Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
02/11/2014 | US8650616 User definable policy for graduated authentication based on the partial orderings of principals |
02/11/2014 | US8650614 Interactive phishing detection (IPD) |
02/11/2014 | US8650612 Security context lockdown |
02/11/2014 | US8650611 Image forming apparatus and method of setting security policy thereof |
02/11/2014 | US8650569 User-level re-initialization instruction interception |
02/11/2014 | US8650558 Online marketplace for pre-installed software and online services |
02/11/2014 | US8650481 Stable and secure use of content scripts in browser extensions |
02/11/2014 | US8650409 FPGA configuration data scrambling using input multiplexers |
02/11/2014 | US8650407 Applicant screening |
02/11/2014 | US8650405 Authentication using dynamic, client information based PIN |
02/11/2014 | US8650398 Device authentication using restricted memory |
02/11/2014 | US8650394 Certifying the identity of a network device |
02/11/2014 | US8650275 Requester-side distributed ID management device, provider-side distributed ID management device, distributed ID management system, and provider-side distributed ID management method |
02/11/2014 | US8650128 Rights management system and methods |
02/11/2014 | US8650125 Content distribution system and method |
02/11/2014 | US8650103 Verification of a person identifier received online |
02/11/2014 | US8649516 Digital video protection for authenticity verification |
02/11/2014 | US8649512 Duo codes for product authentication |
02/11/2014 | US8649510 Device having coded output of operational data |
02/11/2014 | CA2640198C Application associating based on cryptographic identification |
02/11/2014 | CA2568155C Method and apparatus for playing back content based on digital rights management between portable storage and device, and portable storage for the same |
02/11/2014 | CA2476340C Moving principals across security boundaries without service interruption |
02/11/2014 | CA2474122C Information recording apparatus and method, and information reproduction apparatus and method |
02/09/2014 | CA2822514A1 Method for verifying authenticity, corresponding server, system and computer program |
02/08/2014 | CA2823446A1 Static tainting anasystem and method for taint analysis of computer program codelysis |
02/06/2014 | WO2014022795A1 Accessing a secure locker via a mobile device |
02/06/2014 | WO2014022778A1 User-convenient authentication method and apparatus using a mobile authentication application |
02/06/2014 | WO2014022604A1 Trusted execution environment virtual machine cloning |
02/06/2014 | WO2014022439A1 Transfer of digital media objects via migration |
02/06/2014 | WO2014022323A1 Security and data isolation for tenants in a business data system |
02/06/2014 | WO2014022062A1 Media encryption based on biometric data |
02/06/2014 | WO2014022029A1 Integrated non-volatile monotonic counters |
02/06/2014 | WO2014021919A2 Methods, systems, and computer readable medium for active monitoring, memory protection and integrity verification of target devices |
02/06/2014 | WO2014021866A1 Vulnerability vector information analysis |
02/06/2014 | WO2014021865A1 Conjoint vulnerability identifiers |
02/06/2014 | WO2014021848A1 Unauthorized user classification |
02/06/2014 | WO2014021721A1 System and device for authenticating a user |
02/06/2014 | WO2014021190A1 Program execution device and program analysis device |
02/06/2014 | WO2014020619A1 Method for securing an order or purchase operation means of a client device |
02/06/2014 | WO2014020092A1 Method for generating a code, authorization method and authorization system for authorizing an operation |
02/06/2014 | WO2014020087A1 Biometric personal authentication |
02/06/2014 | WO2014019815A1 Mandatory protection control in virtual machines |
02/06/2014 | WO2014019679A1 Method for providing chips with high re-engineering protection, particularly for digital authentication systems, such as smart cards or the like, and chips produced using said method |
02/06/2014 | WO2014019129A1 Automating password maintenance |
02/06/2014 | WO2013188390A3 Decoding a quilted image representation into a digital asset along with content control data |
02/06/2014 | WO2013181361A3 System, method and apparatus for electromagnetic detection and analysis of biometric information |
02/06/2014 | US20140041061 Tamper protection device for protecting a field device against tampering |
02/06/2014 | US20140041060 Keypad Device |
02/06/2014 | US20140041059 Analyzing apparatus validating system and program for the system |
02/06/2014 | US20140041058 Methods and apparatus for sharing, transferring and removing previously owned digital media |
02/06/2014 | US20140041057 Digital delivery system and user interface for enabling the digital delivery of media content |
02/06/2014 | US20140041056 Systems and methods for multiple photo fee stories |
02/06/2014 | US20140041055 System and method for online access control based on users social network context |
02/06/2014 | US20140041054 Attestation of possession of media content items using fingerprints |
02/06/2014 | US20140041053 Data block access control |
02/06/2014 | US20140041052 Methods and systems for establishing and enforcing document visibitily rights with an electronic signature service |
02/06/2014 | US20140041051 Accessing media |
02/06/2014 | US20140041050 Method for displaying information on a display device of a terminal |
02/06/2014 | US20140041049 Method and apparatus for variable privacy preservation in data mining |
02/06/2014 | US20140041047 Privacy preserving method for summarizing user data |
02/06/2014 | US20140041046 Systems and methods for conditional access and digital rights management |
02/06/2014 | US20140041045 Digital rights management (drm) locker |
02/06/2014 | US20140041044 Controlling access to a shared file |
02/06/2014 | US20140041042 Obstructing user content based on location |
02/06/2014 | US20140041041 Meteorology and oceanography geospatial analysis toolset |
02/06/2014 | US20140041040 Creating secure multiparty communication primitives using transistor delay quantization in public physically unclonable functions |
02/06/2014 | US20140041039 Vectorial private equality testing |
02/06/2014 | US20140041038 Receiving information about a user from a third party application based on action types |
02/06/2014 | US20140041037 Detecting pirated applications |
02/06/2014 | US20140041035 Method and system for file scanning |
02/06/2014 | US20140041034 Performing virus scan during decompression of an application installation package |
02/06/2014 | US20140041031 Statistical fingerprinting for malware detection and classification |
02/06/2014 | US20140041030 System for finding code in a data flow |
02/06/2014 | US20140041029 Method and system for processing website address risk detection |
02/06/2014 | US20140041027 Safe command execution and error recovery for storage devices |
02/06/2014 | US20140041026 Hybrid Virtual Machine |
02/06/2014 | US20140041024 Method and Apparatus for Baiting Phishing Websites |
02/06/2014 | US20140041023 Flexible and secure clickjacking protection mechanism |
02/06/2014 | US20140041022 Method and apparatus for providing notification of detected error conditions in a network |
02/06/2014 | US20140041021 Apparatus, methods, and computer program products for entering secure passwords |
02/06/2014 | US20140041020 Orientation aware authentication on mobile platforms |
02/06/2014 | US20140041019 Electronic device and method for hiding login information |
02/06/2014 | US20140041018 Tokenized data security |
02/06/2014 | US20140041017 Law enforcement agency portal |
02/06/2014 | US20140041016 Providing remotely defined security data to a local application extension |
02/06/2014 | US20140041015 Systems and Methods of Exchanging Information for a Reward |
02/06/2014 | US20140041009 Information processing apparatus, information processing method and program |
02/06/2014 | US20140041008 Establishing historical usage-based hardware trust |
02/06/2014 | US20140041007 Web based extranet architecture providing applications to non-related subscribers |
02/06/2014 | US20140041006 Secure messaging center |
02/06/2014 | US20140040999 Hybrid multi-tenancy cloud platform |
02/06/2014 | US20140040998 Providing an operational dashboard |
02/06/2014 | US20140040997 Self-deleting virtual machines |
02/06/2014 | US20140040993 Method for providing authorized access to a service application in order to use a protected resource of an end user |
02/06/2014 | US20140040990 Verification of computer system prior to and subsequent to computer program installation |
02/06/2014 | US20140040987 Network Application Security Utilizing Network-Provided Identities |
02/06/2014 | US20140040984 Dynamic trust session |
02/06/2014 | US20140040983 Terminal authentication method and terminal |
02/06/2014 | US20140040982 Functionality Watermarking and Management |
02/06/2014 | US20140040981 Systems and methods for applying a security policy to a device based on location |