Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
02/2014
02/06/2014US20140040980 Syndication including melody recognition and opt out
02/06/2014US20140040976 Security-minded cloning method, system and program
02/06/2014US20140040973 Method for controlling initial access rights to open mobile alliance device management servers
02/06/2014US20140040886 Secure operations for virtual machines
02/06/2014US20140040876 Software Activation Systems
02/06/2014US20140040638 Policy-Based Application Management
02/06/2014US20140040636 Embedded controller to verify crtm
02/06/2014US20140040635 Methods and apparatus for securing keystrokes from being intercepted between the keyboard and a browser
02/06/2014US20140040633 Secure transaction method from a non-secure terminal
02/06/2014US20140040632 Low-overhead cryptographic method and apparatus for providing memory confidentiality, integrity and replay protection
02/06/2014US20140040631 Memory controller, nonvolatile memory device, nonvolatile memory system, and access device
02/06/2014US20140040630 System and method for detecting a security compromise on a device
02/06/2014US20140040628 User-convenient authentication method and apparatus using a mobile authentication application
02/06/2014US20140040627 Process and system for strengthening password security
02/06/2014US20140040626 Anonymization and reattribution framework for offline identifiers
02/06/2014US20140040622 Secure unlocking and recovery of a locked wrapped app on a mobile device
02/06/2014US20140040613 Streaming system and method
02/06/2014US20140040308 System and Method for Analyzing De-Identified Health Care Data
02/06/2014US20140040255 Method and system for access to restricted resources
02/06/2014US20140040155 System and method for mobile identity protection of a user of multiple computer applications, networks or devices using a wireless device
02/06/2014US20140040154 Defamation Avoiding System and Process to Identify Pattern Crimes
02/06/2014US20140040143 Method and device for controlling distribution and use of digital works
02/06/2014US20140040142 Data copyright management system
02/06/2014US20140039928 Diagnostic Image Security System
02/06/2014US20140039801 Quantised biometric method, apparatus and computer programme
02/06/2014DE102013213568A1 Sicheres Speichern und Signatur Securely store and signature
02/06/2014DE102012024250A1 Verfahren zur Bereitstellung von Chips mit hoher Kopierschutzfunktion, insbesondere für digitale Authentifizierungssysteme, wie Chipkarten oder dergleichen, sowie danach hergestellte Chips A method for providing chips with high copy protection function, in particular for digital authentication systems, such as smart cards or the like, and thereafter produced chips
02/06/2014DE102012015348A1 Verfahren zum Schreiben und Lesen von Daten auf einem blockorientierten Speichermedium A method for writing and reading data on a block-oriented storage medium
02/05/2014EP2693789A1 Mobile terminal encryption method, hardware encryption device and mobile terminal
02/05/2014EP2693687A1 Method for generating a code, authorization method and authorization system for authorizing an operation
02/05/2014EP2693680A1 Apparatus safe from power consumption analysis attack for encrypting and method for operating same
02/05/2014EP2693381A1 Enterprise leasing license algorithm
02/05/2014EP2693361A1 Anonymization and reattribution framework for offline identifiers
02/05/2014EP2693360A2 Location aware authentication
02/05/2014EP2693359A2 Mobile device, and method for releasing lock of the mobile device via handwriting recognition
02/05/2014EP2693358A1 Secret distribution system, device, and memory medium
02/05/2014EP2693357A1 Management device, management program, and management method
02/05/2014EP2693356A2 Detecting pirated applications
02/05/2014EP2693355A1 Security-level visualization device
02/05/2014EP2692166A1 Authentication method and system
02/05/2014EP2692162A1 Connecting mobile devices, internet-connected vehicles, and cloud services
02/05/2014EP2692157A2 Updating a data storage medium application
02/05/2014EP2692110A1 Processing of digital data, in particular medical data by a virtual machine
02/05/2014EP2692108A1 Method and apparatus for generating unique identifier values for applications and services
02/05/2014EP2691930A2 License upgrade management
02/05/2014EP2691910A1 Authentication in an industrial control system
02/05/2014EP2691909A1 Licensing software on a single-user basis
02/05/2014EP2691908A2 System and method for virtual machine monitor based anti-malware security
02/05/2014EP2691907A2 Methods and apparatus for blocking usage tracking
02/05/2014EP2691906A2 Method and system for protecting execution of cryptographic hash functions
02/05/2014EP2691905A2 Method of securing non-native code
02/05/2014EP2691904A1 Virtual machine for processing medical data
02/05/2014EP2691861A2 Method of securing memory against malicious attack
02/05/2014EP2691848A1 Determining machine behavior
02/05/2014EP2691275A1 Secured repair data package
02/05/2014CN203423701U Cipher machine
02/05/2014CN203422742U Electronic locking system
02/05/2014CN203422736U Electronic access controller and implementation device for interaction between electronic access controller and general electronic equipment
02/05/2014CN203422698U Tablet computer
02/05/2014CN103563420A Information processing device, control method for information processing device, device to be controlled, control method for device to be controlled, server, control method for server, pairing system, control program, and recording medium
02/05/2014CN103563293A Detecting security vulnerabilities in web applications
02/05/2014CN103562973A Electronic system for quickly and securely processing transactions using mobile devices
02/05/2014CN103562930A Prevention of playback attacks using OTP memory
02/05/2014CN103562929A Method of parameterizing rules for broadcasting personal data
02/05/2014CN103562928A Methods and apparatus for blocking usage tracking
02/05/2014CN103562927A Automated security testing
02/05/2014CN103562926A Brokered item access for isolated applications
02/05/2014CN103562925A Information processing system, information processing method, information processing device, program and storage medium
02/05/2014CN103562924A Information processing device, information processing method, and program
02/05/2014CN103562923A Application security testing
02/05/2014CN103562922A Establishing unique key during chip manufacturing
02/05/2014CN103561035A Mobile subscriber safety protection method and system
02/05/2014CN103560994A Context-aware-based security access control method for RFID system
02/05/2014CN103560886A Authentication method for electronic signature equipment
02/05/2014CN103560883A Safety identification method, between android application programs, based on user right
02/05/2014CN103559678A Scrambling and restoring method of shp line-face layer data
02/05/2014CN103559526A Method and system for generation and verification of two-dimensional code
02/05/2014CN103559487A Identity recognition method and system based on skin texture characteristics
02/05/2014CN103559463A Consumer abuse detection system and method
02/05/2014CN103559462A Lock catch processing device and method
02/05/2014CN103559461A Disassembly-proof solid state disk capable of being controlled remotely and data security keeping method thereof
02/05/2014CN103559460A Condition access module (CAM) and data processing method
02/05/2014CN103559459A Dynamic shielding protection device and method for safety chip
02/05/2014CN103559458A Method and system for acquiring data hashes
02/05/2014CN103559457A Role-based access control (RBAC) security policy analyzing method based on graph plan
02/05/2014CN103559456A Data protecting method and terminal based on time
02/05/2014CN103559455A Android device personal information protection method based on user identification
02/05/2014CN103559454A Data protection system and method
02/05/2014CN103559453A Hardware encryption protection method and system for cellphone data
02/05/2014CN103559452A Altitude data decryption and recovery method
02/05/2014CN103559451A Method and device for protecting and displaying privacy information
02/05/2014CN103559450A Electronic tag data protection method based on kernel driver hook technology
02/05/2014CN103559449A Detection method and device for code change
02/05/2014CN103559448A System and method for execution of a secured environment initialization instruction
02/05/2014CN103559447A Detection method, detection device and detection system based on virus sample characteristics
02/05/2014CN103559446A Dynamic virus detection method and device for equipment based on Android system
02/05/2014CN103559445A Application-program interactive control method and device
02/05/2014CN103559444A Sql (Structured query language) injection detection method and device
02/05/2014CN103559443A Virus scanning method and device for multi-core device
02/05/2014CN103559442A Malicious program detection method and device on basis of reverse technology