Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
10/31/2013 | WO2013163487A1 Retrieving content from website through sandbox |
10/31/2013 | WO2013163285A1 Fraud resistant passcode entry system |
10/31/2013 | WO2013163273A1 Security method and apparatus having digital and analog components |
10/31/2013 | WO2013163164A1 Application-specific file type generation and use |
10/31/2013 | WO2013163098A1 Systems and methods for controlling output of content based on human recognition data detection |
10/31/2013 | WO2013162941A1 Automatic user swap |
10/31/2013 | WO2013162843A1 Tamper respondent covering |
10/31/2013 | WO2013162778A1 Identity verification |
10/31/2013 | WO2013162434A1 Method and system for controlled communication between applications |
10/31/2013 | WO2013162402A1 Digital information protection method |
10/31/2013 | WO2013162296A1 Passcode operating system, passcode apparatus, and super-passcode generating method |
10/31/2013 | WO2013162208A1 Scalable and secure application resource management and access control for multicore operating systems |
10/31/2013 | WO2013161974A1 Method for distributing and executing application program capable of detecting falsification |
10/31/2013 | WO2013161635A1 Information processing apparatus, authentication system, authentication method, and program |
10/31/2013 | WO2013161586A1 Encrypted database system, client terminal, database server, connecting method, and program |
10/31/2013 | WO2013161371A1 Program providing device, system, program providing method and program |
10/31/2013 | WO2013161297A1 Medical information authentication system |
10/31/2013 | WO2013161212A1 Policy-based dynamic information flow controlon mobile devices |
10/31/2013 | WO2013160766A2 Data manager centralized storage for multiple service applications |
10/31/2013 | WO2013160765A2 Cyber security analyzer |
10/31/2013 | WO2013160575A1 Cyclic redundancy check method with protection from side channel attacks |
10/31/2013 | WO2013160539A1 Method and apparatus for privacy protection in images |
10/31/2013 | WO2013160320A1 An electronic educational device comprising a user recognition unit |
10/31/2013 | WO2013160309A1 Industrial automation and control device user access |
10/31/2013 | WO2013160032A1 Method for establishing the originality of a component |
10/31/2013 | WO2013160009A1 Method and device for recognizing a manipulation on an electrical line |
10/31/2013 | WO2013159632A1 Method, firewall, terminal and readable storage medium for implementing security protection |
10/31/2013 | WO2013159609A1 Security device and display method thereof |
10/31/2013 | WO2013159607A1 Security detection method and system |
10/31/2013 | WO2013159466A1 Method for processing digital rights management file, terminal device, and cloud |
10/31/2013 | WO2013130561A3 Method of operating a computing device, computing device and computer program |
10/31/2013 | US20130291131 Approaches for a location aware client |
10/31/2013 | US20130291130 Protection of Memory Field Using Illegal Values |
10/31/2013 | US20130291129 Accepting third party content contributions |
10/31/2013 | US20130291128 Anonymizing apparatus and anonymizing method |
10/31/2013 | US20130291125 Method and Apparatus for Facilitating the Transfer of a Software License between Computer Systems |
10/31/2013 | US20130291124 Method and System for Managing Data in a Communication Network |
10/31/2013 | US20130291123 Privacy management across multiple devices |
10/31/2013 | US20130291122 Document security |
10/31/2013 | US20130291119 Packaged digital rights messaging |
10/31/2013 | US20130291118 Protecting privacy data in mapreduce system |
10/31/2013 | US20130291117 Protecting address resolution protocol neighbor discovery cache against denial of service attacks |
10/31/2013 | US20130291116 Method for External Storage of Medical Device Program Design Parameters |
10/31/2013 | US20130291115 System and method for logging security events for an industrial control system |
10/31/2013 | US20130291114 Methods, systems, and computer readable media for combining ip fragmentation evasion techniques |
10/31/2013 | US20130291113 Process flow optimized directed graph traversal |
10/31/2013 | US20130291112 Architecture for removable media usb-arm |
10/31/2013 | US20130291111 Method and Device for Program Identification Based on Machine Learning |
10/31/2013 | US20130291110 Systems and methods for providing anti-malware protection and malware forensics on storage devices |
10/31/2013 | US20130291108 Apparatus and method for detecting traffic flooding attack and conducting in-depth analysis using data mining |
10/31/2013 | US20130291107 System and Method for Mitigating Application Layer Distributed Denial of Service Attacks Using Human Behavior Analysis |
10/31/2013 | US20130291106 Enterprise level information alert system |
10/31/2013 | US20130291103 System and Method for Run-Time Attack Prevention |
10/31/2013 | US20130291101 Detecting and blocking domain name system cache poisoning attacks |
10/31/2013 | US20130291100 Detection And Prevention Of Machine-To-Machine Hijacking Attacks |
10/31/2013 | US20130291099 Notification services with anomaly detection |
10/31/2013 | US20130291098 Determining trust between parties for conducting business transactions |
10/31/2013 | US20130291097 Mobile information terminal, gripping-feature learning method, and gripping-feature authentication method |
10/31/2013 | US20130291096 Fraud resistant passcode entry system |
10/31/2013 | US20130291095 Security device and display method thereof |
10/31/2013 | US20130291094 Systems and methods for securing controllers |
10/31/2013 | US20130291093 Automatic user swap |
10/31/2013 | US20130291092 Security Method and Apparatus Having Digital and Analog Components |
10/31/2013 | US20130291091 Location Bound Secure Domains |
10/31/2013 | US20130291090 Identifying user by measuring pressure of button presses on user input device |
10/31/2013 | US20130291089 Data communication method and device and data interaction system based on browser |
10/31/2013 | US20130291087 Systems and methods for integrating cloud services with information management systems |
10/31/2013 | US20130291085 Systems and methods for secure operation of an industrial controller |
10/31/2013 | US20130291081 System and method for computer authentication using image analysis of a shared secret |
10/31/2013 | US20130291080 Systems and methods for data access protection |
10/31/2013 | US20130291079 System and method for posting content to network sites |
10/31/2013 | US20130291076 Dynamic replacement of security credentials for secure proxying |
10/31/2013 | US20130291073 Multi-stack subscriber sign on |
10/31/2013 | US20130291068 Managing Cloud Zones |
10/31/2013 | US20130291067 Identification of Unauthorized or Misconfigured Wireless Access Point Using Distributed Endpoints |
10/31/2013 | US20130291066 Method and apparatus to keep consistency of acls among a meta data server and data servers |
10/31/2013 | US20130291065 Gathering gamification data from business applications |
10/31/2013 | US20130291064 Authentication using lights-out management credentials |
10/31/2013 | US20130291063 Identification of Unauthorized or Misconfigured Wireless Access Point Using Distributed Endpoints |
10/31/2013 | US20130291062 Secure Administration of Virtual Machines |
10/31/2013 | US20130291060 Security facility for maintaining health care data pools |
10/31/2013 | US20130291059 System and method for using partial evaluation for efficient remote attribute retrieval |
10/31/2013 | US20130291057 Security system and method for controlling interactions between components of a computer system |
10/31/2013 | US20130291054 Method and apparatus for providing audio or video capture functionality according to a security policy |
10/31/2013 | US20130291053 Security Controlled Multi-Processor System |
10/31/2013 | US20130291052 Trusted public infrastructure grid cloud |
10/31/2013 | US20130291051 System call interception |
10/31/2013 | US20130290961 Multiple Mode Mobile Device |
10/31/2013 | US20130290958 System and method for on-demand cloning of virtual machines |
10/31/2013 | US20130290738 Memory chip |
10/31/2013 | US20130290737 Method of distributing a decryption key in fixed-content data |
10/31/2013 | US20130290736 Data storage device, data control device and method for encrypting data |
10/31/2013 | US20130290735 Authentication device and system |
10/31/2013 | US20130290729 Systems and methods for controlling file execution for industrial control systems |
10/31/2013 | US20130290727 Encrypting operating system |
10/31/2013 | US20130290726 Methods for secure restoration of personal identity credentials into electronic devices |
10/31/2013 | US20130290720 Process and system for selectable data transmission |
10/31/2013 | US20130290717 Method and system for providing continued access to authentication and encryption services |
10/31/2013 | US20130290709 Policy-based dynamic information flow control on mobile devices |
10/31/2013 | US20130290705 Method and apparatus for on-site authorisation |