Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
02/06/2014 | US20140040980 Syndication including melody recognition and opt out |
02/06/2014 | US20140040976 Security-minded cloning method, system and program |
02/06/2014 | US20140040973 Method for controlling initial access rights to open mobile alliance device management servers |
02/06/2014 | US20140040886 Secure operations for virtual machines |
02/06/2014 | US20140040876 Software Activation Systems |
02/06/2014 | US20140040638 Policy-Based Application Management |
02/06/2014 | US20140040636 Embedded controller to verify crtm |
02/06/2014 | US20140040635 Methods and apparatus for securing keystrokes from being intercepted between the keyboard and a browser |
02/06/2014 | US20140040633 Secure transaction method from a non-secure terminal |
02/06/2014 | US20140040632 Low-overhead cryptographic method and apparatus for providing memory confidentiality, integrity and replay protection |
02/06/2014 | US20140040631 Memory controller, nonvolatile memory device, nonvolatile memory system, and access device |
02/06/2014 | US20140040630 System and method for detecting a security compromise on a device |
02/06/2014 | US20140040628 User-convenient authentication method and apparatus using a mobile authentication application |
02/06/2014 | US20140040627 Process and system for strengthening password security |
02/06/2014 | US20140040626 Anonymization and reattribution framework for offline identifiers |
02/06/2014 | US20140040622 Secure unlocking and recovery of a locked wrapped app on a mobile device |
02/06/2014 | US20140040613 Streaming system and method |
02/06/2014 | US20140040308 System and Method for Analyzing De-Identified Health Care Data |
02/06/2014 | US20140040255 Method and system for access to restricted resources |
02/06/2014 | US20140040155 System and method for mobile identity protection of a user of multiple computer applications, networks or devices using a wireless device |
02/06/2014 | US20140040154 Defamation Avoiding System and Process to Identify Pattern Crimes |
02/06/2014 | US20140040143 Method and device for controlling distribution and use of digital works |
02/06/2014 | US20140040142 Data copyright management system |
02/06/2014 | US20140039928 Diagnostic Image Security System |
02/06/2014 | US20140039801 Quantised biometric method, apparatus and computer programme |
02/06/2014 | DE102013213568A1 Sicheres Speichern und Signatur Securely store and signature |
02/06/2014 | DE102012024250A1 Verfahren zur Bereitstellung von Chips mit hoher Kopierschutzfunktion, insbesondere für digitale Authentifizierungssysteme, wie Chipkarten oder dergleichen, sowie danach hergestellte Chips A method for providing chips with high copy protection function, in particular for digital authentication systems, such as smart cards or the like, and thereafter produced chips |
02/06/2014 | DE102012015348A1 Verfahren zum Schreiben und Lesen von Daten auf einem blockorientierten Speichermedium A method for writing and reading data on a block-oriented storage medium |
02/05/2014 | EP2693789A1 Mobile terminal encryption method, hardware encryption device and mobile terminal |
02/05/2014 | EP2693687A1 Method for generating a code, authorization method and authorization system for authorizing an operation |
02/05/2014 | EP2693680A1 Apparatus safe from power consumption analysis attack for encrypting and method for operating same |
02/05/2014 | EP2693381A1 Enterprise leasing license algorithm |
02/05/2014 | EP2693361A1 Anonymization and reattribution framework for offline identifiers |
02/05/2014 | EP2693360A2 Location aware authentication |
02/05/2014 | EP2693359A2 Mobile device, and method for releasing lock of the mobile device via handwriting recognition |
02/05/2014 | EP2693358A1 Secret distribution system, device, and memory medium |
02/05/2014 | EP2693357A1 Management device, management program, and management method |
02/05/2014 | EP2693356A2 Detecting pirated applications |
02/05/2014 | EP2693355A1 Security-level visualization device |
02/05/2014 | EP2692166A1 Authentication method and system |
02/05/2014 | EP2692162A1 Connecting mobile devices, internet-connected vehicles, and cloud services |
02/05/2014 | EP2692157A2 Updating a data storage medium application |
02/05/2014 | EP2692110A1 Processing of digital data, in particular medical data by a virtual machine |
02/05/2014 | EP2692108A1 Method and apparatus for generating unique identifier values for applications and services |
02/05/2014 | EP2691930A2 License upgrade management |
02/05/2014 | EP2691910A1 Authentication in an industrial control system |
02/05/2014 | EP2691909A1 Licensing software on a single-user basis |
02/05/2014 | EP2691908A2 System and method for virtual machine monitor based anti-malware security |
02/05/2014 | EP2691907A2 Methods and apparatus for blocking usage tracking |
02/05/2014 | EP2691906A2 Method and system for protecting execution of cryptographic hash functions |
02/05/2014 | EP2691905A2 Method of securing non-native code |
02/05/2014 | EP2691904A1 Virtual machine for processing medical data |
02/05/2014 | EP2691861A2 Method of securing memory against malicious attack |
02/05/2014 | EP2691848A1 Determining machine behavior |
02/05/2014 | EP2691275A1 Secured repair data package |
02/05/2014 | CN203423701U Cipher machine |
02/05/2014 | CN203422742U Electronic locking system |
02/05/2014 | CN203422736U Electronic access controller and implementation device for interaction between electronic access controller and general electronic equipment |
02/05/2014 | CN203422698U Tablet computer |
02/05/2014 | CN103563420A Information processing device, control method for information processing device, device to be controlled, control method for device to be controlled, server, control method for server, pairing system, control program, and recording medium |
02/05/2014 | CN103563293A Detecting security vulnerabilities in web applications |
02/05/2014 | CN103562973A Electronic system for quickly and securely processing transactions using mobile devices |
02/05/2014 | CN103562930A Prevention of playback attacks using OTP memory |
02/05/2014 | CN103562929A Method of parameterizing rules for broadcasting personal data |
02/05/2014 | CN103562928A Methods and apparatus for blocking usage tracking |
02/05/2014 | CN103562927A Automated security testing |
02/05/2014 | CN103562926A Brokered item access for isolated applications |
02/05/2014 | CN103562925A Information processing system, information processing method, information processing device, program and storage medium |
02/05/2014 | CN103562924A Information processing device, information processing method, and program |
02/05/2014 | CN103562923A Application security testing |
02/05/2014 | CN103562922A Establishing unique key during chip manufacturing |
02/05/2014 | CN103561035A Mobile subscriber safety protection method and system |
02/05/2014 | CN103560994A Context-aware-based security access control method for RFID system |
02/05/2014 | CN103560886A Authentication method for electronic signature equipment |
02/05/2014 | CN103560883A Safety identification method, between android application programs, based on user right |
02/05/2014 | CN103559678A Scrambling and restoring method of shp line-face layer data |
02/05/2014 | CN103559526A Method and system for generation and verification of two-dimensional code |
02/05/2014 | CN103559487A Identity recognition method and system based on skin texture characteristics |
02/05/2014 | CN103559463A Consumer abuse detection system and method |
02/05/2014 | CN103559462A Lock catch processing device and method |
02/05/2014 | CN103559461A Disassembly-proof solid state disk capable of being controlled remotely and data security keeping method thereof |
02/05/2014 | CN103559460A Condition access module (CAM) and data processing method |
02/05/2014 | CN103559459A Dynamic shielding protection device and method for safety chip |
02/05/2014 | CN103559458A Method and system for acquiring data hashes |
02/05/2014 | CN103559457A Role-based access control (RBAC) security policy analyzing method based on graph plan |
02/05/2014 | CN103559456A Data protecting method and terminal based on time |
02/05/2014 | CN103559455A Android device personal information protection method based on user identification |
02/05/2014 | CN103559454A Data protection system and method |
02/05/2014 | CN103559453A Hardware encryption protection method and system for cellphone data |
02/05/2014 | CN103559452A Altitude data decryption and recovery method |
02/05/2014 | CN103559451A Method and device for protecting and displaying privacy information |
02/05/2014 | CN103559450A Electronic tag data protection method based on kernel driver hook technology |
02/05/2014 | CN103559449A Detection method and device for code change |
02/05/2014 | CN103559448A System and method for execution of a secured environment initialization instruction |
02/05/2014 | CN103559447A Detection method, detection device and detection system based on virus sample characteristics |
02/05/2014 | CN103559446A Dynamic virus detection method and device for equipment based on Android system |
02/05/2014 | CN103559445A Application-program interactive control method and device |
02/05/2014 | CN103559444A Sql (Structured query language) injection detection method and device |
02/05/2014 | CN103559443A Virus scanning method and device for multi-core device |
02/05/2014 | CN103559442A Malicious program detection method and device on basis of reverse technology |