| 11188477 |
Page protection layer |
Julien Oster, Thomas G. Holland, Bernard J. Semeria, Jason A. Harmening, Pierre-Olivier J. Martel +4 more |
2021-11-30 |
| 11188638 |
Fine-grained memory address space layout randomization |
Jacques Anthony Vidrine, Nicholas C. Allegra, Gregory D. Hughes |
2021-11-30 |
| 10521592 |
Application translocation |
Julien Oster, Robert J. Kendall-Kuppe, Christopher S. Linn, Jonathan M. Grynspan, Keith Stattenfield |
2019-12-31 |
| 10521214 |
Methods and systems for upgrade and synchronization of securely installed applications on a computing device |
Dallas B. De Atley |
2019-12-31 |
| 10410003 |
Multiple containers assigned to an application |
Kelly B. Yancey, Jacques Anthony Vidrine, Eric Olaf Carlson, Paul William Chinn |
2019-09-10 |
| 10311228 |
Using a fine-grained address space layout randomization to mitigate potential security exploits |
Jacques Anthony Vidrine, Nicholas C. Allegra, Gregory D. Hughes |
2019-06-04 |
| 10311227 |
Obfuscation of an address space layout randomization mapping in a data processing system |
Gregory D. Hughes, Jacques Anthony Vidrine, Nicholas C. Allegra |
2019-06-04 |
| 9811381 |
Resource restriction systems and methods |
Jussi-Pekka Mantere, Alexander Tony Maluta, John William Scalo, Eugene Ray Tyacke, Bruce Gaya +2 more |
2017-11-07 |
| 9672350 |
System and method of authorizing execution of software code based on at least one installed profile |
Dallas B. De Atley, Heiko Gernot Albert Panther, Mitchell D. Adler, Michael Brouwer, Matt Reda |
2017-06-06 |
| 9400688 |
Resource restriction systems and methods |
Jussi-Pekka Mantere, Alexander Tony Maluta, John William Scalo, Eugene Ray Tyacke, Bruce Gaya +2 more |
2016-07-26 |
| 9378340 |
Methods and systems for upgrade and synchronization of securely installed applications on a computing device |
Dallas B. De Atley |
2016-06-28 |
| 9294359 |
System connections and user interfaces |
Pavel Cisler, Yan Arrouye, John J. Iarocci, Marc J. Krochmal, Christopher Sharp +3 more |
2016-03-22 |
| 8880736 |
Methods and systems for archiving and restoring securely installed applications on a computing device |
Dallas B. De Atley |
2014-11-04 |
| 8874905 |
Resource restriction systems and methods |
Jussi-Pekka Mantere, Alexander Tony Maluta, John William Scalo, Eugene Ray Tyacke, Bruce Gaya +2 more |
2014-10-28 |
| 8850135 |
Secure software installation |
Dallas B. De Atley |
2014-09-30 |
| 8635663 |
Restriction of program process capabilities |
Nick Lane-Smith, Joshua Osborne |
2014-01-21 |
| 8484728 |
Managing securely installed applications |
Dallas B. De Atley |
2013-07-09 |
| 8352733 |
Resource restriction systems and methods |
Jussi-Pekka Mantere, Alexander Tony Maluta, John William Scalo, Eugene Ray Tyacke, Bruce Gaya +2 more |
2013-01-08 |
| 8296833 |
System connections and user interfaces |
Pavel Cisler, Yan Arrouye, John J. Iarocci, Marc J. Krochmal, Christopher Sharp +3 more |
2012-10-23 |
| 8285949 |
Secure software installation |
Dallas B. De Atley |
2012-10-09 |
| 8272048 |
Restriction of program process capabilities |
Nick Lane-Smith, Joshua Osborne |
2012-09-18 |
| 8266323 |
System connections and user interfaces |
Pavel Cisler, Yan Arrouye, John J. Iarocci, Marc J. Krochmal, Christopher Sharp +3 more |
2012-09-11 |