Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
10/08/2013 | US8553767 Video decoding method and apparatus |
10/08/2013 | US8551186 Audible alert for stolen user devices |
10/08/2013 | CA2686801C Authetication using stored biometric data |
10/08/2013 | CA2639050C Methods and apparatus for maintaining permissions for client/server processing in a communication device |
10/08/2013 | CA2516741C Additional hash functions in content-based addressing |
10/08/2013 | CA2494299C Methods for secure enrollment and backup of personal identity credentials into electronic devices |
10/06/2013 | CA2825457A1 Secure reset of personal and service provider information on mobile devices |
10/03/2013 | WO2013149178A2 Systems and methods for automated malware artifact retrieval and analysis |
10/03/2013 | WO2013149158A1 Data network device discovery optimization to reduce data transfer volume |
10/03/2013 | WO2013149048A2 User authentication and authorization using personas |
10/03/2013 | WO2013149046A2 Password protect feature for application in mobile device during a remote session |
10/03/2013 | WO2013149043A2 Access control list for applications on mobile devices during a remote control session |
10/03/2013 | WO2013148552A1 Biometric registration and verification system and method |
10/03/2013 | WO2013148223A1 Persistent and resilient worker processes |
10/03/2013 | WO2013148143A1 Systems, methods, and computer program products for scheduling processing to achieve space savings |
10/03/2013 | WO2013148052A1 Systems and methods for secure third-party data storage |
10/03/2013 | WO2013148050A1 Systems and methods for using property tables to perform non-iterative malware scans |
10/03/2013 | WO2013147891A1 Client security scoring |
10/03/2013 | WO2013147873A1 Protecting context-sensitive data |
10/03/2013 | WO2013147859A1 Reporting malicious activity to an operating system |
10/03/2013 | WO2013147858A1 Collecting data from processor-based devices |
10/03/2013 | WO2013147838A1 Authorization cache |
10/03/2013 | WO2013147769A1 Prevention of user input capture |
10/03/2013 | WO2013147760A1 Securing thermal management parameters in firmware from cyber attack |
10/03/2013 | WO2013147732A1 Programmable logic controller having embedded dynamic generation of encryption keys |
10/03/2013 | WO2013147450A1 Devices and methods for unlocking a lock mode |
10/03/2013 | WO2013147120A1 Operation limiting device, operation limiting method, and computer program |
10/03/2013 | WO2013147111A1 Operation permission determination device, operation permission determination method and computer program |
10/03/2013 | WO2013146810A1 Product sales system |
10/03/2013 | WO2013145874A1 Information processing device, information processing method and program |
10/03/2013 | WO2013145856A1 Composite media administration system, information administration server device, composite use limit creation device, and program |
10/03/2013 | WO2013145627A1 Encrypted database system, client terminal, database server, data linking method, and program |
10/03/2013 | WO2013145517A1 Information processing device, information processing system, information processing method, and program |
10/03/2013 | WO2013145490A1 Electronic conference system |
10/03/2013 | WO2013144966A1 System and method for privacy protection for a host user device |
10/03/2013 | WO2013144719A1 Field revisions for a personal security device |
10/03/2013 | WO2013144436A1 Method and apparatus for policy adaption based on application policy compliance analysis |
10/03/2013 | WO2013144425A1 Download control |
10/03/2013 | WO2013144416A1 Wireless memory device authentication |
10/03/2013 | WO2013144335A1 Method, device and system for accessing a service |
10/03/2013 | WO2013144051A1 Display authentication |
10/03/2013 | WO2013143911A2 Method for encrypting data on a storage medium |
10/03/2013 | WO2013143717A1 Programming method, battery with an arrangement for carrying out the programming method and a motor vehicle comprising said type of battery |
10/03/2013 | WO2013143714A1 Controlling anti-virus software updates |
10/03/2013 | WO2013143353A1 Using different secure erase algorithms to erase chunks from file associated with different security levels |
10/03/2013 | WO2013142983A1 Securing accessible systems using cross-linking |
10/03/2013 | WO2013142981A1 Securing accessible systems using base function encoding |
10/03/2013 | WO2013142980A1 Securing accessible systems using variable dependent coding |
10/03/2013 | WO2013142979A1 Securing accessible systems using dynamic data mangling |
10/03/2013 | WO2013142948A1 Method and system for preventing and detecting security threats |
10/03/2013 | WO2013142947A1 Secured execution of a web application |
10/03/2013 | WO2013142943A1 Method for protecting data |
10/03/2013 | WO2013116916A8 System and method for generating and protecting cryptographic keys |
10/03/2013 | WO2013114125A3 A method and database system for secure storage and communication of information |
10/03/2013 | US20130263291 Apparatus and method for supporting theft protection |
10/03/2013 | US20130263290 Electronic device and hardware component protection method thereof |
10/03/2013 | US20130263289 Information management of data associated with multiple cloud services |
10/03/2013 | US20130263288 Password protect feature for application in mobile device during a remote session |
10/03/2013 | US20130263287 Access control list for applications on mobile devices during a remote control session |
10/03/2013 | US20130263286 A method of authenticating a user of a terminal with a service provider |
10/03/2013 | US20130263284 Mobile communication system |
10/03/2013 | US20130263283 System and method for rules-based control of custody of electronic signature transactions |
10/03/2013 | US20130263282 Biometric authentication device, biometric authentication system, biometric authentication method, and recording medium |
10/03/2013 | US20130263280 Secure Dynamic Page Content and Layouts Apparatuses, Methods and Systems |
10/03/2013 | US20130263279 Information processing apparatus, storage medium, and control method therefor |
10/03/2013 | US20130263278 Method and apparatus for controlling operations performed by a mobile co |
10/03/2013 | US20130263277 Secure computing system |
10/03/2013 | US20130263276 Information processing apparatus, information processing method, information processing system, and program |
10/03/2013 | US20130263275 Method and apparatus for requesting access to files |
10/03/2013 | US20130263274 Crowd Validated Internet Document Witnessing System |
10/03/2013 | US20130263270 Systems and methods for detecting malicious code |
10/03/2013 | US20130263269 Controlling Anti-Virus Software Updates |
10/03/2013 | US20130263268 Method for blocking a denial-of-service attack |
10/03/2013 | US20130263267 Methods, computer program products and data structures for intrusion detection, intrusion response and vulnerability remediation across target computer systems |
10/03/2013 | US20130263266 Systems and methods for automated malware artifact retrieval and analysis |
10/03/2013 | US20130263265 Systems and methods for using property tables to perform non-iterative malware scans |
10/03/2013 | US20130263264 Detection of phishing attempts |
10/03/2013 | US20130263262 Verifying firmware integrity of a device |
10/03/2013 | US20130263260 System and method for assessing an application to be installed on a mobile communication device |
10/03/2013 | US20130263258 Information Security Management |
10/03/2013 | US20130263257 System and method for providing services |
10/03/2013 | US20130263256 Techniques for protecting against denial of service attacks near the source |
10/03/2013 | US20130263255 System and method enabling parallel processing of hash functions using authentication checkpoint hashes |
10/03/2013 | US20130263254 Devices and methods for unlocking a lock mode |
10/03/2013 | US20130263253 Systems and methods for controlling access to media content by detecting one or more user fingerprints |
10/03/2013 | US20130263252 Button depress wakeup and wakeup strategy |
10/03/2013 | US20130263251 Device, Method, and Graphical User Interface for Integrating Recognition of Handwriting Gestures with a Screen Reader |
10/03/2013 | US20130263250 Automated password management |
10/03/2013 | US20130263242 Tenant driven security in a storage cloud |
10/03/2013 | US20130263240 Method for authentication and verification of user identity |
10/03/2013 | US20130263237 User authentication and authorization using personas |
10/03/2013 | US20130263235 Data packet generator for generating passcodes |
10/03/2013 | US20130263226 False Banking, Credit Card, and Ecommerce System |
10/03/2013 | US20130263224 System And Method For Checking The Authenticity Of The Identity Of A Person Accessing Data Over A Computer Network |
10/03/2013 | US20130263222 Computer system and security management method |
10/03/2013 | US20130263221 Method and apparatus for enterprise-level filtered search |
10/03/2013 | US20130263219 Authentication system, electronic apparatus and authentication method |
10/03/2013 | US20130263217 System, method, and device for controlled access to a network |
10/03/2013 | US20130263216 Participant authentication and authorization for joining a private conference event via a conference event environment system |
10/03/2013 | US20130263215 Display Authentication |