Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
11/28/2013 | WO2013174437A1 Enhanced secure virtual machine provisioning |
11/28/2013 | WO2013174397A1 Theft- prevention device for mobile phone |
11/28/2013 | WO2013174395A1 Remote key safe laptop anti theft |
11/28/2013 | WO2013174321A1 Command execution method and device, smart card and mobile terminal |
11/28/2013 | WO2013139692A3 Method for configuring a wind energy installation, and wind energy installation |
11/28/2013 | US20130318639 Security device for functional display, security, and charging of handheld electronic devices |
11/28/2013 | US20130318638 Method for Programming a Mobile End Device Chip |
11/28/2013 | US20130318637 Location-based recovery device and risk management system for portable computing devices and data |
11/28/2013 | US20130318636 Computer chassis with protection against insects |
11/28/2013 | US20130318634 Image forming apparatus, launching method of program in the apparatus, image forming system, and program and storage medium therefor |
11/28/2013 | US20130318633 Data exchange between applications of an electronic device |
11/28/2013 | US20130318632 Secure access to personal health records in emergency situations |
11/28/2013 | US20130318631 Fraud Prevention in Online Systems |
11/28/2013 | US20130318630 Systems and methods for validated secure data access |
11/28/2013 | US20130318628 Systems and Methods for Providing Access to Computer Programs Based on Physical Activity Level of a User |
11/28/2013 | US20130318627 Secure Handling of Information Related to a User |
11/28/2013 | US20130318626 Securing access to distributed data in an unsecure data network |
11/28/2013 | US20130318625 Method for protecting data stored in device and device thereof |
11/28/2013 | US20130318624 Method and device for controlling distribution of licenses |
11/28/2013 | US20130318623 Risk-management device |
11/28/2013 | US20130318622 Private information sharing system |
11/28/2013 | US20130318621 System and Method for Providing Information Access on a Portable Device |
11/28/2013 | US20130318620 Location-based recovery device and risk management system for portable computing devices and data |
11/28/2013 | US20130318619 Encapsulated security tokens for electronic transactions |
11/28/2013 | US20130318618 Systems and methods for securing information by hiding identity on a computing device |
11/28/2013 | US20130318616 Predicting attacks based on probabilistic game-theory |
11/28/2013 | US20130318615 Predicting attacks based on probabilistic game-theory |
11/28/2013 | US20130318614 Mobile application security assessment |
11/28/2013 | US20130318613 Mobile application security score calculation |
11/28/2013 | US20130318612 Rootkit monitoring agent built into an operating system kernel |
11/28/2013 | US20130318610 System and Method for Detection and Treatment of Malware on Data Storage Devices |
11/28/2013 | US20130318607 Using Power Fingerprinting (PFP) to Monitor the Integrity and Enhance Security of Computer Based Systems |
11/28/2013 | US20130318606 Systems and Methods for Correlating and Distributing Intrusion Alert Information Among Collaborating Computer Systems |
11/28/2013 | US20130318605 System for detecting rogue network protocol service providers |
11/28/2013 | US20130318601 Method and system for real time classification of events in computer integrity system |
11/28/2013 | US20130318600 Reporting and Management of Computer Systems and Data Sources |
11/28/2013 | US20130318599 Protecting virtual machine console from misuse, hijacking or eavesdropping in cloud environments |
11/28/2013 | US20130318598 Alternative Unlocking Patterns |
11/28/2013 | US20130318597 Computer implemented security method and system |
11/28/2013 | US20130318596 Password management system and method for electronic device |
11/28/2013 | US20130318595 Authenticate a Hypervisor with Encoded Information |
11/28/2013 | US20130318588 Identity verification systems and methods |
11/28/2013 | US20130318584 Learning information on usage by a user, of one or more device(s), for cumulative inference of user's situation |
11/28/2013 | US20130318583 System and method to enable external processing device running a cloud application to control a mail processing machine |
11/28/2013 | US20130318582 Inboxes for documents, music, videos, and photos |
11/28/2013 | US20130318581 Multi-factor authentication using a unique identification header (uidh) |
11/28/2013 | US20130318580 Security based on usage activity associated with user device |
11/28/2013 | US20130318578 Password management and smart honey pot system |
11/28/2013 | US20130318575 Method and apparatus for dynamic authentication |
11/28/2013 | US20130318573 Method and apparatus for guest access sharing |
11/28/2013 | US20130318572 Wireless gateway supporting public and private networks |
11/28/2013 | US20130318571 Managing distributed operating system physical resources |
11/28/2013 | US20130318569 Propagating Delegated Authorized Credentials Through Legacy Systems |
11/28/2013 | US20130318567 Reporting and Management of Computer Systems and Data Sources |
11/28/2013 | US20130318361 Encrypting and storing biometric information on a storage device |
11/28/2013 | US20130318360 Proxy computing system, computing apparatus, capability providing apparatus, proxy computing method, capability providing method, program, and recording medium |
11/28/2013 | US20130318359 Systems and methods for verifying uniqueness in anonymous authentication |
11/28/2013 | US20130318358 Apparatus for generating secure key using device and user authentication information |
11/28/2013 | US20130318357 System and Method for Secure Software Update |
11/28/2013 | US20130318356 Distribution of digital content protected by watermark-generating password |
11/28/2013 | US20130318354 Method for generating a certificate |
11/28/2013 | US20130318345 Multi-tunnel virtual private network |
11/28/2013 | US20130318339 Systems and Methods for Protecting Communications Between Nodes |
11/28/2013 | US20130318338 Selective Management Controller Authenticated Access Control to Host Mapped Resources |
11/28/2013 | US20130315394 Data encryption method, data verification method and electronic apparatus |
11/28/2013 | US20130315392 Method for displaying readable contents on a mobile reading device in a location-restricted manner |
11/28/2013 | US20130315387 Encryption method characterized by three dimensional computation, feedback control, and dynamic transition box |
11/28/2013 | DE102012010102A1 Verfahren und Vorrichtung zur Datenverarbeitung Method and device for data processing |
11/27/2013 | EP2667579A1 Mobile information terminal and gripping characteristics authentication method |
11/27/2013 | EP2667337A2 Transparent control of access invoking real-time analysis of the query history |
11/27/2013 | EP2667329A1 Authorized party authentication template learning system and authorized party authentication template learning method |
11/27/2013 | EP2667322A2 Microprocessor having a secure execution mode with provisions for monitoring, indicating, and managing security levels |
11/27/2013 | EP2667321A1 Method for requesting digital content, for providing digital content, and for producing a personal profile of a user |
11/27/2013 | EP2667320A1 Security verification device and security verification method |
11/27/2013 | EP2667319A2 Computer implemented security system and method |
11/27/2013 | EP2667318A1 Information processing apparatus, control method thereof, program, and image processing apparatus |
11/27/2013 | EP2667317A1 Image processing apparatus, method for controlling image processing apparatus, and program |
11/27/2013 | EP2667316A1 Electronic memory device |
11/27/2013 | EP2667315A1 Encrypted digital content player |
11/27/2013 | EP2667314A1 System and method for detection and treatment of malware on data storage devices |
11/27/2013 | EP2667303A2 Methods, architectures and security mechanisms for a third-party application to access content in a cloud-based platform |
11/27/2013 | EP2666117A1 Method for testing tamper protection of a field device and field device having tamper protection |
11/27/2013 | EP2666116A1 System and method for supporting jit in a secure system with randomly allocated memory ranges |
11/27/2013 | CN203311464U Dual-function security terminal for intelligent device |
11/27/2013 | CN203311424U Electronic lock of electronic notebook |
11/27/2013 | CN203311423U Display device and display system |
11/27/2013 | CN203311422U Local area network computer external-connection-prevention warning device |
11/27/2013 | CN203311421U Remote control equipment for encrypting or decrypting computer files |
11/27/2013 | CN203311420U Intelligent control USB key |
11/27/2013 | CN203311419U Novel computer information security device |
11/27/2013 | CN203311418U Mobile terminal with encrypted radio frequency |
11/27/2013 | CN203311417U Fingerprint password enter device |
11/27/2013 | CN103415856A Device and method for online storage, transmission device and method, and receiving device and method |
11/27/2013 | CN103415855A Mass storage device memory encryption methods, systems, and apparatus |
11/27/2013 | CN103414723A Pet-based socialization platform registration system |
11/27/2013 | CN103414570A Method for remotely controlling password |
11/27/2013 | CN103414564A Secrete key card, secrete key device and method for protecting private key |
11/27/2013 | CN103414555A Array key management method based on IO block encryption |
11/27/2013 | CN103413267A Digital watermark smooth transition embedded method and device |
11/27/2013 | CN103413202A Automatic authorization relation collection method applied to operation and maintenance auditing system |