Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
01/30/2014 | WO2014015970A1 Apparatus and method for detecting an intrusion in electric power networks |
01/30/2014 | WO2014015790A1 Method and system for file scanning |
01/30/2014 | WO2014015413A1 Method of managing role-based digital rights in a computer system |
01/30/2014 | WO2014015386A1 System and method for fraud prevention |
01/30/2014 | US20140033331 Multilayer security wrap |
01/30/2014 | US20140033330 Undiscoverable physical chip identification |
01/30/2014 | US20140033329 Server Geospatially Organized Flat File Data |
01/30/2014 | US20140033327 Siftsort |
01/30/2014 | US20140033325 Non-volatile memory for anti-cloning and authentication method for the same |
01/30/2014 | US20140033323 Secure Time for Mobile Devices |
01/30/2014 | US20140033322 Method and apparatus for mapping |
01/30/2014 | US20140033321 Method and apparatus for securely executing multiple actions using less than a corresponding multiple of privilege elevation prompts |
01/30/2014 | US20140033320 Document origin designator |
01/30/2014 | US20140033319 Collecting Data from Processor-Based Devices |
01/30/2014 | US20140033318 Apparatus and method for managing usim data using mobile trusted module |
01/30/2014 | US20140033316 Trusted security zone access to peripheral devices |
01/30/2014 | US20140033315 Method and system for enforcing a license dependency rule for a software application |
01/30/2014 | US20140033314 Validation of function call parameters |
01/30/2014 | US20140033313 Software suite activation |
01/30/2014 | US20140033312 Methods and systems for distributing right-protected asset |
01/30/2014 | US20140033311 Method and apparatus for determining virus-infected files |
01/30/2014 | US20140033309 Taint tracking mechanism for computer security |
01/30/2014 | US20140033305 Code validation |
01/30/2014 | US20140033304 Method and apparatus for preventing an idt-based security sandbox from causing a kernel panic when using a call gate |
01/30/2014 | US20140033303 Infusion Devices and Methods |
01/30/2014 | US20140033302 Method and apparatus for selectively enabling a microprocessor-based system |
01/30/2014 | US20140033301 Mobile device and pupil recognition method |
01/30/2014 | US20140033300 System and method for verification of user identification based on multimedia content elements |
01/30/2014 | US20140033299 Protecting data on a mobile device |
01/30/2014 | US20140033298 User terminal apparatus and control method thereof |
01/30/2014 | US20140033297 Apparatus for controlling processor execution in a secure environment |
01/30/2014 | US20140033293 Secure telematics |
01/30/2014 | US20140033292 System and Method for Authenticating Suspect Devices |
01/30/2014 | US20140033289 Anti-identity theft and information security system |
01/30/2014 | US20140033280 System and method of mapping and protecting communication services with oauth |
01/30/2014 | US20140033278 System and method of securing sharing of resources which require consent of multiple resource owners using group uri's |
01/30/2014 | US20140033277 Program Service Based on Individual Identification |
01/30/2014 | US20140033273 Automating calls between separate and distinct applications for invoking an identity verification function |
01/30/2014 | US20140033272 Evaluating a security stack in repsonse to a request to access a service |
01/30/2014 | US20140033271 Policy-Based Application Management |
01/30/2014 | US20140033266 Method and apparatus for providing concealed software execution environment based on virtualization |
01/30/2014 | US20140033265 Digital rights management in a collaborative environment |
01/30/2014 | US20140033210 Techniques for Attesting Data Processing Systems |
01/30/2014 | US20140033196 Method and system for determining the eligibility for deploying protected content |
01/30/2014 | US20140033060 Methods and systems for interactive evaluation using dynamically generated, interactive resultant sets of policies |
01/30/2014 | US20140032937 Systems and methods for information security using one-time pad |
01/30/2014 | US20140032936 Information processing apparatus, control method for information processing apparatus, and storage medium |
01/30/2014 | US20140032935 Memory system and encryption method in memory system |
01/30/2014 | US20140032933 Providing access to encrypted data |
01/30/2014 | US20140032932 Method, manufacture, and apparatus for secure debug and crash logging of obfuscated libraries |
01/30/2014 | US20140032931 Cryptographic equipment implementing red/black communication modes |
01/30/2014 | US20140032930 Secure data scanning method and system |
01/30/2014 | US20140032929 Method, device, and system for encrypting and decrypting image |
01/30/2014 | US20140032927 Archiving electronic content having digital signatures |
01/30/2014 | US20140032926 System, method and computer product for fast and secure data searching |
01/30/2014 | US20140032925 System and method for combining deduplication and encryption of data |
01/30/2014 | US20140032924 Media encryption based on biometric data |
01/30/2014 | US20140032923 System and device for authenticating a user |
01/30/2014 | US20140032922 Blind hashing |
01/30/2014 | US20140032921 Protecting data on a mobile device |
01/30/2014 | US20140032910 Storage system in which fictitious information is prevented |
01/30/2014 | US20140032899 Method and system for secure form delivery |
01/30/2014 | US20140032893 Secure virtualization environment bootable from an external media device |
01/30/2014 | US20140032631 Executing dynamically assigned functions while providing services |
01/30/2014 | US20140032171 Method for testing tamper protection of a field device and field device having tamper protection |
01/30/2014 | US20140029747 System and method for transcoding content |
01/30/2014 | US20140029039 Office machine security policy |
01/30/2014 | US20140028823 Mobile terminal and control method thereof |
01/30/2014 | DE112012000744T5 Erkennung eines trojanischen Pferdes Recognition of a Trojan horse |
01/30/2014 | DE102013105042A1 Sicheres Flashprogrammieren eines sekundären Prozessors Secure Flash programming a secondary processor |
01/29/2014 | EP2690838A1 Authentification system preserving secret data confidentiality |
01/29/2014 | EP2690579A1 Method and device for protecting against fault attack(s) an electronic device using a cache memory |
01/29/2014 | EP2690578A1 Electronic storage device and data protection method thereof |
01/29/2014 | EP2690577A1 Electronic storage device and data protection method thereof |
01/29/2014 | EP2690576A2 User terminal apparatus and control method thereof |
01/29/2014 | EP2690575A2 User Authentication System, User Authentication Method and Network Apparatus |
01/29/2014 | EP2690574A1 Method and system for digital content online reading authentication |
01/29/2014 | EP2690511A1 Apparatus and method for detecting an intrusion in electric power networks |
01/29/2014 | EP2689598A1 Interrogating an authentication device |
01/29/2014 | EP2689569A1 Method and device for connecting to a high security network |
01/29/2014 | EP2689377A1 System and method for user access management |
01/29/2014 | EP2689376A1 System and method providing dependency networks throughout applications for attack resistance |
01/29/2014 | EP2689375A1 System and method for securely binding and node-locking program execution to a trusted signature authority |
01/29/2014 | EP2689373A1 Detecting attacks on a portable data carrier |
01/29/2014 | EP2689372A1 User to user delegation service in a federated identity management environment |
01/29/2014 | EP2689371A1 Fast device classification |
01/29/2014 | EP2689370A1 Blood glucose measuring device and method for reading measured blood glucose values |
01/29/2014 | EP2689369A1 Method for masking the end-of-life transition of an electronic device and device comprising a corresponding control module |
01/29/2014 | EP2689368A1 Method for switching between virtualized and non-virtualized system operation |
01/29/2014 | EP2689367A1 Data protection using distributed security key |
01/29/2014 | EP2689366A1 Software licence control |
01/29/2014 | EP2689353A1 System and method for data masking |
01/29/2014 | EP2689304A1 System and method of secure data entry |
01/29/2014 | EP2336908B1 Search device, search method and search program using open search engine |
01/29/2014 | EP2062191B1 System and method for securely restoring a program context from a shared memory |
01/29/2014 | EP2041942B1 Controlled sharing of personal data |
01/29/2014 | EP2024845B1 Apparatus and method of securely moving security data |
01/29/2014 | CN203414952U Computer with information safety device |
01/29/2014 | CN203414951U Position detection device |
01/29/2014 | CN203414950U Safety management device for universal management media and safety management system |