Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
07/2013
07/10/2013CN103198250A Method for auditing applications of intelligent television
07/10/2013CN103198249A Secure and usable protection of a roamable credentials store
07/10/2013CN103198248A Information processor, information processing method, and program
07/10/2013CN103198247A Computer safety protection method and computer safety protection system
07/10/2013CN103198246A System for starting electric device
07/10/2013CN103198245A Input output control device and control method thereof
07/10/2013CN103198244A Method for protecting dynamic linking library (DLL)
07/10/2013CN103198243A Method and device for identifying emulational application programs
07/10/2013CN103198242A Method for encrypting through chip
07/10/2013CN103198241A Safety management method for software license
07/10/2013CN103198240A Method and device for protecting security of code
07/10/2013CN103198239A Content protection via online servers and code execution in a secure operating system
07/10/2013CN103198037A Reliable pipe control method and system for IO (input output) equipment
07/10/2013CN103198032A SD (secure digital) card containing hidden partition and control method
07/10/2013CN103198031A Information processing apparatus and method for releasing restriction on use of storage device
07/10/2013CN103198030A Method for accessing a secure storage, secure storage and system comprising the secure storage
07/10/2013CN103198013A Loss-amount based software strong security measurement method
07/10/2013CN103197900A Image processing apparatus and control method of image processing apparatus
07/10/2013CN103197896A Microwave excited ultraviolet lamp system with data logging and retrieval circuit and method
07/10/2013CN102194080B Rootkit detection method based on kernel-based virtual machine
07/10/2013CN102054135B Software authorization method and device
07/10/2013CN102004874B Digital resource monitoring and early warning method based on synthetic characteristics
07/10/2013CN101965574B Authentication information generation system, authentication information generation method and a client device
07/10/2013CN101894239B Method and system for auditing and distributing sensitive data based on evolution strategy
07/09/2013US8484754 Output control method
07/09/2013US8484753 Hooking nonexported functions by the offset of the function
07/09/2013US8484752 Verifying authenticity of electronic control unit code
07/09/2013US8484751 System and method for permitting use of content
07/09/2013US8484750 Coupling of a computer program or of data to a reference system and associated verification
07/09/2013US8484743 Image forming apparatus and computer-readable storage medium for computer program
07/09/2013US8484734 Application programming interface for antivirus applications
07/09/2013US8484732 Protecting computers against virtual machine exploits
07/09/2013US8484731 Method for detecting an attack by fault injection into a memory device, and corresponding detection system
07/09/2013US8484729 Security operation management system, security operation management method, and security operation management program
07/09/2013US8484724 User permissions in computing systems
07/09/2013US8484722 Enhanced user interface manager and method for managing non-contemporaneous user interface modules
07/09/2013US8484720 Service binding method and system
07/09/2013US8484714 Method and rule-repository for generating security-definitions for heterogeneous systems
07/09/2013US8484712 Personal token having enhanced signaling abilities
07/09/2013US8484707 Secure changing auto-generated keys for wireless access
07/09/2013US8484701 Methods for internet security via multiple user authorization in virtual software
07/09/2013US8484699 Context-sensitive confidentiality within federated environments
07/09/2013US8484698 Multichannel device utilizing a centralized out-of-band authentication system (COBAS)
07/09/2013US8484696 Secure game download
07/09/2013US8484693 Efficient policy conflict detection
07/09/2013US8484691 Copyright detection and protection system and method
07/09/2013US8484484 Method of sending an executable code to a reception device and method of executing this code
07/09/2013US8484483 Method for protecting computer programs and data from hostile code
07/09/2013US8484482 Password generation and validation system and method
07/09/2013US8484481 Chip lockout protection scheme for integrated circuit devices and insertion thereof
07/09/2013US8484480 Transmitting information using virtual input layout
07/09/2013US8484479 Systems and methods for authenticating an electronic message
07/09/2013US8484468 Process and system for selectable data transmission
07/09/2013US8484467 Authentication in communications networks
07/09/2013US8484459 Secure transfer of information
07/09/2013US8484455 Online data encryption and decryption
07/09/2013US8484451 Method and apparatus for software boot revocation
07/09/2013US8484449 Program, communication device, data processing method, and communication system
07/09/2013US8484237 Terminal, web application operating method and program
07/09/2013US8483386 Share generation apparatus, reconstruction apparatus, verification apparatus, and secret sharing system
07/09/2013US8482768 Print job management using memory boxes
07/09/2013US8480761 Security enclosure for a router
07/09/2013CA2801659A1 Identity management system and method including architecture for the same
07/09/2013CA2692416C Authentication using a wireless mobile communication device
07/04/2013WO2013102119A1 Anti-virus protection for mobile devices
07/04/2013WO2013101894A2 Secure user authentication for bluetooth enabled computer storage devices
07/04/2013WO2013101754A1 Unified network architecture having storage devices with secure boot devices
07/04/2013WO2013101722A2 Systems and methods for preventing data remanence in memory
07/04/2013WO2013101384A1 Methods and apparatus for securing a software application on a mobile device
07/04/2013WO2013101372A1 Geo-mapping system security events
07/04/2013WO2013101353A1 Host device and method for partitioning attributes in a storage device
07/04/2013WO2013101236A1 Securing device environment for trust provisioning
07/04/2013WO2013101208A1 Hardware enforced memory access permissions
07/04/2013WO2013101207A1 Method of creating ui layouts with desired level of entropy
07/04/2013WO2013101188A1 Memory event notification
07/04/2013WO2013101176A1 Apparatus and method for managing operation of a mobile device
07/04/2013WO2013101154A1 Trusted application migration across computer nodes
07/04/2013WO2013101083A1 An apparatus for hardware accelerated runtime integrity measurement
07/04/2013WO2013101034A1 Software modification for partial secure memory processing
07/04/2013WO2013100973A1 Persona manager for network communications
07/04/2013WO2013100965A1 A low-overhead cryptographic method and apparatus for providing memory confidentiality, integrity and replay protection
07/04/2013WO2013100964A1 Method and system for protecting memory information in a platform
07/04/2013WO2013098804A2 Method and system for ensuring authenticity of ip data served by a service provider
07/04/2013WO2013098677A1 Targeted security testing
07/04/2013WO2013098485A1 Method and apparatus for consent document management
07/04/2013WO2013098483A1 Method and apparatus for controlling access to resources
07/04/2013WO2013098477A1 Method and apparatus for approving multimedia data
07/04/2013WO2013098467A1 Method and apparatus providing privacy setting and monitoring user interface
07/04/2013WO2013098308A1 Method and system for content distribution
07/04/2013WO2013098284A1 Method for determining anonymously a given user's data among a plurality of user's data in a network
07/04/2013WO2013097932A1 Data synchronization systems and methods
07/04/2013WO2013097718A1 Method and device for detecting malicious code on web pages
07/04/2013WO2013048773A3 In-band peripheral authentication
07/04/2013US20130174283 Portable data carrier having an operating error counter
07/04/2013US20130174282 Digital right management method, apparatus, and system
07/04/2013US20130174279 Secure Read-Write Storage Device
07/04/2013US20130174276 Content distribution system, content distribution method, and client terminal
07/04/2013US20130174274 Data policies for online services
07/04/2013US20130174273 Systems and methods for managing digital rights based on a union or intersection of individual rights
07/04/2013US20130174272 Digital Content Distribution and Protection