Downloadable security and protection methods and apparatus

WL Helms, JB Carlucci, JK Schnitzer - US Patent 8,520,850, 2013 - Google Patents
HEADED policies enforced by secure CA, DRM, and TD clients run ning within the trusted
domain. Legacy and retail CPE mod els are also supported. A network security architecture …

Systems and methods for interacting with a computer through handwriting to a screen

JT Kim, PD Sommer, S Wang, NM Eason… - US Patent …, 2013 - Google Patents
US8487879B2 - Systems and methods for interacting with a computer through handwriting to a
screen - Google Patents US8487879B2 - Systems and methods for interacting with a computer …

Software authorization utilizing software reputation

DB Cross, TV Kurien, SA Field - US Patent 8,615,801, 2013 - Google Patents
BACKGROUND Today, when downloading Software or opening an applica tion, consumers
base trust on the issuer or publisher of the Software. For example, a consumer may trust …

Method of customizing a standardized IT policy

A Bocking, MT Hardy, P Roberts, R Rawlins… - US Patent …, 2013 - Google Patents
US8544057B2 - Method of customizing a standardized IT policy - Google Patents
US8544057B2 - Method of customizing a standardized IT policy - Google Patents Method of …

Single security model in booting a computing device

J De Cesare, DB De Atley, JJ Andrews… - US Patent …, 2013 - Google Patents
BACKGROUND As more and more computing devices are being used in people's daily life,
security has become a widespread concern for users and content providers. Viruses, worms …

System and method of installing software applications on electronic devices

HA Little, D Clark, RN Owen, SW Totzke… - US Patent …, 2013 - Google Patents
In at least one embodiment, there is provided a mobile wireless device comprising: a
microprocessor and memory, the memory comprising a set of control settings used to control …

Correlation, association, or correspondence of electronic forms

C Stanciu, P Halstead, A Shur, EG Essey - US Patent 8,429,522, 2013 - Google Patents
Determining correspondence, association, and/or correlation between nodes of electronic
forms based on schemas of those forms is described. Importing, merging, and/or annotating …

Suspicious node detection and recovery in mapreduce computing

BE Aupperle, DL Kaminsky - US Patent 8,397,293, 2013 - Google Patents
Embodiments of the present invention address deficiencies of the art in respect to distributed
computing for large data sets on clusters of computers and provide a novel and non-obvious …

System and method for automated safe reprogramming of software radios

V Sridhar, RG Amur, KK Rao - US Patent 8,347,108, 2013 - Google Patents
H04B1/00—Details of transmission systems, not covered by a single one of groups
H04B3/00-H04B13/00; Details of transmission systems not characterised by the medium …