Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
01/2014
01/09/2014US20140013443 Location Sensitive Solid State Drive
01/09/2014US20140013442 Information monitoring apparatus and information monitoring method
01/09/2014US20140013441 Private Anonymous Electronic Messaging
01/09/2014US20140013440 User license calculation in a subscription based licensing system
01/09/2014US20140013438 Permit issuance apparatus and permit issuance method
01/09/2014US20140013437 Method and apparatus for secure display of visual content
01/09/2014US20140013436 System and method for enabling remote registry service security audits
01/09/2014US20140013433 Methods to dynamically establish overall national security for sensitivity classification...
01/09/2014US20140013430 Native Code Module Security for Arm Instruction Set Architectures
01/09/2014US20140013429 Method for processing an operating application program and device for the same
01/09/2014US20140013428 Apparatus and method for managing operation of a mobile device
01/09/2014US20140013427 System And Method Providing Dependency Networks Throughout Applications For Attack Resistance
01/09/2014US20140013426 Providing consistent security information
01/09/2014US20140013425 Method and apparatus for differential power analysis protection
01/09/2014US20140013424 Mobile terminal and application program login method thereof
01/09/2014US20140013423 Security model for network information service
01/09/2014US20140013422 Continuous Multi-factor Authentication
01/09/2014US20140013421 Debug architecture
01/09/2014US20140013420 Secure portable computer and security method
01/09/2014US20140013419 Electronic device for multiple users and login method thereof
01/09/2014US20140013418 Method and apparatus for making a decision on a card
01/09/2014US20140013417 Gesture input device and method for controlling gesture input device
01/09/2014US20140013416 Electronic device and method for releasing lock using element combining color and symbol
01/09/2014US20140013415 Automatic generation of security checks
01/09/2014US20140013414 User-rotatable three-dimensionally rendered object for unlocking a computing device
01/09/2014US20140013410 Access right management system, access right management method, and access right management program
01/09/2014US20140013408 Method for inputting a password into an electronic terminal
01/09/2014US20140013406 Embedded secure element for authentication, storage and transaction within a mobile terminal
01/09/2014US20140013405 Methods and systems for improving the accuracy performance of authentication systems
01/09/2014US20140013404 Trust Metrics on Shared Computers
01/09/2014US20140013396 Methods and apparatus for delegated authentication token retrieval
01/09/2014US20140013390 System and method for out-of-band application authentication
01/09/2014US20140013389 Communication blocking control apparatus and method thereof
01/09/2014US20140013388 Methods and systems for managing multiple information handling systems with a virtual keyboard-video-mouse interface
01/09/2014US20140013387 Efficient single sign-on and identity provider configuration and deployment in a database system
01/09/2014US20140013382 Options detection in security protocols
01/09/2014US20140013124 On-chip storage, creation, and manipulation of an encryption key
01/09/2014US20140013123 Data security using inter-zone gate circuits
01/09/2014US20140013122 Cipher text translation
01/09/2014US20140013119 Document modification detection and prevention
01/09/2014US20140013113 Secure non-invasive method and system for distribution of digital assets
01/09/2014US20140013112 Encrypting files within a cloud computing environment
01/09/2014US20140013042 Method for masking the end-of-life transition of an electronic device and device comprising a corresponding control module
01/09/2014US20140012833 Protection of data privacy in an enterprise system
01/09/2014US20140012596 Portable device for storing personal health record and method for controlling the same
01/09/2014US20140011582 Software verification and authentication
01/09/2014DE102013106295A1 Eingebettetes sicheres Element zur Authentifizierung, Speicherung und Transaktion in einem mobilen Endgerät Embedded secure element for authentication, store and transaction in a mobile terminal
01/09/2014DE102012211639A1 Cloud-Computing-Infrastruktur, Verfahren und Anwendung Cloud computing infrastructure, processes and applications
01/09/2014DE102012106081A1 Method for encrypted and anonymous storing and managing personal data and codes on separate systems, involves authorizing third parties by encrypted and transaction-referred transferred authorization request by user for transactions
01/09/2014DE102007063755B4 Fehlererkennungsschaltung und zugehöriges Betriebsverfahren und Computerprogrammprodukt Error detection circuit and associated operating method and computer program product
01/08/2014EP2683130A2 Social network protection system
01/08/2014EP2683127A1 Voucher authorization for cloud server
01/08/2014EP2682892A1 System and method for out-of- band application authentification
01/08/2014EP2682891A1 Electronic Device and Method for Releasing Lock Using Element Combining Color and Symbol
01/08/2014EP2682890A1 Site check method
01/08/2014EP2682889A1 User-rotatable three-dimensionally rendered object for unlocking a computing device
01/08/2014EP2682888A1 Policy arbitration method, policy arbitration server, and program
01/08/2014EP2682865A1 Method for communicating with a control programme of a control device and application modules for same
01/08/2014EP2681737A1 Non-authentic disc deactivation method
01/08/2014EP2681690A1 Provisioning user permissions using attribute-based access-control policies
01/08/2014EP2681689A2 Protecting operating system configuration values
01/08/2014EP2681688A1 Sharing user id between operating system and application
01/08/2014EP2681687A1 Method and apparatus for enforcing data privacy
01/08/2014EP2681686A1 System and method for watermarking content for tracking media consumption
01/08/2014EP2681685A1 Method for protecting a plurality of modules of an automation system
01/08/2014EP2681669A1 User interface and workflow for performing machine learning
01/08/2014CN203387525U Multifunctional identity authentication apparatus
01/08/2014CN203386215U Computer data information safety anti-theft device
01/08/2014CN203386214U Output system for passwords in dynamic token
01/08/2014CN203386213U Weak-current cabinet based on face recognition
01/08/2014CN203386212U Protection checking machine
01/08/2014CN103502994A Method for handling privacy data
01/08/2014CN103502993A Virtual computer system, confidential information protection method, and confidential information protection program
01/08/2014CN103502992A System and method for tamper-resistant booting
01/08/2014CN103502991A Determination of apparatus configuration and programming data
01/08/2014CN103502990A Systems and methods for in-memory processing of events
01/08/2014CN103502960A Encryption of memory device with wear leveling
01/08/2014CN103501292A Method and system for achieving data safety protection by using standby mobile phone
01/08/2014CN103500317A Novel anti-spy code keyboard
01/08/2014CN103500316A System and method for processing device with differentiated execution modes
01/08/2014CN103500315A System of reasonable classification and use permission distribution for information resources
01/08/2014CN103500314A Authorization control system construction method and device
01/08/2014CN103500313A System and method for preventing actual customer information from being leaked maliciously
01/08/2014CN103500312A Anti-flash method
01/08/2014CN103500311A Software testing method and system
01/08/2014CN103500310A Method and system for protecting electronic device
01/08/2014CN103500309A Method and device for detecting and killing macro virus
01/08/2014CN103500308A System and method for countering detection of emulation by malware
01/08/2014CN103500307A Mobile internet malignant application software detection method based on behavior model
01/08/2014CN103500306A Client terminal program monitoring method and device and client terminal
01/08/2014CN103500305A System and method for malicious code analysis based on cloud computing
01/08/2014CN103500304A Virtual machine personalized security monitoring system and method based on Xen
01/08/2014CN103500303A Information modifying system
01/08/2014CN103500302A System and method of safety lock hidden programs
01/08/2014CN103500301A Notebook computer controlled through NFC
01/08/2014CN103500300A User right verification method and device
01/08/2014CN103500299A Random electronic cipher system and method
01/08/2014CN103500298A Method for achieving authorization distribution based on rule management
01/08/2014CN103500297A Fine grit authority management method in information system
01/08/2014CN103500296A Inlaying method and device of digital watermarks in text documents