Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
01/08/2014 | CN103500295A Method preventing copying of source codes by identifying ID dynamically |
01/08/2014 | CN103500294A Document encrypting and decrypting method and device |
01/08/2014 | CN103500202A Security protection method and system for light-weight database |
01/08/2014 | CN103500201A Self-service machine for individual credit report |
01/08/2014 | CN103500114A Method and device for installing application program |
01/08/2014 | CN103500101A Method and device for locking screen and terminal |
01/08/2014 | CN103500008A Thermal imaging interface method and device used for controlling computer program |
01/08/2014 | CN103499996A Novel notebook computer |
01/08/2014 | CN102077545B Personal security manager for ubiquitous patient monitoring |
01/08/2014 | CN101809580B Dynamic media zones systems and methods |
01/08/2014 | CN101751529B Method and apparatus for the secure processing of confidential content within a virtual machine of a processor |
01/07/2014 | USRE44697 Encryption processor with shared memory interconnect |
01/07/2014 | US8627506 Providing privacy settings for applications associated with a user profile |
01/07/2014 | US8627496 Computer-readable medium for providing access to verified personal background data |
01/07/2014 | US8627494 Classification separation router |
01/07/2014 | US8627493 Single sign-on for network applications |
01/07/2014 | US8627489 Distributed document version control |
01/07/2014 | US8627488 Methods and apparatus to anonymize a dataset of spatial data |
01/07/2014 | US8627487 Method and apparatus for providing DRM service |
01/07/2014 | US8627484 Unauthorized location detection and countermeasures |
01/07/2014 | US8627482 Method, apparatus and system for secure distribution of content |
01/07/2014 | US8627479 System and method for network security including detection of attacks through partner websites |
01/07/2014 | US8627473 Peer-to-peer (P2P) botnet tracking at backbone level |
01/07/2014 | US8627465 Automatic inference of whitelist-based validation as part of static analysis for security |
01/07/2014 | US8627458 Detecting malicious computer program activity using external program calls with dynamic rule sets |
01/07/2014 | US8627457 Integrated security system |
01/07/2014 | US8627456 Methods and systems for preventing access to display graphics generated by a trusted virtual machine |
01/07/2014 | US8627455 Manufacturing method of a memory device to be authenticated |
01/07/2014 | US8627452 System and method for providing network security to mobile devices |
01/07/2014 | US8627451 Systems and methods for providing an isolated execution environment for accessing untrusted content |
01/07/2014 | US8627446 Federating data between groups of servers |
01/07/2014 | US8627444 Computers and microchips with a faraday cage, with a side protected by an internal hardware firewall and unprotected side connected to the internet for network operations, and with internal hardware compartments |
01/07/2014 | US8627439 Processing communication events in a communications system |
01/07/2014 | US8627437 Method for reading attributes from an ID token |
01/07/2014 | US8627435 Customizable sign-on service |
01/07/2014 | US8627422 Authentication in secure user plane location (SUPL) systems |
01/07/2014 | US8627420 Apparatus for associating a client device or service with a wireless network |
01/07/2014 | US8627419 Multiple image reverse turing test |
01/07/2014 | US8627415 System and method for secure commercial multimedia rental and distribution over secure connections |
01/07/2014 | US8627406 Device for protection of the data and executable codes of a computer system |
01/07/2014 | US8627405 Policy and compliance management for user provisioning systems |
01/07/2014 | US8627402 Evaluation systems and methods for coordinating software agents |
01/07/2014 | US8627338 Rights object acquisition method of mobile terminal in digital right management system |
01/07/2014 | US8627293 Detecting applications in a virtualization environment |
01/07/2014 | US8627271 Reusable business sub-processes and run-time assembly |
01/07/2014 | US8627131 Hardware countermeasure against cryptographic attack |
01/07/2014 | US8627105 Method and apparatus for securing programming data of a programmable device |
01/07/2014 | US8627103 Identity-based encryption of data items for secure access thereto |
01/07/2014 | US8627100 Separate type mass data encryption/decryption apparatus and implementing method therefor |
01/07/2014 | US8627098 Electronic device and method for verifying firmware of the electronic device |
01/07/2014 | US8627097 System and method enabling parallel processing of hash functions using authentication checkpoint hashes |
01/07/2014 | US8627096 System and method for providing secure access to an electronic device using both a screen gesture and facial biometrics |
01/07/2014 | US8627095 Information processing apparatus, information processing method, and program |
01/07/2014 | US8627086 Secure loading and storing of data in a data processing device |
01/07/2014 | US8627079 Method and system for controlling a device |
01/07/2014 | US8627069 System and method for securing a computer comprising a microkernel |
01/07/2014 | US8627053 Method and apparatus for secure execution using a secure memory partition |
01/07/2014 | US8626915 Routing method |
01/07/2014 | US8626842 Content transaction management server device, content-providing server device, and terminal device and control program |
01/07/2014 | US8626806 Method and system for managing execution of virtual applications |
01/07/2014 | US8626712 Logging and analyzing computer user's context data |
01/07/2014 | US8626669 Secure physical billing system |
01/07/2014 | US8626668 Individualized digital media delivery systems |
01/07/2014 | US8625838 Cardless financial transactions system |
01/07/2014 | US8625806 Data-processing apparatus and method for processing data |
01/07/2014 | US8625797 Releasing a service on an electronic appliance |
01/07/2014 | US8625780 Reduction of side-channel information by interacting crypto blocks |
01/07/2014 | US8624842 Projected and secured virtual keyboard |
01/07/2014 | US8623099 System and method for securing data within a storage system |
01/07/2014 | US8622310 Token comprising improved physical unclonable function |
01/07/2014 | CA2793810C Method and system for securing data utilizing redundant secure key storage |
01/07/2014 | CA2694921C Safety console |
01/06/2014 | CA2820060A1 Method for authenticating a signature |
01/06/2014 | CA2819835A1 User-rotatable three-dimensionally rendered object for unlocking a computing device |
01/06/2014 | CA2819767A1 Methods and systems for improving the accuracy performance of authentication systems |
01/03/2014 | WO2014005148A1 System and method for establishing and monetizing trusted identities in cyberspace with personal data service and user console |
01/03/2014 | WO2014005004A1 Proximity aware security system for portable electronics with multi-factor user authentication and secure device identity verification |
01/03/2014 | WO2014004926A1 Methods and systems for secure in-network insertion of web content and web services |
01/03/2014 | WO2014004862A1 Secure printing in a cloud-based print system |
01/03/2014 | WO2014004821A1 Preventing attacks on devices with multiple cpus |
01/03/2014 | WO2014004631A1 Biometric initiated communication |
01/03/2014 | WO2014004590A2 End-to-end trusted communications infrastructure |
01/03/2014 | WO2014004556A1 Automatic association of authentication credentials with biometrics |
01/03/2014 | WO2014004553A1 Access credential reader connector |
01/03/2014 | WO2014004541A1 Expedited biometric validation |
01/03/2014 | WO2014004533A1 Secure user presence detection and authentication |
01/03/2014 | WO2014004412A1 Identity risk score generation and implementation |
01/03/2014 | WO2014004406A1 Method, system, and device for securely handling virtual function driver communications with a physical function driver |
01/03/2014 | WO2014004404A1 Mobile platform software update with secure authentication |
01/03/2014 | WO2014004399A1 Method and system for data security utilizing user behavior and device identification |
01/03/2014 | WO2014004313A1 System and method for embedding first party widgets in third party applications |
01/03/2014 | WO2014004212A1 Timer for hardware protection of virtual machine monitor runtime integrity watcher |
01/03/2014 | WO2014004135A1 Techniques for user-validated close-range mutual authentication |
01/03/2014 | WO2014004128A1 Devices, systems, and methods for monitoring and asserting trust level using persistent trust log |
01/03/2014 | WO2014004123A1 Methods and apparatus for a secure sleep state |
01/03/2014 | WO2014004093A1 Authenticating a user of a system via an authentication image mechanism |
01/03/2014 | WO2014004038A1 Keyboard as biometric authentication device |
01/03/2014 | WO2014003978A1 Real human detection and confirmation in personal credential verification |
01/03/2014 | WO2014003900A1 Social sharing of security information in a group |
01/03/2014 | WO2014003521A1 Access method for decoding encryption data |