System and method for applying security policies on multiple assembly caches

S Pouliot - US Patent 7,823,186, 2010 - Google Patents
The invention relates to a system and method for providing multiple assembly caches for
storing shared application resources. Each assembly cache may be associated with a …

System and method for using sandboxes in a managed shell

S Pouliot - US Patent 7,725,922, 2010 - Google Patents
The present invention allows shell program to be managed with security policies and
enforced using Sandboxes enforced by the security manager of a managed environment …

System and method for determining and optimizing resources of data processing system utilized by a service request

F Bernardini, RN Chang, P Chang-shing… - US Patent …, 2016 - Google Patents
A computer-implemented method for determining resources utilized by a service request in a
data processing system. The method includes determining monitored relationship types from …

Verification of un-trusted code for consumption on an insecure device

M Klucher, PL Bleisch, JR Brown, RS Unoki - US Patent 8,196,213, 2012 - Google Patents
Disclosed is a code verification service that detects malformed data in an automated process
and rejects submission and distribution if any malicious code is found. Once the submission …

Agent-based remote function execution

AE Faust, ME Tabet - US Patent 8,296,786, 2012 - Google Patents
A function call can be received at a remote execution module in a host environment. The call
can instruct the remote execution module to remotely execute a specified function in a …

Call stack parsing in multiple runtime environments

T Lai, M Stall, J Langdon, J Stranik, D Bliss - US Patent 8,291,381, 2012 - Google Patents
Where a process in a computing system comprises mixed code, having different sections of
code managed by different runtimes, the call stack used to coordinate function invoca tions …

System and method for executing a permissions recorder analyzer

S Pouliot - US Patent 7,743,414, 2010 - Google Patents
System and method for accurately determining security policy for an application based on
dynamic code analysis of application runtime execution (s). A dynamic recorder, dynamic …

System and method for detecting data extrusion in software applications

A Wiegenstein, M Schumacher, X Jia - US Patent 10,025,688, 2018 - Google Patents
Comprehensive techniques identify data leaks in software applications using Asset Flow
Analysis (AFA) to determine whether critical data leaves a system through an exit point such …

System and method for network permissions evaluation

S Pouliot - US Patent 7,856,654, 2010 - Google Patents
The invention is a system and method for delegating security permission evaluation from a
client computer to remote network service (eg, a security server). The centralization of …

Method and system for managing data in a communication network

DL Zhao, KJ West, VK Mani - US Patent 8,510,848, 2013 - Google Patents
BACKGROUND Typically, data in the form of files such as documents, image files, and
audio/video/multimedia files is stored as a sequence of data bytes in a computer's local …