1
Ronnie Donnel Yates Jr, Albert Sing Ho, Thomas Wayne Miller Jr, Paul L Bleisch: Executing unsigned content and securing access in a closed system. Microsoft Corporation, Tim Churna, Micky Minhas, October 28, 2014: US08875271

Mechanisms are disclosed that allow for execution of unsigned content and the securing of resources in a closed system when such unsigned content is executing on the system. For example, an access layer is used between an operating system layer of the closed system and the actual unsigned content. T ...


2

3
Ronnie Donnel Yates, Richard Andrew Meyer, Aaron Joshua Nonis, Stephen J Styrchak, Julien Jacques Nicolas Ellie: Executing unsigned content and securing access in a closed system. Microsoft Corporation, Woodcock Washburn, June 12, 2008: US20080140958-A1

Mechanisms are disclosed that allow for execution of unsigned content and the securing of resources in a closed system when such unsigned content is executing on the system. For example, an access layer is used between an operating system layer of the closed system and the actual unsigned content. T ...


4
Yates Jr Ronnie Donnell, Ho Albert Sing, Miller Thomas Wayne, Bleisch Paul L: Executing unsigned content and securing access in a closed system. Microsoft Corporation, June 19, 2008: WO/2008/073676

Mechanisms are disclosed that allow for execution of unsigned content and the securing of resources in a closed system when such unsigned content is executing on the system. For example, an access layer is used between an operating system layer of the closed system and the actual unsigned content. T ...


5
Yates Jr Ronnie Donnell, Ho Albert Sing, Miller Thomas Wayne, Bleisch Paul L: Executing unsigned content and securing access in a closed system. Microsoft, Cai Yue, October 7, 2009: CN200780045480

Mechanisms are disclosed that allow for execution of unsigned content and the securing of resources in a closed system when such unsigned content is executing on the system. For example, an access layer is used between an operating system layer of the closed system and the actual unsigned content. T ...


6
YATES RONNIE DONNELL JR, HO ALBERT SING, MILLER THOMAS WAYNE, BLEISCH PAUL L: EXECUTION DE CONTENU NON SIGNE ET SECURISATION DACCES DANS UN SYSTEME FERME, EXECUTING UNSIGNED CONTENT AND SECURING ACCESS IN A CLOSED SYSTEM. MICROSOFT CORPORATION, MICROSOFT TECHNOLOGY LICENSING, SMART & BIGGAR, October 6, 2015: CA2669011

Mechanisms are disclosed that allow for execution of unsigned content and the securing of resources in a closed system when such unsigned content is executing on the system. For example, an access layer is used between an operating system layer of the closed system and the actual unsigned content. T ...



Click the thumbnails below to visualize the patent trend.