SE468728B
(en)
*
|
1991-07-05 |
1993-03-08 |
Nokia Data Ab |
LOCKING DEVICE FOR PORTABLE COMPUTERS
|
US5440723A
(en)
*
|
1993-01-19 |
1995-08-08 |
International Business Machines Corporation |
Automatic immune system for computers and computer networks
|
US5677997A
(en)
*
|
1993-02-11 |
1997-10-14 |
Talatik; Kirit K. |
Method and apparatus for automated conformance and enforcement of behavior in application processing systems
|
US5675771A
(en)
*
|
1993-09-28 |
1997-10-07 |
Bull Hn Information Systems Inc. |
Mechanism for enabling emulation system users to directly invoke a number of host system facilities for executing host procedures either synchronously or asynchronously in a secure manner through automatically created shell mechanisms
|
US5572711A
(en)
*
|
1993-09-28 |
1996-11-05 |
Bull Hn Information Systems Inc. |
Mechanism for linking together the files of emulated and host system for access by emulated system users
|
US5664098A
(en)
*
|
1993-09-28 |
1997-09-02 |
Bull Hn Information Systems Inc. |
Dual decor capability for a host system which runs emulated application programs to enable direct access to host facilities for executing emulated system operations
|
US5802275A
(en)
*
|
1994-06-22 |
1998-09-01 |
Lucent Technologies Inc. |
Isolation of non-secure software from secure software to limit virus infection
|
US5483649A
(en)
*
|
1994-07-01 |
1996-01-09 |
Ybm Technologies, Inc. |
Personal computer security system
|
US5809138A
(en)
*
|
1994-07-25 |
1998-09-15 |
Netz Computing Ltd. |
Method for protecting storage media against computer virus infection
|
US7133846B1
(en)
|
1995-02-13 |
2006-11-07 |
Intertrust Technologies Corp. |
Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management
|
US5943422A
(en)
|
1996-08-12 |
1999-08-24 |
Intertrust Technologies Corp. |
Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
|
US5892900A
(en)
|
1996-08-30 |
1999-04-06 |
Intertrust Technologies Corp. |
Systems and methods for secure transaction management and electronic rights protection
|
EP1555591B1
(en)
|
1995-02-13 |
2013-08-14 |
Intertrust Technologies Corp. |
Secure transaction management
|
US6658568B1
(en)
|
1995-02-13 |
2003-12-02 |
Intertrust Technologies Corporation |
Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management
|
US6948070B1
(en)
|
1995-02-13 |
2005-09-20 |
Intertrust Technologies Corporation |
Systems and methods for secure transaction management and electronic rights protection
|
US6157721A
(en)
|
1996-08-12 |
2000-12-05 |
Intertrust Technologies Corp. |
Systems and methods using cryptography to protect secure computing environments
|
US5579478A
(en)
*
|
1995-05-16 |
1996-11-26 |
Hewlett-Packard Company |
System administration module for an operating system affords graded restricted access privileges
|
JP4162099B2
(en)
|
1995-06-02 |
2008-10-08 |
富士通株式会社 |
Device having function to cope with virus infection and storage device thereof
|
US5675510A
(en)
*
|
1995-06-07 |
1997-10-07 |
Pc Meter L.P. |
Computer use meter and analyzer
|
US5748957A
(en)
*
|
1995-06-27 |
1998-05-05 |
Klein; Dean A. |
Computer system usage determination based on hard disk drive activity
|
GB2303947A
(en)
*
|
1995-07-31 |
1997-03-05 |
Ibm |
Boot sector virus protection in computer systems
|
WO1997008623A1
(en)
*
|
1995-08-23 |
1997-03-06 |
Symantec Corporation |
Coherent file system access during defragmentation operations on a storage media
|
US5797115A
(en)
*
|
1995-08-24 |
1998-08-18 |
Fuller; Billy |
Measuring direct and indirect usage of a central processing unit
|
US5757924A
(en)
*
|
1995-09-18 |
1998-05-26 |
Digital Secured Networks Techolognies, Inc. |
Network security device which performs MAC address translation without affecting the IP address
|
JPH09134310A
(en)
*
|
1995-11-07 |
1997-05-20 |
Fujitsu Ltd |
Storage medium and method for storing data decoding algorithm
|
DE69729495T2
(en)
*
|
1996-03-08 |
2004-10-28 |
Matsushita Electric Industrial Co., Ltd., Kadoma |
Image information processing system and microprocessor for the protected reproduction of audiovisual data
|
US5832513A
(en)
*
|
1996-06-04 |
1998-11-03 |
Symantec Corporation |
Detecting significant file system alterations during execution of a storage media software utility
|
US6272538B1
(en)
*
|
1996-07-30 |
2001-08-07 |
Micron Technology, Inc. |
Method and system for establishing a security perimeter in computer networks
|
US6993582B2
(en)
|
1996-07-30 |
2006-01-31 |
Micron Technology Inc. |
Mixed enclave operation in a computer network
|
US5832228A
(en)
*
|
1996-07-30 |
1998-11-03 |
Itt Industries, Inc. |
System and method for providing multi-level security in computer devices utilized with non-secure networks
|
US6108637A
(en)
|
1996-09-03 |
2000-08-22 |
Nielsen Media Research, Inc. |
Content display monitor
|
US6052780A
(en)
*
|
1996-09-12 |
2000-04-18 |
Open Security Solutions, Llc |
Computer system and process for accessing an encrypted and self-decrypting digital information product while restricting access to decrypted digital information
|
US5764889A
(en)
*
|
1996-09-26 |
1998-06-09 |
International Business Machines Corporation |
Method and apparatus for creating a security environment for a user task in a client/server system
|
US9219755B2
(en)
|
1996-11-08 |
2015-12-22 |
Finjan, Inc. |
Malicious mobile code runtime monitoring system and methods
|
US6154844A
(en)
*
|
1996-11-08 |
2000-11-28 |
Finjan Software, Ltd. |
System and method for attaching a downloadable security profile to a downloadable
|
US8079086B1
(en)
|
1997-11-06 |
2011-12-13 |
Finjan, Inc. |
Malicious mobile code runtime monitoring system and methods
|
US7613926B2
(en)
*
|
1997-11-06 |
2009-11-03 |
Finjan Software, Ltd |
Method and system for protecting a computer and a network from hostile downloadables
|
US7058822B2
(en)
*
|
2000-03-30 |
2006-06-06 |
Finjan Software, Ltd. |
Malicious mobile code runtime monitoring system and methods
|
US6167520A
(en)
|
1996-11-08 |
2000-12-26 |
Finjan Software, Inc. |
System and method for protecting a client during runtime from hostile downloadables
|
US6802028B1
(en)
|
1996-11-11 |
2004-10-05 |
Powerquest Corporation |
Computer virus detection and removal
|
US5969632A
(en)
*
|
1996-11-22 |
1999-10-19 |
Diamant; Erez |
Information security method and apparatus
|
US6202153B1
(en)
|
1996-11-22 |
2001-03-13 |
Voltaire Advanced Data Security Ltd. |
Security switching device
|
US5892905A
(en)
*
|
1996-12-23 |
1999-04-06 |
International Business Machines Corporation |
Computer apparatus and method for providing a common user interface for software applications accessed via the world-wide web
|
US5748890A
(en)
*
|
1996-12-23 |
1998-05-05 |
U S West, Inc. |
Method and system for authenticating and auditing access by a user to non-natively secured applications
|
EP0951767A2
(en)
|
1997-01-03 |
1999-10-27 |
Fortress Technologies, Inc. |
Improved network security device
|
US7444394B2
(en)
|
1997-02-03 |
2008-10-28 |
Canon Kabushiki Kaisha |
Network data base control device and method thereof
|
US6182225B1
(en)
|
1997-02-03 |
2001-01-30 |
Canon Kabushiki Kaisha |
Network data base control device and method thereof
|
JP3497342B2
(en)
*
|
1997-02-27 |
2004-02-16 |
株式会社日立製作所 |
Client / server system, server, client processing method, and server processing method
|
US5937159A
(en)
*
|
1997-03-28 |
1999-08-10 |
Data General Corporation |
Secure computer system
|
US6212636B1
(en)
|
1997-05-01 |
2001-04-03 |
Itt Manufacturing Enterprises |
Method for establishing trust in a computer network via association
|
US6405234B2
(en)
|
1997-09-11 |
2002-06-11 |
International Business Machines Corporation |
Full time operating system
|
US6141694A
(en)
*
|
1997-09-16 |
2000-10-31 |
Webtv Networks, Inc. |
Determining and verifying user data
|
US7975305B2
(en)
*
|
1997-11-06 |
2011-07-05 |
Finjan, Inc. |
Method and system for adaptive rule-based content scanners for desktop computers
|
US7418731B2
(en)
*
|
1997-11-06 |
2008-08-26 |
Finjan Software, Ltd. |
Method and system for caching at secure gateways
|
US8225408B2
(en)
*
|
1997-11-06 |
2012-07-17 |
Finjan, Inc. |
Method and system for adaptive rule-based content scanners
|
US6205551B1
(en)
|
1998-01-29 |
2001-03-20 |
Lucent Technologies Inc. |
Computer security using virus probing
|
US6298445B1
(en)
|
1998-04-30 |
2001-10-02 |
Netect, Ltd. |
Computer security
|
US6408391B1
(en)
|
1998-05-06 |
2002-06-18 |
Prc Inc. |
Dynamic system defense for information warfare
|
US6182223B1
(en)
|
1998-06-10 |
2001-01-30 |
International Business Machines Corporation |
Method and apparatus for preventing unauthorized access to computer-stored information
|
WO1999066383A2
(en)
*
|
1998-06-15 |
1999-12-23 |
Dmw Worldwide, Inc. |
Method and apparatus for assessing the security of a computer system
|
AU2002311381B2
(en)
*
|
1998-07-21 |
2005-06-09 |
Computer Associates Think, Inc. |
Information security analysis system
|
US6304262B1
(en)
|
1998-07-21 |
2001-10-16 |
Raytheon Company |
Information security analysis system
|
US6253337B1
(en)
|
1998-07-21 |
2001-06-26 |
Raytheon Company |
Information security analysis system
|
US7047423B1
(en)
|
1998-07-21 |
2006-05-16 |
Computer Associates Think, Inc. |
Information security analysis system
|
US6158010A
(en)
*
|
1998-10-28 |
2000-12-05 |
Crosslogix, Inc. |
System and method for maintaining security in a distributed computer network
|
US6530024B1
(en)
|
1998-11-20 |
2003-03-04 |
Centrax Corporation |
Adaptive feedback security system and method
|
EP1161716B1
(en)
|
1999-02-15 |
2013-11-27 |
Hewlett-Packard Development Company, L.P. |
Trusted computing platform
|
GB9905056D0
(en)
|
1999-03-05 |
1999-04-28 |
Hewlett Packard Co |
Computing apparatus & methods of operating computer apparatus
|
EP1161714A1
(en)
|
1999-02-15 |
2001-12-12 |
Hewlett-Packard Company, A Delaware Corporation |
Protection of the configuration of modules in computing apparatus
|
US7236455B1
(en)
|
1999-02-15 |
2007-06-26 |
Hewlett-Packard Development Company, L.P. |
Communications between modules of a computing apparatus
|
KR20000073432A
(en)
*
|
1999-05-11 |
2000-12-05 |
박종문 |
Method For Controlling Personal Computer with Studying Accomplishment
|
EP1056010A1
(en)
*
|
1999-05-28 |
2000-11-29 |
Hewlett-Packard Company |
Data integrity monitoring in trusted computing entity
|
EP1055990A1
(en)
|
1999-05-28 |
2000-11-29 |
Hewlett-Packard Company |
Event logging in a computing platform
|
EP1056014A1
(en)
*
|
1999-05-28 |
2000-11-29 |
Hewlett-Packard Company |
System for providing a trustworthy user interface
|
DE19925910B4
(en)
*
|
1999-06-07 |
2005-04-28 |
Siemens Ag |
Method for processing or processing data
|
AU6218800A
(en)
*
|
1999-07-14 |
2001-01-30 |
Recourse Technologies, Inc. |
System and method for quickly authenticating messages using sequence numbers
|
US6981155B1
(en)
|
1999-07-14 |
2005-12-27 |
Symantec Corporation |
System and method for computer security
|
US7117532B1
(en)
|
1999-07-14 |
2006-10-03 |
Symantec Corporation |
System and method for generating fictitious content for a computer
|
AUPQ206399A0
(en)
|
1999-08-06 |
1999-08-26 |
Imr Worldwide Pty Ltd. |
Network user measurement system and method
|
EP1076279A1
(en)
|
1999-08-13 |
2001-02-14 |
Hewlett-Packard Company |
Computer platforms and their methods of operation
|
US7203962B1
(en)
|
1999-08-30 |
2007-04-10 |
Symantec Corporation |
System and method for using timestamps to detect attacks
|
US6301666B1
(en)
*
|
1999-08-31 |
2001-10-09 |
Everdream, Inc. |
Method and apparatus for remotely enabling a preinstalled and previously disabled application on a computer system
|
US6281894B1
(en)
|
1999-08-31 |
2001-08-28 |
Everdream, Inc. |
Method and apparatus for configuring a hard disk and for providing support for a computer system
|
GB9922665D0
(en)
|
1999-09-25 |
1999-11-24 |
Hewlett Packard Co |
A method of enforcing trusted functionality in a full function platform
|
AU7828300A
(en)
*
|
1999-10-07 |
2001-04-23 |
Ericsson Inc. |
Computer use privacy protector and method
|
GB9923804D0
(en)
|
1999-10-08 |
1999-12-08 |
Hewlett Packard Co |
Electronic commerce system
|
US6567977B1
(en)
*
|
1999-11-15 |
2003-05-20 |
Intel Corporation |
Method and apparatus for software program installation preview directed to system software
|
JP5072160B2
(en)
|
2000-01-12 |
2012-11-14 |
ネットレイティングス・インコーポレーティッド |
System and method for estimating the spread of digital content on the World Wide Web
|
US8176551B1
(en)
*
|
2000-01-27 |
2012-05-08 |
Trapware Corporation |
Detection of observer programs and countermeasures against observer programs
|
US7908652B1
(en)
|
2001-12-21 |
2011-03-15 |
Trapware Corporation |
Detection of observers and countermeasures against observers
|
US6931546B1
(en)
*
|
2000-01-28 |
2005-08-16 |
Network Associates, Inc. |
System and method for providing application services with controlled access into privileged processes
|
US6775780B1
(en)
*
|
2000-03-16 |
2004-08-10 |
Networks Associates Technology, Inc. |
Detecting malicious software by analyzing patterns of system calls generated during emulation
|
US6751794B1
(en)
|
2000-05-25 |
2004-06-15 |
Everdream Corporation |
Intelligent patch checker
|
GB0020488D0
(en)
*
|
2000-08-18 |
2000-10-11 |
Hewlett Packard Co |
Trusted status rollback
|
GB0020441D0
(en)
*
|
2000-08-18 |
2000-10-04 |
Hewlett Packard Co |
Performance of a service on a computing platform
|
US7237123B2
(en)
*
|
2000-09-22 |
2007-06-26 |
Ecd Systems, Inc. |
Systems and methods for preventing unauthorized use of digital content
|
EP1352307A2
(en)
*
|
2000-09-22 |
2003-10-15 |
EDC Systems, Inc. |
Systems and methods for preventing unauthorized use of digital content
|
GB2376763B
(en)
|
2001-06-19 |
2004-12-15 |
Hewlett Packard Co |
Demonstrating integrity of a compartment of a compartmented operating system
|
US7080406B2
(en)
*
|
2000-12-15 |
2006-07-18 |
International Business Machines Corporation |
Method for transferring privilege access to a resource manager with subsequent loss of privilege by the initiating identity
|
US20020078365A1
(en)
*
|
2000-12-15 |
2002-06-20 |
International Business Machines Corporation |
Method for securely enabling an application to impersonate another user in an external authorization manager
|
US7613930B2
(en)
|
2001-01-19 |
2009-11-03 |
Trustware International Limited |
Method for protecting computer programs and data from hostile code
|
EP1225513A1
(en)
*
|
2001-01-19 |
2002-07-24 |
Eyal Dotan |
Method for protecting computer programs and data from hostile code
|
US20020099944A1
(en)
*
|
2001-01-19 |
2002-07-25 |
Bowlin Bradley Allen |
Method and apparatus which enable a computer user to prevent unauthorized access to files stored on a computer
|
GB0102515D0
(en)
*
|
2001-01-31 |
2001-03-21 |
Hewlett Packard Co |
Network adapter management
|
GB0102518D0
(en)
*
|
2001-01-31 |
2001-03-21 |
Hewlett Packard Co |
Trusted operating system
|
GB2372345A
(en)
*
|
2001-02-17 |
2002-08-21 |
Hewlett Packard Co |
Secure email handling using a compartmented operating system
|
GB2372592B
(en)
*
|
2001-02-23 |
2005-03-30 |
Hewlett Packard Co |
Information system
|
GB2372595A
(en)
|
2001-02-23 |
2002-08-28 |
Hewlett Packard Co |
Method of and apparatus for ascertaining the status of a data processing environment.
|
GB2372594B
(en)
|
2001-02-23 |
2004-10-06 |
Hewlett Packard Co |
Trusted computing environment
|
GB2372593B
(en)
*
|
2001-02-23 |
2005-05-18 |
Hewlett Packard Co |
Electronic communication
|
GB2372591A
(en)
*
|
2001-02-23 |
2002-08-28 |
Hewlett Packard Co |
Method of investigating transactions in a data processing environment
|
US8909555B2
(en)
*
|
2001-04-24 |
2014-12-09 |
Hewlett-Packard Development Company, L.P. |
Information security system
|
CA2446584A1
(en)
|
2001-05-09 |
2002-11-14 |
Ecd Systems, Inc. |
Systems and methods for the prevention of unauthorized use and manipulation of digital content
|
GB2376313A
(en)
*
|
2001-06-04 |
2002-12-11 |
Hewlett Packard Co |
Indicating to a user if they are connected to a trusted computer platform
|
GB2376761A
(en)
*
|
2001-06-19 |
2002-12-24 |
Hewlett Packard Co |
An arrangement in which a process is run on a host operating system but may be switched to a guest system if it poses a security risk
|
GB0114898D0
(en)
*
|
2001-06-19 |
2001-08-08 |
Hewlett Packard Co |
Interaction with electronic services and markets
|
GB2376764B
(en)
|
2001-06-19 |
2004-12-29 |
Hewlett Packard Co |
Multiple trusted computing environments
|
GB2376765B
(en)
|
2001-06-19 |
2004-12-29 |
Hewlett Packard Co |
Multiple trusted computing environments with verifiable environment identities
|
US7047562B2
(en)
*
|
2001-06-21 |
2006-05-16 |
Lockheed Martin Corporation |
Conditioning of the execution of an executable program upon satisfaction of criteria
|
US20030014557A1
(en)
*
|
2001-06-29 |
2003-01-16 |
Joubert Berger |
System and method for transforming operating system audit data to a desired format
|
US6873988B2
(en)
*
|
2001-07-06 |
2005-03-29 |
Check Point Software Technologies, Inc. |
System and methods providing anti-virus cooperative enforcement
|
GB2378013A
(en)
*
|
2001-07-27 |
2003-01-29 |
Hewlett Packard Co |
Trusted computer platform audit system
|
EP1282023A1
(en)
*
|
2001-07-30 |
2003-02-05 |
Hewlett-Packard Company |
Trusted platform evaluation
|
EP1282024A1
(en)
*
|
2001-07-30 |
2003-02-05 |
Hewlett-Packard Company |
Trusted identities on a trusted computing platform
|
GB2378272A
(en)
*
|
2001-07-31 |
2003-02-05 |
Hewlett Packard Co |
Method and apparatus for locking an application within a trusted environment
|
US7779267B2
(en)
|
2001-09-04 |
2010-08-17 |
Hewlett-Packard Development Company, L.P. |
Method and apparatus for using a secret in a distributed computing system
|
GB2379829A
(en)
*
|
2001-09-13 |
2003-03-19 |
Hewlett Packard Co |
Method and apparatus for identifying a voice caller
|
GB2379753A
(en)
*
|
2001-09-13 |
2003-03-19 |
Hewlett Packard Co |
Method and apparatus for user self-profiling
|
US7574501B2
(en)
*
|
2001-09-25 |
2009-08-11 |
Siebel Systems, Inc. |
System and method for configuring and viewing audit trails in an information network
|
GB2382419B
(en)
*
|
2001-11-22 |
2005-12-14 |
Hewlett Packard Co |
Apparatus and method for creating a trusted environment
|
US7340777B1
(en)
*
|
2003-03-31 |
2008-03-04 |
Symantec Corporation |
In memory heuristic system and method for detecting viruses
|
US8271778B1
(en)
|
2002-07-24 |
2012-09-18 |
The Nielsen Company (Us), Llc |
System and method for monitoring secure data on a network
|
GB2391341A
(en)
*
|
2002-07-31 |
2004-02-04 |
Hewlett Packard Co |
A method of validating the rights of a user to participate in an interactive computer environment
|
GB2392262A
(en)
*
|
2002-08-23 |
2004-02-25 |
Hewlett Packard Co |
A method of controlling the processing of data
|
US8407798B1
(en)
|
2002-10-01 |
2013-03-26 |
Skybox Secutiry Inc. |
Method for simulation aided security event management
|
US6952779B1
(en)
*
|
2002-10-01 |
2005-10-04 |
Gideon Cohen |
System and method for risk detection and analysis in a computer network
|
US7216367B2
(en)
*
|
2003-02-21 |
2007-05-08 |
Symantec Corporation |
Safe memory scanning
|
US6965968B1
(en)
|
2003-02-27 |
2005-11-15 |
Finjan Software Ltd. |
Policy-based caching
|
US10063523B2
(en)
*
|
2005-09-14 |
2018-08-28 |
Oracle International Corporation |
Crafted identities
|
US9781154B1
(en)
|
2003-04-01 |
2017-10-03 |
Oracle International Corporation |
Systems and methods for supporting information security and sub-system operational protocol conformance
|
US10275723B2
(en)
*
|
2005-09-14 |
2019-04-30 |
Oracle International Corporation |
Policy enforcement via attestations
|
US8468330B1
(en)
|
2003-06-30 |
2013-06-18 |
Oracle International Corporation |
Methods, systems, and data structures for loading and authenticating a module
|
US9118710B2
(en)
|
2003-07-01 |
2015-08-25 |
Securityprofiling, Llc |
System, method, and computer program product for reporting an occurrence in different manners
|
US9118711B2
(en)
|
2003-07-01 |
2015-08-25 |
Securityprofiling, Llc |
Anti-vulnerability system, method, and computer program product
|
US9118708B2
(en)
|
2003-07-01 |
2015-08-25 |
Securityprofiling, Llc |
Multi-path remediation
|
US9350752B2
(en)
|
2003-07-01 |
2016-05-24 |
Securityprofiling, Llc |
Anti-vulnerability system, method, and computer program product
|
US20070113272A2
(en)
|
2003-07-01 |
2007-05-17 |
Securityprofiling, Inc. |
Real-time vulnerability monitoring
|
US9118709B2
(en)
|
2003-07-01 |
2015-08-25 |
Securityprofiling, Llc |
Anti-vulnerability system, method, and computer program product
|
US9100431B2
(en)
|
2003-07-01 |
2015-08-04 |
Securityprofiling, Llc |
Computer program product and apparatus for multi-path remediation
|
US8984644B2
(en)
|
2003-07-01 |
2015-03-17 |
Securityprofiling, Llc |
Anti-vulnerability system, method, and computer program product
|
EP1542115A1
(en)
*
|
2003-10-20 |
2005-06-15 |
Matsushita Electric Industrial Co., Ltd. |
Prevention of unwanted process operations
|
GB2409069B
(en)
*
|
2003-12-11 |
2007-03-07 |
Hewlett Packard Development Co |
Administration of computing entities in a network
|
US7530093B2
(en)
*
|
2004-04-30 |
2009-05-05 |
Microsoft Corporation |
Securing applications and operating systems
|
ITUD20040117A1
(en)
*
|
2004-06-07 |
2004-09-07 |
Univ Degli Studi Udine |
PROCEDURE FOR THE ARCHIVING, IN A NON MODIFIABLE WAY, OF ELECTRONIC DOCUMENTS
|
US20060005227A1
(en)
*
|
2004-07-01 |
2006-01-05 |
Microsoft Corporation |
Languages for expressing security policies
|
US7657923B2
(en)
*
|
2004-07-23 |
2010-02-02 |
Microsoft Corporation |
Framework for a security system
|
US7752671B2
(en)
*
|
2004-10-04 |
2010-07-06 |
Promisec Ltd. |
Method and device for questioning a plurality of computerized devices
|
US7882317B2
(en)
*
|
2004-12-06 |
2011-02-01 |
Microsoft Corporation |
Process isolation using protection domains
|
US8020141B2
(en)
*
|
2004-12-06 |
2011-09-13 |
Microsoft Corporation |
Operating-system process construction
|
US7966643B2
(en)
*
|
2005-01-19 |
2011-06-21 |
Microsoft Corporation |
Method and system for securing a remote file system
|
US7591010B2
(en)
*
|
2005-01-19 |
2009-09-15 |
Microsoft Corporation |
Method and system for separating rules of a security policy from detection criteria
|
US8539587B2
(en)
|
2005-03-22 |
2013-09-17 |
Hewlett-Packard Development Company, L.P. |
Methods, devices and data structures for trusted data
|
US8849968B2
(en)
|
2005-06-20 |
2014-09-30 |
Microsoft Corporation |
Secure and stable hosting of third-party extensions to web services
|
US7739721B2
(en)
*
|
2005-07-11 |
2010-06-15 |
Microsoft Corporation |
Per-user and system granular audit policy implementation
|
US8074231B2
(en)
*
|
2005-10-26 |
2011-12-06 |
Microsoft Corporation |
Configuration of isolated extensions and device drivers
|
US7844829B2
(en)
*
|
2006-01-18 |
2010-11-30 |
Sybase, Inc. |
Secured database system with built-in antivirus protection
|
US20070294699A1
(en)
*
|
2006-06-16 |
2007-12-20 |
Microsoft Corporation |
Conditionally reserving resources in an operating system
|
US8032898B2
(en)
*
|
2006-06-30 |
2011-10-04 |
Microsoft Corporation |
Kernel interface with categorized kernel objects
|
US20080047003A1
(en)
*
|
2006-08-02 |
2008-02-21 |
Oracle International Corporation |
Audit system
|
US20080115067A1
(en)
*
|
2006-11-15 |
2008-05-15 |
Mclean James G |
Method and system for controlling security of a user interface in a computer system
|
US10169781B1
(en)
|
2007-03-07 |
2019-01-01 |
The Nielsen Company (Us), Llc |
Method and system for generating information about portable device advertising
|
US8789063B2
(en)
*
|
2007-03-30 |
2014-07-22 |
Microsoft Corporation |
Master and subordinate operating system kernels for heterogeneous multiprocessor systems
|
US20080244507A1
(en)
*
|
2007-03-30 |
2008-10-02 |
Microsoft Corporation |
Homogeneous Programming For Heterogeneous Multiprocessor Systems
|
CN101359356B
(en)
*
|
2007-08-03 |
2010-08-25 |
联想(北京)有限公司 |
Method and system for deleting or isolating computer virus
|
US20090292775A1
(en)
*
|
2008-05-20 |
2009-11-26 |
Scott Wayne Flenniken |
Method and process for the Forensic Inspection of real time streams FIRST Engine
|
US9280907B2
(en)
*
|
2009-10-01 |
2016-03-08 |
Kryterion, Inc. |
Proctored performance analysis
|
US9141513B2
(en)
|
2009-10-01 |
2015-09-22 |
Kryterion, Inc. |
Maintaining a secure computing device in a test taking environment
|
US8850428B2
(en)
|
2009-11-12 |
2014-09-30 |
Trustware International Limited |
User transparent virtualization method for protecting computer programs and data from hostile code
|
US20120077177A1
(en)
*
|
2010-03-14 |
2012-03-29 |
Kryterion, Inc. |
Secure Online Testing
|
US10672286B2
(en)
|
2010-03-14 |
2020-06-02 |
Kryterion, Inc. |
Cloud based test environment
|
US8769373B2
(en)
|
2010-03-22 |
2014-07-01 |
Cleon L. Rogers, JR. |
Method of identifying and protecting the integrity of a set of source data
|
US8713130B2
(en)
|
2010-08-04 |
2014-04-29 |
Kryterion, Inc. |
Peered proctoring
|
US9137163B2
(en)
|
2010-08-04 |
2015-09-15 |
Kryterion, Inc. |
Optimized data stream upload
|
US8930401B2
(en)
*
|
2010-10-25 |
2015-01-06 |
International Business Machines Corporation |
Accessing and providing access to computer files over a computer network
|
US9043874B2
(en)
*
|
2012-11-28 |
2015-05-26 |
Wal-Mart Stores, Inc. |
System and method for protecting data in an enterprise environment
|
US9247273B2
(en)
|
2013-06-25 |
2016-01-26 |
The Nielsen Company (Us), Llc |
Methods and apparatus to characterize households with media meter data
|
KR102153599B1
(en)
|
2013-11-18 |
2020-09-08 |
삼성전자주식회사 |
Head mounted display apparatus and method for changing a light transmittance
|
US9277265B2
(en)
|
2014-02-11 |
2016-03-01 |
The Nielsen Company (Us), Llc |
Methods and apparatus to calculate video-on-demand and dynamically inserted advertisement viewing probability
|
US10219039B2
(en)
|
2015-03-09 |
2019-02-26 |
The Nielsen Company (Us), Llc |
Methods and apparatus to assign viewers to media meter data
|
US9848224B2
(en)
|
2015-08-27 |
2017-12-19 |
The Nielsen Company(Us), Llc |
Methods and apparatus to estimate demographics of a household
|
US10791355B2
(en)
|
2016-12-20 |
2020-09-29 |
The Nielsen Company (Us), Llc |
Methods and apparatus to determine probabilistic media viewing metrics
|