Issued Patents All Time
Showing 276–299 of 299 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8473899 | Automatic optimization of string allocations in a computer program | Paolina Centonze, Mohammed Mostafa, Takaaki Tateishi | 2013-06-25 |
| 8468605 | Identifying security vulnerability in computer software | Yinnon A. Haviv, Roee Hay, Adi Sharabani, Takaaki Tateishi, Omer Tripp +1 more | 2013-06-18 |
| 8453125 | Generating inputs for client-server programs for fault-detection and localization | Shay Artzi, Julian Timothy Dolby, Frank Tip | 2013-05-28 |
| 8434070 | Generating specifications of client-server applications for static analysis | Shay Artzi, Ryan Berg, John Peyton, Manu Sridharan, Robert Wiener | 2013-04-30 |
| 8387018 | Fault localization using directed test generation | Shay Artzi, Julian Timothy Dolby, Frank Tip | 2013-02-26 |
| 8387111 | Type independent permission based access control | Lawrence Koved, Anthony Joseph Nadalin, Nataraj Nagaratnam, Bruce Arland Rich | 2013-02-26 |
| 8381199 | Modular and/or demand-driven string analysis of a computer program | Takaaki Tateishi, Omer Tripp | 2013-02-19 |
| 8381242 | Static analysis for verification of software program access to secure resources for computer systems | Ryan Berg, Paolina Centonze, Omer Tripp | 2013-02-19 |
| 8375371 | Importance-based call graph construction | Stephen Fink, Yinnon A. Haviv, Omer Tripp, Omri Weisman | 2013-02-12 |
| 8365280 | System, method, and program for determining validity of string | Yinnon A. Haviv, Naoshi Tabuchi, Takaaki Tateishi | 2013-01-29 |
| 8365281 | Determining whether method of computer program is a validator | Takaaki Tateishi, Omer Tripp, Ryan Berg, Robert Wiener | 2013-01-29 |
| 8332939 | System and method for the automatic identification of subject-executed code and subject-granted access rights | Paolina Centonze | 2012-12-11 |
| 8296722 | Crawling of object model using transformation graph | Sachiko Yoshihama, Shinya Kawanaka, Takaaki Tateishi, Ory Segal, Adi Sharabani +1 more | 2012-10-23 |
| 8230477 | System and method for the automatic evaluation of existing security policies and automatic creation of new security policies | Paolina Centonze | 2012-07-24 |
| 8006233 | System and method for the automatic verification of privilege-asserting and subject-executed code | Paolina Centonze | 2011-08-23 |
| 7877812 | Method, system and computer program product for enforcing privacy policies | Lawrence Koved | 2011-01-25 |
| 7827613 | System and method for supporting digital rights management in an enhanced Java™ 2 runtime environment | Lawrence Koved, Magda M. Mourad, Jonathan Paul Munson, Giovanni Pacifici, Alaa S. Youssef | 2010-11-02 |
| 7810135 | Apparatus for adopting authorizations | Lawrence Koved, Anthony Joseph Nadalin | 2010-10-05 |
| 7496757 | Software verification system, method and computer program element | Paul Abbott, Lawrence Koved, Anthony Joseph Nadalin | 2009-02-24 |
| 7343620 | Method and apparatus for adopting authorizations | Lawrence Koved, Anthony Joseph Nadalin | 2008-03-11 |
| 7308717 | System and method for supporting digital rights management in an enhanced Java™ 2 runtime environment | Lawrence Koved, Magda M. Mourad, Jonathan Paul Munson, Giovanni Pacifici, Alaa S. Youssef | 2007-12-11 |
| 7237236 | Method and apparatus for automatically determining optimum placement of privileged code locations in existing code | Aaron Kershenbaum, Lawrence Koved, Anthony Joseph Nadalin | 2007-06-26 |
| 7171558 | Transparent digital rights management for extendible content viewers | Magda M. Mourad, Jonathan Paul Munson, Tamer Nadeem, Giovanni Pacifici, Alaa S. Youssef | 2007-01-30 |
| 7076804 | Automated program resource identification and association | Aaron Kershenbaum, Lawrence Koved | 2006-07-11 |