US6658571B1
(en)
*
|
1999-02-09 |
2003-12-02 |
Secure Computing Corporation |
Security framework for dynamically wrapping software applications executing in a computing system
|
EP1056010A1
(en)
|
1999-05-28 |
2000-11-29 |
Hewlett-Packard Company |
Data integrity monitoring in trusted computing entity
|
EP1055990A1
(en)
|
1999-05-28 |
2000-11-29 |
Hewlett-Packard Company |
Event logging in a computing platform
|
DE19927657A1
(en)
*
|
1999-06-17 |
2001-01-04 |
Daimler Chrysler Ag |
Partitioning and monitoring of software-controlled systems
|
EP1076279A1
(en)
|
1999-08-13 |
2001-02-14 |
Hewlett-Packard Company |
Computer platforms and their methods of operation
|
EP1085396A1
(en)
|
1999-09-17 |
2001-03-21 |
Hewlett-Packard Company |
Operation of trusted state in computing platform
|
GB9922665D0
(en)
|
1999-09-25 |
1999-11-24 |
Hewlett Packard Co |
A method of enforcing trusted functionality in a full function platform
|
US7080257B1
(en)
*
|
2000-03-27 |
2006-07-18 |
Microsoft Corporation |
Protecting digital goods using oblivious checking
|
US6507904B1
(en)
|
2000-03-31 |
2003-01-14 |
Intel Corporation |
Executing isolated mode instructions in a secure system running in privilege rings
|
US6760441B1
(en)
|
2000-03-31 |
2004-07-06 |
Intel Corporation |
Generating a key hieararchy for use in an isolated execution environment
|
US6678825B1
(en)
|
2000-03-31 |
2004-01-13 |
Intel Corporation |
Controlling access to multiple isolated memories in an isolated execution environment
|
US6754815B1
(en)
|
2000-03-31 |
2004-06-22 |
Intel Corporation |
Method and system for scrubbing an isolated area of memory after reset of a processor operating in isolated execution mode if a cleanup flag is set
|
US6769058B1
(en)
|
2000-03-31 |
2004-07-27 |
Intel Corporation |
Resetting a processor in an isolated execution environment
|
US6976162B1
(en)
|
2000-06-28 |
2005-12-13 |
Intel Corporation |
Platform and method for establishing provable identities while maintaining privacy
|
GB0020441D0
(en)
|
2000-08-18 |
2000-10-04 |
Hewlett Packard Co |
Performance of a service on a computing platform
|
US7237123B2
(en)
*
|
2000-09-22 |
2007-06-26 |
Ecd Systems, Inc. |
Systems and methods for preventing unauthorized use of digital content
|
US7793111B1
(en)
|
2000-09-28 |
2010-09-07 |
Intel Corporation |
Mechanism to handle events in a machine with isolated execution
|
US7231360B2
(en)
*
|
2000-11-22 |
2007-06-12 |
Sy Bon K |
Time-based software licensing approach
|
GB2376763B
(en)
|
2001-06-19 |
2004-12-15 |
Hewlett Packard Co |
Demonstrating integrity of a compartment of a compartmented operating system
|
US7818808B1
(en)
|
2000-12-27 |
2010-10-19 |
Intel Corporation |
Processor mode for limiting the operation of guest software running on a virtual machine supported by a virtual machine monitor
|
GB2372345A
(en)
*
|
2001-02-17 |
2002-08-21 |
Hewlett Packard Co |
Secure email handling using a compartmented operating system
|
GB2372594B
(en)
*
|
2001-02-23 |
2004-10-06 |
Hewlett Packard Co |
Trusted computing environment
|
GB2372592B
(en)
*
|
2001-02-23 |
2005-03-30 |
Hewlett Packard Co |
Information system
|
GB2372595A
(en)
|
2001-02-23 |
2002-08-28 |
Hewlett Packard Co |
Method of and apparatus for ascertaining the status of a data processing environment.
|
US7178137B1
(en)
*
|
2001-04-05 |
2007-02-13 |
Network Appliance, Inc. |
Automatic verification of scheduling domain consistency
|
US7694302B1
(en)
|
2001-04-05 |
2010-04-06 |
Network Appliance, Inc. |
Symmetric multiprocessor synchronization using migrating scheduling domains
|
WO2002086684A2
(en)
|
2001-04-24 |
2002-10-31 |
Hewlett-Packard Company |
An information security system
|
CA2446584A1
(en)
|
2001-05-09 |
2002-11-14 |
Ecd Systems, Inc. |
Systems and methods for the prevention of unauthorized use and manipulation of digital content
|
US20020188859A1
(en)
*
|
2001-06-07 |
2002-12-12 |
Dollens James Terry |
DNA intrusion detection method
|
GB2376765B
(en)
|
2001-06-19 |
2004-12-29 |
Hewlett Packard Co |
Multiple trusted computing environments with verifiable environment identities
|
GB2376761A
(en)
*
|
2001-06-19 |
2002-12-24 |
Hewlett Packard Co |
An arrangement in which a process is run on a host operating system but may be switched to a guest system if it poses a security risk
|
GB2376762A
(en)
*
|
2001-06-19 |
2002-12-24 |
Hewlett Packard Co |
Renting a computing environment on a trusted computing platform
|
GB2376764B
(en)
*
|
2001-06-19 |
2004-12-29 |
Hewlett Packard Co |
Multiple trusted computing environments
|
GB2378272A
(en)
*
|
2001-07-31 |
2003-02-05 |
Hewlett Packard Co |
Method and apparatus for locking an application within a trusted environment
|
US7502940B2
(en)
*
|
2001-08-01 |
2009-03-10 |
Sas Validy |
Method to protect software against unwanted use with a “conditional branch” principle
|
US7269740B2
(en)
*
|
2001-08-01 |
2007-09-11 |
Sas Validy |
Method to protect software against unwanted use with a “variable principle”
|
US7343494B2
(en)
*
|
2001-08-01 |
2008-03-11 |
Sas Validy |
Method to protect software against unwanted use with a “renaming” principle
|
US7434064B2
(en)
*
|
2001-08-01 |
2008-10-07 |
Sas Validy |
Method to protect software against unwanted use with a “elementary functions” principle
|
US20030059049A1
(en)
*
|
2001-09-24 |
2003-03-27 |
Mihm Thomas J. |
Method and apparatus for secure mobile transaction
|
US7024555B2
(en)
|
2001-11-01 |
2006-04-04 |
Intel Corporation |
Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment
|
GB2382419B
(en)
*
|
2001-11-22 |
2005-12-14 |
Hewlett Packard Co |
Apparatus and method for creating a trusted environment
|
US7346781B2
(en)
*
|
2001-12-06 |
2008-03-18 |
Mcafee, Inc. |
Initiating execution of a computer program from an encrypted version of a computer program
|
US7631196B2
(en)
|
2002-02-25 |
2009-12-08 |
Intel Corporation |
Method and apparatus for loading a trustable operating system
|
US7069442B2
(en)
|
2002-03-29 |
2006-06-27 |
Intel Corporation |
System and method for execution of a secured environment initialization instruction
|
AU2003241297A1
(en)
*
|
2002-04-15 |
2003-11-03 |
Core Sdi, Incorporated |
Security framework for protecting rights in computer software
|
US6820177B2
(en)
|
2002-06-12 |
2004-11-16 |
Intel Corporation |
Protected configuration space in a protected environment
|
US7272725B2
(en)
*
|
2002-06-25 |
2007-09-18 |
Sas Validy |
Method to protect software against unwanted use with a “temporal dissociation” principle
|
US6970985B2
(en)
|
2002-07-09 |
2005-11-29 |
Bluerisc Inc. |
Statically speculative memory accessing
|
GB2392262A
(en)
|
2002-08-23 |
2004-02-25 |
Hewlett Packard Co |
A method of controlling the processing of data
|
DE10256587A1
(en)
|
2002-12-04 |
2004-06-17 |
Philips Intellectual Property & Standards Gmbh |
Data processing device, in particular electronic memory component, and encryption method related thereto
|
US7318141B2
(en)
|
2002-12-17 |
2008-01-08 |
Intel Corporation |
Methods and systems to control virtual machines
|
US7793286B2
(en)
*
|
2002-12-19 |
2010-09-07 |
Intel Corporation |
Methods and systems to manage machine state in virtual machine operations
|
US7900017B2
(en)
|
2002-12-27 |
2011-03-01 |
Intel Corporation |
Mechanism for remapping post virtual machine memory pages
|
US7321910B2
(en)
*
|
2003-04-18 |
2008-01-22 |
Ip-First, Llc |
Microprocessor apparatus and method for performing block cipher cryptographic functions
|
US7844053B2
(en)
*
|
2003-04-18 |
2010-11-30 |
Ip-First, Llc |
Microprocessor apparatus and method for performing block cipher cryptographic functions
|
US7529368B2
(en)
|
2003-04-18 |
2009-05-05 |
Via Technologies, Inc. |
Apparatus and method for performing transparent output feedback mode cryptographic functions
|
US7392400B2
(en)
*
|
2003-04-18 |
2008-06-24 |
Via Technologies, Inc. |
Microprocessor apparatus and method for optimizing block cipher cryptographic functions
|
US7519833B2
(en)
|
2003-04-18 |
2009-04-14 |
Via Technologies, Inc. |
Microprocessor apparatus and method for enabling configurable data block size in a cryptographic engine
|
US7542566B2
(en)
|
2003-04-18 |
2009-06-02 |
Ip-First, Llc |
Apparatus and method for performing transparent cipher block chaining mode cryptographic functions
|
US8060755B2
(en)
|
2003-04-18 |
2011-11-15 |
Via Technologies, Inc |
Apparatus and method for providing user-generated key schedule in a microprocessor cryptographic engine
|
US7532722B2
(en)
|
2003-04-18 |
2009-05-12 |
Ip-First, Llc |
Apparatus and method for performing transparent block cipher cryptographic functions
|
US7900055B2
(en)
|
2003-04-18 |
2011-03-01 |
Via Technologies, Inc. |
Microprocessor apparatus and method for employing configurable block cipher cryptographic algorithms
|
US7536560B2
(en)
*
|
2003-04-18 |
2009-05-19 |
Via Technologies, Inc. |
Microprocessor apparatus and method for providing configurable cryptographic key size
|
US7502943B2
(en)
|
2003-04-18 |
2009-03-10 |
Via Technologies, Inc. |
Microprocessor apparatus and method for providing configurable cryptographic block cipher round results
|
US7925891B2
(en)
|
2003-04-18 |
2011-04-12 |
Via Technologies, Inc. |
Apparatus and method for employing cryptographic functions to generate a message digest
|
US7539876B2
(en)
*
|
2003-04-18 |
2009-05-26 |
Via Technologies, Inc. |
Apparatus and method for generating a cryptographic key schedule in a microprocessor
|
US7529367B2
(en)
|
2003-04-18 |
2009-05-05 |
Via Technologies, Inc. |
Apparatus and method for performing transparent cipher feedback mode cryptographic functions
|
US7415708B2
(en)
|
2003-06-26 |
2008-08-19 |
Intel Corporation |
Virtual machine management using processor state information
|
US7669236B2
(en)
*
|
2004-11-18 |
2010-02-23 |
Biogy, Inc. |
Determining whether to grant access to a passcode protected system
|
US7134050B2
(en)
*
|
2003-08-15 |
2006-11-07 |
Hewlett-Packard Development Company, L.P. |
Method and system for containing software faults
|
US7739521B2
(en)
|
2003-09-18 |
2010-06-15 |
Intel Corporation |
Method of obscuring cryptographic computations
|
US20050080934A1
(en)
|
2003-09-30 |
2005-04-14 |
Cota-Robles Erik C. |
Invalidating translation lookaside buffer entries in a virtual machine (VM) system
|
US20050114850A1
(en)
|
2003-10-29 |
2005-05-26 |
Saurabh Chheda |
Energy-focused re-compilation of executables and hardware mechanisms based on compiler-architecture interaction and compiler-inserted control
|
US7996671B2
(en)
|
2003-11-17 |
2011-08-09 |
Bluerisc Inc. |
Security of program executables and microprocessors based on compiler-architecture interaction
|
US8156343B2
(en)
|
2003-11-26 |
2012-04-10 |
Intel Corporation |
Accessing private data about the state of a data processing machine from storage that is publicly accessible
|
US7516331B2
(en)
*
|
2003-11-26 |
2009-04-07 |
International Business Machines Corporation |
Tamper-resistant trusted java virtual machine and method of using the same
|
US8037314B2
(en)
|
2003-12-22 |
2011-10-11 |
Intel Corporation |
Replacing blinded authentication authority
|
WO2005064433A1
(en)
*
|
2003-12-22 |
2005-07-14 |
Koninklijke Philips Electronics N.V. |
Software execution protection using an active entity
|
US8171480B2
(en)
*
|
2004-01-27 |
2012-05-01 |
Network Appliance, Inc. |
Method and apparatus for allocating shared resources to process domains according to current processor utilization in a shared resource processor
|
US7620807B1
(en)
*
|
2004-02-11 |
2009-11-17 |
At&T Corp. |
Method and apparatus for automatically constructing application signatures
|
US7802085B2
(en)
|
2004-02-18 |
2010-09-21 |
Intel Corporation |
Apparatus and method for distributing private keys to an entity with minimal secret, unique information
|
FR2866451B1
(en)
*
|
2004-02-18 |
2008-02-29 |
Cit Alcatel |
METHOD AND DEVICE FOR TRANSFORMING AN OPERATING SYSTEM FOR THE PROTECTION OF A COMPUTER PROGRAM AGAINST EXTERNAL INTRUSIONS
|
US7987497B1
(en)
|
2004-03-05 |
2011-07-26 |
Microsoft Corporation |
Systems and methods for data encryption using plugins within virtual systems and subsystems
|
US7669059B2
(en)
*
|
2004-03-23 |
2010-02-23 |
Network Equipment Technologies, Inc. |
Method and apparatus for detection of hostile software
|
JP2005275839A
(en)
*
|
2004-03-25 |
2005-10-06 |
Nec Corp |
Software use permission method and system
|
US7620949B2
(en)
|
2004-03-31 |
2009-11-17 |
Intel Corporation |
Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment
|
US8607299B2
(en)
|
2004-04-27 |
2013-12-10 |
Microsoft Corporation |
Method and system for enforcing a security policy via a security virtual machine
|
WO2005109145A1
(en)
*
|
2004-04-30 |
2005-11-17 |
Siemens Aktiengesellschaft |
Method for preventing a software application or data from being read out of a mobile communication appliance
|
US8006100B2
(en)
*
|
2004-06-10 |
2011-08-23 |
Oracle America, Inc. |
Enhancing trusted platform module performance
|
KR100636162B1
(en)
*
|
2004-08-25 |
2006-10-18 |
삼성전자주식회사 |
Protection method for software and device thereof
|
US20060075254A1
(en)
*
|
2004-09-27 |
2006-04-06 |
Cisco Technology, Inc. (A California Corporation) |
Smart card functionality from a security co-processor and symmetric key in ROM
|
US7840962B2
(en)
|
2004-09-30 |
2010-11-23 |
Intel Corporation |
System and method for controlling switching between VMM and VM using enabling value of VMM timer indicator and VMM timer value having a specified time
|
US8146078B2
(en)
|
2004-10-29 |
2012-03-27 |
Intel Corporation |
Timer offsetting mechanism in a virtual machine environment
|
US20060099991A1
(en)
*
|
2004-11-10 |
2006-05-11 |
Intel Corporation |
Method and apparatus for detecting and protecting a credential card
|
US7770018B2
(en)
*
|
2004-11-18 |
2010-08-03 |
Biogy, Inc. |
Setting up a security access system
|
US7979716B2
(en)
*
|
2004-11-18 |
2011-07-12 |
Biogy, Inc. |
Method of generating access keys
|
US20060107312A1
(en)
*
|
2004-11-18 |
2006-05-18 |
Michael Fiske |
System for handing requests for access to a passcode protected entity
|
US7702911B2
(en)
*
|
2004-11-18 |
2010-04-20 |
Biogy, Inc. |
Interfacing with a system that includes a passcode authenticator
|
US7886155B2
(en)
|
2004-12-20 |
2011-02-08 |
Biogy, Inc. |
System for generating requests to a passcode protected entity
|
US7707622B2
(en)
|
2004-11-18 |
2010-04-27 |
Biogy, Inc. |
API for a system having a passcode authenticator
|
US20090228714A1
(en)
*
|
2004-11-18 |
2009-09-10 |
Biogy, Inc. |
Secure mobile device with online vault
|
US20060107315A1
(en)
*
|
2004-11-18 |
2006-05-18 |
Michael Fiske |
System that uses access keys
|
US8209751B2
(en)
*
|
2004-11-18 |
2012-06-26 |
Biogy, Inc. |
Receiving an access key
|
US7457960B2
(en)
*
|
2004-11-30 |
2008-11-25 |
Analog Devices, Inc. |
Programmable processor supporting secure mode
|
US8924728B2
(en)
|
2004-11-30 |
2014-12-30 |
Intel Corporation |
Apparatus and method for establishing a secure session with a device without exposing privacy-sensitive information
|
US20080288786A1
(en)
*
|
2004-12-20 |
2008-11-20 |
Michael Stephen Fiske |
System with access keys
|
US8533777B2
(en)
|
2004-12-29 |
2013-09-10 |
Intel Corporation |
Mechanism to determine trust of out-of-band management agents
|
US7395405B2
(en)
|
2005-01-28 |
2008-07-01 |
Intel Corporation |
Method and apparatus for supporting address translation in a virtual machine environment
|
WO2006100522A1
(en)
|
2005-03-22 |
2006-09-28 |
Hewlett-Packard Development Company, L.P. |
Methods, devices and data structures for trusted data
|
WO2006114020A1
(en)
*
|
2005-04-27 |
2006-11-02 |
Intel Corporation |
Method and system for a process monitor using a hardware communication format
|
EP1717723A1
(en)
*
|
2005-04-29 |
2006-11-02 |
ST Incard S.r.l. |
Improved virtual machine or hardware processor for IC-card portable electronic devices
|
US7752436B2
(en)
*
|
2005-08-09 |
2010-07-06 |
Intel Corporation |
Exclusive access for secure audio program
|
US7827550B2
(en)
*
|
2005-08-17 |
2010-11-02 |
Intel Corporation |
Method and system for measuring a program using a measurement agent
|
US7809957B2
(en)
|
2005-09-29 |
2010-10-05 |
Intel Corporation |
Trusted platform module for generating sealed data
|
US8347293B2
(en)
*
|
2005-10-20 |
2013-01-01 |
Network Appliance, Inc. |
Mutual exclusion domains to perform file system processes on stripes
|
WO2007072568A1
(en)
*
|
2005-12-22 |
2007-06-28 |
Fujitsu Limited |
Program processor, program processing method, program, and computer-readable recording medium
|
US8051299B2
(en)
*
|
2006-03-20 |
2011-11-01 |
Hewlett-Packard Development Company, L.P. |
Computer security method and computer system
|
US8014530B2
(en)
|
2006-03-22 |
2011-09-06 |
Intel Corporation |
Method and apparatus for authenticated, recoverable key distribution with no database secrets
|
CN100464295C
(en)
*
|
2006-05-17 |
2009-02-25 |
联想(北京)有限公司 |
Safety inputting method based on virtual machine
|
US20080126766A1
(en)
*
|
2006-11-03 |
2008-05-29 |
Saurabh Chheda |
Securing microprocessors against information leakage and physical tampering
|
WO2008056373A1
(en)
*
|
2006-11-10 |
2008-05-15 |
M/S Trinity Future-In Pvt Ltd |
Intelligent system to protect softwares from unauthorized duplication
|
US8495383B2
(en)
*
|
2006-12-14 |
2013-07-23 |
Nokia Corporation |
Method for the secure storing of program state data in an electronic device
|
US8561204B1
(en)
|
2007-02-12 |
2013-10-15 |
Gregory William Dalcher |
System, method, and computer program product for utilizing code stored in a protected area of memory for securing an associated system
|
KR101107850B1
(en)
*
|
2007-07-24 |
2012-01-31 |
엔엑스피 비 브이 |
Method, system and trusted service manager for securely transmitting an application to a mobile phone
|
US20090125977A1
(en)
*
|
2007-10-31 |
2009-05-14 |
Docomo Communications Laboratories Usa, Inc. |
Language framework and infrastructure for safe and composable applications
|
WO2009065997A1
(en)
*
|
2007-11-23 |
2009-05-28 |
Nokia Corporation |
Method for secure program code execution in an electronic device
|
CN101216873B
(en)
*
|
2007-12-29 |
2012-12-19 |
北京深思洛克软件技术股份有限公司 |
A software copyright protection method and system based on encryption lock, and encryption lock
|
JP5225003B2
(en)
*
|
2008-10-01 |
2013-07-03 |
キヤノン株式会社 |
MEMORY PROTECTION METHOD, INFORMATION PROCESSING DEVICE, MEMORY PROTECTION PROGRAM, AND RECORDING MEDIUM CONTAINING MEMORY PROTECTION PROGRAM
|
US8555015B2
(en)
|
2008-10-23 |
2013-10-08 |
Maxim Integrated Products, Inc. |
Multi-layer content protecting microcontroller
|
DE102009024985A1
(en)
*
|
2009-06-16 |
2010-12-23 |
Giesecke & Devrient Gmbh |
Method of executing a bytecode in a secure runtime environment
|
US9454652B2
(en)
*
|
2009-10-23 |
2016-09-27 |
Secure Vector, Llc |
Computer security system and method
|
US10242182B2
(en)
*
|
2009-10-23 |
2019-03-26 |
Secure Vector, Llc |
Computer security system and method
|
US8775802B1
(en)
|
2009-10-23 |
2014-07-08 |
Secure Vector |
Computer security system and method
|
US8429429B1
(en)
*
|
2009-10-23 |
2013-04-23 |
Secure Vector, Inc. |
Computer security system and method
|
US8627331B1
(en)
|
2010-04-30 |
2014-01-07 |
Netapp, Inc. |
Multi-level parallelism of process execution in a mutual exclusion domain of a processing system
|
US9298910B2
(en)
|
2011-06-08 |
2016-03-29 |
Mcafee, Inc. |
System and method for virtual partition monitoring
|
FR2991085B1
(en)
*
|
2012-05-23 |
2016-03-11 |
Morpho |
METHOD AND CHIP CARD FOR TRANSMITTING INFORMATION
|
US9361483B2
(en)
*
|
2012-07-10 |
2016-06-07 |
Forcepoint Federal Llc |
Anti-wikileaks USB/CD device
|
US9117056B2
(en)
*
|
2013-06-11 |
2015-08-25 |
Vatari Corporation |
System and method for using digital strings to provide secure distribution of digital content
|
US20150012402A1
(en)
*
|
2013-07-03 |
2015-01-08 |
Trading Technologies International, Inc. |
Trading System License Verification, Management and Control
|
CN103646214B
(en)
*
|
2013-12-18 |
2016-08-31 |
国家电网公司 |
A kind of method setting up trusted context in distribution terminal
|
WO2016106330A1
(en)
*
|
2014-12-22 |
2016-06-30 |
Visa International Service Association |
Software tampering detection and reporting process
|
US9858434B2
(en)
*
|
2014-12-29 |
2018-01-02 |
Brainzsquare Inc. |
System and method for erasing a storage medium
|
US10110566B2
(en)
*
|
2015-07-21 |
2018-10-23 |
Baffle, Inc. |
Systems and processes for executing private programs on untrusted computers
|
EP3244340A1
(en)
*
|
2016-05-09 |
2017-11-15 |
Gemalto Sa |
Method for securely running an application
|
CN109426703B
(en)
*
|
2017-08-30 |
2023-11-24 |
喀斯玛汇智(无锡)科技有限公司 |
Method and device for protecting core code on IOS platform
|
US10606764B1
(en)
*
|
2017-10-02 |
2020-03-31 |
Northrop Grumman Systems Corporation |
Fault-tolerant embedded root of trust using lockstep processor cores on an FPGA
|
US10901917B1
(en)
*
|
2018-01-26 |
2021-01-26 |
Amazon Technologies, Inc. |
Address scrambling for storage class memory
|
US10904284B2
(en)
*
|
2018-09-14 |
2021-01-26 |
International Business Machines Corporation |
Enabling software distribution
|