Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
01/2014
01/08/2014CN103500295A Method preventing copying of source codes by identifying ID dynamically
01/08/2014CN103500294A Document encrypting and decrypting method and device
01/08/2014CN103500202A Security protection method and system for light-weight database
01/08/2014CN103500201A Self-service machine for individual credit report
01/08/2014CN103500114A Method and device for installing application program
01/08/2014CN103500101A Method and device for locking screen and terminal
01/08/2014CN103500008A Thermal imaging interface method and device used for controlling computer program
01/08/2014CN103499996A Novel notebook computer
01/08/2014CN102077545B Personal security manager for ubiquitous patient monitoring
01/08/2014CN101809580B Dynamic media zones systems and methods
01/08/2014CN101751529B Method and apparatus for the secure processing of confidential content within a virtual machine of a processor
01/07/2014USRE44697 Encryption processor with shared memory interconnect
01/07/2014US8627506 Providing privacy settings for applications associated with a user profile
01/07/2014US8627496 Computer-readable medium for providing access to verified personal background data
01/07/2014US8627494 Classification separation router
01/07/2014US8627493 Single sign-on for network applications
01/07/2014US8627489 Distributed document version control
01/07/2014US8627488 Methods and apparatus to anonymize a dataset of spatial data
01/07/2014US8627487 Method and apparatus for providing DRM service
01/07/2014US8627484 Unauthorized location detection and countermeasures
01/07/2014US8627482 Method, apparatus and system for secure distribution of content
01/07/2014US8627479 System and method for network security including detection of attacks through partner websites
01/07/2014US8627473 Peer-to-peer (P2P) botnet tracking at backbone level
01/07/2014US8627465 Automatic inference of whitelist-based validation as part of static analysis for security
01/07/2014US8627458 Detecting malicious computer program activity using external program calls with dynamic rule sets
01/07/2014US8627457 Integrated security system
01/07/2014US8627456 Methods and systems for preventing access to display graphics generated by a trusted virtual machine
01/07/2014US8627455 Manufacturing method of a memory device to be authenticated
01/07/2014US8627452 System and method for providing network security to mobile devices
01/07/2014US8627451 Systems and methods for providing an isolated execution environment for accessing untrusted content
01/07/2014US8627446 Federating data between groups of servers
01/07/2014US8627444 Computers and microchips with a faraday cage, with a side protected by an internal hardware firewall and unprotected side connected to the internet for network operations, and with internal hardware compartments
01/07/2014US8627439 Processing communication events in a communications system
01/07/2014US8627437 Method for reading attributes from an ID token
01/07/2014US8627435 Customizable sign-on service
01/07/2014US8627422 Authentication in secure user plane location (SUPL) systems
01/07/2014US8627420 Apparatus for associating a client device or service with a wireless network
01/07/2014US8627419 Multiple image reverse turing test
01/07/2014US8627415 System and method for secure commercial multimedia rental and distribution over secure connections
01/07/2014US8627406 Device for protection of the data and executable codes of a computer system
01/07/2014US8627405 Policy and compliance management for user provisioning systems
01/07/2014US8627402 Evaluation systems and methods for coordinating software agents
01/07/2014US8627338 Rights object acquisition method of mobile terminal in digital right management system
01/07/2014US8627293 Detecting applications in a virtualization environment
01/07/2014US8627271 Reusable business sub-processes and run-time assembly
01/07/2014US8627131 Hardware countermeasure against cryptographic attack
01/07/2014US8627105 Method and apparatus for securing programming data of a programmable device
01/07/2014US8627103 Identity-based encryption of data items for secure access thereto
01/07/2014US8627100 Separate type mass data encryption/decryption apparatus and implementing method therefor
01/07/2014US8627098 Electronic device and method for verifying firmware of the electronic device
01/07/2014US8627097 System and method enabling parallel processing of hash functions using authentication checkpoint hashes
01/07/2014US8627096 System and method for providing secure access to an electronic device using both a screen gesture and facial biometrics
01/07/2014US8627095 Information processing apparatus, information processing method, and program
01/07/2014US8627086 Secure loading and storing of data in a data processing device
01/07/2014US8627079 Method and system for controlling a device
01/07/2014US8627069 System and method for securing a computer comprising a microkernel
01/07/2014US8627053 Method and apparatus for secure execution using a secure memory partition
01/07/2014US8626915 Routing method
01/07/2014US8626842 Content transaction management server device, content-providing server device, and terminal device and control program
01/07/2014US8626806 Method and system for managing execution of virtual applications
01/07/2014US8626712 Logging and analyzing computer user's context data
01/07/2014US8626669 Secure physical billing system
01/07/2014US8626668 Individualized digital media delivery systems
01/07/2014US8625838 Cardless financial transactions system
01/07/2014US8625806 Data-processing apparatus and method for processing data
01/07/2014US8625797 Releasing a service on an electronic appliance
01/07/2014US8625780 Reduction of side-channel information by interacting crypto blocks
01/07/2014US8624842 Projected and secured virtual keyboard
01/07/2014US8623099 System and method for securing data within a storage system
01/07/2014US8622310 Token comprising improved physical unclonable function
01/07/2014CA2793810C Method and system for securing data utilizing redundant secure key storage
01/07/2014CA2694921C Safety console
01/06/2014CA2820060A1 Method for authenticating a signature
01/06/2014CA2819835A1 User-rotatable three-dimensionally rendered object for unlocking a computing device
01/06/2014CA2819767A1 Methods and systems for improving the accuracy performance of authentication systems
01/03/2014WO2014005148A1 System and method for establishing and monetizing trusted identities in cyberspace with personal data service and user console
01/03/2014WO2014005004A1 Proximity aware security system for portable electronics with multi-factor user authentication and secure device identity verification
01/03/2014WO2014004926A1 Methods and systems for secure in-network insertion of web content and web services
01/03/2014WO2014004862A1 Secure printing in a cloud-based print system
01/03/2014WO2014004821A1 Preventing attacks on devices with multiple cpus
01/03/2014WO2014004631A1 Biometric initiated communication
01/03/2014WO2014004590A2 End-to-end trusted communications infrastructure
01/03/2014WO2014004556A1 Automatic association of authentication credentials with biometrics
01/03/2014WO2014004553A1 Access credential reader connector
01/03/2014WO2014004541A1 Expedited biometric validation
01/03/2014WO2014004533A1 Secure user presence detection and authentication
01/03/2014WO2014004412A1 Identity risk score generation and implementation
01/03/2014WO2014004406A1 Method, system, and device for securely handling virtual function driver communications with a physical function driver
01/03/2014WO2014004404A1 Mobile platform software update with secure authentication
01/03/2014WO2014004399A1 Method and system for data security utilizing user behavior and device identification
01/03/2014WO2014004313A1 System and method for embedding first party widgets in third party applications
01/03/2014WO2014004212A1 Timer for hardware protection of virtual machine monitor runtime integrity watcher
01/03/2014WO2014004135A1 Techniques for user-validated close-range mutual authentication
01/03/2014WO2014004128A1 Devices, systems, and methods for monitoring and asserting trust level using persistent trust log
01/03/2014WO2014004123A1 Methods and apparatus for a secure sleep state
01/03/2014WO2014004093A1 Authenticating a user of a system via an authentication image mechanism
01/03/2014WO2014004038A1 Keyboard as biometric authentication device
01/03/2014WO2014003978A1 Real human detection and confirmation in personal credential verification
01/03/2014WO2014003900A1 Social sharing of security information in a group
01/03/2014WO2014003521A1 Access method for decoding encryption data