Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
03/25/2014 | US8683219 Method and apparatus for checking the integrity of data stored in a predetermined memory area of a memory |
03/25/2014 | US8683218 System and method for N-dimensional encryption |
03/25/2014 | US8683214 Method and device that verifies application program modules |
03/25/2014 | US8683213 Progressive boot for a wireless device |
03/25/2014 | US8683211 Method of projecting a secure USB key |
03/25/2014 | US8683210 Non-networked RFID-PUF authentication |
03/25/2014 | US8683209 Method and apparatus for pseudonym generation and authentication |
03/25/2014 | US8683208 Information processing device, program developing device, program verifying method, and program product |
03/25/2014 | US8683203 Subsystem authenticity and integrity verification (SAIV) |
03/25/2014 | US8683201 Third-party-secured zones on web pages |
03/25/2014 | US8683199 System, method and program for protecting information on computer screen |
03/25/2014 | US8683198 Master key trust grants and revocations for minor keys |
03/25/2014 | US8683196 Token renewal |
03/25/2014 | US8683189 On-chip security method and apparatus |
03/25/2014 | US8683168 Memory card including a computing device for obtaining a physical address corresponding to a logical address and computer system including the memory card |
03/25/2014 | US8683004 Apparatus for controlling a machine |
03/25/2014 | US8682826 News topic-interest-based recommendations twiddling |
03/25/2014 | US8682801 Method and arrangement for provision of security relevant services via a security module of a franking machine |
03/25/2014 | US8682800 Controlling access to technology based upon authorization |
03/25/2014 | US8682797 Methods and systems for distributing digitally encoded information |
03/25/2014 | US8682796 Digital resource acquisition |
03/25/2014 | US8682785 Bank card authorization with balance indicator |
03/25/2014 | US8682193 Image forming apparatus and authentication method |
03/25/2014 | US8681994 Systems and methods for document control using public key encryption |
03/25/2014 | US8681991 System and method for providing user media |
03/25/2014 | US8681972 Method of executing a cryptographic calculation |
03/25/2014 | US8680995 Access control system based upon behavioral patterns |
03/25/2014 | US8680968 Biometric access control protection |
03/25/2014 | US8678278 Removable-medium apparatus and control method thereof |
03/25/2014 | CA2562358C Method and system for distinguishing relevant network security threats using comparison of refined intrusion detection audits and intelligent security analysis |
03/25/2014 | CA2561906C System, method and program for user authentication, and recording medium on which the program is recorded |
03/25/2014 | CA2467353C Key management protocol and authentication system for secure internet protocol rights management architecture |
03/20/2014 | WO2014043497A1 Methods and systems for evaluating software for known vulnerabilities |
03/20/2014 | WO2014043471A1 System, method and apparatus for securely saving/retrieving data on a data storage |
03/20/2014 | WO2014043307A1 System and method for providing gesture-based user identification |
03/20/2014 | WO2014043228A1 Domain name system rebinding attack protection |
03/20/2014 | WO2014043152A1 Selective content disclosure in an ad-hoc network based on social cohesion |
03/20/2014 | WO2014043081A1 Hardware-enforced access protection |
03/20/2014 | WO2014043056A1 Mobile platform with sensor data security |
03/20/2014 | WO2014042908A2 Rule-based derived-group security data management |
03/20/2014 | WO2014042687A1 A global identification number and portal platform technology |
03/20/2014 | WO2014042512A1 Management of storage encryption over network-based elastic block store volume |
03/20/2014 | WO2014042476A1 File management method using fingerprint, user terminal and recording medium |
03/20/2014 | WO2014042344A1 Apparatus and method for detecting malicious shellcode by using debug event |
03/20/2014 | WO2014042269A1 Vpn connection authentication system, user terminal, authentication server, biometric-authentication result evidence-information validation server, vpn connection server, and program |
03/20/2014 | WO2014041561A2 A system for analyzing applications accurately for finding security and quality issues |
03/20/2014 | WO2014041396A1 Electronic device and method for protecting an electronic device against unauthorized use |
03/20/2014 | WO2014041066A1 Method and system to perform secure boolean search over encrypted documents |
03/20/2014 | WO2014040724A1 Content management for mobile station with runtime environment |
03/20/2014 | WO2014040522A1 System and method for sharing login status between an application platform and an application |
03/20/2014 | WO2014040278A1 Method, circuit and device for encrypting integrated circuit of single chip microcomputer |
03/20/2014 | WO2014040124A1 Voice authentication system and method |
03/20/2014 | WO2014013252A3 Pin verification |
03/20/2014 | WO2014001803A3 Memory protection |
03/20/2014 | WO2014001037A3 STORING OPERATIONAL DATA OF AN INDUSTRIAL CONTROL SYSTEM Storing operational data of an industrial control syste |
03/20/2014 | WO2013188039A3 User interface for combined biometric mobile device |
03/20/2014 | WO2013182103A3 Encryption and decryption terminal and encryption and decryption method applied to same |
03/20/2014 | WO2013175080A3 Method of managing digital images |
03/20/2014 | WO2013126437A3 Apparatus for remote application of manual signatures to electronic documents |
03/20/2014 | WO2011034813A3 System and method for determining true computer file type identity |
03/20/2014 | US20140082756 Secure pin entry device |
03/20/2014 | US20140082755 Detection and handling of aggregated online content using decision criteria to compare similar or identical content items |
03/20/2014 | US20140082754 Electronic device and method for disabling application and hardware |
03/20/2014 | US20140082753 Systems and methods for data privacy and destruction in multi-system landscapes |
03/20/2014 | US20140082752 Read-Once Data Sets and Access Method |
03/20/2014 | US20140082751 Protecting iat/eat hooks from rootkit attacks using new cpu assists |
03/20/2014 | US20140082749 Systems and methods for secure and persistent retention of sensitive information |
03/20/2014 | US20140082748 User information management apparatus and user information management method |
03/20/2014 | US20140082747 Information processing system, operating device, and program |
03/20/2014 | US20140082746 Extensible protocol for low memory agent |
03/20/2014 | US20140082745 Content-driven screen polarization with application sessions |
03/20/2014 | US20140082744 Automatic sharing of user interactions |
03/20/2014 | US20140082743 Privacy of location information |
03/20/2014 | US20140082741 Data protection systems and methods |
03/20/2014 | US20140082740 Computing system with privacy mechanism and method of operation thereof |
03/20/2014 | US20140082738 Dynamic risk management |
03/20/2014 | US20140082736 Certifying server side web applications against security vulnerabilities |
03/20/2014 | US20140082735 Mining attack vectors for black-box security testing |
03/20/2014 | US20140082734 Certifying server side web applications against security vulnerabilities |
03/20/2014 | US20140082733 Methods and systems for evaluating software for known vulnerabilities |
03/20/2014 | US20140082732 System and Method for Bidirectional Trust Between Downloaded Applications and Mobile Devices Including a Secure Charger and Malware Scanner |
03/20/2014 | US20140082731 Contextual Alert of an Invasion of a Computer System |
03/20/2014 | US20140082729 System and method for analyzing repackaged application through risk calculation |
03/20/2014 | US20140082727 Electronic devcie and method for monitoring application |
03/20/2014 | US20140082726 Real-time classification of email message traffic |
03/20/2014 | US20140082724 Methods and apparatus to protect memory regions during low-power states |
03/20/2014 | US20140082722 Computer Recovery or Return |
03/20/2014 | US20140082721 Secured computing system with asynchronous authentication |
03/20/2014 | US20140082720 Method and System for Authentication of Device Using Hardware DNA |
03/20/2014 | US20140082717 System and Method for Providing Secure Access to a Remote File |
03/20/2014 | US20140082714 Method and system of providing access point data associated with a network access point |
03/20/2014 | US20140082701 Dynamically configurable online data update system |
03/20/2014 | US20140082696 Distance bounding protocol with minimal variance processing |
03/20/2014 | US20140082694 Antibot mechanisms optimized for mobile computing |
03/20/2014 | US20140082693 Updating security bindings in a network device |
03/20/2014 | US20140082692 Stateful Reference Monitor |
03/20/2014 | US20140082690 Mobile computing system for providing high-security execution environment |
03/20/2014 | US20140082689 Creation of security roles through user walkthrough of business process workflow |
03/20/2014 | US20140082688 Rule-based derived-group security data management |
03/20/2014 | US20140082388 Firmware agent |