US10361802B1
(en)
|
1999-02-01 |
2019-07-23 |
Blanding Hovenweep, Llc |
Adaptive pattern recognition based control system and method
|
US6237096B1
(en)
*
|
1995-01-17 |
2001-05-22 |
Eoriginal Inc. |
System and method for electronic transmission storage and retrieval of authenticated documents
|
US7743248B2
(en)
*
|
1995-01-17 |
2010-06-22 |
Eoriginal, Inc. |
System and method for a remote access service enabling trust and interoperability when retrieving certificate status from multiple certification authority reporting components
|
US7162635B2
(en)
*
|
1995-01-17 |
2007-01-09 |
Eoriginal, Inc. |
System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents
|
US6948070B1
(en)
|
1995-02-13 |
2005-09-20 |
Intertrust Technologies Corporation |
Systems and methods for secure transaction management and electronic rights protection
|
US7133846B1
(en)
|
1995-02-13 |
2006-11-07 |
Intertrust Technologies Corp. |
Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management
|
US20120166807A1
(en)
|
1996-08-12 |
2012-06-28 |
Intertrust Technologies Corp. |
Systems and Methods Using Cryptography to Protect Secure Computing Environments
|
US6658568B1
(en)
|
1995-02-13 |
2003-12-02 |
Intertrust Technologies Corporation |
Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management
|
US5892900A
(en)
|
1996-08-30 |
1999-04-06 |
Intertrust Technologies Corp. |
Systems and methods for secure transaction management and electronic rights protection
|
US5943422A
(en)
|
1996-08-12 |
1999-08-24 |
Intertrust Technologies Corp. |
Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
|
CN1912885B
(zh)
|
1995-02-13 |
2010-12-22 |
英特特拉斯特技术公司 |
用于安全交易管理和电子权利保护的系统和方法
|
US6157721A
(en)
|
1996-08-12 |
2000-12-05 |
Intertrust Technologies Corp. |
Systems and methods using cryptography to protect secure computing environments
|
AU5953296A
(en)
|
1995-05-30 |
1996-12-18 |
Corporation For National Research Initiatives |
System for distributed task execution
|
FR2742245B1
(fr)
*
|
1995-12-08 |
1998-01-23 |
Transtar |
Procede de manipulation de modeles de donnees utilises en genie logiciel
|
US5692047A
(en)
*
|
1995-12-08 |
1997-11-25 |
Sun Microsystems, Inc. |
System and method for executing verifiable programs with facility for using non-verifiable programs from trusted sources
|
US6075863A
(en)
*
|
1996-02-28 |
2000-06-13 |
Encanto Networks |
Intelligent communication device
|
US6463446B1
(en)
|
1998-02-26 |
2002-10-08 |
Sun Microsystems, Inc. |
Method and apparatus for transporting behavior in an event-based distributed system
|
US6598094B1
(en)
|
1998-03-20 |
2003-07-22 |
Sun Microsystems, Inc. |
Method and apparatus for determining status of remote objects in a distributed system
|
US6832223B1
(en)
|
1996-04-23 |
2004-12-14 |
Sun Microsystems, Inc. |
Method and system for facilitating access to a lookup service
|
US6487607B1
(en)
|
1998-02-26 |
2002-11-26 |
Sun Microsystems, Inc. |
Methods and apparatus for remote method invocation
|
US6578044B1
(en)
|
1997-11-17 |
2003-06-10 |
Sun Microsystems, Inc. |
Method and system for typesafe attribute matching
|
US6421704B1
(en)
|
1998-03-20 |
2002-07-16 |
Sun Microsystems, Inc. |
Method, apparatus, and product for leasing of group membership in a distributed system
|
US6393497B1
(en)
|
1998-03-20 |
2002-05-21 |
Sun Microsystems, Inc. |
Downloadable smart proxies for performing processing associated with a remote procedure call in a distributed system
|
US6282652B1
(en)
|
1998-02-26 |
2001-08-28 |
Sun Microsystems, Inc. |
System for separately designating security requirements for methods invoked on a computer
|
US6560656B1
(en)
|
1998-02-26 |
2003-05-06 |
Sun Microsystems, Inc. |
Apparatus and method for providing downloadable code for use in communicating with a device in a distributed system
|
US6185611B1
(en)
|
1998-03-20 |
2001-02-06 |
Sun Microsystem, Inc. |
Dynamic lookup service in a distributed system
|
US6938263B2
(en)
|
1996-04-23 |
2005-08-30 |
Sun Microsystems, Inc. |
System and method for facilitating dynamic loading of “stub” information to enable a program operating in one address space to invoke processing of a remote method or procedure in another address space
|
US6247026B1
(en)
|
1996-10-11 |
2001-06-12 |
Sun Microsystems, Inc. |
Method, apparatus, and product for leasing of delegation certificates in a distributed system
|
US6438614B2
(en)
|
1998-02-26 |
2002-08-20 |
Sun Microsystems, Inc. |
Polymorphic token based control
|
US6237024B1
(en)
|
1998-03-20 |
2001-05-22 |
Sun Microsystem, Inc. |
Method and apparatus for the suspension and continuation of remote processes
|
US6138238A
(en)
|
1997-12-11 |
2000-10-24 |
Sun Microsystems, Inc. |
Stack-based access control using code and executor identifiers
|
US6466947B2
(en)
|
1998-03-20 |
2002-10-15 |
Sun Microsystems, Inc. |
Apparatus and method for dynamically verifying information in a distributed system
|
US6446070B1
(en)
|
1998-02-26 |
2002-09-03 |
Sun Microsystems, Inc. |
Method and apparatus for dynamic distributed computing over a network
|
US5978484A
(en)
*
|
1996-04-25 |
1999-11-02 |
Microsoft Corporation |
System and method for safety distributing executable objects
|
US5794049A
(en)
*
|
1996-06-05 |
1998-08-11 |
Sun Microsystems, Inc. |
Computer system and method for executing architecture specific code with reduced run-time memory space requirements
|
US6161121A
(en)
*
|
1996-07-01 |
2000-12-12 |
Sun Microsystems, Inc. |
Generic transfer of exclusive rights
|
US5987123A
(en)
*
|
1996-07-03 |
1999-11-16 |
Sun Microsystems, Incorporated |
Secure file system
|
AU2003203649B2
(en)
*
|
1996-08-12 |
2006-03-02 |
Intertrust Technologies Corporation |
Systems and methods using cryptography to protect secure computing environments
|
US7590853B1
(en)
*
|
1996-08-12 |
2009-09-15 |
Intertrust Technologies Corporation |
Systems and methods using cryptography to protect secure computing environments
|
AU2004240210B2
(en)
*
|
1996-08-12 |
2008-03-06 |
Intertrust Technologies Corporation |
Systems and methods using cryptography to protect secure computing environments
|
US6089460A
(en)
*
|
1996-09-13 |
2000-07-18 |
Nippon Steel Corporation |
Semiconductor device with security protection function, ciphering and deciphering method thereof, and storage medium for storing software therefor
|
US6857099B1
(en)
|
1996-09-18 |
2005-02-15 |
Nippon Steel Corporation |
Multilevel semiconductor memory, write/read method thereto/therefrom and storage medium storing write/read program
|
US5958050A
(en)
*
|
1996-09-24 |
1999-09-28 |
Electric Communities |
Trusted delegation system
|
US5832529A
(en)
|
1996-10-11 |
1998-11-03 |
Sun Microsystems, Inc. |
Methods, apparatus, and product for distributed garbage collection
|
US6237009B1
(en)
|
1996-10-11 |
2001-05-22 |
Sun Microsystems, Inc. |
Lease renewal service
|
US6728737B2
(en)
|
1996-10-11 |
2004-04-27 |
Sun Microsystems, Inc. |
Method and system for leasing storage
|
US5944823A
(en)
*
|
1996-10-21 |
1999-08-31 |
International Business Machines Corporations |
Outside access to computer resources through a firewall
|
US7613926B2
(en)
*
|
1997-11-06 |
2009-11-03 |
Finjan Software, Ltd |
Method and system for protecting a computer and a network from hostile downloadables
|
US6167520A
(en)
*
|
1996-11-08 |
2000-12-26 |
Finjan Software, Inc. |
System and method for protecting a client during runtime from hostile downloadables
|
US9219755B2
(en)
|
1996-11-08 |
2015-12-22 |
Finjan, Inc. |
Malicious mobile code runtime monitoring system and methods
|
US8079086B1
(en)
|
1997-11-06 |
2011-12-13 |
Finjan, Inc. |
Malicious mobile code runtime monitoring system and methods
|
US7058822B2
(en)
|
2000-03-30 |
2006-06-06 |
Finjan Software, Ltd. |
Malicious mobile code runtime monitoring system and methods
|
US6154844A
(en)
*
|
1996-11-08 |
2000-11-28 |
Finjan Software, Ltd. |
System and method for attaching a downloadable security profile to a downloadable
|
US5937193A
(en)
*
|
1996-11-27 |
1999-08-10 |
Vlsi Technology, Inc. |
Circuit arrangement for translating platform-independent instructions for execution on a hardware platform and method thereof
|
US6367012B1
(en)
*
|
1996-12-06 |
2002-04-02 |
Microsoft Corporation |
Embedding certifications in executable files for network transmission
|
US6148401A
(en)
*
|
1997-02-05 |
2000-11-14 |
At&T Corp. |
System and method for providing assurance to a host that a piece of software possesses a particular property
|
US5915085A
(en)
*
|
1997-02-28 |
1999-06-22 |
International Business Machines Corporation |
Multiple resource or security contexts in a multithreaded application
|
US5905895A
(en)
*
|
1997-03-07 |
1999-05-18 |
International Business Machines Corporation |
Method and system for optimizing non-native bytecodes before bytecode interpretation
|
US5946493A
(en)
*
|
1997-03-28 |
1999-08-31 |
International Business Machines Corporation |
Method and system in a data processing system for association of source code instructions with an optimized listing of object code instructions
|
US6167522A
(en)
*
|
1997-04-01 |
2000-12-26 |
Sun Microsystems, Inc. |
Method and apparatus for providing security for servers executing application programs received via a network
|
US6381698B1
(en)
|
1997-05-21 |
2002-04-30 |
At&T Corp |
System and method for providing assurance to a host that a piece of software possesses a particular property
|
ATE246820T1
(de)
*
|
1997-05-29 |
2003-08-15 |
Sun Microsystems Inc |
Verfahren und vorrichtung zur versiegelung und unterschrift von objekten
|
US6175924B1
(en)
|
1997-06-20 |
2001-01-16 |
International Business Machines Corp. |
Method and apparatus for protecting application data in secure storage areas
|
US6065046A
(en)
*
|
1997-07-29 |
2000-05-16 |
Catharon Productions, Inc. |
Computerized system and associated method of optimally controlled storage and transfer of computer programs on a computer network
|
US5970252A
(en)
*
|
1997-08-12 |
1999-10-19 |
International Business Machines Corporation |
Method and apparatus for loading components in a component system
|
US6093215A
(en)
*
|
1997-08-12 |
2000-07-25 |
International Business Machines Corporation |
Method and apparatus for building templates in a component system
|
US6195794B1
(en)
|
1997-08-12 |
2001-02-27 |
International Business Machines Corporation |
Method and apparatus for distributing templates in a component system
|
US6182279B1
(en)
|
1997-08-12 |
2001-01-30 |
International Business Machines Corporation |
Method and apparatus for storing templates in a component system
|
US5978579A
(en)
*
|
1997-08-12 |
1999-11-02 |
International Business Machines Corporation |
Architecture for customizable component system
|
US6009524A
(en)
*
|
1997-08-29 |
1999-12-28 |
Compact Computer Corp |
Method for the secure remote flashing of a BIOS memory
|
US6397331B1
(en)
*
|
1997-09-16 |
2002-05-28 |
Safenet, Inc. |
Method for expanding secure kernel program memory
|
US6185678B1
(en)
*
|
1997-10-02 |
2001-02-06 |
Trustees Of The University Of Pennsylvania |
Secure and reliable bootstrap architecture
|
US6128774A
(en)
*
|
1997-10-28 |
2000-10-03 |
Necula; George C. |
Safe to execute verification of software
|
US7975305B2
(en)
*
|
1997-11-06 |
2011-07-05 |
Finjan, Inc. |
Method and system for adaptive rule-based content scanners for desktop computers
|
US7418731B2
(en)
*
|
1997-11-06 |
2008-08-26 |
Finjan Software, Ltd. |
Method and system for caching at secure gateways
|
US8225408B2
(en)
*
|
1997-11-06 |
2012-07-17 |
Finjan, Inc. |
Method and system for adaptive rule-based content scanners
|
IL122314A
(en)
*
|
1997-11-27 |
2001-03-19 |
Security 7 Software Ltd |
Method and system for enforcing a communication security policy
|
US6334189B1
(en)
*
|
1997-12-05 |
2001-12-25 |
Jamama, Llc |
Use of pseudocode to protect software from unauthorized use
|
US6044467A
(en)
*
|
1997-12-11 |
2000-03-28 |
Sun Microsystems, Inc. |
Secure class resolution, loading and definition
|
US6418444B1
(en)
|
1997-12-11 |
2002-07-09 |
Sun Microsystems, Inc. |
Method and apparatus for selective excution of a computer program
|
JP2002509313A
(ja)
|
1998-01-16 |
2002-03-26 |
メディアドナ、インコーポレイテッド |
ピアコンポーネントを認証するためのシステムおよび方法
|
US7268700B1
(en)
|
1998-01-27 |
2007-09-11 |
Hoffberg Steven M |
Mobile communication device
|
CN1292115A
(zh)
*
|
1998-02-26 |
2001-04-18 |
太阳微系统公司 |
分布系统中动态验证信息的装置和方法
|
US6604127B2
(en)
|
1998-03-20 |
2003-08-05 |
Brian T. Murphy |
Dynamic lookup service in distributed system
|
WO1999044133A2
(en)
|
1998-02-26 |
1999-09-02 |
Sun Microsystems, Inc. |
Method and system for deterministic hashes to identify remote methods
|
JP2001525971A
(ja)
*
|
1998-03-13 |
2001-12-11 |
ツーウェイ コーポレイション |
保護環境下での文書発行のための方法および装置
|
US5999732A
(en)
*
|
1998-03-23 |
1999-12-07 |
Sun Microsystems, Inc. |
Techniques for reducing the cost of dynamic class initialization checks in compiled code
|
US6684332B1
(en)
|
1998-06-10 |
2004-01-27 |
International Business Machines Corporation |
Method and system for the exchange of digitally signed objects over an insecure network
|
WO1999066383A2
(en)
*
|
1998-06-15 |
1999-12-23 |
Dmw Worldwide, Inc. |
Method and apparatus for assessing the security of a computer system
|
US6131165A
(en)
*
|
1998-06-18 |
2000-10-10 |
Sun Microsystems, Inc. |
Permit for controlling access to services in protected memory systems
|
US6792606B2
(en)
|
1998-07-17 |
2004-09-14 |
International Business Machines Corporation |
Method and apparatus for object persistence
|
US6223287B1
(en)
|
1998-07-24 |
2001-04-24 |
International Business Machines Corporation |
Method for establishing a secured communication channel over the internet
|
US6735696B1
(en)
*
|
1998-08-14 |
2004-05-11 |
Intel Corporation |
Digital content protection using a secure booting method and apparatus
|
US6202201B1
(en)
|
1998-09-23 |
2001-03-13 |
Netcreate Systems, Inc. |
Text object compilation method and system
|
US6154842A
(en)
*
|
1998-10-13 |
2000-11-28 |
Motorola, Inc. |
Method and system for reducing time and power requirements for executing computer-readable instruction streams in an execution environment having run-time security constraints
|
US6802006B1
(en)
*
|
1999-01-15 |
2004-10-05 |
Macrovision Corporation |
System and method of verifying the authenticity of dynamically connectable executable images
|
US6880155B2
(en)
|
1999-02-02 |
2005-04-12 |
Sun Microsystems, Inc. |
Token-based linking
|
ATE376334T1
(de)
*
|
1999-03-31 |
2007-11-15 |
Ericsson Telefon Ab L M |
Verteilung von dienstausführungsumgebungen unter berücksichtigung einer zentralisierten dienstanbieterumgebung
|
AU4071500A
(en)
*
|
1999-04-05 |
2000-10-23 |
Manage Com |
Management agent and system including the same
|
US6748580B1
(en)
|
1999-04-22 |
2004-06-08 |
International Business Machines Corporation |
Method and apparatus for creating software tools using a JTML interface
|
US6782478B1
(en)
*
|
1999-04-28 |
2004-08-24 |
Thomas Probert |
Techniques for encoding information in computer code
|
US7421586B2
(en)
*
|
1999-05-12 |
2008-09-02 |
Fraunhofer Gesselschaft |
Protecting mobile code against malicious hosts
|
WO2000072149A1
(en)
*
|
1999-05-25 |
2000-11-30 |
Motorola Inc. |
Pre-verification of applications in mobile computing
|
US6658567B1
(en)
|
1999-06-25 |
2003-12-02 |
Geomechanics International, Inc. |
Method and logic for locking geological data and an analyzer program that analyzes the geological data
|
US6681329B1
(en)
*
|
1999-06-25 |
2004-01-20 |
International Business Machines Corporation |
Integrity checking of a relocated executable module loaded within memory
|
US7650504B2
(en)
*
|
1999-07-22 |
2010-01-19 |
Macrovision Corporation |
System and method of verifying the authenticity of dynamically connectable executable images
|
US7243236B1
(en)
*
|
1999-07-29 |
2007-07-10 |
Intertrust Technologies Corp. |
Systems and methods for using cryptography to protect secure and insecure computing environments
|
WO2001009702A2
(en)
|
1999-07-30 |
2001-02-08 |
Intertrust Technologies Corp. |
Methods and systems for transaction record delivery using thresholds and multi-stage protocol
|
US6675298B1
(en)
*
|
1999-08-18 |
2004-01-06 |
Sun Microsystems, Inc. |
Execution of instructions using op code lengths longer than standard op code lengths to encode data
|
US7406603B1
(en)
|
1999-08-31 |
2008-07-29 |
Intertrust Technologies Corp. |
Data protection systems and methods
|
EP1128598A4
(en)
*
|
1999-09-07 |
2007-06-20 |
Sony Corp |
SYSTEM, DEVICE, METHOD AND PROGRAM SUPPORT FOR CONTENT MANAGEMENT
|
US6985885B1
(en)
|
1999-09-21 |
2006-01-10 |
Intertrust Technologies Corp. |
Systems and methods for pricing and selling digital goods
|
US6684387B1
(en)
|
1999-09-23 |
2004-01-27 |
International Business Machines Corporation |
Method and apparatus for verifying Enterprise Java Beans
|
US6748538B1
(en)
*
|
1999-11-03 |
2004-06-08 |
Intel Corporation |
Integrity scanner
|
US7158993B1
(en)
|
1999-11-12 |
2007-01-02 |
Sun Microsystems, Inc. |
API representation enabling submerged hierarchy
|
US6976258B1
(en)
|
1999-11-30 |
2005-12-13 |
Ensim Corporation |
Providing quality of service guarantees to virtual hosts
|
FI111567B
(fi)
*
|
1999-12-27 |
2003-08-15 |
Nokia Corp |
Menetelmä ohjelmamoduulin lataamiseksi
|
JP2001195247A
(ja)
*
|
2000-01-07 |
2001-07-19 |
Nec Corp |
ソフトウェアの安全性を検証し保証するシステム及び方法
|
US6529985B1
(en)
|
2000-02-04 |
2003-03-04 |
Ensim Corporation |
Selective interception of system calls
|
US6711607B1
(en)
|
2000-02-04 |
2004-03-23 |
Ensim Corporation |
Dynamic scheduling of task streams in a multiple-resource system to ensure task stream quality of service
|
US6560613B1
(en)
|
2000-02-08 |
2003-05-06 |
Ensim Corporation |
Disambiguating file descriptors
|
US6754716B1
(en)
|
2000-02-11 |
2004-06-22 |
Ensim Corporation |
Restricting communication between network devices on a common network
|
US7343421B1
(en)
|
2000-02-14 |
2008-03-11 |
Digital Asset Enterprises Llc |
Restricting communication of selected processes to a set of specific network addresses
|
US6745386B1
(en)
*
|
2000-03-09 |
2004-06-01 |
Sun Microsystems, Inc. |
System and method for preloading classes in a data processing device that does not have a virtual memory manager
|
US6948003B1
(en)
|
2000-03-15 |
2005-09-20 |
Ensim Corporation |
Enabling a service provider to provide intranet services
|
US6651186B1
(en)
|
2000-04-28 |
2003-11-18 |
Sun Microsystems, Inc. |
Remote incremental program verification using API definitions
|
US6883163B1
(en)
|
2000-04-28 |
2005-04-19 |
Sun Microsystems, Inc. |
Populating resource-constrained devices with content verified using API definitions
|
US6986132B1
(en)
|
2000-04-28 |
2006-01-10 |
Sun Microsytems, Inc. |
Remote incremental program binary compatibility verification using API definitions
|
US8082491B1
(en)
|
2000-05-09 |
2011-12-20 |
Oracle America, Inc. |
Dynamic displays in a distributed computing environment
|
US6862594B1
(en)
|
2000-05-09 |
2005-03-01 |
Sun Microsystems, Inc. |
Method and apparatus to discover services using flexible search criteria
|
US6985937B1
(en)
|
2000-05-11 |
2006-01-10 |
Ensim Corporation |
Dynamically modifying the resources of a virtual server
|
US6907421B1
(en)
|
2000-05-16 |
2005-06-14 |
Ensim Corporation |
Regulating file access rates according to file type
|
US6934755B1
(en)
|
2000-06-02 |
2005-08-23 |
Sun Microsystems, Inc. |
System and method for migrating processes on a network
|
US6922782B1
(en)
*
|
2000-06-15 |
2005-07-26 |
International Business Machines Corporation |
Apparatus and method for ensuring data integrity of unauthenticated code
|
US7124408B1
(en)
*
|
2000-06-28 |
2006-10-17 |
Microsoft Corporation |
Binding by hash
|
US7117371B1
(en)
|
2000-06-28 |
2006-10-03 |
Microsoft Corporation |
Shared names
|
US7143024B1
(en)
|
2000-07-07 |
2006-11-28 |
Ensim Corporation |
Associating identifiers with virtual processes
|
AU6371500A
(en)
*
|
2000-07-25 |
2002-02-05 |
Mediadna Inc |
System and method of verifying the authenticity of dynamically connectable executable images
|
EP1316171A4
(en)
*
|
2000-08-04 |
2006-05-03 |
First Data Corp |
PERSONNEL AND CONTOUR DIGITAL SIGNATURE SYSTEM
|
US7552333B2
(en)
*
|
2000-08-04 |
2009-06-23 |
First Data Corporation |
Trusted authentication digital signature (tads) system
|
US6909691B1
(en)
|
2000-08-07 |
2005-06-21 |
Ensim Corporation |
Fairly partitioning resources while limiting the maximum fair share
|
US7032114B1
(en)
*
|
2000-08-30 |
2006-04-18 |
Symantec Corporation |
System and method for using signatures to detect computer intrusions
|
US6981245B1
(en)
|
2000-09-14 |
2005-12-27 |
Sun Microsystems, Inc. |
Populating binary compatible resource-constrained devices with content verified using API definitions
|
WO2002023331A2
(en)
*
|
2000-09-14 |
2002-03-21 |
Sun Microsystems, Inc. |
Remote incremental program binary compatibility verification using api definitions
|
US6732211B1
(en)
|
2000-09-18 |
2004-05-04 |
Ensim Corporation |
Intercepting I/O multiplexing operations involving cross-domain file descriptor sets
|
US6964039B2
(en)
*
|
2000-12-13 |
2005-11-08 |
Esmertec Ag |
Method to create optimized machine code through combined verification and translation of JAVA™ bytecode
|
US7219354B1
(en)
|
2000-12-22 |
2007-05-15 |
Ensim Corporation |
Virtualizing super-user privileges for multiple virtual processes
|
FR2819602B1
(fr)
*
|
2001-01-12 |
2003-02-21 |
Gemplus Card Int |
Procede de gestion d'applications informatiques par le systeme d'exploitation d'un systeme informatique multi-applications
|
EP1233333A1
(en)
*
|
2001-02-19 |
2002-08-21 |
Hewlett-Packard Company |
Process for executing a downloadable service receiving restrictive access rights to al least one profile file
|
US6618736B1
(en)
|
2001-03-09 |
2003-09-09 |
Ensim Corporation |
Template-based creation and archival of file systems
|
US7181017B1
(en)
|
2001-03-23 |
2007-02-20 |
David Felsher |
System and method for secure three-party communications
|
US6978451B2
(en)
*
|
2001-05-31 |
2005-12-20 |
Esmertec Ag |
Method for fast compilation of preverified JAVA bytecode to high quality native machine code
|
DE10131395B4
(de)
*
|
2001-06-28 |
2006-08-17 |
Daimlerchrysler Ag |
Verfahren zum Übertragen von Software- Modulen
|
US7237121B2
(en)
*
|
2001-09-17 |
2007-06-26 |
Texas Instruments Incorporated |
Secure bootloader for securing digital devices
|
GB0121064D0
(en)
*
|
2001-08-31 |
2001-10-24 |
Transitive Technologies Ltd |
Obtaining translation of generic code representation
|
US7756969B1
(en)
|
2001-09-07 |
2010-07-13 |
Oracle America, Inc. |
Dynamic provisioning of identification services in a distributed system
|
US7660887B2
(en)
|
2001-09-07 |
2010-02-09 |
Sun Microsystems, Inc. |
Systems and methods for providing dynamic quality of service for a distributed system
|
US20030050981A1
(en)
*
|
2001-09-13 |
2003-03-13 |
International Business Machines Corporation |
Method, apparatus, and program to forward and verify multiple digital signatures in electronic mail
|
US7143313B2
(en)
|
2001-11-09 |
2006-11-28 |
Sun Microsystems, Inc. |
Support interface module bug submitter
|
US7266731B2
(en)
|
2001-11-13 |
2007-09-04 |
Sun Microsystems, Inc. |
Method and apparatus for managing remote software code update
|
US7146500B2
(en)
*
|
2001-11-14 |
2006-12-05 |
Compass Technology Management, Inc. |
System for obtaining signatures on a single authoritative copy of an electronic record
|
US7496757B2
(en)
*
|
2002-01-14 |
2009-02-24 |
International Business Machines Corporation |
Software verification system, method and computer program element
|
US7240213B1
(en)
*
|
2002-03-15 |
2007-07-03 |
Waters Edge Consulting, Llc. |
System trustworthiness tool and methodology
|
US20030188180A1
(en)
*
|
2002-03-28 |
2003-10-02 |
Overney Gregor T. |
Secure file verification station for ensuring data integrity
|
US20070118899A1
(en)
*
|
2002-05-17 |
2007-05-24 |
Satyam Computer Services Limited Of Mayfair Centre |
System and method for automated safe reprogramming of software radios
|
US20030216927A1
(en)
*
|
2002-05-17 |
2003-11-20 |
V. Sridhar |
System and method for automated safe reprogramming of software radios
|
EP1546892B1
(en)
*
|
2002-09-04 |
2017-03-29 |
Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. |
Protecting mobile code against malicious hosts cross references to related applications
|
US9818136B1
(en)
|
2003-02-05 |
2017-11-14 |
Steven M. Hoffberg |
System and method for determining contingent relevance
|
US6965968B1
(en)
|
2003-02-27 |
2005-11-15 |
Finjan Software Ltd. |
Policy-based caching
|
US10275723B2
(en)
*
|
2005-09-14 |
2019-04-30 |
Oracle International Corporation |
Policy enforcement via attestations
|
US9781154B1
(en)
|
2003-04-01 |
2017-10-03 |
Oracle International Corporation |
Systems and methods for supporting information security and sub-system operational protocol conformance
|
US10063523B2
(en)
*
|
2005-09-14 |
2018-08-28 |
Oracle International Corporation |
Crafted identities
|
US8468330B1
(en)
|
2003-06-30 |
2013-06-18 |
Oracle International Corporation |
Methods, systems, and data structures for loading and authenticating a module
|
GB0318197D0
(en)
*
|
2003-08-02 |
2003-09-03 |
Koninkl Philips Electronics Nv |
Copy-protecting applications in a digital broadcasting system
|
GB0318198D0
(en)
*
|
2003-08-02 |
2003-09-03 |
Koninkl Philips Electronics Nv |
Copy-protected application for digital broadcasting system
|
US7263690B1
(en)
*
|
2003-11-14 |
2007-08-28 |
Sun Microsystems, Inc. |
Mechanism for safe byte code in a tracing framework
|
US7516331B2
(en)
*
|
2003-11-26 |
2009-04-07 |
International Business Machines Corporation |
Tamper-resistant trusted java virtual machine and method of using the same
|
EP1538509A1
(fr)
*
|
2003-12-04 |
2005-06-08 |
Axalto S.A. |
Procédé de sécurisation de l'éxécution d'un programme contre des attaques par rayonnement
|
US7287243B2
(en)
*
|
2004-01-06 |
2007-10-23 |
Hewlett-Packard Development Company, L.P. |
Code verification system and method
|
US7752453B2
(en)
*
|
2004-01-08 |
2010-07-06 |
Encryption Solutions, Inc. |
Method of encrypting and transmitting data and system for transmitting encrypted data
|
US7526643B2
(en)
*
|
2004-01-08 |
2009-04-28 |
Encryption Solutions, Inc. |
System for transmitting encrypted data
|
US8031865B2
(en)
*
|
2004-01-08 |
2011-10-04 |
Encryption Solutions, Inc. |
Multiple level security system and method for encrypting data within documents
|
US7792874B1
(en)
|
2004-01-30 |
2010-09-07 |
Oracle America, Inc. |
Dynamic provisioning for filtering and consolidating events
|
US7500108B2
(en)
|
2004-03-01 |
2009-03-03 |
Microsoft Corporation |
Metered execution of code
|
US7539975B2
(en)
*
|
2004-06-30 |
2009-05-26 |
International Business Machines Corporation |
Method, system and product for determining standard Java objects
|
US7493596B2
(en)
*
|
2004-06-30 |
2009-02-17 |
International Business Machines Corporation |
Method, system and program product for determining java software code plagiarism and infringement
|
US7647581B2
(en)
*
|
2004-06-30 |
2010-01-12 |
International Business Machines Corporation |
Evaluating java objects across different virtual machine vendors
|
US7590589B2
(en)
|
2004-09-10 |
2009-09-15 |
Hoffberg Steven M |
Game theoretic prioritization scheme for mobile ad hoc networks permitting hierarchal deference
|
US8312431B1
(en)
*
|
2004-09-17 |
2012-11-13 |
Oracle America, Inc. |
System and computer readable medium for verifying access to signed ELF objects
|
WO2006054128A1
(en)
|
2004-11-22 |
2006-05-26 |
Nokia Corporation |
Method and device for verifying the integrity of platform software of an electronic device
|
JP4727278B2
(ja)
*
|
2005-04-05 |
2011-07-20 |
株式会社エヌ・ティ・ティ・ドコモ |
アプリケーションプログラム検証システム、アプリケーションプログラム検証方法およびコンピュータプログラム
|
US8375369B2
(en)
*
|
2005-04-26 |
2013-02-12 |
Apple Inc. |
Run-time code injection to perform checks
|
US8838974B2
(en)
*
|
2005-07-15 |
2014-09-16 |
The Mathworks, Inc. |
System and method for verifying the integrity of read-only components in deployed mixed-mode applications
|
US7895651B2
(en)
|
2005-07-29 |
2011-02-22 |
Bit 9, Inc. |
Content tracking in a network security system
|
US8272058B2
(en)
|
2005-07-29 |
2012-09-18 |
Bit 9, Inc. |
Centralized timed analysis in a network security system
|
US8984636B2
(en)
|
2005-07-29 |
2015-03-17 |
Bit9, Inc. |
Content extractor and analysis system
|
US8874477B2
(en)
|
2005-10-04 |
2014-10-28 |
Steven Mark Hoffberg |
Multifactorial optimization system and method
|
JP4537940B2
(ja)
*
|
2005-11-21 |
2010-09-08 |
株式会社ソニー・コンピュータエンタテインメント |
情報処理装置、及びプログラム実行制御方法
|
US8250559B2
(en)
*
|
2006-04-12 |
2012-08-21 |
Oracle America, Inc. |
Supporting per-program classpaths with class sharing in a multi-tasking virtual machine
|
KR100728517B1
(ko)
*
|
2006-12-28 |
2007-06-15 |
메크로비젼 코오포레이션 |
동적으로 연결 가능한 실행 가능 이미지들의 진정성을증명하는 시스템 및 방법
|
CN101226569A
(zh)
*
|
2007-01-19 |
2008-07-23 |
国际商业机器公司 |
在虚拟机中验证代码模块的方法及装置
|
US9122864B2
(en)
*
|
2008-08-05 |
2015-09-01 |
International Business Machines Corporation |
Method and apparatus for transitive program verification
|
US8301903B2
(en)
*
|
2009-02-27 |
2012-10-30 |
Research In Motion Limited |
Low-level code signing mechanism
|
US9117071B2
(en)
|
2009-06-03 |
2015-08-25 |
Apple Inc. |
Methods and apparatuses for secure compilation
|
US8677329B2
(en)
*
|
2009-06-03 |
2014-03-18 |
Apple Inc. |
Methods and apparatuses for a compiler server
|
CA2774728C
(en)
*
|
2009-11-13 |
2019-02-12 |
Irdeto Canada Corporation |
System and method to protect java bytecode code against static and dynamic attacks within hostile execution environments
|
US8782434B1
(en)
|
2010-07-15 |
2014-07-15 |
The Research Foundation For The State University Of New York |
System and method for validating program execution at run-time
|
US8782435B1
(en)
|
2010-07-15 |
2014-07-15 |
The Research Foundation For The State University Of New York |
System and method for validating program execution at run-time using control flow signatures
|
WO2013059368A1
(en)
|
2011-10-17 |
2013-04-25 |
Intertrust Technologies Corporation |
Systems and methods for protecting and governing genomic and other information
|
US9015680B1
(en)
*
|
2012-02-24 |
2015-04-21 |
Google Inc. |
Differential analysis of translation of software for the detection of flaws
|
US9122873B2
(en)
|
2012-09-14 |
2015-09-01 |
The Research Foundation For The State University Of New York |
Continuous run-time validation of program execution: a practical approach
|
US10001978B2
(en)
*
|
2015-11-11 |
2018-06-19 |
Oracle International Corporation |
Type inference optimization
|
KR101691600B1
(ko)
*
|
2016-04-28 |
2017-01-02 |
지티원 주식회사 |
공통 구조 변환 기반 프로그램 분석 방법 및 장치
|
CN111770206B
(zh)
*
|
2020-08-31 |
2020-12-29 |
支付宝(杭州)信息技术有限公司 |
一种部署智能合约的方法、区块链节点和存储介质
|
US12079374B2
(en)
*
|
2021-12-01 |
2024-09-03 |
International Business Machines Corporation |
Secure software compilation and software verification
|
US11809839B2
(en)
|
2022-01-18 |
2023-11-07 |
Robert Lyden |
Computer language and code for application development and electronic and optical communication
|