Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
01/2015
01/21/2015CN102495991B 用word文档进行保密通信的方法 Confidential communication method word document
01/21/2015CN102339372B 图像形成装置以及图像形成方法 And an image forming apparatus image forming method
01/21/2015CN102089767B 无人值守应用程序的经认证数据库连接 Unattended applications certified database connection
01/21/2015CN101321168B 版权对象获取方法和系统 Copyright target acquisition method and system
01/21/2015CN101110678B 用于移动通信系统内安全数据传输的方法和装置 Mobile communication system secure data transmission method and apparatus for
01/20/2015US8938811 Information processing apparatus, method, program, and integrated circuit
01/20/2015US8938809 Retrieval of data across multiple partitions of a storage device using digital signatures
01/20/2015US8938808 Systems and methods for using virtualization to implement information rights management
01/20/2015US8938807 Malware removal without virus pattern
01/20/2015US8938806 Partial pattern detection with commonality factoring
01/20/2015US8938802 System and method for run-time attack prevention
01/20/2015US8938800 System and method for network level protection against malicious software
01/20/2015US8938799 Security protection apparatus and method for endpoint computing systems
01/20/2015US8938798 User access control based on handheld device orientation
01/20/2015US8938797 User validation using images
01/20/2015US8938796 Case secure computer architecture
01/20/2015US8938792 Device authentication using a physically unclonable functions based key generation system
01/20/2015US8938791 System and method to control display of a realm name
01/20/2015US8938790 System and method for providing secure access to a remote file
01/20/2015US8938787 System, device, and method of detecting identity of a user of a mobile electronic device
01/20/2015US8938786 System and method for using a declarative approach to enforce instance based security in a distributed environment
01/20/2015US8938784 Authorization of server operations
01/20/2015US8938783 Security language expressions for logic resolution
01/20/2015US8938782 Systems and methods for providing network access control in virtual environments
01/20/2015US8938780 Display authentication
01/20/2015US8938778 System and method for controlling user access to encrypted data
01/20/2015US8938776 Method and system for user defined local storage of information and objects in a virtual world
01/20/2015US8938774 System and method for I/O port assignment and security policy application in a client hosted virtualization system
01/20/2015US8938727 Method for preventing software reverse engineering, unauthorized modification, and runtime data interception
01/20/2015US8938671 Methods and apparatus for securely displaying digital images
01/20/2015US8938627 Multilayer securing structure and method thereof for the protection of cryptographic keys and code
01/20/2015US8938626 Single command functionality for providing data security and preventing data access within a decommissioned information handling system
01/20/2015US8938625 Systems and methods for securing cryptographic data using timestamps
01/20/2015US8938624 Encryption key destruction for secure data erasure
01/20/2015US8938623 Cryptographic processing system, key generation device, encryption device, decryption device, cryptographic processing method, and cryptographic processing program
01/20/2015US8938622 Encryption in the cloud with customer controlled keys
01/20/2015US8938621 Computing device integrity protection
01/20/2015US8938619 System and method for decrypting content samples including distinct encryption chains
01/20/2015US8938618 Device booting with an initial protection component
01/20/2015US8938617 One way authentication
01/20/2015US8938612 Limited-access state for inadvertent inputs
01/20/2015US8938531 Apparatus, system and method for multi-context event streaming network vulnerability scanner
01/20/2015US8938433 Information management apparatus, information management method, and information control program
01/20/2015US8938423 Distributed management framework for personal attributes
01/20/2015US8938401 Systems and methods for signaling content rights through release windows life cycle
01/20/2015US8938399 Method and system for automatically repairing a fraudulent identity theft incident
01/20/2015US8938101 Apparatus, system, and method for real-time identification of finger impressions for multiple users
01/20/2015US8938067 Format preserving encryption methods for data strings with constraints
01/20/2015US8937727 Portable handheld device with multi-core image processor
01/20/2015US8937629 Mobile terminal device
01/20/2015US8936196 Camera unit incorporating program script scanner
01/20/2015CA2778805C Saving and retrieving data based on public key encryption
01/17/2015CA2853426A1 Method for authenticating an rfid tag
01/15/2015WO2015006307A1 Systems and methods for trusted sharing
01/15/2015WO2015006110A1 Identifying misuse of legitimate objects
01/15/2015WO2015006002A1 Systems and methods of analyzing a software component
01/15/2015WO2015005936A1 Analyzing target software for security vulnerabilities
01/15/2015WO2015005922A1 Printing composite documents
01/15/2015WO2015005765A2 Security model switching for database management system
01/15/2015WO2015005763A1 A system and method for cloud provider to provide virtual machine subscription service
01/15/2015WO2015005744A1 Electronic device and method for suggesting response manual in occurrence of denial
01/15/2015WO2015005736A1 Client system and method of operating client system
01/15/2015WO2015005734A1 User terminal device for supporting user interaction and methods thereof
01/15/2015WO2015005133A1 Reception device, reception method, and transmission method
01/15/2015WO2015004978A1 Content transmission apparatus, content transmission method, and computer program
01/15/2015WO2015004744A1 Authentication device, authentication method, and program
01/15/2015WO2015004743A1 Relay processing device, relay processing method, and program
01/15/2015WO2015004706A1 Storage device and control method for storage device
01/15/2015WO2015004677A1 A computer implemented system and method for performing cashless transactions
01/15/2015WO2015004598A1 Device, system, and method of differentiating among users of a computerized service
01/15/2015WO2015004543A1 A network security system
01/15/2015WO2015004327A1 Method and device for file encryption
01/15/2015WO2015003943A1 Depositing at least one computable integrity measuring value in a memory area of a memory
01/15/2015WO2015003927A1 Tamper responsive sensor
01/15/2015WO2015003909A1 Method for securing a command to be applied to a motor vehicle
01/15/2015WO2015003672A1 Method of secret information entering into electronic digital devices
01/15/2015US20150020218 System and method for providing a permanent data record for a creative work
01/15/2015US20150020217 System and method related to drm
01/15/2015US20150020216 Systems and methods for enabling an automatic license for mashups
01/15/2015US20150020215 Cell level data accessibility
01/15/2015US20150020214 System and method for access control using network verification
01/15/2015US20150020212 Font Protection Management
01/15/2015US20150020211 Secure protection method and processor
01/15/2015US20150020210 Systems and methods for securing protected content
01/15/2015US20150020209 Auto-sharing of sensitive data
01/15/2015US20150020208 System and method for targeted messaging, workflow management, and digital rights management for geofeeds
01/15/2015US20150020207 Systems and methods for data loss prevention
01/15/2015US20150020206 Synthetic processing diversity with multiple architectures within a homogeneous processing environment
01/15/2015US20150020203 Method and device for processing computer viruses
01/15/2015US20150020202 System and method for bypassing a malware infected driver
01/15/2015US20150020201 Anti-viral compiler
01/15/2015US20150020200 System, method, and computer program product for mounting an image of a computer system in a pre-boot environment for validating the computer system
01/15/2015US20150020198 Methods of detection of software exploitation
01/15/2015US20150020197 Identifying misuse of legitimate objects
01/15/2015US20150020192 Address translation/specification field for hardware accelerator
01/15/2015US20150020191 Method and system for dynamically assignable user interface
01/15/2015US20150020190 Method for displaying contents and electronic device thereof
01/15/2015US20150020189 Electro-mechanic usb locking device
01/15/2015US20150020181 Personal authentication method and personal authentication device
01/15/2015US20150020174 Trust Metrics On Shared Computers
1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 ... 1193