Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
03/18/2014 | US8677508 Confidential information leakage prevention system, confidential information leakage prevention method and confidential information leakage prevention program |
03/18/2014 | US8677504 Method and apparatus for encrypting/decrypting multimedia content to allow random access |
03/18/2014 | US8677503 Mechanism for embedding device identification information into graphical user interface objects |
03/18/2014 | US8677501 Privilege violation detecting program |
03/18/2014 | US8677498 Apparatus and method of managing security data |
03/18/2014 | US8677495 Dynamic trap for detecting malicious applications in computing devices |
03/18/2014 | US8677492 Detection of hidden objects in a computer system |
03/18/2014 | US8677491 Malware detection |
03/18/2014 | US8677486 System and method for near-real time network attack detection, and system and method for unified detection via detection routing |
03/18/2014 | US8677482 Hardware security for software processes |
03/18/2014 | US8677480 Anomaly information distribution with threshold |
03/18/2014 | US8677477 Application program launching method and system for improving security of embedded Linux kernel |
03/18/2014 | US8677469 Firewall device |
03/18/2014 | US8677467 Method and apparatus in combination with a storage means for carrying out an authentication process for authenticating a subsequent transaction |
03/18/2014 | US8677466 Verification of digital certificates used for encrypted computer communications |
03/18/2014 | US8677457 Security for codes running in non-trusted domains in a processor core |
03/18/2014 | US8677455 Authentication method |
03/18/2014 | US8677454 Utilization of virtual machines by a community cloud |
03/18/2014 | US8677449 Exposing data to virtual machines |
03/18/2014 | US8677326 Detecting applications in a virtualization environment |
03/18/2014 | US8677248 Requesting computer user's context data |
03/18/2014 | US8677155 System for detecting intrusions by devices with openable casing |
03/18/2014 | US8677147 Method for accessing services by a user unit |
03/18/2014 | US8677144 Secure software and hardware association technique |
03/18/2014 | US8677140 Delivery point validation system |
03/18/2014 | US8677139 Method to provide authentication using a universal identifier |
03/18/2014 | US8677138 System and method of secure authentication information distribution |
03/18/2014 | US8677137 Communication device, communication method, information processing device, information processing method, program, and communication system |
03/18/2014 | US8677135 Digital signatures with error polynomials |
03/18/2014 | US8677129 Consumer-driven secure sockets layer modulator |
03/18/2014 | US8677122 Method for processing a secure system manager |
03/18/2014 | US8677119 Remote data viewer |
03/18/2014 | US8677110 Termination-log acquiring program, termination-log acquiring device, and termination-log acquiring method |
03/18/2014 | US8676844 Graph authorization |
03/18/2014 | US8676822 System and method for quality assured media file storage |
03/18/2014 | US8676714 Hardware specific product license validation |
03/18/2014 | US8676713 Dynamic constraints for content rights |
03/18/2014 | US8676712 Computer architecture for managing courseware in a shared use operating environment |
03/18/2014 | US8676710 Providing security in a cloud storage environment |
03/18/2014 | US8676694 Secure and efficient payment processing system |
03/18/2014 | US8676616 Transaction tracking, managing, assessment, and auditing data processing system and network |
03/18/2014 | US8675910 Monitoring usage of a computer by performing character recognition on screen capture images |
03/18/2014 | US8675878 Interoperable keychest for use by service providers |
03/18/2014 | US8675873 Method of making secure a link between a data terminal and a data processing local area network, and a data terminal for implementing the method |
03/18/2014 | CA2691666C System and method for simulating computer network attacks |
03/18/2014 | CA2593952C Method and apparatus for providing a border guard between security domains |
03/13/2014 | WO2014039811A1 Threat detection for return oriented programming |
03/13/2014 | WO2014039620A1 Snippet matching in file sharing networks |
03/13/2014 | WO2014039497A1 Security layer and methods for protecting tenant data in a cloud-mediated computing network |
03/13/2014 | WO2014039455A1 Systems and methods for detecting illegitimate applications |
03/13/2014 | WO2014039373A1 Securely handling server certificate errors in synchronization communication |
03/13/2014 | WO2014039363A1 Measuring platform components with a single trusted platform module |
03/13/2014 | WO2014038926A1 A system and method of mutual trusted authentication and identity encryption |
03/13/2014 | WO2014038925A1 User-centric online identity management |
03/13/2014 | WO2014038765A1 Method for controlling content and digital device using the same |
03/13/2014 | WO2014038430A1 Portable terminal, and method and program for controlling portable terminal |
03/13/2014 | WO2014038342A1 Device pairing method and device |
03/13/2014 | WO2014038227A1 System and electronic device |
03/13/2014 | WO2014038034A1 Information processing system, information processing method, and program |
03/13/2014 | WO2014037845A1 Method and apparatus for delivering encrypted content to web browsers based on entropy of the content |
03/13/2014 | WO2014037741A1 Method and system for verifying an access request |
03/13/2014 | WO2014037740A1 Method and system for verifying an access request |
03/13/2014 | WO2014037666A1 Device for authenticating a bottle and authentication method using said device |
03/13/2014 | WO2014037136A1 Method for personalizing a secure element (se) and computer system |
03/13/2014 | WO2014037037A1 Method and system for biometrical identification of a user |
03/13/2014 | WO2014036932A1 A user interface hijacking prevention device and method |
03/13/2014 | WO2014036888A1 Method, device, and system for processing virus-infected applications |
03/13/2014 | WO2014036801A1 Method for detecting phishing website without depending on sample |
03/13/2014 | WO2014036605A1 Technology adapted to enable devices for delivering data in a lockdown mode, methods for operating such devices, and reporting on activity at tablet devices that provide remote content |
03/13/2014 | WO2014012863A3 Method of automatically extracting features from a computer readable file |
03/13/2014 | WO2014011131A3 A method enabling verification of the user id by means of an interactive voice response system |
03/13/2014 | WO2014008079A3 Systems and methods for identity authentication using a social network |
03/13/2014 | WO2013186682A4 Biometric confirmation for bank card transaction |
03/13/2014 | WO2013165279A3 Multi factor user authentication |
03/13/2014 | US20140075584 Security apparatus and method |
03/13/2014 | US20140075583 Management of media items |
03/13/2014 | US20140075581 Secure mechanism to switch between different domains of operation in a data processor |
03/13/2014 | US20140075580 Address Exchange System and Methods |
03/13/2014 | US20140075579 Method to enable development mode of a secure electronic control unit |
03/13/2014 | US20140075578 Method for providing license corresponding to encrypted contents to client apparatus and digitial rights management conversion system using the method |
03/13/2014 | US20140075577 File security control system and method |
03/13/2014 | US20140075574 Api monitoring method and device therefor |
03/13/2014 | US20140075573 Privileged access to managed content |
03/13/2014 | US20140075572 Rfid system with segmented rfid data ownership |
03/13/2014 | US20140075570 Method, electronic device, and machine readable storage medium for protecting information security |
03/13/2014 | US20140075569 Display apparatus and display program |
03/13/2014 | US20140075568 Security Layer and Methods for Protecting Tenant Data in a Cloud-Mediated Computing Network |
03/13/2014 | US20140075567 Service Processor Configurations for Enhancing or Augmenting System Software of a Mobile Communications Device |
03/13/2014 | US20140075566 Computer-Implemented Method and Apparatus for Encoding Natural-Language Text Content And/Or Detecting Plagiarism |
03/13/2014 | US20140075562 Static security analysis using a hybrid representation of string values |
03/13/2014 | US20140075561 Static security analysis using a hybrid representation of string values |
03/13/2014 | US20140075560 Automatic classification of security vulnerabilities in computer software applications |
03/13/2014 | US20140075559 Method and device for processing virus-infected applications |
03/13/2014 | US20140075557 Streaming Method and System for Processing Network Metadata |
03/13/2014 | US20140075556 Threat Detection for Return Oriented Programming |
03/13/2014 | US20140075555 System and method for protecting computer systems from malware attacks |
03/13/2014 | US20140075554 Systems and methods for performing selective deep packet inspection |
03/13/2014 | US20140075553 Domain name system rebinding attack protection |
03/13/2014 | US20140075552 Authentication using multi-tier multi-class objects |
03/13/2014 | US20140075551 Method and apparatus to manage user account of device |