FR2839392B1
(en)
*
|
2002-05-06 |
2004-06-18 |
Commissariat Energie Atomique |
DEVICE FOR TRANSMITTING ELECTROMAGNETIC RADIATION THROUGH A WALL
|
US7051322B2
(en)
|
2002-12-06 |
2006-05-23 |
@Stake, Inc. |
Software analysis framework
|
US8539063B1
(en)
|
2003-08-29 |
2013-09-17 |
Mcafee, Inc. |
Method and system for containment of networked application client software by explicit human input
|
US7840968B1
(en)
*
|
2003-12-17 |
2010-11-23 |
Mcafee, Inc. |
Method and system for containment of usage of language interfaces
|
US7783735B1
(en)
*
|
2004-03-22 |
2010-08-24 |
Mcafee, Inc. |
Containment of network communication
|
US7873955B1
(en)
|
2004-09-07 |
2011-01-18 |
Mcafee, Inc. |
Solidifying the executable software set of a computer
|
WO2006101549A2
(en)
*
|
2004-12-03 |
2006-09-28 |
Whitecell Software, Inc. |
Secure system for allowing the execution of authorized computer program code
|
US7603552B1
(en)
*
|
2005-05-04 |
2009-10-13 |
Mcafee, Inc. |
Piracy prevention using unique module translation
|
JP4698285B2
(en)
*
|
2005-05-19 |
2011-06-08 |
富士通株式会社 |
Information processing apparatus, information processing method, and computer program
|
US8078740B2
(en)
|
2005-06-03 |
2011-12-13 |
Microsoft Corporation |
Running internet applications with low rights
|
US20060282830A1
(en)
*
|
2005-06-13 |
2006-12-14 |
Microsoft Corporation |
Analysis of the impact of application programs on resources stored in data stores
|
US7730525B2
(en)
*
|
2005-06-22 |
2010-06-01 |
International Business Machines Corporation |
Method, system, and computer program product for limiting authorization of an executable action to an application session
|
TWI264673B
(en)
*
|
2005-06-27 |
2006-10-21 |
Lite On Technology Corp |
Methods and computers for presenting graphical user interface during a boot operation
|
US8789021B2
(en)
*
|
2005-06-30 |
2014-07-22 |
International Business Machines Corporation |
Method and apparatus for object-oriented load testing of computing systems
|
GB0513375D0
(en)
|
2005-06-30 |
2005-08-03 |
Retento Ltd |
Computer security
|
US7856661B1
(en)
|
2005-07-14 |
2010-12-21 |
Mcafee, Inc. |
Classification of software on networked systems
|
US8161548B1
(en)
|
2005-08-15 |
2012-04-17 |
Trend Micro, Inc. |
Malware detection using pattern classification
|
US8306918B2
(en)
*
|
2005-10-11 |
2012-11-06 |
Apple Inc. |
Use of media storage structure with multiple pieces of content in a content-distribution system
|
US20070094496A1
(en)
*
|
2005-10-25 |
2007-04-26 |
Michael Burtscher |
System and method for kernel-level pestware management
|
US7644271B1
(en)
*
|
2005-11-07 |
2010-01-05 |
Cisco Technology, Inc. |
Enforcement of security policies for kernel module loading
|
US7757269B1
(en)
|
2006-02-02 |
2010-07-13 |
Mcafee, Inc. |
Enforcing alignment of approved changes and deployed changes in the software change life-cycle
|
US8239947B1
(en)
*
|
2006-02-06 |
2012-08-07 |
Symantec Corporation |
Method using kernel mode assistance for the detection and removal of threats which are actively preventing detection and removal from a running system
|
US7840958B1
(en)
*
|
2006-02-17 |
2010-11-23 |
Trend Micro, Inc. |
Preventing spyware installation
|
US20070226800A1
(en)
*
|
2006-03-22 |
2007-09-27 |
Tony Nichols |
Method and system for denying pestware direct drive access
|
US7895573B1
(en)
|
2006-03-27 |
2011-02-22 |
Mcafee, Inc. |
Execution environment file inventory
|
US7870387B1
(en)
|
2006-04-07 |
2011-01-11 |
Mcafee, Inc. |
Program-based authorization
|
US8201243B2
(en)
*
|
2006-04-20 |
2012-06-12 |
Webroot Inc. |
Backwards researching activity indicative of pestware
|
US8352930B1
(en)
|
2006-04-24 |
2013-01-08 |
Mcafee, Inc. |
Software modification by group to minimize breakage
|
US8224751B2
(en)
|
2006-05-03 |
2012-07-17 |
Apple Inc. |
Device-independent management of cryptographic information
|
US7979891B2
(en)
*
|
2006-05-09 |
2011-07-12 |
Oracle International Corporation |
Method and system for securing execution of untrusted applications
|
US8888585B1
(en)
*
|
2006-05-10 |
2014-11-18 |
Mcafee, Inc. |
Game console system, method and computer program product with anti-malware/spyware and parental control capabilities
|
US8555404B1
(en)
|
2006-05-18 |
2013-10-08 |
Mcafee, Inc. |
Connectivity-based authorization
|
US8185737B2
(en)
|
2006-06-23 |
2012-05-22 |
Microsoft Corporation |
Communication across domains
|
US8095967B2
(en)
|
2006-07-27 |
2012-01-10 |
White Sky, Inc. |
Secure web site authentication using web site characteristics, secure user credentials and private browser
|
US8190868B2
(en)
|
2006-08-07 |
2012-05-29 |
Webroot Inc. |
Malware management through kernel detection
|
US8392996B2
(en)
*
|
2006-08-08 |
2013-03-05 |
Symantec Corporation |
Malicious software detection
|
US9860274B2
(en)
|
2006-09-13 |
2018-01-02 |
Sophos Limited |
Policy management
|
US20080126779A1
(en)
*
|
2006-09-19 |
2008-05-29 |
Ned Smith |
Methods and apparatus to perform secure boot
|
US8739188B2
(en)
*
|
2006-10-20 |
2014-05-27 |
Mcafee, Inc. |
System, method and computer program product for deferring interface monitoring based on whether a library associated with the interface is loaded
|
US7991902B2
(en)
*
|
2006-12-08 |
2011-08-02 |
Microsoft Corporation |
Reputation-based authorization decisions
|
US8332929B1
(en)
|
2007-01-10 |
2012-12-11 |
Mcafee, Inc. |
Method and apparatus for process enforced configuration management
|
US9424154B2
(en)
|
2007-01-10 |
2016-08-23 |
Mcafee, Inc. |
Method of and system for computer system state checks
|
US20080172677A1
(en)
*
|
2007-01-16 |
2008-07-17 |
Deepak Tripathi |
Controlling execution instances
|
US8613080B2
(en)
|
2007-02-16 |
2013-12-17 |
Veracode, Inc. |
Assessment and analysis of software security flaws in virtual machines
|
US8856782B2
(en)
*
|
2007-03-01 |
2014-10-07 |
George Mason Research Foundation, Inc. |
On-demand disposable virtual work system
|
US8108856B2
(en)
*
|
2007-03-30 |
2012-01-31 |
Intel Corporation |
Method and apparatus for adaptive integrity measurement of computer software
|
KR101281931B1
(en)
*
|
2007-04-06 |
2013-08-26 |
삼성전자주식회사 |
System and method for device management security of trap management object
|
US8099785B1
(en)
*
|
2007-05-03 |
2012-01-17 |
Kaspersky Lab, Zao |
Method and system for treatment of cure-resistant computer malware
|
US8347098B2
(en)
*
|
2007-05-22 |
2013-01-01 |
Apple Inc. |
Media storage structures for storing content, devices for using such structures, systems for distributing such structures
|
US8422674B2
(en)
*
|
2007-05-29 |
2013-04-16 |
International Business Machines Corporation |
Application-specific secret generation
|
US8433927B2
(en)
*
|
2007-05-29 |
2013-04-30 |
International Business Machines Corporation |
Cryptographically-enabled privileged mode execution
|
US8332635B2
(en)
*
|
2007-05-29 |
2012-12-11 |
International Business Machines Corporation |
Updateable secure kernel extensions
|
KR101368912B1
(en)
*
|
2007-06-11 |
2014-02-27 |
삼성전자주식회사 |
Method for controlling home network devices using Rich Site Summary service and apparatus therefor
|
US10019570B2
(en)
|
2007-06-14 |
2018-07-10 |
Microsoft Technology Licensing, Llc |
Protection and communication abstractions for web browsers
|
US7950025B1
(en)
*
|
2007-06-29 |
2011-05-24 |
Emc Corporation |
Common software environment
|
US7950022B1
(en)
*
|
2007-06-29 |
2011-05-24 |
Emc Corporation |
Techniques for use with device drivers in a common software environment
|
KR100897849B1
(en)
*
|
2007-09-07 |
2009-05-15 |
한국전자통신연구원 |
Apparatus and Method for finding malicious process
|
US8214895B2
(en)
|
2007-09-26 |
2012-07-03 |
Microsoft Corporation |
Whitelist and blacklist identification data
|
US9959404B2
(en)
*
|
2007-10-01 |
2018-05-01 |
Symantec Corporation |
Methods and systems for creating and updating approved-file and trusted-domain databases
|
US8332636B2
(en)
*
|
2007-10-02 |
2012-12-11 |
International Business Machines Corporation |
Secure policy differentiation by secure kernel design
|
US8166304B2
(en)
*
|
2007-10-02 |
2012-04-24 |
International Business Machines Corporation |
Support for multiple security policies on a unified authentication architecture
|
US8195931B1
(en)
|
2007-10-31 |
2012-06-05 |
Mcafee, Inc. |
Application change control
|
US20090133097A1
(en)
*
|
2007-11-15 |
2009-05-21 |
Ned Smith |
Device, system, and method for provisioning trusted platform module policies to a virtual machine monitor
|
US8590039B1
(en)
|
2007-11-28 |
2013-11-19 |
Mcafee, Inc. |
System, method and computer program product for sending information extracted from a potentially unwanted data sample to generate a signature
|
US10318730B2
(en)
*
|
2007-12-20 |
2019-06-11 |
Bank Of America Corporation |
Detection and prevention of malicious code execution using risk scoring
|
US8127363B2
(en)
*
|
2007-12-26 |
2012-02-28 |
Intel Corporation |
Method and apparatus for booting a processing system
|
US20090183227A1
(en)
*
|
2008-01-11 |
2009-07-16 |
Microsoft Corporation |
Secure Runtime Execution of Web Script Content on a Client
|
US8701189B2
(en)
|
2008-01-31 |
2014-04-15 |
Mcafee, Inc. |
Method of and system for computer system denial-of-service protection
|
US8789159B2
(en)
*
|
2008-02-11 |
2014-07-22 |
Microsoft Corporation |
System for running potentially malicious code
|
AU2009222082A1
(en)
*
|
2008-03-04 |
2009-09-11 |
Apple Inc. |
Managing code entitlements for software developers in secure operating environments
|
CN102016865A
(en)
*
|
2008-03-04 |
2011-04-13 |
苹果公司 |
System and method of authorizing execution of software code based on accessible entitlements
|
JP5069359B2
(en)
*
|
2008-03-04 |
2012-11-07 |
アップル インコーポレイテッド |
System and method for allowing execution of software code based on at least one installed profile
|
US20090228868A1
(en)
*
|
2008-03-04 |
2009-09-10 |
Max Drukman |
Batch configuration of multiple target devices
|
US20090228704A1
(en)
*
|
2008-03-04 |
2009-09-10 |
Apple Inc. |
Providing developer access in secure operating environments
|
KR101252921B1
(en)
|
2008-03-04 |
2013-04-09 |
애플 인크. |
System and method of authorizing execution of software code in a device based on entitlements granted to a carrier
|
WO2009111405A1
(en)
*
|
2008-03-04 |
2009-09-11 |
Apple Inc. |
System and method of authorizing execution of software code based on a trusted cache
|
US20090247124A1
(en)
*
|
2008-03-04 |
2009-10-01 |
Apple Inc. |
Provisioning mobile devices based on a carrier profile
|
JP5065100B2
(en)
*
|
2008-03-05 |
2012-10-31 |
京セラドキュメントソリューションズ株式会社 |
License management system and license management program
|
US9306796B1
(en)
|
2008-03-18 |
2016-04-05 |
Mcafee, Inc. |
System, method, and computer program product for dynamically configuring a virtual environment for identifying unwanted data
|
US8527978B1
(en)
*
|
2008-03-31 |
2013-09-03 |
Mcafee, Inc. |
System, method, and computer program product for populating a list of known wanted data
|
US8950007B1
(en)
*
|
2008-04-07 |
2015-02-03 |
Lumension Security, Inc. |
Policy-based whitelisting with system change management based on trust framework
|
US8615502B2
(en)
|
2008-04-18 |
2013-12-24 |
Mcafee, Inc. |
Method of and system for reverse mapping vnode pointers
|
US8176554B1
(en)
*
|
2008-05-30 |
2012-05-08 |
Symantec Corporation |
Malware detection through symbol whitelisting
|
US8176555B1
(en)
*
|
2008-05-30 |
2012-05-08 |
Symantec Corporation |
Systems and methods for detecting malicious processes by analyzing process names and process characteristics
|
US20130276120A1
(en)
*
|
2008-06-02 |
2013-10-17 |
Gregory William Dalcher |
System, method, and computer program product for determining whether a security status of data is known at a server
|
EP2134122A1
(en)
*
|
2008-06-13 |
2009-12-16 |
Hewlett-Packard Development Company, L.P. |
Controlling access to a communication network using a local device database and a shared device database
|
US8301904B1
(en)
|
2008-06-24 |
2012-10-30 |
Mcafee, Inc. |
System, method, and computer program product for automatically identifying potentially unwanted data as unwanted
|
US8522015B2
(en)
*
|
2008-06-27 |
2013-08-27 |
Microsoft Corporation |
Authentication of binaries in memory with proxy code execution
|
US20100037317A1
(en)
*
|
2008-08-06 |
2010-02-11 |
Jeong Wook Oh |
Mehtod and system for security monitoring of the interface between a browser and an external browser module
|
CN102150105B
(en)
*
|
2008-09-09 |
2015-06-17 |
凯思网络公司 |
Deployment and management of virtual containers
|
US9098698B2
(en)
|
2008-09-12 |
2015-08-04 |
George Mason Research Foundation, Inc. |
Methods and apparatus for application isolation
|
US9043919B2
(en)
|
2008-10-21 |
2015-05-26 |
Lookout, Inc. |
Crawling multiple markets and correlating
|
US8108933B2
(en)
|
2008-10-21 |
2012-01-31 |
Lookout, Inc. |
System and method for attack and malware prevention
|
US8087067B2
(en)
|
2008-10-21 |
2011-12-27 |
Lookout, Inc. |
Secure mobile platform system
|
US8051480B2
(en)
|
2008-10-21 |
2011-11-01 |
Lookout, Inc. |
System and method for monitoring and analyzing multiple interfaces and multiple protocols
|
US8533844B2
(en)
|
2008-10-21 |
2013-09-10 |
Lookout, Inc. |
System and method for security data collection and analysis
|
US8347386B2
(en)
|
2008-10-21 |
2013-01-01 |
Lookout, Inc. |
System and method for server-coupled malware prevention
|
US9781148B2
(en)
|
2008-10-21 |
2017-10-03 |
Lookout, Inc. |
Methods and systems for sharing risk responses between collections of mobile communications devices
|
US8984628B2
(en)
*
|
2008-10-21 |
2015-03-17 |
Lookout, Inc. |
System and method for adverse mobile application identification
|
US9367680B2
(en)
|
2008-10-21 |
2016-06-14 |
Lookout, Inc. |
System and method for mobile communication device application advisement
|
US8060936B2
(en)
|
2008-10-21 |
2011-11-15 |
Lookout, Inc. |
Security status and information display system
|
US9235704B2
(en)
|
2008-10-21 |
2016-01-12 |
Lookout, Inc. |
System and method for a scanning API
|
US8260711B1
(en)
*
|
2008-12-03 |
2012-09-04 |
Symantec Corporation |
Systems and methods for managing rights of data via dynamic taint analysis
|
US8544003B1
(en)
|
2008-12-11 |
2013-09-24 |
Mcafee, Inc. |
System and method for managing virtual machine configurations
|
US8855601B2
(en)
|
2009-02-17 |
2014-10-07 |
Lookout, Inc. |
System and method for remotely-initiated audio communication
|
US9042876B2
(en)
|
2009-02-17 |
2015-05-26 |
Lookout, Inc. |
System and method for uploading location information based on device movement
|
US8467768B2
(en)
|
2009-02-17 |
2013-06-18 |
Lookout, Inc. |
System and method for remotely securing or recovering a mobile device
|
US8538815B2
(en)
*
|
2009-02-17 |
2013-09-17 |
Lookout, Inc. |
System and method for mobile device replacement
|
US9955352B2
(en)
|
2009-02-17 |
2018-04-24 |
Lookout, Inc. |
Methods and systems for addressing mobile communications devices that are lost or stolen but not yet reported as such
|
US20100212021A1
(en)
*
|
2009-02-18 |
2010-08-19 |
Harris Technology, Llc |
Decrement software
|
US8627461B2
(en)
|
2009-03-04 |
2014-01-07 |
Mcafee, Inc. |
System, method, and computer program product for verifying an identification of program information as unwanted
|
US11489857B2
(en)
|
2009-04-21 |
2022-11-01 |
Webroot Inc. |
System and method for developing a risk profile for an internet resource
|
US8856525B2
(en)
*
|
2009-08-13 |
2014-10-07 |
Michael Gregor Kaplan |
Authentication of email servers and personal computers
|
US8381284B2
(en)
|
2009-08-21 |
2013-02-19 |
Mcafee, Inc. |
System and method for enforcing security policies in a virtual environment
|
US8341627B2
(en)
*
|
2009-08-21 |
2012-12-25 |
Mcafee, Inc. |
Method and system for providing user space address protection from writable memory area in a virtual environment
|
KR101042857B1
(en)
*
|
2009-09-03 |
2011-06-20 |
주식회사 잉카인터넷 |
method for blocking excution of hacking process
|
WO2011030455A1
(en)
*
|
2009-09-14 |
2011-03-17 |
森清 |
Secure audit system and secure audit method
|
US8332946B1
(en)
*
|
2009-09-15 |
2012-12-11 |
AVG Netherlands B.V. |
Method and system for protecting endpoints
|
US9755886B2
(en)
*
|
2009-09-30 |
2017-09-05 |
Micro Focus Software Inc. |
Techniques for conditional name resolution and configuration
|
WO2011042892A1
(en)
*
|
2009-10-09 |
2011-04-14 |
Nokia Corporation |
Platform security
|
US20110087692A1
(en)
*
|
2009-10-13 |
2011-04-14 |
Google Inc. |
Application whitelisting in a cloud-based computing device
|
US8402553B2
(en)
*
|
2009-10-30 |
2013-03-19 |
International Business Machines Corporation |
Updating an operating system of a computer system
|
US9479509B2
(en)
*
|
2009-11-06 |
2016-10-25 |
Red Hat, Inc. |
Unified system for authentication and authorization
|
US9552497B2
(en)
*
|
2009-11-10 |
2017-01-24 |
Mcafee, Inc. |
System and method for preventing data loss using virtual machine wrapped applications
|
US8397301B2
(en)
|
2009-11-18 |
2013-03-12 |
Lookout, Inc. |
System and method for identifying and assessing vulnerabilities on a mobile communication device
|
US8719939B2
(en)
*
|
2009-12-31 |
2014-05-06 |
Mcafee, Inc. |
Malware detection via reputation system
|
US9185064B2
(en)
*
|
2010-01-15 |
2015-11-10 |
Microsoft Technology Licensing, Llc |
Interactive email
|
US9219936B2
(en)
*
|
2010-02-05 |
2015-12-22 |
Maxlinear, Inc. |
Conditional access integration in a SOC for mobile TV applications
|
US8813232B2
(en)
*
|
2010-03-04 |
2014-08-19 |
Mcafee Inc. |
Systems and methods for risk rating and pro-actively detecting malicious online ads
|
US8938689B2
(en)
*
|
2010-03-30 |
2015-01-20 |
Ncr Corporation |
Window suppression
|
US8949797B2
(en)
|
2010-04-16 |
2015-02-03 |
International Business Machines Corporation |
Optimizing performance of integrity monitoring
|
US9836724B2
(en)
|
2010-04-23 |
2017-12-05 |
Microsoft Technology Licensing, Llc |
Email views
|
JP2011253511A
(en)
*
|
2010-06-02 |
2011-12-15 |
Minoru Yoshida |
Information generation system and method thereof
|
US8938800B2
(en)
|
2010-07-28 |
2015-01-20 |
Mcafee, Inc. |
System and method for network level protection against malicious software
|
US8925101B2
(en)
|
2010-07-28 |
2014-12-30 |
Mcafee, Inc. |
System and method for local protection against malicious software
|
WO2012023050A2
(en)
|
2010-08-20 |
2012-02-23 |
Overtis Group Limited |
Secure cloud computing system and method
|
US8583091B1
(en)
|
2010-09-06 |
2013-11-12 |
Sprint Communications Company L.P. |
Dynamic loading, unloading, and caching of alternate complete interfaces
|
US8549003B1
(en)
|
2010-09-12 |
2013-10-01 |
Mcafee, Inc. |
System and method for clustering host inventories
|
US8082585B1
(en)
*
|
2010-09-13 |
2011-12-20 |
Raymond R. Givonetti |
Protecting computers from malware using a hardware solution that is not alterable by any software
|
DE102010037651B4
(en)
*
|
2010-09-20 |
2018-02-01 |
Kobil Systems Gmbh |
Procedure for examining actions with data
|
EP2439673A3
(en)
*
|
2010-10-11 |
2012-05-30 |
Lumension Security, Inc. |
Systems and methods for implementing application control security
|
TWI420339B
(en)
|
2010-11-10 |
2013-12-21 |
Ind Tech Res Inst |
Software authorization system and method
|
CA2759612C
(en)
*
|
2010-11-23 |
2018-10-23 |
Afore Solutions Inc. |
Method and system for securing data
|
US8789138B2
(en)
*
|
2010-12-27 |
2014-07-22 |
Microsoft Corporation |
Application execution in a restricted application execution environment
|
US9286449B2
(en)
*
|
2011-01-21 |
2016-03-15 |
Paypal, Inc. |
System and methods for protecting users from malicious content
|
US9075993B2
(en)
|
2011-01-24 |
2015-07-07 |
Mcafee, Inc. |
System and method for selectively grouping and managing program files
|
US8863232B1
(en)
|
2011-02-04 |
2014-10-14 |
hopTo Inc. |
System for and methods of controlling user access to applications and/or programs of a computer
|
US10574630B2
(en)
|
2011-02-15 |
2020-02-25 |
Webroot Inc. |
Methods and apparatus for malware threat research
|
JP2012173870A
(en)
*
|
2011-02-18 |
2012-09-10 |
Toshiba Corp |
Semiconductor device and memory protection method
|
US20120216281A1
(en)
*
|
2011-02-22 |
2012-08-23 |
PCTEL Secure LLC |
Systems and Methods for Providing a Computing Device Having a Secure Operating System Kernel
|
US9112830B2
(en)
|
2011-02-23 |
2015-08-18 |
Mcafee, Inc. |
System and method for interlocking a host and a gateway
|
US8528083B2
(en)
*
|
2011-03-10 |
2013-09-03 |
Adobe Systems Incorporated |
Using a call gate to prevent secure sandbox leakage
|
US9652616B1
(en)
*
|
2011-03-14 |
2017-05-16 |
Symantec Corporation |
Techniques for classifying non-process threats
|
US8499354B1
(en)
*
|
2011-03-15 |
2013-07-30 |
Symantec Corporation |
Preventing malware from abusing application data
|
US20120259806A1
(en)
*
|
2011-04-11 |
2012-10-11 |
Balakumaran Balabaskaran |
User as a Service
|
RU2454705C1
(en)
*
|
2011-04-19 |
2012-06-27 |
Закрытое акционерное общество "Лаборатория Касперского" |
System and method of protecting computing device from malicious objects using complex infection schemes
|
US8689304B2
(en)
*
|
2011-04-27 |
2014-04-01 |
International Business Machines Corporation |
Multiple independent authentications for enhanced security
|
US8042186B1
(en)
|
2011-04-28 |
2011-10-18 |
Kaspersky Lab Zao |
System and method for detection of complex malware
|
AU2012250953B2
(en)
|
2011-04-30 |
2015-04-09 |
VMware LLC |
Dynamic management of groups for entitlement and provisioning of computer resources
|
US8983855B1
(en)
|
2011-05-16 |
2015-03-17 |
Mckesson Financial Holdings |
Systems and methods for evaluating adherence to a project control process
|
US8738765B2
(en)
|
2011-06-14 |
2014-05-27 |
Lookout, Inc. |
Mobile device DNS optimization
|
US9152404B2
(en)
*
|
2011-07-13 |
2015-10-06 |
Z124 |
Remote device filter
|
US20130268559A1
(en)
|
2011-07-13 |
2013-10-10 |
Z124 |
Virtual file system remote search
|
US8788881B2
(en)
|
2011-08-17 |
2014-07-22 |
Lookout, Inc. |
System and method for mobile device push communications
|
US20130055369A1
(en)
*
|
2011-08-24 |
2013-02-28 |
Mcafee, Inc. |
System and method for day-zero authentication of activex controls
|
US20130268703A1
(en)
|
2011-09-27 |
2013-10-10 |
Z124 |
Rules based hierarchical data virtualization
|
US9594881B2
(en)
|
2011-09-09 |
2017-03-14 |
Mcafee, Inc. |
System and method for passive threat detection using virtual memory inspection
|
US8613101B2
(en)
|
2011-09-12 |
2013-12-17 |
Microsoft Corporation |
Software distribution service federation
|
EP2610776B1
(en)
|
2011-09-16 |
2019-08-21 |
Veracode, Inc. |
Automated behavioural and static analysis using an instrumented sandbox and machine learning classification for mobile security
|
US9262624B2
(en)
*
|
2011-09-16 |
2016-02-16 |
Mcafee, Inc. |
Device-tailored whitelists
|
US9619810B1
(en)
|
2011-10-11 |
2017-04-11 |
Sprint Communications Company L.P. |
Zone architecture for dynamic targeted content creation
|
US8694738B2
(en)
|
2011-10-11 |
2014-04-08 |
Mcafee, Inc. |
System and method for critical address space protection in a hypervisor environment
|
US8973144B2
(en)
*
|
2011-10-13 |
2015-03-03 |
Mcafee, Inc. |
System and method for kernel rootkit protection in a hypervisor environment
|
US9069586B2
(en)
|
2011-10-13 |
2015-06-30 |
Mcafee, Inc. |
System and method for kernel rootkit protection in a hypervisor environment
|
US8713668B2
(en)
|
2011-10-17 |
2014-04-29 |
Mcafee, Inc. |
System and method for redirected firewall discovery in a network environment
|
US20130097660A1
(en)
*
|
2011-10-17 |
2013-04-18 |
Mcafee, Inc. |
System and method for whitelisting applications in a mobile network environment
|
US8800024B2
(en)
|
2011-10-17 |
2014-08-05 |
Mcafee, Inc. |
System and method for host-initiated firewall discovery in a network environment
|
US8181254B1
(en)
*
|
2011-10-28 |
2012-05-15 |
Google Inc. |
Setting default security features for use with web applications and extensions
|
WO2013063474A1
(en)
|
2011-10-28 |
2013-05-02 |
Scargo, Inc. |
Security policy deployment and enforcement system for the detection and control of polymorphic and targeted malware
|
US8584235B2
(en)
*
|
2011-11-02 |
2013-11-12 |
Bitdefender IPR Management Ltd. |
Fuzzy whitelisting anti-malware systems and methods
|
GB2492857B
(en)
|
2011-11-30 |
2013-07-17 |
Avecto Ltd |
Method and computer device to control software file downloads
|
US9081959B2
(en)
|
2011-12-02 |
2015-07-14 |
Invincea, Inc. |
Methods and apparatus for control and detection of malicious content using a sandbox environment
|
US9137261B2
(en)
*
|
2012-02-03 |
2015-09-15 |
Apple Inc. |
Centralized operation management
|
US9286063B2
(en)
|
2012-02-22 |
2016-03-15 |
Veracode, Inc. |
Methods and systems for providing feedback and suggested programming methods
|
US8656494B2
(en)
*
|
2012-02-28 |
2014-02-18 |
Kaspersky Lab, Zao |
System and method for optimization of antivirus processing of disk files
|
US8650645B1
(en)
*
|
2012-03-29 |
2014-02-11 |
Mckesson Financial Holdings |
Systems and methods for protecting proprietary data
|
CN104335220B
(en)
*
|
2012-03-30 |
2018-04-20 |
爱迪德技术有限公司 |
For preventing and detecting the method and system of security threat
|
US8739272B1
(en)
|
2012-04-02 |
2014-05-27 |
Mcafee, Inc. |
System and method for interlocking a host and a gateway
|
US9817951B2
(en)
|
2012-04-06 |
2017-11-14 |
Comcast Cable Communications, Llc |
System and method for analyzing a device
|
US9152784B2
(en)
|
2012-04-18 |
2015-10-06 |
Mcafee, Inc. |
Detection and prevention of installation of malicious mobile applications
|
US8959362B2
(en)
*
|
2012-04-30 |
2015-02-17 |
General Electric Company |
Systems and methods for controlling file execution for industrial control systems
|
KR101212553B1
(en)
*
|
2012-05-11 |
2012-12-14 |
주식회사 안랩 |
Apparatus and method for detecting malicious files
|
US9419848B1
(en)
|
2012-05-25 |
2016-08-16 |
hopTo Inc. |
System for and method of providing a document sharing service in combination with remote access to document applications
|
US8713658B1
(en)
|
2012-05-25 |
2014-04-29 |
Graphon Corporation |
System for and method of providing single sign-on (SSO) capability in an application publishing environment
|
US8856907B1
(en)
|
2012-05-25 |
2014-10-07 |
hopTo Inc. |
System for and methods of providing single sign-on (SSO) capability in an application publishing and/or document sharing environment
|
US9589129B2
(en)
|
2012-06-05 |
2017-03-07 |
Lookout, Inc. |
Determining source of side-loaded software
|
US9407443B2
(en)
|
2012-06-05 |
2016-08-02 |
Lookout, Inc. |
Component analysis of software applications on computing devices
|
US20130333039A1
(en)
*
|
2012-06-07 |
2013-12-12 |
Mcafee, Inc. |
Evaluating Whether to Block or Allow Installation of a Software Application
|
US9043903B2
(en)
|
2012-06-08 |
2015-05-26 |
Crowdstrike, Inc. |
Kernel-level security agent
|
US9733953B2
(en)
|
2012-06-22 |
2017-08-15 |
Microsoft Technology Licensing, Llc |
API redirection for limited capability operating systems
|
US9015844B1
(en)
*
|
2012-06-25 |
2015-04-21 |
Symantec Corporation |
Techniques for web application vulnerability scanning
|
US9043920B2
(en)
|
2012-06-27 |
2015-05-26 |
Tenable Network Security, Inc. |
System and method for identifying exploitable weak points in a network
|
US9405556B2
(en)
|
2012-06-28 |
2016-08-02 |
Microsoft Technology Licensing, Llc |
Dynamic addition and removal of operating system components
|
US9292881B2
(en)
|
2012-06-29 |
2016-03-22 |
Crowdstrike, Inc. |
Social sharing of security information in a group
|
US8843122B1
(en)
*
|
2012-06-29 |
2014-09-23 |
Sprint Communications Company L.P. |
Mobile phone controls preprocessor
|
US9088606B2
(en)
|
2012-07-05 |
2015-07-21 |
Tenable Network Security, Inc. |
System and method for strategic anti-malware monitoring
|
US20140026228A1
(en)
*
|
2012-07-23 |
2014-01-23 |
Kabushiki Kaisha Toshiba |
Information processing apparatus and control method
|
US9413839B2
(en)
|
2012-07-31 |
2016-08-09 |
Sprint Communications Company L.P. |
Traffic management of third party applications
|
US9239812B1
(en)
|
2012-08-08 |
2016-01-19 |
hopTo Inc. |
System for and method of providing a universal I/O command translation framework in an application publishing environment
|
US9183412B2
(en)
|
2012-08-10 |
2015-11-10 |
Sprint Communications Company L.P. |
Systems and methods for provisioning and using multiple trusted security zones on an electronic device
|
RU2495487C1
(en)
*
|
2012-08-10 |
2013-10-10 |
Закрытое акционерное общество "Лаборатория Касперского" |
System and method of determining trust when updating licensed software
|
US9160749B2
(en)
*
|
2012-09-07 |
2015-10-13 |
Oracle International Corporation |
System and method for providing whitelist functionality for use with a cloud computing environment
|
KR101907529B1
(en)
*
|
2012-09-25 |
2018-12-07 |
삼성전자 주식회사 |
Method and apparatus for managing application in a user device
|
CN102902915B
(en)
*
|
2012-09-29 |
2016-06-29 |
北京奇虎科技有限公司 |
The system that file behavior characteristics is detected
|
US9135436B2
(en)
|
2012-10-19 |
2015-09-15 |
The Aerospace Corporation |
Execution stack securing process
|
US9442709B1
(en)
|
2012-10-24 |
2016-09-13 |
Sprint Communications Company L.P. |
Transition experience during loading and updating an interface and applications pack
|
US8655307B1
(en)
|
2012-10-26 |
2014-02-18 |
Lookout, Inc. |
System and method for developing, updating, and using user device behavioral context models to modify user, device, and application state, settings and behavior for enhanced user security
|
JP5702352B2
(en)
*
|
2012-10-31 |
2015-04-15 |
株式会社オプティム |
User terminal, reliability management server, unauthorized remote operation prevention method, and unauthorized remote operation prevention program
|
US9208215B2
(en)
|
2012-12-27 |
2015-12-08 |
Lookout, Inc. |
User classification based on data gathered from a computing device
|
US8973146B2
(en)
|
2012-12-27 |
2015-03-03 |
Mcafee, Inc. |
Herd based scan avoidance system in a network environment
|
US10409980B2
(en)
*
|
2012-12-27 |
2019-09-10 |
Crowdstrike, Inc. |
Real-time representation of security-relevant system state
|
US9374369B2
(en)
|
2012-12-28 |
2016-06-21 |
Lookout, Inc. |
Multi-factor authentication and comprehensive login system for client-server networks
|
US8855599B2
(en)
|
2012-12-31 |
2014-10-07 |
Lookout, Inc. |
Method and apparatus for auxiliary communications with mobile communications device
|
US9424409B2
(en)
|
2013-01-10 |
2016-08-23 |
Lookout, Inc. |
Method and system for protecting privacy and enhancing security on an electronic device
|
US9058493B1
(en)
*
|
2013-01-16 |
2015-06-16 |
Amdocs Software Systems Limited |
System, method, and computer program for conditionally implementing protected content
|
US9336395B2
(en)
*
|
2013-01-25 |
2016-05-10 |
Hewlett-Packard Development Company, L.P. |
Boot driver verification
|
US9591059B2
(en)
|
2013-03-13 |
2017-03-07 |
International Business Machines Corporation |
File change notifications in a scale-out NAS system
|
US9467464B2
(en)
|
2013-03-15 |
2016-10-11 |
Tenable Network Security, Inc. |
System and method for correlating log data to discover network vulnerabilities and assets
|
US9727351B2
(en)
|
2013-04-08 |
2017-08-08 |
Xiaomi Inc. |
Method and device for setting status of application
|
US9578045B2
(en)
|
2013-05-03 |
2017-02-21 |
Webroot Inc. |
Method and apparatus for providing forensic visibility into systems and networks
|
CN104346561B
(en)
*
|
2013-07-29 |
2017-12-29 |
联想(北京)有限公司 |
A kind of method and device for protecting memory cell
|
SG11201600817SA
(en)
*
|
2013-08-02 |
2016-03-30 |
Bothnic Information Co Ltd |
Device for permitting program, program transaction device and method for permitting program thereof
|
US9336389B1
(en)
*
|
2013-08-19 |
2016-05-10 |
Amazon Technologies, Inc. |
Rapid malware inspection of mobile applications
|
CN103473063A
(en)
*
|
2013-09-18 |
2013-12-25 |
北京网秦天下科技有限公司 |
Equipment and method adopting white lists for warning
|
JP6129702B2
(en)
*
|
2013-09-24 |
2017-05-17 |
株式会社東芝 |
Information processing apparatus, information processing system, and program
|
JP6175679B2
(en)
*
|
2013-10-16 |
2017-08-09 |
株式会社 日立産業制御ソリューションズ |
Business management system
|
CN105580023B
(en)
|
2013-10-24 |
2019-08-16 |
迈克菲股份有限公司 |
The malicious application of agency's auxiliary in network environment prevents
|
US9642008B2
(en)
|
2013-10-25 |
2017-05-02 |
Lookout, Inc. |
System and method for creating and assigning a policy for a mobile communications device based on personal data
|
CN103593212A
(en)
*
|
2013-11-01 |
2014-02-19 |
小米科技有限责任公司 |
Method and device for installing application and apparatus
|
RU2571723C2
(en)
|
2013-12-05 |
2015-12-20 |
Закрытое акционерное общество "Лаборатория Касперского" |
System and method of reducing load on operating system when executing antivirus application
|
CN103632073A
(en)
*
|
2013-12-05 |
2014-03-12 |
北京网秦天下科技有限公司 |
Method and device used for controlling terminal application permission
|
US9753796B2
(en)
|
2013-12-06 |
2017-09-05 |
Lookout, Inc. |
Distributed monitoring, evaluation, and response for multiple devices
|
US10122747B2
(en)
|
2013-12-06 |
2018-11-06 |
Lookout, Inc. |
Response generation after distributed monitoring and evaluation of multiple devices
|
US9483636B2
(en)
|
2014-01-17 |
2016-11-01 |
Microsoft Technology Licensing, Llc |
Runtime application integrity protection
|
US10298468B2
(en)
|
2014-01-18 |
2019-05-21 |
Intel Corporation |
Provisioning persistent, dynamic and secure cloud services
|
US9513888B1
(en)
|
2014-01-30 |
2016-12-06 |
Sprint Communications Company L.P. |
Virtual preloads
|
US20150222646A1
(en)
|
2014-01-31 |
2015-08-06 |
Crowdstrike, Inc. |
Tagging Security-Relevant System Objects
|
US9594885B2
(en)
|
2014-03-06 |
2017-03-14 |
Microsoft Technology Licensing, Llc |
Licensing using a cloud public-messaging infrastructure
|
US9665718B2
(en)
|
2014-03-14 |
2017-05-30 |
International Business Machines Corporation |
Correlating a task with commands to perform a change ticket in an IT system
|
US10289405B2
(en)
|
2014-03-20 |
2019-05-14 |
Crowdstrike, Inc. |
Integrity assurance and rebootless updating during runtime
|
US20160344725A1
(en)
*
|
2014-04-02 |
2016-11-24 |
William B. SEVERIN |
Signal haystacks
|
US9912690B2
(en)
*
|
2014-04-08 |
2018-03-06 |
Capital One Financial Corporation |
System and method for malware detection using hashing techniques
|
US10122753B2
(en)
*
|
2014-04-28 |
2018-11-06 |
Sophos Limited |
Using reputation to avoid false malware detections
|
US9917851B2
(en)
|
2014-04-28 |
2018-03-13 |
Sophos Limited |
Intrusion detection using a heartbeat
|
US9641337B2
(en)
*
|
2014-04-28 |
2017-05-02 |
Nxp B.V. |
Interface compatible approach for gluing white-box implementation to surrounding program
|
US9171152B1
(en)
*
|
2014-05-08 |
2015-10-27 |
Symantec Corporation |
Systems and methods for preventing chronic false positives
|
US9760712B2
(en)
*
|
2014-05-23 |
2017-09-12 |
Vmware, Inc. |
Application whitelisting using user identification
|
CN105207775B
(en)
*
|
2014-05-30 |
2019-03-01 |
北京奇虎科技有限公司 |
The read method and device of verification information
|
US9798882B2
(en)
|
2014-06-06 |
2017-10-24 |
Crowdstrike, Inc. |
Real-time model of states of monitored devices
|
JP6424499B2
(en)
*
|
2014-07-10 |
2018-11-21 |
株式会社リコー |
Image forming apparatus, information processing method, and program
|
CN104200161B
(en)
*
|
2014-08-05 |
2017-01-25 |
杭州安恒信息技术有限公司 |
Method for achieving intelligent sandbox file detection and intelligent sandbox detection system based on method
|
US9990505B2
(en)
|
2014-08-12 |
2018-06-05 |
Redwall Technologies, Llc |
Temporally isolating data accessed by a computing device
|
US9710659B2
(en)
*
|
2014-08-28 |
2017-07-18 |
Virtru Corporation |
Methods and systems for enforcing, by a kernel driver, a usage restriction associated with encrypted data
|
US10462185B2
(en)
|
2014-09-05 |
2019-10-29 |
Sequitur Labs, Inc. |
Policy-managed secure code execution and messaging for computing devices and computing device security
|
CN104217162A
(en)
*
|
2014-09-05 |
2014-12-17 |
四川长虹电器股份有限公司 |
Method and system for detecting malicious software in smart terminal
|
US10091174B2
(en)
*
|
2014-09-29 |
2018-10-02 |
Dropbox, Inc. |
Identifying related user accounts based on authentication data
|
US20160105528A1
(en)
*
|
2014-10-08 |
2016-04-14 |
Microsoft Corporation |
Client-assisted fulfillment of a resource request
|
KR101537205B1
(en)
*
|
2014-10-20 |
2015-07-16 |
숭실대학교산학협력단 |
User Terminal to Detect the Tampering of the Applications Using Hash Value and Method for Tamper Detection Using the Same
|
WO2016064930A1
(en)
|
2014-10-21 |
2016-04-28 |
Proofpoint, Inc. |
Systems and methods for application security analysis
|
US9838391B2
(en)
*
|
2014-10-31 |
2017-12-05 |
Proofpoint, Inc. |
Systems and methods for privately performing application security analysis
|
IN2014MU04068A
(en)
|
2014-12-18 |
2015-06-05 |
Cyberoam Technologies Pvt Ltd |
|
RU2584507C1
(en)
*
|
2014-12-19 |
2016-05-20 |
Закрытое акционерное общество "Лаборатория Касперского" |
Method of providing safe execution of script file
|
US10552796B1
(en)
*
|
2014-12-19 |
2020-02-04 |
Amazon Technologies, Inc. |
Approval service in a catalog service platform
|
US20160188874A1
(en)
*
|
2014-12-29 |
2016-06-30 |
Rubicon Labs, Inc. |
System and method for secure code entry point control
|
US10339303B2
(en)
*
|
2015-01-22 |
2019-07-02 |
Mcafee, Llc |
Detection of malicious invocation of application program interface calls
|
JP2016139322A
(en)
*
|
2015-01-28 |
2016-08-04 |
株式会社リコー |
Image processor and electronic blackboard provided with the same
|
US10127375B2
(en)
*
|
2015-03-07 |
2018-11-13 |
Protegrity Corporation |
Enforcing trusted application settings for shared code libraries
|
US10685130B2
(en)
|
2015-04-21 |
2020-06-16 |
Sequitur Labs Inc. |
System and methods for context-aware and situation-aware secure, policy-based access control for computing devices
|
CN106156619B
(en)
*
|
2015-04-23 |
2020-04-03 |
腾讯科技(深圳)有限公司 |
Application security protection method and device
|
US11847237B1
(en)
|
2015-04-28 |
2023-12-19 |
Sequitur Labs, Inc. |
Secure data protection and encryption techniques for computing devices and information storage
|
US9483253B1
(en)
|
2015-04-30 |
2016-11-01 |
Sprint Communications Company L.P. |
Methods for customization of default applications on a mobile communication device
|
AU2016258533B2
(en)
|
2015-05-01 |
2017-11-30 |
Lookout, Inc. |
Determining source of side-loaded software
|
WO2016183504A1
(en)
*
|
2015-05-14 |
2016-11-17 |
Sequitur Labs, Inc. |
System and methods for facilitating secure computing device control and operation
|
US10339316B2
(en)
|
2015-07-28 |
2019-07-02 |
Crowdstrike, Inc. |
Integrity assurance through early loading in the boot phase
|
JP6433865B2
(en)
*
|
2015-08-26 |
2018-12-05 |
アラクサラネットワークス株式会社 |
Communication device
|
US10223294B2
(en)
|
2015-09-01 |
2019-03-05 |
Nxp Usa, Inc. |
Fast secure boot from embedded flash memory
|
US10817606B1
(en)
|
2015-09-30 |
2020-10-27 |
Fireeye, Inc. |
Detecting delayed activation malware using a run-time monitoring agent and time-dilation logic
|
US10706149B1
(en)
*
|
2015-09-30 |
2020-07-07 |
Fireeye, Inc. |
Detecting delayed activation malware using a primary controller and plural time controllers
|
US9858410B2
(en)
*
|
2015-10-26 |
2018-01-02 |
Symantec Corporation |
Techniques for automated application analysis
|
US10963565B1
(en)
*
|
2015-10-29 |
2021-03-30 |
Palo Alto Networks, Inc. |
Integrated application analysis and endpoint protection
|
CN105376222A
(en)
*
|
2015-10-30 |
2016-03-02 |
四川九洲电器集团有限责任公司 |
Intelligent defense system based on cloud computing platform
|
US10762245B2
(en)
*
|
2015-12-17 |
2020-09-01 |
Ncr Corporation |
Input peripheral device security
|
US20190089595A1
(en)
*
|
2017-09-18 |
2019-03-21 |
Cyber 2.0 (2015) LTD |
Automatic security configuration
|
US10152596B2
(en)
*
|
2016-01-19 |
2018-12-11 |
International Business Machines Corporation |
Detecting anomalous events through runtime verification of software execution using a behavioral model
|
US11424931B2
(en)
*
|
2016-01-27 |
2022-08-23 |
Blackberry Limited |
Trusted execution environment
|
US10599409B2
(en)
|
2016-02-02 |
2020-03-24 |
Blackberry Limited |
Application lifecycle operation queueing
|
CA3015352A1
(en)
|
2016-02-23 |
2017-08-31 |
Carbon Black, Inc. |
Cybersecurity systems and techniques
|
US9940480B2
(en)
|
2016-02-25 |
2018-04-10 |
Red Hat, Inc. |
Securing delegated remote management with digital signature
|
US10032023B1
(en)
*
|
2016-03-25 |
2018-07-24 |
Symantec Corporation |
Systems and methods for selectively applying malware signatures
|
EP3443432A4
(en)
|
2016-04-12 |
2020-04-01 |
Guardknox Cyber Technologies Ltd. |
Specially programmed computing systems with associated devices configured to implement secure lockdowns and methods of use thereof
|
US10402577B2
(en)
*
|
2016-06-03 |
2019-09-03 |
Honeywell International Inc. |
Apparatus and method for device whitelisting and blacklisting to override protections for allowed media at nodes of a protected system
|
US10349269B1
(en)
|
2016-06-06 |
2019-07-09 |
Omnicharge, Inc. |
Apparatus, system and method for device activation
|
US11237595B2
(en)
|
2016-06-06 |
2022-02-01 |
Omnicharge, Inc. |
Portable power solutions
|
US10630085B2
(en)
|
2016-06-06 |
2020-04-21 |
Omnicharge, Inc. |
Portable power solutions
|
US20170357494A1
(en)
*
|
2016-06-08 |
2017-12-14 |
International Business Machines Corporation |
Code-level module verification
|
CN106203108A
(en)
*
|
2016-06-29 |
2016-12-07 |
北京市国路安信息技术股份有限公司 |
Linux white list system protection method based on kernel module and device
|
US11062019B2
(en)
|
2016-07-04 |
2021-07-13 |
Traffic Guard Dg Ltd. |
System and method for webpages scripts validation
|
US10592470B2
(en)
|
2016-08-10 |
2020-03-17 |
Microsoft Technology Licensing, Llc |
Discovery of calling application for control of file hydration behavior
|
US10162967B1
(en)
*
|
2016-08-17 |
2018-12-25 |
Trend Micro Incorporated |
Methods and systems for identifying legitimate computer files
|
US11349852B2
(en)
|
2016-08-31 |
2022-05-31 |
Wedge Networks Inc. |
Apparatus and methods for network-based line-rate detection of unknown malware
|
US10700865B1
(en)
|
2016-10-21 |
2020-06-30 |
Sequitur Labs Inc. |
System and method for granting secure access to computing services hidden in trusted computing environments to an unsecure requestor
|
CN106487797B
(en)
*
|
2016-10-25 |
2020-07-07 |
腾讯科技(深圳)有限公司 |
Network data processing method and system
|
US10237293B2
(en)
|
2016-10-27 |
2019-03-19 |
Bitdefender IPR Management Ltd. |
Dynamic reputation indicator for optimizing computer security operations
|
KR101865238B1
(en)
*
|
2016-12-13 |
2018-06-07 |
주식회사 엔피코어 |
Device for deactivating malicious code and method for operating the same
|
US10289844B2
(en)
*
|
2017-01-19 |
2019-05-14 |
International Business Machines Corporation |
Protecting backup files from malware
|
US10387228B2
(en)
|
2017-02-21 |
2019-08-20 |
Crowdstrike, Inc. |
Symmetric bridge component for communications between kernel mode and user mode
|
US10445257B2
(en)
|
2017-04-30 |
2019-10-15 |
Microsoft Technology Licensing, Llc |
Execution of subset of driver code in separate protection domain
|
GB2563066B
(en)
|
2017-06-02 |
2019-11-06 |
Avecto Ltd |
Computer device and method for managing privilege delegation
|
US10218697B2
(en)
|
2017-06-09 |
2019-02-26 |
Lookout, Inc. |
Use of device risk evaluation to manage access to services
|
US10055572B1
(en)
*
|
2017-06-12 |
2018-08-21 |
Mucteba Celik |
Systems and methods for preventing windows kernel code or drivers from being executed
|
US11030303B2
(en)
|
2017-06-19 |
2021-06-08 |
Microsoft Technology Licensing, Llc |
Time limited application enablement
|
US10305923B2
(en)
*
|
2017-06-30 |
2019-05-28 |
SparkCognition, Inc. |
Server-supported malware detection and protection
|
US11487868B2
(en)
*
|
2017-08-01 |
2022-11-01 |
Pc Matic, Inc. |
System, method, and apparatus for computer security
|
US10873588B2
(en)
|
2017-08-01 |
2020-12-22 |
Pc Matic, Inc. |
System, method, and apparatus for computer security
|
US10783239B2
(en)
*
|
2017-08-01 |
2020-09-22 |
Pc Matic, Inc. |
System, method, and apparatus for computer security
|
WO2019030763A1
(en)
*
|
2017-08-10 |
2019-02-14 |
Argus Cyber Security Ltd. |
System and method for detecting exploitation of a component connected to an in-vehicle network
|
JP6728113B2
(en)
*
|
2017-08-22 |
2020-07-22 |
株式会社東芝 |
Information processing apparatus, information processing method, and information processing program
|
GB2566262B
(en)
|
2017-09-01 |
2020-08-26 |
Avecto Ltd |
Managing installation of applications on a computer device
|
JP6829168B2
(en)
|
2017-09-04 |
2021-02-10 |
株式会社東芝 |
Information processing equipment, information processing methods and programs
|
GB2566305B
(en)
|
2017-09-08 |
2020-04-15 |
Avecto Ltd |
Computer device and method for controlling process components
|
JP6759169B2
(en)
*
|
2017-09-11 |
2020-09-23 |
株式会社東芝 |
Information processing equipment, information processing methods, and information processing programs
|
JP6903529B2
(en)
*
|
2017-09-11 |
2021-07-14 |
株式会社東芝 |
Information processing equipment, information processing methods and programs
|
US10885213B2
(en)
|
2017-09-12 |
2021-01-05 |
Sophos Limited |
Secure firewall configurations
|
GB2566949B
(en)
|
2017-09-27 |
2020-09-09 |
Avecto Ltd |
Computer device and method for managing privilege delegation
|
CN108064383A
(en)
*
|
2017-10-25 |
2018-05-22 |
福建联迪商用设备有限公司 |
A kind of management-control method, terminal and the POS terminal of application program permission
|
TWI682323B
(en)
*
|
2017-11-24 |
2020-01-11 |
財團法人工業技術研究院 |
Server and setting method thereof
|
GB2568919B
(en)
|
2017-11-30 |
2020-07-15 |
Avecto Ltd |
Managing removal and modification of installed programs on a computer device
|
US11204788B2
(en)
|
2017-12-11 |
2021-12-21 |
Comodo Security Solutions, Inc. |
Method to protect against fileless infection from command line interpreters or documents
|
US10740459B2
(en)
|
2017-12-28 |
2020-08-11 |
Crowdstrike, Inc. |
Kernel- and user-level cooperative security processing
|
GB2570655B
(en)
|
2018-01-31 |
2020-12-16 |
Avecto Ltd |
Managing privilege delegation on a server device
|
GB2573491B
(en)
|
2018-02-08 |
2020-07-01 |
Avecto Ltd |
Managing privilege delegation on a computer device
|
GB2570924B
(en)
|
2018-02-12 |
2021-06-16 |
Avecto Ltd |
Managing registry access on a computer device
|
JP6783812B2
(en)
|
2018-03-13 |
2020-11-11 |
株式会社東芝 |
Information processing equipment, information processing methods and programs
|
GB2572977B
(en)
|
2018-04-18 |
2020-04-22 |
Avecto Ltd |
Protecting a computer device from escalation of privilege attacks
|
CN108804912B
(en)
*
|
2018-06-15 |
2021-09-28 |
北京大学 |
Application program override detection method based on permission set difference
|
US11163948B2
(en)
|
2018-07-10 |
2021-11-02 |
Beijing Didi Infinity Technology And Development Co., Ltd. |
File fingerprint generation
|
CN108959969A
(en)
*
|
2018-07-26 |
2018-12-07 |
北京北信源信息安全技术有限公司 |
Document protection method and device
|
CN109241727B
(en)
*
|
2018-08-15 |
2022-02-11 |
腾讯科技(深圳)有限公司 |
Permission setting method and device
|
GB2577067B
(en)
*
|
2018-09-12 |
2021-01-13 |
Avecto Ltd |
Controlling applications by an application control system in a computer device
|
JP6914899B2
(en)
*
|
2018-09-18 |
2021-08-04 |
株式会社東芝 |
Information processing equipment, information processing methods and programs
|
US11080416B2
(en)
|
2018-10-08 |
2021-08-03 |
Microsoft Technology Licensing, Llc |
Protecting selected disks on a computer system
|
US11151273B2
(en)
*
|
2018-10-08 |
2021-10-19 |
Microsoft Technology Licensing, Llc |
Controlling installation of unauthorized drivers on a computer system
|
CN109344607A
(en)
*
|
2018-10-08 |
2019-02-15 |
江苏神州信源系统工程有限公司 |
The method and device of hook technical controlling linux system imprinting is called based on system
|
US11425170B2
(en)
|
2018-10-11 |
2022-08-23 |
Honeywell International Inc. |
System and method for deploying and configuring cyber-security protection solution using portable storage device
|
EP3641259A1
(en)
*
|
2018-10-15 |
2020-04-22 |
Siemens Aktiengesellschaft |
Apparatus and method for testing properties of resources
|
US11170080B2
(en)
|
2018-12-07 |
2021-11-09 |
International Business Machines Corporation |
Enforcing primary and secondary authorization controls using change control record identifier and information
|
JP6971958B2
(en)
*
|
2018-12-10 |
2021-11-24 |
株式会社東芝 |
Information processing equipment, information processing methods, and information processing programs
|
US10642977B1
(en)
*
|
2018-12-17 |
2020-05-05 |
Didi Research America, Llc |
Benign file list generation
|
CN111488140B
(en)
*
|
2019-01-29 |
2023-10-27 |
杭州海康威视数字技术股份有限公司 |
Method, device and computer equipment for supporting multiple programming libraries in multiple programming languages
|
EP3696698A1
(en)
*
|
2019-02-18 |
2020-08-19 |
Verimatrix |
Method of protecting a software program against tampering
|
CN110048880A
(en)
*
|
2019-03-15 |
2019-07-23 |
启迪云计算有限公司 |
A kind of floating authorization method of physical machine node
|
CN110138725B
(en)
*
|
2019-03-26 |
2021-12-03 |
视联动力信息技术股份有限公司 |
Data exchange method and security gateway
|
US11443048B2
(en)
*
|
2019-05-06 |
2022-09-13 |
Microsoft Technology Licensing, Llc |
Install-time procedural content generation for encrypted packages
|
US11068565B2
(en)
|
2019-06-13 |
2021-07-20 |
International Business Machines Corporation |
System obtains software features information of another system
|
US11151250B1
(en)
|
2019-06-21 |
2021-10-19 |
Trend Micro Incorporated |
Evaluation of files for cybersecurity threats using global and local file information
|
JP7289739B2
(en)
*
|
2019-06-27 |
2023-06-12 |
キヤノン株式会社 |
Information processing device, information processing method and program
|
US20210019301A1
(en)
*
|
2019-07-18 |
2021-01-21 |
EMC IP Holding Company LLC |
Data integrity and consensuses with blockchain
|
US11182481B1
(en)
|
2019-07-31 |
2021-11-23 |
Trend Micro Incorporated |
Evaluation of files for cyber threats using a machine learning model
|
US11157620B2
(en)
|
2019-08-27 |
2021-10-26 |
Trend Micro Incorporated |
Classification of executable files using a digest of a call graph pattern
|
TWI730415B
(en)
*
|
2019-09-18 |
2021-06-11 |
財團法人工業技術研究院 |
Detection system, detection method, and an update verification method performed by using the detection method
|
US11068595B1
(en)
|
2019-11-04 |
2021-07-20 |
Trend Micro Incorporated |
Generation of file digests for cybersecurity applications
|
US11270000B1
(en)
|
2019-11-07 |
2022-03-08 |
Trend Micro Incorporated |
Generation of file digests for detecting malicious executable files
|
US11816213B2
(en)
*
|
2019-12-09 |
2023-11-14 |
Votiro Cybersec Ltd. |
System and method for improved protection against malicious code elements
|
US11822655B1
(en)
|
2019-12-30 |
2023-11-21 |
Trend Micro Incorporated |
False alarm reduction by novelty detection
|
US11520876B2
(en)
*
|
2020-02-03 |
2022-12-06 |
Dell Products L.P. |
Efficiently authenticating an application during I/O request handling
|
US11288360B2
(en)
|
2020-03-04 |
2022-03-29 |
Kyndryl, Inc. |
Preventing untrusted script execution
|
CN111405562B
(en)
*
|
2020-03-11 |
2021-05-28 |
中国科学院信息工程研究所 |
Mobile malicious user identification method and system based on communication behavior rules
|
US11080387B1
(en)
*
|
2020-03-16 |
2021-08-03 |
Integrity Security Services Llc |
Validation of software residing on remote computing devices
|
US11423160B2
(en)
|
2020-04-16 |
2022-08-23 |
Bank Of America Corporation |
System for analysis and authorization for use of executable environment data in a computing system using hash outputs
|
US11263109B2
(en)
|
2020-04-16 |
2022-03-01 |
Bank Of America Corporation |
Virtual environment system for validating executable data using accelerated time-based process execution
|
US11481484B2
(en)
|
2020-04-16 |
2022-10-25 |
Bank Of America Corporation |
Virtual environment system for secure execution of program code using cryptographic hashes
|
US11425123B2
(en)
|
2020-04-16 |
2022-08-23 |
Bank Of America Corporation |
System for network isolation of affected computing systems using environment hash outputs
|
US11528276B2
(en)
*
|
2020-04-16 |
2022-12-13 |
Bank Of America Corporation |
System for prevention of unauthorized access using authorized environment hash outputs
|
US10826924B1
(en)
*
|
2020-04-22 |
2020-11-03 |
Quantum Information Security, LLC |
Computer security and methods of use thereof
|
US10963583B1
(en)
*
|
2020-06-04 |
2021-03-30 |
Cyberark Software Ltd. |
Automatic detection and protection against file system privilege escalation and manipulation vulnerabilities
|
CN111737657B
(en)
*
|
2020-06-16 |
2024-03-12 |
湖南省星岳天璇科技有限公司 |
Method for realizing authorization control on JAVA software based on license file
|
US11372982B2
(en)
|
2020-07-02 |
2022-06-28 |
Bank Of America Corporation |
Centralized network environment for processing validated executable data based on authorized hash outputs
|
CN113971289A
(en)
|
2020-07-08 |
2022-01-25 |
支付宝(杭州)信息技术有限公司 |
Trusted starting method and device of block chain all-in-one machine
|
CN111541788B
(en)
|
2020-07-08 |
2020-10-16 |
支付宝(杭州)信息技术有限公司 |
Hash updating method and device of block chain all-in-one machine
|
CN111538996B
(en)
*
|
2020-07-08 |
2021-06-29 |
支付宝(杭州)信息技术有限公司 |
Trusted starting method and device of block chain all-in-one machine
|
US20220038266A1
(en)
*
|
2020-07-31 |
2022-02-03 |
Micron Technology, Inc. |
Secure memory system programming for host device verification
|
CN112068895B
(en)
*
|
2020-08-10 |
2023-12-19 |
深圳市鼎盛光电有限公司 |
Code configuration method, device, video playing equipment and storage medium
|
CN112084502A
(en)
*
|
2020-09-18 |
2020-12-15 |
珠海豹趣科技有限公司 |
Software identification method and device, electronic equipment and storage medium
|
JP7354074B2
(en)
*
|
2020-09-18 |
2023-10-02 |
株式会社東芝 |
Information processing device, information processing method and program
|
US20220166778A1
(en)
*
|
2020-11-24 |
2022-05-26 |
Saudi Arabian Oil Company |
Application whitelisting based on file handling history
|
US11874920B2
(en)
*
|
2020-12-30 |
2024-01-16 |
Acronis International Gmbh |
Systems and methods for preventing injections of malicious processes in software
|
US11409864B1
(en)
*
|
2021-06-07 |
2022-08-09 |
Snowflake Inc. |
Tracing supervisor for UDFs in a database system
|
CN114095227A
(en)
*
|
2021-11-15 |
2022-02-25 |
许昌许继软件技术有限公司 |
Credible authentication method and system for data communication gateway and electronic equipment
|
CN114417336B
(en)
*
|
2022-01-24 |
2022-11-01 |
北京新桥信通科技股份有限公司 |
Application system side safety management and control method and system
|
WO2023167661A1
(en)
*
|
2022-03-02 |
2023-09-07 |
Jpmorgan Chase Bank, N.A. |
System and method for comparing behavior of software components
|
CN116010905B
(en)
*
|
2022-12-29 |
2023-11-03 |
昆仑数智科技有限责任公司 |
Software management method, system and management device
|
CN117762889B
(en)
*
|
2024-02-20 |
2024-04-19 |
成都融见软件科技有限公司 |
Same-file multi-window state synchronization method, electronic equipment and medium
|