Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
09/06/2013 | WO2013127877A1 Delivering data over a network |
09/06/2013 | WO2013127670A1 A method and a system for password protection |
09/06/2013 | WO2013126991A1 Remote configuration of a point-of-sale device |
09/06/2013 | WO2013106093A3 Methods, systems, and devices for managing medical images and records |
09/06/2013 | WO2013064565A3 Method and device for storing confidential data in a database and consulting said data |
09/05/2013 | US20130232586 Methods and apparatus for locating an unauthorized virtual machine |
09/05/2013 | US20130232584 Method, secure device, system and computer program product for securely managing files |
09/05/2013 | US20130232583 Method and System for Providing Digital Media Rental |
09/05/2013 | US20130232582 Need-to-know information access using quantified risk |
09/05/2013 | US20130232581 System and method for securely retrieving and playing digital media |
09/05/2013 | US20130232580 System and method for administering remote content |
09/05/2013 | US20130232577 Information System Security Based on Threat Vectors |
09/05/2013 | US20130232576 Systems and methods for cyber-threat detection |
09/05/2013 | US20130232574 Systems and Methods of DNS Grey Listing |
09/05/2013 | US20130232573 Method and system for application-based policy monitoring and enforcement on a mobile device |
09/05/2013 | US20130232572 Authorizing local application activity using remotely defined security data |
09/05/2013 | US20130232571 Accessory Device Authentication |
09/05/2013 | US20130232570 Portable terminal and gripping-feature learning method |
09/05/2013 | US20130232568 Electronic device, electronic device controlling method, and computer program product |
09/05/2013 | US20130232567 Method for Authorizing a Program Sequence |
09/05/2013 | US20130232563 System and method for unlimited licensing to a fixed number of devices |
09/05/2013 | US20130232562 Multi-factor authentication enrollment optimization method and apparatus |
09/05/2013 | US20130232553 Managed mobile media platform systems and methods |
09/05/2013 | US20130232552 Automatic Context Sharing with Privacy |
09/05/2013 | US20130232550 Authentication server and authentication method by authentication server |
09/05/2013 | US20130232549 Method and apparatus for securing network communications |
09/05/2013 | US20130232546 Service providing method, recording medium, and information processing apparatus |
09/05/2013 | US20130232545 System and method for detecting and preventing attacks against a server in a computer network |
09/05/2013 | US20130232544 System and method for performing partial evaluation in order to construct a simplified policy |
09/05/2013 | US20130232542 System and method to provide server control for access to mobile client data |
09/05/2013 | US20130232541 Policy-driven approach to managing privileged/shared identity in an enterprise |
09/05/2013 | US20130232540 Method and system for application-based policy monitoring and enforcement on a mobile device |
09/05/2013 | US20130232539 Method and system for controlling data access to organizational data maintained in hierarchical |
09/05/2013 | US20130232343 Software self-defense systems and methods |
09/05/2013 | US20130232342 System for processing feedback entries received from software |
09/05/2013 | US20130232341 System and method for initializing tokens in a dictionary encryption scheme |
09/05/2013 | US20130232340 Watermark generator, watermark decoder, method for providing a watermark signal, method for providing binary message data in dependence on a watermarked signal and a computer program using improved synchronization concept |
09/05/2013 | US20130232329 Encrypting And Decrypting A Virtual Disc |
09/05/2013 | US20130230296 Data transmitter, data receiver, data transceiving system, data transmitting method, data receiving method, and data transceiving method |
09/05/2013 | US20130230218 System And Method For Identifying An Individual |
09/05/2013 | US20130230216 Biometric identification data protection |
09/05/2013 | US20130230169 Circumvention of dynamic, robust, embedded-signal detection |
09/05/2013 | US20130230168 Information processing device, information processing method, and computer readable medium |
09/05/2013 | DE112008003855B4 System und Verfahren zum Bereitstellen von sicherem Zugriff auf einen Systemspeicher System and method for providing secure access to a system memory |
09/05/2013 | DE102007020775B4 Geräteunabhängige Verwaltung kryptografischer Information Device-independent management of cryptographic information |
09/04/2013 | EP2634960A2 Method and Apparatus for Incremental Code Signing |
09/04/2013 | EP2634959A2 Method and Apparatus for Incremental Code Signing |
09/04/2013 | EP2634957A1 Authentication Device and System |
09/04/2013 | EP2634724A1 Adapter for electronic devices |
09/04/2013 | EP2634723A1 Determination of a terminal's position for displaying a GUI element |
09/04/2013 | EP2634722A1 Systems and/or methods for automatically deriving web service permissions based on XML structure permissions |
09/04/2013 | EP2634721A2 Service providing method, recording medium, and information processing apparatus |
09/04/2013 | EP2634720A1 Service usage management method, recording medium, and information processing device |
09/04/2013 | EP2634719A2 System and method of providing biometric quick launch |
09/04/2013 | EP2634718A1 Tamper monitoring system, protection control module and detection module |
09/04/2013 | EP2634709A2 System and method for appending security information to search engine results |
09/04/2013 | EP2634703A1 Removable storage device, and data processing system and method based on the device |
09/04/2013 | EP2633716A1 Data processing for securing local resources in a mobile device |
09/04/2013 | EP2633677A1 Method of receiving a multimedia content scrambled with the aid of control words and captcha |
09/04/2013 | EP2633468A2 Creating distinct user spaces through user identifiers |
09/04/2013 | EP2633467A2 Creating distinct user spaces through mountable file systems |
09/04/2013 | EP2633466A2 System and method for securing virtual computing environments |
09/04/2013 | EP2633465A2 Storage device, and authentication method and authentication device of storage device |
09/04/2013 | EP2633464A1 Software authentication |
09/04/2013 | EP2633463A1 Methods and systems for accessing licensable items in a geographic area |
09/04/2013 | EP2633462A1 Protecting data integrity with storage leases |
09/04/2013 | EP2633461A1 A method for accessing an application and a corresponding device |
09/04/2013 | EP2633422A2 Unified policy over heterogenous device types |
09/04/2013 | CN203180938U Electronic token and electronic token authenticating system |
09/04/2013 | CN203179054U 智能卡 Smart Card |
09/04/2013 | CN203179023U Constant-temperature and anti-theft computer case |
09/04/2013 | CN203179022U Anti-theft computer case |
09/04/2013 | CN203178849U Notebook computer provided with U disk bin |
09/04/2013 | CN103282914A Protection device |
09/04/2013 | CN103282913A Method for loading the code of at least one software module |
09/04/2013 | CN103282912A Secure and private location |
09/04/2013 | CN103282911A Method for interworking trust between a trusted region and an untrusted region, method, server, and terminal for controlling the downloading of trusted applications, and control system applying same |
09/04/2013 | CN103282910A Enabling users to select between secure service providers using a central trusted service manager |
09/04/2013 | CN103282909A Authentication coordination system and ID provider device |
09/04/2013 | CN103281454A Cellphone information switching software |
09/04/2013 | CN103281415A Split mobile terminal and processing method for mobile terminal private data |
09/04/2013 | CN103281325A Method and device for processing file based on cloud security |
09/04/2013 | CN103281186A Dynamic token based on Android system as well as transaction system and method |
09/04/2013 | CN103281177A Method and system for detecting hostile attack on Internet information system |
09/04/2013 | CN103279915A Watermark embedding method for virtual graph bar code-based graphs |
09/04/2013 | CN103279775A RFID (Radio Frequency Identification) system capable of ensuring confidentiality and data integrity and implementation method thereof |
09/04/2013 | CN103279720A USB printer safe printing monitoring and auditing system |
09/04/2013 | CN103279719A Mobile terminal and method for preventing falling-caused failure of touch screen of mobile terminal |
09/04/2013 | CN103279718A Data integrity verification method based on SBT in cloud storage |
09/04/2013 | CN103279717A Operation method and device for documents |
09/04/2013 | CN103279716A Personal medical information mobile storage device |
09/04/2013 | CN103279715A Database data encryption and decryption method and device |
09/04/2013 | CN103279714A Mobile terminal as well as data encryption and decryption method |
09/04/2013 | CN103279713A Optimized SNS (social network service) graph data publication privacy protection method |
09/04/2013 | CN103279712A Method for enhancing system safety, checking device and safety system |
09/04/2013 | CN103279711A PE file shell adding detecting method with stable static characteristic values |
09/04/2013 | CN103279710A Detection method and system of Internet information system malicious codes |
09/04/2013 | CN103279709A Method and system for comprehensively detecting advertisement plug-in based on multi-features |
09/04/2013 | CN103279708A Method and system for monitoring and analyzing mobile terminal malicious code behaviors |
09/04/2013 | CN103279707A Method, device and system for actively defending against malicious programs |