Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
12/17/2013 | US8613042 Access control list conversion system, and method and program threrfor |
12/17/2013 | US8612777 Apparatus and method for writing data to be stored to a predetermined memory area |
12/17/2013 | US8612776 Storage control apparatus to which thin provisioning is applied |
12/17/2013 | US8612775 Computer system for managing storage area state of a storage system |
12/17/2013 | US8612774 Secure OTP using external memory |
12/17/2013 | US8612770 Biometric authentication method and computer system |
12/17/2013 | US8612769 Electronic signature method and device |
12/17/2013 | US8612768 Unique account identification |
12/17/2013 | US8612767 Obscuring an accelerometer signal |
12/17/2013 | US8612766 Secure credential unlock using trusted execution environments |
12/17/2013 | US8612765 Security based on subliminal and supraliminal channels for data objects |
12/17/2013 | US8612760 Decrypting identity key from battery with root key in host |
12/17/2013 | US8612755 Security policy in trusted computing systems |
12/17/2013 | US8612747 System and method for establishing historical usage-based hardware trust |
12/17/2013 | US8612744 Distributed firewall architecture using virtual machines |
12/17/2013 | US8612708 Hardware data protection device |
12/17/2013 | US8612492 Relationship collaboration system |
12/17/2013 | US8612356 Voucher code redemption via SMS |
12/17/2013 | US8612354 Method for controlling digital rights of the “Play N times” type for a digital audio and/or video content and device implementing this method |
12/17/2013 | US8610538 Memory-tag data authentication |
12/17/2013 | US8610454 System and methods for generating unclonable security keys in integrated circuits |
12/17/2013 | CA2587155C System and method for processing messages with encryptable message parts |
12/17/2013 | CA2511531C Protected media path and refusal response enabler |
12/12/2013 | WO2013185099A1 System and methods for determing decomposition graph complexity |
12/12/2013 | WO2013185020A1 Method and apparatus for unlocking an electronic device that allows for profile selection |
12/12/2013 | WO2013184799A1 Evaluating whether to block or allow installation of a software application |
12/12/2013 | WO2013184705A1 Method, apparatus and system of controlling remote login |
12/12/2013 | WO2013184653A1 Method and system for resilient and adaptive detection of malicious websites |
12/12/2013 | WO2013184567A1 Apparatus and method for forming secure computational resources |
12/12/2013 | WO2013184529A2 Malicious message detection and processing |
12/12/2013 | WO2013184523A1 Sql transformation-based optimization techniques for enforcement of data access control |
12/12/2013 | WO2013184501A1 Component analysis of software applications on computing devices |
12/12/2013 | WO2013184365A1 System management using messages |
12/12/2013 | WO2013184281A1 Kernel-level security agent |
12/12/2013 | WO2013184267A1 Enhanced 2chk authentication security with query transactions |
12/12/2013 | WO2013184266A2 Enhanced 2chk authentication security with query transactions |
12/12/2013 | WO2013184265A1 Enterprise triggered 2chk association |
12/12/2013 | WO2013184016A1 Method for carrying out secure communication in computer networks (variants) |
12/12/2013 | WO2013183250A1 Information processing device for anonymization and anonymization method |
12/12/2013 | WO2013183083A1 Storage system and storage system management method |
12/12/2013 | WO2013183039A2 Clickjacking protection |
12/12/2013 | WO2013183012A1 Off-line content delivery |
12/12/2013 | WO2013183010A1 Auxiliary input device for encrypted data entry |
12/12/2013 | WO2013182639A1 Method of anonymization |
12/12/2013 | WO2013182632A1 Random number distribution |
12/12/2013 | WO2013182417A1 Method of managing a memory embedded in an electronic token |
12/12/2013 | WO2013182376A1 Method and system for executing a secure application on an untrusted user equipment |
12/12/2013 | WO2013182286A1 Secure data processing |
12/12/2013 | WO2013182285A1 Secure data processing |
12/12/2013 | WO2013182154A1 Method, system and terminal for encrypting/decrypting application program on communication terminal |
12/12/2013 | WO2013182131A1 Configuration method, configuration apparatus and electronic device |
12/12/2013 | WO2013182119A1 Screen unlocking method, device and terminal |
12/12/2013 | WO2013182073A1 Method and system for identifying file security and storage medium |
12/12/2013 | WO2013182048A1 Malware removal method and system, and computer storage medium |
12/12/2013 | WO2013182008A1 Computer health index display apparatus and method |
12/12/2013 | WO2013182006A1 Method and device for use in intercepting call for service by application |
12/12/2013 | WO2013182005A1 Method and device for use in intercepting call for service by application |
12/12/2013 | WO2013181938A1 Media playing method and device |
12/12/2013 | WO2013181682A1 Method and device for control of a lock mechanism using a mobile terminal |
12/12/2013 | WO2013070773A3 Methods, devices, and systems for detecting return-oriented programming exploits |
12/12/2013 | US20130333056 System and method for changing abilities of a process |
12/12/2013 | US20130333054 Post-download patient data protection in a medical device |
12/12/2013 | US20130333053 Method for protecting firmware being updated |
12/12/2013 | US20130333052 Information processing system, information processing apparatus, and computer-readable storage medium |
12/12/2013 | US20130333051 Random value identification device, random value identification system, and random value identification method |
12/12/2013 | US20130333050 Method for producing a secured data object and system |
12/12/2013 | US20130333049 Data protection method for portable electronic device and computer program product for the same |
12/12/2013 | US20130333046 System and method of automatically detecting outliers in usage patterns |
12/12/2013 | US20130333045 Security level visualization device |
12/12/2013 | US20130333044 Vulnerability-based remediation selection |
12/12/2013 | US20130333043 Mechanism to Calculate Probability of a Cyber Security Incident |
12/12/2013 | US20130333042 Storage system and storage system management method |
12/12/2013 | US20130333041 Method and Apparatus for Automatic Identification of Affected Network Resources After a Computer Intrusion |
12/12/2013 | US20130333040 Kernel-Level Security Agent |
12/12/2013 | US20130333039 Evaluating Whether to Block or Allow Installation of a Software Application |
12/12/2013 | US20130333037 Methods, systems, and media for detecting covert malware |
12/12/2013 | US20130333036 System, method and program for identifying and preventing malicious intrusions |
12/12/2013 | US20130333034 Method and Apparatus for Automatic Identification of Affected Network Resources After a Computer Intrusion |
12/12/2013 | US20130333033 Software protection mechanism |
12/12/2013 | US20130333032 Network based device security and controls |
12/12/2013 | US20130333031 Dynamic code insertion and removal for static analysis based sandboxes |
12/12/2013 | US20130333027 Dynamic rights assignment |
12/12/2013 | US20130333026 Malicious message detection and processing |
12/12/2013 | US20130333025 System and method for role based analysis and access control |
12/12/2013 | US20130333024 Random value identification device, random value identification system, and random value identification method |
12/12/2013 | US20130333023 Electronic paper with mode switch unit |
12/12/2013 | US20130333022 Sharing Content Online |
12/12/2013 | US20130333021 Preventing malicious software from utilizing access rights |
12/12/2013 | US20130333020 Method and Apparatus for Unlocking an Electronic Device that Allows for Profile Selection |
12/12/2013 | US20130333010 Enhancing Password Protection |
12/12/2013 | US20130333009 Dynamic trust connection |
12/12/2013 | US20130333008 Enhanced 2chk authentication security with query transactions |
12/12/2013 | US20130333006 Enterprise triggered 2chk association |
12/12/2013 | US20130333004 Client computer, remote control system, and remote control method |
12/12/2013 | US20130333003 Systems and methods for implementing multi-factor authentication |
12/12/2013 | US20130333002 Dynamic authentication in alternate operating environment |
12/12/2013 | US20130332997 Computerized system and method for deployment of management tunnels |
12/12/2013 | US20130332996 System and process for managing network communications |
12/12/2013 | US20130332995 System and method for using machine readable code to commission device applications |
12/12/2013 | US20130332992 Methods and systems for identifying a trustable workflow based on a comprehensive trust model |