Resources Contact Us Home
Browse by Category: Main > Information Technology
Class Information
Number: 713/187
Name: Electrical computers and digital processing systems: support > Computer program modification detection by cryptography
Description: Subject matter wherein a cryptographic technique is used to determine that a change has occurred to a particular computer program.

Patents under this class:

Patent Number Title Of Patent Date Issued
8713686 System and method for reducing antivirus false positives Apr. 29, 2014
8713683 Security arrangements for extended USB protocol stack of a USB host system Apr. 29, 2014
8713681 System and method for detecting executable machine instructions in a data stream Apr. 29, 2014
8713679 Detection of code-based malware Apr. 29, 2014
8713677 Anti-phishing system and method Apr. 29, 2014
8713652 Protecting a gaming machine from rogue code Apr. 29, 2014
8713326 Software self-checking systems and methods Apr. 29, 2014
8712035 Online data conversion technique using a sliding window Apr. 29, 2014
8707424 Method for making secure execution of a computer programme, in particular in a smart card Apr. 22, 2014
8707403 Subscription interface for providing access to digital publications Apr. 22, 2014
8707050 Integrity self-check of secure code within a VM environment using native VM code Apr. 22, 2014
8695100 Systems and methods for electronic fraud prevention Apr. 8, 2014
8694796 Secure data deletion in a database Apr. 8, 2014
8694795 Method and apparatus for secure application execution Apr. 8, 2014
8694794 Method for protecting a privilege level of system management mode of a computer system Apr. 8, 2014
8689336 Tiered exposure model for event correlation Apr. 1, 2014
8689325 System and method of monitoring and controlling application files Apr. 1, 2014
8683596 Detection of DOM-based cross-site scripting vulnerabilities Mar. 25, 2014
8683594 Data storage devices including integrated anti-virus circuits and method of operating the same Mar. 25, 2014
8683561 Fixed client identification system for positive identification of client to server Mar. 25, 2014
8683547 System and method for implementing adaptive security zones Mar. 25, 2014
8683228 System and method for WORM data storage Mar. 25, 2014
8683219 Method and apparatus for checking the integrity of data stored in a predetermined memory area of a memory Mar. 25, 2014
8683216 Identifying polymorphic malware Mar. 25, 2014
8683215 Programmable security platform Mar. 25, 2014
8683214 Method and device that verifies application program modules Mar. 25, 2014
8683213 Progressive boot for a wireless device Mar. 25, 2014
8683212 Method and system for securely loading code in a security processor Mar. 25, 2014
8683207 Updating signature algorithms for strong name binding Mar. 25, 2014
8681972 Method of executing a cryptographic calculation Mar. 25, 2014
8677482 Hardware security for software processes Mar. 18, 2014
8677476 Providing remotely defined security data to a local application extension Mar. 18, 2014
8677142 Method and system for protecting against the execution of unauthorized software Mar. 18, 2014
8677141 Enhanced security and performance of web applications Mar. 18, 2014
8676187 Dynamic binding of service on bearer Mar. 18, 2014
8675866 Multiplicative splits to protect cipher keys Mar. 18, 2014
8671457 Method and system for identifying and correcting location discrepancies for reception equipment in a content delivery network Mar. 11, 2014
8671456 Accessing restricted resources in computer programming Mar. 11, 2014
8671453 Social age verification engine Mar. 11, 2014
8671449 Systems and methods for identifying potential malware Mar. 11, 2014
8671279 Incremental secure backup and restore of user settings and data Mar. 11, 2014
8667298 Module signing for unprivileged users to create and load trustworthy kernel modules Mar. 4, 2014
8667291 Unauthorized contents detection system Mar. 4, 2014
8667274 System and method for WORM data storage Mar. 4, 2014
8666067 Cryptographic countermeasure method by deriving a secret data Mar. 4, 2014
8661535 Method for making secure the execution of an intermediate language software code in a portable device Feb. 25, 2014
8656492 Systems, methods, and apparatus for network intrusion detection Feb. 18, 2014
8656461 Copy-paste trust system Feb. 18, 2014
8656363 System and method for entropy pool verification Feb. 18, 2014
8656173 Electronic image data verification program, electronic image data verification system, and electronic image data verification method Feb. 18, 2014

  Recently Added Patents
Related news articles
Pet urn enclosure
High pressure refolding of protein aggregates and inclusion bodies
Secure provisioning of a portable device using a representation of a key
Human embryonic stem cell methods and PODXL expression
Millimeter wave imaging method and system to detect concealed objects
Base station apparatus and method for use in mobile communication system
  Randomly Featured Patents
Side leaded, bottom exposed pad and bottom exposed lead fusion quad flat semiconductor package
Spark timing control system
Solid phase and combinatorial synthesis of substituted 2-methylene-2, 3-dihydrothiazoles and of arrays of substituted 2-methylene-2, 3-dihydrothiazoles
Fuel injector
Low-melting point heat transfer fluid
Triazolyl thioamide derivates
Method and apparatus for precision pumping, ratioing, and dispensing of work fluid(s)
Semiconductor device having capacitor that reduce fluctuation of power supply
Remote administration of smart cards for secure access systems
Miniaturized surgical instruments especially useful for the opthalmologic surgical procedures and methods of making the same