Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
07/2013
07/18/2013WO2013106600A2 Identifying software execution behavior
07/18/2013WO2013106584A1 Computer system and method for managing medical care
07/18/2013WO2013106492A1 Detection of invalid escrow keys
07/18/2013WO2013106353A1 Contextual solicitation in a starter application
07/18/2013WO2013106340A1 Systems and methods for authentication of digital content
07/18/2013WO2013106286A1 Secure remote peripheral encryption tunnel
07/18/2013WO2013106276A1 Installation engine and package format for parallelizable, reliable installations
07/18/2013WO2013106093A2 Methods, systems, and devices for managing medical images and records
07/18/2013WO2013105877A2 Electronic signature security algorithms
07/18/2013WO2013105863A1 System and method related to drm
07/18/2013WO2013105554A1 Control device monitoring system and monitoring method for control device
07/18/2013WO2013105128A1 Data processing method, data processing system and data processing device
07/18/2013WO2013105076A1 Automated document redaction
07/18/2013WO2013104969A1 Virtual machine device having key driven obfuscation and method
07/18/2013WO2013062438A3 System and method for conducting payment transactions
07/18/2013WO2013056922A3 Method for calling up a client program
07/18/2013WO2013004854A3 Verification and access control of trusted memory regions
07/18/2013US20130185816 Information processing apparatus, method, program, and integrated circuit
07/18/2013US20130185815 Password-less login
07/18/2013US20130185814 Techniques for presenting and collecting end user license agreement acceptance
07/18/2013US20130185812 System and method for secure cloud computing
07/18/2013US20130185811 Sustained data protection
07/18/2013US20130185810 Controlled serialization and/or deserialization
07/18/2013US20130185808 Apparatus and method for protecting data stored in data storage device
07/18/2013US20130185807 End User License Agreement Detection and Monitoring
07/18/2013US20130185806 Personal-information transmission/reception system, personal-information transmission/reception method, personal-information provision apparatus, preference management apparatus and computer program
07/18/2013US20130185805 Method and apparatus for establishing usage rights for digital content to be created in the future
07/18/2013US20130185804 Method and apparatus for generating privacy ratings for applications
07/18/2013US20130185803 Marking and obscuring sensitive values in traces
07/18/2013US20130185800 Anti-virus protection for mobile devices
07/18/2013US20130185799 Trusted installation of a software application
07/18/2013US20130185798 Identifying software execution behavior
07/18/2013US20130185797 Whitelist-based inspection method for malicious process
07/18/2013US20130185796 Method and apparatus for secure and reliable computing
07/18/2013US20130185792 Dynamic execution prevention to inhibit return-oriented programming
07/18/2013US20130185791 Vouching for user account using social networking relationship
07/18/2013US20130185790 System and method for controlling user access to an electronic device
07/18/2013US20130185789 Method and apparatus for protecting a password of a computer having a non-volatile memory
07/18/2013US20130185788 Traversal of a soft bar to unlock an application
07/18/2013US20130185787 Safely Executing an Untrusted Native Code Module on a Computing Device
07/18/2013US20130185785 System and method for initializing and maintaining a series of virtual local area networks contained in a clustered computer system
07/18/2013US20130185782 Systems and methods for dual reader emulation
07/18/2013US20130185781 Method and device for realizing remote login
07/18/2013US20130185780 Computer implemented method and system for generating a one time password
07/18/2013US20130185777 Methods And Apparatus For Reliable And Privacy Protecting Identification Of Parties' Mutual Friends And Common Interests
07/18/2013US20130185774 Systems and Methods of Managing Access to Remote Resources
07/18/2013US20130185768 Monetization of a Media Channel Network
07/18/2013US20130185764 File system access for one or more sandboxed applications
07/18/2013US20130185763 Distributed processing system, distributed processing method and computer-readable recording medium
07/18/2013US20130185569 Data protection system and method based on cloud storage
07/18/2013US20130185568 Information processing system
07/18/2013US20130185567 Method or process for securing computers or mobile computer devices with a contact or dual-interface smart card
07/18/2013US20130185550 Method and system for nand flash support in an autonomously loaded secure reprogrammable system
07/18/2013US20130185397 Secure personal content server
07/18/2013US20130185332 Secure search performance improvement
07/18/2013US20130185230 Machine-learning based classification of user accounts based on email addresses and other account information
07/18/2013US20130185197 Method and apparatus for manufacturer revenue sharing with suppliers by licensing features to customers
07/18/2013US20130184059 Network Gaming Architecture, Gaming Systems, and Related Methods
07/18/2013US20130182278 Image forming apparatus and job control method
07/18/2013US20130182020 Disposable digital camera with printing assembly
07/18/2013DE112011101943T5 Verfahren und Einheit zum Entschärfen von seitenübergreifenden Sicherheitslücken Method and unit for defusing cross-page vulnerabilities
07/18/2013DE102013200030A1 Hash-basiertes verwalten von speicher-ids Hash-Based Management of store-ids
07/17/2013EP2615792A1 Methods and Systems for Providing Network Protection by Progressive Degradation of Service
07/17/2013EP2615641A2 Chip attack protection
07/17/2013EP2615571A1 Method of generating an identifier of an electronic device
07/17/2013EP2615570A1 A method for secure operation of a computing device
07/17/2013EP2615569A1 Information processing apparatus
07/17/2013EP2615568A2 Device verification for dynamic re-certificating
07/17/2013EP2614638A1 Content signaturing
07/17/2013EP2614459A2 Method and apparatus for authenticating a non-volatile memory device
07/17/2013EP2614458A2 Method of authentification for access to a website
07/17/2013EP2614457A1 Portable data carrier with operating error counter
07/17/2013EP2614456A1 Method of analyzing the behavior of a secure electronic token
07/17/2013EP2614435A1 Method for producing an application which is capable of being executed on a digital terminal which has a touch-sensitive screen, and apparatus
07/17/2013CN203070770U Mobile hard disk with switch protection function
07/17/2013CN203070305U Fingerprint recognition computer case based on DSP and FPGA
07/17/2013CN203070304U Anti-peeping protection assembly
07/17/2013CN203070303U Picture management system based on fingerprint authentication
07/17/2013CN203070302U Mobile terminal equipment capable of automatically storing data
07/17/2013CN203070301U Bank movable terminal data signature device and safety certification system
07/17/2013CN1983310B Method and system for prompting e-mail
07/17/2013CN103210607A Secure registration to a service provided by a web server
07/17/2013CN103210396A Method and apparatus including architecture for protecting sensitive code and data
07/17/2013CN103210395A Techniques for interaction with a guest virtual machine
07/17/2013CN103210394A Method of using device motion in a password
07/17/2013CN103210393A Individualized program guide based on system and user constraints
07/17/2013CN103209272A Processing apparatus and processing system
07/17/2013CN103209073A Anti-attack method and device in electronic component using Rivest-Shamir-Adleman (RSA) public-key encryption algorithm
07/17/2013CN103207977A Computer no-standby safety protection circuit
07/17/2013CN103207976A Mobile storage file leakage-preventing method and confidential U-disk based on same
07/17/2013CN103207975A Method for protecting password and computer
07/17/2013CN103207974A Data protection system and method
07/17/2013CN103207973A Method and system for invisibly storing file in encrypted manner
07/17/2013CN103207972A Device and method for recovering and analyzing login password of computer operation system
07/17/2013CN103207971A Cloud storage-based data security protection system and method
07/17/2013CN103207970A Virus file scanning method and device
07/17/2013CN103207969A Device and method for detecting Android malware
07/17/2013CN103207968A Recording method for operating process and management method and system for information safety
07/17/2013CN103207967A Data collecting method, information security management method and information security management host
07/17/2013CN103207966A Method and system for management of information safety