Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
05/08/2014 | WO2014069998A1 Method and system for protected exchange of data |
05/08/2014 | WO2014069787A1 Security through metadata orchestrators |
05/08/2014 | WO2014069777A1 Transit control for data |
05/08/2014 | WO2014069226A1 Transaction device, transaction method and transaction system |
05/08/2014 | WO2014068968A1 Information processing device |
05/08/2014 | WO2014068862A1 Information processing apparatus, information processing system, information processing method and computer program |
05/08/2014 | WO2014068792A1 Access control method and access control system |
05/08/2014 | WO2014068632A1 Facility management device, facility management system and program |
05/08/2014 | WO2014068618A1 Storage system and license management method |
05/08/2014 | WO2014068576A1 Hierarchical code locking system |
05/08/2014 | WO2014068362A1 Method and system for secure computer file management and storage having high level of usability |
05/08/2014 | WO2014068336A1 Content protection |
05/08/2014 | WO2014068305A1 Device and method for secure memory access |
05/08/2014 | WO2014068173A1 Method and apparatus for providing attribution to the creators of the components in a compound media |
05/08/2014 | WO2014068051A1 Method for the protected deposit of event protocol data of a computer system, computer programme product and computer system |
05/08/2014 | WO2014068049A1 Method for the protected recovery of data, computer programme product and computer system |
05/08/2014 | WO2014067945A1 Method and system for verifying the security of an application with a view to its use on a user apparatus |
05/08/2014 | WO2014067760A1 Device for processing multimedia contents implementing a plurality of virtual machines |
05/08/2014 | WO2014067428A1 Full life-cycle management method for sensitive data file based on fingerprint information implantation |
05/08/2014 | WO2014067410A1 Method for rapidly generating coordinate point in embedded system |
05/08/2014 | WO2014067102A1 Information coding method, system and computer-readable medium |
05/08/2014 | WO2014066986A1 Data distribution methods and systems |
05/08/2014 | WO2014066924A1 Content management system |
05/08/2014 | WO2014041561A3 A system for analyzing applications in order to find security and quality issues |
05/08/2014 | WO2014028226A3 System and method for software allocation based on forecasts and calendars |
05/08/2014 | WO2014012106A3 Retroactively detecting malicious or undesirable software |
05/08/2014 | WO2013188599A4 Securely communicating between a card reader and a mobile device |
05/08/2014 | US20140130189 Transition between states in a processor |
05/08/2014 | US20140130188 Techniques For Secure Storage Hijacking Protection |
05/08/2014 | US20140130187 Protecting Systems from Unauthorized Access to System Resources Using Browser Independent Web Page Technology |
05/08/2014 | US20140130186 Methods and systems for increasing the security of electronic messages |
05/08/2014 | US20140130185 Methods And Systems For Processing Content Rights |
05/08/2014 | US20140130184 System and Method for Providing Access to Verified Personal Background Data |
05/08/2014 | US20140130183 Managing Confidential Information |
05/08/2014 | US20140130182 Controlled Grant Of Access To Media Content |
05/08/2014 | US20140130181 Drm system |
05/08/2014 | US20140130180 Control of access to files |
05/08/2014 | US20140130179 System and method for providing a multimedia degital rights transfer follow me service |
05/08/2014 | US20140130178 Automated Determination of Quasi-Identifiers Using Program Analysis |
05/08/2014 | US20140130177 System and method for creating a certified electronic record |
05/08/2014 | US20140130176 Automatic software audit system and associated method |
05/08/2014 | US20140130175 Data Leakage Detection in a Multi-Tenant Data Architecture |
05/08/2014 | US20140130174 Application and Data Removal System |
05/08/2014 | US20140130173 Expression rewriting for secure computation optimization |
05/08/2014 | US20140130172 Systems and methods for automating blind detection of computational vulnerabilities |
05/08/2014 | US20140130171 Method and system of processing application security |
05/08/2014 | US20140130170 Information security audit method, system and computer readable storage medium for storing thereof |
05/08/2014 | US20140130169 Identification of malicious activities through non-logged-in host usage |
05/08/2014 | US20140130168 Antivirus system and method for removable media devices |
05/08/2014 | US20140130161 System and Method for Cloud-Based Detection of Computer Malware |
05/08/2014 | US20140130159 Methods and systems for detecting an electronic intrusion |
05/08/2014 | US20140130158 Identification of malware detection signature candidate code |
05/08/2014 | US20140130157 Method and system for discrete stateful behavioral analysis |
05/08/2014 | US20140130156 Refinement-based security analysis |
05/08/2014 | US20140130154 Sound and effective data-flow analysis in the presence of aliasing |
05/08/2014 | US20140130152 Defense against dns dos attack |
05/08/2014 | US20140130151 Methods for providing anti-rollback protection of a firmware version in a device which has no internal non-volatile memory |
05/08/2014 | US20140130150 Content-based isolation for computing device security |
05/08/2014 | US20140130149 Refinement-based security analysis |
05/08/2014 | US20140130148 Information processing device, information processing method, and computer program |
05/08/2014 | US20140130147 Enabling access to a subset of data |
05/08/2014 | US20140130145 User device adding secure token to network requests |
05/08/2014 | US20140130143 Mobile terminal and control method thereof |
05/08/2014 | US20140130142 Method and Cloud Security Framework for Implementing Tenant License Verification |
05/08/2014 | US20140130135 Integrated collaboration environment |
05/08/2014 | US20140130134 Managing and Providing Access to Applications in an Application-Store Module |
05/08/2014 | US20140130127 Risk Adjusted, Multifactor Authentication |
05/08/2014 | US20140130123 Method for operating invisible system services on android platform |
05/08/2014 | US20140130121 System and Method for Information Risk Management |
05/08/2014 | US20140130060 User-level re-initialization instruction interception |
05/08/2014 | US20140129954 Tailored System Management Interface |
05/08/2014 | US20140129953 Apparatus and method for single action control of social network profile access |
05/08/2014 | US20140129849 Semiconductor device including encryption section, semiconductor device including external interface, and content reproduction method |
05/08/2014 | US20140129848 Method and Apparatus for Writing and Reading Hard Disk Data |
05/08/2014 | US20140129847 Trusted Storage |
05/08/2014 | US20140129846 Method and System for Protecting a Driver |
05/08/2014 | US20140129845 Attribute based encryption using lattices |
05/08/2014 | US20140129844 Storage security using cryptographic splitting |
05/08/2014 | US20140129843 Methods and Apparatus for Managing Service Access Using a Touch-Display Device Integrated with Fingerprint Imager |
05/08/2014 | US20140129842 Unauthorized contents detection system |
05/08/2014 | US20140129836 Information distribution system and program for the same |
05/08/2014 | US20140129832 Transparent real-time access to encrypted non-relational data |
05/08/2014 | US20140129831 Computer-Implemented System And Method For Individual Message Encryption Using A Unique Key |
05/08/2014 | US20140129817 Device booting with an initial protection component |
05/08/2014 | US20140129656 Internet content marking |
05/08/2014 | US20140129646 Method and apparatus for performing security control by using captured image |
05/08/2014 | US20140129341 Customizable application functionality activity |
05/08/2014 | US20140129282 Automatic License Entitlement Calculation |
05/08/2014 | US20140125455 Systems and algorithms for classification of user based on their personal features |
05/08/2014 | DE102012220268A1 Mobilgerät zum Konfigurieren eines anderen Gerätes, Verfahren zum Konfigurieren eines anderen Gerätes und entsprechende Anordnung mit mindestens einer Nahbereich-Kommunikationsverbindung Mobile device to configure another device, method for configuring another device and corresponding arrangement with at least one short-range communication link |
05/08/2014 | DE102012110510A1 Verfahren zum geschützten Hinterlegen von Ereignisprotokoll-Daten eines Computersystems, Computerprogrammprodukt sowie Computersystem A method for protected Leave event log data of a computer system, computer program product and computer system |
05/08/2014 | DE102012110507A1 Verfahren zum geschützten Wiederherstellen von Daten, Computerprogrammprodukt sowie Computersystem A method for recovering data protected, computer program product and computer system |
05/08/2014 | DE102012023965A1 Verfahren und Vorrichtung zum Ausführen der Sicherheitssteuerung durch verwenden eines erfassten Bilds Method and apparatus for performing the safety controller by use of a captured image |
05/07/2014 | EP2728919A1 Digital communication device and anti-theft method thereof |
05/07/2014 | EP2728891A2 Systems and methods for distributed authentication of video services |
05/07/2014 | EP2728825A1 Terminal apparatus with DRM decoding function and DRM decoding method in terminal apparatus |
05/07/2014 | EP2728509A2 Semiconductor Device and Encryption Key Writing Method |
05/07/2014 | EP2728508A1 Dynamic data masking |
05/07/2014 | EP2728507A1 Method and system for enabling and disabling execution of computer instructions |
05/07/2014 | EP2728506A1 Apparatus & method for facilitating container-based management |