Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
07/2013
07/17/2013CN103207965A Method and device for License authentication in virtual environment
07/17/2013CN103207964A Multifunctional intelligent key device and operating method thereof
07/17/2013CN103207963A Two-factor authentication system based on fingerprint and vein recognition
07/17/2013CN103207962A Networked embedded finger vein identification system and finger vein identification method for system
07/17/2013CN103207961A User verification method and device
07/17/2013CN103207960A Data processing method and device of electronic map service platform
07/17/2013CN103207959A Encryption method and system based on data card of file system
07/17/2013CN103207958A Encryption device and method for batch SWF (small web format) files in AS3.0 (action script 3.0) scripting
07/17/2013CN103207957A Digital Content Preview Generation And Distribution Among Peer Devices
07/17/2013CN103207956A Method And Apparatus For Creating Licenses In A Mobile Digital Rights Management Network
07/17/2013CN103207955A Method and system for protecting electronic terminal and electronic terminal
07/17/2013CN103207816A Linux system repairing method
07/17/2013CN103207654A Display device and mounting apparatus
07/17/2013CN101965575B 数据处理装置 Data processing means
07/17/2013CN101901314B Detection and minimization of false positives in anti-malware processing
07/17/2013CN101877639B Information processing apparatus, key update method, and program
07/17/2013CN101873318B Application and data security method aiming at application system on application basis supporting platform
07/17/2013CN101719254B System for preventing evil leak of genuine client information and method thereof
07/17/2013CN101627394B System and method for interlocking to protect software-mediated program and device behaviours
07/17/2013CN101571837B Centralized protection method for operating system
07/17/2013CN101308547B Method for controlling the execution of an applet for an IC card
07/17/2013CN101273363B Flash mass storage memory and operation method thereof
07/16/2013US8490208 Method and device for detecting if a computer file has been copied and method and device for enabling such detection
07/16/2013US8490205 Method for protecting signatures stored in a database
07/16/2013US8490203 Fingerprinting based entity extraction
07/16/2013US8490199 Moderation of cheating in on-line gaming sessions
07/16/2013US8490194 Method and system for detecting malicious behavioral patterns in a computer, using machine learning
07/16/2013US8490193 System and method for probabilistic attack planning
07/16/2013US8490191 Method and system for intrusion detection
07/16/2013US8490184 Verification for computer programs that include external call references
07/16/2013US8490183 Security ensuring by program analysis on information device and transmission path
07/16/2013US8490182 Apparatus and approach for electronic data management, processing and implementation
07/16/2013US8490179 Computing platform
07/16/2013US8490177 Apparatus and method for variable authentication requirements
07/16/2013US8490167 Preventing password presentation by a computer system
07/16/2013US8490162 System and method for recognizing malicious credential guessing attacks
07/16/2013US8490161 Methods, systems and computer program products for provisioning VLAN services in a network
07/16/2013US8490159 Method for increasing security in a passive optical network
07/16/2013US8490156 Interface for access management of FEMTO cell coverage
07/16/2013US8489997 Supplying notifications related to supply and consumption of user context data
07/16/2013US8489900 Method and apparatus for providing a specific user interface in a system for managing content
07/16/2013US8489898 Method and apparatus for including architecture for protecting multi-user sensitive code and data
07/16/2013US8489894 Reference token service
07/16/2013US8489892 Device and method for digital processing management of content so as to enable an imposed work flow
07/16/2013US8489890 Method and system for managing delayed user authentication
07/16/2013US8489889 Method and apparatus for restricting access to encrypted data
07/16/2013US8489888 Processor apparatus having a security function
07/16/2013US8489887 Biometric authentication for video communication sessions
07/16/2013US8489886 Double authentication for controlling disruptive operations on storage resources
07/16/2013US8489873 Migration apparatus, method and system for transferring data protected within a first terminal device to a second terminal device
07/16/2013US8489868 Software code signing system and method
07/16/2013US8489860 Mobile electronic device having a host processor system capable of dynamically canging tasks performed by a coprocessor in the device
07/16/2013US8489836 Secure memory management system and method
07/16/2013US8489809 Intelligent storage provisioning within a clustered computing environment
07/16/2013US8489797 Hardware resource arbiter for logical partitions
07/16/2013US8489736 Mediation device, mediation method and mediation system
07/16/2013US8489723 Controlling access to managed objects in networked devices
07/16/2013US8489699 Live migration of virtual machine during direct access to storage over SR IOV adapter
07/16/2013US8489593 Compiling information obtained by combinatorial searching
07/16/2013US8489511 Privacy protection system and method
07/16/2013US8489510 Barter for rights
07/16/2013US8489508 Service system
07/16/2013US8488788 Method for simulcrypting scrambled data to a plurality of conditional access devices
07/16/2013US8488787 Management of secure access to a secure digital content in a portable communicating object
07/16/2013US8488781 Method for implementing symmetric key encryption algorithm against power analysis attacks
07/16/2013US8488479 Method and apparatus for providing protection against spam
07/16/2013US8488360 Semiconductor integrated circuit including a logic circuit module with a plurality of photodetectors
07/16/2013US8488156 Image processing apparatus and communicating method for dynamically assigning a transmission destination based on the type of job
07/16/2013US8485428 Systems and methods for providing security information about quick response codes
07/16/2013CA2671824C System and method to force a mobile device into a secure state
07/16/2013CA2490525C System and method for digital rights management
07/16/2013CA2428953C Secure media path methods, systems, and architecture
07/11/2013WO2013103994A2 System and method for item self-assessment as being extant or displaced
07/11/2013WO2013103991A1 Data protection with translation
07/11/2013WO2013103989A1 Systems and meathods for enforcing secutity in mobile computing
07/11/2013WO2013103986A2 Systems and methods for accessing digital content using electronic tickets and ticket tokens
07/11/2013WO2013103705A1 Accessing overlay media over a network connection
07/11/2013WO2013103568A1 Method for media content delivery using video and/or audio on demand assets
07/11/2013WO2013103563A1 Method and apparatus to prevent receiver desensitization from radiated hdmi signals in accessory or computing devices
07/11/2013WO2013103557A1 Cloning storage devices through secure communications links
07/11/2013WO2013103555A1 Providing cluster storage with fibre channel over ethernet and multipath input/output
07/11/2013WO2013103554A1 Method and device for adding or replacing storage
07/11/2013WO2013103323A1 System, method and computer program arranged to facilitate a transaction
07/11/2013WO2013103019A1 Captcha provision method and program
07/11/2013WO2013102708A1 Method for executing an application in an nfc device
07/11/2013WO2013102596A1 Secure data transmission
07/11/2013WO2013102564A1 Computer system for updating programs and data in different memory areas with or without write authorizations
07/11/2013WO2013102521A1 Method for secure self-booting of an electronic device
07/11/2013WO2013102276A1 Confidential information access via social networking web site
07/11/2013WO2013102267A1 Method and system for dynamically assignable user interface
07/11/2013WO2013074152A8 Method, apparatus and program for detecting spoofed network traffic
07/11/2013WO2013057361A3 Method and apparatus for providing data sharing schemes to provision device services
07/11/2013WO2012177651A3 Computing system for managing data
07/11/2013WO2012161966A3 Methods and apparatus for blocking usage tracking
07/11/2013US20130179996 Iimplementing data theft prevention
07/11/2013US20130179995 Systems and methods for authentication of digital content
07/11/2013US20130179994 Dual Trust Architecture
07/11/2013US20130179993 System and Methods for Host Enabled Management in a Storage System
07/11/2013US20130179992 Systems and methods for accessing digital content using electronic tickets and ticket tokens
07/11/2013US20130179990 Confidential information access via social networking web site