Movatterモバイル変換


[0]ホーム

URL:


US20040006706A1 - Methods and systems for implementing a secure application execution environment using derived user accounts for internet content - Google Patents

Methods and systems for implementing a secure application execution environment using derived user accounts for internet content
Download PDF

Info

Publication number
US20040006706A1
US20040006706A1US10/456,805US45680503AUS2004006706A1US 20040006706 A1US20040006706 A1US 20040006706A1US 45680503 AUS45680503 AUS 45680503AUS 2004006706 A1US2004006706 A1US 2004006706A1
Authority
US
United States
Prior art keywords
dua
content
protected
application
trusted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/456,805
Inventor
Ulfar Erlingsson
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Google LLC
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IndividualfiledCriticalIndividual
Priority to US10/456,805priorityCriticalpatent/US20040006706A1/en
Publication of US20040006706A1publicationCriticalpatent/US20040006706A1/en
Assigned to GREEN BORDER TECHNOLOGIES, INC.reassignmentGREEN BORDER TECHNOLOGIES, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: ERLINGSSON, ULFAR
Assigned to GOOGLE INC.reassignmentGOOGLE INC.MERGER (SEE DOCUMENT FOR DETAILS).Assignors: GREEN BORDER TECHNOLOGIES, INC.
Priority to US14/522,882prioritypatent/US9171149B2/en
Priority to US14/861,778prioritypatent/US10133864B2/en
Assigned to GOOGLE LLCreassignmentGOOGLE LLCCHANGE OF NAME (SEE DOCUMENT FOR DETAILS).Assignors: GOOGLE INC.
Priority to US16/164,741prioritypatent/US10922403B1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

Methods and systems are disclosed for implementing a secure application execution environment using Derived User Accounts (SAE DUA) for Internet content. Content is received and a determination is made if the received content is trusted or untrusted content.
The content is accessed in a protected derived user account (DUA) such as a SAE DUA if the content is untrusted otherwise the content is accessed in a regular DUA if the content is trusted.

Description

Claims (15)

What is claimed is:
1. A method for providing secure content use comprising:
receiving content from a resource;
determining if the received content is trusted or untrusted content; and
taking a first action with respect to the received content, if the content is untrusted, or taking a second action with respect to the received content, if the content is trusted.
2. The method ofclaim 1, wherein the first action is accessing the received content in a derived user account (DUA) and the second action is accessing the received content in a regular DUA.
3. The method ofclaim 1, wherein determining further comprises:
determining if the received content is trusted or untrusted based on a partition of the resource.
4. The method ofclaim 3, wherein determining if the received content is trusted or untrusted further comprises:
identifying the resource based on a characteristic of the resource; and
partitioning the resource as trusted or untrusted based on the identified characteristic.
5. The method ofclaim 1, wherein receiving content comprises:
intercepting one or more requests for the content; and
wherein the first action is redirecting the one or more intercepted requests to a protected DUA, if the content is untrusted, or redirecting the one or more requests to a regular DUA, if the content is trusted.
6. A computing system for providing secure content comprising:
at least one memory hosting a protected derived user account (DUA) and a regular DUA; and
a processor configured to receive content from a resource, determine if the received content is trusted or untrusted content, and take a first action with respect to the received content, if the content is untrusted, or take a second action with respect to the received content, if the content is trusted.
7. The computing system ofclaim 6, wherein the first action is accessing the received content in a derived user account (DUA) and the second action is accessing the received content in a regular DUA.
8. The computing system ofclaim 6, wherein the processor is further configured to determine if the content is trusted or untrusted based on a partition of the resource.
9. The computing system ofclaim 8, wherein the processor is further configured to identify the resource based on a characteristic of the resource, and to partition the resource as trusted or untrusted based on the identified characteristic.
10. The computing system ofclaim 6, wherein the processor is further configured to intercept one or more requests for the content and redirect the one or more requests to the protected DUA, if the content is untrusted, or redirect the one or more requests to the regular DUA, if the content is trusted.
11. A computer-readable medium containing instructions for controlling a computing system having a processor, to perform a method comprising:
receiving content from a resource;
determining if the received content is trusted or untrusted content; and
taking a first action with respect to the received content, if the content is untrusted, or taking a second action with respect to the received content, if the content is trusted.
12. The computer-readable medium ofclaim 11, wherein the first action is accessing the received content in a derived user account (DUA) and the second action is accessing the received content in a regular DUA.
13. The computer-readable medium ofclaim 11, wherein the instructions further control the computing system to perform a method comprising:
determining if the received content is trusted or untrusted based on a partition of the resource.
14. The computer-readable medium ofclaim 13, wherein the instructions further control the computing system to perform a method comprising:
identifying the resource based on a characteristic of the resource; and
partitioning the resource as trusted or untrusted based on the identified characteristic.
15. The computer-readable medium ofclaim 11, wherein the instructions further control the computing system to perform a method comprising:
intercepting one or more requests for the content; and
wherein the first action is redirecting the one or more intercepted requests to a protected DUA, if the content is untrusted, or redirecting the one or more requests to a regular DUA, if the content is trusted.
US10/456,8052002-06-062003-06-06Methods and systems for implementing a secure application execution environment using derived user accounts for internet contentAbandonedUS20040006706A1 (en)

Priority Applications (4)

Application NumberPriority DateFiling DateTitle
US10/456,805US20040006706A1 (en)2002-06-062003-06-06Methods and systems for implementing a secure application execution environment using derived user accounts for internet content
US14/522,882US9171149B2 (en)2002-06-062014-10-24Methods and systems for implementing a secure application execution environment using derived user accounts for internet content
US14/861,778US10133864B2 (en)2002-06-062015-09-22Methods and systems for implementing a secure application execution environment using derived user accounts for internet content
US16/164,741US10922403B1 (en)2002-06-062018-10-18Methods and systems for implementing a secure application execution environment using derived user accounts for internet content

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US38717602P2002-06-062002-06-06
US10/456,805US20040006706A1 (en)2002-06-062003-06-06Methods and systems for implementing a secure application execution environment using derived user accounts for internet content

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US14/522,882ContinuationUS9171149B2 (en)2002-06-062014-10-24Methods and systems for implementing a secure application execution environment using derived user accounts for internet content

Publications (1)

Publication NumberPublication Date
US20040006706A1true US20040006706A1 (en)2004-01-08

Family

ID=29736276

Family Applications (4)

Application NumberTitlePriority DateFiling Date
US10/456,805AbandonedUS20040006706A1 (en)2002-06-062003-06-06Methods and systems for implementing a secure application execution environment using derived user accounts for internet content
US14/522,882Expired - LifetimeUS9171149B2 (en)2002-06-062014-10-24Methods and systems for implementing a secure application execution environment using derived user accounts for internet content
US14/861,778Expired - LifetimeUS10133864B2 (en)2002-06-062015-09-22Methods and systems for implementing a secure application execution environment using derived user accounts for internet content
US16/164,741Expired - Fee RelatedUS10922403B1 (en)2002-06-062018-10-18Methods and systems for implementing a secure application execution environment using derived user accounts for internet content

Family Applications After (3)

Application NumberTitlePriority DateFiling Date
US14/522,882Expired - LifetimeUS9171149B2 (en)2002-06-062014-10-24Methods and systems for implementing a secure application execution environment using derived user accounts for internet content
US14/861,778Expired - LifetimeUS10133864B2 (en)2002-06-062015-09-22Methods and systems for implementing a secure application execution environment using derived user accounts for internet content
US16/164,741Expired - Fee RelatedUS10922403B1 (en)2002-06-062018-10-18Methods and systems for implementing a secure application execution environment using derived user accounts for internet content

Country Status (4)

CountryLink
US (4)US20040006706A1 (en)
EP (1)EP1525522A2 (en)
AU (1)AU2003238908A1 (en)
WO (1)WO2003104954A2 (en)

Cited By (117)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20020078158A1 (en)*2000-08-282002-06-20Brown Scott T.E-mail messaging system and method for enhanced rich media delivery
US20030179244A1 (en)*2002-03-012003-09-25Ulfar ErlingssonMethod and system for assured denotation of application semantics
US20040268139A1 (en)*2003-06-252004-12-30Microsoft CorporationSystems and methods for declarative client input security screening
US20050114870A1 (en)*2003-11-212005-05-26Song Dong H.System and method for executing an application on a secured run-time environment
US20050119910A1 (en)*2003-12-012005-06-02International Business Machines CorporationContent update notification
US20050182788A1 (en)*2004-02-122005-08-18International Business Machines CorporationArchitecture and method for managing the sharing of logical resources among separate partitions of a logically partitioned computer system
US20050246761A1 (en)*2004-04-302005-11-03Microsoft CorporationSystem and method for local machine zone lockdown with relation to a network browser
US20060206899A1 (en)*2005-03-142006-09-14Ntt Docomo, Inc.Access controller and access control method
US20060277311A1 (en)*2005-06-032006-12-07Microsoft CorporationRunning Internet applications with low rights
US20070180040A1 (en)*2006-01-272007-08-02Etgen Michael PSystem and method for managing an instant messaging conversation
US20070244980A1 (en)*2006-04-142007-10-18Microsoft CorporationInstant Messaging Plug-Ins
US20070276931A1 (en)*2006-05-232007-11-29Jamshid MahdaviSystems and Methods for Protocol Detection in a Proxy
US20070300064A1 (en)*2006-06-232007-12-27Microsoft CorporationCommunication across domains
US20080005315A1 (en)*2006-06-292008-01-03Po-Ching LinApparatus, system and method for stream-based data filtering
WO2007113406A3 (en)*2006-03-172008-05-08France TelecomSystem for secure access from a terminal to communication networks
US20080133540A1 (en)*2006-12-012008-06-05Websense, Inc.System and method of analyzing web addresses
US20080189767A1 (en)*2007-02-012008-08-07Microsoft CorporationAccessing file resources outside a security boundary
US20080263679A1 (en)*2007-04-232008-10-23Microsoft CorporationStoring information in closed computing devices
US20080282319A1 (en)*2005-11-172008-11-13Koninklijke Philips Electronics, N.V.System for Managing Access Control
US20080313648A1 (en)*2007-06-142008-12-18Microsoft CorporationProtection and communication abstractions for web browsers
US20090006847A1 (en)*2007-06-282009-01-01Microsoft CorporationFiltering kernel-mode network communications
US20090055397A1 (en)*2007-08-212009-02-26International Business Machines CorporationMulti-Dimensional Access Control List
US7607171B1 (en)2002-01-172009-10-20Avinti, Inc.Virus detection by executing e-mail code in a virtual machine
US20090307508A1 (en)*2007-10-302009-12-10Bank Of America CorporationOptimizing the Efficiency of an Organization's Technology Infrastructure
US20100024016A1 (en)*2006-01-092010-01-28Thierry ViolleauMethod and apparatus for protection domain based security
US20100057774A1 (en)*2008-08-292010-03-04Google Inc.Altered Token Sandboxing
US20100088397A1 (en)*2008-10-032010-04-08Joe JaudonSystems for dynamically updating virtual desktops or virtual applications
US20100088360A1 (en)*2008-10-032010-04-08Joe JaudonMethods for dynamically updating virtual desktops or virtual applications
US7716275B1 (en)*2004-08-312010-05-11Symantec Operating CorporationMethod and system for implementing shared quotas
US20100154058A1 (en)*2007-01-092010-06-17Websense Hosted R&D LimitedMethod and systems for collecting addresses for remotely accessible information sources
US20100257471A1 (en)*2009-04-032010-10-07International Business Machines CorporationProgrammatic Information Transfer
US7870596B2 (en)2007-02-012011-01-11Microsoft CorporationAccessing network resources outside a security boundary
US20110082938A1 (en)*2009-10-072011-04-07Joe JaudonSystems and methods for dynamically updating a user interface within a virtual computing environment
US20110099609A1 (en)*2009-10-282011-04-28Microsoft CorporationIsolation and presentation of untrusted data
US7945816B1 (en)*2005-11-302011-05-17At&T Intellectual Property Ii, L.P.Comprehensive end-to-end storage area network (SAN) application transport service
US20110225202A1 (en)*2007-08-212011-09-15International Business Machines CorporationMulti-dimensional access control list
USRE43103E1 (en)*2004-08-072012-01-10Rozman Allen FSystem and method for protecting a computer system from malicious software
US20120011507A1 (en)*2008-11-062012-01-12Takayuki SasakiMaintenance system, maintenance method and program for maintenance
US8099596B1 (en)*2011-06-302012-01-17Kaspersky Lab ZaoSystem and method for malware protection using virtualization
WO2011142996A3 (en)*2010-05-092012-02-16Madhav ChintaMethods and systems for forcing an application to store data in a secure storage location
US8234332B2 (en)2009-04-222012-07-31Aventura Hq, Inc.Systems and methods for updating computer memory and file locations within virtual computing environments
US8321936B1 (en)2007-05-302012-11-27M86 Security, Inc.System and method for malicious software detection in multiple protocols
WO2013045928A1 (en)*2011-09-302013-04-04Avecto LimitedMethod and apparatus for controlling access to a resource in a computer device
US20130185649A1 (en)*2012-01-182013-07-18Microsoft CorporationSystem and method for blended presentation of locally and remotely stored electronic messages
US8607344B1 (en)*2008-07-242013-12-10Mcafee, Inc.System, method, and computer program product for initiating a security action at an intermediate layer coupled between a library and an application
US8615800B2 (en)2006-07-102013-12-24Websense, Inc.System and method for analyzing web content
US8719898B1 (en)2012-10-152014-05-06Citrix Systems, Inc.Configuring and providing profiles that manage execution of mobile applications
US8745610B2 (en)2008-11-062014-06-03Nec CorporationMaintenance system, maintenance method and program for maintenance
US8769063B2 (en)2011-10-112014-07-01Citrix Systems, Inc.Policy-based application management
US8799994B2 (en)2011-10-112014-08-05Citrix Systems, Inc.Policy-based application management
US8799388B2 (en)2007-05-182014-08-05Websense U.K. LimitedMethod and apparatus for electronic mail filtering
US8799482B1 (en)2012-04-112014-08-05Artemis Internet Inc.Domain policy specification and enforcement
US8806570B2 (en)2011-10-112014-08-12Citrix Systems, Inc.Policy-based application management
US8813179B1 (en)2013-03-292014-08-19Citrix Systems, Inc.Providing mobile device management functionalities
US20140245381A1 (en)*2012-12-062014-08-28Airwatch, LlcSystems and Methods for Controlling Email Access
US20140245008A1 (en)*2012-12-062014-08-28Airwatch, LlcSystems and Methods for Controlling Email Access
US8850049B1 (en)2013-03-292014-09-30Citrix Systems, Inc.Providing mobile device management functionalities for a managed browser
US8849978B1 (en)2013-03-292014-09-30Citrix Systems, Inc.Providing an enterprise application store
US8850010B1 (en)2013-03-292014-09-30Citrix Systems, Inc.Providing a managed browser
US8869235B2 (en)2011-10-112014-10-21Citrix Systems, Inc.Secure mobile browser for protecting enterprise data
US8910264B2 (en)2013-03-292014-12-09Citrix Systems, Inc.Providing mobile device management functionalities
US8910239B2 (en)2012-10-152014-12-09Citrix Systems, Inc.Providing virtualized private network tunnels
US8914845B2 (en)2012-10-152014-12-16Citrix Systems, Inc.Providing virtualized private network tunnels
US20140380439A1 (en)*2003-09-232014-12-25At&T Intellectual Property I, L.P.Methods of Resetting Passwords in Network Service Systems Including User Redirection and Related Systems and Computer Program Products
US8959579B2 (en)2012-10-162015-02-17Citrix Systems, Inc.Controlling mobile device access to secure data
US8978140B2 (en)2006-07-102015-03-10Websense, Inc.System and method of analyzing web content
US8990392B1 (en)2012-04-112015-03-24NCC Group Inc.Assessing a computing resource for compliance with a computing resource policy regime specification
GB2519608A (en)*2013-10-232015-04-29Avecto LtdComputer device and method for isolating untrusted content
US9026668B2 (en)2012-05-262015-05-05Free Stream Media Corp.Real-time and retargeted advertising on multiple screens of a user watching television
US9053340B2 (en)2012-10-122015-06-09Citrix Systems, Inc.Enterprise application store for an orchestration framework for connected devices
US9083727B1 (en)2012-04-112015-07-14Artemis Internet Inc.Securing client connections
US9106661B1 (en)2012-04-112015-08-11Artemis Internet Inc.Computing resource policy regime specification and verification
US9154942B2 (en)2008-11-262015-10-06Free Stream Media Corp.Zero configuration communication between a browser and a networked media device
US9171149B2 (en)2002-06-062015-10-27Google Inc.Methods and systems for implementing a secure application execution environment using derived user accounts for internet content
US9189621B2 (en)1996-11-082015-11-17Finjan, Inc.Malicious mobile code runtime monitoring system and methods
US9215225B2 (en)2013-03-292015-12-15Citrix Systems, Inc.Mobile device locking with context
US9219755B2 (en)1996-11-082015-12-22Finjan, Inc.Malicious mobile code runtime monitoring system and methods
US9264395B1 (en)2012-04-112016-02-16Artemis Internet Inc.Discovery engine
US9280377B2 (en)2013-03-292016-03-08Citrix Systems, Inc.Application with multiple operation modes
WO2016036957A1 (en)*2014-09-052016-03-10Openpeak Inc.Method and system for data usage accounting in a computing device
US9367512B2 (en)2009-04-222016-06-14Aventura Hq, Inc.Systems and methods for dynamically updating virtual desktops or virtual applications in a standard computing environment
US9378282B2 (en)2008-06-302016-06-28Raytheon CompanySystem and method for dynamic and real-time categorization of webpages
US20160191435A1 (en)*2013-03-262016-06-30Dropbox, Inc.Content-item linking system for messaging services
US9386356B2 (en)2008-11-262016-07-05Free Stream Media Corp.Targeting with television audience data across multiple screens
US9436838B2 (en)*2012-12-202016-09-06Intel CorporationSecure local web application data manager
US20160306964A1 (en)*2015-04-142016-10-20Avecto LimitedComputer device and method for isolating untrusted content on a clipboard
US9516022B2 (en)2012-10-142016-12-06Getgo, Inc.Automated meeting room
US9519772B2 (en)2008-11-262016-12-13Free Stream Media Corp.Relevancy improvement through targeting of information based on data gathered from a networked device associated with a security sandbox of a client device
US9560425B2 (en)2008-11-262017-01-31Free Stream Media Corp.Remotely control devices over a network without authentication or registration
US9584378B1 (en)*2015-12-222017-02-28International Business Machines CorporationComputer-implemented command control in information technology service environment
US9606774B2 (en)2012-10-162017-03-28Citrix Systems, Inc.Wrapping an application with field-programmable business logic
US9652613B1 (en)2002-01-172017-05-16Trustwave Holdings, Inc.Virus detection by executing electronic message code in a virtual machine
US9699202B2 (en)*2015-05-202017-07-04Cisco Technology, Inc.Intrusion detection to prevent impersonation attacks in computer networks
US9787686B2 (en)2013-04-122017-10-10Airwatch LlcOn-demand security policy activation
US20170300320A1 (en)*2015-01-222017-10-19Fujitsu LimitedApplication functionality extension method, application functionality extension program, and application functionality extension apparatus
US9813390B2 (en)2012-12-062017-11-07Airwatch LlcSystems and methods for controlling email access
US9853928B2 (en)2012-12-062017-12-26Airwatch LlcSystems and methods for controlling email access
US20180054444A9 (en)*2015-05-282018-02-22Eyal DotanScalable application-as-a-service environment and systems and methods useful in conjunction therewith
US9961388B2 (en)2008-11-262018-05-01David HarrisonExposure of public internet protocol addresses in an advertising exchange server to improve relevancy of advertisements
US9971585B2 (en)2012-10-162018-05-15Citrix Systems, Inc.Wrapping unmanaged applications on a mobile device
US9985850B2 (en)2013-03-292018-05-29Citrix Systems, Inc.Providing mobile device management functionalities
US9986279B2 (en)2008-11-262018-05-29Free Stream Media Corp.Discovery, access control, and communication with networked services
US10133858B2 (en)*2011-12-292018-11-20Paypal, Inc.Applications login using a mechanism relating sub-tokens to the quality of a master token
US10284627B2 (en)2013-03-292019-05-07Citrix Systems, Inc.Data management for an application with multiple operation modes
US10334324B2 (en)2008-11-262019-06-25Free Stream Media Corp.Relevant advertisement generation based on a user operating a client device communicatively coupled with a networked media device
US10419541B2 (en)2008-11-262019-09-17Free Stream Media Corp.Remotely control devices over a network without authentication or registration
US10419377B2 (en)*2017-05-312019-09-17Apple Inc.Method and system for categorizing instant messages
US10452837B1 (en)*2014-09-262019-10-22Amazon Technologies, Inc.Inbound link handling
US10552603B2 (en)2000-05-172020-02-04Finjan, Inc.Malicious mobile code runtime monitoring system and methods
US10567823B2 (en)2008-11-262020-02-18Free Stream Media Corp.Relevant advertisement generation based on a user operating a client device communicatively coupled with a networked media device
US10631068B2 (en)2008-11-262020-04-21Free Stream Media Corp.Content exposure attribution based on renderings of related content across multiple devices
US10880340B2 (en)2008-11-262020-12-29Free Stream Media Corp.Relevancy improvement through targeting of information based on data gathered from a networked device associated with a security sandbox of a client device
US10908896B2 (en)2012-10-162021-02-02Citrix Systems, Inc.Application wrapping for application management framework
US10977693B2 (en)2008-11-262021-04-13Free Stream Media Corp.Association of content identifier of audio-visual data with additional data through capture infrastructure
US11106834B2 (en)*2011-09-282021-08-31EMC IP Holding Company LLCDigital disappearing ink
US11206268B2 (en)*2018-12-182021-12-21Jpmorgan Chase Bank, N.A.Account lifecycle management
US12120077B2 (en)2012-12-062024-10-15Omnissa, LlcSystems and methods for controlling email access

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7137034B2 (en)2000-05-192006-11-14Vir2Us, Inc.Self repairing computer having user accessible switch for modifying bootable storage device configuration to initiate repair
US7096381B2 (en)2001-05-212006-08-22Self Repairing Computer, Inc.On-the-fly repair of a computer
US7111201B2 (en)2000-05-192006-09-19Self Repairing Computers, Inc.Self repairing computer detecting need for repair and having switched protected storage
US7392541B2 (en)2001-05-172008-06-24Vir2Us, Inc.Computer system architecture and method providing operating-system independent virus-, hacker-, and cyber-terror-immune processing environments
US7849360B2 (en)2001-05-212010-12-07Vir2Us, Inc.Computer system and method of controlling communication port to prevent computer contamination by virus or malicious code
US7536598B2 (en)2001-11-192009-05-19Vir2Us, Inc.Computer system capable of supporting a plurality of independent computing environments
US7788699B2 (en)2002-03-062010-08-31Vir2Us, Inc.Computer and method for safe usage of documents, email attachments and other content that may contain virus, spy-ware, or malicious code
US8775369B2 (en)2007-01-242014-07-08Vir2Us, Inc.Computer system architecture and method having isolated file system management for secure and reliable data processing
US9853979B1 (en)2013-03-112017-12-26Amazon Technologies, Inc.Immediate policy effectiveness in eventually consistent systems
US10223526B2 (en)*2015-05-212019-03-05Airwatch LlcGenerating packages for managed applications
US10171502B2 (en)2015-05-212019-01-01Airwatch LlcManaged applications
US10339302B2 (en)2015-05-212019-07-02Airwatch LlcCreating multiple workspaces in a device
US10097606B2 (en)2016-03-142018-10-09Amazon Technologies, Inc.Application streaming using access and execution environments
US20190102156A1 (en)*2017-09-292019-04-04Compuware CorporationStreamlined Technique For Deploying Application In Cloud Computing Environment
US11165817B2 (en)*2019-10-242021-11-02Arbor Networks, Inc.Mitigation of network denial of service attacks using IP location services
CN110851823B (en)*2019-11-122023-03-10腾讯科技(深圳)有限公司Data access method, device, terminal and storage medium
US11539695B2 (en)*2019-11-262022-12-27Twingate, Inc.Secure controlled access to protected resources
US11601399B2 (en)2021-01-202023-03-07Bank Of America CorporationSystem and method for detecting forbidden network accesses based on zone connectivity mapping

Citations (27)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5265206A (en)*1990-10-231993-11-23International Business Machines CorporationSystem and method for implementing a messenger and object manager in an object oriented programming environment
US5537548A (en)*1991-08-081996-07-16International Business Machines CorporationMethod of computer conferencing by intercepting commands issued by application programs and redirecting to all stations for execution
US5619639A (en)*1994-10-041997-04-08Mast; Michael B.Method and apparatus for associating an image display area with an application display area
US5634102A (en)*1995-08-071997-05-27Apple Computer, Inc.Methods and apparatus for a selectable backdrop
US5760769A (en)*1995-12-221998-06-02Intel CorporationApparatus and method for identifying a shared application program in a computer during teleconferencing
US5764985A (en)*1994-12-131998-06-09Microsoft CorpNotification mechanism for coordinating software extensions
US5768519A (en)*1996-01-181998-06-16Microsoft CorporationMethod and apparatus for merging user accounts from a source security domain into a target security domain
US5787428A (en)*1994-02-161998-07-28British Telecommunications Public Limited CompanyControl of database access using security/user tag correspondence table
US5797128A (en)*1995-07-031998-08-18Sun Microsystems, Inc.System and method for implementing a hierarchical policy for computer system administration
US5832263A (en)*1996-03-151998-11-03Digidox, Inc.System and method for in-place modification of information recorded in read-only storage using modifiable non-volatile storage associated with an agent
US5956507A (en)*1996-05-141999-09-21Shearer, Jr.; Bennie L.Dynamic alteration of operating system kernel resource tables
US5974470A (en)*1997-09-031999-10-26Chicago-Soft, Ltd.System for reducing conflicts among dynamic link library modules by aliasing modules
US5991877A (en)*1997-04-031999-11-23Lockheed Martin CorporationObject-oriented trusted application framework
US6092192A (en)*1998-01-162000-07-18International Business Machines CorporationApparatus and methods for providing repetitive enrollment in a plurality of biometric recognition systems based on an initial enrollment
US6141754A (en)*1997-11-282000-10-31International Business Machines CorporationIntegrated method and system for controlling information access and distribution
US6154844A (en)*1996-11-082000-11-28Finjan Software, Ltd.System and method for attaching a downloadable security profile to a downloadable
US6275938B1 (en)*1997-08-282001-08-14Microsoft CorporationSecurity enhancement for untrusted executable code
US6289458B1 (en)*1998-09-212001-09-11Microsoft CorporationPer property access control mechanism
US20020019941A1 (en)*1998-06-122002-02-14Shannon ChanMethod and system for secure running of untrusted content
US6385724B1 (en)*1998-11-302002-05-07Microsoft CorporationAutomatic object caller chain with declarative impersonation and transitive trust
US6453418B1 (en)*1995-11-292002-09-17Hitachi, Ltd.Method for accessing information
US20020188649A1 (en)*2001-06-122002-12-12Ron KarimMechanism for safely executing an untrusted program
US6513111B2 (en)*1998-02-092003-01-28Reuters, LtdMethod of controlling software applications specific to a group of users
US6529985B1 (en)*2000-02-042003-03-04Ensim CorporationSelective interception of system calls
US6587888B1 (en)*1999-12-152003-07-01Networks Associates Technology, Inc.Dynamic software wrapper
US6772350B1 (en)*1998-05-152004-08-03E.Piphany, Inc.System and method for controlling access to resources in a distributed environment
US6907396B1 (en)*2000-06-012005-06-14Networks Associates Technology, Inc.Detecting computer viruses or malicious software by patching instructions into an emulator

Family Cites Families (24)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4926476A (en)*1989-02-031990-05-15Motorola, Inc.Method and apparatus for secure execution of untrusted software
US5604490A (en)*1994-09-091997-02-18International Business Machines CorporationMethod and system for providing a user access to multiple secured subsystems
US6167520A (en)1996-11-082000-12-26Finjan Software, Inc.System and method for protecting a client during runtime from hostile downloadables
US6128774A (en)*1997-10-282000-10-03Necula; George C.Safe to execute verification of software
US6295605B1 (en)*1998-09-102001-09-25International Business Machines CorporationMethod and apparatus for multi-level security evaluation
US6477550B1 (en)*1999-03-162002-11-05Mcafee.Com CorporationMethod and system for processing events related to a first type of browser from a second type of browser
US7289964B1 (en)*1999-08-312007-10-30Accenture LlpSystem and method for transaction services patterns in a netcentric environment
WO2001048655A1 (en)*1999-12-072001-07-05Nodlet, S.A.Online commodities trading system with anonymous counter bid/offer function
EP1113361A1 (en)*2000-01-032001-07-04Wimba.Com S.A.Process of communication between an applet and a local agent using a socket communication channel
US20020010800A1 (en)*2000-05-182002-01-24Riley Richard T.Network access control system and method
US6931540B1 (en)*2000-05-312005-08-16Networks Associates Technology, Inc.System, method and computer program product for selecting virus detection actions based on a process by which files are being accessed
US7350204B2 (en)*2000-07-242008-03-25Microsoft CorporationPolicies for secure software execution
US20020069198A1 (en)*2000-08-312002-06-06Infoseer, Inc.System and method for positive identification of electronic files
US6915433B1 (en)*2000-09-282005-07-05Sumisho Computer Systems CorporationSecurely extensible component meta-data
US7181620B1 (en)*2001-11-092007-02-20Cisco Technology, Inc.Method and apparatus providing secure initialization of network devices using a cryptographic key distribution approach
JP4051924B2 (en)*2001-12-052008-02-27株式会社日立製作所 Network system capable of transmission control
IL147560A0 (en)*2002-01-102002-08-14Sphera Technologies LtdA method and system for hosting a plurality of dedicated servers
WO2003075158A2 (en)*2002-03-012003-09-12Green Border TechnologiesMethod and system for assured denotation of application semantics
US7613994B2 (en)*2002-05-292009-11-03International Business Machines CorporationDocument handling in a web application
AU2003238908A1 (en)2002-06-062003-12-22Green Border TechnologiesMethod and system for implementing a secure application execution environment using derived user accounts for internet content
US20050198319A1 (en)*2004-01-152005-09-08Yahoo! Inc.Techniques for parental control of internet access including a guest mode
US20060173792A1 (en)*2005-01-132006-08-03Glass Paul HSystem and method for verifying the age and identity of individuals and limiting their access to appropriate material
US9057754B2 (en)2010-03-042015-06-16SeeScan, Inc.Economical magnetic locator apparatus and method
US10144048B2 (en)2014-11-192018-12-04Ford Global Technologies, LlcHigh stiffness and high access forming tool for incremental sheet forming

Patent Citations (27)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5265206A (en)*1990-10-231993-11-23International Business Machines CorporationSystem and method for implementing a messenger and object manager in an object oriented programming environment
US5537548A (en)*1991-08-081996-07-16International Business Machines CorporationMethod of computer conferencing by intercepting commands issued by application programs and redirecting to all stations for execution
US5787428A (en)*1994-02-161998-07-28British Telecommunications Public Limited CompanyControl of database access using security/user tag correspondence table
US5619639A (en)*1994-10-041997-04-08Mast; Michael B.Method and apparatus for associating an image display area with an application display area
US5764985A (en)*1994-12-131998-06-09Microsoft CorpNotification mechanism for coordinating software extensions
US5797128A (en)*1995-07-031998-08-18Sun Microsystems, Inc.System and method for implementing a hierarchical policy for computer system administration
US5634102A (en)*1995-08-071997-05-27Apple Computer, Inc.Methods and apparatus for a selectable backdrop
US6453418B1 (en)*1995-11-292002-09-17Hitachi, Ltd.Method for accessing information
US5760769A (en)*1995-12-221998-06-02Intel CorporationApparatus and method for identifying a shared application program in a computer during teleconferencing
US5768519A (en)*1996-01-181998-06-16Microsoft CorporationMethod and apparatus for merging user accounts from a source security domain into a target security domain
US5832263A (en)*1996-03-151998-11-03Digidox, Inc.System and method for in-place modification of information recorded in read-only storage using modifiable non-volatile storage associated with an agent
US5956507A (en)*1996-05-141999-09-21Shearer, Jr.; Bennie L.Dynamic alteration of operating system kernel resource tables
US6154844A (en)*1996-11-082000-11-28Finjan Software, Ltd.System and method for attaching a downloadable security profile to a downloadable
US5991877A (en)*1997-04-031999-11-23Lockheed Martin CorporationObject-oriented trusted application framework
US6275938B1 (en)*1997-08-282001-08-14Microsoft CorporationSecurity enhancement for untrusted executable code
US5974470A (en)*1997-09-031999-10-26Chicago-Soft, Ltd.System for reducing conflicts among dynamic link library modules by aliasing modules
US6141754A (en)*1997-11-282000-10-31International Business Machines CorporationIntegrated method and system for controlling information access and distribution
US6092192A (en)*1998-01-162000-07-18International Business Machines CorporationApparatus and methods for providing repetitive enrollment in a plurality of biometric recognition systems based on an initial enrollment
US6513111B2 (en)*1998-02-092003-01-28Reuters, LtdMethod of controlling software applications specific to a group of users
US6772350B1 (en)*1998-05-152004-08-03E.Piphany, Inc.System and method for controlling access to resources in a distributed environment
US20020019941A1 (en)*1998-06-122002-02-14Shannon ChanMethod and system for secure running of untrusted content
US6289458B1 (en)*1998-09-212001-09-11Microsoft CorporationPer property access control mechanism
US6385724B1 (en)*1998-11-302002-05-07Microsoft CorporationAutomatic object caller chain with declarative impersonation and transitive trust
US6587888B1 (en)*1999-12-152003-07-01Networks Associates Technology, Inc.Dynamic software wrapper
US6529985B1 (en)*2000-02-042003-03-04Ensim CorporationSelective interception of system calls
US6907396B1 (en)*2000-06-012005-06-14Networks Associates Technology, Inc.Detecting computer viruses or malicious software by patching instructions into an emulator
US20020188649A1 (en)*2001-06-122002-12-12Ron KarimMechanism for safely executing an untrusted program

Cited By (279)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9189621B2 (en)1996-11-082015-11-17Finjan, Inc.Malicious mobile code runtime monitoring system and methods
US9444844B2 (en)1996-11-082016-09-13Finjan, Inc.Malicious mobile code runtime monitoring system and methods
US9219755B2 (en)1996-11-082015-12-22Finjan, Inc.Malicious mobile code runtime monitoring system and methods
US10552603B2 (en)2000-05-172020-02-04Finjan, Inc.Malicious mobile code runtime monitoring system and methods
US7970843B2 (en)2000-08-282011-06-28Brown Scott TE-mail messaging system and method for enhanced rich media delivery
US20110225253A1 (en)*2000-08-282011-09-15Brown Scott TE-mail messaging system and method for enhanced rich media delivery
US20100049812A1 (en)*2000-08-282010-02-25Brown Scott TE-Mail Messaging System and Method for Enhanced Rich Media Delivery
US8156192B2 (en)2000-08-282012-04-10Brown Scott TE-mail messaging system and method for enhanced rich media delivery
US7584251B2 (en)*2000-08-282009-09-01Brown Scott TE-mail messaging system and method for enhanced rich media delivery
US8312093B2 (en)2000-08-282012-11-13Brown Scott TE-mail messaging system and method for enhanced rich media delivery
US20020078158A1 (en)*2000-08-282002-06-20Brown Scott T.E-mail messaging system and method for enhanced rich media delivery
US10121005B2 (en)2002-01-172018-11-06Trustwave Holdings, IncVirus detection by executing electronic message code in a virtual machine
US7607171B1 (en)2002-01-172009-10-20Avinti, Inc.Virus detection by executing e-mail code in a virtual machine
US9652613B1 (en)2002-01-172017-05-16Trustwave Holdings, Inc.Virus detection by executing electronic message code in a virtual machine
US7406542B2 (en)*2002-03-012008-07-29Google Inc.Method and system for assured denotation of application semantics
US20030179244A1 (en)*2002-03-012003-09-25Ulfar ErlingssonMethod and system for assured denotation of application semantics
US10133864B2 (en)2002-06-062018-11-20Google LlcMethods and systems for implementing a secure application execution environment using derived user accounts for internet content
US9171149B2 (en)2002-06-062015-10-27Google Inc.Methods and systems for implementing a secure application execution environment using derived user accounts for internet content
US10922403B1 (en)2002-06-062021-02-16Google LlcMethods and systems for implementing a secure application execution environment using derived user accounts for internet content
US20040268139A1 (en)*2003-06-252004-12-30Microsoft CorporationSystems and methods for declarative client input security screening
US9407630B2 (en)*2003-09-232016-08-02At&T Intellectual Property I, L.P.Methods of resetting passwords in network service systems including user redirection and related systems and computer program products
US20140380439A1 (en)*2003-09-232014-12-25At&T Intellectual Property I, L.P.Methods of Resetting Passwords in Network Service Systems Including User Redirection and Related Systems and Computer Program Products
US20050114870A1 (en)*2003-11-212005-05-26Song Dong H.System and method for executing an application on a secured run-time environment
US20050119910A1 (en)*2003-12-012005-06-02International Business Machines CorporationContent update notification
US20050182788A1 (en)*2004-02-122005-08-18International Business Machines CorporationArchitecture and method for managing the sharing of logical resources among separate partitions of a logically partitioned computer system
US8782024B2 (en)*2004-02-122014-07-15International Business Machines CorporationManaging the sharing of logical resources among separate partitions of a logically partitioned computer system
US8650612B2 (en)2004-04-302014-02-11Microsoft CorporationSecurity context lockdown
US20050246761A1 (en)*2004-04-302005-11-03Microsoft CorporationSystem and method for local machine zone lockdown with relation to a network browser
US8108902B2 (en)*2004-04-302012-01-31Microsoft CorporationSystem and method for local machine zone lockdown with relation to a network browser
USRE43500E1 (en)2004-08-072012-07-03Rozman Allen FSystem and method for protecting a computer system from malicious software
USRE43528E1 (en)*2004-08-072012-07-17Rozman Allen FSystem and method for protecting a computer system from malicious software
USRE43103E1 (en)*2004-08-072012-01-10Rozman Allen FSystem and method for protecting a computer system from malicious software
USRE43529E1 (en)*2004-08-072012-07-17Rozman Allen FSystem and method for protecting a computer system from malicious software
USRE43987E1 (en)*2004-08-072013-02-05Rozman Allen FSystem and method for protecting a computer system from malicious software
US7716275B1 (en)*2004-08-312010-05-11Symantec Operating CorporationMethod and system for implementing shared quotas
US8011006B2 (en)*2005-03-142011-08-30Ntt Docomo, Inc.Access controller and access control method
US20060206899A1 (en)*2005-03-142006-09-14Ntt Docomo, Inc.Access controller and access control method
US8078740B2 (en)*2005-06-032011-12-13Microsoft CorporationRunning internet applications with low rights
US20060277218A1 (en)*2005-06-032006-12-07Microsoft CorporationRunning internet applications with low rights
US8161563B2 (en)2005-06-032012-04-17Microsoft CorporationRunning internet applications with low rights
US20060277311A1 (en)*2005-06-032006-12-07Microsoft CorporationRunning Internet applications with low rights
US7792964B2 (en)2005-06-032010-09-07Microsoft CorporationRunning internet applications with low rights
US20110106948A1 (en)*2005-06-032011-05-05Microsoft CorporationRunning Internet Applications with Low Rights
US9202045B2 (en)*2005-11-172015-12-01Koninklijke Philips N.V.System for managing access control
US20080282319A1 (en)*2005-11-172008-11-13Koninklijke Philips Electronics, N.V.System for Managing Access Control
US8458528B1 (en)2005-11-302013-06-04At&T Intellectual Property Ii, L.P.Comprehensive end-to-end storage area network (SAN) application transport service
US8677190B2 (en)2005-11-302014-03-18At&T Intellectual Property Ii, L.P.Comprehensive end-to-end storage area network (SAN) application transport service
US7945816B1 (en)*2005-11-302011-05-17At&T Intellectual Property Ii, L.P.Comprehensive end-to-end storage area network (SAN) application transport service
US7739731B2 (en)*2006-01-092010-06-15Oracle America, Inc.Method and apparatus for protection domain based security
US20100024016A1 (en)*2006-01-092010-01-28Thierry ViolleauMethod and apparatus for protection domain based security
US8001184B2 (en)*2006-01-272011-08-16International Business Machines CorporationSystem and method for managing an instant messaging conversation
US20070180040A1 (en)*2006-01-272007-08-02Etgen Michael PSystem and method for managing an instant messaging conversation
WO2007113406A3 (en)*2006-03-172008-05-08France TelecomSystem for secure access from a terminal to communication networks
US20070244980A1 (en)*2006-04-142007-10-18Microsoft CorporationInstant Messaging Plug-Ins
US7747785B2 (en)*2006-04-142010-06-29Microsoft CorporationInstant messaging plug-ins
US8793390B2 (en)*2006-05-232014-07-29Blue Coat Systems, Inc.Systems and methods for protocol detection in a proxy
US20070276931A1 (en)*2006-05-232007-11-29Jamshid MahdaviSystems and Methods for Protocol Detection in a Proxy
US20070300064A1 (en)*2006-06-232007-12-27Microsoft CorporationCommunication across domains
US8185737B2 (en)2006-06-232012-05-22Microsoft CorporationCommunication across domains
US8489878B2 (en)2006-06-232013-07-16Microsoft CorporationCommunication across domains
US8335929B2 (en)2006-06-232012-12-18Microsoft CorporationCommunication across domains
US20080005315A1 (en)*2006-06-292008-01-03Po-Ching LinApparatus, system and method for stream-based data filtering
US9723018B2 (en)2006-07-102017-08-01Websense, LlcSystem and method of analyzing web content
US9680866B2 (en)2006-07-102017-06-13Websense, LlcSystem and method for analyzing web content
US8615800B2 (en)2006-07-102013-12-24Websense, Inc.System and method for analyzing web content
US9003524B2 (en)2006-07-102015-04-07Websense, Inc.System and method for analyzing web content
US8978140B2 (en)2006-07-102015-03-10Websense, Inc.System and method of analyzing web content
US9654495B2 (en)2006-12-012017-05-16Websense, LlcSystem and method of analyzing web addresses
US20080133540A1 (en)*2006-12-012008-06-05Websense, Inc.System and method of analyzing web addresses
US8881277B2 (en)2007-01-092014-11-04Websense Hosted R&D LimitedMethod and systems for collecting addresses for remotely accessible information sources
US20100154058A1 (en)*2007-01-092010-06-17Websense Hosted R&D LimitedMethod and systems for collecting addresses for remotely accessible information sources
US7870596B2 (en)2007-02-012011-01-11Microsoft CorporationAccessing network resources outside a security boundary
US20080189767A1 (en)*2007-02-012008-08-07Microsoft CorporationAccessing file resources outside a security boundary
US20080263679A1 (en)*2007-04-232008-10-23Microsoft CorporationStoring information in closed computing devices
US9473439B2 (en)2007-05-182016-10-18Forcepoint Uk LimitedMethod and apparatus for electronic mail filtering
US8799388B2 (en)2007-05-182014-08-05Websense U.K. LimitedMethod and apparatus for electronic mail filtering
US8402529B1 (en)2007-05-302013-03-19M86 Security, Inc.Preventing propagation of malicious software during execution in a virtual machine
US8321936B1 (en)2007-05-302012-11-27M86 Security, Inc.System and method for malicious software detection in multiple protocols
US10019570B2 (en)*2007-06-142018-07-10Microsoft Technology Licensing, LlcProtection and communication abstractions for web browsers
US10762195B2 (en)*2007-06-142020-09-01Microsoft Technology Licensing, LlcProtection and communication abstractions for web browsers
US20180293375A1 (en)*2007-06-142018-10-11Microsoft Technology Licensing, LlcProtection and communication abstractions for web browsers
US20080313648A1 (en)*2007-06-142008-12-18Microsoft CorporationProtection and communication abstractions for web browsers
US20090006847A1 (en)*2007-06-282009-01-01Microsoft CorporationFiltering kernel-mode network communications
US20130152186A1 (en)*2007-06-282013-06-13Microsoft CorporationFiltering kernel-mode network communications
US20150058628A1 (en)*2007-06-282015-02-26Microsoft CorporationFiltering kernel-mode network communications
US8839407B2 (en)*2007-06-282014-09-16Microsoft CorporationFiltering kernel-mode network communications
US8341723B2 (en)*2007-06-282012-12-25Microsoft CorporationFiltering kernel-mode network communications
US9590993B2 (en)*2007-06-282017-03-07Microsoft Technology Licensing, LlcFiltering kernel-mode network communications
US20090055397A1 (en)*2007-08-212009-02-26International Business Machines CorporationMulti-Dimensional Access Control List
US20110225202A1 (en)*2007-08-212011-09-15International Business Machines CorporationMulti-dimensional access control list
US20090307508A1 (en)*2007-10-302009-12-10Bank Of America CorporationOptimizing the Efficiency of an Organization's Technology Infrastructure
US9378282B2 (en)2008-06-302016-06-28Raytheon CompanySystem and method for dynamic and real-time categorization of webpages
US8607344B1 (en)*2008-07-242013-12-10Mcafee, Inc.System, method, and computer program product for initiating a security action at an intermediate layer coupled between a library and an application
US8429741B2 (en)2008-08-292013-04-23Google, Inc.Altered token sandboxing
US20100057774A1 (en)*2008-08-292010-03-04Google Inc.Altered Token Sandboxing
WO2010025377A1 (en)*2008-08-292010-03-04Google Inc.Altered token sandboxing
US20100088397A1 (en)*2008-10-032010-04-08Joe JaudonSystems for dynamically updating virtual desktops or virtual applications
US20100088360A1 (en)*2008-10-032010-04-08Joe JaudonMethods for dynamically updating virtual desktops or virtual applications
US20120011507A1 (en)*2008-11-062012-01-12Takayuki SasakiMaintenance system, maintenance method and program for maintenance
US8776056B2 (en)*2008-11-062014-07-08Nec CorporationMaintenance system, maintenance method and program for maintenance
US8745610B2 (en)2008-11-062014-06-03Nec CorporationMaintenance system, maintenance method and program for maintenance
US9167419B2 (en)2008-11-262015-10-20Free Stream Media Corp.Discovery and launch system and method
US9854330B2 (en)2008-11-262017-12-26David HarrisonRelevancy improvement through targeting of information based on data gathered from a networked device associated with a security sandbox of a client device
US9703947B2 (en)2008-11-262017-07-11Free Stream Media Corp.Relevancy improvement through targeting of information based on data gathered from a networked device associated with a security sandbox of a client device
US9706265B2 (en)2008-11-262017-07-11Free Stream Media Corp.Automatic communications between networked devices such as televisions and mobile devices
US9686596B2 (en)2008-11-262017-06-20Free Stream Media Corp.Advertisement targeting through embedded scripts in supply-side and demand-side platforms
US10142377B2 (en)2008-11-262018-11-27Free Stream Media Corp.Relevancy improvement through targeting of information based on data gathered from a networked device associated with a security sandbox of a client device
US10986141B2 (en)2008-11-262021-04-20Free Stream Media Corp.Relevancy improvement through targeting of information based on data gathered from a networked device associated with a security sandbox of a client device
US9838758B2 (en)2008-11-262017-12-05David HarrisonRelevancy improvement through targeting of information based on data gathered from a networked device associated with a security sandbox of a client device
US10977693B2 (en)2008-11-262021-04-13Free Stream Media Corp.Association of content identifier of audio-visual data with additional data through capture infrastructure
US9589456B2 (en)2008-11-262017-03-07Free Stream Media Corp.Exposure of public internet protocol addresses in an advertising exchange server to improve relevancy of advertisements
US9591381B2 (en)2008-11-262017-03-07Free Stream Media Corp.Automated discovery and launch of an application on a network enabled device
US9848250B2 (en)2008-11-262017-12-19Free Stream Media Corp.Relevancy improvement through targeting of information based on data gathered from a networked device associated with a security sandbox of a client device
US9576473B2 (en)2008-11-262017-02-21Free Stream Media Corp.Annotation of metadata through capture infrastructure
US9716736B2 (en)2008-11-262017-07-25Free Stream Media Corp.System and method of discovery and launch associated with a networked media device
US9258383B2 (en)2008-11-262016-02-09Free Stream Media Corp.Monetization of television audience data across muliple screens of a user watching television
US10880340B2 (en)2008-11-262020-12-29Free Stream Media Corp.Relevancy improvement through targeting of information based on data gathered from a networked device associated with a security sandbox of a client device
US9560425B2 (en)2008-11-262017-01-31Free Stream Media Corp.Remotely control devices over a network without authentication or registration
US9519772B2 (en)2008-11-262016-12-13Free Stream Media Corp.Relevancy improvement through targeting of information based on data gathered from a networked device associated with a security sandbox of a client device
US10791152B2 (en)2008-11-262020-09-29Free Stream Media Corp.Automatic communications between networked devices such as televisions and mobile devices
US10419541B2 (en)2008-11-262019-09-17Free Stream Media Corp.Remotely control devices over a network without authentication or registration
US10771525B2 (en)2008-11-262020-09-08Free Stream Media Corp.System and method of discovery and launch associated with a networked media device
US10334324B2 (en)2008-11-262019-06-25Free Stream Media Corp.Relevant advertisement generation based on a user operating a client device communicatively coupled with a networked media device
US9866925B2 (en)2008-11-262018-01-09Free Stream Media Corp.Relevancy improvement through targeting of information based on data gathered from a networked device associated with a security sandbox of a client device
US10425675B2 (en)2008-11-262019-09-24Free Stream Media Corp.Discovery, access control, and communication with networked services
US10074108B2 (en)2008-11-262018-09-11Free Stream Media Corp.Annotation of metadata through capture infrastructure
US10631068B2 (en)2008-11-262020-04-21Free Stream Media Corp.Content exposure attribution based on renderings of related content across multiple devices
US10567823B2 (en)2008-11-262020-02-18Free Stream Media Corp.Relevant advertisement generation based on a user operating a client device communicatively coupled with a networked media device
US9154942B2 (en)2008-11-262015-10-06Free Stream Media Corp.Zero configuration communication between a browser and a networked media device
US9961388B2 (en)2008-11-262018-05-01David HarrisonExposure of public internet protocol addresses in an advertising exchange server to improve relevancy of advertisements
US9967295B2 (en)2008-11-262018-05-08David HarrisonAutomated discovery and launch of an application on a network enabled device
US9386356B2 (en)2008-11-262016-07-05Free Stream Media Corp.Targeting with television audience data across multiple screens
US10032191B2 (en)2008-11-262018-07-24Free Stream Media Corp.Advertisement targeting through embedded scripts in supply-side and demand-side platforms
US9986279B2 (en)2008-11-262018-05-29Free Stream Media Corp.Discovery, access control, and communication with networked services
US8863007B2 (en)2009-04-032014-10-14International Business Machines CorporationProgrammatic information transfer
US20100257471A1 (en)*2009-04-032010-10-07International Business Machines CorporationProgrammatic Information Transfer
US9367512B2 (en)2009-04-222016-06-14Aventura Hq, Inc.Systems and methods for dynamically updating virtual desktops or virtual applications in a standard computing environment
US8234332B2 (en)2009-04-222012-07-31Aventura Hq, Inc.Systems and methods for updating computer memory and file locations within virtual computing environments
US20110082938A1 (en)*2009-10-072011-04-07Joe JaudonSystems and methods for dynamically updating a user interface within a virtual computing environment
US10515208B2 (en)2009-10-282019-12-24Microsoft Technology Licensing, LlcIsolation and presentation of untrusted data
US20110099609A1 (en)*2009-10-282011-04-28Microsoft CorporationIsolation and presentation of untrusted data
US9946871B2 (en)2009-10-282018-04-17Microsoft Technology Licensing, LlcIsolation and presentation of untrusted data
US9003517B2 (en)*2009-10-282015-04-07Microsoft Technology Licensing, LlcIsolation and presentation of untrusted data
US9613228B2 (en)2009-10-282017-04-04Microsoft Technology Licensing, LlcIsolation and presentation of untrusted data
WO2011142996A3 (en)*2010-05-092012-02-16Madhav ChintaMethods and systems for forcing an application to store data in a secure storage location
US9367703B2 (en)2010-05-092016-06-14Citrix Systems, Inc.Methods and systems for forcing an application to store data in a secure storage location
US8707457B2 (en)2010-05-092014-04-22Citrix Systems, Inc.Methods and systems for forcing an application to store data in a secure storage location
US8099596B1 (en)*2011-06-302012-01-17Kaspersky Lab ZaoSystem and method for malware protection using virtualization
US11106834B2 (en)*2011-09-282021-08-31EMC IP Holding Company LLCDigital disappearing ink
US9443081B2 (en)2011-09-302016-09-13Avecto LimitedMethod and apparatus for controlling access to a resource in a computer device
WO2013045928A1 (en)*2011-09-302013-04-04Avecto LimitedMethod and apparatus for controlling access to a resource in a computer device
US8806570B2 (en)2011-10-112014-08-12Citrix Systems, Inc.Policy-based application management
US9137262B2 (en)2011-10-112015-09-15Citrix Systems, Inc.Providing secure mobile device access to enterprise resources using application tunnels
US10469534B2 (en)2011-10-112019-11-05Citrix Systems, Inc.Secure execution of enterprise applications on mobile devices
US9521147B2 (en)2011-10-112016-12-13Citrix Systems, Inc.Policy based application management
US9286471B2 (en)2011-10-112016-03-15Citrix Systems, Inc.Rules based detection and correction of problems on mobile devices of enterprise users
US10063595B1 (en)2011-10-112018-08-28Citrix Systems, Inc.Secure execution of enterprise applications on mobile devices
US8881229B2 (en)2011-10-112014-11-04Citrix Systems, Inc.Policy-based application management
US10044757B2 (en)2011-10-112018-08-07Citrix Systems, Inc.Secure execution of enterprise applications on mobile devices
US9183380B2 (en)2011-10-112015-11-10Citrix Systems, Inc.Secure execution of enterprise applications on mobile devices
US9143530B2 (en)2011-10-112015-09-22Citrix Systems, Inc.Secure container for protecting enterprise data on a mobile device
US9143529B2 (en)2011-10-112015-09-22Citrix Systems, Inc.Modifying pre-existing mobile applications to implement enterprise security policies
US10402546B1 (en)2011-10-112019-09-03Citrix Systems, Inc.Secure execution of enterprise applications on mobile devices
US9378359B2 (en)2011-10-112016-06-28Citrix Systems, Inc.Gateway for controlling mobile device access to enterprise resources
US9529996B2 (en)2011-10-112016-12-27Citrix Systems, Inc.Controlling mobile device access to enterprise resources
US8769063B2 (en)2011-10-112014-07-01Citrix Systems, Inc.Policy-based application management
US9111105B2 (en)2011-10-112015-08-18Citrix Systems, Inc.Policy-based application management
US11134104B2 (en)2011-10-112021-09-28Citrix Systems, Inc.Secure execution of enterprise applications on mobile devices
US9043480B2 (en)2011-10-112015-05-26Citrix Systems, Inc.Policy-based application management
US8799994B2 (en)2011-10-112014-08-05Citrix Systems, Inc.Policy-based application management
US8869235B2 (en)2011-10-112014-10-21Citrix Systems, Inc.Secure mobile browser for protecting enterprise data
US8886925B2 (en)2011-10-112014-11-11Citrix Systems, Inc.Protecting enterprise data through policy-based encryption of message attachments
US9213850B2 (en)2011-10-112015-12-15Citrix Systems, Inc.Policy-based application management
US10133858B2 (en)*2011-12-292018-11-20Paypal, Inc.Applications login using a mechanism relating sub-tokens to the quality of a master token
US10853468B2 (en)*2011-12-292020-12-01Paypal, Inc.Applications login using a mechanism relating sub-tokens to the quality of a master token
US10474806B2 (en)2011-12-292019-11-12Paypal, Inc.Applications login using a mechanism relating sub-tokens to the quality of a master token
US10255587B2 (en)*2012-01-182019-04-09Microsoft Technology Licensing, LlcSystem and method for blended presentation of locally and remotely stored electronic messages
US20130185649A1 (en)*2012-01-182013-07-18Microsoft CorporationSystem and method for blended presentation of locally and remotely stored electronic messages
US9083727B1 (en)2012-04-112015-07-14Artemis Internet Inc.Securing client connections
US8799482B1 (en)2012-04-112014-08-05Artemis Internet Inc.Domain policy specification and enforcement
US9264395B1 (en)2012-04-112016-02-16Artemis Internet Inc.Discovery engine
US8990392B1 (en)2012-04-112015-03-24NCC Group Inc.Assessing a computing resource for compliance with a computing resource policy regime specification
US9106661B1 (en)2012-04-112015-08-11Artemis Internet Inc.Computing resource policy regime specification and verification
US9344454B1 (en)2012-04-112016-05-17Artemis Internet Inc.Domain policy specification and enforcement
US9026668B2 (en)2012-05-262015-05-05Free Stream Media Corp.Real-time and retargeted advertising on multiple screens of a user watching television
US9854063B2 (en)2012-10-122017-12-26Citrix Systems, Inc.Enterprise application store for an orchestration framework for connected devices
US9053340B2 (en)2012-10-122015-06-09Citrix Systems, Inc.Enterprise application store for an orchestration framework for connected devices
US9189645B2 (en)2012-10-122015-11-17Citrix Systems, Inc.Sharing content across applications and devices having multiple operation modes in an orchestration framework for connected devices
US9392077B2 (en)2012-10-122016-07-12Citrix Systems, Inc.Coordinating a computing activity across applications and devices having multiple operation modes in an orchestration framework for connected devices
US9386120B2 (en)2012-10-122016-07-05Citrix Systems, Inc.Single sign-on access in an orchestration framework for connected devices
US9516022B2 (en)2012-10-142016-12-06Getgo, Inc.Automated meeting room
US9654508B2 (en)2012-10-152017-05-16Citrix Systems, Inc.Configuring and providing profiles that manage execution of mobile applications
US8904477B2 (en)2012-10-152014-12-02Citrix Systems, Inc.Configuring and providing profiles that manage execution of mobile applications
US9467474B2 (en)2012-10-152016-10-11Citrix Systems, Inc.Conjuring and providing profiles that manage execution of mobile applications
US8910239B2 (en)2012-10-152014-12-09Citrix Systems, Inc.Providing virtualized private network tunnels
US8719898B1 (en)2012-10-152014-05-06Citrix Systems, Inc.Configuring and providing profiles that manage execution of mobile applications
US8914845B2 (en)2012-10-152014-12-16Citrix Systems, Inc.Providing virtualized private network tunnels
US8931078B2 (en)2012-10-152015-01-06Citrix Systems, Inc.Providing virtualized private network tunnels
US9521117B2 (en)2012-10-152016-12-13Citrix Systems, Inc.Providing virtualized private network tunnels
US8887230B2 (en)2012-10-152014-11-11Citrix Systems, Inc.Configuring and providing profiles that manage execution of mobile applications
US9973489B2 (en)2012-10-152018-05-15Citrix Systems, Inc.Providing virtualized private network tunnels
US9602474B2 (en)2012-10-162017-03-21Citrix Systems, Inc.Controlling mobile device access to secure data
US9606774B2 (en)2012-10-162017-03-28Citrix Systems, Inc.Wrapping an application with field-programmable business logic
US9971585B2 (en)2012-10-162018-05-15Citrix Systems, Inc.Wrapping unmanaged applications on a mobile device
US9858428B2 (en)2012-10-162018-01-02Citrix Systems, Inc.Controlling mobile device access to secure data
US10545748B2 (en)2012-10-162020-01-28Citrix Systems, Inc.Wrapping unmanaged applications on a mobile device
US8959579B2 (en)2012-10-162015-02-17Citrix Systems, Inc.Controlling mobile device access to secure data
US10908896B2 (en)2012-10-162021-02-02Citrix Systems, Inc.Application wrapping for application management framework
US9813390B2 (en)2012-12-062017-11-07Airwatch LlcSystems and methods for controlling email access
US20140245381A1 (en)*2012-12-062014-08-28Airwatch, LlcSystems and Methods for Controlling Email Access
US10681017B2 (en)2012-12-062020-06-09Airwatch, LlcSystems and methods for controlling email access
US9853928B2 (en)2012-12-062017-12-26Airwatch LlcSystems and methods for controlling email access
US9391960B2 (en)*2012-12-062016-07-12Airwatch LlcSystems and methods for controlling email access
US11050719B2 (en)2012-12-062021-06-29Airwatch, LlcSystems and methods for controlling email access
US9450921B2 (en)2012-12-062016-09-20Airwatch LlcSystems and methods for controlling email access
US12120077B2 (en)2012-12-062024-10-15Omnissa, LlcSystems and methods for controlling email access
US10243932B2 (en)2012-12-062019-03-26Airwatch, LlcSystems and methods for controlling email access
US20140245008A1 (en)*2012-12-062014-08-28Airwatch, LlcSystems and Methods for Controlling Email Access
US9325713B2 (en)*2012-12-062016-04-26Airwatch LlcSystems and methods for controlling email access
US9436838B2 (en)*2012-12-202016-09-06Intel CorporationSecure local web application data manager
US11050696B2 (en)2013-03-262021-06-29Dropbox, Inc.Content-item linking system for messaging services
US10469421B2 (en)*2013-03-262019-11-05Dropbox, Inc.Content-item linking system for messaging services
US20160191435A1 (en)*2013-03-262016-06-30Dropbox, Inc.Content-item linking system for messaging services
US9215225B2 (en)2013-03-292015-12-15Citrix Systems, Inc.Mobile device locking with context
US8996709B2 (en)2013-03-292015-03-31Citrix Systems, Inc.Providing a managed browser
US8813179B1 (en)2013-03-292014-08-19Citrix Systems, Inc.Providing mobile device management functionalities
US9369449B2 (en)2013-03-292016-06-14Citrix Systems, Inc.Providing an enterprise application store
US9355223B2 (en)*2013-03-292016-05-31Citrix Systems, Inc.Providing a managed browser
US9413736B2 (en)2013-03-292016-08-09Citrix Systems, Inc.Providing an enterprise application store
US8881228B2 (en)2013-03-292014-11-04Citrix Systems, Inc.Providing a managed browser
US10097584B2 (en)2013-03-292018-10-09Citrix Systems, Inc.Providing a managed browser
US9280377B2 (en)2013-03-292016-03-08Citrix Systems, Inc.Application with multiple operation modes
US8893221B2 (en)2013-03-292014-11-18Citrix Systems, Inc.Providing a managed browser
US8898732B2 (en)2013-03-292014-11-25Citrix Systems, Inc.Providing a managed browser
US8910264B2 (en)2013-03-292014-12-09Citrix Systems, Inc.Providing mobile device management functionalities
US10965734B2 (en)2013-03-292021-03-30Citrix Systems, Inc.Data management for an application with multiple operation modes
US20140297756A1 (en)*2013-03-292014-10-02Citrix Systems, Inc.Providing a managed browser
US9948657B2 (en)2013-03-292018-04-17Citrix Systems, Inc.Providing an enterprise application store
US9985850B2 (en)2013-03-292018-05-29Citrix Systems, Inc.Providing mobile device management functionalities
US8850050B1 (en)*2013-03-292014-09-30Citrix Systems, Inc.Providing a managed browser
US10701082B2 (en)2013-03-292020-06-30Citrix Systems, Inc.Application with multiple operation modes
US10284627B2 (en)2013-03-292019-05-07Citrix Systems, Inc.Data management for an application with multiple operation modes
US8850049B1 (en)2013-03-292014-09-30Citrix Systems, Inc.Providing mobile device management functionalities for a managed browser
US9455886B2 (en)2013-03-292016-09-27Citrix Systems, Inc.Providing mobile device management functionalities
US8849979B1 (en)2013-03-292014-09-30Citrix Systems, Inc.Providing mobile device management functionalities
US9112853B2 (en)*2013-03-292015-08-18Citrix Systems, Inc.Providing a managed browser
US10476885B2 (en)2013-03-292019-11-12Citrix Systems, Inc.Application with multiple operation modes
US8849978B1 (en)2013-03-292014-09-30Citrix Systems, Inc.Providing an enterprise application store
US9158895B2 (en)2013-03-292015-10-13Citrix Systems, Inc.Providing a managed browser
US8850010B1 (en)2013-03-292014-09-30Citrix Systems, Inc.Providing a managed browser
US10785228B2 (en)2013-04-122020-09-22Airwatch, LlcOn-demand security policy activation
US11902281B2 (en)2013-04-122024-02-13Airwatch LlcOn-demand security policy activation
US9787686B2 (en)2013-04-122017-10-10Airwatch LlcOn-demand security policy activation
US10116662B2 (en)2013-04-122018-10-30Airwatch LlcOn-demand security policy activation
GB2521722A (en)*2013-10-232015-07-01Avecto LtdComputer device and method for isolating untrusted content
US9177237B2 (en)2013-10-232015-11-03Avecto LimitedComputer device and method for isolating untrusted content
GB2521723A (en)*2013-10-232015-07-01Avecto LtdComputer device and method for isolating untrusted content
GB2521724A (en)*2013-10-232015-07-01Avecto LtdComputer device and method for isolating untrusted content
GB2521723B (en)*2013-10-232016-01-06Avecto LtdComputer device and method for isolating untrusted content
US9715646B2 (en)*2013-10-232017-07-25Avecto LimitedComputer device and method for isolating untrusted content
US20150150142A1 (en)*2013-10-232015-05-28Avecto LimitedComputer device and method for isolating untrusted content
GB2519608A (en)*2013-10-232015-04-29Avecto LtdComputer device and method for isolating untrusted content
GB2521724B (en)*2013-10-232016-01-06Avecto LtdComputer device and method for isolating untrusted content
US9734441B2 (en)2013-10-232017-08-15Avecto LimitedComputer device and method for isolating untrusted content
GB2521722B (en)*2013-10-232016-01-06Avecto LtdComputer device and method for isolating untrusted content
WO2016036957A1 (en)*2014-09-052016-03-10Openpeak Inc.Method and system for data usage accounting in a computing device
US11762984B1 (en)2014-09-262023-09-19Amazon Technologies, Inc.Inbound link handling
US10452837B1 (en)*2014-09-262019-10-22Amazon Technologies, Inc.Inbound link handling
US20170300320A1 (en)*2015-01-222017-10-19Fujitsu LimitedApplication functionality extension method, application functionality extension program, and application functionality extension apparatus
US10102371B2 (en)*2015-04-142018-10-16Avecto LimitedComputer device and method for isolating untrusted content on a clipboard
US20160306964A1 (en)*2015-04-142016-10-20Avecto LimitedComputer device and method for isolating untrusted content on a clipboard
US10193907B2 (en)2015-05-202019-01-29Cisco Technology, Inc.Intrusion detection to prevent impersonation attacks in computer networks
US9699202B2 (en)*2015-05-202017-07-04Cisco Technology, Inc.Intrusion detection to prevent impersonation attacks in computer networks
US10382446B2 (en)*2015-05-282019-08-13Cameyo Inc.Computerized system, method and computer program product, for managing a computer program's operations
US20180054444A9 (en)*2015-05-282018-02-22Eyal DotanScalable application-as-a-service environment and systems and methods useful in conjunction therewith
US9584378B1 (en)*2015-12-222017-02-28International Business Machines CorporationComputer-implemented command control in information technology service environment
US9940466B2 (en)2015-12-222018-04-10International Business Machines CorporationComputer-implemented command control in information technology service environment
US10419377B2 (en)*2017-05-312019-09-17Apple Inc.Method and system for categorizing instant messages
US11206268B2 (en)*2018-12-182021-12-21Jpmorgan Chase Bank, N.A.Account lifecycle management

Also Published As

Publication numberPublication date
AU2003238908A8 (en)2003-12-22
US20160085964A1 (en)2016-03-24
AU2003238908A1 (en)2003-12-22
US9171149B2 (en)2015-10-27
WO2003104954A3 (en)2004-06-10
WO2003104954A2 (en)2003-12-18
EP1525522A2 (en)2005-04-27
US10133864B2 (en)2018-11-20
US20150047030A1 (en)2015-02-12
US10922403B1 (en)2021-02-16

Similar Documents

PublicationPublication DateTitle
US10922403B1 (en)Methods and systems for implementing a secure application execution environment using derived user accounts for internet content
US7191469B2 (en)Methods and systems for providing a secure application environment using derived user accounts
US11575714B2 (en)Dividing a data processing device into separate security domains
US7694328B2 (en)Systems and methods for secure client applications
US6684329B1 (en)System and method for increasing the resiliency of firewall systems
Jackson et al.Subspace: secure cross-domain communication for web mashups
US8732794B2 (en)Browser plug-in firewall
US6584508B1 (en)Advanced data guard having independently wrapped components
US20180302443A1 (en)Dividing a data processing device into separate security domains
US7966643B2 (en)Method and system for securing a remote file system
US20100024036A1 (en)System and Methods Providing Secure Workspace Sessions
US9245108B1 (en)Dynamic adjustment of the file format to identify untrusted files
US20020138634A1 (en)System and methods for securely permitting mobile code to access resources over a network
US20170048298A9 (en)Systems and methods for an automatic fresh browser instance for accessing internet content
US20070162909A1 (en)Reserving resources in an operating system
US9516032B2 (en)Methods and systems for using derived user accounts
Anupam et al.Secure web scripting
US20240267361A1 (en)Dividing a data processing device into separate security domains
EP1504321A2 (en)Method and system for providing a secure application environment using derived access rules
US20120324569A1 (en)Rule compilation in a firewall
Zohrevandi et al.Auto-FBI: a user-friendly approach for secure access to sensitive content on the web
EP4379586A1 (en)Information processing method, program, storage medium
Gosselin et al.Confining the apache web server with security-enhanced linux
Briffaut et al.A dynamic end-to-end security for coordinating multiple protections within a linux desktop
Sng et al.Security in computational electronic mail systems

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:GREEN BORDER TECHNOLOGIES, INC., CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ERLINGSSON, ULFAR;REEL/FRAME:019711/0115

Effective date:20021023

ASAssignment

Owner name:GOOGLE INC., CALIFORNIA

Free format text:MERGER;ASSIGNOR:GREEN BORDER TECHNOLOGIES, INC.;REEL/FRAME:019995/0713

Effective date:20070511

Owner name:GOOGLE INC.,CALIFORNIA

Free format text:MERGER;ASSIGNOR:GREEN BORDER TECHNOLOGIES, INC.;REEL/FRAME:019995/0713

Effective date:20070511

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION

ASAssignment

Owner name:GOOGLE LLC, CALIFORNIA

Free format text:CHANGE OF NAME;ASSIGNOR:GOOGLE INC.;REEL/FRAME:044142/0357

Effective date:20170929


[8]ページ先頭

©2009-2025 Movatter.jp