Resources Contact Us Home
Browse by Category: Main > Information Technology
Class Information
Number: 713/187
Name: Electrical computers and digital processing systems: support > Computer program modification detection by cryptography
Description: Subject matter wherein a cryptographic technique is used to determine that a change has occurred to a particular computer program.

Patents under this class:

Patent Number Title Of Patent Date Issued
8713686 System and method for reducing antivirus false positives Apr. 29, 2014
8713683 Security arrangements for extended USB protocol stack of a USB host system Apr. 29, 2014
8713681 System and method for detecting executable machine instructions in a data stream Apr. 29, 2014
8713679 Detection of code-based malware Apr. 29, 2014
8713677 Anti-phishing system and method Apr. 29, 2014
8713652 Protecting a gaming machine from rogue code Apr. 29, 2014
8713326 Software self-checking systems and methods Apr. 29, 2014
8712035 Online data conversion technique using a sliding window Apr. 29, 2014
8707424 Method for making secure execution of a computer programme, in particular in a smart card Apr. 22, 2014
8707403 Subscription interface for providing access to digital publications Apr. 22, 2014
8707050 Integrity self-check of secure code within a VM environment using native VM code Apr. 22, 2014
8695100 Systems and methods for electronic fraud prevention Apr. 8, 2014
8694796 Secure data deletion in a database Apr. 8, 2014
8694795 Method and apparatus for secure application execution Apr. 8, 2014
8694794 Method for protecting a privilege level of system management mode of a computer system Apr. 8, 2014
8689336 Tiered exposure model for event correlation Apr. 1, 2014
8689325 System and method of monitoring and controlling application files Apr. 1, 2014
8683596 Detection of DOM-based cross-site scripting vulnerabilities Mar. 25, 2014
8683594 Data storage devices including integrated anti-virus circuits and method of operating the same Mar. 25, 2014
8683561 Fixed client identification system for positive identification of client to server Mar. 25, 2014
8683547 System and method for implementing adaptive security zones Mar. 25, 2014
8683228 System and method for WORM data storage Mar. 25, 2014
8683219 Method and apparatus for checking the integrity of data stored in a predetermined memory area of a memory Mar. 25, 2014
8683216 Identifying polymorphic malware Mar. 25, 2014
8683215 Programmable security platform Mar. 25, 2014
8683214 Method and device that verifies application program modules Mar. 25, 2014
8683213 Progressive boot for a wireless device Mar. 25, 2014
8683212 Method and system for securely loading code in a security processor Mar. 25, 2014
8683207 Updating signature algorithms for strong name binding Mar. 25, 2014
8681972 Method of executing a cryptographic calculation Mar. 25, 2014
8677482 Hardware security for software processes Mar. 18, 2014
8677476 Providing remotely defined security data to a local application extension Mar. 18, 2014
8677142 Method and system for protecting against the execution of unauthorized software Mar. 18, 2014
8677141 Enhanced security and performance of web applications Mar. 18, 2014
8676187 Dynamic binding of service on bearer Mar. 18, 2014
8675866 Multiplicative splits to protect cipher keys Mar. 18, 2014
8671457 Method and system for identifying and correcting location discrepancies for reception equipment in a content delivery network Mar. 11, 2014
8671456 Accessing restricted resources in computer programming Mar. 11, 2014
8671453 Social age verification engine Mar. 11, 2014
8671449 Systems and methods for identifying potential malware Mar. 11, 2014
8671279 Incremental secure backup and restore of user settings and data Mar. 11, 2014
8667298 Module signing for unprivileged users to create and load trustworthy kernel modules Mar. 4, 2014
8667291 Unauthorized contents detection system Mar. 4, 2014
8667274 System and method for WORM data storage Mar. 4, 2014
8666067 Cryptographic countermeasure method by deriving a secret data Mar. 4, 2014
8661535 Method for making secure the execution of an intermediate language software code in a portable device Feb. 25, 2014
8656492 Systems, methods, and apparatus for network intrusion detection Feb. 18, 2014
8656461 Copy-paste trust system Feb. 18, 2014
8656363 System and method for entropy pool verification Feb. 18, 2014
8656173 Electronic image data verification program, electronic image data verification system, and electronic image data verification method Feb. 18, 2014

  Recently Added Patents
Therapeutic rinse in a self-heating package
Generating and modifying textual code interfaces from graphical programs
Optical modulator module
Power surface mount light emitting die package
Method and system for associating a cell-sector with time-dependent location parameters
Method and apparatus for power management control of an embedded memory having sleep and shutdown features
  Randomly Featured Patents
Semiconductor component with at least one planar PN junction and zone guard rings
Process for oxidizing saturated primary amines to oximes
Pivoting hand table
Process for catalytic reforming
Combination exit sign and emergency lighting unit
Method for making metal capacitors for deep submicrometer processes for semiconductor integrated circuits
Controlling loudness of speech in signals that contain speech and other types of audio material
Circuit for reducing audio amplifier noise during powering on and off
Method of using wired drillpipe for oilfield fishing operations
Method of decomposing hypochlorite ion in a basic solution