|
CA2305078A1
(en)
*
|
2000-04-12 |
2001-10-12 |
Cloakware Corporation |
Tamper resistant software - mass data encoding
|
|
US7237123B2
(en)
*
|
2000-09-22 |
2007-06-26 |
Ecd Systems, Inc. |
Systems and methods for preventing unauthorized use of digital content
|
|
CA2435624C
(en)
|
2000-09-22 |
2013-05-07 |
Richard B. Levine |
Systems and methods for preventing unauthorized use of digital content
|
|
CA2327911A1
(en)
*
|
2000-12-08 |
2002-06-08 |
Cloakware Corporation |
Obscuring functions in computer software
|
|
US7260845B2
(en)
*
|
2001-01-09 |
2007-08-21 |
Gabriel Kedma |
Sensor for detecting and eliminating inter-process memory breaches in multitasking operating systems
|
|
GB0103119D0
(en)
*
|
2001-02-08 |
2001-03-28 |
Comodo Technology Dev Ltd |
Improvements in and relating to software modification
|
|
JP2002271561A
(en)
*
|
2001-03-13 |
2002-09-20 |
Minolta Co Ltd |
Data transmitter, data receiver, data transmitting/ receiving system, data transmitting method, data receiving method, data transmitting/receiving method, program and recording medium
|
|
EP2267626B8
(en)
*
|
2001-03-28 |
2016-11-30 |
NDS Limited |
Digital rights management system and method
|
|
WO2002091146A2
(en)
|
2001-05-09 |
2002-11-14 |
Ecd Systems, Inc. |
Systems and methods for the prevention of unauthorized use and manipulation of digital content
|
|
US7007025B1
(en)
*
|
2001-06-08 |
2006-02-28 |
Xsides Corporation |
Method and system for maintaining secure data input and output
|
|
US7313824B1
(en)
*
|
2001-07-13 |
2007-12-25 |
Liquid Machines, Inc. |
Method for protecting digital content from unauthorized use by automatically and dynamically integrating a content-protection agent
|
|
US7111285B2
(en)
*
|
2001-07-17 |
2006-09-19 |
Liquid Machines, Inc. |
Method and system for protecting software applications against static and dynamic software piracy techniques
|
|
JP4787434B2
(en)
*
|
2001-08-24 |
2011-10-05 |
富士通コンポーネント株式会社 |
ENCRYPTION METHOD, COMMUNICATION SYSTEM, DATA INPUT DEVICE
|
|
US20030120938A1
(en)
*
|
2001-11-27 |
2003-06-26 |
Miki Mullor |
Method of securing software against reverse engineering
|
|
US20090254994A1
(en)
|
2002-02-18 |
2009-10-08 |
David Lynch Waterson |
Security methods and systems
|
|
US20030159053A1
(en)
*
|
2002-02-19 |
2003-08-21 |
Charles Fauble |
Secure reconfigurable input device with transaction card reader
|
|
US20030159054A1
(en)
*
|
2002-02-19 |
2003-08-21 |
Minebea Co. |
Reconfigurable secure input device
|
|
EP1603001B1
(en)
*
|
2002-08-01 |
2007-10-31 |
Matsushita Electric Industrial Co., Ltd. |
Apparatusses and methods for decrypting blocks of data and locating the decrypted blocks of data in memory space used for execution
|
|
US7676748B1
(en)
*
|
2002-11-04 |
2010-03-09 |
Sun Microsystems, Inc. |
System graphics for security shield
|
|
US9521209B2
(en)
|
2002-11-06 |
2016-12-13 |
Code Valley Corp Pty Ltd |
Code generation
|
|
US8832178B2
(en)
|
2002-11-06 |
2014-09-09 |
Noel William Lovisa |
Service implementation
|
|
EP2385463B1
(en)
*
|
2002-11-06 |
2020-04-29 |
Code Valley Corp Pty Ltd |
Code generation using components
|
|
US8510571B1
(en)
*
|
2003-03-24 |
2013-08-13 |
Hoi Chang |
System and method for inserting security mechanisms into a software program
|
|
US20070186076A1
(en)
*
|
2003-06-18 |
2007-08-09 |
Jones Anthony M |
Data pipeline transport system
|
|
JP2007526539A
(en)
*
|
2003-06-18 |
2007-09-13 |
アンブリック, インコーポレイテッド |
Integrated circuit development system
|
|
US7503070B1
(en)
*
|
2003-09-19 |
2009-03-10 |
Marshall Van Alstyne |
Methods and systems for enabling analysis of communication content while preserving confidentiality
|
|
CN1918556A
(en)
*
|
2004-02-05 |
2007-02-21 |
Kings情报通信 |
Computer security apparatus and method using security input device driver
|
|
US7500108B2
(en)
|
2004-03-01 |
2009-03-03 |
Microsoft Corporation |
Metered execution of code
|
|
US7383583B2
(en)
*
|
2004-03-05 |
2008-06-03 |
Microsoft Corporation |
Static and run-time anti-disassembly and anti-debugging
|
|
DE102004011488B4
(en)
*
|
2004-03-09 |
2007-07-05 |
Giesecke & Devrient Gmbh |
Protection of software against attacks
|
|
US8694802B2
(en)
*
|
2004-04-30 |
2014-04-08 |
Apple Inc. |
System and method for creating tamper-resistant code
|
|
US7296233B2
(en)
*
|
2004-05-10 |
2007-11-13 |
Microsoft Corporation |
Spy-resistant keyboard
|
|
WO2005114387A1
(en)
*
|
2004-05-20 |
2005-12-01 |
Code Valley Pty Limited |
Code generation techniques
|
|
US7788498B2
(en)
*
|
2005-07-22 |
2010-08-31 |
Microsoft Corporation |
Triple-tap password entry
|
|
US7610345B2
(en)
*
|
2005-07-28 |
2009-10-27 |
Vaporstream Incorporated |
Reduced traceability electronic message system and method
|
|
US9282081B2
(en)
|
2005-07-28 |
2016-03-08 |
Vaporstream Incorporated |
Reduced traceability electronic message system and method
|
|
DE102005045852A1
(en)
*
|
2005-09-26 |
2007-04-05 |
Siemens Ag |
Method and system for protecting source code
|
|
US20070073623A1
(en)
*
|
2005-09-28 |
2007-03-29 |
Nicholas Phelps |
Method of manufacturing application software
|
|
DE102005048029B4
(en)
*
|
2005-10-06 |
2009-03-12 |
Infineon Technologies Ag |
Compiler and method for compiling
|
|
US7725737B2
(en)
*
|
2005-10-14 |
2010-05-25 |
Check Point Software Technologies, Inc. |
System and methodology providing secure workspace environment
|
|
US7685638B1
(en)
*
|
2005-12-13 |
2010-03-23 |
Symantec Corporation |
Dynamic replacement of system call tables
|
|
WO2007072568A1
(en)
*
|
2005-12-22 |
2007-06-28 |
Fujitsu Limited |
Program processor, program processing method, program, and computer-readable recording medium
|
|
US20070209014A1
(en)
*
|
2006-01-11 |
2007-09-06 |
Youssef Youmtoub |
Method and apparatus for secure data input
|
|
US8978154B2
(en)
|
2006-02-15 |
2015-03-10 |
Samsung Electronics Co., Ltd. |
Method and apparatus for importing content having plurality of parts
|
|
KR100782847B1
(en)
|
2006-02-15 |
2007-12-06 |
삼성전자주식회사 |
Method and apparatus for importing content which consists of a plural of contents parts
|
|
KR100753944B1
(en)
*
|
2006-06-26 |
2007-08-31 |
삼성전자주식회사 |
Virtual Wheel Interface Structure of Mobile Terminal with Wheel Input Device and Character Input Method Using the Same
|
|
US8583938B2
(en)
*
|
2006-09-20 |
2013-11-12 |
Kam Fu Chan |
From polymorphic executable to polymorphic operating system
|
|
US20080077704A1
(en)
*
|
2006-09-24 |
2008-03-27 |
Void Communications, Inc. |
Variable Electronic Communication Ping Time System and Method
|
|
US7761468B2
(en)
*
|
2006-10-04 |
2010-07-20 |
International Business Machines Corporation |
Supporting multiple security mechanisms in a database driver
|
|
US8689193B2
(en)
*
|
2006-11-01 |
2014-04-01 |
At&T Intellectual Property Ii, L.P. |
Method and apparatus for protecting a software application against a virus
|
|
US8113951B2
(en)
*
|
2006-11-15 |
2012-02-14 |
Microsoft Corporation |
Achievement incentives within a console-based gaming environment
|
|
US9589115B2
(en)
*
|
2007-01-18 |
2017-03-07 |
Panasonic Intellectual Property Management Co., Ltd. |
Obfuscation assisting apparatus
|
|
WO2008101165A2
(en)
*
|
2007-02-15 |
2008-08-21 |
Void Communications, Inc. |
Electronic messaging recordlessness warning and routing system and method
|
|
KR100847248B1
(en)
*
|
2007-02-27 |
2008-07-21 |
주식회사 하우리 |
How to prevent keystroke information hacking
|
|
US20080301631A1
(en)
*
|
2007-03-01 |
2008-12-04 |
The Boeing Company |
Human transparency paradigm
|
|
CA2697632C
(en)
*
|
2007-08-06 |
2015-05-12 |
Bernard De Monseignat |
System and method for authentication, data transfer, and protection against phishing
|
|
US8819815B1
(en)
*
|
2007-10-16 |
2014-08-26 |
Jpmorgan Chase Bank, N.A. |
Method and system for distributing and tracking information
|
|
US8245289B2
(en)
*
|
2007-11-09 |
2012-08-14 |
International Business Machines Corporation |
Methods and systems for preventing security breaches
|
|
JP4492719B2
(en)
*
|
2008-03-10 |
2010-06-30 |
ソニー株式会社 |
Data communication apparatus, data communication method, data request apparatus, data request method, and data communication system
|
|
CN101316424A
(en)
*
|
2008-07-08 |
2008-12-03 |
阿里巴巴集团控股有限公司 |
Information transmission method, system and device
|
|
CN101661546B
(en)
*
|
2008-08-28 |
2012-12-19 |
深圳富泰宏精密工业有限公司 |
System and method for file encryption therein in hand-held mobile electronic device
|
|
US8713312B2
(en)
*
|
2008-12-07 |
2014-04-29 |
Trend Micrio Incorporated |
Method and system for detecting data modification within computing device
|
|
FR2942559B1
(en)
*
|
2009-02-24 |
2016-05-20 |
European Aeronautic Defence And Space Company - Eads France |
METHOD FOR PROTECTING THE SOURCE CODE OF A COMPUTER PROGRAM.
|
|
DE102009019981A1
(en)
*
|
2009-05-05 |
2010-11-11 |
Giesecke & Devrient Gmbh |
Method for protecting software and portable data carriers stored on a portable data carrier
|
|
US8589698B2
(en)
*
|
2009-05-15 |
2013-11-19 |
International Business Machines Corporation |
Integrity service using regenerated trust integrity gather program
|
|
JP5684128B2
(en)
*
|
2009-08-19 |
2015-03-11 |
レノボ・イノベーションズ・リミテッド(香港) |
Information processing device
|
|
US9535994B1
(en)
*
|
2010-03-26 |
2017-01-03 |
Jonathan Grier |
Method and system for forensic investigation of data access
|
|
US9135434B2
(en)
*
|
2010-04-19 |
2015-09-15 |
Appcentral, Inc. |
System and method for third party creation of applications for mobile appliances
|
|
CN101853357A
(en)
*
|
2010-04-28 |
2010-10-06 |
北京飞天诚信科技有限公司 |
Software protection method
|
|
WO2012000092A1
(en)
*
|
2010-06-28 |
2012-01-05 |
Lionstone Capital Corporation |
Seamless end-to-end data obfuscation and encryption
|
|
US8984034B2
(en)
*
|
2010-09-28 |
2015-03-17 |
Schneider Electric USA, Inc. |
Calculation engine and calculation providers
|
|
US20120159193A1
(en)
*
|
2010-12-18 |
2012-06-21 |
Microsoft Corporation |
Security through opcode randomization
|
|
US20120222051A1
(en)
*
|
2011-02-25 |
2012-08-30 |
Microsoft Corporation |
Shared resource access verification
|
|
KR101269089B1
(en)
|
2011-08-19 |
2013-05-29 |
고려대학교 산학협력단 |
Software modulation prevention method using own encryption
|
|
US9183113B2
(en)
|
2011-09-29 |
2015-11-10 |
Oracle International Corporation |
Debugging analysis in running multi-user systems
|
|
US9027075B2
(en)
*
|
2011-09-29 |
2015-05-05 |
Oracle International Corporation |
Enforcing security rules at runtime
|
|
US8972952B2
(en)
|
2012-02-03 |
2015-03-03 |
Apple Inc. |
Tracer based runtime optimization for dynamic programming languages
|
|
GB201212878D0
(en)
|
2012-07-20 |
2012-09-05 |
Pike Justin |
Authentication method and system
|
|
WO2014051608A1
(en)
*
|
2012-09-28 |
2014-04-03 |
Hewlett-Packard Development Company, L.P. |
Application randomization
|
|
US9122794B2
(en)
|
2012-10-30 |
2015-09-01 |
Oracle International Corporation |
System and method for debugging domain specific languages
|
|
US9225737B2
(en)
|
2013-03-15 |
2015-12-29 |
Shape Security, Inc. |
Detecting the introduction of alien content
|
|
US20140283038A1
(en)
|
2013-03-15 |
2014-09-18 |
Shape Security Inc. |
Safe Intelligent Content Modification
|
|
US9218467B2
(en)
*
|
2013-05-29 |
2015-12-22 |
Raytheon Cyber Products, Llc |
Intra stack frame randomization for protecting applications against code injection attack
|
|
US9256431B2
(en)
|
2013-07-10 |
2016-02-09 |
Raytheon Cyber Products, Llc |
Synthetic processing diversity within a homogeneous processing environment
|
|
US9218483B2
(en)
|
2013-07-10 |
2015-12-22 |
Raytheon Cyber Products, Llc |
Synthetic processing diversity with multiple architectures within a homogeneous processing environment
|
|
FR3011354A1
(en)
*
|
2013-10-01 |
2015-04-03 |
Commissariat Energie Atomique |
METHOD FOR EXECUTING A MICROPROCESSOR OF A POLYMORPHIC BINARY CODE OF A PREDETERMINED FUNCTION
|
|
US9270647B2
(en)
|
2013-12-06 |
2016-02-23 |
Shape Security, Inc. |
Client/server security by an intermediary rendering modified in-memory objects
|
|
US8954583B1
(en)
|
2014-01-20 |
2015-02-10 |
Shape Security, Inc. |
Intercepting and supervising calls to transformed operations and objects
|
|
US9027142B1
(en)
*
|
2014-01-21 |
2015-05-05 |
Shape Security, Inc. |
Dynamic field re-rendering
|
|
US9489526B1
(en)
*
|
2014-01-21 |
2016-11-08 |
Shape Security, Inc. |
Pre-analyzing served content
|
|
US8893294B1
(en)
|
2014-01-21 |
2014-11-18 |
Shape Security, Inc. |
Flexible caching
|
|
TWI528216B
(en)
*
|
2014-04-30 |
2016-04-01 |
財團法人資訊工業策進會 |
Method, electronic device, and user interface for on-demand detecting malware
|
|
US9411597B2
(en)
*
|
2014-05-06 |
2016-08-09 |
Nxp B.V. |
Return-oriented programming as an obfuscation technique
|
|
US9411958B2
(en)
*
|
2014-05-23 |
2016-08-09 |
Shape Security, Inc. |
Polymorphic treatment of data entered at clients
|
|
US9858440B1
(en)
|
2014-05-23 |
2018-01-02 |
Shape Security, Inc. |
Encoding of sensitive data
|
|
KR101477050B1
(en)
*
|
2014-05-28 |
2015-01-08 |
충남대학교산학협력단 |
Method for extracting excutable code of application using memory dump
|
|
US10089216B2
(en)
|
2014-06-30 |
2018-10-02 |
Shape Security, Inc. |
Automatically determining whether a page of a web site is broken despite elements on the page that may change
|
|
US9075990B1
(en)
|
2014-07-01 |
2015-07-07 |
Shape Security, Inc. |
Reliable selection of security countermeasures
|
|
US9003511B1
(en)
|
2014-07-22 |
2015-04-07 |
Shape Security, Inc. |
Polymorphic security policy action
|
|
US9602543B2
(en)
|
2014-09-09 |
2017-03-21 |
Shape Security, Inc. |
Client/server polymorphism using polymorphic hooks
|
|
US9438625B1
(en)
|
2014-09-09 |
2016-09-06 |
Shape Security, Inc. |
Mitigating scripted attacks using dynamic polymorphism
|
|
US10657262B1
(en)
|
2014-09-28 |
2020-05-19 |
Red Balloon Security, Inc. |
Method and apparatus for securing embedded device firmware
|
|
US10528735B2
(en)
|
2014-11-17 |
2020-01-07 |
Morphisec Information Security 2014 Ltd. |
Malicious code protection for computer systems based on process modification
|
|
DE102014019090A1
(en)
*
|
2014-12-18 |
2016-06-23 |
Giesecke & Devrient Gmbh |
Method for providing a safety-critical software application on a computer unit
|
|
US9825995B1
(en)
|
2015-01-14 |
2017-11-21 |
Shape Security, Inc. |
Coordinated application of security policies
|
|
US10042589B2
(en)
|
2015-03-11 |
2018-08-07 |
Secure Cloud Systems, Inc. |
Encrypted data storage and retrieval system
|
|
GB201520760D0
(en)
|
2015-05-27 |
2016-01-06 |
Mypinpad Ltd And Licentia Group Ltd |
Encoding methods and systems
|
|
US10230718B2
(en)
|
2015-07-07 |
2019-03-12 |
Shape Security, Inc. |
Split serving of computer code
|
|
US9807113B2
(en)
|
2015-08-31 |
2017-10-31 |
Shape Security, Inc. |
Polymorphic obfuscation of executable code
|
|
US20170118241A1
(en)
*
|
2015-10-26 |
2017-04-27 |
Shape Security, Inc. |
Multi-Layer Computer Security Countermeasures
|
|
US10375026B2
(en)
|
2015-10-28 |
2019-08-06 |
Shape Security, Inc. |
Web transaction status tracking
|
|
US9588758B1
(en)
|
2015-12-18 |
2017-03-07 |
International Business Machines Corporation |
Identifying user managed software modules
|
|
WO2017137804A1
(en)
|
2016-02-11 |
2017-08-17 |
Morphisec Information Security Ltd. |
Automated classification of exploits based on runtime environmental features
|
|
JPWO2017159258A1
(en)
*
|
2016-03-15 |
2019-01-24 |
パナソニックIpマネジメント株式会社 |
Information processing apparatus and environment setting method
|
|
US10853041B2
(en)
|
2017-03-09 |
2020-12-01 |
Microsoft Technology Licensing, Llc |
Extensible instrumentation
|
|
US10642714B2
(en)
*
|
2017-03-09 |
2020-05-05 |
Microsoft Technology Licensing, Llc |
Mapping dynamic analysis data to source code
|
|
US10809985B2
(en)
|
2017-03-09 |
2020-10-20 |
Microsoft Technology Licensing, Llc |
Instrumenting program code
|
|
US11012722B2
(en)
|
2018-02-22 |
2021-05-18 |
Secure Cloud Systems, Inc. |
System and method for securely transferring data
|
|
US11329963B2
(en)
|
2018-02-22 |
2022-05-10 |
Eclypses, Inc. |
System and method for securely transferring data
|
|
CN108777611B
(en)
*
|
2018-05-11 |
2021-06-18 |
吉林大学 |
Doubly linked list sequential encryption and decryption method based on double key stream cipher
|
|
US10776460B2
(en)
*
|
2018-10-15 |
2020-09-15 |
KameleonSec Ltd. |
Proactive security system based on code polymorphism
|
|
US11157645B2
(en)
*
|
2018-11-01 |
2021-10-26 |
International Business Machines Corporation |
Data masking with isomorphic functions
|
|
US11836246B2
(en)
*
|
2018-11-19 |
2023-12-05 |
Secure Micro Ltd |
Computer implemented method
|
|
US20210056220A1
(en)
*
|
2019-08-22 |
2021-02-25 |
Mediatek Inc. |
Method for improving confidentiality protection of neural network model
|
|
GB201916441D0
(en)
|
2019-11-12 |
2019-12-25 |
Mypinpad Ltd |
Computer-implemented system and method
|
|
US11436327B1
(en)
*
|
2019-12-24 |
2022-09-06 |
Fireeye Security Holdings Us Llc |
System and method for circumventing evasive code for cyberthreat detection
|
|
US11405203B2
(en)
|
2020-02-17 |
2022-08-02 |
Eclypses, Inc. |
System and method for securely transferring data using generated encryption keys
|
|
US11610000B2
(en)
|
2020-10-07 |
2023-03-21 |
Bank Of America Corporation |
System and method for identifying unpermitted data in source code
|
|
US12131159B2
(en)
*
|
2020-12-21 |
2024-10-29 |
Intel Corporation |
ISA opcode parameterization and opcode space layout randomization
|
|
US11720693B2
(en)
|
2021-03-05 |
2023-08-08 |
Eclypses, Inc. |
System and method for securely transferring data
|
|
US12353576B2
(en)
|
2021-03-05 |
2025-07-08 |
Eclypses, Inc. |
System and method for securely transferring data using encryption keys
|
|
US11522707B2
(en)
|
2021-03-05 |
2022-12-06 |
Eclypses, Inc. |
System and method for detecting compromised devices
|
|
CN113495755B
(en)
*
|
2021-06-29 |
2023-06-09 |
青岛海尔科技有限公司 |
Information multidimensional analysis method and device
|
|
WO2023129825A1
(en)
*
|
2021-12-29 |
2023-07-06 |
Voyetra Turtle Beach, Inc. |
Mouse device that detects non-human mouse events through encryption and method thereof
|
|
KR20250006606A
(en)
*
|
2023-07-04 |
2025-01-13 |
주식회사 락인컴퍼니 |
A Security method of input data using random number data for security keypad
|