Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
08/20/2013 | US8516263 Electronic apparatus and communication control method |
08/20/2013 | US8516260 Method, apparatus, and device for providing security among a calling function and a target function |
08/20/2013 | US8516258 Generator for generating a message authentication code, method of generating a message authentication code, program element and computer-readable medium |
08/20/2013 | US8516235 Basic input/output system read only memory image integration system and method |
08/20/2013 | US8516212 Data processing apparatus, computer program therefor, and data processing method |
08/20/2013 | US8516086 Generalized credential and protocol management of infrastructure |
08/20/2013 | US8516033 Computers or microchips with a hardware side protected by a primary internal hardware firewall leaving an unprotected hardware side connected to a network, and with multiple internal hardware compartments protected by multiple secondary interior hardware firewalls |
08/20/2013 | US8515981 Program distribution server, image forming apparatus, program distribution system, and contract document integration method |
08/20/2013 | US8515081 Approach for managing access to messages using encryption key management policies |
08/20/2013 | US8515075 Method of and system for malicious software detection using critical address space protection |
08/20/2013 | US8515062 Image encryption/decryption apparatus, method and program |
08/20/2013 | US8511567 Smart card chip arrangement |
08/17/2013 | CA2800504A1 Designation of classes for certificates and keys |
08/17/2013 | CA2799903A1 Certificate management method based on connectivity and policy |
08/16/2013 | CA2806262A1 Secure audio peripheral device |
08/16/2013 | CA2805960A1 Method and apparatus for management of multiple grouped resources on device |
08/15/2013 | WO2013119934A1 Systems and methods for testing online systems and content |
08/15/2013 | WO2013119750A2 Dynamic psk for hotspots |
08/15/2013 | WO2013119664A1 Digital data commerce system and methods with digital media object to cloud redirection |
08/15/2013 | WO2013119401A1 Security policy for device data |
08/15/2013 | WO2013119385A1 Protecting user credentials from a computing device |
08/15/2013 | WO2013119103A1 Hardware authentication system |
08/15/2013 | WO2013119065A1 Securely upgrading or downgrading platform components |
08/15/2013 | WO2013118046A1 Policy management and compliance for user provisioning system |
08/15/2013 | WO2013117899A1 Exception handling in a data processing apparatus having a secure domain and a less secure domain |
08/15/2013 | WO2013117896A1 Maintaining secure data isolated from non-secure access when switching between domains |
08/15/2013 | WO2013116918A1 Method and apparatus for program flow in software operation |
08/15/2013 | WO2013116916A1 System and method for generating and protecting cryptographic keys |
08/15/2013 | WO2013078535A8 Methods, media, and system for monitoring access to computer environments |
08/15/2013 | WO2013077929A3 Retention based intrinsic fingerprint identification featuring a fuzzy algorithm and a dynamic key |
08/15/2013 | WO2013067072A3 Mapping identities to documents to enable multiple user logins |
08/15/2013 | WO2013067066A3 Intelligent caching for security trimming |
08/15/2013 | WO2013054074A3 Id authentication |
08/15/2013 | US20130212714 Information Management System And Device |
08/15/2013 | US20130212713 Method and apparatus for providing backend support for device control in risk conditions |
08/15/2013 | US20130212711 Solution for Continuous Control and Protection of Enterprise Data Based on Authorization Projection |
08/15/2013 | US20130212710 Data Leakage Prevention for Cloud and Enterprise Networks |
08/15/2013 | US20130212709 System and Method for Securing Virtual Computing Environments |
08/15/2013 | US20130212708 System and methods thereof for detection of content servers, caching popular content therein, and providing support for proper authentication |
08/15/2013 | US20130212706 Broadcasting of electronic documents preserving copyright and permitting private copying |
08/15/2013 | US20130212705 System and method of generating a per sale watermarking on digital files |
08/15/2013 | US20130212704 Secure digital storage |
08/15/2013 | US20130212703 Role-Based Content Rendering |
08/15/2013 | US20130212702 Apparatus and Method for Data Security on Mobile Devices |
08/15/2013 | US20130212700 Exception handling in a data processing apparatus having a secure domain and a less secure domain |
08/15/2013 | US20130212699 Methods and systems for facilitating personal data propagation |
08/15/2013 | US20130212698 Method and device for the secure transfer of data |
08/15/2013 | US20130212697 Secure data exchange technique |
08/15/2013 | US20130212696 Apparatuses, systems, and methods for renewability with digital content protection systems |
08/15/2013 | US20130212695 Segmented media content rights management |
08/15/2013 | US20130212694 Method and apparatus for rf transmitable data protection |
08/15/2013 | US20130212693 Anonymous whistle blower system with reputation reporting of anonymous whistle blower |
08/15/2013 | US20130212692 Systems and Methods for Managing Data Incidents |
08/15/2013 | US20130212691 Electronic system for the protection and control of license transactions associated with the alteration of replicated read only media and its bound licensed content |
08/15/2013 | US20130212690 Private decayed sum estimation under continual observation |
08/15/2013 | US20130212688 System for sharing a users personal data |
08/15/2013 | US20130212687 Bridge for communicating with a dynamic computer network |
08/15/2013 | US20130212684 Detecting Application Harmful Behavior and Grading Application Risks for Mobile Devices |
08/15/2013 | US20130212683 Systems and Methods for Managing Data Incidents |
08/15/2013 | US20130212682 Automatic discovery of system integrity exposures in system code |
08/15/2013 | US20130212678 Altering Sampling Rate to Thwart Attacks that involve Analyzing Hardware Sensor Output |
08/15/2013 | US20130212677 Thwarting Attacks that involve Analyzing Hardware Sensor Output |
08/15/2013 | US20130212676 Mission management for dynamic computer networks |
08/15/2013 | US20130212675 Dynamic computer network with variable identity parameters |
08/15/2013 | US20130212674 System and method for signature pathway authentication and identification |
08/15/2013 | US20130212673 Entering a secured computing environment using multiple authenticated code modules |
08/15/2013 | US20130212672 Execution of a secured environment initialization instruction on a point-to-point interconnect system |
08/15/2013 | US20130212671 Security-Enhanced Computer Systems and Methods |
08/15/2013 | US20130212669 Detecting and Combating Attack In Protection System of an Industrial Control System |
08/15/2013 | US20130212668 Suspension of Processes in Industrial Control System When an Anomaly Occurs |
08/15/2013 | US20130212666 Tokenization in mobile environments |
08/15/2013 | US20130212665 Signing off from multiple domains accessible using single sign-on |
08/15/2013 | US20130212662 Security access in a computer-based flow of tasks |
08/15/2013 | US20130212660 Credential manangement system |
08/15/2013 | US20130212657 Electronic device and method for resetting unlocking password of the electronic device |
08/15/2013 | US20130212656 Dynamic PSK for Hotspots |
08/15/2013 | US20130212655 Efficient prevention fraud |
08/15/2013 | US20130212653 Systems and methods for password-free authentication |
08/15/2013 | US20130212647 Method for opening a session of a machine belonging to a machine set |
08/15/2013 | US20130212643 Transmission apparatus, electronic appliance, reception apparatus, and authentication system |
08/15/2013 | US20130212642 Resilient Device Authentication System |
08/15/2013 | US20130212618 Individualized program guide based on system and user constraints |
08/15/2013 | US20130212406 Technique for providing secure firmware |
08/15/2013 | US20130212405 Secure data parser method and system |
08/15/2013 | US20130212404 Document modification detection and prevention |
08/15/2013 | US20130212403 Electronic content rights with and-or expression |
08/15/2013 | US20130212402 Techniques for calibrating measuring devices |
08/15/2013 | US20130212399 Travel Vault |
08/15/2013 | US20130212398 Method and system for validating a device that uses a dynamic identifier |
08/15/2013 | US20130212397 Apparatus and method for incorporating signature into electronic documents |
08/15/2013 | US20130212389 Enterprise computer investigation system |
08/15/2013 | US20130212381 System and method for controlling authorized access to a structured testing procedure on a medical device |
08/15/2013 | US20130212376 Data access management in a hybrid memory server |
08/15/2013 | US20130212375 Method of Checking and Protecting Data and Identity Especially Within Processes Using Information and Communication Technologies. |
08/15/2013 | US20130212370 Method and apparatus for establishing safe processor operating points |
08/15/2013 | US20130212369 Attesting use of an interactive component during a boot process |
08/15/2013 | US20130212367 Security Policy for Device Data |
08/15/2013 | US20130211876 System and method for collection, aggregation, analysis, reporting, and monetization of personal data generated across heterogeneous systems and devices |
08/15/2013 | US20130211833 Techniques for overlaying a custom interface onto an existing kiosk interface |
08/15/2013 | US20130210519 Secure game download |