Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
09/2013
09/18/2013CN103309756A Method for preventing application program from quitting or being interrupted accidently and mobile terminal
09/18/2013CN103309676A Web service encapsulation method and system for ocean numerical modeling regional ocean modeling system (ROMS)
09/18/2013CN103309622A Security system storage of persistent data
09/18/2013CN103309447A Virtual data acquisition and transmission method taking both hands of humankind as carrier
09/18/2013CN102346829B Virus detection method based on ensemble classification
09/18/2013CN101965570B A computer system comprising a secure boot mechanism
09/18/2013CN101939752B Method and device for managing authorization of right object in digital rights management
09/18/2013CN101911023B Delivering secured media using a portable memory device
09/18/2013CN101808176B Image forming apparatus, license management system and license management method
09/18/2013CN101719238B Method and system for managing, authenticating and authorizing unified identities
09/18/2013CN101681408B 数据安全性 Data Security
09/18/2013CN101587528B Information processing apparatus and control method therefor
09/18/2013CN101273364B Method for computing platform data protection
09/17/2013USRE44503 Memory device storing identifying information and memory card including the same
09/17/2013US8539609 Device managing apparatus, device managing system, and recording medium storing a software management program
09/17/2013US8539606 Data protection method and data protection system
09/17/2013US8539605 Data processing device and data processing method
09/17/2013US8539600 Data processing system, and data processing apparatus and user terminal equipment therefor, and computer-readable storage medium and data processing method thereof
09/17/2013US8539596 Security within integrated circuits
09/17/2013US8539595 Information processing apparatus, information processing method and program, and storage medium storing the same
09/17/2013US8539591 Document management system, management device, recording medium storing document management program, document management method and data signal
09/17/2013US8539587 Methods, devices and data structures for trusted data
09/17/2013US8539585 Systematic approach to uncover visual ambiguity vulnerabilities
09/17/2013US8539579 Detecting spam short messages based on sending characteristics
09/17/2013US8539578 Systems and methods for defending a shellcode attack
09/17/2013US8539575 Techniques to manage access to organizational information of an entity
09/17/2013US8539574 User authentication and access control system and method
09/17/2013US8539558 Method and apparatus for token-based token termination
09/17/2013US8539550 Multi-pattern authentication gestures
09/17/2013US8539548 Tiered network policy configuration with policy customization control
09/17/2013US8539544 Method of optimizing policy conformance check for a device with a large set of posture attribute combinations
09/17/2013US8539515 System and method for using virtual machine for driver installation sandbox on remote system
09/17/2013US8539483 Computer and control method for interrupting machine operation
09/17/2013US8539459 Code obfuscation and controlling a processor by emulation
09/17/2013US8539382 Preventing unintentional activation and/or input in an electronic device
09/17/2013US8539335 Entering data into a webpage
09/17/2013US8539253 System and method for securing information by obscuring contents of a persistent image
09/17/2013US8539249 System and method for security authentication using biometric authentication technique
09/17/2013US8539248 Associating biometric information with passwords
09/17/2013US8539247 Password checking
09/17/2013US8539246 Secure resume for encrypted drives
09/17/2013US8539245 Apparatus and method for accessing a secure partition in non-volatile storage by a host system enabled after the system exits a first instance of a secure mode
09/17/2013US8539244 Server, authentication server, content delivery system, and program
09/17/2013US8539242 Voice-capable system and method for providing input options for authentication
09/17/2013US8539229 Techniques for secure data management in a distributed environment
09/17/2013US8539223 Network configuration setting generation system, device, and method
09/17/2013US8539181 Water marking in a data interval gap
09/17/2013US8538991 Information managing apparatus, information managing method, and computer product
09/17/2013US8538889 Application hierarchy and state manipulation
09/17/2013US8538887 Content delivery system and content delivery method
09/17/2013US8538884 System and method for the automated auditing and viewing of transaction documents
09/17/2013US8538015 Flexible architecture and instruction for advanced encryption standard (AES)
09/17/2013US8538011 Systems, methods and devices for trusted transactions
09/17/2013US8537762 System and method for optimally transferring data traffic on networks
09/17/2013US8537426 Image processing method, image processing apparatus, and computer-readable storage medium for computer program for generating an integrated duplicate by printing images of a plurality of documents on a single sheet of recording paper or a plurality of continuously-fed sheets of recording paper
09/17/2013US8533920 Method and apparatus for managing a network, network management program, and storage medium including a network management program stored thereon
09/17/2013CA2589223C Method for identifying a user by means of modified biometric characteristics and a database for carrying out said method
09/17/2013CA2502480C Certificate renewal in a certificate authority infrastructure
09/17/2013CA2473487C Projection of trustworthiness from a trusted environment to an untrusted environment
09/17/2013CA2420795C Transmitting and processing protected content
09/12/2013WO2013134549A2 Device, system and method for image-based content delivery
09/12/2013WO2013134512A1 Validation associated with a form
09/12/2013WO2013134438A1 Accessory device authentication
09/12/2013WO2013132822A1 Terminal management system
09/12/2013WO2013132728A1 Information processing device, information storage device, information processing stystem, information processing method, and program
09/12/2013WO2013132641A1 Single sign-on system
09/12/2013WO2013131900A1 Method for improving the functional security and increasing the availability of an electronic control system, and electronic control system
09/12/2013WO2013131728A2 Pc security using bios/(u)efi extensions
09/12/2013WO2013131694A1 Authentication in an industrial control system
09/12/2013WO2013103812A3 Providing secure execution of mobile device workflows
09/12/2013WO2012097231A3 System and method for tamper-resistant booting
09/12/2013US20130239233 Interoperable Keychest for Use by Service Providers
09/12/2013US20130239232 Enterprise license registrar anchor point
09/12/2013US20130239230 Document access auditing
09/12/2013US20130239229 Method, apparatus and system for managing document rights
09/12/2013US20130239228 System, method and computer program product for publicly providing web content of a tenant using a multi-tenant on-demand database service
09/12/2013US20130239227 Group licenses for virtual objects in a distributed virtual world
09/12/2013US20130239226 Information processing system, anonymization method, information processing device, and its control method and control program
09/12/2013US20130239225 Deleting Confidential Information Used to Secure a Communication Link
09/12/2013US20130239224 Method of locating a computing device
09/12/2013US20130239223 Method and apparatus for detecting leak of information resource of device
09/12/2013US20130239222 Methods, devices and data structures for trusted data
09/12/2013US20130239221 Rights management module
09/12/2013US20130239220 Monitoring and Managing User Privacy Levels
09/12/2013US20130239219 Mining source code for violations of programming rules
09/12/2013US20130239217 System, Method and Computer Program Product for Determining a Person's Aggregate Online Risk Score
09/12/2013US20130239216 System and Method for Bidirectional Trust Between Downloaded Applications and Mobile Devices Including a Secure Charger and Malware Scanner
09/12/2013US20130239215 Detecting malicious computer code in an executing program module
09/12/2013US20130239214 Method for detecting and removing malware
09/12/2013US20130239209 Managing domain name abuse
09/12/2013US20130239208 Encryption and authentication systems and methods
09/12/2013US20130239207 Information recording system and recording medium
09/12/2013US20130239206 Authentication using physical interaction characteristics
09/12/2013US20130239205 Method and apparatus for identifying and associating devices using visual recognition
09/12/2013US20130239203 Information recording device, recording medium, and information recording system
09/12/2013US20130239202 Method, system and mobile device employing enhanced user authentication
09/12/2013US20130239201 Secure device sharing
09/12/2013US20130239200 Electronic device and method for operating locked touch screens
09/12/2013US20130239198 Managing remote network addresses in communications
09/12/2013US20130239197 Ic chip, information processing apparatus, system, method, and program