Publications
    - Reset

Defensive Publications are a method for the open source community to prevent the issuance of low quality software patents. These publications serve as evidence to disclose to the examiner what is new and innovative within the technology. Through Linux Defenders, developers collaborate with our team to ensure that these publications are effective in protecting the freedom to create, invent and operate.

Publication Date Title Tags
October 20, 2014 Multiparty Verified Code Execution on Modern Browsers
A process that allows a user to securely execute a web application without trusting a single server.
security Multiparty Verified Verification Code Execution Javascript Web Application Browser Secure Distributed Cryptography Bookmark Bookmarklet
September 05, 2014 Token-Based Multiparty Password Authenticated Key Retrieval Process
This is a process that allows a user to retrieve a secret key with the help of multiple independent servers.
security Multiparty Secure Distributed Cryptography authentication password Authenticated Key Retrieval PAKR Secret Token
May 14, 2014 Improved password based solution for authentication and authorization
The idea proposed will provide improved secure password handling that is possible to map onto legacy hardware and procedures, only requiring a secure domain for the user password database management and moderate modifications of the legacy software.
security password protected database trusted platform module
April 07, 2014 Discovering, verifying and visualizing dependencies between dynamically linked software components for researching build configuration, open source license compliance and security
The method in this document describes how these dependencies can be found for binaries that use the ELF format (Executable and Linking Format), which is the binary format used on the Unix(-like) systems mentioned before.
security visualization Linux FreeBSD BSD Unix QNX Solaris ELF software software development dynamic linking open source license compliance defect discovery reverse engineering
April 22, 2010 Secure Management of Objects in Remote Containers Shared by Multiple and Independent Issuers
The specification describes how objects issued by different issuers but stored in a single container can securely be managed by each issuer in a remote fashion.
security mobile phones
August 19, 2009 Kernel Based User Authentication
The Security Sector prevents the execution of system commands unless the user can be authenticated by the Security Sector.
security kernel
June 23, 2009 File Access Management with Secure Hardware
A system is needed that not only manages all access to secure files, but also limits which devices may have access to the file itself.
security information
June 16, 2009 VPN Sales System
Needed is a means of conducting transactions over a secure network such that internet and website security are not topics of concern.
security transactions
March 11, 2009 Method of Providing Anonymous Secure User Access Tokens
While passwords provide some protection, a skilled individual can intercept data such as usernames and passwords and gain access to the data.
security access
January 29, 2009 Method for Efficiently and Securely Purchasing Goods from Online Services
Online purchasing transactions cannot always be counted on to be secure. In this invention, Linux gets involved in both ends of the transmission of secure transactions: Linux must be running on both the local computer where the transaction originates and on the online service’s server.
security online transactions encryption key