Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
10/03/2013 | US20130263213 Techniques for identity and policy based routing |
10/03/2013 | US20130263208 Managing virtual machines in a cloud computing system |
10/03/2013 | US20130263207 Detection of potentially copyrighted content in user-initiated live streams |
10/03/2013 | US20130263206 Method and apparatus for policy adaption based on application policy compliance analysis |
10/03/2013 | US20130263205 System and method for trusted platform attestation |
10/03/2013 | US20130262882 Secure island computing system and method |
10/03/2013 | US20130262881 Binary Data Store |
10/03/2013 | US20130262878 Application installing method |
10/03/2013 | US20130262877 Apparatus, system, and method for providing memory access control |
10/03/2013 | US20130262876 Method, Apparatus, and System for Performing Authentication on Bound Data Card and Mobile Host |
10/03/2013 | US20130262874 Systems and methods for controlling access to supplemental content integrated into existing content |
10/03/2013 | US20130262872 Electronic apparatus, peripheral device, and system for encrypting and decrypting the electronic apparatus via the peripheral device |
10/03/2013 | US20130262870 Image processing device and image data transmission method |
10/03/2013 | US20130262865 Distributed file systems |
10/03/2013 | US20130262864 Method and system for supporting secure documents |
10/03/2013 | US20130262863 Searchable encryption processing system |
10/03/2013 | US20130262861 Data protection method for e-mail and electronic device having data protection function |
10/03/2013 | US20130262854 Data de-duplication in a dispersed storage network utilizing data characterization |
10/03/2013 | US20130262825 Obfuscated Hardware Multi-Threading |
10/03/2013 | US20130262516 Data Distribution Database and Method for Data Distribution and Verification |
10/03/2013 | US20130262514 System, method, and database for personal information management with advanced access controls |
10/03/2013 | US20130262265 System and Method for Managing Software Licenses |
10/03/2013 | US20130259226 Methods and apparatus for correlation protected processing of cryptographic operations |
10/03/2013 | US20130257473 Long-life power source, long-life embedded structure sensor, remote long-life fluid measurement and analysis system, long-life off-grid enclosed space proximity change detector, surface-mount encryption device with volatile long-life key storage and volume intrusion response, and portable encrypted data storage with volatile long-life key storage and volume intrusion response |
10/02/2013 | EP2645673A2 Storage device and its control method |
10/02/2013 | EP2645338A1 System and method for secure voting |
10/02/2013 | EP2645297A1 Securing mobile devices |
10/02/2013 | EP2645296A1 Control unit for monitoring an encryption device |
10/02/2013 | EP2645295A2 Secure and reliable remote data protection |
10/02/2013 | EP2645294A1 System and method for trusted platform attestation |
10/02/2013 | EP2645293A2 Method and apparatus for controlling operations performed by a mobile computing device |
10/02/2013 | EP2645292A2 Systems and methods for detecting malicious code |
10/02/2013 | EP2645291A1 System and method enabling parallel processing of hash functions using authentication checkpoint hashes |
10/02/2013 | EP2645290A2 Devices and methods for unlocking a lock mode |
10/02/2013 | EP2645289A1 Biometric authentication device, biometric authentication system, biometric authentication method, and recording medium |
10/02/2013 | EP2645288A2 Encryption system and method of encrypting a device |
10/02/2013 | EP2645287A1 Method, computer program and apparatus for switching between user profiles |
10/02/2013 | EP2645286A1 Authentication in an industrial control system |
10/02/2013 | EP2645285A1 Gripping characteristics learning authentication system and gripping characteristics learning authentication method |
10/02/2013 | EP2645284A1 Server system, method for executing server system, and external memory |
10/02/2013 | EP2645275A1 Method, device and system for accessing a service |
10/02/2013 | EP2645241A2 System and method to select compatible open-source software and components for developed or conceptualized solution |
10/02/2013 | EP2645240A2 Method for automatically updating a computer system and device |
10/02/2013 | EP2643836A1 Protection of stored data using optical emitting elements |
10/02/2013 | EP2643789A1 Data storage system and its control method |
10/02/2013 | EP2643788A2 Secure software licensing and provisioning using hardware based security engine |
10/02/2013 | EP2643787A1 Handling encoded information |
10/02/2013 | EP2643786A1 Apparatus and method for information sharing and privacy assurance |
10/02/2013 | EP2643785A1 Peripheral authentication |
10/02/2013 | EP2520061B1 Methods to enable secure self-provisioning of subscriber units in a communication system |
10/02/2013 | DE102013004842A1 Verfahren und Systeme für ein Registrieren von biometrischen Daten Methods and systems for registering biometric data |
10/02/2013 | DE102012205010A1 Programmierverfahren, Batterie mit einer Anordnung zur Ausführung des Programmierverfahrens sowie ein Kraftfahrzeug mit einer solchen Batterie Programming methods, battery with an arrangement for execution of the programming process and a motor vehicle with such a battery |
10/02/2013 | DE102012204984A1 Steuereinheit zur Überwachung eines Verschlüsselungsgeräts Control unit for monitoring an encryption device |
10/02/2013 | DE102012006222A1 Chipkarte, Endgerät mit Chipkarte sowie Verfahren zum Modifizieren einer Chipkarte Chip card with a chip card terminal and method for modifying a chip card |
10/02/2013 | DE10002204B4 Verfahren zum Schutz eines Mikrorechners eines Steuergeräts gegen Manipulation eines Programmes und Vorrichtung zur Durchführung des Verfahrens Method for protecting a microcomputer of a control unit from manipulation of a program and device for performing the method |
10/02/2013 | CN203224944U POS machine based on iris identification |
10/02/2013 | CN203224880U Multiply encrypted mobile hard disk |
10/02/2013 | CN203224879U Storage apparatus and terminal device |
10/02/2013 | CN203224878U External-TPM based computer safety system |
10/02/2013 | CN203224877U U-disk-shaped fingerprint identification logger |
10/02/2013 | CN203224876U Fingerprint password system |
10/02/2013 | CN203224828U Notebook heat dissipation rack capable of giving burglar alarm |
10/02/2013 | CN203224826U Novel computer case |
10/02/2013 | CN103339978A Method and device for providing improved perpetrator imaging |
10/02/2013 | CN103339975A Method for exporting on a secure server data comprised on a UlCC comprised in a terminal |
10/02/2013 | CN103339957A Method and apparatus for building a hardware root of trust and providing protected content processing within an open computing platform |
10/02/2013 | CN103339636A Creation of signatures for authenticating applications |
10/02/2013 | CN103339635A Determining the vulnerability of computer software applications to privilege-escalation attacks |
10/02/2013 | CN103339634A Mobile information terminal, grip characteristic learning method, and grip characteristic authentication method |
10/02/2013 | CN103339633A Mobile information terminal, grip characteristic learning method, and grip characteristic authentication method |
10/02/2013 | CN103338232A Distributed access control method of cloud computing |
10/02/2013 | CN103338104A An encryption method for data real-timely acquired by a recorder |
10/02/2013 | CN103336931A Computer-networking information-safety application system |
10/02/2013 | CN103336930A Novel PUF circuit system structure |
10/02/2013 | CN103336929A Method and system for encrypted file access |
10/02/2013 | CN103336928A Method and device for encrypting and decrypting database |
10/02/2013 | CN103336927A Data classification based data leakage prevention method and system |
10/02/2013 | CN103336926A Vehicle terminal with dual processors |
10/02/2013 | CN103336925A Scanning acceleration method and device |
10/02/2013 | CN103336924A Starting lock for mobile terminal application program |
10/02/2013 | CN103336923A Print monitoring system and method for universal printer |
10/02/2013 | CN103336922A User proximity control of devices |
10/02/2013 | CN103336921A Method capable of tracing blabber |
10/02/2013 | CN103336920A Security system for wireless sensor network SOC |
10/02/2013 | CN103336919A System and method for achieving instrument encryption verification control function |
10/02/2013 | CN103336918A Electronic hard disk system authorization method and device |
10/02/2013 | CN103336917A Method and device for adding domain locking to SWF files in batches |
10/02/2013 | CN103336774A Retrieving content from website through sandbox |
10/02/2013 | CN103336746A Safety encrypted USB (Universal Serial Bus) flash disk and data encryption method thereof |
10/02/2013 | CN103336693A Method and device for establishing refer chain and security detection device |
10/02/2013 | CN102308315B System and method for controlling security documents |
10/02/2013 | CN102254117B Virtualized technology-based data anti-disclosure system |
10/02/2013 | CN102043642B Product booting method and system |
10/02/2013 | CN101996285B Electronic equipment |
10/02/2013 | CN101841535B Releasing method for J2ME(Java 2 Micro Edition) programme, receiving method, device and system thereof |
10/02/2013 | CN101826140B Content management apparatus with rights |
10/02/2013 | CN101779207B Memory device with circuitry for improving accuracy of time estimate used in digital rights management (drm) license validation and method for use therewith |
10/01/2013 | US8549659 Non-volatile memory for anti-cloning and authentication method for the same |
10/01/2013 | US8549658 Provisioning credentials for embedded wireless devices |
10/01/2013 | US8549656 Securing and managing apps on a device |