Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
09/18/2013 | CN103309756A Method for preventing application program from quitting or being interrupted accidently and mobile terminal |
09/18/2013 | CN103309676A Web service encapsulation method and system for ocean numerical modeling regional ocean modeling system (ROMS) |
09/18/2013 | CN103309622A Security system storage of persistent data |
09/18/2013 | CN103309447A Virtual data acquisition and transmission method taking both hands of humankind as carrier |
09/18/2013 | CN102346829B Virus detection method based on ensemble classification |
09/18/2013 | CN101965570B A computer system comprising a secure boot mechanism |
09/18/2013 | CN101939752B Method and device for managing authorization of right object in digital rights management |
09/18/2013 | CN101911023B Delivering secured media using a portable memory device |
09/18/2013 | CN101808176B Image forming apparatus, license management system and license management method |
09/18/2013 | CN101719238B Method and system for managing, authenticating and authorizing unified identities |
09/18/2013 | CN101681408B 数据安全性 Data Security |
09/18/2013 | CN101587528B Information processing apparatus and control method therefor |
09/18/2013 | CN101273364B Method for computing platform data protection |
09/17/2013 | USRE44503 Memory device storing identifying information and memory card including the same |
09/17/2013 | US8539609 Device managing apparatus, device managing system, and recording medium storing a software management program |
09/17/2013 | US8539606 Data protection method and data protection system |
09/17/2013 | US8539605 Data processing device and data processing method |
09/17/2013 | US8539600 Data processing system, and data processing apparatus and user terminal equipment therefor, and computer-readable storage medium and data processing method thereof |
09/17/2013 | US8539596 Security within integrated circuits |
09/17/2013 | US8539595 Information processing apparatus, information processing method and program, and storage medium storing the same |
09/17/2013 | US8539591 Document management system, management device, recording medium storing document management program, document management method and data signal |
09/17/2013 | US8539587 Methods, devices and data structures for trusted data |
09/17/2013 | US8539585 Systematic approach to uncover visual ambiguity vulnerabilities |
09/17/2013 | US8539579 Detecting spam short messages based on sending characteristics |
09/17/2013 | US8539578 Systems and methods for defending a shellcode attack |
09/17/2013 | US8539575 Techniques to manage access to organizational information of an entity |
09/17/2013 | US8539574 User authentication and access control system and method |
09/17/2013 | US8539558 Method and apparatus for token-based token termination |
09/17/2013 | US8539550 Multi-pattern authentication gestures |
09/17/2013 | US8539548 Tiered network policy configuration with policy customization control |
09/17/2013 | US8539544 Method of optimizing policy conformance check for a device with a large set of posture attribute combinations |
09/17/2013 | US8539515 System and method for using virtual machine for driver installation sandbox on remote system |
09/17/2013 | US8539483 Computer and control method for interrupting machine operation |
09/17/2013 | US8539459 Code obfuscation and controlling a processor by emulation |
09/17/2013 | US8539382 Preventing unintentional activation and/or input in an electronic device |
09/17/2013 | US8539335 Entering data into a webpage |
09/17/2013 | US8539253 System and method for securing information by obscuring contents of a persistent image |
09/17/2013 | US8539249 System and method for security authentication using biometric authentication technique |
09/17/2013 | US8539248 Associating biometric information with passwords |
09/17/2013 | US8539247 Password checking |
09/17/2013 | US8539246 Secure resume for encrypted drives |
09/17/2013 | US8539245 Apparatus and method for accessing a secure partition in non-volatile storage by a host system enabled after the system exits a first instance of a secure mode |
09/17/2013 | US8539244 Server, authentication server, content delivery system, and program |
09/17/2013 | US8539242 Voice-capable system and method for providing input options for authentication |
09/17/2013 | US8539229 Techniques for secure data management in a distributed environment |
09/17/2013 | US8539223 Network configuration setting generation system, device, and method |
09/17/2013 | US8539181 Water marking in a data interval gap |
09/17/2013 | US8538991 Information managing apparatus, information managing method, and computer product |
09/17/2013 | US8538889 Application hierarchy and state manipulation |
09/17/2013 | US8538887 Content delivery system and content delivery method |
09/17/2013 | US8538884 System and method for the automated auditing and viewing of transaction documents |
09/17/2013 | US8538015 Flexible architecture and instruction for advanced encryption standard (AES) |
09/17/2013 | US8538011 Systems, methods and devices for trusted transactions |
09/17/2013 | US8537762 System and method for optimally transferring data traffic on networks |
09/17/2013 | US8537426 Image processing method, image processing apparatus, and computer-readable storage medium for computer program for generating an integrated duplicate by printing images of a plurality of documents on a single sheet of recording paper or a plurality of continuously-fed sheets of recording paper |
09/17/2013 | US8533920 Method and apparatus for managing a network, network management program, and storage medium including a network management program stored thereon |
09/17/2013 | CA2589223C Method for identifying a user by means of modified biometric characteristics and a database for carrying out said method |
09/17/2013 | CA2502480C Certificate renewal in a certificate authority infrastructure |
09/17/2013 | CA2473487C Projection of trustworthiness from a trusted environment to an untrusted environment |
09/17/2013 | CA2420795C Transmitting and processing protected content |
09/12/2013 | WO2013134549A2 Device, system and method for image-based content delivery |
09/12/2013 | WO2013134512A1 Validation associated with a form |
09/12/2013 | WO2013134438A1 Accessory device authentication |
09/12/2013 | WO2013132822A1 Terminal management system |
09/12/2013 | WO2013132728A1 Information processing device, information storage device, information processing stystem, information processing method, and program |
09/12/2013 | WO2013132641A1 Single sign-on system |
09/12/2013 | WO2013131900A1 Method for improving the functional security and increasing the availability of an electronic control system, and electronic control system |
09/12/2013 | WO2013131728A2 Pc security using bios/(u)efi extensions |
09/12/2013 | WO2013131694A1 Authentication in an industrial control system |
09/12/2013 | WO2013103812A3 Providing secure execution of mobile device workflows |
09/12/2013 | WO2012097231A3 System and method for tamper-resistant booting |
09/12/2013 | US20130239233 Interoperable Keychest for Use by Service Providers |
09/12/2013 | US20130239232 Enterprise license registrar anchor point |
09/12/2013 | US20130239230 Document access auditing |
09/12/2013 | US20130239229 Method, apparatus and system for managing document rights |
09/12/2013 | US20130239228 System, method and computer program product for publicly providing web content of a tenant using a multi-tenant on-demand database service |
09/12/2013 | US20130239227 Group licenses for virtual objects in a distributed virtual world |
09/12/2013 | US20130239226 Information processing system, anonymization method, information processing device, and its control method and control program |
09/12/2013 | US20130239225 Deleting Confidential Information Used to Secure a Communication Link |
09/12/2013 | US20130239224 Method of locating a computing device |
09/12/2013 | US20130239223 Method and apparatus for detecting leak of information resource of device |
09/12/2013 | US20130239222 Methods, devices and data structures for trusted data |
09/12/2013 | US20130239221 Rights management module |
09/12/2013 | US20130239220 Monitoring and Managing User Privacy Levels |
09/12/2013 | US20130239219 Mining source code for violations of programming rules |
09/12/2013 | US20130239217 System, Method and Computer Program Product for Determining a Person's Aggregate Online Risk Score |
09/12/2013 | US20130239216 System and Method for Bidirectional Trust Between Downloaded Applications and Mobile Devices Including a Secure Charger and Malware Scanner |
09/12/2013 | US20130239215 Detecting malicious computer code in an executing program module |
09/12/2013 | US20130239214 Method for detecting and removing malware |
09/12/2013 | US20130239209 Managing domain name abuse |
09/12/2013 | US20130239208 Encryption and authentication systems and methods |
09/12/2013 | US20130239207 Information recording system and recording medium |
09/12/2013 | US20130239206 Authentication using physical interaction characteristics |
09/12/2013 | US20130239205 Method and apparatus for identifying and associating devices using visual recognition |
09/12/2013 | US20130239203 Information recording device, recording medium, and information recording system |
09/12/2013 | US20130239202 Method, system and mobile device employing enhanced user authentication |
09/12/2013 | US20130239201 Secure device sharing |
09/12/2013 | US20130239200 Electronic device and method for operating locked touch screens |
09/12/2013 | US20130239198 Managing remote network addresses in communications |
09/12/2013 | US20130239197 Ic chip, information processing apparatus, system, method, and program |