Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
04/15/2014 | US8700897 Method and terminal equipment for applying digital rights management |
04/15/2014 | US8700892 Proxy SSL authentication in split SSL for client-side proxy agent resources with content insertion |
04/15/2014 | US8700848 Data exchange between protected memory cards |
04/15/2014 | US8700587 Security method and system for storage subsystem |
04/15/2014 | US8700535 Issuing a publisher use license off-line in a digital rights management (DRM) system |
04/15/2014 | US8700534 System and method for relicensing content |
04/15/2014 | US8700533 Authenticating licenses for legally-protectable content based on license profiles and content identifiers |
04/15/2014 | US8700532 Information sharing system, computer, project managing server, and information sharing method used in them |
04/15/2014 | US8700485 User authentication in an auction system |
04/15/2014 | US8699706 Method for generating rights object and device to perform the method, method for transmitting rights object and device to perform the method, and method for receiving rights object and device to perform the method |
04/15/2014 | US8699702 Securing cryptographic process keys using internal structures |
04/15/2014 | US8699701 Method of performing XZ-elliptic curve cryptography for use with network security protocols |
04/15/2014 | US8699052 Image forming apparatus, control method, and program |
04/15/2014 | US8696765 System and method for preventing access to data on a compromised remote device |
04/15/2014 | CA2688592C Substitution table masking for cryptographic processes |
04/15/2014 | CA2561604C Account management in a system and method for providing code signing services |
04/10/2014 | WO2014055792A1 Real identity authentication |
04/10/2014 | WO2014055735A2 System and method for assembling and analyzing a candidate application for a credential |
04/10/2014 | WO2014055572A1 Biometric voice command and control switching device and method of use |
04/10/2014 | WO2014055540A1 Binding microprocessor to memory chips to prevent re-use of microprocessor |
04/10/2014 | WO2014055526A1 Memory bus protocol to enable clustering between nodes of distinct physical domain address spaces |
04/10/2014 | WO2014055512A1 Remote-key based memory buffer access control mechanism |
04/10/2014 | WO2014055495A1 Private third party validation of hardware identification for offer enrollment |
04/10/2014 | WO2014055354A1 Protecting users from undesirable content |
04/10/2014 | WO2014055337A1 Server with mechanism for reducing internal resources associated with a selected client connection |
04/10/2014 | WO2014055313A1 Limiting the functionality of a software program based on a security model |
04/10/2014 | WO2014055261A1 Internal component adhesive securing systems for portable computing devices |
04/10/2014 | WO2014055246A1 Using trusted devices to augment location-based account protection |
04/10/2014 | WO2014055241A2 Secure identification of computing device and secure identification methods |
04/10/2014 | WO2014055148A2 Cryptography and key management device and architecture |
04/10/2014 | WO2014055136A1 Parallelized counter tree walk for low overhead memory replay protection |
04/10/2014 | WO2014054854A1 Log analysis system and log analyis method for security system |
04/10/2014 | WO2014054122A1 Information processing device, function expansion unit, and information processing system |
04/10/2014 | WO2014053806A1 A secure mechanism to switch between different domains of operation in a data processor |
04/10/2014 | WO2014053804A1 Exception handling in a data processing apparatus having a secure domain and a less secure domain |
04/10/2014 | WO2014053803A1 A data processing apparatus and method for protecting secure data and program code from non-secure access when switching between secure and less secure domains |
04/10/2014 | WO2014053802A1 Data processing apparatus and method using secure domain and less secure domain |
04/10/2014 | WO2014053697A1 Method and apparatus for providing privacy policy for data stream |
04/10/2014 | WO2014053486A1 Systeme de gestion de donnees de sante et procede d'acces auxdites donnees de sante |
04/10/2014 | WO2014053379A1 Reception system and method for operating a reception system |
04/10/2014 | WO2014053054A1 Communication between a machine and remote server via intermediary mobile device |
04/10/2014 | WO2014053010A1 System and method for medical device identifier |
04/10/2014 | WO2014025307A3 Apparatus and method for protection of stored data |
04/10/2014 | WO2013189354A3 Decryption method and apparatus |
04/10/2014 | WO2013036659A3 Methods and apparatus for demographics information collection |
04/10/2014 | WO2013030836A8 Method and system for authorizing an action at a site |
04/10/2014 | WO2012058429A3 Methods and apparatus for delivering electronic identification components over a wireless network |
04/10/2014 | WO2011144488A3 Security token for securely executing an application on a host computer |
04/10/2014 | US20140101784 Analysis and specification creation for web documents |
04/10/2014 | US20140101783 Execution Environment File Inventory |
04/10/2014 | US20140101782 Digital video guard |
04/10/2014 | US20140101781 Peer-to-peer, real-time, digital media distribution |
04/10/2014 | US20140101779 Software Distribution Service Federation |
04/10/2014 | US20140101778 Method, a system and an apparatus for delivering media layers |
04/10/2014 | US20140101777 Apparatus and method for protecting data in terminal |
04/10/2014 | US20140101776 Digital Asset Distribution Media |
04/10/2014 | US20140101774 Transaction gateway |
04/10/2014 | US20140101773 System, a method and a computer readable medium for transmitting an electronic file |
04/10/2014 | US20140101772 Input method, input apparatus, and input program |
04/10/2014 | US20140101771 Field device having tamper attempt reporting |
04/10/2014 | US20140101770 Systems and Methods for Security Detection |
04/10/2014 | US20140101769 Remediation of security vulnerabilities in computer software |
04/10/2014 | US20140101768 Limiting the Functionality of a Software Program Based on a Security Model |
04/10/2014 | US20140101766 Data management of potentially malicious content |
04/10/2014 | US20140101765 Auditing a device |
04/10/2014 | US20140101764 Methods and apparatus to detect risks using application layer protocol headers |
04/10/2014 | US20140101763 Systems and methods for capturing or replaying time-series data |
04/10/2014 | US20140101762 Systems and methods for capturing or analyzing time-series data |
04/10/2014 | US20140101757 Adaptive integrity validation for portable information handling systems |
04/10/2014 | US20140101756 Remediation of security vulnerabilities in computer software |
04/10/2014 | US20140101755 Mobile wireless communications device providing security features based upon wearable near field communication (nfc) device and related methods |
04/10/2014 | US20140101754 Methods and systems for allocating a usb device to a trusted virtual machine or a non-trusted virtual machine |
04/10/2014 | US20140101753 Risk Adaptive Information Flow Based Access Control |
04/10/2014 | US20140101752 Secure gesture |
04/10/2014 | US20140101748 Adaptive System Behavior Change on Malware Trigger |
04/10/2014 | US20140101744 Dynamic interactive identity authentication method and system |
04/10/2014 | US20140101743 Method for authenticating a user to a service of a service provider |
04/10/2014 | US20140101742 Method, Client and Server of Password Verification, and Password Terminal System |
04/10/2014 | US20140101740 Methods, Systems, and Products for Authentication of Users |
04/10/2014 | US20140101736 Authenticating Credentials For Mobile Platforms |
04/10/2014 | US20140101735 System and method for assembling and analyzing a candidate application for a credential |
04/10/2014 | US20140101733 System and method for secure user authentication with a single action |
04/10/2014 | US20140101732 Communication with a Voice-Based Account Management System |
04/10/2014 | US20140101731 Secure identification of computing device and secure identification methods |
04/10/2014 | US20140101730 System and method for verifying the age of an internet user |
04/10/2014 | US20140101725 Communication system, client apparatus, relay apparatus, and computer-readable medium |
04/10/2014 | US20140101724 Network attack detection and prevention based on emulation of server response and virtual server cloning |
04/10/2014 | US20140101723 Extensible configuration system to allow a website to authenticate users based on an authorization protocol |
04/10/2014 | US20140101720 Configuring initial settings of a network security device via a hand-held computing device |
04/10/2014 | US20140101719 Systems and methods for providing a network storage system |
04/10/2014 | US20140101715 Privacy aware authenticated map-reduce |
04/10/2014 | US20140101714 Privacy aware authenticated map-reduce |
04/10/2014 | US20140101713 Data mapping using trust services |
04/10/2014 | US20140101466 Information processing device and method, record medium and program |
04/10/2014 | US20140101460 Architecture and instruction set for implementing advanced encryption standard (aes) |
04/10/2014 | US20140101457 Method and system for providing document retention using cryptography |
04/10/2014 | US20140101454 Secure credential unlock using trusted execution environments |
04/10/2014 | US20140101443 Method and apparatus for selectively providing protection of screen information data |
04/10/2014 | US20140101439 Systems and methods for authentication between networked devices |
04/10/2014 | US20140101438 Structure preserving database encryption method and system |