Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
10/24/2013 | US20130283372 Mobile information terminal, gripping-feature learning method and gripping-feature authentication method |
10/24/2013 | US20130283371 Method and device for controlling access to a computer system |
10/24/2013 | US20130283370 Method and system for monitoring calls to an application program interface (api) function |
10/24/2013 | US20130283369 Providing A Multi-Phase Lockstep Integrity Reporting Mechanism |
10/24/2013 | US20130283368 Scalable and secure application resource management and access control for multicore operating systems |
10/24/2013 | US20130283367 Method of managing virtual computer, computer system and computer |
10/24/2013 | US20130283364 Distributed virtual switch architecture for a hybrid cloud |
10/24/2013 | US20130283363 Secure data transfer over an arbitrary public or private transport |
10/24/2013 | US20130283362 Authenticating user through web extension using token based authentication scheme |
10/24/2013 | US20130283360 Distributed group temporal key (gtk) state management |
10/24/2013 | US20130283356 Role-based attribute based access control (rabac) |
10/24/2013 | US20130283351 Method and apparatus for configuring services based on touch selection |
10/24/2013 | US20130283350 Access authorization |
10/24/2013 | US20130283349 Authentication method and electronic device |
10/24/2013 | US20130283344 Methods for restricting resources used by a program based on entitlements |
10/24/2013 | US20130283343 Enforcing Universal Access Control in an Information Management System |
10/24/2013 | US20130283340 Optimized policy matching and evaluation for non-hierarchical resources |
10/24/2013 | US20130283339 Optimized policy matching and evaluation for hierarchical resources |
10/24/2013 | US20130283338 Policy Management of Multiple Security Domains |
10/24/2013 | US20130283337 Predicting next characters in password generation |
10/24/2013 | US20130283336 Cyber security analyzer |
10/24/2013 | US20130283335 Systems and methods for applying policy wrappers to computer applications |
10/24/2013 | US20130283302 Data storage and access systems |
10/24/2013 | US20130283065 Secure data parser method and system |
10/24/2013 | US20130283064 Method and apparatus to process sha-1 secure hashing algorithm |
10/24/2013 | US20130283063 Digital identity device |
10/24/2013 | US20130283062 Preserving redundancy in data deduplication systems by encryption |
10/24/2013 | US20130283061 Image processing method and apparatus for privacy protection of captured image |
10/24/2013 | US20130283059 Data masking |
10/24/2013 | US20130283052 Electronic rental service system and method for digital content |
10/24/2013 | US20130283049 Method and devices for providing secure data backup from a mobile communication device to an external computing device |
10/24/2013 | US20130283048 Computing device and method for protecting software of the computing device |
10/24/2013 | US20130283042 Trust Information Delivery Scheme for Certificate Validation |
10/24/2013 | US20130283034 Systems and methods using one time pads during the exchange of cryptographic material |
10/24/2013 | US20130282934 Methods and Systems for Protecting Data in USB Systems |
10/24/2013 | US20130282762 Method, secure device, system and computer program product for securely managing user access to a file system |
10/24/2013 | US20130282723 Maintaining A Historical Record Of Anonymized User Profile Data By Location For Users In A Mobile Environment |
10/24/2013 | US20130282711 Methods, Systems, and Products for Assessing Risks of Internet Searches |
10/24/2013 | US20130282589 Multi-factor mobile transaction authentication |
10/24/2013 | US20130282534 Data storage and access systems |
10/24/2013 | US20130279765 Method for Enabling Authentication or Identification, and Related Verification System |
10/24/2013 | US20130278724 Method and apparatus for recognizing three-dimensional object |
10/24/2013 | DE102012206536A1 Verfahren zum Ausgeben mindestens einer Bedieninformation für ein Produkt Method of outputting at least one control information for a product |
10/24/2013 | DE102012103454A1 Data storage medium i.e. portable hard disk, for use with e.g. notebook to identification data by professional manager, has data key providing access to data only during positive evaluation of data key |
10/24/2013 | DE102010038179B4 Individuelle Aktualisierung von Computerprogrammen Individual updating of computer programs |
10/24/2013 | CA2813855A1 Methods and systems for conducting smart card transactions |
10/23/2013 | EP2654277A2 Method for outputting at least one set of control information for a product |
10/23/2013 | EP2653994A2 Information security techniques including detection, interdiction and/or mitigation of memory injection attacks |
10/23/2013 | EP2653993A1 Method and system for locking an electronic device |
10/23/2013 | EP2653992A1 Microcontroller configured for external memory decryption |
10/23/2013 | EP2652902A1 Method and apparatus to create and manage a differentiated security framework for content oriented networks |
10/23/2013 | EP2652666A1 Storage drive based antimalware methods and apparatuses |
10/23/2013 | EP2652665A1 Portable data storage medium with control error counter |
10/23/2013 | EP2652664A1 Dynamic method of controlling the integrity of the execution of an excutable code |
10/23/2013 | EP2652663A1 Software signing certificate reputation model |
10/23/2013 | EP2652662A1 Method for transmitting data in an encrypted manner from a mobile data storage medium to a stationary device and data encryption adapter |
10/23/2013 | EP2652661A1 Method for changing an operating mode of a mobile device |
10/23/2013 | EP2652646A1 Distributed file systems |
10/23/2013 | EP2652635A1 Providing a customized application to a user terminal |
10/23/2013 | EP2652608A2 A communication protocol between a high-level language and a native language |
10/23/2013 | CN203250378U Antitheft device of notebook computer |
10/23/2013 | CN203250318U Computer security control system |
10/23/2013 | CN203250317U Mobile memorizer capable of identifying fingerprints |
10/23/2013 | CN203250316U High security computer case |
10/23/2013 | CN203249100U Lamp with camera shooting function and storing function |
10/23/2013 | CN103370718A Data protection using distributed security key |
10/23/2013 | CN103370717A Always-available embedded theft reaction subsystem |
10/23/2013 | CN103370716A Using power fingerprinting (PFP) to monitor the integrity and enhance security of computer based systems |
10/23/2013 | CN103370715A System and method for securing virtual computing environments |
10/23/2013 | CN103370713A Method for programming a mobile terminal chip |
10/23/2013 | CN103370706A Distributed file systems |
10/23/2013 | CN103369520A Intention prejudging system and method for application program suspicious behavior of mobile terminal |
10/23/2013 | CN103369018A Memory system and wireless communication method by memory system |
10/23/2013 | CN103368987A Cloud server, application program verification, certification and management system and application program verification, certification and management method |
10/23/2013 | CN103368970A Automation security detection method for network target |
10/23/2013 | CN103368745A User identity strong authentication method for educational information resource guarantee |
10/23/2013 | CN103368740A Digital rights managment system, devices, and methods for binding content to an intelligent storage device |
10/23/2013 | CN103366797A Design method of security U disk by employing wireless authentication terminal for authorizing authentication, encryption and decryption |
10/23/2013 | CN103366334A Quantum watermark authentication method based on quantum discrete cosine transform (QDCT) |
10/23/2013 | CN103366274A Hybrid e-commerce instant payment method |
10/23/2013 | CN103366159A Hand gesture recognition method and device |
10/23/2013 | CN103366139A Electronic device, hardware maintenance system and hardware maintenance method |
10/23/2013 | CN103366138A Method of automatic power down protection during contact of terminal mobile with liquid and terminal mobile |
10/23/2013 | CN103366137A Method and device for inputting information |
10/23/2013 | CN103366136A Method for encrypting communication between imaging device and storage chip |
10/23/2013 | CN103366135A Tenant driven security system and method in a storage cloud |
10/23/2013 | CN103366134A Network connection management system and method |
10/23/2013 | CN103366133A Consumer rights locker |
10/23/2013 | CN103366132A Device and method for encrypting data |
10/23/2013 | CN103366131A NFC mouse, data transmission method and login method of mouse |
10/23/2013 | CN103366130A Method for setting passwords |
10/23/2013 | CN103366129A Data file control and management system and method base on network |
10/23/2013 | CN103366128A Information processing apparatus, information processing method, information processing system, and program |
10/23/2013 | CN103366127A Data processing method and device |
10/23/2013 | CN103366126A Terminal and file protection method |
10/23/2013 | CN103366125A System and method for encrypting files |
10/23/2013 | CN103366124A 终端和文件管理方法 Terminal and file management method |
10/23/2013 | CN103366123A Software risk assessment method based on defect analysis |
10/23/2013 | CN103366122A Method and system for implementing scanning services |
10/23/2013 | CN103366121A Safety inspection method, device and system |