Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
10/2013
10/24/2013US20130283372 Mobile information terminal, gripping-feature learning method and gripping-feature authentication method
10/24/2013US20130283371 Method and device for controlling access to a computer system
10/24/2013US20130283370 Method and system for monitoring calls to an application program interface (api) function
10/24/2013US20130283369 Providing A Multi-Phase Lockstep Integrity Reporting Mechanism
10/24/2013US20130283368 Scalable and secure application resource management and access control for multicore operating systems
10/24/2013US20130283367 Method of managing virtual computer, computer system and computer
10/24/2013US20130283364 Distributed virtual switch architecture for a hybrid cloud
10/24/2013US20130283363 Secure data transfer over an arbitrary public or private transport
10/24/2013US20130283362 Authenticating user through web extension using token based authentication scheme
10/24/2013US20130283360 Distributed group temporal key (gtk) state management
10/24/2013US20130283356 Role-based attribute based access control (rabac)
10/24/2013US20130283351 Method and apparatus for configuring services based on touch selection
10/24/2013US20130283350 Access authorization
10/24/2013US20130283349 Authentication method and electronic device
10/24/2013US20130283344 Methods for restricting resources used by a program based on entitlements
10/24/2013US20130283343 Enforcing Universal Access Control in an Information Management System
10/24/2013US20130283340 Optimized policy matching and evaluation for non-hierarchical resources
10/24/2013US20130283339 Optimized policy matching and evaluation for hierarchical resources
10/24/2013US20130283338 Policy Management of Multiple Security Domains
10/24/2013US20130283337 Predicting next characters in password generation
10/24/2013US20130283336 Cyber security analyzer
10/24/2013US20130283335 Systems and methods for applying policy wrappers to computer applications
10/24/2013US20130283302 Data storage and access systems
10/24/2013US20130283065 Secure data parser method and system
10/24/2013US20130283064 Method and apparatus to process sha-1 secure hashing algorithm
10/24/2013US20130283063 Digital identity device
10/24/2013US20130283062 Preserving redundancy in data deduplication systems by encryption
10/24/2013US20130283061 Image processing method and apparatus for privacy protection of captured image
10/24/2013US20130283059 Data masking
10/24/2013US20130283052 Electronic rental service system and method for digital content
10/24/2013US20130283049 Method and devices for providing secure data backup from a mobile communication device to an external computing device
10/24/2013US20130283048 Computing device and method for protecting software of the computing device
10/24/2013US20130283042 Trust Information Delivery Scheme for Certificate Validation
10/24/2013US20130283034 Systems and methods using one time pads during the exchange of cryptographic material
10/24/2013US20130282934 Methods and Systems for Protecting Data in USB Systems
10/24/2013US20130282762 Method, secure device, system and computer program product for securely managing user access to a file system
10/24/2013US20130282723 Maintaining A Historical Record Of Anonymized User Profile Data By Location For Users In A Mobile Environment
10/24/2013US20130282711 Methods, Systems, and Products for Assessing Risks of Internet Searches
10/24/2013US20130282589 Multi-factor mobile transaction authentication
10/24/2013US20130282534 Data storage and access systems
10/24/2013US20130279765 Method for Enabling Authentication or Identification, and Related Verification System
10/24/2013US20130278724 Method and apparatus for recognizing three-dimensional object
10/24/2013DE102012206536A1 Verfahren zum Ausgeben mindestens einer Bedieninformation für ein Produkt Method of outputting at least one control information for a product
10/24/2013DE102012103454A1 Data storage medium i.e. portable hard disk, for use with e.g. notebook to identification data by professional manager, has data key providing access to data only during positive evaluation of data key
10/24/2013DE102010038179B4 Individuelle Aktualisierung von Computerprogrammen Individual updating of computer programs
10/24/2013CA2813855A1 Methods and systems for conducting smart card transactions
10/23/2013EP2654277A2 Method for outputting at least one set of control information for a product
10/23/2013EP2653994A2 Information security techniques including detection, interdiction and/or mitigation of memory injection attacks
10/23/2013EP2653993A1 Method and system for locking an electronic device
10/23/2013EP2653992A1 Microcontroller configured for external memory decryption
10/23/2013EP2652902A1 Method and apparatus to create and manage a differentiated security framework for content oriented networks
10/23/2013EP2652666A1 Storage drive based antimalware methods and apparatuses
10/23/2013EP2652665A1 Portable data storage medium with control error counter
10/23/2013EP2652664A1 Dynamic method of controlling the integrity of the execution of an excutable code
10/23/2013EP2652663A1 Software signing certificate reputation model
10/23/2013EP2652662A1 Method for transmitting data in an encrypted manner from a mobile data storage medium to a stationary device and data encryption adapter
10/23/2013EP2652661A1 Method for changing an operating mode of a mobile device
10/23/2013EP2652646A1 Distributed file systems
10/23/2013EP2652635A1 Providing a customized application to a user terminal
10/23/2013EP2652608A2 A communication protocol between a high-level language and a native language
10/23/2013CN203250378U Antitheft device of notebook computer
10/23/2013CN203250318U Computer security control system
10/23/2013CN203250317U Mobile memorizer capable of identifying fingerprints
10/23/2013CN203250316U High security computer case
10/23/2013CN203249100U Lamp with camera shooting function and storing function
10/23/2013CN103370718A Data protection using distributed security key
10/23/2013CN103370717A Always-available embedded theft reaction subsystem
10/23/2013CN103370716A Using power fingerprinting (PFP) to monitor the integrity and enhance security of computer based systems
10/23/2013CN103370715A System and method for securing virtual computing environments
10/23/2013CN103370713A Method for programming a mobile terminal chip
10/23/2013CN103370706A Distributed file systems
10/23/2013CN103369520A Intention prejudging system and method for application program suspicious behavior of mobile terminal
10/23/2013CN103369018A Memory system and wireless communication method by memory system
10/23/2013CN103368987A Cloud server, application program verification, certification and management system and application program verification, certification and management method
10/23/2013CN103368970A Automation security detection method for network target
10/23/2013CN103368745A User identity strong authentication method for educational information resource guarantee
10/23/2013CN103368740A Digital rights managment system, devices, and methods for binding content to an intelligent storage device
10/23/2013CN103366797A Design method of security U disk by employing wireless authentication terminal for authorizing authentication, encryption and decryption
10/23/2013CN103366334A Quantum watermark authentication method based on quantum discrete cosine transform (QDCT)
10/23/2013CN103366274A Hybrid e-commerce instant payment method
10/23/2013CN103366159A Hand gesture recognition method and device
10/23/2013CN103366139A Electronic device, hardware maintenance system and hardware maintenance method
10/23/2013CN103366138A Method of automatic power down protection during contact of terminal mobile with liquid and terminal mobile
10/23/2013CN103366137A Method and device for inputting information
10/23/2013CN103366136A Method for encrypting communication between imaging device and storage chip
10/23/2013CN103366135A Tenant driven security system and method in a storage cloud
10/23/2013CN103366134A Network connection management system and method
10/23/2013CN103366133A Consumer rights locker
10/23/2013CN103366132A Device and method for encrypting data
10/23/2013CN103366131A NFC mouse, data transmission method and login method of mouse
10/23/2013CN103366130A Method for setting passwords
10/23/2013CN103366129A Data file control and management system and method base on network
10/23/2013CN103366128A Information processing apparatus, information processing method, information processing system, and program
10/23/2013CN103366127A Data processing method and device
10/23/2013CN103366126A Terminal and file protection method
10/23/2013CN103366125A System and method for encrypting files
10/23/2013CN103366124A 终端和文件管理方法 Terminal and file management method
10/23/2013CN103366123A Software risk assessment method based on defect analysis
10/23/2013CN103366122A Method and system for implementing scanning services
10/23/2013CN103366121A Safety inspection method, device and system