013-09-19 |
Yokohama National Univ |
難読化装置、難読化方法、及び難読化プログラム、並びに難読化されたソースコード
|
|
EP2828782A1
(en)
*
|
2012-03-23 |
2015-01-28 |
Irdeto B.V. |
Software fingerprinting
|
|
US9906360B2
(en)
|
2012-03-30 |
2018-02-27 |
Irdeto B.V. |
Securing accessible systems using variable dependent coding
|
|
US9405899B2
(en)
|
2012-06-06 |
2016-08-02 |
Empire Technology Development Llc |
Software protection mechanism
|
|
EP2682865B1
(de)
*
|
2012-07-05 |
2018-05-30 |
Vector Informatik GmbH |
Verfahren zur Kommunikation mit einem Steuerprogramm eines Steuergeräts sowie Applikationsmodule dazu
|
|
DE102012015899A1
(de)
*
|
2012-08-10 |
2014-02-13 |
Giesecke & Devrient Gmbh |
Verfahren zum Erzeugen von ausführbarem Programmcode
|
|
US9323315B2
(en)
|
2012-08-15 |
2016-04-26 |
Nvidia Corporation |
Method and system for automatic clock-gating of a clock grid at a clock source
|
|
US8850371B2
(en)
|
2012-09-14 |
2014-09-30 |
Nvidia Corporation |
Enhanced clock gating in retimed modules
|
|
US9270660B2
(en)
|
2012-11-25 |
2016-02-23 |
Angel Secure Networks, Inc. |
System and method for using a separate device to facilitate authentication
|
|
US8918768B2
(en)
*
|
2012-12-06 |
2014-12-23 |
Apple Inc. |
Methods and apparatus for correlation protected processing of data operations
|
|
KR101429229B1
(ko)
*
|
2012-12-27 |
2014-08-12 |
한라대학교산학협력단 |
명령문 병합을 이용한 자바 난독화방법
|
|
US9519568B2
(en)
|
2012-12-31 |
2016-12-13 |
Nvidia Corporation |
System and method for debugging an executing general-purpose computing on graphics processing units (GPGPU) application
|
|
US10152591B2
(en)
*
|
2013-02-10 |
2018-12-11 |
Paypal, Inc. |
Protecting against malware variants using reconstructed code of malware
|
|
IL224743A0
(en)
*
|
2013-02-14 |
2013-06-27 |
Harel Cain |
A system for automatic obfuscation of computer programs
|
|
US9116712B2
(en)
|
2013-02-28 |
2015-08-25 |
Microsoft Technology Licensing, Llc |
Compile based obfuscation
|
|
US9411708B2
(en)
|
2013-04-12 |
2016-08-09 |
Wipro Limited |
Systems and methods for log generation and log obfuscation using SDKs
|
|
US9430534B2
(en)
|
2013-05-09 |
2016-08-30 |
Wipro Limited |
Systems and methods for improved security and precision in executing analytics using SDKS
|
|
US9471456B2
(en)
|
2013-05-15 |
2016-10-18 |
Nvidia Corporation |
Interleaved instruction debugger
|
|
CN104166822B
(zh)
*
|
2013-05-20 |
2017-10-13 |
阿里巴巴集团控股有限公司 |
一种数据保护的方法和装置
|
|
US10095846B2
(en)
|
2013-05-30 |
2018-10-09 |
Jscrambler S.A. |
Web application protection
|
|
US10102384B2
(en)
*
|
2013-05-30 |
2018-10-16 |
Jscrambler S.A. |
Digital content execution control mechanism
|
|
US12124586B2
(en)
*
|
2013-09-13 |
2024-10-22 |
Omnissa, Llc |
Risk assessment for managed client devices
|
|
US8738931B1
(en)
*
|
2013-10-21 |
2014-05-27 |
Conley Jack Funk |
Method for determining and protecting proprietary source code using mnemonic identifiers
|
|
US9419993B2
(en)
*
|
2013-12-12 |
2016-08-16 |
Empire Technology Development Llc |
Randomization of processor subunit timing to enhance security
|
|
US8954583B1
(en)
|
2014-01-20 |
2015-02-10 |
Shape Security, Inc. |
Intercepting and supervising calls to transformed operations and objects
|
|
TW201530344A
(zh)
*
|
2014-01-21 |
2015-08-01 |
hong-jian Zhou |
應用程式存取保護方法及應用程式存取保護裝置
|
|
EP2913772A1
(de)
*
|
2014-02-28 |
2015-09-02 |
Wibu-Systems AG |
Verfahren und Computersystem zum Schutz eines Computerprogramms gegen Beeinflussung
|
|
US8997256B1
(en)
|
2014-03-31 |
2015-03-31 |
Terbium Labs LLC |
Systems and methods for detecting copied computer code using fingerprints
|
|
US20170109525A1
(en)
*
|
2014-03-31 |
2017-04-20 |
Irdeto B.V. |
Protecting an item of software
|
|
US9497252B2
(en)
|
2014-03-31 |
2016-11-15 |
International Business Machines Corporation |
On-demand code version switching
|
|
US9459861B1
(en)
|
2014-03-31 |
2016-10-04 |
Terbium Labs, Inc. |
Systems and methods for detecting copied computer code using fingerprints
|
|
GB201405754D0
(en)
*
|
2014-03-31 |
2014-05-14 |
Irdeto Bv |
Protecting an item of software comprising conditional code
|
|
US9378001B2
(en)
|
2014-05-02 |
2016-06-28 |
Microsoft Technology Licensing, Llc |
Matching program sections through feature extraction
|
|
US9411597B2
(en)
|
2014-05-06 |
2016-08-09 |
Nxp B.V. |
Return-oriented programming as an obfuscation technique
|
|
US9858440B1
(en)
*
|
2014-05-23 |
2018-01-02 |
Shape Security, Inc. |
Encoding of sensitive data
|
|
US9003511B1
(en)
|
2014-07-22 |
2015-04-07 |
Shape Security, Inc. |
Polymorphic security policy action
|
|
CN105404794B
(zh)
*
|
2014-09-04 |
2019-09-20 |
腾讯科技(深圳)有限公司 |
Java应用软件的保护方法和装置
|
|
US9602543B2
(en)
|
2014-09-09 |
2017-03-21 |
Shape Security, Inc. |
Client/server polymorphism using polymorphic hooks
|
|
US10657262B1
(en)
*
|
2014-09-28 |
2020-05-19 |
Red Balloon Security, Inc. |
Method and apparatus for securing embedded device firmware
|
|
CN104318134B
(zh)
*
|
2014-11-05 |
2017-06-06 |
北京深思数盾科技股份有限公司 |
一种数据保护方法
|
|
WO2016118216A2
(en)
|
2014-11-06 |
2016-07-28 |
Intertrust Technologies Corporation |
Secure application distribution systems and methods
|
|
KR102000861B1
(ko)
*
|
2015-01-27 |
2019-07-16 |
애리스 엔터프라이지즈 엘엘씨 |
스트리밍 미디어 및 다른 데이터 흐름들의 보호를 위한 난독화
|
|
WO2016190922A2
(en)
|
2015-02-09 |
2016-12-01 |
Medici, Inc. |
Crypto integration platform
|
|
US9779239B2
(en)
*
|
2015-03-15 |
2017-10-03 |
Fujitsu Limited |
Detection of malicious software behavior using signature-based static analysis
|
|
CN104766166B
(zh)
*
|
2015-03-27 |
2018-06-19 |
杭州安恒信息技术有限公司 |
一种面向等级保护的信息系统安全合规性检查方法
|
|
US9805203B2
(en)
*
|
2015-04-21 |
2017-10-31 |
Sap Se |
Cooperative static and dynamic analysis of web application code for finding security vulnerabilities
|
|
US11704733B2
(en)
|
2015-05-01 |
2023-07-18 |
Tzero Ip, Llc |
Crypto multiple security asset creation and redemption platform
|
|
US20160328539A1
(en)
*
|
2015-05-05 |
2016-11-10 |
Nxp B.V. |
Obscuring Software Code With Split Variables
|
|
US10068070B2
(en)
*
|
2015-05-05 |
2018-09-04 |
Nxp B.V. |
White-box elliptic curve point multiplication
|
|
CA2986164C
(en)
|
2015-05-26 |
2021-11-30 |
T0.Com, Inc. |
Obfuscation of intent in transactions using cryptographic techniques
|
|
US10230718B2
(en)
|
2015-07-07 |
2019-03-12 |
Shape Security, Inc. |
Split serving of computer code
|
|
US9471285B1
(en)
*
|
2015-07-09 |
2016-10-18 |
Synopsys, Inc. |
Identifying software components in a software codebase
|
|
CN106407754B
(zh)
*
|
2015-07-30 |
2021-06-18 |
中兴通讯股份有限公司 |
一种生成随机布局程序的方法及装置
|
|
US9946853B1
(en)
*
|
2015-09-17 |
2018-04-17 |
Symantec Corporation |
Techniques for application code obfuscation
|
|
US10509918B1
(en)
*
|
2015-09-18 |
2019-12-17 |
Hrl Laboratories, Llc |
One-time obfuscation for polynomial-size ordered binary decision diagrams (POBDDs)
|
|
US10594705B2
(en)
*
|
2015-10-06 |
2020-03-17 |
Shouhuai Xu |
Systems and methods for instructions-based detection of sophisticated obfuscation and packing
|
|
US9703537B2
(en)
*
|
2015-11-02 |
2017-07-11 |
International Business Machines Corporation |
Method for defining alias sets
|
|
CN108475303A
(zh)
*
|
2015-12-31 |
2018-08-31 |
计算机2.0(2015)有限公司 |
应用递增多项式代码增强抵抗反向工程的计算机实现方法
|
|
EP3217307B1
(en)
*
|
2016-02-22 |
2018-11-07 |
Eshard |
Method of testing the resistance of a circuit to a side channel analysis of second order or more
|
|
US10171493B2
(en)
|
2016-03-05 |
2019-01-01 |
Sears Brands, L.L.C. |
Method and system to dynamically obfuscate a web services interface
|
|
EP3440542B1
(en)
|
2016-03-09 |
2021-04-28 |
Shape Security, Inc. |
Applying bytecode obfuscation techniques to programs written in an interpreted language
|
|
US10216488B1
(en)
|
2016-03-14 |
2019-02-26 |
Shape Security, Inc. |
Intercepting and injecting calls into operations and objects
|
|
JP6730587B2
(ja)
*
|
2016-06-13 |
2020-07-29 |
富士通株式会社 |
キャッシュミス推定プログラム、キャッシュミス推定方法及び情報処理装置
|
|
US10574632B2
(en)
*
|
2016-06-30 |
2020-02-25 |
Hcl Technologies Limited |
System and method for secure sharing of a source code
|
|
US10243937B2
(en)
*
|
2016-07-08 |
2019-03-26 |
Nxp B.V. |
Equality check implemented with secret sharing
|
|
US10078505B2
(en)
*
|
2016-07-20 |
2018-09-18 |
International Business Machines Corporation |
Partial connection of iterations during loop unrolling
|
|
US10394554B1
(en)
*
|
2016-09-09 |
2019-08-27 |
Stripe, Inc. |
Source code extraction via monitoring processing of obfuscated byte code
|
|
WO2018102767A1
(en)
|
2016-12-02 |
2018-06-07 |
Shape Security, Inc. |
Obfuscating source code sent, from a server computer, to a browser on a client computer
|
|
US10382450B2
(en)
*
|
2017-02-21 |
2019-08-13 |
Sanctum Solutions Inc. |
Network data obfuscation
|
|
JP7131946B2
(ja)
|
2017-04-20 |
2022-09-06 |
Line株式会社 |
アプリケーションの保安性を評価する方法およびシステム
|
|
WO2018194196A1
(ko)
*
|
2017-04-20 |
2018-10-25 |
라인 가부시키가이샤 |
Elf 파일의 난독화 적용 여부의 탐지 및 보안성 평가를 위한 방법 및 시스템
|
|
WO2018194198A1
(ko)
*
|
2017-04-20 |
2018-10-25 |
라인 가부시키가이샤 |
Pe 파일의 난독화 적용 여부의 탐지 및 보안성 평가를 위한 방법 및 시스템
|
|
US10521612B2
(en)
*
|
2017-06-21 |
2019-12-31 |
Ca, Inc. |
Hybrid on-premises/software-as-service applications
|
|
CN107506651B
(zh)
*
|
2017-07-04 |
2021-10-22 |
环玺信息科技(上海)有限公司 |
一种代码加密方法及系统
|
|
US10331839B2
(en)
*
|
2017-08-18 |
2019-06-25 |
Honeywell Federal Manufacturing & Technologies, Llc |
System and method for obfuscation of electronic circuits
|
|
EP3467691B1
(en)
|
2017-10-05 |
2020-08-26 |
Eshard |
Method of selecting software files
|
|
US10121022B1
(en)
|
2017-10-09 |
2018-11-06 |
Jason McNutt |
Methods and systems for encrypting data using object-based screens
|
|
CN110659200B
(zh)
*
|
2018-06-29 |
2023-05-02 |
中国航发商用航空发动机有限责任公司 |
航空机载软件的源码和目标码对比分析方法及系统
|
|
US11307962B2
(en)
|
2018-07-09 |
2022-04-19 |
United States Of America As Represented By The Secretary Of The Navy |
Method for semantic preserving transform mutation discovery and vetting
|
|
US10521613B1
(en)
*
|
2018-08-08 |
2019-12-31 |
Carlos Manuel Gonzalez |
Adaptive standalone secure software
|
|
US12375308B2
(en)
|
2018-10-08 |
2025-07-29 |
Ceruleant Systems, Llc |
Data encryption and decryption using object-based screens and logic blocks
|
|
US10620946B1
(en)
*
|
2018-10-23 |
2020-04-14 |
Oracle International Corporation |
Dynamic modeling for opaque code during static analysis
|
|
KR102663589B1
(ko)
*
|
2018-10-26 |
2024-05-09 |
삼성전자주식회사 |
서버 및 서버의 제어 방법
|
|
BR112021018798A2
(pt)
|
2019-03-21 |
2022-02-15 |
Capzul Ltd |
Detecção e prevenção de engenharia reversa de programas de computador
|
|
DE102019004398A1
(de)
*
|
2019-06-21 |
2020-12-24 |
Giesecke+Devrient Mobile Security Gmbh |
Obfuskierung einer Softwareapplikation
|
|
US12321492B2
(en)
*
|
2019-07-01 |
2025-06-03 |
International Business Machines Corporation |
Cognitive iterative minimization of personally identifiable information in electronic documents
|
|
US11741197B1
(en)
|
2019-10-15 |
2023-08-29 |
Shape Security, Inc. |
Obfuscating programs using different instruction set architectures
|
|
US11431688B2
(en)
|
2019-12-13 |
2022-08-30 |
TripleBlind, Inc. |
Systems and methods for providing a modified loss function in federated-split learning
|
|
US12149510B1
(en)
|
2019-12-13 |
2024-11-19 |
Tripleblind Holdings, Inc. |
Systems and methods for providing a private multi-modal artificial intelligence platform
|
|
US12388799B1
(en)
|
2019-12-13 |
2025-08-12 |
Selfiie Corporation |
Systems and methods for providing a split inference approach to protect data and model
|
|
US11363002B2
(en)
|
2019-12-13 |
2022-06-14 |
TripleBlind, Inc. |
Systems and methods for providing a marketplace where data and algorithms can be chosen and interact via encryption
|
|
US12088565B2
(en)
|
2019-12-13 |
2024-09-10 |
Triplelind Holdings, Inc. |
Systems and methods for privacy preserving training and inference of decentralized recommendation systems from decentralized data
|
|
US11599671B1
(en)
*
|
2019-12-13 |
2023-03-07 |
TripleBlind, Inc. |
Systems and methods for finding a value in a combined list of private values
|
|
CN111190601A
(zh)
*
|
2019-12-25 |
2020-05-22 |
航天信息股份有限公司 |
面向安卓应用程序的渐进控制流混淆方法和电子设备
|
|
US11204985B2
(en)
*
|
2020-03-31 |
2021-12-21 |
Irdeto Canada Corporation |
Systems, methods, and storage media for creating secured computer code having entangled transformations
|
|
US11354218B2
(en)
*
|
2020-05-06 |
2022-06-07 |
Sap Se |
Generation of optimal program variation
|
|
CN113158147B
(zh)
*
|
2021-03-24 |
2022-12-09 |
中国人民解放军战略支援部队信息工程大学 |
一种基于母体融合的代码混淆方法
|
|
WO2023009588A1
(en)
|
2021-07-27 |
2023-02-02 |
TripleBlind, Inc. |
Systems and methods for providing a multi-party computation system for neural networks
|
|
US20230289449A1
(en)
*
|
2022-03-11 |
2023-09-14 |
Bank Of America Corporation |
Apparatus and methods for leveraging machine learning to programmatically identify and detect obfuscation
|
|
US12417264B2
(en)
*
|
2022-06-22 |
2025-09-16 |
Magic Shell Software, Inc. |
Protection of binary executables using dynamic encryption techniques
|
|
US12321424B2
(en)
*
|
2023-01-20 |
2025-06-03 |
Dell Products L.P. |
System and solution to obfuscate and prevent the pattern analysis of java archives
|
|
US20250298601A1
(en)
*
|
2024-03-20 |
2025-09-25 |
Cylance Inc. |
Modifying software code
|