Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
05/20/2014 | US8732821 Method and apparatus for preventing accidential disclosure of confidential information via visual representation objects |
05/20/2014 | US8732820 Method for inputting usernames and passwords to access or use different assets |
05/20/2014 | US8732819 Method and a device for generating a secret value |
05/20/2014 | US8732814 Method and apparatus for token-based packet prioritization |
05/20/2014 | US8732812 Method of operating an item of on-board equipment, associated equipment and aircraft comprising such equipment |
05/20/2014 | US8732811 Systems and methods for implementing security services |
05/20/2014 | US8732810 IP push platform and connection protocol in a push notification framework |
05/20/2014 | US8732809 System, server device, method, program, and recording medium that enable facilitation of user authentication |
05/20/2014 | US8732807 Method and system using a cyber ID to provide secure transactions |
05/20/2014 | US8732806 Method and system for hardware enforced virtualization in an integrated circuit |
05/20/2014 | US8732805 Re-authentication in secure web service conversations |
05/20/2014 | US8732789 Portable security policy and environment |
05/20/2014 | US8732483 Methods and apparatus for securing keystrokes from being intercepted between the keyboard and a browser |
05/20/2014 | US8732482 Incremental encryption of stored information |
05/20/2014 | US8732478 Uniform modular framework for a host computer system |
05/20/2014 | US8732477 Graphical image authentication and security system |
05/20/2014 | US8732476 Automatic intervention |
05/20/2014 | US8732471 Data communication method, computer and information storing medium |
05/20/2014 | US8732469 Communication cutoff device, server device and method |
05/20/2014 | US8732468 Protecting hardware circuit design by secret sharing |
05/20/2014 | US8732461 Client apparatus, server apparatus, and program using entity authentication and biometric authentication |
05/20/2014 | US8732455 Method and system for securing against leakage of source code |
05/20/2014 | US8732452 Secure message delivery using a trust broker |
05/20/2014 | US8732445 Information processing device, information processing method, information processing program, and integrated circuit |
05/20/2014 | US8732284 Data serialization in a user switching environment |
05/20/2014 | US8732122 Bonding contents on separate storage media |
05/20/2014 | US8732086 Method and system for managing rights for digital music |
05/20/2014 | US8731938 Computer-implemented system and method for identifying and masking special information within recorded speech |
05/20/2014 | US8731471 Communication system and method, information processing terminal and method, and information processing device and method |
05/20/2014 | US8731202 Storage-medium processing method, a storage-medium processing apparatus, and a storage-medium processing program |
05/20/2014 | US8731191 Data encryption method and system and data decryption method |
05/20/2014 | US8730009 Smart card and mobile communication device comprising the smart card |
05/20/2014 | US8730008 Authentication method |
05/20/2014 | US8729922 Licensing programmable hardware sub-designs using a host-identifier |
05/20/2014 | CA2813167C Enabling users to select between secure service providers using a central trusted service manager |
05/20/2014 | CA2682249C Methods and systems for internet security via virtual software |
05/20/2014 | CA2418050C Linking public key of device to information during manufacture |
05/20/2014 | CA2362786C Method and apparatus for information processing, and medium for storing program |
05/15/2014 | WO2014075056A2 Using temporary access codes |
05/15/2014 | WO2014074738A1 Personalized data management systems and methods |
05/15/2014 | WO2014074674A1 Methods for providing anti-rollback protection in a device which has no internal non-volatile memory |
05/15/2014 | WO2014074633A1 Single-pass data compression and encryption |
05/15/2014 | WO2014074355A1 Colcked charge domain logic |
05/15/2014 | WO2014074310A1 Protecting systems from unauthorized access to system resources using browser independent web page technology |
05/15/2014 | WO2014074239A2 Method and system for sharing vpn connections between applications |
05/15/2014 | WO2014074127A1 An improved implementation of robust and secure content protection in a system-on-a-chip apparatus |
05/15/2014 | WO2014074041A1 Methods and nodes for verification of data |
05/15/2014 | WO2014073617A1 Data communications system, data analysis device, data communications method, and program |
05/15/2014 | WO2014073499A1 Information management device, information management system, information management method, and recording medium |
05/15/2014 | WO2014073370A1 Information processing device, information processing method, and computer program |
05/15/2014 | WO2014073256A1 Information processing system and information processing method |
05/15/2014 | WO2014073214A1 Information processing system that analyzes personal information, and method for analyzing personal information |
05/15/2014 | WO2014073171A1 Public post approval request method, public post approval request system, and public post approval request server |
05/15/2014 | WO2014072579A1 Partially virtualizing pcr banks in mobile tpm |
05/15/2014 | WO2014072574A1 Method and apparatus for privacy-oriented code optimization |
05/15/2014 | WO2014072535A1 Method of identification |
05/15/2014 | WO2014072312A1 Method and system for executing applications in an untrusted environment |
05/15/2014 | WO2014072209A1 Compiler generating operator free code |
05/15/2014 | WO2014071705A1 Fingerprint connector and fingerprint authentication system |
05/15/2014 | WO2013184191A3 In-library lending activation |
05/15/2014 | US20140137273 System and method for securing the upload of files from a system server |
05/15/2014 | US20140137272 Limiting Information Leakage and Piracy due to Virtual Machine Cloning |
05/15/2014 | US20140137269 Requesting access to restricted objects by a remote computer |
05/15/2014 | US20140137268 Rights control method and apparatus for digital living network alliance |
05/15/2014 | US20140137266 Access system and method thereof |
05/15/2014 | US20140137265 System and Method For Securing Critical Data In A Remotely Accessible Database |
05/15/2014 | US20140137264 Method and apparatus for privacy-oriented code optimization |
05/15/2014 | US20140137263 Information processing apparatus with hibernation function, control method therefor, and storage medium storing control program therefor |
05/15/2014 | US20140137262 Secure data copying |
05/15/2014 | US20140137261 Methods and Apparatus for Software License Management |
05/15/2014 | US20140137260 Privacy Preserving Statistical Analysis for Distributed Databases |
05/15/2014 | US20140137259 Methods and apparatus for software license management |
05/15/2014 | US20140137257 System, Method and Apparatus for Assessing a Risk of One or More Assets Within an Operational Technology Infrastructure |
05/15/2014 | US20140137256 Security analysis using relational abstraction of data structures |
05/15/2014 | US20140137255 Method, System, and Apparatus for Detecting Malicious Code |
05/15/2014 | US20140137253 Security method and apparatus |
05/15/2014 | US20140137252 Method and system for unlocking and deleting file and folder |
05/15/2014 | US20140137251 System for identifying malicious code of high risk |
05/15/2014 | US20140137249 Dynamic Selection and Loading of Anti-Malware Signatures |
05/15/2014 | US20140137248 Client Token Storage for Cross-Site Request Forgery Protection |
05/15/2014 | US20140137247 Limiting Information Leakage and Piracy due to Virtual Machine Cloning |
05/15/2014 | US20140137246 Application-Level Anomaly Detection |
05/15/2014 | US20140137244 Runtime Based Application Security and Regulatory Compliance in Cloud Environment |
05/15/2014 | US20140137243 Automated security analytics platform with visualization agnostic selection linked portlets |
05/15/2014 | US20140137238 Method and system for tracing information leaks in organizations through syntactic and linguistic signatures |
05/15/2014 | US20140137237 Single system image via shell database |
05/15/2014 | US20140137235 Proximity Based Device Security |
05/15/2014 | US20140137234 Mobile device authentication through touch-based gestures |
05/15/2014 | US20140137233 Key with integral biometric input device |
05/15/2014 | US20140137231 INCORPORATING ACCESS CONTROL FUNCTIONALITY INTO A SYSTEM ON A CHIP (SoC) |
05/15/2014 | US20140137230 Provisioning proxy for provisioning data on hardware resources |
05/15/2014 | US20140137228 Web application vulnerability scanning |
05/15/2014 | US20140137223 Method and apparatus for authenticating users of a hybrid terminal |
05/15/2014 | US20140137220 Obtaining Password Data |
05/15/2014 | US20140137218 Managing security credentials for scaled-out services |
05/15/2014 | US20140137217 Verifying an individual using information from a social network |
05/15/2014 | US20140137216 Password mismatch warning method and apparatus |
05/15/2014 | US20140137209 Module for managing a transaction between a terminal and an electronic device |
05/15/2014 | US20140137203 Automatically generating challenge questions inferred from user history data for user authentication |
05/15/2014 | US20140137190 Methods and systems for passively detecting security levels in client devices |