US2021034343A1
|
|
Systems, Methods and Storage Media for Producing Verifiable Protected Code
|
US2020313850A1
|
|
Method and apparatus for implementing a white-box cipher
|
US2020242217A1
|
|
Systems, methods, and storage media for obfuscating a computer program by representing the control flow of the computer program as data
|
CN104662549A
|
|
Securing accessible systems using cross-linking
|
CN105378679A
|
|
Method and system for media path security
|
WO2014153635A1
|
|
Method and system for platform and user application security on a device
|
CN104335220A
|
|
Method and system for preventing and detecting security threats
|
CN104272319A
|
|
Method for protecting data
|
CN104335522A
|
|
Method and system for chain transformation
|
CN104396181A
|
|
System and method for generating and protecting cryptographic keys
|
EP2751731A1
|
|
Method and system for enhancing content security
|
CN103875001A
|
|
Method and system for protecting execution of cryptographic hash functions
|
WO2012129637A2
|
|
Method of securing memory against malicious attack
|
KR20130018642A
|
|
System and method to protect java bytecode code against static and dynamic attacks within hostile execution environments
|
CA2761065A1
|
|
Interlocked binary protection using whitebox cryptography
|
CN102939587A
|
|
Method for linking and loading to protect applications
|
CA2792782A1
|
|
A system and method for encapsulating and enabling protection through diverse variations in software libraries
|
CA2792787A1
|
|
System and method for protecting cryptographic assets from a white-box attack
|
EP2550622A1
|
|
System and method for dynamic, variably-timed operation paths as a resistance to side channel and repeated invocation attacks
|
WO2011116446A1
|
|
System and method for random algorithm selection to dynamically conceal the operation of software
|