Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
01/2014
01/16/2014US20140020087 Sensory association passcode
01/16/2014US20140020086 Virtual machine system, confidential information protection method, and confidential information protection program
01/16/2014US20140020085 Background Application Management
01/16/2014US20140020084 System & Method for Controlling Access to Resources with a Spoken CAPTCHA Test
01/16/2014US20140020080 Controlling third party access to network devices
01/16/2014US20140020076 Centralized identity authentication for electronic communication networks
01/16/2014US20140020075 Centralized identity authentication for electronic communication networks
01/16/2014US20140020074 Methods and systems for improving the security of secret authentication data during authentication transactions
01/16/2014US20140020073 Methods and systems for using derived credentials to authenticate a device across multiple platforms
01/16/2014US20140020071 Methods and Systems for Sharing Digital Assets
01/16/2014US20140020070 User device security manager
01/16/2014US20140020067 Apparatus and method for controlling traffic based on captcha
01/16/2014US20140020064 Scalable Fine-Grained Multi-Service Authorization
01/16/2014US20140020061 Automatic provisioning in mobile to mobile platforms
01/16/2014US20140020060 Quality of service application
01/16/2014US20140020059 Content sharing system, information communication apparatus, content sharing method, and communication method
01/16/2014US20140020058 Methods and systems for improving the security of secret authentication data during authentication transactions
01/16/2014US20140020056 Integrated physical access control and information technology (it) security
01/16/2014US20140020053 Setting default security features for use with web applications and extensions
01/16/2014US20140020051 User to user delegation service in a federated identity management environment
01/16/2014US20140020050 Method for Determining Integrity in an Evolutionary Collaborative Information System
01/16/2014US20140020049 System and method for policy driven protection of remote computing environments
01/16/2014US20140020048 Methods and systems for providing content workflow
01/16/2014US20140020046 Source code analysis of inter-related code bases
01/16/2014US20140020045 Data detection and protection policies for e-mail
01/16/2014US20140020043 Automating and/or recommending data sharing coordination among applications in mobile devices
01/16/2014US20140019955 Update of a data-carrier application
01/16/2014US20140019776 Methods of providing fast search, analysis, and data retrieval of encrypted data without decryption
01/16/2014US20140019775 Anti-wikileaks usb/cd device
01/16/2014US20140019774 Processing information
01/16/2014US20140019772 Techniques for secure data management in a distributed environment
01/16/2014US20140019771 Method and System for Protecting Execution of Cryptographic Hash Functions
01/16/2014US20140019770 Pre-event repository associated with individual privacy and public safety protection via double encrypted lock box
01/16/2014US20140019765 Device and method for online storage, transmission device and method, and receiving device and method
01/16/2014US20140019757 Authentication method and system
01/16/2014US20140019700 Water marking in a data interval gap
01/16/2014US20140019652 Secure km switch
01/16/2014US20140019488 Methods and systems for regulating database activity
01/16/2014US20140019485 System and method for data capture and reporting
01/16/2014US20140019467 Method and apparatus for processing masked data
01/16/2014US20140019362 Centralized identity authentication for electronic communication networks
01/16/2014US20140016834 Biological information obtaining apparatus and biological information collating apparatus
01/16/2014US20140016776 Establishing unique key during chip manufacturing
01/16/2014US20140016039 Electronic unit, communication system and method, information processing terminal and method, and information processing apparatus and method
01/16/2014DE10394383B4 Verfahren und Vorrichtung zum Laden eines vertrauenswürdigen Betriebssystems Method and apparatus for loading a trusted operating system
01/16/2014CA2877082A1 Secure password management systems, methods and apparatuses
01/16/2014CA2876732A1 Method and system for secured communication of personal information
01/16/2014CA2876709A1 Virtual transportation point of sale
01/15/2014EP2685704A1 Unlocking a mobile terminal using face recognition
01/15/2014EP2685401A1 Methods and systems for improving the security of secret authentication data during authentication transactions
01/15/2014EP2685400A1 Signature Generation and Verification System and Signature Verification Apparatus
01/15/2014EP2685375A1 Information processing terminal and information processing method for remote controlling an external device from the lock screen
01/15/2014EP2684331A1 Tamper-protected hardware and methods for using same
01/15/2014EP2684311A1 Secure file sharing method and system
01/15/2014EP2684175A2 Method and apparatus for managing content to be shared among devices
01/15/2014EP2684154A2 Method and control unit for detecting manipulations of a vehicle network
01/15/2014EP2684153A2 Key distribution for unconnected one-time password tokens
01/15/2014EP2684152A1 Method and system for dynamic platform security in a device operating system
01/15/2014EP2684151A1 A method for providing authorized access to a service application in order to use a protected resource of an end user
01/15/2014EP2684143A2 Controlling web page behaviour
01/15/2014EP2684121A1 Performing a change process based on a policy
01/15/2014CN203397368U Rear VGA (Video Graphics Array) interface shielding device of server
01/15/2014CN203397367U Novel server safety panel
01/15/2014CN203397366U Dual-line interface solid hard disk
01/15/2014CN203397346U Marine SD (Secure Digital) card data storage unit
01/15/2014CN103518378A Method of determining unusual behaviour of electronic apparatus, and electronic apparatus able to implement such method
01/15/2014CN103518207A Method, host, storage, and machine-readable storage medium for protecting content
01/15/2014CN103518206A Apparatus and method for hardware-based secure data processing using buffer memory address range rules
01/15/2014CN103518205A Method for limiting operation authority and automation device
01/15/2014CN103516718A Identity risk score generation and implementation
01/15/2014CN103516713A 帮助实现和认证事务 Help achieve and certification matters
01/15/2014CN103516680A Authority management system of office system and realizing method thereof
01/15/2014CN103516524A Security authentication method and system
01/15/2014CN103516521A Electronic instant-available achievement method and system based on Internet
01/15/2014CN103514560A Internet lottery secure transaction and rewarding method based on palmprint recognition
01/15/2014CN103514439A Facial recognition
01/15/2014CN103514416A Dynamic unlocking method and unlocking system for mobile terminal
01/15/2014CN103514415A Method and device for preventing faulty operation of mobile intelligent equipment
01/15/2014CN103514414A Encryption method and encryption system based on ARM TrustZone
01/15/2014CN103514413A Digital file reading protection device and method and information processing equipment
01/15/2014CN103514412A Method and cloud server for establishing role-based access control system
01/15/2014CN103514411A Method for starting electronic equipment and electronic equipment safety system
01/15/2014CN103514410A Dependable preservation and evidence collection system and method for electronic contract
01/15/2014CN103514409A BIM system, server device, terminal device, method and program
01/15/2014CN103514408A Mobile device and authentication method for having access to data of mobile device
01/15/2014CN103514407A Method and system for killing viruses of audio/video files transmitted from office network to production network
01/15/2014CN103514406A Method and device for analyzing multi-engine detection results
01/15/2014CN103514405A Method and system for detecting buffer overflow
01/15/2014CN103514404A Safety detection method and safety detection device
01/15/2014CN103514403A Method and device for conducting safety protection actively in JS
01/15/2014CN103514402A Intrusion detection method and device
01/15/2014CN103514401A Method and device for defense by utilization of sandbox technology and security browser
01/15/2014CN103514400A Selection of sandbox for initiating application
01/15/2014CN103514399A Firmware verification method and system
01/15/2014CN103514398A Real-time online log detection method and system
01/15/2014CN103514397A Server, terminal and authority management and permission method
01/15/2014CN103514396A Processing method and device for file / application program on mobile communication terminal
01/15/2014CN103514395A Plug-in right control method and system
01/15/2014CN103514394A Icon unlocking method of touch screen equipment and touch screen equipment
01/15/2014CN103514393A Method for achieving three-dimensional verification code