|
US6067620A
(en)
*
|
1996-07-30 |
2000-05-23 |
Holden; James M. |
Stand alone security device for computer networks
|
|
US6477648B1
(en)
*
|
1997-03-23 |
2002-11-05 |
Novell, Inc. |
Trusted workstation in a networked client/server computing system
|
|
US6957341B2
(en)
*
|
1998-05-14 |
2005-10-18 |
Purdue Research Foundation |
Method and system for secure computational outsourcing and disguise
|
|
US7430670B1
(en)
|
1999-07-29 |
2008-09-30 |
Intertrust Technologies Corp. |
Software self-defense systems and methods
|
|
AU2001243365A1
(en)
*
|
2000-03-02 |
2001-09-12 |
Alarity Corporation |
System and method for process protection
|
|
US7895643B2
(en)
*
|
2002-03-16 |
2011-02-22 |
Trustedflow Systems, Inc. |
Secure logic interlocking
|
|
US8220058B2
(en)
*
|
2003-09-25 |
2012-07-10 |
Oracle America, Inc. |
Rendering and encryption engine for application program obfuscation
|
|
US7353499B2
(en)
*
|
2003-09-25 |
2008-04-01 |
Sun Microsystems, Inc. |
Multiple instruction dispatch tables for application program obfuscation
|
|
US7363620B2
(en)
*
|
2003-09-25 |
2008-04-22 |
Sun Microsystems, Inc. |
Non-linear execution of application program instructions for application program obfuscation
|
|
US7415618B2
(en)
*
|
2003-09-25 |
2008-08-19 |
Sun Microsystems, Inc. |
Permutation of opcode values for application program obfuscation
|
|
US20050069138A1
(en)
*
|
2003-09-25 |
2005-03-31 |
Sun Microsystems, Inc., A Delaware Corporation |
Application program obfuscation
|
|
US9525666B2
(en)
*
|
2005-01-31 |
2016-12-20 |
Unisys Corporation |
Methods and systems for managing concurrent unsecured and cryptographically secure communications across unsecured networks
|
|
DE102005021749A1
(de)
*
|
2005-05-11 |
2006-11-16 |
Fachhochschule Dortmund |
Verfahren und Vorrichtung zur programmgesteuerten Informationsverarbeitung
|
|
JP5113169B2
(ja)
*
|
2006-07-12 |
2013-01-09 |
イルデト・コーポレート・ビー・ヴイ |
暗号関数を難読化する方法およびシステム
|
|
US20090249492A1
(en)
*
|
2006-09-21 |
2009-10-01 |
Hans Martin Boesgaard Sorensen |
Fabrication of computer executable program files from source code
|
|
US9411976B2
(en)
*
|
2006-12-01 |
2016-08-09 |
Maidsafe Foundation |
Communication system and method
|
|
US9124650B2
(en)
|
2006-12-13 |
2015-09-01 |
Quickplay Media Inc. |
Digital rights management in a mobile environment
|
|
US8538012B2
(en)
*
|
2007-03-14 |
2013-09-17 |
Intel Corporation |
Performing AES encryption or decryption in multiple modes with a single instruction
|
|
US8312518B1
(en)
*
|
2007-09-27 |
2012-11-13 |
Avaya Inc. |
Island of trust in a service-oriented environment
|
|
US8762736B1
(en)
*
|
2008-04-04 |
2014-06-24 |
Massachusetts Institute Of Technology |
One-time programs
|
|
US8209744B2
(en)
*
|
2008-05-16 |
2012-06-26 |
Microsoft Corporation |
Mobile device assisted secure computer network communication
|
|
US8171306B2
(en)
*
|
2008-11-05 |
2012-05-01 |
Microsoft Corporation |
Universal secure token for obfuscation and tamper resistance
|
|
EP2462507B1
(en)
*
|
2009-08-04 |
2019-07-24 |
Carnegie Mellon University |
Methods and apparatuses for user-verifiable trusted path in the presence of malware
|
|
US8347398B1
(en)
*
|
2009-09-23 |
2013-01-01 |
Savvystuff Property Trust |
Selected text obfuscation and encryption in a local, network and cloud computing environment
|
|
US20110202765A1
(en)
*
|
2010-02-17 |
2011-08-18 |
Microsoft Corporation |
Securely move virtual machines between host servers
|
|
US9703586B2
(en)
*
|
2010-02-17 |
2017-07-11 |
Microsoft Technology Licensing, Llc |
Distribution control and tracking mechanism of virtual machine appliances
|
|
US8862895B2
(en)
*
|
2010-04-27 |
2014-10-14 |
Fuji Xerox Co., Ltd. |
Systems and methods for communication, storage, retrieval, and computation of simple statistics and logical operations on encrypted data
|
|
EP2577936A2
(en)
*
|
2010-05-28 |
2013-04-10 |
Lawrence A. Laurich |
Accelerator system for use with secure data storage
|
|
US20110296164A1
(en)
*
|
2010-05-28 |
2011-12-01 |
Mcafee, Inc. |
System and method for providing secure network services
|
|
ES2581548T3
(es)
*
|
2010-08-18 |
2016-09-06 |
Security First Corp. |
Sistemas y procedimientos para asegurar entornos informáticos de máquinas virtuales
|
|
US8681973B2
(en)
*
|
2010-09-15 |
2014-03-25 |
At&T Intellectual Property I, L.P. |
Methods, systems, and computer program products for performing homomorphic encryption and decryption on individual operations
|
|
US8762964B2
(en)
|
2010-12-17 |
2014-06-24 |
Cisco Technology, Inc. |
Optimizing symbol manipulation language-based executable applications for distributed execution
|
|
US8700906B2
(en)
*
|
2011-01-14 |
2014-04-15 |
Microsoft Corporation |
Secure computing in multi-tenant data centers
|
|
US20120278872A1
(en)
|
2011-04-27 |
2012-11-01 |
Woelfel John Harold |
System and method of federated authentication with reverse proxy
|
|
US9077525B2
(en)
*
|
2011-06-24 |
2015-07-07 |
Microsoft Technology Licensing, Llc |
User-controlled data encryption with obfuscated policy
|
|
WO2013009290A1
(en)
*
|
2011-07-11 |
2013-01-17 |
Hewlett-Packard Development Company, Lp |
Policy based data management
|
|
US20130019092A1
(en)
*
|
2011-07-14 |
2013-01-17 |
Barracuda Inc. |
System to Embed Enhanced Security / Privacy Functions Into a User Client
|
|
GB2497070B
(en)
*
|
2011-11-17 |
2015-11-25 |
Advanced Risc Mach Ltd |
Cryptographic support instructions
|
|
EP2786292B1
(en)
*
|
2011-11-28 |
2016-06-08 |
Porticor Ltd. |
Methods and devices for securing keys for a non-secured, distributed environment with applications to virtualization and cloud-computing security and management
|
|
US9208319B2
(en)
*
|
2011-12-15 |
2015-12-08 |
Microsoft Technology Licensing, Llc |
Code base partitioning system
|
|
WO2013104969A1
(en)
*
|
2012-01-09 |
2013-07-18 |
Koninklijke Philips N.V. |
Virtual machine device having key driven obfuscation and method
|
|
US8615656B2
(en)
*
|
2012-01-09 |
2013-12-24 |
The Mitre Corporation |
Secure remote peripheral encryption tunnel
|
|
US9454666B2
(en)
*
|
2012-03-26 |
2016-09-27 |
Irdeto B.V. |
Method for protecting data
|
|
EP2645618A1
(en)
*
|
2012-03-30 |
2013-10-02 |
British Telecommunications Public Limited Company |
Method and system for network data access
|
|
EP2672672A1
(en)
*
|
2012-06-07 |
2013-12-11 |
Alcatel-Lucent |
Secure data processing
|
|
EP2672673B1
(en)
*
|
2012-06-07 |
2016-05-25 |
Alcatel Lucent |
Apparatus and method for secure data processing
|
|
US8656482B1
(en)
*
|
2012-08-20 |
2014-02-18 |
Bitdefender IPR Management Ltd. |
Secure communication using a trusted virtual machine
|
|
US20140195804A1
(en)
*
|
2012-10-12 |
2014-07-10 |
Safelylocked, Llc |
Techniques for secure data exchange
|
|
US9176838B2
(en)
*
|
2012-10-19 |
2015-11-03 |
Intel Corporation |
Encrypted data inspection in a network environment
|
|
GB2508894A
(en)
*
|
2012-12-14 |
2014-06-18 |
Ibm |
Preventing a trusted boot device from being booted in a virtual machine
|
|
US9535715B2
(en)
*
|
2012-12-14 |
2017-01-03 |
Microsoft Technology Licensing, Llc |
Booting from a trusted network image
|
|
US8909967B1
(en)
*
|
2012-12-31 |
2014-12-09 |
Emc Corporation |
Technique for secure computation
|
|
US9503268B2
(en)
*
|
2013-01-22 |
2016-11-22 |
Amazon Technologies, Inc. |
Securing results of privileged computing operations
|
|
US10063380B2
(en)
*
|
2013-01-22 |
2018-08-28 |
Amazon Technologies, Inc. |
Secure interface for invoking privileged operations
|
|
US9055038B1
(en)
*
|
2013-02-04 |
2015-06-09 |
Stealth Software Technologies, Inc. |
Apparatus, system, and method to garble programs
|
|
US9141823B2
(en)
*
|
2013-03-15 |
2015-09-22 |
Veridicom, Sa De Cv |
Abstraction layer for default encryption with orthogonal encryption logic session object; and automated authentication, with a method for online litigation
|
|
US9361456B2
(en)
*
|
2013-04-01 |
2016-06-07 |
Uniquesoft, Llc |
Secure computing device using a library of programs
|
|
US10275593B2
(en)
*
|
2013-04-01 |
2019-04-30 |
Uniquesoft, Llc |
Secure computing device using different central processing resources
|
|
US9104862B2
(en)
*
|
2013-04-01 |
2015-08-11 |
Uniquesoft, Llc |
Secure computing device using new software versions
|
|
US9424421B2
(en)
|
2013-05-03 |
2016-08-23 |
Visa International Service Association |
Security engine for a secure operating environment
|
|
US9530009B2
(en)
*
|
2013-06-27 |
2016-12-27 |
Visa International Service Association |
Secure execution and update of application module code
|
|
EP3036680B1
(en)
*
|
2013-08-21 |
2018-07-18 |
Intel Corporation |
Processing data privately in the cloud
|
|
CN103559458B
(zh)
*
|
2013-10-09 |
2016-08-17 |
广州华迅网络科技有限公司 |
数据散列获取方法及其系统
|
|
US9235692B2
(en)
*
|
2013-12-13 |
2016-01-12 |
International Business Machines Corporation |
Secure application debugging
|
|
AU2015277000C1
(en)
*
|
2014-06-18 |
2019-11-28 |
Visa International Service Association |
Efficient methods for authenticated communication
|
|
CN111756533B
(zh)
*
|
2014-08-29 |
2023-07-04 |
维萨国际服务协会 |
用于安全密码生成的系统、方法和存储介质
|
|
US9584517B1
(en)
*
|
2014-09-03 |
2017-02-28 |
Amazon Technologies, Inc. |
Transforms within secure execution environments
|
|
CN104243166A
(zh)
*
|
2014-09-05 |
2014-12-24 |
深圳市中兴移动通信有限公司 |
录音加密方法和装置
|
|
US9735968B2
(en)
*
|
2014-10-20 |
2017-08-15 |
Microsoft Technology Licensing, Llc |
Trust service for a client device
|
|
CN107408072B
(zh)
*
|
2014-12-16 |
2021-07-09 |
凯恩迪股份有限公司 |
用于随机化指令的方法、介质和装置
|
|
WO2016131056A1
(en)
*
|
2015-02-13 |
2016-08-18 |
Visa International Service Association |
Confidential communication management
|
|
US9596263B1
(en)
*
|
2015-02-23 |
2017-03-14 |
Amazon Technolgies, Inc. |
Obfuscation and de-obfuscation of identifiers
|
|
US10484168B2
(en)
*
|
2015-03-02 |
2019-11-19 |
Dell Products L.P. |
Methods and systems for obfuscating data and computations defined in a secure distributed transaction ledger
|
|
US9712503B1
(en)
*
|
2015-03-23 |
2017-07-18 |
Amazon Technologies, Inc. |
Computing instance migration
|
|
US20160294794A1
(en)
*
|
2015-04-04 |
2016-10-06 |
Aleksandar Mancic |
Security System For Data Communications Including Key Management And Privacy
|
|
CA2982244C
(en)
*
|
2015-04-14 |
2024-01-23 |
Gigavation, Inc. |
Paravirtualized security threat protection of a computer-driven system with networked devices
|
|
JP6397590B2
(ja)
*
|
2015-05-19 |
2018-09-26 |
クリプトムーヴ, インコーポレイテッドCryptomove, Inc. |
データ隠蔽によるセキュリティ
|
|
US20180089415A1
(en)
*
|
2015-06-11 |
2018-03-29 |
International Business Machines Corporation |
User trusted device for detecting a virtualized environment
|
|
US9667606B2
(en)
*
|
2015-07-01 |
2017-05-30 |
Cyphermatrix, Inc. |
Systems, methods and computer readable medium to implement secured computational infrastructure for cloud and data center environments
|