G06F21/14 - CPC Classification

Classification description:

Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity; Protecting distributed programs or content, e.g. vending or licensing of copyrighted material; Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation

Recent Application in this class:
#1
20240281224
2024-08-22

PERMISSIONS AND NOTIFICATIONS FOR CONSTRUCT-MODIFICATION TAGS

#2
20240248967
2024-07-25

SYSTEM AND SOLUTION TO OBFUSCATE AND PREVENT THE PATTERN ANALYSIS OF JAVA ARCHIVES

#3
20240232301
2024-07-11

PROTECTED DATA PACKAGES

#4
20240211551
2024-06-27

METHOD TO PROTECT PROGRAM IN INTEGRATED CIRCUIT

#5
20240160737
2024-05-16

METHODS AND APPARATUS DETERMINING DOCUMENT BEHAVIOR BASED ON THE REVERSING ENGINE

#6
20240111845
2024-04-04

SOFTWARE OBFUSCATION METHOD USING AN OPAQUE PREDICATE BASED ON MULTIPLYING MIXED BOOLEAN-ARTHMETIC EXPRESSIONS

#7
20240095022
2024-03-21

HOTFIX METHOD, APPARATUS, DEVICE AND STORAGE MEDIUM

#8
20240045670
2024-02-08

OBFUSCATION FOR PROTECTION OF STREAMING MEDIA AND OTHER DATA FLOWS

#9
20240028696
2024-01-25

Resource allocation using modified instances of corresponding records in memory

#10
20240028673
2024-01-25

ROBUST TRAJECTORY PREDICTIONS AGAINST ADVERSARIAL ATTACKS IN AUTONOMOUS MACHINES AND APPLICATIONS

#11
20240012886
2024-01-11

CODE FLOW PROTECTION WITH ERROR PROPAGATION

#12
20240004968
2024-01-04

Audio and/or Physical Electronic Privacy System

#13
20230409747
2023-12-21

OBFUSCATING INFORMATION IN CONTENT PRESENTED ON A DISPLAY

#14
20230401293
2023-12-14

Security through layers in an intelligent electronic device

#15
20230394171
2023-12-07

PERSONAL INFORMATION PROTECTION DEVICE

#16
20230394122
2023-12-07

MULTI-LAYERED FRAMEWORK FOR SECURITY OF INTEGRATED CIRCUITS

#17
20230388126
2023-11-30

SECURE AND ZERO KNOWLEDGE DATA SHARING FOR CLOUD APPLICATIONS

#18
20230367855
2023-11-16

METHOD TO RANDOMIZE ONLINE ACTIVITY

#19
20230351005
2023-11-02

MULTI-TRANSFER RESOURCE ALLOCATION USING MODIFIED INSTANCES OF CORRESPONDING RECORDS IN MEMORY

#20
20230342452
2023-10-26

APPLICATION-LEVEL SANDBOXING ON DEVICES

#21
20230325477
2023-10-12

PROGRAM PROTECTION APPARATUS, PROGRAM PROTECTION METHOD, AND PROGRAM PROTECTION PROGRAM

#22
20230325476
2023-10-12

OBFUSCATION DEVICE, OBFUSCATION METHOD, AND OBFUSCATION PROGRAM

#23
20230315821
2023-10-05

OBFUSCATION OF EXECUTABLE INSTRUCTION SETS FOR ENHANCED SECURITY

#24
20230306145
2023-09-28

Program execution device

#25
20230306091
2023-09-28

METHOD AND DEVICE FOR DETECTING FUZZING ANALYSIS ON AN ELECTRONIC DEVICE

#26
20230289412
2023-09-14

Computer-based systems configured for automated computer script analysis and malware detection and methods thereof

#27
20230281281
2023-09-07

Cloud based machine learning model attack guard

#28
20230267200
2023-08-24

A Method of Training a Submodule and Preventing Capture of an AI Module

#29
20230229766
2023-07-20

BACKDOOR INSPECTION DEVICE, BACKDOOR INSPECTION METHOD, AND COMPUTER-READABLEMEDIUM

#30
20230229744
2023-07-20

AI governance using tamper proof model metrics

#31
20230196155
2023-06-22

OBFUSCATION OF QUANTUM CIRCUITS

#32
20230140432
2023-05-04

Systems and methods for unpacking protected data from obfuscated code

#33
20230137942
2023-05-04

SYSTEMS AND METHODS FOR PREPARING CODE FOR MALICIOUS BEHAVIOR ANALYSIS

#34
20230124498
2023-04-20

Systems And Methods For Whitebox Device Binding

#35
20230119283
2023-04-20

Partitioning circuits for execution of sequential secure computation code on multiple processors

#36
20230096677
2023-03-30

Obfuscated And Secured Computer-Executable Source Code

#37
20230046532
2023-02-16

Computer-based systems configured for automated computer script analysis and malware detection and methods thereof

#38
20230004635
2023-01-05

Multi-transfer resource allocation using modified instances of corresponding records in memory

#39
20220360442
2022-11-10

ON DEMAND CODE DECRYPTION

#40
20220350866
2022-11-03

MULTI-PATH LAYER CONFIGURED TO DE-OBFUSCATE LOGS PRODUCED BY MULTI-PATH INPUT-OUTPUT DRIVERS

#41
20220342979
2022-10-27

Multi-transfer resource allocation using modified instances of corresponding records in memory

#42
20220284113
2022-09-08

SYSTEM AND METHOD FOR SECURELY TRANSFERRING DATA USING ENCRYPTION KEYS

#43
20220253521
2022-08-11

IMAGE FORMING APPARATUS CAPABLE OF EXECUTING APPLICATION PROGRAMS, CONTROL METHOD THEREFOR, AND STORAGE MEDIUM

#44
20220253510
2022-08-11

Web Browser Extension Script Obfuscation System

#45
20220237268
2022-07-28

INFORMATION PROCESSING METHOD, INFORMATION PROCESSING DEVICE, AND PROGRAM

#46
20220197982
2022-06-23

Hardware-based obfuscation of digital data

#47
20220197981
2022-06-23

Protection of neural networks by obfuscation of neural network architecture

#48
20220191031
2022-06-16

Secure and zero knowledge data sharing for cloud applications

#49
20220188387
2022-06-16

Timed unlocking and locking of hardware intellectual properties

#50
20220179930
2022-06-09

Source modification engine

#51
20220179929
2022-06-09

OBFUSCATING ENCRYPTED REGISTER TRANSFER LOGIC MODEL OF A CIRCUIT

#52
20220179928
2022-06-09

System, devices and/or processes for secure computation

#53
20220171618
2022-06-02

Obfuscation for protection of streaming media and other data flows

#54
20220164417
2022-05-26

METHOD OF EVALUATING ROBUSTNESS OF ARTIFICIAL NEURAL NETWORK WATERMARKING AGAINST MODEL STEALING ATTACKS

#55
20220156364
2022-05-19

Method for Executing Secure Code, Corresponding Devices, System and Programs

#56
20220147618
2022-05-12

Securing software routines

#57
20220147598
2022-05-12

SYSTEM, METHOD, AND COMPUTER-ACCESSIBLE MEDIUM FOR REGISTER-TRANSFER LEVEL LOCKING AGAINST AN UNTRUSTED FOUNDRY

#58
20220147597
2022-05-12

AI governance using tamper proof model metrics

#59
20220138288
2022-05-05

Computer-based systems configured for automated computer script analysis and malware detection and methods thereof

#60
20220114240
2022-04-14

SYSTEMS AND METHODS TO FACILITATE AUTHORIZATION KEY OBFUSCATION VALIDATION

#61
20220114077
2022-04-14

Semiconductor device including a normal mode, a debug mode, and a key

#62
20220092155
2022-03-24

PROTECTING AN ITEM OF SOFTWARE

#63
20220083630
2022-03-17

PROTECTING AN ITEM OF SOFTWARE

#64
20220058244
2022-02-24

Protected processing of operations

#65
20220058243
2022-02-24

Cyclically dependent checks for software tamper-proofing

#66
20220043906
2022-02-10

Application-level sandboxing on devices

#67
20220038437
2022-02-03

AI model and data transforming techniques for cloud edge

#68
20220019703
2022-01-20

Tamper resistant obfuscation circuit

#69
20210406345
2021-12-30

FRAMEWORK FOR PREVENTING SOFTWARE PIRACY IN VIRTUAL MACHINES (VMS) BY USING VIRTUAL HARDWARE ENCRYPTION VERIFICATION

#70
20210365528
2021-11-25

Controlling access to digital assets

#71
20210349977
2021-11-11

Vehicle surveillance device and vehicle surveillance method

#72
20210349807
2021-11-11

Generation of optimal program variation

#73
20210342509
2021-11-04

All-digital camouflage circuit

#74
20210342420
2021-11-04

Software tamper resistance

#75
20210334342
2021-10-28

Procedural code generation for challenge code

#76
20210326413
2021-10-21

Compiler device with masking function

#77
20210326412
2021-10-21

Secure automated issue detection

#78
20210326246
2021-10-21

Constraint guided hybrid fuzzing test system for application programs

#79
20210312018
2021-10-07

Anti cloning for white box protected data

#80
20210303662
2021-09-30

SYSTEMS, METHODS, AND STORAGE MEDIA FOR CREATING SECURED TRANSFORMED CODE FROM INPUT CODE USING A NEURAL NETWORK TO OBSCURE A TRANSFORMATION FUNCTION

#81
20210303661
2021-09-30

Systems, methods, and storage media for creating secured computer code having entangled transformations

#82
20210294953
2021-09-23

Systems and methods for logic circuit replacement with configurable circuits

#83
20210279347
2021-09-09

Secure 3D printing

#84
20210247969
2021-08-12

Automated source code log generation

#85
20210240802
2021-08-05

Method for processing data

#86
20210224378
2021-07-22

Securing virtual-machine software applications

#87
20210224361
2021-07-22

Secure 3D printing

#88
20210209226
2021-07-08

Security handling during application code branching

#89
20210209202
2021-07-08

Big data distributed processing and secure data transferring with obfuscation

#90
20210208960
2021-07-08

Big data distributed processing and secure data transferring with fault handling

#91
20210192095
2021-06-24

Program execution device

#92
20210192018
2021-06-24

Hardware intellectual property protection through provably secure state-space obfuscation

#93
20210173927
2021-06-10

Method and system for determining affiliation of software to software families

#94
20210143978
2021-05-13

METHOD TO SECURE A SOFTWARE CODE PERFORMING ACCESSES TO LOOK-UP TABLES

#95
20210141875
2021-05-13

Device for automatically identifying anti-analysis techniques by using signature extraction and method therefor

#96
20210133299
2021-05-06

Method to secure a software code

#97
20210110009
2021-04-15

Method and system for signing an artificial intelligence watermark using implicit data

#98
20210110008
2021-04-15

Method and system for signing an artificial intelligence watermark using a kernel

#99
20210097154
2021-04-01

Method and apparatus for data obfuscation

#100
20210084387
2021-03-18

Device and Method for GPU-based Watermarking

#101
20210073357
2021-03-11

PROVIDING RESTRICTIONS IN COMPUTER-GENERATED REALITY RECORDINGS

#102
20210056201
2021-02-25

Securing software routines

#103
20210056182
2021-02-25

Device and method for bypassing analysis evasion technique, and recording medium for a program for performing the same

#104
20210056008
2021-02-25

Hacker-resistant anti-debug system

#105
20210042902
2021-02-11

Reverse engineering data analysis system, and integrated circuit component data processing tool and method thereof

#106
20210034719
2021-02-04

Systems and methods for obfuscating web content

#107
20210034718
2021-02-04

Mechanism for providing obfuscated code to web application clients

#108
20210012017
2021-01-14

Method and apparatus for storing and processing application program information

#109
20210004696
2021-01-07

SYSTEM AND METHOD FOR AUTOMATIC SECURE DELIVERY OF MODEL

#110
20210004515
2021-01-07

Secure logic locking and configuration with camouflaged programmable micro netlists

#111
20200410069
2020-12-31

PROACTIVE SECURITY SYSTEM BASED ON CODE POLYMORPHISM

#112
20200394287
2020-12-17

Techniques for securely executing code that operates on encrypted data on a public computer

#113
20200356642
2020-11-12

ENABLING AN ENCRYPTED SOFTWARE MODULE IN A CONTAINER FILE

#114
20200348992
2020-11-05

System, program, method, and server for performing communication

#115
20200295937
2020-09-17

Secure and zero knowledge data sharing for cloud applications

#116
20200295763
2020-09-17

Physically unclonable camouflage structure and methods for fabricating same

#117
20200285719
2020-09-10

OBFUSCATED SHIFT REGISTERS FOR INTEGRATED CIRCUITS

#118
20200265135
2020-08-20

Protecting a software program against tampering

#119
20200250282
2020-08-06

Communication device, communication system, and recording medium

#120
20200242217
2020-07-30

Systems, methods, and storage media for obfuscating a computer program by representing the control flow of the computer program as data

#121
20200226232
2020-07-16

METHOD OF SELECTING SOFTWARE FILES

#122
20200226231
2020-07-16

System for Obfuscating Content in Shared Documents

#123
20200202002
2020-06-25

FIRMWARE SECURITY

#124
20200201991
2020-06-25

Determining information leakage of computer-readable programs

#125
20200201957
2020-06-25

Method for concealing data and data obfuscation device using the same

#126
20200175152
2020-06-04

Application-level sandboxing on devices

#127
20200167509
2020-05-28

Program execution device

#128
20200159949
2020-05-21

System and method for automated on-screen sensitive data identification and obfuscation

#129
20200159914
2020-05-21

Methods for securely storing sensitive data on mobile device

#130
20200151305
2020-05-14

Computer program code obfuscation methods and systems

#131
20200151007
2020-05-14

Lightweight dispatcher for program control flow flattening

#132
20200143013
2020-05-07

Encoding optimization for obfuscated media

#133
20200125484
2020-04-23

Generating a test sequence of code based on a directed sequence of code and randomly selected instructions

#134
20200125361
2020-04-23

Dynamic modeling for opaque code during static analysis

#135
20200117775
2020-04-16

Method for processing data

#136
20200117774
2020-04-16

Proactive security system based on code polymorphism

#137
20200110857
2020-04-09

Reflection based endpoint security test framework

#138
20200082060
2020-03-12

SECURE CALLING CONVENTION SYSTEM AND METHODS

#139
20200082054
2020-03-12

Integrated circuit identification

#140
20200082053
2020-03-12

Integrated circuit identification

#141
20200074077
2020-03-05

Method for Providing a Security-Critical Software Application on a Computer Unit

#142
20200074049
2020-03-05

Preventing software application tampering

#143
20200065456
2020-02-27

Protecting obfuscated circuits against attacks that utilize test infrastructures

#144
20200065182
2020-02-27

Leak protection of executables with debug information

#145
20200050775
2020-02-13

Mutual authentication of software layers

#146
20200050740
2020-02-13

System and method for watermarking software

#147
20200042695
2020-02-06

Assignment device, assignment method, and assignment program

#148
20200042677
2020-02-06

Method for the computer-aided obfuscation of program code

#149
20200042676
2020-02-06

Obfuscating programs using matrix tensor products

#150
20200034565
2020-01-30

Method for concealing data and data obfuscation device using the same

#151
20200034520
2020-01-30

Method for training and testing obfuscation network capable of processing data to be concealed for privacy, and training device and testing device using the same

#152
20200026826
2020-01-23

TIERED CODE OBFUSCATION IN A DEVELOPMENT ENVIRONMENT

#153
20200019730
2020-01-16

Integrity of on demand code decryption

#154
20200012764
2020-01-09

Computerized system and method for modifying a media file by automatically applying security features to select portions of media file content

#155
20200004934
2020-01-02

Method to secure a software code

#156
20190364050
2019-11-28

Preventing unauthorized access to secured information systems by injecting device data collectors

#157
20190347385
2019-11-14

SECURITY METHODS AND SYSTEMS BY CODE MUTATION

#158
20190340340
2019-11-07

Debuggable obfuscated script

#159
20190312859
2019-10-10

AUTHENTICATED BYPASS OF DEFAULT SECURITY COUNTERMEASURES

#160
20190278890
2019-09-12

Security through layers in an intelligent electronic device

#161
20190258829
2019-08-22

SECURELY PERFORMING A SENSITIVE OPERATION USING A NON-SECURE TERMINAL

#162
20190258782
2019-08-22

Securing temporal digital communications via authentication and validation for wireless user and access devices with securitized containers

#163
20190258781
2019-08-22

Secure execution of enterprise applications on mobile devices

#164
20190251300
2019-08-15

Program execution device

#165
20190251233
2019-08-15

Protecting the input/output of modular encoded white-box RSA

#166
20190251232
2019-08-15

Software algorithm security

#167
20190245833
2019-08-08

INTERCEPTING AND INJECTING CALLS INTO OPERATIONS AND OBJECTS

#168
20190243974
2019-08-08

Method and apparatus for anti-repackaging

#169
20190243953
2019-08-08

ENHANCED SECURITY FOR MULTIPLE NODE COMPUTING PLATFORM

#170
20190243952
2019-08-08

Systems and methods for creating individualized processing chips and assemblies

#171
20190228137
2019-07-25

Efficient obfuscation of program control flow

#172
20190220576
2019-07-18

Debuggable obfuscated script

#173
20190207775
2019-07-04

Integrated circuit, control device, information distribution method, and information distribution system

#174
20190206040
2019-07-04

Reverse engineering data analysis system, and integrated circuit component data processing tool and method thereof

#175
20190197243
2019-06-27

Automated fuzzing based on analysis of application execution flow

#176
20190197216
2019-06-27

METHOD, APPARATUS, AND COMPUTER-READABLE MEDIUM FOR EXECUTING A LOGIC ON A COMPUTING DEVICE AND PROTECTING THE LOGIC AGAINST REVERSE ENGINEERING

#177
20190188157
2019-06-20

Method and apparatus to dynamically encode data at runtime

#178
20190163886
2019-05-30

Method and apparatus to secure and protect data-centers and generalized utility-based cloud computing environments from uninvited guests in the form of both hardware and software

#179
20190163885
2019-05-30

Apparatus and method for providing security and apparatus and method for executing security to protect code of shared object

#180
20190163884
2019-05-30

Apparatus and method of providing security and apparatus and method of executing security for common intermediate language

#181
20190158286
2019-05-23

On demand code decryption

#182
20190156025
2019-05-23

Software protection through code and control flow data hiding and obfuscation

#183
20190141414
2019-05-09

Device and method for GPU-based watermarking

#184
20190114400
2019-04-18

Electronic device including a digital circuit for accessing encrypted data in a memory and corresponding method to access encrypted data in a memory

#185
20190109874
2019-04-11

Secure application monitoring

#186
20190098030
2019-03-28

Software tampering detection and reporting process

#187
20190095183
2019-03-28

Methods and systems of disassembling executable code

#188
20190044918
2019-02-07

AI model and data transforming techniques for cloud edge

#189
20190044915
2019-02-07

Systems and processes for executing private programs on untrusted computers

#190
20190042713
2019-02-07

Securing applications on mobile devices

#191
20190042712
2019-02-07

Software intellectual property protection systems and methods for embedded platforms

#192
20190042711
2019-02-07

Dynamic functional obfuscation

#193
20190018936
2019-01-17

Logic encryption for integrated circuit protection

#194
20190008845
2019-01-10

Program randomization for cyber-attack resilient control in programmable logic controllers

#195
20190005493
2019-01-03

Method and system for enhancing the security of a transaction

#196
20190005233
2019-01-03

Secure code optimization method and system

#197
20190005229
2019-01-03

Mobile device having trusted execution environment

#198
20180373850
2018-12-27

Memory system including data obfuscation

#199
20180357396
2018-12-13

Hiding of a program execution

#200
20180349577
2018-12-06

Device, system and method for token based outsourcing of computer programs

#201
20180349575
2018-12-06

NATIVE CODE AUTHORIZATION VERIFICATION LIBRARY

#202
20180341737
2018-11-29

Secure logic locking and configuration with camouflaged programmable micro netlists

#203
20180330038
2018-11-15

Integrated circuit identification

#204
20180330037
2018-11-15

Integrated circuit identification

#205
20180307837
2018-10-25

Method and system for evaluating security of application

#206
20180293366
2018-10-11

Systems and method for securely sharing and executing data and models

#207
20180293365
2018-10-11

Web application protection

#208
20180293364
2018-10-11

Methods for controlling access to digital assets

#209
20180276373
2018-09-27

Method for Providing a Security-Critical Software Application on a Computer Unit

#210
20180268116
2018-09-20

Methods and related apparatus for managing access to digital assets

#211
20180247089
2018-08-30

Program execution device

#212
20180239881
2018-08-23

Method for processing data

#213
20180232533
2018-08-16

Zero-knowledge databases

#214
20180232479
2018-08-16

System, method and computer-accessible medium providing secure integrated circuit camouflaging for minterm protection

#215
20180211017
2018-07-26

Software diversification in external contexts

#216
20180198774
2018-07-12

METHOD FOR AUTHENTICATING A USER VIA A NON-SECURE TERMINAL

#217
20180196952
2018-07-12

METHOD FOR SECURELY TRANSMITTING A SECRET DATA TO A USER OF A TERMINAL

#218
20180196927
2018-07-12

METHOD FOR SECURING A TRANSACTION PERFORMED FROM A NON-SECURE TERMINAL

#219
20180181729
2018-06-28

Protecting a computer program against reverse engineering

#220
20180173589
2018-06-21

Integrated security and data redundancy

#221
20180157808
2018-06-07

System and method for code obfuscation of application

#222
20180152436
2018-05-31

Reliable selection of security countermeasures

#223
20180145827
2018-05-24

Method for securely transmitting a secret data to a user of a terminal

#224
20180137280
2018-05-17

Method and system for protecting computerized systems from malicious code by means of mutable instructions

#225
20180137262
2018-05-17

SOFTWARE DUPLICATION PREVENTION SYSTEM

#226
20180129794
2018-05-10

Method for Protecting Dex File from Decompilation in Android System

#227
20180121181
2018-05-03

Binary merging device, method, and computer program

#228
20180091318
2018-03-29

System and method for authenticating and enabling functioning of a manufactured electronic device

#229
20180091295
2018-03-29

Data protection

#230
20180081826
2018-03-22

Methods and systems for binary scrambling

#231
20180069694
2018-03-08

Software protection against differential fault analysis

#232
20180063132
2018-03-01

Preventing unauthorized access to secured information systems by injecting device data collectors

#233
20180046516
2018-02-15

Memory fractionation software protection

#234
20180041527
2018-02-08

Using instrumentation code to detect bots or malware

#235
20180032737
2018-02-01

Static analysis based on abstract program representations

#236
20180025184
2018-01-25

Program execution device

#237
20180013562
2018-01-11

Secure and zero knowledge data sharing for cloud applications

#238
20180013551
2018-01-11

APPARATUS FOR OBFUSCATING AND RESTORING PROGRAM EXECUTION CODE AND METHOD THEREOF

#239
20180012025
2018-01-11

Dynamic security module terminal device and method of operating same

#240
20180011997
2018-01-11

Application Code Hiding Apparatus by Modifying Code in Memory and Method of Hiding Application Code Using the Same

#241
20180011996
2018-01-11

Secret shared random access machine

#242
20180011995
2018-01-11

Method of writing data to a memory device and reading data from the memory device

#243
20180007082
2018-01-04

Dynamic security module server device and method of operating same

#244
20180004940
2018-01-04

Method and apparatus for generating dynamic security module

#245
20170372046
2017-12-28

Computerized system and method for modifying a media file by automatically applying security features to select portions of media file content

#246
20170364668
2017-12-21

Method for processing data

#247
20170359071
2017-12-14

Physically unclonable camouflage structure and methods for fabricating same

#248
20170357787
2017-12-14

Application Code Hiding Apparatus Using Dummy Code And Method Of Hiding Application Code Using The Same

#249
20170351847
2017-12-07

Simple obfuscation of text data in binary files

#250
20170344757
2017-11-30

CPU obfuscation for cloud applications

#251
20170337359
2017-11-23

Tiered code obfuscation in a development environment

#252
20170337358
2017-11-23

Method of protecting computer program code

#253
20170329954
2017-11-16

Robust device authentication

#254
20170316214
2017-11-02

Non-malleable obfuscator for sparse functions

#255
20170286650
2017-10-05

Tiered code obfuscation in a development environment

#256
20170279854
2017-09-28

Identifying data usage via active data

#257
20170262643
2017-09-14

System, apparatus and method for License Key permutation

#258
20170235963
2017-08-17

Method, apparatus, system and non-transitory computer readable medium for code protection

#259
20170193205
2017-07-06

INCREMENTALLY POLYMORPHING CODE FOR ENHANCED RESISTANCE TO REVERSE ENGINEERING

#260
20170185486
2017-06-29

Fast memory initialization

#261
20170169196
2017-06-15

Device and method for executing protected iOS software modules

#262
20170161471
2017-06-08

Managing heterogeneous product features using a unified license manager

#263
20170154171
2017-06-01

Protecting an item of software

#264
20170149802
2017-05-25

Protecting threat indicators from third party abuse

#265
20170147798
2017-05-25

Mobile Device And Method Of Operating Mobile Device

#266
20170134379
2017-05-11

METHOD FOR SECURING AN APPLICATION AND DATA

#267
20170124306
2017-05-04

Method and apparatus for preventing application from being deciphered

#268
20170124305
2017-05-04

Deterministic identifiers for source code elements

#269
20170116438
2017-04-27

Cryptographic program diversification

#270
20170116396
2017-04-27

Optimizing and protecting software

#271
20170091486
2017-03-30

CPU obfuscation for cloud applications

#272
20170091457
2017-03-30

Systems and methods for switching emulation of an executable file

#273
20170075820
2017-03-16

Secure entry and exit for software modules protected by controlled encryption key management

#274
20170068804
2017-03-09

Method for protecting a computer program from being influenced, and computer system

#275
20170061165
2017-03-02

Program execution device

#276
20170061106
2017-03-02

ANTI-REVERSE ENGINEERING UNIFIED PROCESS

#277
20170060637
2017-03-02

Data processing systems

#278
20170054716
2017-02-23

Zero-knowledge databases

#279
20170046534
2017-02-16

Device location history anonymization based on stop decision

#280
20170033922
2017-02-02

Balanced encoding of intermediate values within a white-box implementation

#281
20170033921
2017-02-02

Encoding values by pseudo-random mask

#282
20170024550
2017-01-26

Method for processing data

#283
20170024331
2017-01-26

Method of obfuscating a code

#284
20170010982
2017-01-12

Secure handling of memory caches and cached software module identities for a method to isolate software modules by means of controlled encryption key management

#285
20170006057
2017-01-05

Automated and personalized protection system for mobile applications

#286
20160371473
2016-12-22

Code Obfuscation Device Using Indistinguishable Identifier Conversion And Method Thereof

#287
20160350520
2016-12-01

Diversifying Control Flow of White-Box Implementation

#288
20160342777
2016-11-24

System and method for authenticating and enabling functioning of a manufactured electronic device

#289
20160335454
2016-11-17

Systems and methods for accessing computational resources in an open environment

#290
20160335422
2016-11-17

Apparatus and method for managing gaming engine file in a mobile platform

#291
20160330180
2016-11-10

Zero-knowledge databases

#292
20160328559
2016-11-10

System, method and computer program product for protecting software via continuous anti-tampering and obfuscation transforms

#293
20160328544
2016-11-10

Sharing and executing sensitive logic semantics

#294
20160328543
2016-11-10

Protecting the input/output of modular encoded white-box RSA/ECC

#295
20160328542
2016-11-10

White-box elliptic curve point multiplication

#296
20160328541
2016-11-10

White-box modular exponentiation

#297
20160328540
2016-11-10

Array indexing with modular encoded values

#298
20160328539
2016-11-10

Obscuring Software Code With Split Variables

#299
20160314301
2016-10-27

Cooperative static and dynamic analysis of web application code for finding security vulnerabilities

#300
20160300057
2016-10-13

Program protection device