Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
02/20/2014 | WO2014028304A1 Secure behavior analysis over trusted execution environment |
02/20/2014 | WO2014028273A2 System and method for secure synchronization of data across multiple computing devices |
02/20/2014 | WO2014028194A1 Securely generating and storing passwords in a computer system |
02/20/2014 | WO2014027870A1 Work management method |
02/20/2014 | WO2014027782A1 System for providing captcha based on drawing mode image, and method for providing captcha |
02/20/2014 | WO2014027242A1 Systems and methods for mitigating the unauthorized use of a device |
02/20/2014 | WO2014027195A1 Display device |
02/20/2014 | WO2014026607A1 Api monitoring method and device therefor |
02/20/2014 | WO2014026563A1 Method and device for securing information interaction process |
02/20/2014 | WO2014026462A1 Digital rights management method |
02/20/2014 | WO2014002041A3 Privacy control in a social network |
02/20/2014 | WO2013156847A3 Secure zone for secure purchases |
02/20/2014 | US20140053286 Dynamically reconfigurable 2d topology communication and verification scheme |
02/20/2014 | US20140053285 Methods for detecting plagiarism in software code and devices thereof |
02/20/2014 | US20140053284 Data transmission device and method for aggregating media content from a content provider |
02/20/2014 | US20140053283 System, Method, and Device for Communicating and Storing and Delivering Data |
02/20/2014 | US20140053282 System and method of integrating modules for execution on a computing device and controlling during runtime an ability of a first module to access a service provided by a second module |
02/20/2014 | US20140053281 Configuration of a new enrollee device for use in a communication network |
02/20/2014 | US20140053279 Authentication method for authenticating a first party to a second party |
02/20/2014 | US20140053278 Data and key separation using a secure central processing unit |
02/20/2014 | US20140053277 Method and apparatus for provisioning subscription products |
02/20/2014 | US20140053276 Safe data storage method and device |
02/20/2014 | US20140053275 System and Method for Secure File Transmission |
02/20/2014 | US20140053274 System and method for replacing software components with corresponding known-good software components without regard to whether the software components have been compromised or potentially compromised |
02/20/2014 | US20140053273 System and method for limiting exploitable or potentially exploitable sub-components in software components |
02/20/2014 | US20140053272 Multilevel Introspection of Nested Virtual Machines |
02/20/2014 | US20140053270 Detecting malicious computer code in an executing program module |
02/20/2014 | US20140053269 Attack resistant continuous network service trustworthiness controller |
02/20/2014 | US20140053268 Method of detecting potential phishing by analyzing universal resource locators |
02/20/2014 | US20140053267 Method for identifying malicious executables |
02/20/2014 | US20140053266 Method and server for discriminating malicious attribute of program |
02/20/2014 | US20140053261 On-Line Behavioral Analysis Engine in Mobile Device with Multiple Analyzer Model Providers |
02/20/2014 | US20140053260 Adaptive Observation of Behavioral Features on a Mobile Device |
02/20/2014 | US20140053259 Security Central Processing Unit Monitoring of On-Chip Conditions |
02/20/2014 | US20140053258 Handheld device and method for unlocking the handheld device |
02/20/2014 | US20140053256 User authentication device having multiple isolated host interfaces |
02/20/2014 | US20140053253 Method of obtaining a network address |
02/20/2014 | US20140053247 Controlling Access to Resources Based on Affinity Planes and Sectors |
02/20/2014 | US20140053244 Anonymization as a service |
02/20/2014 | US20140053242 Management of private information |
02/20/2014 | US20140053236 Threshold reporting platform apparatuses, methods and systems |
02/20/2014 | US20140053235 Method, system, and computer program product for facilitating communication in an interoperability network |
02/20/2014 | US20140053232 Automated redaction of documents based on security-level determination |
02/20/2014 | US20140053231 Streamlined security-level determination of an electronic document and selective release into an information system |
02/20/2014 | US20140053230 Multi-security-cpu system |
02/20/2014 | US20140053229 Systems and Methods for Policy Propagation and Enforcement |
02/20/2014 | US20140053228 System and methods for automatically disseminating content based on contexual information |
02/20/2014 | US20140053227 System and Method for Secure Synchronization of Data Across Multiple Computing Devices |
02/20/2014 | US20140053226 Self-adaptive and proactive virtual machine images adjustment to environmental security risks in a cloud environment |
02/20/2014 | US20140053002 System and method for encrypting secondary copies of data |
02/20/2014 | US20140053000 Instructions to perform jh cryptographic hashing |
02/20/2014 | US20140052999 Searchable Encrypted Data |
02/20/2014 | US20140052998 Security model for actor-based languages and apparatus, methods, and computer programming products using same |
02/20/2014 | US20140052997 Security model for actor-based languages and apparatus, methods, and computer programming products using same |
02/20/2014 | US20140052996 Extending the number of applications for accessing protected content in a media using media key blocks |
02/20/2014 | US20140052995 Dynamic token seed key injection and deformation method |
02/20/2014 | US20140052976 Wireless router remote firmware upgrade |
02/20/2014 | US20140052975 Protecting secure software in a multi-security-cpu system |
02/20/2014 | US20140052610 System and method for software allocation based on forecasts and calendars |
02/20/2014 | US20140051397 Apparatus and Method of Securing Private Content Stored in a Memory |
02/20/2014 | US20140049359 Security device and integrated circuit including the same |
02/20/2014 | DE102013213153A1 Bildübermittlungsvorrichtung, Bildübermittlungsverfahren, Bildübermittlungsprogramm, Bilderkennungs- und authentifizierungssystem und Bildempfangsvorrichtung Image transmission apparatus, image transmission method, image transmission program, image recognition and authentication system and image receiving device |
02/19/2014 | EP2699017A1 Security processing unit with secure connection to head end |
02/19/2014 | EP2698746A2 Method and system for secure configuration of an electronic device via an RFID IC |
02/19/2014 | EP2698739A1 Method for dynamic management of codes associated with security countermeasures, corresponding computer program product and device |
02/19/2014 | EP2698738A2 User authentication device having multiple isolated host interfaces |
02/19/2014 | EP2698736A2 A multi-security-CPU system |
02/19/2014 | EP2698735A2 Speculative Pre-Authorization of Encrypted Data Streams |
02/19/2014 | EP2698717A1 Integrated circuit |
02/19/2014 | EP2698695A2 Application menu user interface |
02/19/2014 | EP2697992A2 Method and apparatus for providing machine-to-machine service |
02/19/2014 | EP2697949A1 Method and apparatus for providing secret delegation |
02/19/2014 | EP2697933A2 Method and apparatus for providing machine-to-machine service |
02/19/2014 | EP2697929A2 Information security systems and methods |
02/19/2014 | EP2697916A2 Machine-to-machine node erase procedure |
02/19/2014 | EP2697786A1 Method and apparatus for identity based ticketing |
02/19/2014 | EP2697733A2 Methods for providing cross-vendor support services |
02/19/2014 | EP2697731A2 Method and system to generate and manage native applications |
02/19/2014 | CN203444486U Movable case protecting cabinet |
02/19/2014 | CN203444485U Anti-theft computer with folding feet |
02/19/2014 | CN203444484U USB data transmission device |
02/19/2014 | CN203444483U Automatic safety identification device |
02/19/2014 | CN203444482U Safe memorizer of portable computer |
02/19/2014 | CN103597775A Medical information authentication system |
02/19/2014 | CN103597691A Setting method, device authentication method, device authentication system, and controller |
02/19/2014 | CN103597520A Method and apparatus for identity-based ticketing |
02/19/2014 | CN103597496A Method and apparatus for authenticating a non-volatile memory device |
02/19/2014 | CN103597495A Information processing device, information processing method, program, and integrated circuit |
02/19/2014 | CN103597494A Method and device for managing digital usage rights of documents |
02/19/2014 | CN103597493A Secure boot with trusted computing group platform registers |
02/19/2014 | CN103597492A Improved security function-based cloud service system and method for supporting same |
02/19/2014 | CN103597491A Secured repair data package |
02/19/2014 | CN103597490A Protection of applets against hidden-channel analyses |
02/19/2014 | CN103597489A Data custodian and curation system |
02/19/2014 | CN103597488A Information security systems and methods |
02/19/2014 | CN103597474A Efficient indexing and searching of access control listed documents |
02/19/2014 | CN103597423A Mobile device operations with battery optimization |
02/19/2014 | CN103596163A Account management method of mobile phone application software |
02/19/2014 | CN103596123A Method executed by M2ME |
02/19/2014 | CN103595853A Mobile phone information leakage prevention system based on encryption security control |