21
Bruce McCorkendale, Peter Ferrie: Using a hypervisor to provide computer security. Symantec Corporation, Fenwick & West, August 9, 2011: US07996836 (253 worldwide citation)

A computer includes a virtual machine controlled by a hypervisor. The virtual machine runs a virtualized operating system with running processes. A security initialization module sets the state in the virtual machine to pass execution from the virtual machine to the hypervisor responsive to a proces ...


22
David P Felsher, Robert H Nagel, Steven M Hoffberg: System and method for secure three-party communications. Steven M Hoffberg, Ostrolenk Faber, November 20, 2012: US08316237 (243 worldwide citation)

A system and method for communicating information between a first party and a second party, comprising the steps of receiving, by an intermediary, an identifier of desired information and accounting information for a transaction involving the information from the first party, transmitting an identif ...


23
C Kenneth Miller, Terrance E Bradley, Kenneth Cates, Kary Robertson: Scheduling data transmission. StarBurst Communications Corporation, Testa Hurwitz & Thibeault, July 6, 1999: US05920701 (242 worldwide citation)

The transmission of data (e.g., a computer file) from one or more content sources over a network to one or more replicated servers is scheduled and performed according to the schedule. The content sources request the schedule from a network resource scheduler. The scheduler receives the requests and ...


24
Stefik Mark J, Pirolli Peter L T, Bobrow Daniel G: System for controlling the distribution and use of composite digital works. Xerox, June 5, 1996: EP0715246-A1 (242 worldwide citation)

A system for controlling use and distribution of composite digital works. A digital work is comprised of a description part (700) and a content part. The description part contains control information for the composite digital work. The content part stores the actual digital data comprising the compo ...


25
Daniel J Mendez, Mason Ng: System and method for preventing access to data on a compromised remote device. Visto Corporation, Oblon Spivak McClelland Maier & Neustadt L, September 6, 2011: US08012219 (232 worldwide citation)

This invention discloses a system and method for selective erasure, encryption and or copying of data on a remote device if the remote device has been compromised or the level of authorization of a roaming user in charge of the remote device has been modified.


26
Pitkin Richard P, Morency John P: Broker for computer network server selection.. Digital Equipment, August 29, 1990: EP0384339-A2 (225 worldwide citation)

In a computer network, a broker mechanism allocates a plurality of servers, each having an available resource capacity, to a plurality of clients for delivering one of several services to the clients. The broker operates by monitoring a subset of all available servers capable of delivering the reque ...


27
Harpreet Singh Labana, Yair Israel Kronenberg, Brian J Saluzzo: Apparatuses, methods and systems for a secure resource access and placement platform. Goldman Sachs & Co, Perkins Coie, September 3, 2013: US08528059 (216 worldwide citation)

The APPARATUSES, METHODS AND SYSTEMS FOR A SECURE RESOURCE ACCESS AND PLACEMENT PLATFORM (“SRAP PLATFORM”) provides a secure supporting infrastructure within a corporate network framework and applications based thereon for use and placement of corporate resources. A non-trusted device may be authori ...


28
Stefik Mark J, Casey Michalene M: System for controlling the distribution and use of digital works. Xerox, June 5, 1996: EP0715245-A1 (212 worldwide citation)

A system for controlling use and distribution of digital works, in which the owner of a digital work (101) attaches usage rights (102) to that work. Usage rights are granted by the "owner" of a digital work to "buyers" of the digital work. The usage rights define how a digital work may be used and f ...


29
Stefik Mark J, Pirolli Peter L T, Merkle Ralph C: System for controlling the distribution and use of digital works having a fee reporting mechanism. Xerox, June 5, 1996: EP0715243-A1 (206 worldwide citation)

A fee accounting mechanism for reporting fees associated with the distribution and use of digital works. Usage rights and fees are attached to digital works. The usage rights define how the digital work may be used or further distributed. Usage fees are specified as part of a usage right. The digita ...


30
Gabber Eran, Matias Yossi, Gibbons Phillip B, Mayer Alain Jules: System and method for providing anonymous personalized browsing in a network. Lucent Technologies, July 29, 1998: EP0855659-A1 (205 worldwide citation)

For use with a network having server sites capable of being browsed by users based on identifiers received into the server sites and personal to the users, alternative proxy systems for providing substitute identifiers to the server sites that allow the users to browse the server sites anonymously v ...