Protection of user data in hosted application environments

M Christodorescu, D Pendarakis, KK Singh - US Patent 9,245,126, 2016 - Google Patents
(51) Int. Cl. A method of converting an original application into a cloud G06F I7/00(2006.01)
hosted application includes splitting the original application G06F2L/60(2013.01) into a …

Digital assistant extensibility to third party applications

T Surti, M Patten, S Lyndersay, CC Tong - US Patent 10,133,613, 2018 - Google Patents
(57) ABSTRACT A digital assistant includes an extensibility client that inter faces with
application extensions that are built by third-party developers so that various aspects of …

Transforms within secure execution environments

GB Roth, AD Dokey, EJ Brandwine… - US Patent …, 2017 - Google Patents
BACKGROUND Modern computer systems place a high importance on maintaining data
and application security. In a modern distributed and/or virtual computer system where a …

Virtual secure execution environments

GB Roth, AD Dokey, EJ Brandwine… - US Patent …, 2016 - Google Patents
BACKGROUND Modern computer systems place a high importance on maintaining data
and application security. In a modern distributed and/or virtual computer system environment …

Posture assessment in a secure execution environment

GB Roth, AD Dokey, EJ Brandwine… - US Patent …, 2019 - Google Patents
5, 643, 085 A 7/1997 Aityan et al. 5, 643, 086 A 7/1997 Alcorn et al. 5, 666, 533 A 9/1997
Horiguchi et al. 5, 848, 159 A 12/1998 Collins et al. 5, 867, 578 A 2/1999 Brickell et al. 5 …

Multi-party computation services

GB Roth, AD Dokey - US Patent 9,577,829, 2017 - Google Patents
BACKGROUND Multi-party computation is a field of cryptographic research with a goal to
allow multiple mutually-distrustful parties to compute a function while simultaneously …

System and methods for detection of fraudulent online transactions

SY Golovanov, AV Monastyrsky - US Patent 9,363,286, 2016 - Google Patents
Disclosed are some aspects of systems and methods for pro viding security for online
transactions. An example method includes determining, at a security service, that an online …

Application instances authenticated by secure measurements

CP Cahill, GB Roth - US Patent 10,044,695, 2018 - Google Patents
Int. Cl. H04L 29/06(2006. 01) G06F 21/44(2013. 01)(52) US CI. CPC.............. H04L 63/08
(2013. 01); G06F 21/44 (2013. 01); H04L 63/06 (2013. 01); H04L 63/10 (2013. 01)(58) Field …

Securing service control on third party hardware

GB Roth, AD Dokey, EJ Brandwine… - US Patent …, 2016 - Google Patents
Techniques for securely instantiating control plane compo nents of provider services, at least
a portion of which are instantiated within secure execution environments, are described …

Automatically configuring mobile devices and applying policy based on device state

MS Jacobsen, J Menon, S Wang - US Patent 10,104,128, 2018 - Google Patents
Techniques for network-based security for mobile devices based on device state are
disclosed. In some embodiments, automatically configuring mobile devices and applying …