Movatterモバイル変換


[0]ホーム

URL:


US20070234070A1 - Software self-defense systems and methods - Google Patents

Software self-defense systems and methods
Download PDF

Info

Publication number
US20070234070A1
US20070234070A1US11/506,321US50632106AUS2007234070A1US 20070234070 A1US20070234070 A1US 20070234070A1US 50632106 AUS50632106 AUS 50632106AUS 2007234070 A1US2007234070 A1US 2007234070A1
Authority
US
United States
Prior art keywords
code
program
obfuscation
techniques
instructions
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/506,321
Inventor
James Horning
W. Sibert
Robert Tarjan
Urnesh Maheshwari
William Horne
Andrew Wright
Lesley Matheson
Susan Owicki
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Innovation Technologies Partners Lp
Original Assignee
Intertrust Technologies Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intertrust Technologies CorpfiledCriticalIntertrust Technologies Corp
Priority to US11/506,321priorityCriticalpatent/US20070234070A1/en
Publication of US20070234070A1publicationCriticalpatent/US20070234070A1/en
Assigned to INNOVATION TECHNOLOGIES PARTNERS LPreassignmentINNOVATION TECHNOLOGIES PARTNERS LPPATENT ASSIGNMENTAssignors: INTERTRUST TECHNOLOGIES CORPORATION
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.

Description

Claims (29)

79. A system for obfuscating computer code, the system comprising:
a memory unit, the memory unit including:
a binary code modification tool;
a program module containing routines for applying predefined obfuscation transformations to computer code; and
a computer program operable to associate the binary code modification tool with the program module to yield an obfuscation program;
a processor for executing the obfuscation program;
wherein the obfuscation program, when executed, is operable to accept computer code as input, to separate the accepted computer code into instructions and data, and to perform transformations on the instructions to produce an obfuscated computer code, the transformations tending to render the computer code more resistant to reverse engineering, decompilation, or attack.
US11/506,3211999-07-292006-08-17Software self-defense systems and methodsAbandonedUS20070234070A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US11/506,321US20070234070A1 (en)1999-07-292006-08-17Software self-defense systems and methods

Applications Claiming Priority (3)

Application NumberPriority DateFiling DateTitle
US14641999P1999-07-291999-07-29
US09/629,546US7430670B1 (en)1999-07-292000-07-31Software self-defense systems and methods
US11/506,321US20070234070A1 (en)1999-07-292006-08-17Software self-defense systems and methods

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US09/629,546ContinuationUS7430670B1 (en)1999-07-292000-07-31Software self-defense systems and methods

Publications (1)

Publication NumberPublication Date
US20070234070A1true US20070234070A1 (en)2007-10-04

Family

ID=39776569

Family Applications (8)

Application NumberTitlePriority DateFiling Date
US09/629,546Expired - Fee RelatedUS7430670B1 (en)1999-07-292000-07-31Software self-defense systems and methods
US11/102,306Expired - LifetimeUS7823135B2 (en)1999-07-292005-04-07Software self-defense systems and methods
US11/128,097Expired - LifetimeUS7779394B2 (en)1999-07-292005-05-11Software self-defense systems and methods
US11/129,106Expired - LifetimeUS7779270B2 (en)1999-07-292005-05-13Software self-defense systems and methods
US11/506,321AbandonedUS20070234070A1 (en)1999-07-292006-08-17Software self-defense systems and methods
US12/854,685Expired - Fee RelatedUS8387022B2 (en)1999-07-292010-08-11Software self-defense systems and methods
US13/776,441Expired - Fee RelatedUS9064099B2 (en)1999-07-292013-02-25Software self-defense systems and methods
US14/732,312Expired - Fee RelatedUS10255414B2 (en)1999-07-292015-06-05Software self-defense systems and methods

Family Applications Before (4)

Application NumberTitlePriority DateFiling Date
US09/629,546Expired - Fee RelatedUS7430670B1 (en)1999-07-292000-07-31Software self-defense systems and methods
US11/102,306Expired - LifetimeUS7823135B2 (en)1999-07-292005-04-07Software self-defense systems and methods
US11/128,097Expired - LifetimeUS7779394B2 (en)1999-07-292005-05-11Software self-defense systems and methods
US11/129,106Expired - LifetimeUS7779270B2 (en)1999-07-292005-05-13Software self-defense systems and methods

Family Applications After (3)

Application NumberTitlePriority DateFiling Date
US12/854,685Expired - Fee RelatedUS8387022B2 (en)1999-07-292010-08-11Software self-defense systems and methods
US13/776,441Expired - Fee RelatedUS9064099B2 (en)1999-07-292013-02-25Software self-defense systems and methods
US14/732,312Expired - Fee RelatedUS10255414B2 (en)1999-07-292015-06-05Software self-defense systems and methods

Country Status (1)

CountryLink
US (8)US7430670B1 (en)

Cited By (119)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20030120938A1 (en)*2001-11-272003-06-26Miki MullorMethod of securing software against reverse engineering
US20050204348A1 (en)*1999-07-292005-09-15Inter Trust Technologies CorporationSoftware self-defense systems and methods
US20050262347A1 (en)*2002-10-252005-11-24Yuji SatoWatermark insertion apparatus and watermark extraction apparatus
US20060041757A1 (en)*2004-08-212006-02-23Ko-Cheng FangComputer data protecting method
US20060090084A1 (en)*2004-10-222006-04-27Mark BuerSecure processing environment
US20060288223A1 (en)*2003-09-182006-12-21Perry KiehtreiberMethod and Apparatus for Incremental Code Signing
US20070016888A1 (en)*2005-07-152007-01-18The Mathworks, Inc.System and method for verifying the integrity of read-only components in deployed mixed-mode applications
US20070180430A1 (en)*2006-02-022007-08-02International Business Machines CorporationDecision support tool for interleaving review software testing
US20070220261A1 (en)*2006-03-152007-09-20Farrugia Augustin JOptimized integrity verification procedures
US20070234323A1 (en)*2006-02-162007-10-04Franaszek Peter ALearning and cache management in software defined contexts
US20070234409A1 (en)*2006-03-312007-10-04Ori EisenSystems and methods for detection of session tampering and fraud prevention
US20070265975A1 (en)*2006-05-092007-11-15Farrugia Augustin JDetermining validity of subscription to use digital content
US20080018927A1 (en)*2006-07-212008-01-24Research In Motion LimitedMethod and system for providing a honeypot mode for an electronic device
US20080059828A1 (en)*2006-09-042008-03-06Infineon Technologies AgDetermining Execution Times of Commands
US20080155561A1 (en)*2006-12-222008-06-26Sap AgDevelopment environment for groupware integration with enterprise applications
US20080184239A1 (en)*2007-01-302008-07-31Microsoft CorporationMulti-threaded detection of a game software debugger
US20080271001A1 (en)*2006-09-112008-10-30Yo NonomuraMethod of generating program, information processing device and microcomputer
US20080288921A1 (en)*2007-05-142008-11-20Microsoft CorporationTransformations for Software Obfuscation and Individualization
US20080289045A1 (en)*2007-05-172008-11-20Thomas Michael FryerMethod and device for encoding software to prevent reverse engineering, tampering or modifying software code, and masking the logical function of software execution
US20080295174A1 (en)*2007-03-052008-11-27Andrea Robinson FahmyMethod and System for Preventing Unauthorized Access and Distribution of Digital Data
US20090037213A1 (en)*2004-03-022009-02-05Ori EisenMethod and system for identifying users and detecting fraud by use of the internet
US20090083184A1 (en)*2007-09-262009-03-26Ori EisenMethods and Apparatus for Detecting Fraud with Time Based Computer Tags
US20090249289A1 (en)*2008-03-282009-10-01Microsoft CorporationDetecting memory errors using write integrity testing
WO2009108245A3 (en)*2007-12-212009-10-22University Of Virginia Patent FoundationSystem, method and computer program product for protecting software via continuous anti-t ampering and obfuscation transforms
US7640583B1 (en)*2005-04-012009-12-29Microsoft CorporationMethod and system for protecting anti-malware programs
US20100004965A1 (en)*2008-07-012010-01-07Ori EisenSystems and methods of sharing information through a tagless device consortium
US20100058303A1 (en)*2008-09-022010-03-04Apple Inc.System and method for conditional expansion obfuscation
US20100095376A1 (en)*2008-03-072010-04-15Rodriguez Tony FSoftware watermarking
US20100107245A1 (en)*2008-10-292010-04-29Microsoft CorporationTamper-tolerant programs
US20100115260A1 (en)*2008-11-052010-05-06Microsoft CorporationUniversal secure token for obfuscation and tamper resistance
US20100132047A1 (en)*2008-11-242010-05-27Honeywell International Inc.Systems and methods for tamper resistant memory devices
WO2010062437A1 (en)*2008-09-132010-06-03The Trustees Of Columbia University In The City Of New YorkMethods, media, and systems for detecting attack on a digital processing device
US20100180346A1 (en)*2007-01-182010-07-15Nicolson Kenneth AlexanderObfuscation assisting aparatus
US20100257514A1 (en)*2009-04-032010-10-07Samsung Electronics Co., Ltd.Effective mapping of code sections to the same section of secondary memory to improve the security of computing systems
US7841009B1 (en)*2004-07-092010-11-23Angel Secure NetworksSystem and method for defending against reverse engineering of software, firmware and hardware
US20100332759A1 (en)*2008-02-112010-12-30Nxp B.V.Method of program obfuscation and processing device for executing obfuscated programs
US20110047315A1 (en)*2009-08-242011-02-24De Dinechin ChristopheVirtualization of real-time clock
US20110082768A1 (en)*2004-03-022011-04-07The 41St Parameter, Inc.Method and System for Identifying Users and Detecting Fraud by Use of the Internet
US20110131389A1 (en)*2008-07-242011-06-02Nagravision SaMethod for updating data in memories using a memory management unit
US20110145921A1 (en)*2009-12-162011-06-16Mcafee, Inc.Obfuscated malware detection
US20110231824A1 (en)*2010-03-162011-09-22Microsoft CorporationLow-level code rewriter verification
CN102222196A (en)*2010-04-162011-10-19汤姆森特许公司Method, device and computer program support for verification of checksums for self-modified computer code
US20110302566A1 (en)*2010-06-032011-12-08International Business Machines CorporationFixing security vulnerability in a source code
US8112636B1 (en)*2007-11-062012-02-07Lockheed Martin CorporationProtection of code or data from exposure by use of code injection service
US8117587B1 (en)*2008-06-032012-02-14Richard Paul TestardiMicrocontroller-resident software development environment supporting application-level asynchronous event handling, interactive debugging and pin variables for embedded systems
US20120079462A1 (en)*2010-09-242012-03-29SoftKrypt LLCSystems and methods of source software code obfuscation
US20120110349A1 (en)*2009-02-242012-05-03Fabrice DesclauxMethod for obfuscating a computer program
US20120204039A1 (en)*2011-02-092012-08-09Apple Inc.Counteracting memory tracing on computing systems by code obfuscation
KR20120094481A (en)*2009-10-082012-08-24어데토 캐나다 코포레이션A system and method for aggressive self-modification in dynamic function call systems
US20120260106A1 (en)*2011-04-072012-10-11Apple Inc.System and method for binary layout randomization
US20120284688A1 (en)*2011-05-032012-11-08Apple Inc.System and method for blurring instructions and data via binary obfuscation
US20130097431A1 (en)*2011-10-182013-04-18Paul Marion HriljacSystems and methods of source software code modification
US8490195B1 (en)*2008-12-192013-07-16Symantec CorporationMethod and apparatus for behavioral detection of malware in a computer system
US8504984B1 (en)*2009-05-292013-08-06Google Inc.Modifying grammars to correct programming language statements
US8533836B2 (en)2012-01-132013-09-10Accessdata Group, LlcIdentifying software execution behavior
US8701181B2 (en)*2007-11-092014-04-15International Business Machines CorporationMethods and systems for preventing security breaches
US8756435B2 (en)2012-03-022014-06-17Apple Inc.Obfuscation of control flow of software
CN104169931A (en)*2011-12-132014-11-26凡瑞斯公司 Coordinated watermarking
US8930717B2 (en)2011-03-012015-01-06Angel Secure Networks, Inc.Secure processing module and method for making the same
CN104318134A (en)*2014-11-052015-01-28北京深思数盾科技有限公司Data protection method
US9058482B2 (en)2011-03-012015-06-16Angel Secure Networks, Inc.Controlling user access to electronic resources without password
US9111072B1 (en)*2011-08-232015-08-18Tectonic Labs, LLCAnti-reverse engineering unified process
US9112850B1 (en)2009-03-252015-08-18The 41St Parameter, Inc.Systems and methods of sharing information through a tag-based consortium
US9117094B2 (en)2008-10-292015-08-25Microsoft Technology Licensing, LlcData location obfuscation
US9116765B2 (en)2011-10-202015-08-25Apple Inc.System and method for obfuscating data using instructions as a source of pseudorandom values
EP2913773A1 (en)*2014-02-272015-09-02Thomson LicensingRun-time Continuous Address Space Layout Randomization of flattened Control Flow Graph
US9270660B2 (en)2012-11-252016-02-23Angel Secure Networks, Inc.System and method for using a separate device to facilitate authentication
CN106104553A (en)*2014-03-112016-11-09西门子公司For detecting the equipment distorted and the method for program code
US9521551B2 (en)2012-03-222016-12-13The 41St Parameter, Inc.Methods and systems for persistent cross-application mobile device identification
US9633201B1 (en)2012-03-012017-04-25The 41St Parameter, Inc.Methods and systems for fraud containment
US20170169229A1 (en)*2015-12-102017-06-15Sap SeVulnerability analysis of software components
US9703983B2 (en)2005-12-162017-07-11The 41St Parameter, Inc.Methods and apparatus for securely displaying digital images
US9754256B2 (en)2010-10-192017-09-05The 41St Parameter, Inc.Variable risk engine
US9762560B2 (en)2014-11-252017-09-12Aclara Technologies LlcMethod for generating cryptographic “one-time pads” and keys for secure network communications
US9767284B2 (en)2012-09-142017-09-19The Research Foundation For The State University Of New YorkContinuous run-time validation of program execution: a practical approach
US9767271B2 (en)2010-07-152017-09-19The Research Foundation For The State University Of New YorkSystem and method for validating program execution at run-time
CN107480479A (en)*2017-08-152017-12-15北京奇虎科技有限公司Reinforcement means and device, computing device, the computer-readable storage medium of application program
US9858440B1 (en)*2014-05-232018-01-02Shape Security, Inc.Encoding of sensitive data
CN107580765A (en)*2015-01-272018-01-12艾锐势有限责任公司 Obfuscation for protecting streaming and other data streams
US9917850B2 (en)2016-03-032018-03-13Shape Security, Inc.Deterministic reproduction of client/server computer state or output sent to one or more client computers
US20180096139A1 (en)*2015-05-252018-04-05Huawei International Pte. Ltd.Method and system for defense against return oriented programming (rop) based attacks
US9954893B1 (en)2014-09-232018-04-24Shape Security, Inc.Techniques for combating man-in-the-browser attacks
US9973519B2 (en)2013-03-152018-05-15Shape Security, Inc.Protecting a server computer by detecting the identity of a browser on a client computer
US9986058B2 (en)2015-05-212018-05-29Shape Security, Inc.Security systems for mitigating attacks from a headless browser executing on a client computer
US9990631B2 (en)2012-11-142018-06-05The 41St Parameter, Inc.Systems and methods of global identification
US10091312B1 (en)2014-10-142018-10-02The 41St Parameter, Inc.Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups
CN108700864A (en)*2016-01-112018-10-23西门子股份公司 Program Randomization for Cyber-Attack Resilience Control in Programmable Logic Controllers
US10129289B1 (en)2016-03-112018-11-13Shape Security, Inc.Mitigating attacks on server computers by enforcing platform policies on client computers
US10187408B1 (en)2014-04-172019-01-22Shape Security, Inc.Detecting attacks against a server computer based on characterizing user interactions with the client computing device
US10212130B1 (en)2015-11-162019-02-19Shape Security, Inc.Browser extension firewall
US10212137B1 (en)2014-01-212019-02-19Shape Security, Inc.Blind hash compression
US10216488B1 (en)2016-03-142019-02-26Shape Security, Inc.Intercepting and injecting calls into operations and objects
US10230718B2 (en)2015-07-072019-03-12Shape Security, Inc.Split serving of computer code
US10298599B1 (en)2014-09-192019-05-21Shape Security, Inc.Systems for detecting a headless browser executing on a client computer
US10326790B2 (en)2016-02-122019-06-18Shape Security, Inc.Reverse proxy computer: deploying countermeasures in response to detecting an autonomous browser executing on a client computer
US10375026B2 (en)2015-10-282019-08-06Shape Security, Inc.Web transaction status tracking
US10417637B2 (en)2012-08-022019-09-17The 41St Parameter, Inc.Systems and methods for accessing records via derivative locators
US10453066B2 (en)2003-07-012019-10-22The 41St Parameter, Inc.Keystroke analysis
US10482262B2 (en)*2014-12-192019-11-19International Business Machines CorporationStatic analysis based on abstract program representations
US10489583B2 (en)*2015-05-202019-11-26Alibaba Group Holding LimitedDetecting malicious files
US10567363B1 (en)2016-03-032020-02-18Shape Security, Inc.Deterministic reproduction of system state using seeded pseudo-random number generators
US10567419B2 (en)2015-07-062020-02-18Shape Security, Inc.Asymmetrical challenges for web security
CN111723345A (en)*2020-05-092020-09-29中国人民解放军战略支援部队信息工程大学 Control flow obfuscation method and system based on callback function
US10834101B2 (en)2016-03-092020-11-10Shape Security, Inc.Applying bytecode obfuscation techniques to programs written in an interpreted language
US10855696B2 (en)2016-03-022020-12-01Shape Security, Inc.Variable runtime transpilation
WO2020240246A1 (en)*2019-05-292020-12-03Commissariat A L 'energie Atomique Et Aux Energies AlternativesA computer-implemented method for obfuscating a program code
US10902327B1 (en)2013-08-302021-01-26The 41St Parameter, Inc.System and method for device identification and uniqueness
US11080042B2 (en)2014-11-062021-08-03Intertrust Technologies CorporationSecure application distribution systems and methods
US11089000B1 (en)*2020-02-112021-08-10International Business Machines CorporationAutomated source code log generation
US11164206B2 (en)*2018-11-162021-11-02Comenity LlcAutomatically aggregating, evaluating, and providing a contextually relevant offer
US20220012346A1 (en)*2013-09-132022-01-13Vmware, Inc.Risk assessment for managed client devices
US11301585B2 (en)2005-12-162022-04-12The 41St Parameter, Inc.Methods and apparatus for securely displaying digital images
US11314838B2 (en)2011-11-152022-04-26Tapad, Inc.System and method for analyzing user device information
US11349816B2 (en)2016-12-022022-05-31F5, Inc.Obfuscating source code sent, from a server computer, to a browser on a client computer
EP4044051A1 (en)*2021-02-112022-08-17Siemens AktiengesellschaftRandomization of a binary program code
US11741196B2 (en)2018-11-152023-08-29The Research Foundation For The State University Of New YorkDetecting and preventing exploits of software vulnerability using instruction tags
US11741197B1 (en)2019-10-152023-08-29Shape Security, Inc.Obfuscating programs using different instruction set architectures
EP4332800A1 (en)*2022-09-012024-03-06Irdeto B.V.Method and apparatus for increasing the security of software code through execution path diversity
US20240248967A1 (en)*2023-01-202024-07-25Dell Products L.P.System and solution to obfuscate and prevent the pattern analysis of java archives

Families Citing this family (559)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7644282B2 (en)1998-05-282010-01-05Verance CorporationPre-processed information embedding system
US6643648B1 (en)*1999-06-302003-11-04Raf Technology, Inc.Secure, limited-access database system and method
US7770016B2 (en)*1999-07-292010-08-03Intertrust Technologies CorporationSystems and methods for watermarking software and other media
US7406603B1 (en)*1999-08-312008-07-29Intertrust Technologies Corp.Data protection systems and methods
US7757097B2 (en)*1999-09-032010-07-13Purdue Research FoundationMethod and system for tamperproofing software
US7287166B1 (en)*1999-09-032007-10-23Purdue Research FoundationGuards for application in software tamperproofing
US7231327B1 (en)*1999-12-032007-06-12Digital SandboxMethod and apparatus for risk management
US6737957B1 (en)2000-02-162004-05-18Verance CorporationRemote control signaling using audio watermarks
US7054443B1 (en)2000-03-272006-05-30Microsoft CorporationSystem and method for protecting digital goods using random and automatic code obfuscation
US7080257B1 (en)*2000-03-272006-07-18Microsoft CorporationProtecting digital goods using oblivious checking
WO2001086372A2 (en)*2000-05-122001-11-15Xtreamlok Pty. Ltd.Information security method and system
EP1243998B1 (en)*2001-03-212017-04-19Excalibur IP, LLCA technique for license management and online software license enforcement
US7530076B2 (en)*2001-03-232009-05-05S2 Technologies, Inc.Dynamic interception of calls by a target device
JP2004532456A (en)2001-03-232004-10-21エス2・テクノロジーズ・インコーポレイテッド Development and test systems and methods
US7581103B2 (en)2001-06-132009-08-25Intertrust Technologies CorporationSoftware self-checking systems and methods
US7076785B2 (en)2001-08-152006-07-11Microsoft CorporationLazy loading with code conversion
US20030149887A1 (en)*2002-02-012003-08-07Satyendra YadavApplication-specific network intrusion detection
US8769517B2 (en)*2002-03-152014-07-01International Business Machines CorporationGenerating a common symbol table for symbols of independent applications
US7228426B2 (en)*2002-04-032007-06-05Microsoft CorporationIntegrity ordainment and ascertainment of computer-executable instructions with consideration for execution context
US7386618B2 (en)*2002-05-092008-06-10Matsushita Electric Industrial Co., Ltd.Distribution system, distribution apparatus, and reception apparatus for distributing contents having usage expiry
US7383443B2 (en)*2002-06-272008-06-03Microsoft CorporationSystem and method for obfuscating code using instruction replacement scheme
US7493607B2 (en)2002-07-092009-02-17Bluerisc Inc.Statically speculative compilation and execution
US6889231B1 (en)*2002-08-012005-05-03Oracle International CorporationAsynchronous information sharing system
US7613741B2 (en)*2002-08-012009-11-03Oracle International CorporationUtilizing rules in a distributed information sharing system
US7127707B1 (en)*2002-10-102006-10-24Microsoft CorporationIntellisense in project upgrade
JP2006504986A (en)2002-10-152006-02-09ベランス・コーポレイション Media monitoring, management and information system
US7188241B2 (en)*2002-10-162007-03-06Pace AntipiracyProtecting software from unauthorized use by applying machine-dependent modifications to code modules
US7310594B1 (en)*2002-11-152007-12-18Xilinx, Inc.Method and system for designing a multiprocessor
US7051322B2 (en)*2002-12-062006-05-23@Stake, Inc.Software analysis framework
DE10260103A1 (en)*2002-12-192004-07-01Robert Bosch Gmbh Method and device for changing software in a control unit and corresponding control unit
US7272830B2 (en)*2003-01-162007-09-18Sun Microsystems, Inc.Ordering program data for loading on a device
US8121955B2 (en)*2003-01-162012-02-21Oracle America, Inc.Signing program data payload sequence in program loading
US7281244B2 (en)*2003-01-162007-10-09Sun Microsystems, Inc.Using a digital fingerprint to commit loaded data in a device
US7484095B2 (en)*2003-01-162009-01-27Sun Microsystems, Inc.System for communicating program data between a first device and a second device
US20040143739A1 (en)*2003-01-162004-07-22Sun Mircosystems, Inc., A Delaware CorporationRun time code integrity checks
US7584354B2 (en)*2003-01-312009-09-01Intel CorporationImplementing portable content protection to secure secrets
US7370319B2 (en)*2003-02-112008-05-06V.I. Laboratories, Inc.System and method for regulating execution of computer software
US8225290B2 (en)*2003-02-112012-07-17V. i. Laboratories, Inc.Systems and methods for regulating execution of computer software
US8510571B1 (en)*2003-03-242013-08-13Hoi ChangSystem and method for inserting security mechanisms into a software program
US7401208B2 (en)*2003-04-252008-07-15International Business Machines CorporationMethod and apparatus for randomizing instruction thread interleaving in a multi-thread processor
US7360062B2 (en)*2003-04-252008-04-15International Business Machines CorporationMethod and apparatus for selecting an instruction thread for processing in a multi-thread processor
DE10319435B4 (en)*2003-04-252018-07-26Whitecryption Corporation Method of processing data to protect a software program from being reconstructed
US7401207B2 (en)*2003-04-252008-07-15International Business Machines CorporationApparatus and method for adjusting instruction thread priority in a multi-thread processor
US7949877B2 (en)*2003-06-302011-05-24Realnetworks, Inc.Rights enforcement and usage reporting on a client device
US7328426B2 (en)2003-08-132008-02-05International Business Machines CorporationEditor with commands for automatically disabling and enabling program code portions
US8365193B2 (en)2003-08-142013-01-29Oracle International CorporationRecoverable asynchronous message driven processing in a multi-node system
GB2405958A (en)*2003-08-202005-03-16Macrovision Europ LtdCode obfuscation and controlling a processor by emulation
US7340734B1 (en)*2003-08-272008-03-04Nvidia CorporationMethod and apparatus to make code more difficult to reverse engineer
US7383539B2 (en)*2003-09-182008-06-03International Business Machines CorporationManaging breakpoints in a multi-threaded environment
US7395527B2 (en)2003-09-302008-07-01International Business Machines CorporationMethod and apparatus for counting instruction execution and data accesses
US7979911B2 (en)2003-10-082011-07-12Microsoft CorporationFirst computer process and second computer process proxy-executing code from third computer process on behalf of first process
US7788496B2 (en)2003-10-082010-08-31Microsoft CorporationFirst computer process and second computer process proxy-executing code on behalf thereof
US8103592B2 (en)*2003-10-082012-01-24Microsoft CorporationFirst computer process and second computer process proxy-executing code on behalf of first process
US8271803B2 (en)*2003-10-082012-09-18Microsoft CorporationAnti-debugging protection of binaries with proxy code execution
US20060239501A1 (en)2005-04-262006-10-26Verance CorporationSecurity enhancements of digital watermarks for multi-media content
US8381037B2 (en)2003-10-092013-02-19International Business Machines CorporationMethod and system for autonomic execution path selection in an application
US20050114850A1 (en)2003-10-292005-05-26Saurabh ChhedaEnergy-focused re-compilation of executables and hardware mechanisms based on compiler-architecture interaction and compiler-inserted control
US7631292B2 (en)*2003-11-052009-12-08Microsoft CorporationCode individualism and execution protection
US7996671B2 (en)2003-11-172011-08-09Bluerisc Inc.Security of program executables and microprocessors based on compiler-architecture interaction
US7415705B2 (en)*2004-01-142008-08-19International Business Machines CorporationAutonomic method and apparatus for hardware assist for patching code
US7895382B2 (en)2004-01-142011-02-22International Business Machines CorporationMethod and apparatus for qualifying collection of performance monitoring events by types of interrupt when interrupt occurs
US8607209B2 (en)2004-02-042013-12-10Bluerisc Inc.Energy-focused compiler-assisted branch prediction
KR100597401B1 (en)*2004-02-062006-07-06삼성전자주식회사 DDR management method and contents thereof for content copyright protection
FR2866451B1 (en)*2004-02-182008-02-29Cit Alcatel METHOD AND DEVICE FOR TRANSFORMING AN OPERATING SYSTEM FOR THE PROTECTION OF A COMPUTER PROGRAM AGAINST EXTERNAL INTRUSIONS
US7383583B2 (en)*2004-03-052008-06-03Microsoft CorporationStatic and run-time anti-disassembly and anti-debugging
ATE505766T1 (en)*2004-04-292011-04-15Nxp Bv INTRUSION DETECTION DURING PROGRAM EXECUTION IN A COMPUTER
US7330910B2 (en)*2004-05-202008-02-12International Business Machines CorporationFencing of resources allocated to non-cooperative client computers
FR2874440B1 (en)*2004-08-172008-04-25Oberthur Card Syst Sa METHOD AND DEVICE FOR PROCESSING DATA
US7661102B2 (en)*2004-08-202010-02-09Smith Micro Software, Inc.Method for reducing binary image update package sizes
US8312431B1 (en)*2004-09-172012-11-13Oracle America, Inc.System and computer readable medium for verifying access to signed ELF objects
US7725887B2 (en)*2004-12-222010-05-25Intel CorporationMethod and system for reducing program code size
EP1674966B1 (en)*2004-12-222009-03-11Telefonaktiebolaget L M Ericsson (Publ)Watermarking computer program code
JP4183192B2 (en)*2004-12-282008-11-19インターナショナル・ビジネス・マシーンズ・コーポレーション Application program development support method, program, and information processing apparatus
US7587616B2 (en)*2005-02-252009-09-08Microsoft CorporationSystem and method of iterative code obfuscation
US8056138B2 (en)*2005-02-262011-11-08International Business Machines CorporationSystem, method, and service for detecting improper manipulation of an application
US8832458B2 (en)*2005-03-222014-09-09Seagate Technology LlcData transcription in a data storage device
US20090217008A1 (en)*2005-04-212009-08-27Taichi SatoProgram conversion device, and secret keeping program
TWI306215B (en)*2005-04-292009-02-11Ind Tech Res InstMethod and corresponding apparatus for compiling high-level languages into specific processor architectures
US20060259903A1 (en)*2005-05-122006-11-16Xerox CorporationMethod for creating unique identification for copies of executable code and management thereof
US20060259900A1 (en)*2005-05-122006-11-16Xerox CorporationMethod for creating unique identification for copies of executable code and management thereof
US7886198B2 (en)*2005-05-162011-02-08Texas Instruments IncorporatedMethod and system of identifying overlays used by a program
US7716645B2 (en)*2005-06-102010-05-11International Business Machines CorporationUsing atomic sets of memory locations
EP1894101A1 (en)*2005-06-232008-03-05Bayerische Motorenwerke AktiengesellschaftMethod and apparatus for monitoring unauthorized access to the memory of an arithmetic unit, especially in a motor vehicle
US8020004B2 (en)2005-07-012011-09-13Verance CorporationForensic marking using a common customization function
US8781967B2 (en)2005-07-072014-07-15Verance CorporationWatermarking in an encrypted domain
GB0514492D0 (en)*2005-07-142005-08-17Ntnu Technology Transfer AsSecure media streaming
WO2007017856A1 (en)*2005-08-062007-02-15Secured Dimensions Ltd.Method for preventing software reverse engineering, unauthorized modification, and runtime data interception
US7620987B2 (en)*2005-08-122009-11-17Microsoft CorporationObfuscating computer code to prevent an attack
US8381198B2 (en)*2005-08-152013-02-19Sony Ericsson Mobile Communications AbSystems, methods and computer program products for safety checking executable application programs in a module
WO2007028226A1 (en)*2005-09-092007-03-15Ibm Canada Limited - Ibm Canada LimiteeMethod and system for state machine translation
DE102005045852A1 (en)*2005-09-262007-04-05Siemens Ag Method and system for protecting source code
EP1932275B1 (en)*2005-10-062016-11-23NDS LimitedSecurity device and building block functions
US8005821B2 (en)*2005-10-062011-08-23Microsoft CorporationNoise in secure function evaluation
EP1943607B1 (en)*2005-10-172015-04-01Nytell Software LLCProgram executable image encryption
EP1943603A2 (en)2005-10-182008-07-16Intertrust Technologies CorporationMethods for digital rights management
US20070097969A1 (en)*2005-11-022007-05-03Alain RegnierApproach for discovering network resources
US7769707B2 (en)2005-11-302010-08-03Microsoft CorporationData diameter privacy policies
US7818335B2 (en)*2005-12-222010-10-19Microsoft CorporationSelective privacy guarantees
US20070150437A1 (en)*2005-12-222007-06-28Microsoft CorporationProtection against timing and resource consumption attacks
US7627862B2 (en)*2006-01-132009-12-01Microsoft CorporationTyped intermediate language support for languages with multiple inheritance
US7975260B1 (en)*2006-01-272011-07-05Symantec CorporationMethod of direct access and manipulation of debuggee memory from debugger
GB0601849D0 (en)*2006-01-302006-03-08Ttp Communications LtdMethod of maintaining software integrity
US8510596B1 (en)2006-02-092013-08-13Virsec Systems, Inc.System and methods for run time detection and correction of memory corruption
US8694797B2 (en)*2006-02-142014-04-08Lenovo (Sinapore) Pte LtdMethod for preventing malicious software from execution within a computer system
WO2007096935A1 (en)*2006-02-202007-08-30Fujitsu LimitedProgram analysis method, program analysis device, and program analysis program
JP4938766B2 (en)*2006-04-282012-05-23パナソニック株式会社 Program obfuscation system, program obfuscation apparatus, and program obfuscation method
ATE426966T1 (en)*2006-05-262009-04-15Sap Ag METHOD AND DEVICE FOR SECURE PROCESSING OF A COMMAND BY A MOBILE AGENT IN A NETWORK.
US7818799B2 (en)*2006-05-302010-10-19Microsoft CorporationTamper response mechanism
US8079019B2 (en)2007-11-212011-12-13Replay Solutions, Inc.Advancing and rewinding a replayed program execution
US8490191B2 (en)*2006-06-212013-07-16Wibu-Systems AgMethod and system for intrusion detection
US7747078B2 (en)*2006-07-062010-06-29Intel CorporationSubstring detection system and method
EP1881404A1 (en)*2006-07-202008-01-23GemplusMethod for dynamic protection of data during intermediate language software execution in a digital device
US8949790B2 (en)*2006-08-302015-02-03International Business Machines CorporationDebugging visual and embedded programs
JP4048382B1 (en)*2006-09-012008-02-20富士ゼロックス株式会社 Information processing system and program
US20090249492A1 (en)*2006-09-212009-10-01Hans Martin Boesgaard SorensenFabrication of computer executable program files from source code
US8001607B2 (en)*2006-09-272011-08-16Direct Computer Resources, Inc.System and method for obfuscation of data across an enterprise
US8504999B2 (en)*2006-10-052013-08-06Palo Alto Research Center IncorporatedSystem and method for transferring code to a data producer
US8689193B2 (en)*2006-11-012014-04-01At&T Intellectual Property Ii, L.P.Method and apparatus for protecting a software application against a virus
US20080126766A1 (en)*2006-11-032008-05-29Saurabh ChhedaSecuring microprocessors against information leakage and physical tampering
US7680877B2 (en)*2006-12-182010-03-16Ricoh Company, Ltd.Implementing a web service application on a device with multiple threads
US7987278B2 (en)*2006-12-182011-07-26Ricoh Company, Ltd.Web services device profile on a multi-service device: dynamic addition of services
US7904917B2 (en)*2006-12-182011-03-08Ricoh Company, Ltd.Processing fast and slow SOAP requests differently in a web service application of a multi-functional peripheral
US8127306B2 (en)2006-12-182012-02-28Ricoh Company, Ltd.Integrating eventing in a web service application of a multi-functional peripheral
US7873647B2 (en)*2006-12-182011-01-18Ricoh Company, Ltd.Web services device profile on a multi-service device: device and facility manager
US20080148061A1 (en)*2006-12-192008-06-19Hongxia JinMethod for effective tamper resistance
US8321546B2 (en)*2007-01-102012-11-27Ricoh Company, Ltd.Integrating discovery functionality within a device and facility manager
US8112766B2 (en)*2006-12-212012-02-07Ricoh Company, Ltd.Multi-threaded device and facility manager
US9645915B2 (en)2006-12-272017-05-09The Mathworks, Inc.Continuous evaluation of program code and saving state information associated with program code
FR2911971B1 (en)*2007-01-262009-04-24Commissariat Energie Atomique METHOD AND SYSTEM FOR VERIFYING PROPERTIES OF A COMPUTER PROGRAM
US8136091B2 (en)*2007-01-312012-03-13Microsoft CorporationArchitectural support for software-based protection
US20080184041A1 (en)*2007-01-312008-07-31Microsoft CorporationGraph-Based Tamper Resistance Modeling For Software Protection
WO2008097202A1 (en)*2007-02-092008-08-14Agency For Science, Technology And ResearchA method and system for tamper proofing a system of interconnected electronic devices
US8613080B2 (en)2007-02-162013-12-17Veracode, Inc.Assessment and analysis of software security flaws in virtual machines
US20080209559A1 (en)2007-02-222008-08-28Aladdin Knowledge SystemsMethod for detecting that a protected software program is cracked
US20080209558A1 (en)2007-02-222008-08-28Aladdin Knowledge SystemsSelf-defensive protected software with suspended latent license enforcement
WO2008101340A1 (en)*2007-02-232008-08-28Cloakware CorporationSystem and method for interlocking to protect software-mediated program and device behaviours
US8752032B2 (en)2007-02-232014-06-10Irdeto Canada CorporationSystem and method of interlocking to protect software-mediated program and device behaviours
US8141049B2 (en)*2007-03-142012-03-20Nec Laboratories America, Inc.System and method for scalable flow and context-sensitive pointer alias analysis
US7900259B2 (en)*2007-03-162011-03-01PrevariPredictive assessment of network risks
US8024707B2 (en)*2007-03-232011-09-20Oracle International CorporationFacilitating self-remediation for software applications
US20080243534A1 (en)*2007-03-262008-10-02Serdar MutluIdentity verification method
US8392910B1 (en)*2007-04-102013-03-05AT & T Intellectual Property II, LLPStochastic method for program security using deferred linking
US9027025B2 (en)2007-04-172015-05-05Oracle International CorporationReal-time database exception monitoring tool using instance eviction data
JP2010526513A (en)*2007-05-082010-07-29トムソン ライセンシング Method and apparatus for adjusting decryption key
US7984288B2 (en)*2007-05-212011-07-19Sercomm CorporationSoftware protection apparatus and protection method thereof
EP1998267A1 (en)*2007-05-292008-12-03Sercomm CorporationSoftware protection apparatus and protection method thereof
US8839218B2 (en)*2007-06-042014-09-16International Business Machines CorporationDiagnosing alias violations in memory access commands in source code
US8930927B2 (en)*2007-06-042015-01-06International Business Machines CorporationDiagnosing aliasing violations in a partial program view
US8239876B2 (en)*2007-06-122012-08-07Ricoh Company, Ltd.Efficient web services application status self-control system on image-forming device
EP2009572B1 (en)*2007-06-292010-01-27Telefonaktiebolaget LM Ericsson (publ)Obfuscating execution traces of computer program code
US8037459B2 (en)*2007-07-312011-10-11International Business Machines CorporationRecovery from nested exceptions in an instrumentation routine
US8276117B2 (en)*2007-08-032012-09-25International Business Machines CorporationDisplaying and refactoring programs that include database statements
US8473915B2 (en)*2007-08-032013-06-25International Business Machines CorporationCoverage analysis tool for testing database-aware software applications
US8763115B2 (en)*2007-08-082014-06-24Vmware, Inc.Impeding progress of malicious guest software
US20090049425A1 (en)*2007-08-142009-02-19Aladdin Knowledge Systems Ltd.Code Obfuscation By Reference Linking
US8601451B2 (en)*2007-08-292013-12-03Mcafee, Inc.System, method, and computer program product for determining whether code is unwanted based on the decompilation thereof
US8160962B2 (en)*2007-09-202012-04-17Uniloc Luxembourg S.A.Installing protected software product using unprotected installation image
US8453164B2 (en)*2007-09-272013-05-28Ricoh Company, Ltd.Method and apparatus for reduction of event notification within a web service application of a multi-functional peripheral
US20090099926A1 (en)*2007-10-102009-04-16Orcon CorporationMethods Of Improving Long Term Business Arrangements
US8141162B2 (en)*2007-10-252012-03-20International Business Machines CorporationMethod and system for hiding information in the instruction processing pipeline
US8272025B1 (en)*2007-12-182012-09-18Lockheed Martin CorporationPolicy deconfliction
EP2232763A4 (en)2007-12-212012-08-08Cocoon Data Holdings Ltd SYSTEM AND METHOD FOR SECURING DATA
US8321840B2 (en)*2007-12-272012-11-27Intel CorporationSoftware flow tracking using multiple threads
US8584102B2 (en)*2007-12-272013-11-12Microsoft CorporationCreating and using deltas to modify existing computer code
TWI462011B (en)*2007-12-282014-11-21Accton Technology CorpA thread group management method for a process
US8352703B2 (en)2008-02-202013-01-08Infineon Technologies AgAddress mapping of program code and data in memory
US8935687B2 (en)*2008-02-292015-01-13Red Hat, Inc.Incrementally updating a software appliance
US8176337B2 (en)*2008-03-122012-05-08Apple Inc.Computer object code obfuscation using boot installation
US8108931B1 (en)*2008-03-312012-01-31Symantec CorporationMethod and apparatus for identifying invariants to detect software tampering
US8146064B2 (en)*2008-04-042012-03-27International Business Machines CorporationDynamically controlling a prefetching range of a software controlled cache
US8239841B2 (en)2008-04-042012-08-07International Business Machines CorporationPrefetching irregular data references for software controlled caches
US8055849B2 (en)*2008-04-042011-11-08International Business Machines CorporationReducing cache pollution of a software controlled cache
GB2459741B (en)*2008-05-082012-05-02Icera IncDebugging system and method
US8271424B2 (en)*2008-05-152012-09-18International Business Machines CorporationPrivacy and confidentiality preserving reporting of URLs
CN102047220B (en)*2008-05-232014-12-17爱迪德加拿大公司System and method for generating white-box implementations of software applications
US8819839B2 (en)*2008-05-242014-08-26Via Technologies, Inc.Microprocessor having a secure execution mode with provisions for monitoring, indicating, and managing security levels
US8615799B2 (en)*2008-05-242013-12-24Via Technologies, Inc.Microprocessor having secure non-volatile storage access
US9092243B2 (en)*2008-05-282015-07-28Red Hat, Inc.Managing a software appliance
US8868721B2 (en)2008-05-292014-10-21Red Hat, Inc.Software appliance management using broadcast data
US10657466B2 (en)2008-05-292020-05-19Red Hat, Inc.Building custom appliances in a cloud-based network
US8943496B2 (en)*2008-05-302015-01-27Red Hat, Inc.Providing a hosted appliance and migrating the appliance to an on-premise environment
US9032367B2 (en)2008-05-302015-05-12Red Hat, Inc.Providing a demo appliance and migrating the demo appliance to a production appliance
US9117070B2 (en)*2008-05-302015-08-25Nxp, B.V.Method for adapting and executing a computer program and computer architecture therefore
US8813050B2 (en)*2008-06-032014-08-19Isight Partners, Inc.Electronic crime detection and tracking
EP2131299B1 (en)*2008-06-062013-03-13ITI Scotland LimitedProtecting software programs
US8407523B2 (en)*2008-06-062013-03-26Iti Scotland LimitedMethod for protecting software programs
GB0810695D0 (en)2008-06-122008-07-16Metaforic LtdAnti-tampering MMU defence
JP5151722B2 (en)*2008-06-202013-02-27ソニー株式会社 Data processing apparatus and method, and program
US8572577B2 (en)*2008-06-202013-10-29International Business Machines CorporationMonitoring changes to data within a critical section of a threaded program
US8522015B2 (en)*2008-06-272013-08-27Microsoft CorporationAuthentication of binaries in memory with proxy code execution
US9477570B2 (en)2008-08-262016-10-25Red Hat, Inc.Monitoring software provisioning
CN101661425B (en)2008-08-262012-03-21国际商业机器公司Test coverage analytical method and device
US9122797B2 (en)*2008-09-302015-09-01Honeywell International Inc.Deterministic remote interface unit emulator
CN101727345B (en)*2008-10-292013-09-04国际商业机器公司Method and system for controlling loading state of dynamic link library DLL
US8874928B2 (en)*2008-10-312014-10-28Apple Inc.System and method for obfuscating constants in a computer program
US8447977B2 (en)*2008-12-092013-05-21Canon Kabushiki KaishaAuthenticating a device with a server over a network
US8271958B2 (en)*2008-12-122012-09-18Microsoft CorporationRemapping debuggable code
US8387026B1 (en)*2008-12-242013-02-26Google Inc.Compile-time feedback-directed optimizations using estimated edge profiles from hardware-event sampling
US8930928B2 (en)*2008-12-312015-01-06Opera Software AsaMethod for modifying the assembly output of a compiler
US9128895B2 (en)2009-02-192015-09-08Oracle International CorporationIntelligent flood control management
JP4905480B2 (en)*2009-02-202012-03-28富士ゼロックス株式会社 Program obfuscation program and program obfuscation device
FR2942559B1 (en)*2009-02-242016-05-20European Aeronautic Defence And Space Company - Eads France METHOD FOR PROTECTING THE SOURCE CODE OF A COMPUTER PROGRAM.
US9805196B2 (en)2009-02-272017-10-31Microsoft Technology Licensing, LlcTrusted entity based anti-cheating mechanism
EP2234031A1 (en)*2009-03-242010-09-29SafeNet, Inc.Obfuscation
US8352922B2 (en)*2009-03-312013-01-08International Business Machines CorporationDate and time simulation for time-sensitive applications
US8929303B2 (en)*2009-04-062015-01-06Samsung Electronics Co., Ltd.Control and data channels for advanced relay operation
US8612951B2 (en)*2009-04-212013-12-17Oracle International CorporationMethod of determining which computer program functions are changed by an arbitrary source code modification
US8434059B2 (en)*2009-05-012013-04-30Apple Inc.Systems, methods, and computer-readable media for fertilizing machine-executable code
US8589738B2 (en)*2009-05-052013-11-19Freescale Semiconductor, Inc.Program trace message generation for page crossing events for debug
US8438547B2 (en)*2009-05-052013-05-07Freescale Semiconductor, Inc.Address translation trace message generation for debug
US8341505B2 (en)*2009-05-082012-12-25Oracle America, Inc.Enforcing network bandwidth partitioning for virtual execution environments with direct access to network hardware
US8510723B2 (en)*2009-05-292013-08-13University Of MarylandBinary rewriting without relocation information
US8914903B1 (en)2009-06-032014-12-16Amdocs Software System LimitedSystem, method, and computer program for validating receipt of digital content by a client device
EP2261802A1 (en)*2009-06-102010-12-15ITI Scotland LimitedAutomated debugging system and method
US8423967B2 (en)*2009-07-012013-04-16International Business Machines CorporationAutomated level-based targeted test configuration
US9111098B2 (en)*2009-07-102015-08-18Certicom Corp.System and method for managing electronic assets
US9015690B2 (en)*2009-08-222015-04-21Advanced Micro Devices, Inc.Proactive loop fusion of non-adjacent loops with intervening control flow instructions
US20110060788A1 (en)*2009-09-042011-03-10ExactFactor, Ltd.System and method for automatically providing metadata elements on a web page or web site
US10698859B2 (en)2009-09-182020-06-30The Board Of Regents Of The University Of Texas SystemData multicasting with router replication and target instruction identification in a distributed multi-core processing architecture
JP5102823B2 (en)*2009-12-212012-12-19インターナショナル・ビジネス・マシーンズ・コーポレーション Test support apparatus, test apparatus, test support method, and computer program for optimizing test scenario so as to minimize total test time
US8645930B2 (en)*2010-01-042014-02-04Apple Inc.System and method for obfuscation by common function and common function prototype
US20110167407A1 (en)*2010-01-062011-07-07Apple Inc.System and method for software data reference obfuscation
US8494974B2 (en)*2010-01-182013-07-23iSIGHT Partners Inc.Targeted security implementation through security loss forecasting
US9165086B2 (en)2010-01-202015-10-20Oracle International CorporationHybrid binary XML storage model for efficient XML processing
EP2362314A1 (en)*2010-02-182011-08-31Thomson LicensingMethod and apparatus for verifying the integrity of software code during execution and apparatus for generating such software code
US9134977B2 (en)*2010-02-262015-09-15Red Hat, Inc.Compiler operation for handling conditional statements
CN102195930B (en)2010-03-022014-12-10华为技术有限公司Security access method among equipment and communication equipment
US9176845B2 (en)*2010-03-192015-11-03Red Hat, Inc.Use of compiler-introduced identifiers to improve debug information pertaining to user variables
EP2438511B1 (en)2010-03-222019-07-03LRDC Systems, LLCA method of identifying and protecting the integrity of a set of source data
US20110246962A1 (en)*2010-04-052011-10-06Microsoft CorporationState machine expressions in database operators
JP2011223281A (en)*2010-04-082011-11-04Sony CorpInformation processor, information processing system and information processing method, and program
US8949797B2 (en)2010-04-162015-02-03International Business Machines CorporationOptimizing performance of integrity monitoring
EP2388728A1 (en)*2010-05-172011-11-23Gemalto SASecurity token for securely executing an application on a host computer
EP2388730A1 (en)*2010-05-172011-11-23Nagravision S.A.Method for generating software code
US8863094B2 (en)2010-05-182014-10-14International Business Machines CorporationFramework for a software error inject tool
US8358745B2 (en)2011-02-092013-01-22Certicall, LlcRecording identity data to enable on demand services in a communications system
US8719797B2 (en)*2010-05-182014-05-06Blackberry LimitedSystem and method for debugging dynamically generated code of an application
KR20110128567A (en)*2010-05-242011-11-30삼성전자주식회사 Method of controlling an object included in the user interface and apparatus employing the method
US8504526B2 (en)2010-06-042013-08-06Commvault Systems, Inc.Failover systems and methods for performing backup operations
US11449394B2 (en)2010-06-042022-09-20Commvault Systems, Inc.Failover systems and methods for performing backup operations, including heterogeneous indexing and load balancing of backup and indexing resources
US8656363B2 (en)*2010-06-142014-02-18Apple Inc.System and method for entropy pool verification
US9984327B2 (en)*2010-06-172018-05-29Palo Alto Research Center IncorporatedSystem and method for parallel graph searching utilizing parallel edge partitioning
WO2011159309A1 (en)*2010-06-182011-12-22The Board Of Regents Of The University Of Texas SystemCombined branch target and predicate prediction
US8782435B1 (en)2010-07-152014-07-15The Research Foundation For The State University Of New YorkSystem and method for validating program execution at run-time using control flow signatures
AU2010358396B2 (en)*2010-07-262016-05-05Prysmian S.P.A.Apparatus and method for monitoring an electric power transmission system through partial discharges analysis
US8990785B2 (en)*2010-07-292015-03-24Robert DurandSystem and method for efficiently deploying massively diverse program instances to resist differential attacks
KR20120019941A (en)*2010-08-272012-03-07삼성전자주식회사Dynamic instrumentation method and appauatus thereof
US8650408B2 (en)2010-09-082014-02-11Xilinx, Inc.Protecting against differential power analysis attacks on decryption keys
US8832462B2 (en)*2010-09-082014-09-09Xilinx, Inc.Protecting against differential power analysis attacks on sensitive data
US8838978B2 (en)2010-09-162014-09-16Verance CorporationContent access management using extracted watermark information
JP5163720B2 (en)*2010-09-172013-03-13コニカミノルタビジネステクノロジーズ株式会社 Information processing apparatus, log recording method, and log recording program
US8458530B2 (en)2010-09-212013-06-04Oracle International CorporationContinuous system health indicator for managing computer system alerts
KR20120031756A (en)*2010-09-272012-04-04삼성전자주식회사Method and apparatus for compiling and executing application using virtualization in heterogeneous system using cpu and gpu
JP2012084071A (en)*2010-10-142012-04-26Toshiba CorpDigital content protection method, decryption method, reproducing device, memory medium and cryptographic device
US20120102474A1 (en)*2010-10-262012-04-26International Business Machines CorporationStatic analysis of client-server applications using framework independent specifications
CA2719653A1 (en)*2010-11-052011-01-18Ibm Canada Limited - Ibm Canada LimiteePartial inlining with software based restart
US9274976B2 (en)*2010-11-052016-03-01Apple Inc.Code tampering protection for insecure environments
TWI420339B (en)*2010-11-102013-12-21Ind Tech Res Inst Software authorization system and method
US9002876B2 (en)*2010-12-022015-04-07Sap SeInterpreted computer language to analyze business object data with defined relations
KR101216995B1 (en)*2010-12-032012-12-31충남대학교산학협력단A code encryption and decryption device against reverse engineering based on indexed table and the method thereof
EP2649523B1 (en)*2010-12-062020-06-17Google LLCMethod for compiling an intermediate code of an application
US8683452B1 (en)*2010-12-212014-03-25Emc CorporationDynamically obfuscated javascript
US9195810B2 (en)*2010-12-282015-11-24Microsoft Technology Licensing, LlcIdentifying factorable code
US8694548B2 (en)*2011-01-022014-04-08Cisco Technology, Inc.Defense-in-depth security for bytecode executables
US20120179898A1 (en)*2011-01-102012-07-12Apple Inc.System and method for enforcing software security through cpu statistics gathered using hardware features
EP2477110A1 (en)*2011-01-142012-07-18Wibu-Systems AGMethod for protecting an application program against reverse engineering and related computer program product
US8707053B2 (en)*2011-02-092014-04-22Apple Inc.Performing boolean logic operations using arithmetic operations by code obfuscation
US8726383B2 (en)*2011-02-142014-05-13Ca, Inc.Flow data for security intrusion detection
US8438644B2 (en)2011-03-072013-05-07Isight Partners, Inc.Information system security based on threat vectors
US8955142B2 (en)2011-03-212015-02-10Mocana CorporationSecure execution of unsecured apps on a device
US9473485B2 (en)2011-03-212016-10-18Blue Cedar Networks, Inc.Secure single sign-on for a group of wrapped applications on a computing device and runtime credential sharing
US9396325B2 (en)2011-03-212016-07-19Mocana CorporationProvisioning an app on a device and implementing a keystore
US8769305B2 (en)2011-03-212014-07-01Moncana CorporationSecure execution of unsecured apps on a device
US8812868B2 (en)*2011-03-212014-08-19Mocana CorporationSecure execution of unsecured apps on a device
EP2689376B1 (en)*2011-03-242020-12-23Irdeto B.V.System and method providing dependency networks throughout applications for attack resistance
JP5776927B2 (en)*2011-03-282015-09-09ソニー株式会社 Information processing apparatus and method, and program
US20120266249A1 (en)*2011-04-132012-10-18Safenet, Inc.Automatic Selection of Routines for Protection
FR2974207B1 (en)*2011-04-142013-05-24In Webo Technologies METHOD AND SYSTEM FOR SECURING A SOFTWARE
EP2515499B1 (en)*2011-04-212015-10-28Wibu-Systems AGMethod for generating a cryptographic key for a secure digital data object on the basis of the current components of a computer
US20130014267A1 (en)*2011-07-072013-01-10Farrugia Augustin JComputer protocol generation and obfuscation
JP5779434B2 (en)*2011-07-152015-09-16株式会社ソシオネクスト Security device and security system
US9298918B2 (en)2011-11-302016-03-29Elwha LlcTaint injection and tracking
US9798873B2 (en)*2011-08-042017-10-24Elwha LlcProcessor operable to ensure code integrity
US8751823B2 (en)*2011-08-012014-06-10Apple Inc.System and method for branch function based obfuscation
US9176739B2 (en)*2011-08-052015-11-03Cisco Technology, Inc.System and method for checking run-time consistency for sequentially and non-sequentially fetched instructions
US8661527B2 (en)2011-08-312014-02-25Kabushiki Kaisha ToshibaAuthenticator, authenticatee and authentication method
US8217945B1 (en)2011-09-022012-07-10Metric Insights, Inc.Social annotation of a single evolving visual representation of a changing dataset
US8631395B2 (en)*2011-09-022014-01-14Microsoft CorporationInter-procedural dead catch handler optimizations
US8752027B2 (en)*2011-09-142014-06-10Microsoft CorporationInjecting faults into program for testing software
JP5725359B2 (en)*2011-09-202015-05-27日本電気株式会社 Source code comparison device, source code comparison method, and source code comparison program
US8671397B2 (en)*2011-09-272014-03-11International Business Machines CorporationSelective data flow analysis of bounded regions of computer software applications
DE112012004301T5 (en)2011-10-122014-07-31International Business Machines Corporation Generating a predictive data structure
US8732690B1 (en)*2011-10-272014-05-20Crimson CorporationComputing device configured for installing an application
US20140317407A1 (en)*2011-10-312014-10-23Nec CorporationIncremental mac tag generation device, method, and program, and message authentication device
US8923548B2 (en)2011-11-032014-12-30Verance CorporationExtraction of embedded watermarks from a host content using a plurality of tentative watermarks
US8615104B2 (en)2011-11-032013-12-24Verance CorporationWatermark extraction based on tentative watermarks
US8682026B2 (en)2011-11-032014-03-25Verance CorporationEfficient extraction of embedded watermarks in the presence of host content distortions
US8806452B2 (en)*2011-11-102014-08-12International Business Machines CorporationTransformation of computer programs and eliminating errors
US8745403B2 (en)2011-11-232014-06-03Verance CorporationEnhanced content management based on watermark extraction records
KR20130060720A (en)*2011-11-302013-06-10한국전자통신연구원Apparatus and method for interpreting service goal for goal-driven semantic service discovery
US9081595B1 (en)*2011-12-062015-07-14The Mathworks, Inc.Displaying violated coding rules in source code
US9323902B2 (en)2011-12-132016-04-26Verance CorporationConditional access using embedded watermarks
US9286063B2 (en)2012-02-222016-03-15Veracode, Inc.Methods and systems for providing feedback and suggested programming methods
US10193927B2 (en)2012-02-272019-01-29University Of Virginia Patent FoundationMethod of instruction location randomization (ILR) and related system
US20130239192A1 (en)2012-03-092013-09-12RAPsphere, Inc.Method and apparatus for securing mobile applications
EP2831797B1 (en)*2012-03-302018-05-02Irdeto B.V.Securing accessible systems using dynamic data mangling
US8813240B1 (en)2012-05-302014-08-19Google Inc.Defensive techniques to increase computer security
US9015838B1 (en)*2012-05-302015-04-21Google Inc.Defensive techniques to increase computer security
EP2674891A1 (en)*2012-06-122013-12-18Thomson LicensingA method, a device and a computer program support for execution of encrypted computer code
US10409984B1 (en)2012-06-152019-09-10Square, Inc.Hierarchical data security measures for a mobile device
US20130347109A1 (en)*2012-06-212013-12-26Cisco Technology, Inc.Techniques for Detecting Program Modifications
US8819648B2 (en)*2012-07-202014-08-26International Business Machines CorporationControl flow management for execution of dynamically translated non-native code in a virtual hosting environment
US9213841B2 (en)*2012-07-242015-12-15Google Inc.Method, manufacture, and apparatus for secure debug and crash logging of obfuscated libraries
US9582332B2 (en)*2012-08-312017-02-28Intel CorporationEnabling a cloud to effectively assign workloads to servers
US9571606B2 (en)2012-08-312017-02-14Verance CorporationSocial media viewing system
US9106964B2 (en)2012-09-132015-08-11Verance CorporationEnhanced content distribution using advertisements
US8869222B2 (en)2012-09-132014-10-21Verance CorporationSecond screen content
US9064042B2 (en)*2012-11-142015-06-23Riverbed Technology, Inc.Instrumenting computer program code by merging template and target code methods
US9635033B2 (en)*2012-11-142017-04-25University Of Virginia Patent FoundationMethods, systems and computer readable media for detecting command injection attacks
US9336370B2 (en)2012-12-062016-05-10Apple Inc.Method and apparatus for dynamic obfuscation of static data
US8918768B2 (en)*2012-12-062014-12-23Apple Inc.Methods and apparatus for correlation protected processing of data operations
US8938718B2 (en)*2012-12-182015-01-20International Business Machines CorporationManaging window focus while debugging a graphical user interface program
US8762948B1 (en)*2012-12-202014-06-24Kaspersky Lab ZaoSystem and method for establishing rules for filtering insignificant events for analysis of software program
EP2937807B1 (en)*2012-12-212018-01-31Nippon Telegraph and Telephone CorporationMonitoring device and monitoring method
US9047448B2 (en)2013-01-142015-06-02Apple Inc.Branch auditing in a computer program
US10152591B2 (en)*2013-02-102018-12-11Paypal, Inc.Protecting against malware variants using reconstructed code of malware
IL224743A0 (en)2013-02-142013-06-27Harel CainAutomatic computer program obfuscation system
US9584543B2 (en)*2013-03-052017-02-28White Ops, Inc.Method and system for web integrity validator
US9813235B2 (en)2013-03-112017-11-07Indian Institute of Technology KharagpurResistance to cache timing attacks on block cipher encryption
US9354849B2 (en)*2013-03-142016-05-31Apperian, Inc.Modification of compiled applications and application management using retrievable policies
US9262794B2 (en)2013-03-142016-02-16Verance CorporationTransactional video marking system
US20140283038A1 (en)2013-03-152014-09-18Shape Security Inc.Safe Intelligent Content Modification
US9338143B2 (en)2013-03-152016-05-10Shape Security, Inc.Stateless web content anti-automation
US9058415B1 (en)*2013-03-152015-06-16Google Inc.Counting events using hardware performance counters and annotated instructions
US9846656B2 (en)*2013-04-172017-12-19Laurence H. CookeSecure computing
US9483364B2 (en)*2013-05-082016-11-01Commvault Systems, Inc.Synchronization of local secondary copies with a remote storage management component
US9218467B2 (en)*2013-05-292015-12-22Raytheon Cyber Products, LlcIntra stack frame randomization for protecting applications against code injection attack
GB2514618B (en)*2013-05-312020-11-11Advanced Risc Mach LtdData processing systems
US10567349B2 (en)2013-06-252020-02-18Wickr Inc.Secure time-to-live
US9652258B2 (en)*2013-07-012017-05-16Oracle International CorporationDynamic time zone definition update manager
US9218483B2 (en)2013-07-102015-12-22Raytheon Cyber Products, LlcSynthetic processing diversity with multiple architectures within a homogeneous processing environment
US9256431B2 (en)2013-07-102016-02-09Raytheon Cyber Products, LlcSynthetic processing diversity within a homogeneous processing environment
US9098352B2 (en)*2013-07-172015-08-04Deja Vu Security, LlcMetaphor based language fuzzing of computer code
US9251549B2 (en)2013-07-232016-02-02Verance CorporationWatermark extractor enhancements based on payload ranking
US20150052603A1 (en)*2013-08-132015-02-19Arxan Technologies, Inc.Anti-tamper system with self-adjusting guards
US9459986B2 (en)*2013-08-282016-10-04International Business Machines CorporationAutomatic generation of analysis-equivalent application constructs
US9792170B2 (en)*2013-08-302017-10-17Cisco Technology, Inc.Correcting operational state and incorporating additional debugging support into an online system without disruption
WO2015038944A1 (en)*2013-09-122015-03-19Virsec Systems, Inc.Automated runtime detection of malware
CN104517044B (en)*2013-09-272019-02-26腾讯科技(深圳)有限公司It is a kind of to prevent method and apparatus of the binary file by decompiling
US8738931B1 (en)*2013-10-212014-05-27Conley Jack FunkMethod for determining and protecting proprietary source code using mnemonic identifiers
US9053228B1 (en)2013-10-222015-06-09The Mathworks, Inc.Determining when to evaluate program code and provide results in a live evaluation programming environment
US9075916B1 (en)*2013-10-222015-07-07The Mathworks, Inc.Undoing/redoing program code execution
CN105684409B (en)*2013-10-252019-08-13微软技术许可有限责任公司 Hash values are used to represent blocks in video and image encoding and decoding
WO2015058395A1 (en)*2013-10-252015-04-30Microsoft Technology Licensing, LlcHash-based block matching in video and image coding
US9208334B2 (en)2013-10-252015-12-08Verance CorporationContent management using multiple abstraction layers
KR101536920B1 (en)*2013-12-162015-07-15주식회사 에스이웍스Method of Obfuscating Files Based on Advanced RISC Machine Processor
CN105723348B (en)2013-12-172019-02-15英特尔公司 Detect unauthorized memory modifications and accesses using transactional memory
US8954583B1 (en)2014-01-202015-02-10Shape Security, Inc.Intercepting and supervising calls to transformed operations and objects
US8893294B1 (en)2014-01-212014-11-18Shape Security, Inc.Flexible caching
EP2913772A1 (en)*2014-02-282015-09-02Wibu-Systems AGMethod and computer system for protecting a computer program against influence
CN105393537B (en)*2014-03-042019-08-27微软技术许可有限责任公司Hash table building and availability inspection for the Block- matching based on hash
CN105556971B (en)*2014-03-042019-07-30微软技术许可有限责任公司It stirs for the block in intra block duplication prediction and determines with the coder side of dancing mode
JP6265783B2 (en)*2014-03-062018-01-24キヤノン株式会社 Encryption / decryption system, control method therefor, and program
JP2017514345A (en)2014-03-132017-06-01ベランス・コーポレイション Interactive content acquisition using embedded code
US9544329B2 (en)2014-03-182017-01-10Shape Security, Inc.Client/server security by an intermediary executing instructions received from a server and rendering client application instructions
GB201405754D0 (en)*2014-03-312014-05-14Irdeto BvProtecting an item of software comprising conditional code
US9563518B2 (en)2014-04-022017-02-07Commvault Systems, Inc.Information management by a media agent in the absence of communications with a storage manager
US9749344B2 (en)2014-04-032017-08-29Fireeye, Inc.System and method of cyber threat intensity determination and application to cyber threat mitigation
US9749343B2 (en)2014-04-032017-08-29Fireeye, Inc.System and method of cyber threat structure mapping and application to cyber threat mitigation
US10599820B2 (en)*2014-04-232020-03-24Nxp B.V.Control flow flattening for code obfuscation where the next block calculation needs run-time information
US9641337B2 (en)*2014-04-282017-05-02Nxp B.V.Interface compatible approach for gluing white-box implementation to surrounding program
US9329875B2 (en)*2014-04-282016-05-03International Business Machines CorporationGlobal entry point and local entry point for callee function
TWI528216B (en)*2014-04-302016-04-01財團法人資訊工業策進會Method, electronic device, and user interface for on-demand detecting malware
US9378001B2 (en)*2014-05-022016-06-28Microsoft Technology Licensing, LlcMatching program sections through feature extraction
US9083739B1 (en)2014-05-292015-07-14Shape Security, Inc.Client/server authentication using dynamic credentials
US9639673B2 (en)*2014-06-172017-05-02Apple Inc.Protecting software through a fake cryptographic layer
CN105706450B (en)*2014-06-232019-07-16微软技术许可有限责任公司It is determined according to the encoder of the result of the Block- matching based on hash
CN106687981B (en)2014-06-242020-09-01弗塞克系统公司System and method for automated detection of input and output verification and resource management vulnerabilities
US10089216B2 (en)2014-06-302018-10-02Shape Security, Inc.Automatically determining whether a page of a web site is broken despite elements on the page that may change
US9075990B1 (en)2014-07-012015-07-07Shape Security, Inc.Reliable selection of security countermeasures
DE102014213503A1 (en)*2014-07-112016-01-14Bayerische Motoren Werke Aktiengesellschaft Method for monitoring software in a road vehicle
US9141515B1 (en)*2014-07-152015-09-22Sap SeLimiting display content in editor for large data volumes
CN104091100B (en)*2014-07-152017-02-15电子科技大学Software protection method based on intermediate result compiling
US9003511B1 (en)2014-07-222015-04-07Shape Security, Inc.Polymorphic security policy action
KR101695639B1 (en)*2014-08-132017-01-16(주)잉카엔트웍스Method and system for providing application security service based on cloud
US10599852B2 (en)2014-08-152020-03-24Securisea, Inc.High performance software vulnerabilities detection system and methods
US9454659B1 (en)2014-08-152016-09-27Securisea, Inc.Software vulnerabilities detection system and methods
US9824214B2 (en)2014-08-152017-11-21Securisea, Inc.High performance software vulnerabilities detection system and methods
US20160057159A1 (en)*2014-08-222016-02-25Syracuse UniversitySemantics-aware android malware classification
US9825984B1 (en)2014-08-272017-11-21Shape Security, Inc.Background analysis of web content
US9390282B2 (en)*2014-09-032016-07-12Microsoft Technology Licensing, LlcOutsourcing document-transformation tasks while protecting sensitive information
US9357058B2 (en)*2014-09-032016-05-31Teleperformance SeContact center anti-fraud monitoring, detection and prevention solution
US9602543B2 (en)2014-09-092017-03-21Shape Security, Inc.Client/server polymorphism using polymorphic hooks
WO2016049225A1 (en)*2014-09-232016-03-31The Regents Of The University Of CaliforniaProvably secure virus detection
RU2679981C2 (en)2014-09-302019-02-14МАЙКРОСОФТ ТЕКНОЛОДЖИ ЛАЙСЕНСИНГ, ЭлЭлСиHash-based encoder decisions for video coding
US9600672B1 (en)*2014-12-042017-03-21Amazon Technologies, Inc.Dynamic function switching
KR20160070965A (en)2014-12-112016-06-21삼성전자주식회사Compiler
DE102014019090A1 (en)*2014-12-182016-06-23Giesecke & Devrient Gmbh Method for providing a safety-critical software application on a computer unit
WO2016108162A1 (en)*2015-01-012016-07-07Checkmarx Ltd.Code instrumentation for runtime application self-protection
US10333696B2 (en)2015-01-122019-06-25X-Prime, Inc.Systems and methods for implementing an efficient, scalable homomorphic transformation of encrypted data with minimal data expansion and improved processing efficiency
US9825995B1 (en)2015-01-142017-11-21Shape Security, Inc.Coordinated application of security policies
CN105868094A (en)*2015-01-202016-08-17中兴通讯股份有限公司Method and device used for hot patching of CPU with MIPS architecture
EP3057019A1 (en)*2015-02-132016-08-17Thomson LicensingMethod and device for protecting an application and method and device for executing a protected application thus protected
US9779239B2 (en)*2015-03-152017-10-03Fujitsu LimitedDetection of malicious software behavior using signature-based static analysis
US9710404B2 (en)*2015-03-232017-07-18Intel CorporationDynamic configuration and peripheral access in a processor
US9608975B2 (en)2015-03-302017-03-28Shape Security, Inc.Challenge-dynamic credential pairs for client/server request validation
US10698671B2 (en)2015-03-302020-06-30Arxan Technologies, Inc.Processing, modification, distribution of custom software installation packages
EP3086233B1 (en)*2015-04-232020-05-06CODESYS Holding GmbHMethod and system for measuring a runtime by means of watchpoints
US9892261B2 (en)2015-04-282018-02-13Fireeye, Inc.Computer imposed countermeasures driven by malware lineage
US10733594B1 (en)2015-05-112020-08-04Square, Inc.Data security measures for mobile devices
US9813440B1 (en)2015-05-152017-11-07Shape Security, Inc.Polymorphic treatment of annotated content
US10608814B2 (en)*2015-05-172020-03-31Gideon SamidEquivoe-T: Transposition equivocation cryptography
US10642786B2 (en)*2015-05-192020-05-05Cryptomove, Inc.Security via data concealment using integrated circuits
US10664439B2 (en)2015-05-192020-05-26Cryptomove, Inc.Security via dynamic data movement in a cloud-based environment
US10068069B1 (en)*2015-05-222018-09-04Whitehawk Software LLCDenoting precise locations and arguments in binary program code
US10803165B2 (en)*2015-06-272020-10-13Mcafee, LlcDetection of shellcode
US10110566B2 (en)2015-07-212018-10-23Baffle, Inc.Systems and processes for executing private programs on untrusted computers
US9881142B2 (en)2015-09-112018-01-30Patrick Robert KorenMethod and apparatus for preventing and investigating software piracy
EP3144816A1 (en)*2015-09-152017-03-22Tata Consultancy Services LimitedStatic analysis based efficient elimination of false positives
US10936316B2 (en)2015-09-192021-03-02Microsoft Technology Licensing, LlcDense read encoding for dataflow ISA
US10776115B2 (en)2015-09-192020-09-15Microsoft Technology Licensing, LlcDebug support for block-based processor
US10180840B2 (en)2015-09-192019-01-15Microsoft Technology Licensing, LlcDynamic generation of null instructions
US11126433B2 (en)2015-09-192021-09-21Microsoft Technology Licensing, LlcBlock-based processor core composition register
US10678544B2 (en)2015-09-192020-06-09Microsoft Technology Licensing, LlcInitiating instruction block execution using a register access instruction
US10452399B2 (en)2015-09-192019-10-22Microsoft Technology Licensing, LlcBroadcast channel architectures for block-based processors
US10768936B2 (en)2015-09-192020-09-08Microsoft Technology Licensing, LlcBlock-based processor including topology and control registers to indicate resource sharing and size of logical processor
US10198263B2 (en)2015-09-192019-02-05Microsoft Technology Licensing, LlcWrite nullification
US11977891B2 (en)2015-09-192024-05-07Microsoft Technology Licensing, LlcImplicit program order
US11016770B2 (en)2015-09-192021-05-25Microsoft Technology Licensing, LlcDistinct system registers for logical processors
US10719321B2 (en)2015-09-192020-07-21Microsoft Technology Licensing, LlcPrefetching instruction blocks
US11681531B2 (en)2015-09-192023-06-20Microsoft Technology Licensing, LlcGeneration and use of memory access instruction order encodings
US10871967B2 (en)2015-09-192020-12-22Microsoft Technology Licensing, LlcRegister read/write ordering
US9760736B2 (en)2015-09-292017-09-12International Business Machines CorporationCPU obfuscation for cloud applications
CN105354009B (en)*2015-10-142021-01-01北京深思数盾科技股份有限公司Protection method for firmware
US20170109526A1 (en)*2015-10-202017-04-20Intel CorporationSystems and methods for providing anti-malware protection and malware forensics on storage devices
US9703537B2 (en)*2015-11-022017-07-11International Business Machines CorporationMethod for defining alias sets
US9547483B1 (en)*2015-11-062017-01-17International Business Machines CorporationFeedback directed optimized compiling of optimized executable code
US10001978B2 (en)*2015-11-112018-06-19Oracle International CorporationType inference optimization
EP3185194A1 (en)*2015-12-242017-06-28Gemalto SaMethod and system for enhancing the security of a transaction
US11424931B2 (en)2016-01-272022-08-23Blackberry LimitedTrusted execution environment
US10599409B2 (en)2016-02-022020-03-24Blackberry LimitedApplication lifecycle operation queueing
US10108530B2 (en)*2016-02-242018-10-23Stmicroelectronics (Rousset) SasMethod and tool for generating a program code configured to perform control flow checking on another program code containing instructions for indirect branching
US10503931B2 (en)*2016-05-092019-12-10Arris Enterprises LlcMethod and apparatus for dynamic executable verification
US10586026B2 (en)*2016-06-032020-03-10Electronic Arts Inc.Simple obfuscation of text data in binary files
CA3027728A1 (en)2016-06-162017-12-21Virsec Systems, Inc.Systems and methods for remediating memory corruption in a computer application
US10546302B2 (en)2016-06-302020-01-28Square, Inc.Logical validation of devices against fraud and tampering
US10373167B2 (en)2016-06-302019-08-06Square, Inc.Logical validation of devices against fraud
US10467390B1 (en)*2016-08-182019-11-05Snap Inc.Cyclically dependent checks for software tamper-proofing
US10572245B1 (en)*2016-08-302020-02-25Amazon Technologies, Inc.Identifying versions of running programs using signatures derived from object files
US10390039B2 (en)2016-08-312019-08-20Microsoft Technology Licensing, LlcMotion estimation for screen remoting scenarios
JP6840966B2 (en)*2016-09-152021-03-10富士通株式会社 Reference information output program, reference information output method, and reference information output device
US10127160B2 (en)*2016-09-202018-11-13Alexander GounaresMethods and systems for binary scrambling
US10474548B2 (en)2016-09-302019-11-12Commvault Systems, Inc.Heartbeat monitoring of virtual machines for initiating failover operations in a data storage management system, using ping monitoring of target virtual machines
WO2018081093A1 (en)2016-10-242018-05-03Clark Carl MSoftware algorithm security
JP2018081592A (en)*2016-11-172018-05-24富士通株式会社Compile program, compile method, and compiler
US11095877B2 (en)2016-11-302021-08-17Microsoft Technology Licensing, LlcLocal hash-based motion estimation for screen remoting scenarios
US10671547B2 (en)2016-12-192020-06-02Intel CorporationLightweight trusted tasks
US10191836B2 (en)*2016-12-282019-01-29Nxp Usa, Inc.Software watchpoints apparatus for variables stored in registers
US20180187335A1 (en)2017-01-012018-07-05Lummus CorporationMaterials segregating seed cotton extractor cleaner
EP3355219A1 (en)*2017-01-262018-08-01Gemalto SaMethod to secure a software code
US10496993B1 (en)2017-02-152019-12-03Square, Inc.DNS-based device geolocation
JP6746085B2 (en)*2017-03-092020-08-26日本電気株式会社 Abnormality detection device, abnormality detection method, and abnormality detection program
CN106934260B (en)*2017-03-142020-03-17北京深思数盾科技股份有限公司Code protection method, device, server and storage medium
US10853057B1 (en)2017-03-292020-12-01Amazon Technologies, Inc.Software library versioning with caching
US10230527B2 (en)*2017-04-192019-03-12Continental Automotive Systems, Inc.Method and apparatus to quickly authenticate program using a security element
CN106951746B (en)*2017-04-252020-01-21厦门芯阳科技股份有限公司Method and system for preventing reverse cracking of temperature control program
US10552308B1 (en)2017-06-232020-02-04Square, Inc.Analyzing attributes of memory mappings to identify processes running on a device
US10592662B1 (en)*2017-09-132020-03-17Ca, Inc.Systems and methods for altering time data
US10943007B2 (en)*2017-09-202021-03-09Twistlock, LtdSystem and method for defending applications invoking anonymous functions
US10684997B2 (en)*2017-10-242020-06-16Microsoft Technology Licensing, LlcFile consistency across file versions maintained by different services
US10558550B2 (en)*2017-11-102020-02-11Blackberry LimitedStatic program analysis of a partial software program
CN108021792B (en)*2017-12-042021-05-28北京元心科技有限公司Mirror image software generation method and device and corresponding terminal
FR3075997B1 (en)*2017-12-262020-01-10Thales ELECTRONIC CALCULATOR FOR IMPLEMENTING AT LEAST ONE CRITICAL FUNCTION, ELECTRONIC DEVICE, METHOD AND COMPUTER PROGRAM
US10715536B2 (en)2017-12-292020-07-14Square, Inc.Logical validation of devices against fraud and tampering
CN108228187B (en)*2018-01-022020-03-17南京大学Global optimization method of numerical program
US10565090B1 (en)*2018-01-032020-02-18Amazon Technologies, Inc.Proxy for debugging transformed code
US11042637B1 (en)*2018-02-012021-06-22EMC IP Holding Company LLCMeasuring code sharing of software modules based on fingerprinting of assembly code
US10379849B1 (en)*2018-02-012019-08-13Dell Products L.P.Methods and apparatus for visualization of contextual code execution
US10599835B2 (en)*2018-02-062020-03-24Vmware, Inc.32-bit address space containment to secure processes from speculative rogue cache loads
US10740075B2 (en)*2018-02-062020-08-11Smartshift Technologies, Inc.Systems and methods for code clustering analysis and transformation
US11531531B1 (en)2018-03-082022-12-20Amazon Technologies, Inc.Non-disruptive introduction of live update functionality into long-running applications
US10545745B2 (en)*2018-04-182020-01-28International Business Machines CorporationApplication binary rewriting to reduce binary attack surface area
US10798464B1 (en)2018-04-272020-10-06Amazon Technologies, Inc.Streaming delivery of client-executable code
US10706746B2 (en)*2018-06-012020-07-07Polyverse CorporationPure binary scrambling
WO2020007339A1 (en)2018-07-042020-01-09Yunding Network Technology (Beijing) Co., Ltd.Method and system for operating an electronic device
CN109829294B (en)*2019-01-312021-07-13云丁网络技术(北京)有限公司Firmware verification method, system, server and electronic equipment
EP3591550A1 (en)*2018-07-062020-01-08Koninklijke Philips N.V.A compiler device with masking function
US11307962B2 (en)2018-07-092022-04-19United States Of America As Represented By The Secretary Of The NavyMethod for semantic preserving transform mutation discovery and vetting
US10776487B2 (en)2018-07-122020-09-15Saudi Arabian Oil CompanySystems and methods for detecting obfuscated malware in obfuscated just-in-time (JIT) compiled code
US10613970B1 (en)*2018-08-312020-04-07Intuit Inc.Method and system for managing deployment of software application components based on software performance data
US11507958B1 (en)2018-09-262022-11-22Block, Inc.Trust-based security for transaction payments
US11494762B1 (en)2018-09-262022-11-08Block, Inc.Device driver for contactless payments
GB2578317B (en)*2018-10-232021-11-24Advanced Risc Mach LtdGenerating a test sequence of code based on a directed sequence of code and randomly selected instructions
CN109614773B (en)*2018-11-202020-11-13江苏通付盾信息安全技术有限公司Code self-modifying method and device and electronic equipment
US11200124B2 (en)2018-12-062021-12-14Commvault Systems, Inc.Assigning backup resources based on failover of partnered data storage servers in a data storage management system
US11012508B2 (en)2018-12-142021-05-18Commvault Systems, Inc.Region-based distributed information management system
US10698804B1 (en)*2019-01-282020-06-30Fujitsu LimitedIdentifying inputs for automated computer-program testing operations
CA3134459A1 (en)2019-03-212020-09-24Capzul LtdDetection and prevention of reverse engineering of computer programs
US10922218B2 (en)2019-03-252021-02-16Aurora Labs Ltd.Identifying software interdependencies using line-of-code behavior and relation models
CN110110506B (en)*2019-03-282021-07-02江苏通付盾信息安全技术有限公司Program reinforcing method and device based on application program installation package
WO2020205984A1 (en)*2019-04-012020-10-08Cryptomove, Inc.Security via data concealment using integrated circuits
US11650803B2 (en)*2019-04-182023-05-16RunSafe Security, Inc.Difference validation and auditing (DVA) tool
US11301224B1 (en)*2019-04-302022-04-12Automation Anywhere, Inc.Robotic process automation system with a command action logic independent execution environment
US11256805B2 (en)*2019-05-152022-02-22Blackberry LimitedMethod and system for identification of secure binary images
CN110399142B (en)*2019-07-262023-04-07四川新网银行股份有限公司Method and system for isolating gray scale from production environment version
EP4004773B1 (en)2019-07-292023-09-06Intertrust Technologies CorporationSystems and methods for managing state
CN110633105B (en)*2019-09-122021-01-15安徽寒武纪信息科技有限公司Instruction sequence processing method and device, electronic equipment and storage medium
US12216637B2 (en)*2019-11-182025-02-04Scalar, Inc.Data management system
CN111163066A (en)*2019-12-162020-05-15苏州哈度软件有限公司Network security software system based on cloud computing
CN113127223B (en)*2019-12-312022-10-11武汉斗鱼鱼乐网络科技有限公司Method and device for encrypted data transmission between Windows client program modules
US11194695B2 (en)*2020-01-072021-12-07Supercell OyMethod for blocking external debugger application from analysing code of software program
US12229245B2 (en)*2020-01-282025-02-18C2A-Sec, LtdControl flow integrity system and method
US11423183B2 (en)*2020-02-282022-08-23International Business Machines CorporationThermal imaging protection
US11288360B2 (en)2020-03-042022-03-29Kyndryl, Inc.Preventing untrusted script execution
US11360000B2 (en)2020-03-202022-06-14SK Hynix Inc.Priority-based dynamic resource allocation for product testing
US11099956B1 (en)2020-03-262021-08-24Commvault Systems, Inc.Snapshot-based disaster recovery orchestration of virtual machine failover and failback operations
US20210342490A1 (en)*2020-05-042021-11-04Cerebri AI Inc.Auditable secure reverse engineering proof machine learning pipeline and methods
JP7448005B2 (en)*2020-06-032024-03-12日本電気株式会社 Backdoor inspection device, backdoor inspection method, and program
US11202085B1 (en)2020-06-122021-12-14Microsoft Technology Licensing, LlcLow-cost hash table construction and hash-based block matching for variable-size blocks
US11677574B1 (en)2020-07-022023-06-13Intrado CorporationAutomated conference sessions generated to manage application development
US11216257B1 (en)*2020-07-022022-01-04Intrado CorporationAutomated conference sessions generated to manage application development
US11334662B2 (en)2020-07-142022-05-17Bank Of America CorporationTamper-evident travel devices equipped with secure re-image file (s)
CN114003866B (en)*2020-07-282025-03-28北京梆梆安全科技有限公司 Source code obfuscation method and device
CN111770206B (en)*2020-08-312020-12-29支付宝(杭州)信息技术有限公司 A method for deploying smart contracts, blockchain nodes and storage media
US11748472B2 (en)2020-09-022023-09-05Nec CorporationTrusted service for detecting attacks on trusted execution environments
US11307974B2 (en)*2020-09-042022-04-19SK Hynix Inc.Horizontally scalable distributed system for automated firmware testing and method thereof
JP7420269B2 (en)*2020-09-142024-01-23日本電信電話株式会社 Bug detection support device, bug detection support method, and bug detection support program
US12304649B2 (en)*2020-10-082025-05-20Thales Canada Inc.Simplex flight control computer to be used in a flight control system
CN112257034A (en)*2020-10-302021-01-22北京华维国创电子科技有限公司Encryption and authorization algorithm and management system for chip mounter
US20220147598A1 (en)*2020-11-122022-05-12New York UniversitySystem, method, and computer-accessible medium for register-transfer level locking against an untrusted foundry
CN112528241B (en)*2020-11-272021-09-14北京深思数盾科技股份有限公司Code obfuscation method, code obfuscator and computer readable storage medium
US11361055B1 (en)2020-12-042022-06-14International Business Machines CorporationProtection of a content repository using dynamic watermarking
FR3118223B1 (en)*2020-12-172023-11-17Tages METHOD FOR COMBINING AN EXECUTABLE SOFTWARE PROGRAM WITH A COMPUTER PLATFORM
WO2022140336A1 (en)*2020-12-212022-06-30RunSafe Security, Inc.System and methods for live debugging of transformed binaries
EP4033381A1 (en)*2021-01-252022-07-27Thales Dis Cpl Usa, Inc.Software obfuscation method using an opaque predicate based on multiplying mixed boolean-arithmetic expressions
US11461219B2 (en)*2021-02-022022-10-04Red Hat, Inc.Prioritizing software bug mitigation for software on multiple systems
US11645175B2 (en)2021-02-122023-05-09Commvault Systems, Inc.Automatic failover of a storage manager
CN113836545B (en)*2021-08-202024-07-16咪咕音乐有限公司Code encryption method, device, equipment and storage medium
CN113760770B (en)*2021-09-142024-06-11上海观安信息技术股份有限公司Anti-debugging method and system based on automatic static resource detection
KR102702323B1 (en)*2021-12-022024-09-04성균관대학교산학협력단Method and device of embedding watermark in software
CN114491424B (en)*2021-12-312024-05-03西安电子科技大学Binary code clipping method based on fuzzy test
GB202202209D0 (en)*2022-02-182022-04-06Promon AsProtecting software
US12323269B2 (en)2022-05-202025-06-03Ford Global Technologies, LlcVehicle data protection
CN114859874B (en)*2022-07-062022-11-01深圳市星卡软件技术开发有限公司Closed system based on automobile diagnosis and use method thereof
US12174714B2 (en)*2022-10-122024-12-24Siliconch Systems Pvt LtdSystem and method for processor debug using low-bandwidth interface with configurable list of skip and loop instructions
US11658833B1 (en)*2022-12-062023-05-23Citibank, N.A.Systems and methods for conducting cryptographically secure actions in public, non-permissioned blockchains using bifurcated self-executing programs
US12271491B2 (en)2023-01-192025-04-08Citibank, N.A.Detection and mitigation of machine learning model adversarial attacks
US11874934B1 (en)2023-01-192024-01-16Citibank, N.A.Providing user-induced variable identification of end-to-end computing system security impact information systems and methods
US12282565B2 (en)2023-01-192025-04-22Citibank, N.A.Generative cybersecurity exploit synthesis and mitigation
US12314406B1 (en)2023-01-192025-05-27Citibank, N.A.Generative cybersecurity exploit discovery and evaluation
US12299140B2 (en)2023-01-192025-05-13Citibank, N.A.Dynamic multi-model monitoring and validation for artificial intelligence models
US11748491B1 (en)2023-01-192023-09-05Citibank, N.A.Determining platform-specific end-to-end security vulnerabilities for a software application via a graphical user interface (GUI) systems and methods
US12360942B2 (en)2023-01-192025-07-15Commvault Systems, Inc.Selection of a simulated archiving plan for a desired dataset
US12223063B2 (en)2023-01-192025-02-11Citibank, N.A.End-to-end measurement, grading and evaluation of pretrained artificial intelligence models via a graphical user interface (GUI) systems and methods
WO2024233394A1 (en)*2023-05-052024-11-14William David SchwadererUnconstrained barren plateau data obfuscation
US20240386093A1 (en)*2023-05-172024-11-21Arm LimitedAutomated deployment of relocatable code blocks as an attack countermeasure in software
US12210644B2 (en)*2023-06-092025-01-28Content Square SASObfuscation
CN116483289B (en)*2023-06-212024-04-05荣耀终端有限公司 Basic block management method and electronic device
US12154019B1 (en)2024-06-072024-11-26Citibank, N.A.System and method for constructing a layered artificial intelligence model

Citations (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5892899A (en)*1996-06-131999-04-06Intel CorporationTamper resistant methods and apparatus
US6088452A (en)*1996-03-072000-07-11Northern Telecom LimitedEncoding technique for software and hardware
US6192475B1 (en)*1997-03-312001-02-20David R. WallaceSystem and method for cloaking software
US6594761B1 (en)*1999-06-092003-07-15Cloakware CorporationTamper resistant software encoding
US6668325B1 (en)*1997-06-092003-12-23Intertrust TechnologiesObfuscation techniques for enhancing software security
US6779114B1 (en)*1999-08-192004-08-17Cloakware CorporationTamper resistant software-control flow encoding

Family Cites Families (575)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US599949A (en)*1898-03-01Edward a
US3609697A (en)1968-10-211971-09-28IbmProgram security device
US3573747A (en)1969-02-241971-04-06Institutional Networks CorpInstinet communication system for effectuating the sale or exchange of fungible properties between subscribers
US3845391A (en)1969-07-081974-10-29Audicom CorpCommunication including submerged identification signal
US3798359A (en)1971-06-301974-03-19IbmBlock cipher cryptographic system
US3798360A (en)1971-06-301974-03-19IbmStep code ciphering system
US3798605A (en)1971-06-301974-03-19IbmCentralized verification system
US3796830A (en)1971-11-021974-03-12IbmRecirculating block cipher cryptographic system
GB1414126A (en)1971-11-221975-11-19Key Tronic LtdSecutity for computer systems
US3790700A (en)1971-12-171974-02-05Hughes Aircraft CoCatv program control system
US3931504A (en)1972-02-071976-01-06Basic Computing Arts, Inc.Electronic data processing security system and method
US3806874A (en)1972-04-111974-04-23Gretag AgIdentification system for individuals
US3829833A (en)1972-10-241974-08-13Information Identification CoCode element identification method and apparatus
US3911397A (en)1972-10-241975-10-07Information Identification IncAccess control assembly
GB1494736A (en)1974-01-211977-12-14Chubb Integrated Syst LtdToken-control
US3924065A (en)1974-04-051975-12-02Information Identification IncCoherent, fixed BAUD rate FSK communication method and apparatus
US3946220A (en)1974-06-101976-03-23Transactron, Inc.Point-of-sale system and apparatus
US3956615A (en)1974-06-251976-05-11Ibm CorporationTransaction execution system with secure data storage and communications
US3970992A (en)1974-06-251976-07-20Ibm CorporationTransaction terminal with unlimited range of functions
US3906448A (en)1974-08-011975-09-16Rca CorpFault detection facilitating means for card reader of identification card reading system
US4270182A (en)1974-12-301981-05-26Asija Satya PAutomated information input, storage, and retrieval system
US3958081A (en)1975-02-241976-05-18International Business Machines CorporationBlock cipher system for data security
US3946200A (en)1975-02-241976-03-23Gca CorporationProportional temperature controller
US4112421A (en)1975-04-161978-09-05Information Identification Company, Inc.Method and apparatus for automatically monitoring objects
US4217588A (en)1975-04-161980-08-12Information Identification Company, Inc.Object monitoring method and apparatus
US4209787A (en)1975-04-161980-06-24Gould Inc.Method for monitoring the location of monitored objects
US4071911A (en)1975-04-221978-01-31Continental Can Co. Inc.Machine control system with machine serializing and safety circuits
US3996449A (en)1975-08-251976-12-07International Business Machines CorporationOperating system authenticator
US4196310A (en)1976-04-091980-04-01Digital Data, Inc.Secure SCA broadcasting system including subscriber actuated portable receiving terminals
JPS533029A (en)1976-06-301978-01-12Toshiba CorpElectronic computer
US4048619A (en)1976-09-071977-09-13Digital Data Inc.Secure two channel sca broadcasting system
US4141005A (en)1976-11-111979-02-20International Business Machines CorporationData format converting apparatus for use in a digital data processor
GB1561482A (en)1976-11-181980-02-20IbmProtection of data processing system against unauthorised programmes
US4104721A (en)1976-12-301978-08-01International Business Machines CorporationHierarchical security mechanism for dynamically assigning security levels to object programs
US4120030A (en)1977-03-111978-10-10Kearney & Trecker CorporationComputer software security system
US4162483A (en)1977-04-011979-07-24Intech Laboratories, Inc.Bilateral master station-plural satellite station signalling apparatus
US4200913A (en)1977-04-131980-04-29International Business Machines CorporationOperator controlled programmable keyboard apparatus
GB1553027A (en)1977-05-121979-09-19Marconi Co LtdMessage signal scrambling apparatus
US4220991A (en)1977-10-081980-09-02Tokyo Electric Co., Ltd.Electronic cash register with removable memory packs for cashier identification
US4168396A (en)1977-10-311979-09-18Best Robert MMicroprocessor for executing enciphered programs
US4278837A (en)1977-10-311981-07-14Best Robert MCrypto microprocessor for executing enciphered programs
US4405829A (en)1977-12-141983-09-20Massachusetts Institute Of TechnologyCryptographic communications system and method
US4259720A (en)1978-01-091981-03-31Interbank Card AssociationSecurity system for electronic funds transfer system
US4262329A (en)1978-03-271981-04-14Computation Planning, Inc.Security system for data processing
US4246638A (en)1978-09-141981-01-20Thomas William JMethod and apparatus for controlling usage of a programmable computing machine
US4253157A (en)1978-09-291981-02-24Alpex Computer Corp.Data access system wherein subscriber terminals gain access to a data bank by telephone lines
US4265371A (en)1978-10-061981-05-05Trafalgar Industries Inc.Foodstuff vending apparatus employing improved solid-state type control apparatus
US4232317A (en)1978-11-011980-11-04Freeny Jr Charles CQuantized hyperbolic and inverse hyperbolic object location system
US4305131A (en)1979-02-051981-12-08Best Robert MDialog between TV movies and human viewers
FR2448824A1 (en)1979-02-061980-09-05Telediffusion Fse VIDEOTEX SYSTEM PROVIDED WITH INFORMATION ACCESS CONTROL MEANS
FR2448825A1 (en)1979-02-061980-09-05Telediffusion Fse SYSTEM FOR TRANSMITTING INFORMATION BETWEEN A TRANSMISSION CENTER AND RECEIVING STATIONS, WHICH IS PROVIDED WITH A MEANS OF CONTROLLING ACCESS TO THE INFORMATION TRANSMITTED
US4598288A (en)1979-04-161986-07-01Codart, Inc.Apparatus for controlling the reception of transmitted programs
US4236217A (en)1979-04-201980-11-25Kennedy Stanley PEnergy utilization or consumption recording arrangement
US4465901A (en)1979-06-041984-08-14Best Robert MCrypto microprocessor that executes enciphered programs
US4309569A (en)1979-09-051982-01-05The Board Of Trustees Of The Leland Stanford Junior UniversityMethod of providing digital signatures
US4319079A (en)1979-09-131982-03-09Best Robert MCrypto microprocessor using block cipher
DE2943436A1 (en)1979-10-261981-05-07Wolfram Dr.-Ing. 5100 Aachen SzepanskiSecurity coding system for documents - has cover coding printed on document and optically scanned for comparison with normal text
FR2469760A1 (en)1979-11-091981-05-22Cii Honeywell Bull METHOD AND SYSTEM FOR IDENTIFYING PEOPLE REQUESTING ACCESS TO CERTAIN MEDIA
US4321672A (en)1979-11-261982-03-23Braun Edward LFinancial data processing system
US4328544A (en)1980-01-041982-05-04International Business Machines CorporationElectronic point-of-sale system using direct-access storage
US4375579A (en)1980-01-301983-03-01Wisconsin Alumni Research FoundationDatabase encryption and decryption circuit and method using subkeys
US4306289A (en)1980-02-041981-12-15Western Electric Company, Inc.Digital computer having code conversion apparatus for an encrypted program
US4361877A (en)1980-02-051982-11-30Sangamo Weston, Inc.Billing recorder with non-volatile solid state memory
US4529870A (en)1980-03-101985-07-16David ChaumCryptographic identification, financial transaction, and credential device
JPS56140452A (en)1980-04-011981-11-02Hitachi LtdMemory protection system
CA1183950A (en)1980-09-261985-03-12Bo LofbergMethod for processing an information signal and means for carrying out the method
US4442484A (en)1980-10-141984-04-10Intel CorporationMicroprocessor memory management and protection mechanism
US4513174A (en)1981-03-191985-04-23Standard Microsystems CorporationSoftware security method using partial fabrication of proprietary control word decoders and microinstruction memories
US4446519A (en)1981-05-261984-05-01Corban International, Ltd.Method and apparatus for providing security for computer software
US4578530A (en)1981-06-261986-03-25Visa U.S.A., Inc.End-to-end encryption system and method of operation
US4433207A (en)1981-09-101984-02-21Best Robert MCryptographic decoder for computer programs
US4471163A (en)1981-10-051984-09-11Donald Thomas CSoftware protection system
US4670857A (en)1981-10-261987-06-02Rackman Michael ICartridge-controlled system whose use is limited to authorized cartridges
US4593353A (en)1981-10-261986-06-03Telecommunications Associates, Inc.Software protection method and apparatus
US4442486A (en)1981-11-251984-04-10U.S. Philips CorporationProtected programmable apparatus
US4454594A (en)1981-11-251984-06-12U.S. Philips CorporationMethod and apparatus to secure proprietary operation of computer equipment
US4553252A (en)1981-12-211985-11-12Egendorf Harris HCounting computer software cartridge
HU183765B (en)1981-12-231984-05-28Phylaxia OltoanyagtermeloeProcess for producing lyophilized vaccine against duck hepatitis
EP0084441A3 (en)1982-01-191984-08-22Tabs LimitedMethod and apparatus for the protection of proprietary computer software
US4458315A (en)1982-02-251984-07-03Penta, Inc.Apparatus and method for preventing unauthorized use of computer programs
AU542447B2 (en)1982-02-271985-02-21Fujitsu LimitedSystem for controlling key storage unit
FR2523745B1 (en)1982-03-181987-06-26Bull Sa METHOD AND DEVICE FOR PROTECTING SOFTWARE DELIVERED BY A SUPPLIER TO A USER
GB2119992B (en)1982-05-061985-10-30Tokyo Shibaura Electric CoAutomatic transaction machine
US4484217A (en)1982-05-111984-11-20Telease, Inc.Method and system for remote reporting, particularly for pay television billing
US4494156A (en)1982-05-141985-01-15Media Systems TechnologySelectable format computer disk copier machine
US4525599A (en)1982-05-211985-06-25General Computer CorporationSoftware protection methods and apparatus
US4462076A (en)1982-06-041984-07-24Smith EngineeringVideo game cartridge recognition and security system
US4523271A (en)1982-06-221985-06-11Levien Raphael LSoftware protection method and apparatus
US4590552A (en)1982-06-301986-05-20Texas Instruments IncorporatedSecurity bit for designating the security status of information stored in a nonvolatile memory
US4462078A (en)1982-08-021984-07-24Ron RossComputer program protection method
US4558176A (en)1982-09-201985-12-10Arnold Mark GComputer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software
FR2536880B1 (en)1982-11-301987-05-07Bull Sa MICROPROCESSOR DESIGNED IN PARTICULAR FOR EXECUTING THE CALCULATION ALGORITHMS OF A PUBLIC KEY ENCRYPTION SYSTEM
US4562305A (en)1982-12-221985-12-31International Business Machines CorporationSoftware cryptographic apparatus and method
US4609985A (en)1982-12-301986-09-02Thomson Components-Mostek CorporationMicrocomputer with severable ROM
US4528643A (en)1983-01-101985-07-09Fpdc, Inc.System for reproducing information in material objects at a point of sale location
US4588991A (en)1983-03-071986-05-13Atalla CorporationFile access security method and means
US4680731A (en)1983-03-171987-07-14Romox IncorporatedReprogrammable cartridge memory with built-in identification circuitry and programming method
US4593376A (en)1983-04-211986-06-03Volk Larry NSystem for vending program cartridges which have circuitry for inhibiting program usage after preset time interval expires
US4597058A (en)1983-05-091986-06-24Romox, Inc.Cartridge programming system
EP0128672A1 (en)1983-05-131984-12-19Ira Dennis GaleData security device
US4658093A (en)1983-07-111987-04-14Hellman Martin ESoftware distribution system
US4573119A (en)1983-07-111986-02-25Westheimer Thomas OComputer software protection system
US4926480A (en)1983-08-221990-05-15David ChaumCard-computer moderated systems
US4621334A (en)1983-08-261986-11-04Electronic Signature Lock CorporationPersonal identification apparatus
US4584641A (en)1983-08-291986-04-22Paul GuglielminoCopyprotecting system for software protection
US4562306A (en)1983-09-141985-12-31Chou Wayne WMethod and apparatus for protecting computer software utilizing an active coded hardware device
US5103392A (en)1983-10-051992-04-07Fujitsu LimitedSystem for storing history of use of programs including user credit data and having access by the proprietor
EP0158633A4 (en)1983-10-071986-07-24Nat Information Utilities CorpEducation utility.
US4652990A (en)1983-10-271987-03-24Remote Systems, Inc.Protected software access control apparatus and method
GB2149944A (en)1983-11-141985-06-19Softnet IncSoftware distribution
US4558413A (en)1983-11-211985-12-10Xerox CorporationSoftware version management system
US4740890A (en)1983-12-221988-04-26Software Concepts, Inc.Software protection system with trial period usage code and unlimited use unlocking code both recorded on program storage media
US4584639A (en)1983-12-231986-04-22Key Logic, Inc.Computer security system
US4577289A (en)1983-12-301986-03-18International Business Machines CorporationHardware key-on-disk system for copy-protecting magnetic storage media
WO1985003584A1 (en)1984-02-031985-08-15Paul GuignardSecurity and usage monitoring
US4621321A (en)1984-02-161986-11-04Honeywell Inc.Secure data processing system architecture
US4609777A (en)1984-02-221986-09-02Gordian Systems, Inc.Solid state key for controlling access to computer software
US4599489A (en)1984-02-221986-07-08Gordian Systems, Inc.Solid state key for controlling access to computer software
US4646234A (en)1984-02-291987-02-24Brigham Young UniversityAnti-piracy system using separate storage and alternate execution of selected proprietary and public portions of computer programs
US4672605A (en)1984-03-201987-06-09Applied Spectrum Technologies, Inc.Data and voice communications system
US4649515A (en)1984-04-301987-03-10Westinghouse Electric Corp.Methods and apparatus for system fault diagnosis and control
US4748561A (en)1984-05-141988-05-31Mark BrownMethod of protecting computer software
US4672572A (en)1984-05-211987-06-09Gould Inc.Protector system for computer access and use
US4712238A (en)1984-06-081987-12-08M/A-Com Government Systems, Inc.Selective-subscription descrambling
US4791565A (en)1984-06-201988-12-13Effective Security Systems, Inc.Apparatus for controlling the use of computer software
US4562495A (en)1984-07-021985-12-31Verbatim CorporationMultiple system disk
EP0175487A3 (en)1984-08-231989-03-08Btg International LimitedSoftware protection device
US4747139A (en)1984-08-271988-05-24Taaffe James LSoftware security method and systems
US4644493A (en)1984-09-141987-02-17International Business Machines CorporationImplementing a shared higher level of privilege on personal computers for copy protection of software
US4677552A (en)1984-10-051987-06-30Sibley Jr H CInternational commodity trade exchange
US4696034A (en)1984-10-121987-09-22Signal Security TechnologiesHigh security pay television system
US4677434A (en)1984-10-171987-06-30Lotus Information Network Corp.Access control system for transmitting data from a central station to a plurality of receiving stations and method therefor
DE3579785D1 (en)1984-10-311990-10-25Sony Corp DECODING DEVICES FOR TELEVISION TV SYSTEMS.
CA1238427A (en)1984-12-181988-06-21Jonathan OseasCode protection using cryptography
JPS61166652A (en)1985-01-191986-07-28Panafacom LtdInterruption generating system using exceptional memory protection
US4713753A (en)1985-02-211987-12-15Honeywell Inc.Secure data processing system architecture with format control
US4700296A (en)1985-04-191987-10-13Palmer Jr Roy AElectronic access control system
US4888798A (en)1985-04-191989-12-19Oms, Inc.Modular software security
US4688169A (en)1985-05-301987-08-18Joshi Bhagirath SComputer software security system
US4685056A (en)1985-06-111987-08-04Pueblo Technologies, Inc.Computer security device
US4683968A (en)1985-09-031987-08-04Burroughs CorporationSystem for preventing software piracy employing multi-encrypted keys and single decryption circuit modules
US4757533A (en)1985-09-111988-07-12Computer Security CorporationSecurity system for microcomputers
US4727550A (en)1985-09-191988-02-23Chang David BRadiation source
GB2182467B (en)1985-10-301989-10-18Ncr CoSecurity device for stored sensitive data
US5216603A (en)1985-11-181993-06-01Action Technologies, Inc.Method and apparatus for structuring and managing human communications by explicitly defining the types of communications permitted between participants
US5208748A (en)1985-11-181993-05-04Action Technologies, Inc.Method and apparatus for structuring and managing human communications by explicitly defining the types of communications permitted between participants
LU86203A1 (en)1985-12-111987-07-24Cen Centre Energie Nucleaire METHOD AND APPARATUS FOR VERIFYING THE AUTHENTICITY OF DOCUMENTS LINKED TO A PERSON AND THE IDENTITY OF THEIR CARRIERS
DE3601983A1 (en)1986-01-231987-07-30Siemens Ag METHOD AND DEVICE FOR CONTACTLESS DETERMINATION OF TEMPERATURE DISTRIBUTION IN AN EXAMINATION OBJECT
US5759101A (en)1986-03-101998-06-02Response Reward Systems L.C.Central and remote evaluation of responses of participatory broadcast audience with automatic crediting and couponing
US4864494A (en)1986-03-211989-09-05Computerized Data Ssytems For Mfg., Inc.Software usage authorization system with key for decrypting/re-encrypting/re-transmitting moving target security codes from protected software
US4893332A (en)1986-05-121990-01-09Aquatrol CorporationLow-powered remote sensor
US4823264A (en)1986-05-271989-04-18Deming Gilbert RElectronic funds transfer system
US4780821A (en)1986-07-291988-10-25International Business Machines Corp.Method for multiple programs management within a network having a server computer and a plurality of remote computers
GB8619989D0 (en)1986-08-161986-09-24Modray LtdControlling length of time
US5014234A (en)1986-08-251991-05-07Ncr CorporationSystem with software usage timer and counter for allowing limited use but preventing continued unauthorized use of protected software
DE3789808T2 (en)1986-08-251994-08-18Sony Corp DISK ARRANGEMENT AND DISK-LIKE STORAGE MEDIUM.
US5010571A (en)1986-09-101991-04-23Titan Linkabit CorporationMetering retrieval of encrypted data stored in customer data retrieval terminal
US4799156A (en)1986-10-011989-01-17Strategic Processing CorporationInteractive market management system
US4977594A (en)1986-10-141990-12-11Electronic Publishing Resources, Inc.Database usage metering and protection system and method
US4827508A (en)1986-10-141989-05-02Personal Library Software, Inc.Database usage metering and protection system and method
US5050213A (en)1986-10-141991-09-17Electronic Publishing Resources, Inc.Database usage metering and protection system and method
US5047928A (en)1986-10-241991-09-10Wiedemer John DBilling system for computer software
US5155680A (en)1986-10-241992-10-13Signal Security TechnologiesBilling system for computing software
US4796181A (en)1986-10-241989-01-03Wiedemer John DBilling system for computer software
US5146575A (en)1986-11-051992-09-08International Business Machines Corp.Implementing privilege on microprocessor systems for use in software asset protection
EP0268139A3 (en)*1986-11-051991-04-10International Business Machines CorporationManipulating rights-to-execute in connection with a software copy protection mechanism
US5109413A (en)1986-11-051992-04-28International Business Machines CorporationManipulating rights-to-execute in connection with a software copy protection mechanism
US4817140A (en)1986-11-051989-03-28International Business Machines Corp.Software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocessor
US4858121A (en)1986-12-121989-08-15Medical Payment Systems, IncorporatedMedical payment system
US4796220A (en)1986-12-151989-01-03Pride Software Development Corp.Method of controlling the copying of software
US4757914A (en)1987-01-271988-07-19Continental Can Company, Inc.Laminated closure for a plastic container
US4893248A (en)1987-02-061990-01-09Access CorporationMonitoring and reporting system for remote terminals
US4881197A (en)1987-02-131989-11-14Addison FischerDocument composition system using named formats and named fonts
US5224160A (en)1987-02-231993-06-29Siemens Nixdorf Informationssysteme AgProcess for securing and for checking the integrity of the secured programs
US4975647A (en)1987-06-011990-12-04Nova Biomedical CorporationControlling machine operation with respect to consumable accessory units
US4930073A (en)1987-06-261990-05-29International Business Machines CorporationMethod to prevent use of incorrect program version in a computer system
US4866769A (en)1987-08-051989-09-12Ibm CorporationHardware assist for protecting PC software
US5206951A (en)1987-08-211993-04-27Wang Laboratories, Inc.Integration of data between typed objects by mutual, direct invocation between object managers corresponding to object types
EP0329779B1 (en)1987-09-041992-12-09Digital Equipment CorporationSession control in network for digital data processing system which supports multiple transfer protocols
US5535331A (en)1987-09-041996-07-09Texas Instruments IncorporatedProcessor condition sensing circuits, systems and methods
US4999806A (en)1987-09-041991-03-12Fred ChernowSoftware distribution system
US5005122A (en)1987-09-081991-04-02Digital Equipment CorporationArrangement with cooperating management server node and network service node
DE3888068D1 (en)1987-09-301994-04-07Thomson Brandt Gmbh Method and circuit arrangement for recognizing a signal contained in a video signal.
JPH0731652Y2 (en)1987-10-291995-07-19シャープ株式会社 Printing system
US5390297A (en)1987-11-101995-02-14Auto-Trol Technology CorporationSystem for controlling the number of concurrent copies of a program in a network based on the number of available licenses
US4975878A (en)1988-01-281990-12-04National SemiconductorProgrammable memory data protection scheme
US5005200A (en)1988-02-121991-04-02Fischer Addison MPublic key/signature cryptosystem with enhanced digital signature certification
US5214702A (en)1988-02-121993-05-25Fischer Addison MPublic key/signature cryptosystem with enhanced digital signature certification
US4868877A (en)1988-02-121989-09-19Fischer Addison MPublic key/signature cryptosystem with enhanced digital signature certification
US4937863A (en)1988-03-071990-06-26Digital Equipment CorporationSoftware licensing management system
JP2635087B2 (en)1988-03-251997-07-30株式会社日立製作所 Process control method
GB8809346D0 (en)1988-04-201988-05-25Emi Plc ThornImprovements relating to marked recorded signals
US5113518A (en)1988-06-031992-05-12Durst Jr Robert TMethod and system for preventing unauthorized use of software
US4924378A (en)1988-06-131990-05-08Prime Computer, Inc.License mangagement system and license storage key
US5191573A (en)1988-06-131993-03-02Hair Arthur RMethod for transmitting a desired digital video or audio signal
US5185717A (en)1988-08-051993-02-09Ryoichi MoriTamper resistant module having logical elements arranged in multiple layers on the outer surface of a substrate to protect stored information
AU4188289A (en)1988-08-161990-03-23Indata, CorporationInformation distribution system
US5247575A (en)1988-08-161993-09-21Sprague Peter JInformation distribution system
US5111390A (en)1988-08-221992-05-05Unisys CorporationSoftware security system for maintaining integrity of compiled object code by restricting users ability to define compilers
US5023907A (en)1988-09-301991-06-11Apollo Computer, Inc.Network license server
US4953209A (en)1988-10-311990-08-28International Business Machines Corp.Self-verifying receipt and acceptance system for electronically delivered data objects
US4949187A (en)1988-12-161990-08-14Cohen Jason MVideo communications system having a remotely controlled central source of video and audio data
US4919545A (en)1988-12-221990-04-24Gte Laboratories IncorporatedDistributed security procedure for intelligent networks
US4962533A (en)1989-02-171990-10-09Texas Instrument IncorporatedData protection for computer systems
EP0383985A1 (en)1989-02-241990-08-29Claus Peter Prof. Dr. SchnorrMethod for subscriber identification and for generation and verification of electronic signatures in a data exchange system
US4941175A (en)1989-02-241990-07-10International Business Machines CorporationTamper-resistant method for authorizing access to data between a host and a predetermined number of attached workstations
US5065429A (en)1989-04-031991-11-12Lang Gerald SMethod and apparatus for protecting material on storage media
US5325524A (en)1989-04-061994-06-28Digital Equipment CorporationLocating mobile objects in a distributed computer system
US5199066A (en)1989-04-181993-03-30Special Effects Software, Inc.Method and apparatus for protecting software
US5227797A (en)1989-04-251993-07-13Murphy Quentin MRadar tomography
WO1990013865A1 (en)1989-04-281990-11-15Softel, Inc.Method and apparatus for remotely controlling and monitoring the use of computer software
CA2053261A1 (en)1989-04-281990-10-29Gary D. HornbuckleMethod and apparatus for remotely controlling and monitoring the use of computer software
DE69031191T2 (en)1989-05-151998-02-12Ibm System for controlling access privileges
US5075847A (en)1989-05-261991-12-24Hewlett-Packard CompanyMethod and apparatus for computer program encapsulation
US5442645A (en)1989-06-061995-08-15Bull Cp8Method for checking the integrity of a program or data, and apparatus for implementing this method
US5129084A (en)1989-06-291992-07-07Digital Equipment CorporationObject container transfer system and method in an object based computer operating system
US5347579A (en)1989-07-051994-09-13Blandford Robert RPersonal computer diary
US5257369A (en)1990-10-221993-10-26Skeen Marion DApparatus and method for providing decoupling of data exchange details for providing high performance communication between software processes
US5557798A (en)1989-07-271996-09-17Tibco, Inc.Apparatus and method for providing decoupling of data exchange details for providing high performance communication between software processes
US5187787B1 (en)1989-07-271996-05-07Teknekron Software Systems IncApparatus and method for providing decoupling of data exchange details for providing high performance communication between software processes
US6044205A (en)1996-02-292000-03-28Intermind CorporationCommunications system for transferring information between memories according to processes transferred with the information
US5126936A (en)1989-09-011992-06-30Champion SecuritiesGoal-directed financial asset management system
US5027397A (en)1989-09-121991-06-25International Business Machines CorporationData protection by detection of intrusion into electronic assemblies
US5138712A (en)1989-10-021992-08-11Sun Microsystems, Inc.Apparatus and method for licensing software on a network of computers
US5048085A (en)1989-10-061991-09-10International Business Machines CorporationTransaction system security method and apparatus
US5148481A (en)1989-10-061992-09-15International Business Machines CorporationTransaction system security method and apparatus
US5136643A (en)1989-10-131992-08-04Fischer Addison MPublic/key date-time notary facility
US5001752A (en)1989-10-131991-03-19Fischer Addison MPublic/key date-time notary facility
US5241671C1 (en)1989-10-262002-07-02Encyclopaedia Britannica EducaMultimedia search system using a plurality of entry path means which indicate interrelatedness of information
US5201047A (en)1989-12-211993-04-06International Business Machines CorporationAttribute-based classification and retrieval system
US5163091A (en)1990-01-291992-11-10Graziano James MKnowledge based system for document authentication (apparatus)
US5218605A (en)1990-01-311993-06-08Hewlett-Packard CompanySoftware modules for testing computer hardware and software
US5251294A (en)1990-02-071993-10-05Abelow Daniel HAccessing, assembling, and using bodies of information
US5263157A (en)1990-02-151993-11-16International Business Machines CorporationMethod and system for providing user access control within a distributed data processing system by the exchange of access control profiles
US5263158A (en)1990-02-151993-11-16International Business Machines CorporationMethod and system for variable authority level user access control in a distributed data processing system having multiple resource manager
US5263165A (en)1990-02-151993-11-16International Business Machines CorporationSystem for providing user access control within a distributed data processing system having multiple resource managers
US5119493A (en)1990-02-231992-06-02International Business Machines CorporationSystem for recording at least one selected activity from a selected resource object within a distributed data processing system
US5249294A (en)1990-03-201993-09-28General Instrument CorporationDetermination of time of execution of predetermined data processing routing in relation to occurrence of prior externally observable event
DE69031758T2 (en)1990-04-131998-05-28Koninkl Philips Electronics Nv Process for organizing and accessing product descriptive data in connection with a technical process
US5022080A (en)1990-04-161991-06-04Durst Robert TElectronic notary
FR2662007B1 (en)1990-05-101992-07-10Bull Sa PROCESS FOR OBTAINING A SECURE CLEAR ATTESTATION IN A DISTRIBUTED COMPUTER SYSTEM ENVIRONMENT.
EP0456386B1 (en)1990-05-111998-11-11International Computers LimitedAccess control in a distributed computer system
EP0459046A1 (en)1990-05-311991-12-04International Business Machines CorporationComputer software protection
NL9001368A (en)1990-06-151992-01-02Tel Developments B V SECURITY OF OBJECTS OR DOCUMENTS.
US5050212A (en)1990-06-201991-09-17Apple Computer, Inc.Method and apparatus for verifying the integrity of a file stored separately from a computer
US5032979A (en)1990-06-221991-07-16International Business Machines CorporationDistributed security auditing subsystem for an operating system
US5201046A (en)1990-06-221993-04-06Xidak, Inc.Relational database management system and method for storing, retrieving and modifying directed graph data structures
US5103459B1 (en)1990-06-251999-07-06Qualcomm IncSystem and method for generating signal waveforms in a cdma cellular telephone system
US5168147A (en)1990-07-311992-12-01Xerox CorporationBinary image processing for decoding self-clocking glyph shape codes
US5128525A (en)1990-07-311992-07-07Xerox CorporationConvolution filtering for decoding self-clocking glyph shape codes
US5091966A (en)1990-07-311992-02-25Xerox CorporationAdaptive scaling for decoding spatially periodic self-clocking glyph shape codes
CA2044404C (en)1990-07-311998-06-23Dan S. BloombergSelf-clocking glyph shape codes
US5136647A (en)1990-08-021992-08-04Bell Communications Research, Inc.Method for secure time-stamping of digital documents
US5136646A (en)1991-03-081992-08-04Bell Communications Research, Inc.Digital document time-stamping with catenate certificate
US5058162A (en)1990-08-091991-10-15Hewlett-Packard CompanyMethod of distributing computer data files
US5224163A (en)1990-09-281993-06-29Digital Equipment CorporationMethod for delegating authorization from one entity to another through the use of session encryption keys
US5251304A (en)1990-09-281993-10-05Motorola, Inc.Integrated circuit microcontroller with on-chip memory and external bus interface and programmable mechanism for securing the contents of on-chip memory
ES2156857T3 (en)1990-10-012001-08-01Thomas A Bush TRANSACTIONAL PROCESSING SYSTEM.
US5222134A (en)1990-11-071993-06-22Tau Systems CorporationSecure system for activating personal computer software at remote locations
US5103476A (en)1990-11-071992-04-07Waite David PSecure system for activating personal computer software at remote locations
US5758152A (en)1990-12-061998-05-26Prime Arithmetics, Inc.Method and apparatus for the generation and manipulation of data structures
US5504818A (en)1991-04-191996-04-02Okano; HirokazuInformation processing system using error-correcting codes and cryptography
US5297282A (en)1991-05-291994-03-22Toshiba America Information Systems, Inc.Resume processing function for the OS/2 operating system
US5237614A (en)1991-06-071993-08-17Security Dynamics Technologies, Inc.Integrated network security system
SE513182C2 (en)1991-06-122000-07-24Icl Systems Ab Procedure and system for auditing data in a distributed computer system
FR2678121B1 (en)1991-06-181994-04-29Matra Communication DEVICE FOR INSERTING DIGITAL PACKETS IN A TRANSMISSION CHANNEL.
US5193180A (en)1991-06-211993-03-09Pure Software Inc.System for modifying relocatable object code files to monitor accesses to dynamically allocated memory
US5319785A (en)1991-06-281994-06-07Digital Equipment CorporationPolling of I/O device status comparison performed in the polled I/O device
US5438508A (en)1991-06-281995-08-01Digital Equipment CorporationLicense document interchange format for license management system
US5260999A (en)1991-06-281993-11-09Digital Equipment CorporationFilters in license management system
US5204897A (en)1991-06-281993-04-20Digital Equipment CorporationManagement interface for license management system
US5940504A (en)1991-07-011999-08-17Infologic Software, Inc.Licensing management system and method in which datagrams including an address of a licensee and indicative of use of a licensed product are sent from the licensee's site
US5577209A (en)1991-07-111996-11-19Itt CorporationApparatus and method for providing multi-level security for communication among computers and terminals on a network
US5383113A (en)1991-07-251995-01-17Checkfree CorporationSystem and method for electronically providing customer services including payment of bills, financial analysis and loans
US5367621A (en)1991-09-061994-11-22International Business Machines CorporationData processing method to provide a generalized link from a reference point in an on-line book to an arbitrary multimedia object which can be dynamically updated
US5301326A (en)1991-09-241994-04-05Microsoft CorporationMethod and system for controlling the execution of an application program
US5355474A (en)1991-09-271994-10-11Thuraisngham Bhavani MSystem for multilevel secure database management using a knowledge base with release-based and other security constraints for query, response and update modification
FR2681997A1 (en)1991-09-301993-04-02Arbitron Cy METHOD AND DEVICE FOR AUTOMATICALLY IDENTIFYING A PROGRAM COMPRISING A SOUND SIGNAL
JP3065738B2 (en)1991-10-112000-07-17株式会社東芝 Computer system
GB9121995D0 (en)1991-10-161991-11-27Jonhig LtdValue transfer system
US5265164A (en)1991-10-311993-11-23International Business Machines CorporationCryptographic facility environment backup/restore and replication in a public key cryptosystem
US5164988A (en)1991-10-311992-11-17International Business Machines CorporationMethod to establish and enforce a network cryptographic security policy in a public key cryptosystem
US5557518A (en)1994-04-281996-09-17Citibank, N.A.Trusted agents for open electronic commerce
US5453601A (en)1991-11-151995-09-26Citibank, N.A.Electronic-monetary system
US5455861A (en)1991-12-091995-10-03At&T Corp.Secure telecommunications
US5276901A (en)1991-12-161994-01-04International Business Machines CorporationSystem for controlling group access to objects using group access control folder and group identification as individual user
US5150407A (en)1991-12-161992-09-22Chan Steve S CSecured data storage devices
US5319735A (en)1991-12-171994-06-07Bolt Beranek And Newman Inc.Embedded signalling
GB9126779D0 (en)1991-12-171992-02-12Int Computers LtdSecurity mechanism for a computer system
US5359721A (en)1991-12-181994-10-25Sun Microsystems, Inc.Non-supervisor mode cross address space dynamic linking
US5245165A (en)1991-12-271993-09-14Xerox CorporationSelf-clocking glyph code for encoding dual bit digital values robustly
US5221833A (en)1991-12-271993-06-22Xerox CorporationMethods and means for reducing bit error rates in reading self-clocking glyph codes
US5199074A (en)1992-01-061993-03-30Advanced Micro Devices, Inc.Encryption system
US5231568A (en)1992-01-161993-07-27Impact Telemedia, Inc.Promotional game method and apparatus therefor
US5428685A (en)1992-01-221995-06-27Fujitsu LimitedIC memory card and method of protecting data therein
US5335169A (en)1992-01-271994-08-02Dsi Of Hawaii, Inc.System for tracking multiple rate assessments on transactions
US5521815A (en)1992-01-311996-05-28K.L.E. Irrevocable TrustUniform system for verifying and tracking articles of value
JP2942837B2 (en)1992-01-311999-08-30株式会社セガ・エンタープライゼス Security check method, game device, and information storage medium used for them
US5301231A (en)1992-02-121994-04-05International Business Machines CorporationUser defined function facility
GB2264796A (en)1992-03-021993-09-08IbmDistributed transaction processing
CA2093094C (en)1992-04-062000-07-11Addison M. FischerMethod and apparatus for creating, supporting, and using travelling programs
US5291598A (en)1992-04-071994-03-01Gregory GrundyMethod and system for decentralized manufacture of copy-controlled software
US5392390A (en)1992-04-101995-02-21Intellilink Corp.Method for mapping, translating, and dynamically reconciling data between disparate computer platforms
US5276735A (en)1992-04-171994-01-04Secure Computing CorporationData enclave and trusted path system
JP2659896B2 (en)1992-04-291997-09-30インターナショナル・ビジネス・マシーンズ・コーポレイション Structured document copy management method and structured document copy management device
US5421006A (en)1992-05-071995-05-30Compaq Computer Corp.Method and apparatus for assessing integrity of computer system software
EP0570123B1 (en)1992-05-151999-03-17Addison M. FischerComputer system security method and apparatus having program authorization information data structures
US5412717A (en)1992-05-151995-05-02Fischer; Addison M.Computer system security method and apparatus having program authorization information data structures
CA2114548A1 (en)1992-05-291993-12-09Murat KuntMethod for the marking of documents
US5596718A (en)1992-07-101997-01-21Secure Computing CorporationSecure computer network using trusted path subsystem which encrypts/decrypts and communicates with user through local workstation user I/O devices without utilizing workstation processor
EP0581421B1 (en)1992-07-202003-01-15Compaq Computer CorporationMethod and system for certificate based alias detection
US5235642A (en)1992-07-211993-08-10Digital Equipment CorporationAccess control subsystem and method for distributed computer system using locally cached authentication credentials
DE69233708T2 (en)1992-07-312008-05-21Micron Technology, Inc. Device and method for creating network security
US5721788A (en)1992-07-311998-02-24Corbis CorporationMethod and system for digital image signatures
US5285494A (en)1992-07-311994-02-08Pactel CorporationNetwork management system
US5361359A (en)1992-08-311994-11-01Trusted Information Systems, Inc.System and method for controlling the use of a computer
US5287408A (en)1992-08-311994-02-15Autodesk, Inc.Apparatus and method for serializing and validating copies of computer software
US5819226A (en)1992-09-081998-10-06Hnc Software Inc.Fraud detection using predictive modeling
NZ255971A (en)1992-09-211997-05-26Uniloc Singapore Private LtdSoftware registration and licensing system uses matching of licensee indentification codes
JP3084969B2 (en)1992-10-162000-09-04松下電器産業株式会社 Playback device, recording device, cased recording medium, and recording medium initialization device
US5319705A (en)1992-10-211994-06-07International Business Machines CorporationMethod and system for multimedia access control enablement
GB2295947B (en)1992-10-271997-08-13Mitsubishi CorpPay broadcasting system
US5535322A (en)1992-10-271996-07-09International Business Machines CorporationData processing system with improved work flow system and method
US5343526A (en)1992-10-301994-08-30At&T Bell LaboratoriesMethod for establishing licensor changeable limits on software usage
US5349642A (en)1992-11-031994-09-20Novell, Inc.Method and apparatus for authentication of client server communication
US5432928A (en)1992-11-101995-07-11Microsoft CorporationUpdating objects stored in a permanent container while preserving logical contiguity
JP3181592B2 (en)1992-12-012001-07-03マイクロソフト コーポレイション Method and system for in-place interaction with embedded objects
US5341429A (en)1992-12-041994-08-23Testdrive CorporationTransformation of ephemeral material
US6266654B1 (en)1992-12-152001-07-24Softlock.Com, Inc.Method for tracking software lineage
US5509070A (en)1992-12-151996-04-16Softlock Services Inc.Method for encouraging purchase of executable and non-executable software
US5373561A (en)1992-12-211994-12-13Bell Communications Research, Inc.Method of extending the validity of a cryptographic certificate
US5630069A (en)1993-01-151997-05-13Action Technologies, Inc.Method and apparatus for creating workflow maps of business processes
US5497491A (en)1993-01-261996-03-05International Business Machines CorporationSystem and method for importing and exporting data between an object oriented computing environment and an external computing environment
US5369707A (en)1993-01-271994-11-29Tecsec IncorporatedSecure network method and apparatus
US5351293A (en)1993-02-011994-09-27Wave Systems Corp.System method and apparatus for authenticating an encrypted signal
AU6133594A (en)1993-02-081994-08-29Action Technologies, Inc.Method and apparatus for managing business processes
US5390330A (en)1993-02-111995-02-14Talati; Kirit K.Control system and method for direct execution of software application information models without code generation
US5640546A (en)1993-02-231997-06-17Network Programs, Inc.Composition of systems of objects by interlocking coordination, projection, and distribution
US5365587A (en)1993-03-111994-11-15International Business Machines CorporationSelf modifying access code for altering capabilities
US5315448A (en)1993-03-181994-05-24Macrovision CorporationCopy protection for hybrid digital video tape recording and unprotected source material
FR2703800B1 (en)1993-04-061995-05-24Bull Cp8 Method for signing a computer file, and device for implementing it.
US5408501A (en)1993-04-061995-04-18Conner Peripherals, Inc.Data transfer system
JP3255754B2 (en)1993-04-232002-02-12富士通株式会社 Electronic trading system
US5422953A (en)1993-05-051995-06-06Fischer; Addison M.Personal date/time notary device
US5504837A (en)1993-05-101996-04-02Bell Communications Research, Inc.Method for resolving conflicts among distributed entities through the generation of counter proposals by transversing a goal hierarchy with acceptable, unacceptable, and indeterminate nodes
US5583936A (en)1993-05-171996-12-10Macrovision CorporationVideo copy protection process enhancement to introduce horizontal and vertical picture distortions
US5649099A (en)1993-06-041997-07-15Xerox CorporationMethod for delegating access rights through executable access control program without delegating access rights not in a specification to any intermediary nor comprising server security
US5337357A (en)1993-06-171994-08-09Software Security, Inc.Method of software distribution protection
US5550971A (en)1993-06-301996-08-27U S West Technologies, Inc.Method and system for generating a user interface adaptable to various database management systems
US5428606A (en)1993-06-301995-06-27Moskowitz; Scott A.Digital information commodities exchange
US5603031A (en)1993-07-081997-02-11General Magic, Inc.System and method for distributed computation based upon the movement, execution, and interaction of processes in a network
US5418713A (en)1993-08-051995-05-23Allen; RichardApparatus and method for an on demand data delivery system for the preview, selection, retrieval and reproduction at a remote location of previously recorded or programmed materials
AU683038B2 (en)1993-08-101997-10-30Addison M. FischerA method for operating computers and for processing information among computers
US5458494A (en)1993-08-231995-10-17Edutech Research Labs, Ltd.Remotely operable teaching system and method therefor
IL110891A (en)1993-09-141999-03-12SpyrusSystem and method for data access control
JPH07175868A (en)1993-10-151995-07-14Internatl Business Mach Corp <Ibm>Method and system for output of digital information to medium
US5369702A (en)1993-10-181994-11-29Tecsec IncorporatedDistributed cryptographic object method
CA2129075C (en)1993-10-181999-04-20Joseph J. DanieleElectronic copyright royalty accounting system using glyphs
US5432851A (en)1993-10-211995-07-11Tecsec IncorporatedPersonal computer access control system
US6135646A (en)1993-10-222000-10-24Corporation For National Research InitiativesSystem for uniquely and persistently identifying, managing, and tracking digital objects
US5343527A (en)1993-10-271994-08-30International Business Machines CorporationHybrid encryption method and system for protecting reusable software components
JPH07212712A (en)1993-10-291995-08-11Eastman Kodak CoMethod and equipment for adding and deleting digital watermark in hierarchical picture memory and fetch system
US5463565A (en)1993-10-291995-10-31Time Warner Entertainment Co., L.P.Data block format for software carrier and player therefor
US5455953A (en)1993-11-031995-10-03Wang Laboratories, Inc.Authorization system for obtaining in single step both identification and access rights of client to server directly from encrypted authorization ticket
US5537526A (en)1993-11-121996-07-16Taugent, Inc.Method and apparatus for processing a display document utilizing a system level document framework
US5625690A (en)1993-11-151997-04-29Lucent Technologies Inc.Software pay per use system
US6449377B1 (en)1995-05-082002-09-10Digimarc CorporationMethods and systems for watermark processing of line art images
US5710834A (en)1995-05-081998-01-20Digimarc CorporationMethod and apparatus responsive to a code signal conveyed through a graphic image
US5636292C1 (en)1995-05-082002-06-18Digimarc CorpSteganography methods employing embedded calibration data
US6611607B1 (en)1993-11-182003-08-26Digimarc CorporationIntegrating digital watermarks in multimedia content
US5748783A (en)1995-05-081998-05-05Digimarc CorporationMethod and apparatus for robust information coding
US5768426A (en)1993-11-181998-06-16Digimarc CorporationGraphics processing system employing embedded code signals
US5748763A (en)1993-11-181998-05-05Digimarc CorporationImage steganography system featuring perceptually adaptive and globally scalable signal embedding
US5832119C1 (en)1993-11-182002-03-05Digimarc CorpMethods for controlling systems using control signals embedded in empirical data
ATE287176T1 (en)1993-11-182005-01-15Digimarc Corp VIDEO WITH HIDDEN IN-BAND DIGITAL DATA
US6549638B2 (en)1998-11-032003-04-15Digimarc CorporationMethods for evidencing illicit use of a computer system or device
US5572673A (en)1993-12-011996-11-05Sybase, Inc.Secure multi-level system for executing stored procedures
EP1235177A3 (en)1993-12-162003-10-08divine technology venturesDigital active advertising
US6086706A (en)1993-12-202000-07-11Lucent Technologies Inc.Document copying deterrent method
US5491800A (en)1993-12-201996-02-13Taligent, Inc.Object-oriented remote procedure call networking system
US5453605A (en)1993-12-221995-09-26Xerox CorporationGlobal addressability for self-clocking glyph codes
US5449895A (en)1993-12-221995-09-12Xerox CorporationExplicit synchronization for self-clocking glyph codes
US5449896A (en)1993-12-221995-09-12Xerox CorporationRandom access techniques for use with self-clocking glyph codes
US5513261A (en)1993-12-291996-04-30At&T Corp.Key management scheme for use with electronic cards
US5450493A (en)1993-12-291995-09-12At&T Corp.Secure communication method and apparatus
US5473687A (en)1993-12-291995-12-05Infosafe Systems, Inc.Method for retrieving secure information from a database
US5457747A (en)1994-01-141995-10-10Drexler Technology CorporationAnti-fraud verification system using a data card
US5420927B1 (en)1994-02-011997-02-04Silvio MicaliMethod for certifying public keys in a digital signature scheme
US5394469A (en)1994-02-181995-02-28Infosafe Systems, Inc.Method and apparatus for retrieving secure information from mass storage media
US5530752A (en)1994-02-221996-06-25Convex Computer CorporationSystems and methods for protecting software from unlicensed copying and use
JP2853727B2 (en)1994-02-221999-02-03日本ビクター株式会社 Reproduction protection method and protection reproduction device
AU693147B2 (en)1994-02-281998-06-25Sony CorporationMethod and device for recording data, data recording medium,and method and device for reproducing data
RU95103479A (en)*1994-03-111996-12-27Уолкер Эссет Мэнеджмент Лимитед Партнершип (US)Game system, game computer, method for playing or drawing lottery when player participates in it
US5499298A (en)1994-03-171996-03-12National University Of SingaporeControlled dissemination of digital information
DE69500885T2 (en)1994-03-211998-05-20Object Technology Licensing Corp., Cupertino, Calif. METHOD AND DEVICE FOR PROCESSING A DOCUMENT
US5450490A (en)1994-03-311995-09-12The Arbitron CompanyApparatus and methods for including codes in audio signals and decoding
DE4413451A1 (en)1994-04-181995-12-14Rolf Brugger Device for the distribution of music information in digital form
US5505461A (en)1994-04-191996-04-09Caesars World, Inc.Method for meeting IRS reporting requirements related to an electronic gaming machine
US5563946A (en)1994-04-251996-10-08International Business Machines CorporationMethod and apparatus for enabling trial period use of software products: method and apparatus for passing encrypted files between data processing systems
US5644686A (en)1994-04-291997-07-01International Business Machines CorporationExpert system and method employing hierarchical knowledge base, and interactive multimedia/hypermedia applications
US5539828A (en)1994-05-311996-07-23Intel CorporationApparatus and method for providing secured communications
US5473692A (en)1994-09-071995-12-05Intel CorporationRoving software license for a hardware agent
US5724425A (en)1994-06-101998-03-03Sun Microsystems, Inc.Method and apparatus for enhancing software security and distributing software
US5533123A (en)1994-06-281996-07-02National Semiconductor CorporationProgrammable distributed personal security
US5513260A (en)1994-06-291996-04-30Macrovision CorporationMethod and apparatus for copy protection for various recording media
US5739864A (en)1994-08-241998-04-14Macrovision CorporationApparatus for inserting blanked formatted fingerprint data (source ID, time/date) in to a video signal
US5664191A (en)1994-06-301997-09-02Microsoft CorporationMethod and system for improving the locality of memory references during execution of a computer program
US5559884A (en)1994-06-301996-09-24Microsoft CorporationMethod and system for generating and auditing a signature for a computer program
US5999711A (en)1994-07-181999-12-07Microsoft CorporationMethod and system for providing certificates holding authentication and authorization information for users/machines
CA2128587A1 (en)1994-07-211996-01-22Ed MorsonMethod and arrangement for recognition of a coded transmitted signal
US5574787A (en)1994-07-251996-11-12Ryan; John O.Apparatus and method for comprehensive copy protection for video platforms and unprotected source material
US5590194A (en)1994-08-091996-12-31Macrovision CorporationMethod of and apparatus for scrambling a video signal with full network transmission and recording capability
DE69534757T2 (en)1994-09-152006-08-31International Business Machines Corp. System and method for secure storage and distribution of data using digital signatures
US5606609A (en)1994-09-191997-02-25Scientific-AtlantaElectronic document verification system and method
DE69517945T2 (en)1994-09-212001-01-11Kodak Ltd., Hemel Hempstead LINK MANAGER TO INTEGRATE DATA BETWEEN USER PROGRAMS
US5504757A (en)1994-09-271996-04-02International Business Machines CorporationMethod for selecting transmission speeds for transmitting data packets over a serial bus
US5678170A (en)1994-10-051997-10-14Motorola, Inc.Method and apparatus for monitoring and limiting distribution of data
US5842173A (en)1994-10-141998-11-24Strum; David P.Computer-based surgical services management system
ZA958446B (en)1994-10-191996-05-27IntergameA method and system for cashless gaming machine operation
US5715314A (en)1994-10-241998-02-03Open Market, Inc.Network sales system
US5717923A (en)1994-11-031998-02-10Intel CorporationMethod and apparatus for dynamically customizing electronic information to individual end users
JPH08263438A (en)1994-11-231996-10-11Xerox CorpDistribution and use control system of digital work and access control method to digital work
US5629980A (en)1994-11-231997-05-13Xerox CorporationSystem for controlling the distribution and use of digital works
US5715403A (en)1994-11-231998-02-03Xerox CorporationSystem for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar
US5638443A (en)1994-11-231997-06-10Xerox CorporationSystem for controlling the distribution and use of composite digital works
US5634012A (en)1994-11-231997-05-27Xerox CorporationSystem for controlling the distribution and use of digital works having a fee reporting mechanism
KR100332743B1 (en)1994-11-262002-11-07엘지전자주식회사Device and method for preventing illegal copy or unauthorized watching of digital image
US5758257A (en)1994-11-291998-05-26Herz; FrederickSystem and method for scheduling broadcast of and access to video programs and other data using customer profiles
US5553282A (en)1994-12-091996-09-03Taligent, Inc.Software project history database and method of operation
US5655077A (en)1994-12-131997-08-05Microsoft CorporationMethod and system for authenticating access to heterogeneous computing services
US5802590A (en)1994-12-131998-09-01Microsoft CorporationMethod and system for providing secure access to computer resources
EP0717337B1 (en)1994-12-132001-08-01International Business Machines CorporationMethod and system for the secured distribution of programs
US5646997A (en)1994-12-141997-07-08Barton; James M.Method and apparatus for embedding authentication information within digital data
US5745569A (en)1996-01-171998-04-28The Dice CompanyMethod for stega-cipher protection of computer code
US5732400A (en)1995-01-041998-03-24Citibank N.A.System and method for a risk-based purchase of goods
US5692180A (en)1995-01-311997-11-25International Business Machines CorporationObject-oriented cell directory database for a distributed computing environment
SE504085C2 (en)1995-02-011996-11-04Greg Benson Methods and systems for managing data objects in accordance with predetermined conditions for users
JPH08214281A (en)1995-02-061996-08-20Sony CorpCharging method and system
US6658568B1 (en)1995-02-132003-12-02Intertrust Technologies CorporationTrusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management
US6948070B1 (en)1995-02-132005-09-20Intertrust Technologies CorporationSystems and methods for secure transaction management and electronic rights protection
US7069451B1 (en)1995-02-132006-06-27Intertrust Technologies Corp.Systems and methods for secure transaction management and electronic rights protection
US7165174B1 (en)1995-02-132007-01-16Intertrust Technologies Corp.Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management
CN101398871B (en)1995-02-132011-05-18英特特拉斯特技术公司Systems and methods for secure transaction management and electronic rights protection
US6157721A (en)1996-08-122000-12-05Intertrust Technologies Corp.Systems and methods using cryptography to protect secure computing environments
US7124302B2 (en)1995-02-132006-10-17Intertrust Technologies Corp.Systems and methods for secure transaction management and electronic rights protection
US5892900A (en)1996-08-301999-04-06Intertrust Technologies Corp.Systems and methods for secure transaction management and electronic rights protection
US5943422A (en)1996-08-121999-08-24Intertrust Technologies Corp.Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
US5530235A (en)1995-02-161996-06-25Xerox CorporationInteractive contents revealing storage device
US5774872A (en)1995-03-311998-06-30Richard GoldenAutomated taxable transaction reporting/collection system
US5701452A (en)1995-04-201997-12-23Ncr CorporationComputer generated structure
US5831051A (en)*1995-05-091998-11-03The Rockefeller UniversityReceptor for peptide hormones involved in energy homeostasis, and method and compositions for use thereof
US5534975A (en)1995-05-261996-07-09Xerox CorporationDocument processing system utilizing document service cards to provide document processing services
US5870543A (en)*1995-06-071999-02-09Digital River, Inc.System for preventing unauthorized copying of active software
US5613004A (en)1995-06-071997-03-18The Dice CompanySteganographic method and device
US5740549A (en)1995-06-121998-04-14Pointcast, Inc.Information and advertising distribution system and method
US5592549A (en)1995-06-151997-01-07Infosafe Systems, Inc.Method and apparatus for retrieving selected information from a secure information source
US5699427A (en)1995-06-231997-12-16International Business Machines CorporationMethod to deter document and intellectual property piracy through individualization
US5689565A (en)1995-06-291997-11-18Microsoft CorporationCryptography system and method for providing cryptographic services for a computer application
US5970143A (en)*1995-11-221999-10-19Walker Asset Management LpRemote-auditing of computer generated outcomes, authenticated billing and access control, and software metering system using cryptographic and other protocols
US5625693A (en)1995-07-071997-04-29Thomson Consumer Electronics, Inc.Apparatus and method for authenticating transmitting applications in an interactive TV system
US5802497A (en)1995-07-101998-09-01Digital Equipment CorporationMethod and apparatus for conducting computerized commerce
US6006328A (en)1995-07-141999-12-21Christopher N. DrakeComputer software authentication, protection, and security system
WO1997004394A1 (en)1995-07-141997-02-06Christopher Nathan DrakeComputer software authentication, protection, and security system
US5878421A (en)1995-07-171999-03-02Microsoft CorporationInformation map
US7562392B1 (en)*1999-05-192009-07-14Digimarc CorporationMethods of interacting with audio and ambient music
JPH0944993A (en)1995-07-311997-02-14Pioneer Electron CorpInformation recording method and device therefor, function recording method and device therefor and information reproducing method and device therefor
JP4518574B2 (en)1995-08-112010-08-04ソニー株式会社 Recording method and apparatus, recording medium, and reproducing method and apparatus
US5913040A (en)1995-08-221999-06-15Backweb Ltd.Method and apparatus for transmitting and displaying information between a remote network and a local computer
KR0166923B1 (en)1995-09-181999-03-20구자홍Method and apparatus of preventing an illegal watching and copying in a digital broadcasting system
JP4033901B2 (en)1995-10-092008-01-16松下電器産業株式会社 Data transmission device, data reception device, information processing apparatus, and data transmission method
US5765152A (en)1995-10-131998-06-09Trustees Of Dartmouth CollegeSystem and method for managing copyrighted electronic media
US6807534B1 (en)1995-10-132004-10-19Trustees Of Dartmouth CollegeSystem and method for managing copyrighted electronic media
US5689566A (en)1995-10-241997-11-18Nguyen; Minhtam C.Network with secure communications sessions
US5757914A (en)1995-10-261998-05-26Sun Microsystems, Inc.System and method for protecting use of dynamically linked executable modules
US5732398A (en)1995-11-091998-03-24Keyosk Corp.Self-service system for selling travel-related services or products
US5671279A (en)1995-11-131997-09-23Netscape Communications CorporationElectronic commerce using a secure courier system
JPH09160899A (en)1995-12-061997-06-20Matsushita Electric Ind Co Ltd Information service processor
US5692047A (en)1995-12-081997-11-25Sun Microsystems, Inc.System and method for executing verifiable programs with facility for using non-verifiable programs from trusted sources
US5794210A (en)1995-12-111998-08-11Cybergold, Inc.Attention brokerage
US5633932A (en)1995-12-191997-05-27Intel CorporationApparatus and method for preventing disclosure through user-authentication at a printing node
DE69632965T2 (en)1996-01-032005-08-25Sony Electronics Inc. COPY-PROOF RECORDING AND PLAYBACK SYSTEM
JP2000503154A (en)1996-01-112000-03-14エムアールジェイ インコーポレイテッド System for controlling access and distribution of digital ownership
JP3627384B2 (en)*1996-01-172005-03-09富士ゼロックス株式会社 Information processing apparatus with software protection function and information processing method with software protection function
US5754849A (en)1996-01-301998-05-19Wayfarer Communications, Inc.Self-describing object providing dynamic manipulation of heterogeneous data values and semantic identity between memory and transmission representations
US5930768A (en)1996-02-061999-07-27Supersonic Boom, Inc.Method and system for remote user controlled manufacturing
US5689587A (en)1996-02-091997-11-18Massachusetts Institute Of TechnologyMethod and apparatus for data hiding in images
US5896454A (en)1996-03-081999-04-20Time Warner Entertainment Co., L.P.System and method for controlling copying and playing of digital programs
US5949885A (en)1996-03-121999-09-07Leighton; F. ThomsonMethod for protecting content using watermarking
JP3816571B2 (en)1996-03-152006-08-30パイオニア株式会社 Information recording apparatus, information recording method, information reproducing apparatus, and information reproducing method
US5991876A (en)1996-04-011999-11-23Copyright Clearance Center, Inc.Electronic rights management and authorization system
US5826268A (en)1996-04-121998-10-20Ontos, Inc.Secure multilevel object oriented database management system
US5978484A (en)1996-04-251999-11-02Microsoft CorporationSystem and method for safety distributing executable objects
CN104376032A (en)1996-05-152015-02-25英特托拉斯技术公司Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances
US6205550B1 (en)*1996-06-132001-03-20Intel CorporationTamper resistant methods and apparatus
US6175925B1 (en)*1996-06-132001-01-16Intel CorporationTamper resistant player for scrambled contents
US5819263A (en)1996-07-191998-10-06American Express Financial CorporationFinancial planning system incorporating relationship and group management
JP2000516743A (en)1996-09-042000-12-12インタートラスト テクノロージーズ コーポレイション Credit infrastructure support system, secure e-commerce, e-commerce, methods and techniques for trade process control and automation, distributed computing and rights management
US5692980A (en)1996-10-241997-12-02Trotman; Stephenson E.Kick bag game and apparatus kit
US6029145A (en)*1997-01-062000-02-22Isogon CorporationSoftware license verification process and apparatus
US6141698A (en)*1997-01-292000-10-31Network Commerce Inc.Method and system for injecting new code into existing application code
US5920861A (en)1997-02-251999-07-06Intertrust Technologies Corp.Techniques for defining using and manipulating rights management data structures
US5999949A (en)1997-03-141999-12-07Crandall; Gary E.Text file compression system utilizing word terminators
US6108420A (en)1997-04-102000-08-22Channelware Inc.Method and system for networked installation of uniquely customized, authenticable, and traceable software application
US6092147A (en)*1997-04-152000-07-18Sun Microsystems, Inc.Virtual machine with securely distributed bytecode verification
US6101605A (en)*1997-05-152000-08-08Vlsi Technology, Inc.Method and apparatus for performing a secure operation
US5920881A (en)*1997-05-201999-07-06Micron Electronics, Inc.Method and system for using a virtual register file in system memory
US5966537A (en)1997-05-281999-10-12Sun Microsystems, Inc.Method and apparatus for dynamically optimizing an executable computer program using input data
DE19726027C2 (en)1997-06-191999-05-06Memminger Iro Gmbh Thread delivery device and coupling device
US6272631B1 (en)1997-06-302001-08-07Microsoft CorporationProtected storage of core data secrets
DE19733829C2 (en)*1997-08-052000-02-24Micronas Semiconductor Holding Method for encrypting or decrypting a data sequence
US6055503A (en)1997-08-292000-04-25Preview SystemsSoftware program self-modification
US6119230A (en)1997-10-012000-09-12Novell, Inc.Distributed dynamic security capabilities
US6330549B1 (en)1997-10-302001-12-11Xerox CorporationProtected shareware
US5903761A (en)1997-10-311999-05-11Preemptive Solutions, Inc.Method of reducing the number of instructions in a program code sequence
US6112181A (en)1997-11-062000-08-29Intertrust Technologies CorporationSystems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information
US7092914B1 (en)1997-11-062006-08-15Intertrust Technologies CorporationMethods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information
US6191475B1 (en)1997-11-262001-02-20Intel CorporationSubstrate for reducing electromagnetic interference and enclosure
US6334189B1 (en)*1997-12-052001-12-25Jamama, LlcUse of pseudocode to protect software from unauthorized use
US6167358A (en)1997-12-192000-12-26Nowonder, Inc.System and method for remotely monitoring a plurality of computer-based systems
US6088814A (en)1997-12-302000-07-11Emc CorporationMethod and apparatus for reading a non-configured disc drive in an AS/400 system
US6513118B1 (en)*1998-01-272003-01-28Canon Kabushiki KaishaElectronic watermarking method, electronic information distribution system, image filing apparatus and storage medium therefor
US6069647A (en)1998-01-292000-05-30Intel CorporationConditional access and content security method
US7809138B2 (en)1999-03-162010-10-05Intertrust Technologies CorporationMethods and apparatus for persistent control and protection of content
CA2425741C (en)1998-03-162006-05-23Intertrust Technologies CorporationMethods and apparatus for continuous control and protection of media content
US6102966A (en)1998-03-202000-08-15Preemptive Solutions, Inc.Method for renaming identifiers of a computer program
DE19816356C2 (en)1998-04-032001-01-25Deutsche Telekom Ag Process for inserting tamper-proof digital fingerprints into electronic documents
JP3358532B2 (en)1998-04-272002-12-24日本電気株式会社 Receiving device using electronic watermark
US6504941B2 (en)1998-04-302003-01-07Hewlett-Packard CompanyMethod and apparatus for digital watermarking of images
US6957341B2 (en)*1998-05-142005-10-18Purdue Research FoundationMethod and system for secure computational outsourcing and disguise
JP3156667B2 (en)1998-06-012001-04-16日本電気株式会社 Digital watermark insertion system, digital watermark characteristic table creation device
US6363486B1 (en)1998-06-052002-03-26Intel CorporationMethod of controlling usage of software components
US6523113B1 (en)*1998-06-092003-02-18Apple Computer, Inc.Method and apparatus for copy protection
AU4535699A (en)1998-06-101999-12-30Auckland Uniservices LimitedSoftware watermarking techniques
US6263493B1 (en)1998-07-082001-07-17International Business Machines CorporationMethod and system for controlling the generation of program statements
US20020002678A1 (en)1998-08-142002-01-03Stanley T. ChowInternet authentication technology
US6324569B1 (en)*1998-09-232001-11-27John W. L. OgilvieSelf-removing email verified or designated as such by a message distributor for the convenience of a recipient
US8332478B2 (en)*1998-10-012012-12-11Digimarc CorporationContext sensitive connected content
US6499137B1 (en)1998-10-022002-12-24Microsoft CorporationReversible load-time dynamic linking
JP3397157B2 (en)1999-01-132003-04-14日本電気株式会社 Digital watermark insertion system
US6317834B1 (en)1999-01-292001-11-13International Business Machines CorporationBiometric authentication system with encrypted models
DE69902221T2 (en)1999-02-232003-03-06Taiwan Semiconductor Mfg. Co., Ltd. Memory circuits with built-in self-test
US6553497B1 (en)1999-03-252003-04-22International Business Machines CorporationElectromagnetic field tamper alarm
CA2371115A1 (en)1999-04-222000-11-02Cloakware CorporationDelegation billing
US7263722B1 (en)*1999-05-122007-08-28Fraunhofer Crcg, Inc.Obfuscation of executable code
WO2000072112A2 (en)1999-05-122000-11-30Fraunhofer Crcg, Inc.Obfuscation of executable code
US7421586B2 (en)*1999-05-122008-09-02Fraunhofer GesselschaftProtecting mobile code against malicious hosts
US6834343B1 (en)*1999-05-272004-12-21Microsoft CorporationMethod for watermarking computer programs
US6785815B1 (en)1999-06-082004-08-31Intertrust Technologies Corp.Methods and systems for encoding and protecting data using digital signature and watermarking techniques
US6959384B1 (en)1999-12-142005-10-25Intertrust Technologies CorporationSystems and methods for authenticating and protecting the integrity of data streams and other data
EP1192516A1 (en)1999-06-092002-04-03Cloakware CorporationTamper resistant software encoding
US6385603B1 (en)1999-06-142002-05-07International Business Machines CorporationJoined table expression optimization by query transformation
US6874087B1 (en)1999-07-132005-03-29International Business Machines CorporationIntegrity checking an executable module and associated protected service provider module
WO2001006374A2 (en)1999-07-162001-01-25Intertrust Technologies Corp.System and method for securing an untrusted storage
WO2001010076A2 (en)1999-07-292001-02-08Intertrust Technologies Corp.Systems and methods for protecting secure and insecure computing environments using cryptography
US7770016B2 (en)*1999-07-292010-08-03Intertrust Technologies CorporationSystems and methods for watermarking software and other media
US7430670B1 (en)1999-07-292008-09-30Intertrust Technologies Corp.Software self-defense systems and methods
EP1204913B1 (en)1999-07-302005-10-05Intertrust Technologies Corp.Methods and systems for transaction record delivery using thresholds and multi-stage protocol
US7757097B2 (en)*1999-09-032010-07-13Purdue Research FoundationMethod and system for tamperproofing software
US7287166B1 (en)*1999-09-032007-10-23Purdue Research FoundationGuards for application in software tamperproofing
US6832316B1 (en)*1999-12-222004-12-14Intertrust Technologies, Corp.Systems and methods for protecting data secrecy and integrity
US6829710B1 (en)2000-03-142004-12-07Microsoft CorporationTechnique for producing, through watermarking, highly tamper-resistant executable code and resulting “watermarked” code so formed
US7313692B2 (en)2000-05-192007-12-25Intertrust Technologies Corp.Trust management systems and methods
US7580988B2 (en)2001-04-052009-08-25Intertrust Technologies CorporationSystem and methods for managing the distribution of electronic content
US7136840B2 (en)2001-04-202006-11-14Intertrust Technologies Corp.Systems and methods for conducting transactions and communications using a trusted third party
US7581103B2 (en)2001-06-132009-08-25Intertrust Technologies CorporationSoftware self-checking systems and methods
JP3585868B2 (en)2001-08-242004-11-04株式会社エフ・シー・シー Clutch outer
US6827167B2 (en)*2002-03-282004-12-07Ford Global Technologies, LlcHybrid electric vehicle torque distribution
US6880149B2 (en)*2002-04-012005-04-12Pace Anti-PiracyMethod for runtime code integrity validation using code block checksums
US7383570B2 (en)2002-04-252008-06-03Intertrust Technologies, Corp.Secure authentication systems and methods
US7149899B2 (en)2002-04-252006-12-12Intertrust Technologies Corp.Establishing a secure channel with a human user
AU2004264582B2 (en)2003-06-052010-05-13Intertrust Technologies CorporationInteroperable systems and methods for peer-to-peer service orchestration
US7353499B2 (en)*2003-09-252008-04-01Sun Microsystems, Inc.Multiple instruction dispatch tables for application program obfuscation
US7424620B2 (en)*2003-09-252008-09-09Sun Microsystems, Inc.Interleaved data and instruction streams for application program obfuscation
US7363620B2 (en)*2003-09-252008-04-22Sun Microsystems, Inc.Non-linear execution of application program instructions for application program obfuscation
US7603668B2 (en)*2004-01-092009-10-13Hewlett-Packard Development Company, L.P.Determining the applicability of patches for installation on a computer system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6088452A (en)*1996-03-072000-07-11Northern Telecom LimitedEncoding technique for software and hardware
US5892899A (en)*1996-06-131999-04-06Intel CorporationTamper resistant methods and apparatus
US6192475B1 (en)*1997-03-312001-02-20David R. WallaceSystem and method for cloaking software
US6668325B1 (en)*1997-06-092003-12-23Intertrust TechnologiesObfuscation techniques for enhancing software security
US6594761B1 (en)*1999-06-092003-07-15Cloakware CorporationTamper resistant software encoding
US6779114B1 (en)*1999-08-192004-08-17Cloakware CorporationTamper resistant software-control flow encoding

Cited By (240)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7823135B2 (en)1999-07-292010-10-26Intertrust Technologies CorporationSoftware self-defense systems and methods
US20050204348A1 (en)*1999-07-292005-09-15Inter Trust Technologies CorporationSoftware self-defense systems and methods
US10255414B2 (en)1999-07-292019-04-09Intertrust Technologies CorporationSoftware self-defense systems and methods
US9064099B2 (en)1999-07-292015-06-23Intertrust Technologies CorporationSoftware self-defense systems and methods
US7779270B2 (en)1999-07-292010-08-17Intertrust Technologies CorporationSoftware self-defense systems and methods
US7779394B2 (en)1999-07-292010-08-17Intertrust Technologies CorporationSoftware self-defense systems and methods
US20030120938A1 (en)*2001-11-272003-06-26Miki MullorMethod of securing software against reverse engineering
US20050262347A1 (en)*2002-10-252005-11-24Yuji SatoWatermark insertion apparatus and watermark extraction apparatus
US10453066B2 (en)2003-07-012019-10-22The 41St Parameter, Inc.Keystroke analysis
US11238456B2 (en)2003-07-012022-02-01The 41St Parameter, Inc.Keystroke analysis
US20060288223A1 (en)*2003-09-182006-12-21Perry KiehtreiberMethod and Apparatus for Incremental Code Signing
US8341422B2 (en)2003-09-182012-12-25Apple Inc.Method and apparatus for incremental code signing
US8880897B2 (en)2003-09-182014-11-04Apple Inc.Method and apparatus for incremental code signing
US10999298B2 (en)2004-03-022021-05-04The 41St Parameter, Inc.Method and system for identifying users and detecting fraud by use of the internet
US20110082768A1 (en)*2004-03-022011-04-07The 41St Parameter, Inc.Method and System for Identifying Users and Detecting Fraud by Use of the Internet
US11683326B2 (en)2004-03-022023-06-20The 41St Parameter, Inc.Method and system for identifying users and detecting fraud by use of the internet
US8862514B2 (en)*2004-03-022014-10-14The 41St Parameter, Inc.Method and system for identifying users and detecting fraud by use of the internet
US20090037213A1 (en)*2004-03-022009-02-05Ori EisenMethod and system for identifying users and detecting fraud by use of the internet
US7841009B1 (en)*2004-07-092010-11-23Angel Secure NetworksSystem and method for defending against reverse engineering of software, firmware and hardware
US20120260105A1 (en)*2004-07-092012-10-11Fred SmithSystem and method for defending against reverse engineering of software, firmware and hardware
US8060933B2 (en)*2004-08-212011-11-15Ko-Cheng FangComputer data protecting method
US20060041757A1 (en)*2004-08-212006-02-23Ko-Cheng FangComputer data protecting method
US8332653B2 (en)*2004-10-222012-12-11Broadcom CorporationSecure processing environment
US20060090084A1 (en)*2004-10-222006-04-27Mark BuerSecure processing environment
US7640583B1 (en)*2005-04-012009-12-29Microsoft CorporationMethod and system for protecting anti-malware programs
US20070266382A1 (en)*2005-07-152007-11-15The Mathworks, Inc.System and method for verifying the integrity of read-only components in deployed mixed-mode applications
US20070016888A1 (en)*2005-07-152007-01-18The Mathworks, Inc.System and method for verifying the integrity of read-only components in deployed mixed-mode applications
US9129136B2 (en)*2005-07-152015-09-08The Mathworks, Inc.System and method for verifying the integrity of read-only components in deployed mixed-mode applications
US8838974B2 (en)*2005-07-152014-09-16The Mathworks, Inc.System and method for verifying the integrity of read-only components in deployed mixed-mode applications
US11301585B2 (en)2005-12-162022-04-12The 41St Parameter, Inc.Methods and apparatus for securely displaying digital images
US9703983B2 (en)2005-12-162017-07-11The 41St Parameter, Inc.Methods and apparatus for securely displaying digital images
US10726151B2 (en)2005-12-162020-07-28The 41St Parameter, Inc.Methods and apparatus for securely displaying digital images
US12079368B2 (en)2005-12-162024-09-03The 41St Parameter, Inc.Methods and apparatus for securely displaying digital images
US20070180430A1 (en)*2006-02-022007-08-02International Business Machines CorporationDecision support tool for interleaving review software testing
US7793263B2 (en)*2006-02-022010-09-07International Business Machines CorporationDecision support tool for interleaving review software testing
US20070234323A1 (en)*2006-02-162007-10-04Franaszek Peter ALearning and cache management in software defined contexts
US20070220261A1 (en)*2006-03-152007-09-20Farrugia Augustin JOptimized integrity verification procedures
US8364965B2 (en)*2006-03-152013-01-29Apple Inc.Optimized integrity verification procedures
US8886947B2 (en)2006-03-152014-11-11Apple Inc.Optimized integrity verification procedures
US10535093B2 (en)2006-03-312020-01-14The 41St Parameter, Inc.Systems and methods for detection of session tampering and fraud prevention
US9754311B2 (en)2006-03-312017-09-05The 41St Parameter, Inc.Systems and methods for detection of session tampering and fraud prevention
US12093992B2 (en)2006-03-312024-09-17The 41St Parameter, Inc.Systems and methods for detection of session tampering and fraud prevention
US10089679B2 (en)2006-03-312018-10-02The 41St Parameter, Inc.Systems and methods for detection of session tampering and fraud prevention
US20070234409A1 (en)*2006-03-312007-10-04Ori EisenSystems and methods for detection of session tampering and fraud prevention
US11727471B2 (en)2006-03-312023-08-15The 41St Parameter, Inc.Systems and methods for detection of session tampering and fraud prevention
US11195225B2 (en)2006-03-312021-12-07The 41St Parameter, Inc.Systems and methods for detection of session tampering and fraud prevention
US8151327B2 (en)2006-03-312012-04-03The 41St Parameter, Inc.Systems and methods for detection of session tampering and fraud prevention
US8826393B2 (en)2006-03-312014-09-02The 41St Parameter, Inc.Systems and methods for detection of session tampering and fraud prevention
US9196004B2 (en)2006-03-312015-11-24The 41St Parameter, Inc.Systems and methods for detection of session tampering and fraud prevention
US20070265975A1 (en)*2006-05-092007-11-15Farrugia Augustin JDetermining validity of subscription to use digital content
US11615388B2 (en)2006-05-092023-03-28Apple Inc.Determining validity of subscription to use digital content
US10528705B2 (en)*2006-05-092020-01-07Apple Inc.Determining validity of subscription to use digital content
US20080018927A1 (en)*2006-07-212008-01-24Research In Motion LimitedMethod and system for providing a honeypot mode for an electronic device
US8479288B2 (en)*2006-07-212013-07-02Research In Motion LimitedMethod and system for providing a honeypot mode for an electronic device
US20080059828A1 (en)*2006-09-042008-03-06Infineon Technologies AgDetermining Execution Times of Commands
US8185772B2 (en)*2006-09-042012-05-22Infineon Technologies AgDetermining execution times of commands
US20080271001A1 (en)*2006-09-112008-10-30Yo NonomuraMethod of generating program, information processing device and microcomputer
US8789172B2 (en)2006-09-182014-07-22The Trustees Of Columbia University In The City Of New YorkMethods, media, and systems for detecting attack on a digital processing device
US9576127B2 (en)2006-09-182017-02-21The Trustees Of Columbia University In The City Of New YorkMethods, media, and systems for detecting attack on a digital processing device
US20080155561A1 (en)*2006-12-222008-06-26Sap AgDevelopment environment for groupware integration with enterprise applications
US9589115B2 (en)*2007-01-182017-03-07Panasonic Intellectual Property Management Co., Ltd.Obfuscation assisting apparatus
US20100180346A1 (en)*2007-01-182010-07-15Nicolson Kenneth AlexanderObfuscation assisting aparatus
US8286138B2 (en)*2007-01-302012-10-09Microsoft CorporationMulti-threaded detection of a game software debugger
US20080184239A1 (en)*2007-01-302008-07-31Microsoft CorporationMulti-threaded detection of a game software debugger
US20080295174A1 (en)*2007-03-052008-11-27Andrea Robinson FahmyMethod and System for Preventing Unauthorized Access and Distribution of Digital Data
US8176473B2 (en)*2007-05-142012-05-08Microsoft CorporationTransformations for software obfuscation and individualization
US20080288921A1 (en)*2007-05-142008-11-20Microsoft CorporationTransformations for Software Obfuscation and Individualization
US20080289045A1 (en)*2007-05-172008-11-20Thomas Michael FryerMethod and device for encoding software to prevent reverse engineering, tampering or modifying software code, and masking the logical function of software execution
US9060012B2 (en)2007-09-262015-06-16The 41St Parameter, Inc.Methods and apparatus for detecting fraud with time based computer tags
US20090083184A1 (en)*2007-09-262009-03-26Ori EisenMethods and Apparatus for Detecting Fraud with Time Based Computer Tags
US8112636B1 (en)*2007-11-062012-02-07Lockheed Martin CorporationProtection of code or data from exposure by use of code injection service
US9332021B2 (en)2007-11-092016-05-03International Business Machines CorporationMethods and systems for preventing security breaches
US8701181B2 (en)*2007-11-092014-04-15International Business Machines CorporationMethods and systems for preventing security breaches
US10176324B2 (en)2007-12-212019-01-08University Of Virginia Patent FoundationSystem, method and computer program product for protecting software via continuous anti-tampering and obfuscation transforms
WO2009108245A3 (en)*2007-12-212009-10-22University Of Virginia Patent FoundationSystem, method and computer program product for protecting software via continuous anti-t ampering and obfuscation transforms
US20110035601A1 (en)*2007-12-212011-02-10University Of Virginia Patent FoundationSystem, method and computer program product for protecting software via continuous anti-tampering and obfuscation transforms
US20100332759A1 (en)*2008-02-112010-12-30Nxp B.V.Method of program obfuscation and processing device for executing obfuscated programs
US8621187B2 (en)*2008-02-112013-12-31Nxp, B.V.Method of program obfuscation and processing device for executing obfuscated programs
US20100095376A1 (en)*2008-03-072010-04-15Rodriguez Tony FSoftware watermarking
US8434064B2 (en)*2008-03-282013-04-30Microsoft CorporationDetecting memory errors using write integrity testing
US20090249289A1 (en)*2008-03-282009-10-01Microsoft CorporationDetecting memory errors using write integrity testing
US8117587B1 (en)*2008-06-032012-02-14Richard Paul TestardiMicrocontroller-resident software development environment supporting application-level asynchronous event handling, interactive debugging and pin variables for embedded systems
US9390384B2 (en)2008-07-012016-07-12The 41 St Parameter, Inc.Systems and methods of sharing information through a tagless device consortium
US20100004965A1 (en)*2008-07-012010-01-07Ori EisenSystems and methods of sharing information through a tagless device consortium
US8484435B2 (en)*2008-07-242013-07-09Nagravision S.A.Method for updating data in memories using a memory management unit
US20110131389A1 (en)*2008-07-242011-06-02Nagravision SaMethod for updating data in memories using a memory management unit
US8429637B2 (en)*2008-09-022013-04-23Apple Inc.System and method for conditional expansion obfuscation
US20100058303A1 (en)*2008-09-022010-03-04Apple Inc.System and method for conditional expansion obfuscation
WO2010062437A1 (en)*2008-09-132010-06-03The Trustees Of Columbia University In The City Of New YorkMethods, media, and systems for detecting attack on a digital processing device
US20100107245A1 (en)*2008-10-292010-04-29Microsoft CorporationTamper-tolerant programs
US9117094B2 (en)2008-10-292015-08-25Microsoft Technology Licensing, LlcData location obfuscation
US20100115260A1 (en)*2008-11-052010-05-06Microsoft CorporationUniversal secure token for obfuscation and tamper resistance
US8171306B2 (en)*2008-11-052012-05-01Microsoft CorporationUniversal secure token for obfuscation and tamper resistance
US20100132047A1 (en)*2008-11-242010-05-27Honeywell International Inc.Systems and methods for tamper resistant memory devices
US8490195B1 (en)*2008-12-192013-07-16Symantec CorporationMethod and apparatus for behavioral detection of malware in a computer system
US20120110349A1 (en)*2009-02-242012-05-03Fabrice DesclauxMethod for obfuscating a computer program
US9239913B2 (en)*2009-02-242016-01-19European Aeronautic Defence And Space Company-Eads FranceMethod for obfuscating a computer program
US9112850B1 (en)2009-03-252015-08-18The 41St Parameter, Inc.Systems and methods of sharing information through a tag-based consortium
US11750584B2 (en)2009-03-252023-09-05The 41St Parameter, Inc.Systems and methods of sharing information through a tag-based consortium
US9948629B2 (en)2009-03-252018-04-17The 41St Parameter, Inc.Systems and methods of sharing information through a tag-based consortium
US12132719B2 (en)2009-03-252024-10-29The 41St Parameter, Inc.Systems and methods of sharing information through a tag-based consortium
US10616201B2 (en)2009-03-252020-04-07The 41St Parameter, Inc.Systems and methods of sharing information through a tag-based consortium
US20100257514A1 (en)*2009-04-032010-10-07Samsung Electronics Co., Ltd.Effective mapping of code sections to the same section of secondary memory to improve the security of computing systems
US8504984B1 (en)*2009-05-292013-08-06Google Inc.Modifying grammars to correct programming language statements
US20110047315A1 (en)*2009-08-242011-02-24De Dinechin ChristopheVirtualization of real-time clock
US8694819B2 (en)*2009-08-242014-04-08Hewlett-Packard Development Company, L.P.System and method for gradually adjusting a virtual interval timer counter value to compensate the divergence of a physical interval timer counter value and the virtual interval timer counter value
KR20120094481A (en)*2009-10-082012-08-24어데토 캐나다 코포레이션A system and method for aggressive self-modification in dynamic function call systems
CN102713839A (en)*2009-10-082012-10-03埃德图加拿大公司A system and method for aggressive self-modification in dynamic function call systems
KR101719635B1 (en)*2009-10-082017-03-27이르데토 비.브이.A system and method for aggressive self-modification in dynamic function call systems
US9195476B2 (en)*2009-10-082015-11-24Irdeto B.V.System and method for aggressive self-modification in dynamic function call systems
US20120284792A1 (en)*2009-10-082012-11-08Irdeto Canada CorporationSystem and Method for Aggressive Self-Modification in Dynamic Function Call Systems
CN102713839B (en)*2009-10-082015-11-25爱迪德技术有限公司 System and method for aggressive self-modification in a dynamic function call system
US8499352B2 (en)2009-12-162013-07-30Mcafee, Inc.Obfuscated malware detection
US20110145921A1 (en)*2009-12-162011-06-16Mcafee, Inc.Obfuscated malware detection
US8176559B2 (en)*2009-12-162012-05-08Mcafee, Inc.Obfuscated malware detection
US20110231824A1 (en)*2010-03-162011-09-22Microsoft CorporationLow-level code rewriter verification
US8381175B2 (en)2010-03-162013-02-19Microsoft CorporationLow-level code rewriter verification
US20110258516A1 (en)*2010-04-162011-10-20Thomson LicensingMethod, a device and a computer program support for verification of checksums for self-modified computer code
US9471758B2 (en)*2010-04-162016-10-18Thomson LicensingMethod, a device and a computer program support for verification of checksums for self-modified computer code
CN102222196A (en)*2010-04-162011-10-19汤姆森特许公司Method, device and computer program support for verification of checksums for self-modified computer code
US20130133075A1 (en)*2010-06-032013-05-23International Business Machines CorporationFixing security vulnerability in a source code
US8819637B2 (en)*2010-06-032014-08-26International Business Machines CorporationFixing security vulnerability in a source code
US9298924B2 (en)*2010-06-032016-03-29International Business Machines CorporationFixing security vulnerability in a source code
US20110302566A1 (en)*2010-06-032011-12-08International Business Machines CorporationFixing security vulnerability in a source code
US9767271B2 (en)2010-07-152017-09-19The Research Foundation For The State University Of New YorkSystem and method for validating program execution at run-time
US20120079462A1 (en)*2010-09-242012-03-29SoftKrypt LLCSystems and methods of source software code obfuscation
US9754256B2 (en)2010-10-192017-09-05The 41St Parameter, Inc.Variable risk engine
US8775826B2 (en)*2011-02-092014-07-08Apple Inc.Counteracting memory tracing on computing systems by code obfuscation
US20120204039A1 (en)*2011-02-092012-08-09Apple Inc.Counteracting memory tracing on computing systems by code obfuscation
US9740846B2 (en)2011-03-012017-08-22Angel Secure Networks, Inc.Controlling user access to electronic resources without password
US9058482B2 (en)2011-03-012015-06-16Angel Secure Networks, Inc.Controlling user access to electronic resources without password
US10185816B2 (en)2011-03-012019-01-22Angel Secure Networks, Inc.Controlling user access to electronic resources without password
US8930717B2 (en)2011-03-012015-01-06Angel Secure Networks, Inc.Secure processing module and method for making the same
US20120260106A1 (en)*2011-04-072012-10-11Apple Inc.System and method for binary layout randomization
US8615735B2 (en)*2011-05-032013-12-24Apple Inc.System and method for blurring instructions and data via binary obfuscation
US20120284688A1 (en)*2011-05-032012-11-08Apple Inc.System and method for blurring instructions and data via binary obfuscation
US9111072B1 (en)*2011-08-232015-08-18Tectonic Labs, LLCAnti-reverse engineering unified process
US20130097431A1 (en)*2011-10-182013-04-18Paul Marion HriljacSystems and methods of source software code modification
US9116765B2 (en)2011-10-202015-08-25Apple Inc.System and method for obfuscating data using instructions as a source of pseudorandom values
US11314838B2 (en)2011-11-152022-04-26Tapad, Inc.System and method for analyzing user device information
CN104169931A (en)*2011-12-132014-11-26凡瑞斯公司 Coordinated watermarking
WO2013106600A3 (en)*2012-01-132014-12-11Accessdata Group, LlcIdentifying software execution behavior
US8533836B2 (en)2012-01-132013-09-10Accessdata Group, LlcIdentifying software execution behavior
US12153666B1 (en)2012-03-012024-11-26The 41St Parameter, Inc.Methods and systems for fraud containment
US11010468B1 (en)2012-03-012021-05-18The 41St Parameter, Inc.Methods and systems for fraud containment
US9633201B1 (en)2012-03-012017-04-25The 41St Parameter, Inc.Methods and systems for fraud containment
US11886575B1 (en)2012-03-012024-01-30The 41St Parameter, Inc.Methods and systems for fraud containment
US8756435B2 (en)2012-03-022014-06-17Apple Inc.Obfuscation of control flow of software
US9521551B2 (en)2012-03-222016-12-13The 41St Parameter, Inc.Methods and systems for persistent cross-application mobile device identification
US10021099B2 (en)2012-03-222018-07-10The 41st Paramter, Inc.Methods and systems for persistent cross-application mobile device identification
US12058131B2 (en)2012-03-222024-08-06The 41St Parameter, Inc.Methods and systems for persistent cross-application mobile device identification
US10862889B2 (en)2012-03-222020-12-08The 41St Parameter, Inc.Methods and systems for persistent cross application mobile device identification
US10341344B2 (en)2012-03-222019-07-02The 41St Parameter, Inc.Methods and systems for persistent cross-application mobile device identification
US11683306B2 (en)2012-03-222023-06-20The 41St Parameter, Inc.Methods and systems for persistent cross-application mobile device identification
US12430651B2 (en)2012-08-022025-09-30The 41St Parameter, Inc.Systems and methods for accessing records via derivative locators
US10417637B2 (en)2012-08-022019-09-17The 41St Parameter, Inc.Systems and methods for accessing records via derivative locators
US12002053B2 (en)2012-08-022024-06-04The 41St Parameter, Inc.Systems and methods for accessing records via derivative locators
US11301860B2 (en)2012-08-022022-04-12The 41St Parameter, Inc.Systems and methods for accessing records via derivative locators
US9767284B2 (en)2012-09-142017-09-19The Research Foundation For The State University Of New YorkContinuous run-time validation of program execution: a practical approach
US11410179B2 (en)2012-11-142022-08-09The 41St Parameter, Inc.Systems and methods of global identification
US9990631B2 (en)2012-11-142018-06-05The 41St Parameter, Inc.Systems and methods of global identification
US11922423B2 (en)2012-11-142024-03-05The 41St Parameter, Inc.Systems and methods of global identification
US10853813B2 (en)2012-11-142020-12-01The 41St Parameter, Inc.Systems and methods of global identification
US10395252B2 (en)2012-11-142019-08-27The 41St Parameter, Inc.Systems and methods of global identification
US10897465B2 (en)2012-11-252021-01-19Cynthia SmithSystem and method for using a separate device to facilitate authentication
US9742771B2 (en)2012-11-252017-08-22Angel Secure Networks, Inc.System and method for using a separate device to facilitate authentication
US9270660B2 (en)2012-11-252016-02-23Angel Secure Networks, Inc.System and method for using a separate device to facilitate authentication
US9973519B2 (en)2013-03-152018-05-15Shape Security, Inc.Protecting a server computer by detecting the identity of a browser on a client computer
US10902327B1 (en)2013-08-302021-01-26The 41St Parameter, Inc.System and method for device identification and uniqueness
US12045736B1 (en)2013-08-302024-07-23The 41St Parameter, Inc.System and method for device identification and uniqueness
US12380341B1 (en)2013-08-302025-08-05The 41St Parameter, Inc.System and method for device identification and uniqueness
US11657299B1 (en)2013-08-302023-05-23The 41St Parameter, Inc.System and method for device identification and uniqueness
US12124586B2 (en)*2013-09-132024-10-22Omnissa, LlcRisk assessment for managed client devices
US20220012346A1 (en)*2013-09-132022-01-13Vmware, Inc.Risk assessment for managed client devices
US10212137B1 (en)2014-01-212019-02-19Shape Security, Inc.Blind hash compression
EP2913774A1 (en)*2014-02-272015-09-02Thomson LicensingRun-time continuous address space layout randomization of flattened control flow graph
EP2913773A1 (en)*2014-02-272015-09-02Thomson LicensingRun-time Continuous Address Space Layout Randomization of flattened Control Flow Graph
CN106104553B (en)*2014-03-112021-01-26西门子公司Apparatus and method for detecting tampering of program code
CN106104553A (en)*2014-03-112016-11-09西门子公司For detecting the equipment distorted and the method for program code
US10686812B2 (en)*2014-03-112020-06-16Siemens AktiengesellschaftDevice and method for detecting manipulation of a program code
US20170019420A1 (en)*2014-03-112017-01-19Siemens AktiengesellschaftDevice and method for detecting manipulation of a program code
US10187408B1 (en)2014-04-172019-01-22Shape Security, Inc.Detecting attacks against a server computer based on characterizing user interactions with the client computing device
US9858440B1 (en)*2014-05-232018-01-02Shape Security, Inc.Encoding of sensitive data
US20180121680A1 (en)*2014-05-232018-05-03Shape Security, Inc.Obfuscating web code
US10298599B1 (en)2014-09-192019-05-21Shape Security, Inc.Systems for detecting a headless browser executing on a client computer
US10868819B2 (en)2014-09-192020-12-15Shape Security, Inc.Systems for detecting a headless browser executing on a client computer
US9954893B1 (en)2014-09-232018-04-24Shape Security, Inc.Techniques for combating man-in-the-browser attacks
US10091312B1 (en)2014-10-142018-10-02The 41St Parameter, Inc.Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups
US10728350B1 (en)2014-10-142020-07-28The 41St Parameter, Inc.Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups
US11240326B1 (en)2014-10-142022-02-01The 41St Parameter, Inc.Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups
US12301685B1 (en)2014-10-142025-05-13The 41St Parameter, Inc.Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups
US11895204B1 (en)2014-10-142024-02-06The 41St Parameter, Inc.Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups
CN104318134A (en)*2014-11-052015-01-28北京深思数盾科技有限公司Data protection method
US12050904B2 (en)2014-11-062024-07-30Intertrust Technologies CorporationSecure application distribution systems and methods
US11080042B2 (en)2014-11-062021-08-03Intertrust Technologies CorporationSecure application distribution systems and methods
US9762560B2 (en)2014-11-252017-09-12Aclara Technologies LlcMethod for generating cryptographic “one-time pads” and keys for secure network communications
US10482262B2 (en)*2014-12-192019-11-19International Business Machines CorporationStatic analysis based on abstract program representations
CN107580765A (en)*2015-01-272018-01-12艾锐势有限责任公司 Obfuscation for protecting streaming and other data streams
US10489583B2 (en)*2015-05-202019-11-26Alibaba Group Holding LimitedDetecting malicious files
US10798202B2 (en)2015-05-212020-10-06Shape Security, Inc.Security systems for mitigating attacks from a headless browser executing on a client computer
US9986058B2 (en)2015-05-212018-05-29Shape Security, Inc.Security systems for mitigating attacks from a headless browser executing on a client computer
US10367903B2 (en)2015-05-212019-07-30Shape Security, Inc.Security systems for mitigating attacks from a headless browser executing on a client computer
US20180096139A1 (en)*2015-05-252018-04-05Huawei International Pte. Ltd.Method and system for defense against return oriented programming (rop) based attacks
US10567419B2 (en)2015-07-062020-02-18Shape Security, Inc.Asymmetrical challenges for web security
US10567386B2 (en)2015-07-072020-02-18Shape Security, Inc.Split serving of computer code
US10230718B2 (en)2015-07-072019-03-12Shape Security, Inc.Split serving of computer code
US11171925B2 (en)2015-10-282021-11-09Shape Security, Inc.Evaluating and modifying countermeasures based on aggregate transaction status
US10375026B2 (en)2015-10-282019-08-06Shape Security, Inc.Web transaction status tracking
US10212130B1 (en)2015-11-162019-02-19Shape Security, Inc.Browser extension firewall
US10826872B2 (en)2015-11-162020-11-03Shape Security, Inc.Security policy for browser extensions
US10691808B2 (en)*2015-12-102020-06-23Sap SeVulnerability analysis of software components
US20170169229A1 (en)*2015-12-102017-06-15Sap SeVulnerability analysis of software components
US20190008845A1 (en)*2016-01-112019-01-10Sharon Anavi-GofferProgram randomization for cyber-attack resilient control in programmable logic controllers
US10795976B2 (en)*2016-01-112020-10-06Siemens AktiengesellschaftProgram randomization for cyber-attack resilient control in programmable logic controllers
CN108700864A (en)*2016-01-112018-10-23西门子股份公司 Program Randomization for Cyber-Attack Resilience Control in Programmable Logic Controllers
US10326790B2 (en)2016-02-122019-06-18Shape Security, Inc.Reverse proxy computer: deploying countermeasures in response to detecting an autonomous browser executing on a client computer
US10855696B2 (en)2016-03-022020-12-01Shape Security, Inc.Variable runtime transpilation
US9917850B2 (en)2016-03-032018-03-13Shape Security, Inc.Deterministic reproduction of client/server computer state or output sent to one or more client computers
US10567363B1 (en)2016-03-032020-02-18Shape Security, Inc.Deterministic reproduction of system state using seeded pseudo-random number generators
US10212173B2 (en)2016-03-032019-02-19Shape Security, Inc.Deterministic reproduction of client/server computer state or output sent to one or more client computers
US10834101B2 (en)2016-03-092020-11-10Shape Security, Inc.Applying bytecode obfuscation techniques to programs written in an interpreted language
US10129289B1 (en)2016-03-112018-11-13Shape Security, Inc.Mitigating attacks on server computers by enforcing platform policies on client computers
US10447726B2 (en)2016-03-112019-10-15Shape Security, Inc.Mitigating attacks on server computers by enforcing platform policies on client computers
US10216488B1 (en)2016-03-142019-02-26Shape Security, Inc.Intercepting and injecting calls into operations and objects
US11349816B2 (en)2016-12-022022-05-31F5, Inc.Obfuscating source code sent, from a server computer, to a browser on a client computer
CN107480479A (en)*2017-08-152017-12-15北京奇虎科技有限公司Reinforcement means and device, computing device, the computer-readable storage medium of application program
US11741196B2 (en)2018-11-152023-08-29The Research Foundation For The State University Of New YorkDetecting and preventing exploits of software vulnerability using instruction tags
US12061677B2 (en)2018-11-152024-08-13The Research Foundation For The State University Of New YorkSecure processor for detecting and preventing exploits of software vulnerability
US11164206B2 (en)*2018-11-162021-11-02Comenity LlcAutomatically aggregating, evaluating, and providing a contextually relevant offer
US20220027934A1 (en)*2018-11-162022-01-27Comenity LlcAutomatically aggregating, evaluating, and providing a contextually relevant offer
US11847668B2 (en)*2018-11-162023-12-19Bread Financial Payments, Inc.Automatically aggregating, evaluating, and providing a contextually relevant offer
FR3096803A1 (en)*2019-05-292020-12-04Commissariat A L'energie Atomique Et Aux Energies Alternatives Computer implemented method for obscuring program code
WO2020240246A1 (en)*2019-05-292020-12-03Commissariat A L 'energie Atomique Et Aux Energies AlternativesA computer-implemented method for obfuscating a program code
US11741197B1 (en)2019-10-152023-08-29Shape Security, Inc.Obfuscating programs using different instruction set architectures
US11089000B1 (en)*2020-02-112021-08-10International Business Machines CorporationAutomated source code log generation
CN111723345A (en)*2020-05-092020-09-29中国人民解放军战略支援部队信息工程大学 Control flow obfuscation method and system based on callback function
EP4044051A1 (en)*2021-02-112022-08-17Siemens AktiengesellschaftRandomization of a binary program code
EP4332800A1 (en)*2022-09-012024-03-06Irdeto B.V.Method and apparatus for increasing the security of software code through execution path diversity
US12321424B2 (en)*2023-01-202025-06-03Dell Products L.P.System and solution to obfuscate and prevent the pattern analysis of java archives
US20240248967A1 (en)*2023-01-202024-07-25Dell Products L.P.System and solution to obfuscate and prevent the pattern analysis of java archives

Also Published As

Publication numberPublication date
US7779394B2 (en)2010-08-17
US7823135B2 (en)2010-10-26
US20110035733A1 (en)2011-02-10
US20050183072A1 (en)2005-08-18
US9064099B2 (en)2015-06-23
US8387022B2 (en)2013-02-26
US7779270B2 (en)2010-08-17
US7430670B1 (en)2008-09-30
US20050210275A1 (en)2005-09-22
US20050204348A1 (en)2005-09-15
US20150278491A1 (en)2015-10-01
US20130232343A1 (en)2013-09-05
US10255414B2 (en)2019-04-09

Similar Documents

PublicationPublication DateTitle
US10255414B2 (en)Software self-defense systems and methods
Barrantes et al.Randomized instruction set emulation
US7287166B1 (en)Guards for application in software tamperproofing
Larsen et al.SoK: Automated software diversity
US7254586B2 (en)Secure and opaque type library providing secure data protection of variables
Cadar et al.Data randomization
EP1410150B1 (en)Protecting software applications against software piracy
US7757097B2 (en)Method and system for tamperproofing software
Larsen et al.Automatic software diversity
Wang et al.To detect stack buffer overflow with polymorphic canaries
Abrath et al.Code renewability for native software protection
Ahmadvand et al.VirtSC: Combining Virtualization Obfuscation with Self-Checksumming
Ziad et al.Using Name Confusion to Enhance Security
Pizzolotto et al.Mitigating Debugger-based Attacks to Java Applications with Self-debugging
US20250165227A1 (en)Protecting Software
Zhou et al.Hardware-Assisted Live Kernel Function Updating on Intel Platforms
Tasić et al.Detecting Attacks using Program Alternatives
ChenSecuring Systems by Vulnerability Mitigation and Adaptive Live Patching
AbrathPractical protections for native programs
AeltermanExploitation of synergies between software protections
Salamat et al.Stopping Buffer Overflow Attacks at Run-Time: Simultaneous Multi-Variant Program Execution on a Multicore Processor
BlietzSoftware tamper resistance through dynamic monitoring
ZhangImproved software activation using multithreading
AktasAuthenticating executions for trusted systems
KohliAUTOMATIC DETECTION OF MEMORY CORRUPTION ATTACKS

Legal Events

DateCodeTitleDescription
STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

ASAssignment

Owner name:INNOVATION TECHNOLOGIES PARTNERS LP, TEXAS

Free format text:PATENT ASSIGNMENT;ASSIGNOR:INTERTRUST TECHNOLOGIES CORPORATION;REEL/FRAME:071408/0320

Effective date:20250328


[8]ページ先頭

©2009-2025 Movatter.jp