AcclaimIP-ad

Match Document Document Title Score
8745714 Secure software development environments  
The mock tool can be configured to create a mock execution environment for supporting software development processes. The mock execution environment is isolated from resources of the computing...
1000
9614719 Method for ensuring reliable communication between security software client and cloud, and security software client  
A method for ensuring reliable communication between a security software client and cloud includes detecting whether communication between the security software client and the cloud is abnormal;...
811
8850135 Secure software installation  
Embodiments of the present disclosure provide methods and systems for securely installing software on a computing device, such as a mobile device. In one embodiment, the device executes an...
808
US20150229510 METHOD FOR ENSURING RELIABLE COMMUNICATION BETWEEN SECURITY SOFTWARE CLIENT AND CLOUD, AND SECURITY SOFTWARE CLIENT  
A method for ensuring reliable communication between a security software client and cloud includes detecting whether communication between the security software client and the cloud is abnormal;...
801
US20090287917 SECURE SOFTWARE DISTRIBUTION  
To protect against software piracy, a storage media has a cryptographically protected area that stores software to be installed onto a target device, such as a computer. The storage media may...
792
US20130061314 SECURE SOFTWARE INSTALLATION  
Embodiments of the present disclosure provide methods and systems for securely installing software on a computing device, such as a mobile device. In one embodiment, the device executes an...
791
8213612 Secure software download  
Software can be downloaded securely using a multi-encryption method, where the decryption is completed when the software is executed. In one aspect, a multi-encrypted data item is received. One or...
784
US20090150681 Secure Software Download  
Software can be downloaded securely using a multi-encryption method, where the decryption is completed when the software is executed. In one aspect, a multi-encrypted data item is received. One or...
780
8285949 Secure software installation  
Embodiments of the present disclosure provide methods and systems for securely installing software on a computing device, such as a mobile device. In one embodiment, the device executes an...
776
US20100312966 SECURE SOFTWARE INSTALLATION  
Embodiments of the present disclosure provide methods and systems for securely installing software on a computing device, such as a mobile device. In one embodiment, the device executes an...
772
9264899 Binding mobile device secure software components to the SIM  
A mobile device, including: a wireless communication interface; a memory storing a secure software application; and a processor in communication with the memory, the processor being configured to:...
744
5548645 Secure software rental system using distributed software  
A system is disclosed for providing secure access and execution of application software by a first computer while a communication link is maintained between the first computer and a second...
740
9584514 Binding mobile device secure software components to the SIM  
Various embodiments include a method for binding a secure software application to a mobile device wherein the mobile device includes a processor and a subscriber identity module (SIM) card,...
739
US20150181422 BINDING MOBILE DEVICE SECURE SOFTWARE COMPONENTS TO THE SIM  
A mobile device, including: a wireless communication interface; a memory storing a secure software application; and a processor in communication with the memory, the processor being configured to:...
735
US20160134629 BINDING MOBILE DEVICE SECURE SOFTWARE COMPONENTS TO THE SIM  
Various embodiments include a method for binding a secure software application to a mobile device wherein the mobile device includes a processor and a subscriber identity module (SIM) card,...
729
US20090282393 Securing Software By Enforcing Data Flow Integrity  
The majority of such software attacks exploit software vulnerabilities or flaws to write data to unintended locations. For example, control-data attacks exploit buffer overflows or other...
726
7051211 Secure software distribution and installation  
Methods, systems and computer program products are provide for controlling access to software is provided by the software to be controlled being divided into a first encrypted portion and a second...
725
US20160306976 SECURE SOFTWARE AUTHENTICATION AND VERIFICATION  
A first time software is loaded for execution by a device, the software stored in non-secure storage is authenticated. Authenticating the software may involve a cryptographic operation over the...
725
9390261 Securing software by enforcing data flow integrity  
The majority of such software attacks exploit software vulnerabilities or flaws to write data to unintended locations. For example, control-data attacks exploit buffer overflows or other...
723
US20030046583 Automated configuration of security software suites  
Network reference models and configuration tools utilizing a database engine providing deduction facilitate automatic or semi-automatic configuration of security software packages based on...
721
7350204 Policies for secure software execution  
A system and method that automatically, transparently and securely controls software execution by identifying and classifying software, and locating a rule and associated security level for...
718
8478997 Multi-level security software architecture  
A multi-level security software architecture includes various components configured to provide full data separation across multiple processors while limiting the number and size of high assurance...
717
US20120066509 MULTI-LEVEL SECURITY SOFTWARE ARCHITECTURE  
A multi-level security software architecture includes various components configured to provide full data separation across multiple processors while limiting the number and size of high assurance...
715
US20020099952 Policies for secure software execution  
A system and method that automatically, transparently and securely controls software execution by identifying and classifying software, and locating a rule and associated security level for...
714
8473754 Hardware-facilitated secure software execution environment  
A hardware-facilitated secure software execution environment provides protection of both program instructions and data against unauthorized access and/or execution to maintain confidentiality and...
698
US20080276309 System and Method for Securing Software Applications  
A system and method for securing software applications installed on a computer network is disclosed. An authorized user is provided a digital credential and loads a secure access client onto a...
698
US20030120938 Method of securing software against reverse engineering  
A method of securing software against reverse engineering replaces portions of software code with tokens. A key is created in which the functionality of each such token is indicated. The key is...
696
7440571 Method for securing software updates  
This invention proposes a method for securing updating software in a plurality of decoders based on the generation of a signature by means of a private asymmetrical key. The updating of a decoder...
693
7207065 Apparatus and method for developing secure software  
A computer readable medium includes executable instructions to analyze program instructions for security vulnerabilities. The executable instructions convert diverse program instruction formats to...
688
9165175 Finger sensing apparatus performing secure software update and associated methods  
A finger sensing apparatus may include a finger sensor having an integrated circuit (IC) substrate, an array of finger sensing elements on the IC substrate, and secure software update circuitry on...
686
US20090067689 FINGER SENSING APPARATUS PERFORMING SECURE SOFTWARE UPDATE AND ASSOCIATED METHODS  
A finger sensing apparatus may include a finger sensor having an integrated circuit (IC) substrate, an array of finger sensing elements on the IC substrate, and secure software update circuitry on...
680
US20120167157 SYSTEMS AND METHODS FOR SECURE SOFTWARE DEVELOPMENT ENVIRONMENTS  
The mock tool can be configured to create a mock execution environment for supporting software development processes. The mock execution environment is isolated from resources of the computing...
674
9400889 Apparatus and method for developing secure software  
A computer readable medium includes executable instructions to analyze program instructions for security vulnerabilities. The executable instructions convert diverse program instruction formats to...
673
US20060092009 CASS (computer alarm security software)  
The software configurations of a personal computer allow it to provide portable home security to poor American families and small business owners. When a security breach is detected, a wave file...
665
US20040107349 Method for securing software updates  
This invention proposes a method for securing updating software in a plurality of decoders based on the generation of a signature by means of a private asymmetrical key. The updating of a decoder...
665
8677144 Secure software and hardware association technique  
In an embodiment, authenticated hardware and authenticated software are cryptographically binded using symmetric and asymmetric cryptography. Cryptographically binding the hardware and software...
663
US20120110339 Security Software For Vector File Format Data  
Systems and/or methods where a file requires an associated token to be accessed (see DEFINITIONS section) by the software used to access the file and that the token effectively requires that: (i)...
660
US20050273854 Apparatus and method for developing secure software  
A computer readable medium includes executable instructions to analyze program instructions for security vulnerabilities. The executable instructions convert diverse program instruction formats to...
656
9520990 System and method for software protection and secure software distribution  
The various embodiments of the present invention provide a secure software distribution and execution method. According to the method, a server receives software from service provider for...
656
US20070240138 APPARATUS AND METHOD FOR DEVELOPING SECURE SOFTWARE  
A computer readable medium includes executable instructions to analyze program instructions for security vulnerabilities. The executable instructions convert diverse program instruction formats to...
656
7463141 CASS (computer alarm security software)  
The software configurations of a personal computer allow it to provide portable home security to poor American families and small business owners. When a security breach is detected, a wave file...
654
9418230 Automated tools for building secure software programs  
A computer implemented tool is described that includes an assertion generator module that can automatically generate assertions, which are usable to verify application-specific security...
652
8533859 System and method for software protection and secure software distribution  
The various embodiments of the present invention provide a secure software distribution and execution method. According to the method, a server receives software from service provider for...
644
US20090217054 SECURE SOFTWARE AND HARDWARE ASSOCIATION TECHNIQUE  
In an embodiment, authenticated hardware and authenticated software are cryptographically binded using symmetric and asymmetric cryptography. Cryptographically binding the hardware and software...
643
US20100262824 System and Method for Software Protection and Secure Software Distribution  
The various embodiments of the present invention provide a secure software distribution and execution method. According to the method, a server receives software from service provider for...
641
US20140095880 SYSTEM AND METHOD FOR SOFTWARE PROTECTION AND SECURE SOFTWARE DISTRIBUTION  
The various embodiments of the present invention provide a secure software distribution and execution method. According to the method, a server receives software from service provider for...
639
9276752 System and method for secure software update  
A secure software update provides an update utility with an update definition, a private encryption key and a public signature key to a target device. A software update package is prepared on...
639
6009543 Secure software system and related techniques  
A secure software system includes a transformation processor for transforming an original program capable of being executed on a lessee site into a vendor server program, a first program intended...
637
US20130318357 System and Method for Secure Software Update  
A secure software update provides an update utility with an update definition, a private encryption key and a public signature key to a target device. A software update package is prepared on...
633
US20140208431 AUTOMATED TOOLS FOR BUILDING SECURE SOFTWARE PROGRAMS  
A computer implemented tool is described that includes an assertion generator module that can automatically generate assertions, which are usable to verify application-specific security...
632

Search
« search again