Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
02/10/2015 | US8955072 Single sign on for a remote user session |
02/10/2015 | US8955071 Controlled password modification method |
02/10/2015 | US8955070 Controlled password modification method and apparatus |
02/10/2015 | US8955069 Event-based biometric authentication using mobile device |
02/10/2015 | US8955067 System and method for providing controlled application programming interface security |
02/10/2015 | US8955065 Recovery of managed security credentials |
02/10/2015 | US8955063 Terminal device authentication method, terminal device and program |
02/10/2015 | US8955062 Method and system for permitting access to resources based on instructions of a code tagged with an identifier assigned to a domain |
02/10/2015 | US8955061 Information processing apparatus, authentication system, authentication method, and program |
02/10/2015 | US8955060 Collaborative parental control of streaming media |
02/10/2015 | US8955058 Automatically generating challenge questions inferred from user history data for user authentication |
02/10/2015 | US8955057 Managing access to class objects in a system utilizing a role-based access control framework |
02/10/2015 | US8955056 Terminal and method for assigning permission to application |
02/10/2015 | US8955055 Customer extendable AAA framework for network elements |
02/10/2015 | US8955052 System and method for maintaining dual identity in a server process |
02/10/2015 | US8955050 Generating secure roaming user profiles over a network |
02/10/2015 | US8955047 Method client and system for authentication of a low-security client and a high-security client in a mobile radio network |
02/10/2015 | US8955045 Facilitating varied access based on authentication scoring |
02/10/2015 | US8955044 Time managed challenge-response test |
02/10/2015 | US8955043 Type-preserving compiler for security verification |
02/10/2015 | US8955042 Systems and methods for implementing transparent encryption |
02/10/2015 | US8955040 Provisioning authorization claims using attribute-based access-control policies |
02/10/2015 | US8955038 Methods and systems for controlling access to computing resources based on known security vulnerabilities |
02/10/2015 | US8955037 Access management architecture |
02/10/2015 | US8955035 Anonymous principals for policy languages |
02/10/2015 | US8955008 Television decoding unit with multiple wireless access modules |
02/10/2015 | US8954958 Method of configuring a virtual application |
02/10/2015 | US8954804 Secure boot circuit and method |
02/10/2015 | US8954760 Authentication of solution topology |
02/10/2015 | US8954759 Secure spin torque transfer magnetic random access memory (STTMRAM) |
02/10/2015 | US8954757 Method, host, storage, and machine-readable storage medium for protecting content |
02/10/2015 | US8954756 Systems and methods for transformation of logical data objects for storage |
02/10/2015 | US8954755 Memory address translation-based data encryption with integrated encryption engine |
02/10/2015 | US8954754 Method and apparatus to process SHA-1 secure hashing algorithm |
02/10/2015 | US8954752 Building and distributing secure object software |
02/10/2015 | US8954751 Secure memory control parameters in table look aside buffer data fields and support memory array |
02/10/2015 | US8954750 Secure PIN entry device |
02/10/2015 | US8954749 Methods, systems, and product for hashing using twisted tabulation |
02/10/2015 | US8954747 Protecting keystrokes received from a keyboard in a platform containing embedded controllers |
02/10/2015 | US8954745 Method and apparatus for generating one-time passwords |
02/10/2015 | US8954744 Verification methods and apparatus for use in providing application services to mobile communication devices |
02/10/2015 | US8954742 Method and apparatus for digital authentication of valuable goods |
02/10/2015 | US8954741 Apparatus and method for supporting family cloud in cloud computing system |
02/10/2015 | US8954738 Method and device for verifying the integrity of platform software of an electronic device |
02/10/2015 | US8954737 Method and apparatus for performing distributed privacy-preserving computations on user locations |
02/10/2015 | US8954736 Limiting the functionality of a software program based on a security model |
02/10/2015 | US8954734 Method for transmitting contents for contents management technology interworking, and recording medium for storing program thereof |
02/10/2015 | US8954730 Establishing historical usage-based hardware trust |
02/10/2015 | US8954729 Creating and using a specific user unique id for security login authentication |
02/10/2015 | US8954722 Enforcing software updates in an electronic device |
02/10/2015 | US8954720 IC chip, information processing apparatus, software module control method, information processing system, information processing method, and program |
02/10/2015 | US8954716 Master security policy server |
02/10/2015 | US8954696 Secure memory management system and method |
02/10/2015 | US8954695 Secure pool memory management |
02/10/2015 | US8954645 Storage writes in a mirrored virtual machine system |
02/10/2015 | US8954624 Method and system for securing input from an external device to a host |
02/10/2015 | US8954620 Techniques for using an assigned switch identification at an input/output device |
02/10/2015 | US8954594 Communication device, communication method and program |
02/10/2015 | US8954593 Method and device for implementing remote control of a terminal |
02/10/2015 | US8954560 Incremental browser-based device fingerprinting |
02/10/2015 | US8954559 System and method for extending IMS SCIM / service broker to enable application servers using MSCML to execute on CDMA win networks |
02/10/2015 | US8954547 Method and system for updating the telecommunication network service access conditions of a telecommunication device |
02/10/2015 | US8954513 Auditor system |
02/10/2015 | US8954486 Secured identities collaboration system and method |
02/10/2015 | US8954403 Systems and methods for transformation of logical data objects for storage |
02/10/2015 | US8954301 System and method for configuring an aircraft passenger cabin |
02/10/2015 | US8953851 Ocular biometric authentication with system verification |
02/10/2015 | US8953845 Login method based on direction of gaze |
02/10/2015 | US8953808 System and method for effectively performing data restore/migration procedures |
02/10/2015 | US8953807 Method and apparatus for remotely provisioning software-based security coprocessors |
02/10/2015 | US8953806 Method and apparatus for remotely provisioning software-based security coprocessors |
02/10/2015 | US8953805 Authentication information generating system, authentication information generating method, client apparatus, and authentication information generating program for implementing the method |
02/10/2015 | US8953799 Mobile device management |
02/10/2015 | US8953796 Techniques for accessing features of a hardware adapter |
02/10/2015 | US8953795 Forensic decryption tools |
02/10/2015 | US8953790 Secure generation of a device root key in the field |
02/10/2015 | US8953784 Lightweight stream cipher cryptosystems |
02/10/2015 | US8953783 Arithmetic device |
02/10/2015 | US8953646 Method and apparatus of multiplexing media streams |
02/10/2015 | US8953330 Security protection device and method |
02/10/2015 | US8953190 Automated method and system for holding and authenticating a device configuration change payload job |
02/10/2015 | US8953178 Camera system with color display and processor for reed-solomon decoding |
02/10/2015 | US8953061 Image capture device with linked multi-core processor and orientation sensor |
02/10/2015 | US8953060 Hand held image capture device with multi-core processor and wireless interface to input device |
02/10/2015 | US8952781 Method and apparatus for access control using dual biometric authentication |
02/10/2015 | CA2825457C Secure reset of personal and service provider information on mobile devices |
02/06/2015 | CA2870732A1 Digital activity recorder |
02/05/2015 | WO2015017581A1 Centralized selective application approval for mobile devices |
02/05/2015 | WO2015017219A1 Mobile computing device and wearable computing device having automatic access mode control |
02/05/2015 | WO2015017217A1 Controlling a current access mode of a computing device based on a state of an attachment mechanism |
02/05/2015 | WO2015017130A1 Raw sensor input encryption for passcode entry security |
02/05/2015 | WO2015017121A1 Limited-access state for inadvertent inputs |
02/05/2015 | WO2015017065A1 Coerced encryption on connected devices |
02/05/2015 | WO2015017024A1 Irrelevant code identification |
02/05/2015 | WO2015016994A1 System for processing an encrypted instruction stream in hardware |
02/05/2015 | WO2015016952A1 Determining malware based on signal tokens |
02/05/2015 | WO2015016940A1 Communication using over-the -top identities without centralized authority |
02/05/2015 | WO2015016901A1 Signal tokens indicative of malware |
02/05/2015 | WO2015016863A1 Protecting data in memory of a consumable product |
02/05/2015 | WO2015016828A1 Data management |