Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
02/05/2014 | CN103559441A Cross-platform detection method and system for malicious files in cloud environment |
02/05/2014 | CN103559440A Detection method, device and system of ios (iphone operation system) device user permission |
02/05/2014 | CN103559439A Detection method and system for buffer overflow |
02/05/2014 | CN103559438A Progress identification method and progress identification system |
02/05/2014 | CN103559437A Access control method and system for Android operation system |
02/05/2014 | CN103559436A Authentication method and device for virtualization startup |
02/05/2014 | CN103559435A Method and device for controlling debugging ports of terminal equipment |
02/05/2014 | CN103559434A Generation method for electronic attached sheets in circulation domain |
02/05/2014 | CN103559433A Mobile terminal antitheft method and device |
02/05/2014 | CN103559432A Unlocking method based on custom identifiers |
02/05/2014 | CN103559431A Detection method, device and system of Android system user permission |
02/05/2014 | CN103559430A Application account management method and device based on android system |
02/05/2014 | CN103559429A Software processing method and system |
02/05/2014 | CN103559251A Data security protection method based on data hiding |
02/05/2014 | CN103559235A Online social network malicious webpage detection and identification method |
02/05/2014 | CN103559118A Security auditing method based on aspect oriented programming (AOP) and annotation information system |
02/05/2014 | CN103559062A Updating method for off-line played contents of display terminal as well as export method and import method of files for updating |
02/05/2014 | CN103559050A Customization method for computer starting process and computer |
02/05/2014 | CN103559048A Data storage method and data storage device |
02/05/2014 | CN102006597B Method and system for controlling software license as well as mobile terminal |
02/04/2014 | US8646108 Multi-domain secure computer system |
02/04/2014 | US8646107 Implementing usage limited systems |
02/04/2014 | US8646106 Limited play optical article |
02/04/2014 | US8646105 System, method and security device for authorizing use of a software tool |
02/04/2014 | US8646104 Stateless challenge-response broadcast protocol |
02/04/2014 | US8646100 Method for executing an application in a restricted operating environment |
02/04/2014 | US8646099 Midlet signing and revocation |
02/04/2014 | US8646098 Method and system for software licensing under machine virtualization |
02/04/2014 | US8646093 Method and system for configuration management database software license compliance |
02/04/2014 | US8646088 Runtime enforcement of security checks |
02/04/2014 | US8646087 Answering security queries statically based on dynamically-determined information |
02/04/2014 | US8646085 Apparatus for reconfiguration of a technical system based on security analysis and a corresponding technical decision support system and computer program product |
02/04/2014 | US8646073 Detection of account hijacking in a social network |
02/04/2014 | US8646068 Home image content securely isolated from corporate IT |
02/04/2014 | US8646063 Methods, apparatus, and computer program products for subscriber authentication and temporary code generation |
02/04/2014 | US8646061 Method and apparatus for transmitting rights object information between device and portable storage |
02/04/2014 | US8646059 Wallet application for interacting with a secure element application without a trusted server for authentication |
02/04/2014 | US8646058 Computer system and access right setting method |
02/04/2014 | US8646057 Authentication and authorization of user and access to network resources using openid |
02/04/2014 | US8646055 Method and system for pre-shared-key-based network security access control |
02/04/2014 | US8646046 Distributed digital rights management system and method |
02/04/2014 | US8646045 Bank speech authentication |
02/04/2014 | US8646042 Hybrid device having a personal digital key and receiver-decoder circuit and methods of use |
02/04/2014 | US8646022 Methods and apparatus to configure broadband-enabled entertainment systems |
02/04/2014 | US8645996 Digital broadcast receiver and a method for providing a graphical user interface |
02/04/2014 | US8645941 Method for attributing and allocating revenue related to embedded software |
02/04/2014 | US8645905 Development artifact searching in an integrated development environment |
02/04/2014 | US8645714 Branch target address cache for predicting instruction decryption keys in a microprocessor that fetches and decrypts encrypted instructions |
02/04/2014 | US8645710 Information processing apparatus, information storage medium, content management system, data processing method, and computer program |
02/04/2014 | US8645709 Biometric access data encryption |
02/04/2014 | US8645708 Method and apparatus for the secure identification of the owner of a portable device |
02/04/2014 | US8645707 Apparatus and method for unlocking a user equipment |
02/04/2014 | US8645706 Preventing error in an access protocol |
02/04/2014 | US8645704 Protecting caller function from undesired access by callee function |
02/04/2014 | US8645688 System and method for execution of a secured environment initialization instruction |
02/04/2014 | US8645685 Token authentication |
02/04/2014 | US8645683 Verified navigation |
02/04/2014 | US8645677 Secure remote credential provisioning |
02/04/2014 | US8645533 Content reproducing apparatus and content reproducing method |
02/04/2014 | US8645466 Systems and methods for displaying file and folder information to a user |
02/04/2014 | US8645422 Method for controlling access to informational objects |
02/04/2014 | US8645348 Method and system for securing user identities and creating virtual users to enhance privacy on a communication network |
02/04/2014 | US8645340 System and method of monitoring and controlling application files |
02/04/2014 | US8645281 Process for authenticating an end user |
02/04/2014 | US8645279 Copyright detection and protection system and method |
02/04/2014 | US8645278 Process for the on-line sale of a software product |
02/04/2014 | US8645277 Process for the on-line sale of a software product |
02/04/2014 | US8644969 Content provisioning and revenue disbursement |
02/04/2014 | US8644513 Database processing on externally encrypted data |
02/04/2014 | US8644508 Trusted communications between untrusting parties |
02/04/2014 | US8644342 Apparatus method and medium for detecting payload anomaly using N-gram distribution of normal data |
02/04/2014 | US8643736 Method and apparatus for participating in a virtual community for viewing a remote event over a wireless network |
02/04/2014 | US8643487 Electronic security system for monitoring mechanical keys and other items |
02/04/2014 | CA2706147C Downloadable security based on certificate status |
02/04/2014 | CA2525376C System and method for authenticating software using hidden intermediate keys |
02/04/2014 | CA2523548C Intelligent data processing system and method using fpga devices |
02/04/2014 | CA2506155C Verifying human interaction to a computer entity by way of a trusted component on a computing device or the like |
02/04/2014 | CA2480612C Authentication system and method having mobility in public wireless local area network |
02/02/2014 | CA2822217A1 Method and system for anonymous video analytics processing |
01/30/2014 | WO2014018895A1 Secure time for mobile devices |
01/30/2014 | WO2014018743A2 Method and system for secure authentication and information sharing and analysis |
01/30/2014 | WO2014018731A1 Methods, systems, and computer readable media for providing a secure virtual research space |
01/30/2014 | WO2014018630A1 System and method to provide automatic classification of phishing sites |
01/30/2014 | WO2014018575A2 Trusted security zone access to peripheral devices |
01/30/2014 | WO2014018551A1 Method and apparatus for deterring a timing-based glitch attack during a secure boot process |
01/30/2014 | WO2014018356A1 Providing access to encrypted data |
01/30/2014 | WO2014018296A1 Securing information using entity detection |
01/30/2014 | WO2014018096A1 System and digital token for personal identity verification |
01/30/2014 | WO2014018042A1 Application security testing |
01/30/2014 | WO2014018029A1 Determining application vulnerabilities |
01/30/2014 | WO2014017858A1 User terminal apparatus and control method thereof |
01/30/2014 | WO2014017761A1 Storage device reader having security function and security method using same |
01/30/2014 | WO2014017532A1 Packet forwarding device, packet forwarding system, and packet forwarding method |
01/30/2014 | WO2014017117A1 Information processing apparatus and control method |
01/30/2014 | WO2014017013A1 Near field communication system and near field communication terminal |
01/30/2014 | WO2014016938A1 Programmable logic controller |
01/30/2014 | WO2014016838A1 Method, computer readable medium and a device for neutralization of attacks |
01/30/2014 | WO2014016411A1 Electronic module having manipulation protection |
01/30/2014 | WO2014016218A1 Method and device for protecting against fault attack(s) an electronic device using a cache memory |
01/30/2014 | WO2014016047A1 Authentication system preserving secret data confidentiality |