Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
06/2013
06/26/2013CN103177220A Personal information encryption method in logistics system based on two-dimensional codes
06/26/2013CN103177219A Medical biochemical detection report critical data tamper-proofing method
06/26/2013CN103177218A Compression and encryption method based on flow records of electronic cash register
06/26/2013CN103177217A File scan method, file scan system, client-side and server
06/26/2013CN103177216A Two-dimensional chaotic system based on computer virus resistance
06/26/2013CN103177215A Computer malicious software detection novel method based on software control flow features
06/26/2013CN103177214A Detection method, system and communication terminal of malicious software
06/26/2013CN103177213A Software bug fix method and software bug fix system
06/26/2013CN103177212A Computer security input system and method based on lightweight virtual machine monitor unit
06/26/2013CN103177211A Software user terminal registration method and software user terminal registration system
06/26/2013CN103177210A Method of implanting dynamic stain analysis module in Android
06/26/2013CN103177209A Method and device for protecting server password
06/26/2013CN103177208A 智能密码钥匙 Smart cryptographic keys
06/26/2013CN103177207A Method and system for protecting data based on iris identification
06/26/2013CN103177206A Information privacy method and electronic terminal
06/26/2013CN103177205A Information processing device, information processing method, program, and information processing system
06/26/2013CN103177204A Password information tip method and device
06/26/2013CN103177203A Computer login management system
06/26/2013CN103177202A Method and system for realizing consulting authority limit management of patent tree
06/26/2013CN103177201A Content security in a social network
06/26/2013CN103177200A Method and system for configuring computing appliance
06/26/2013CN103177199A Webpage application code protective method and system, and executive speed-up method and system
06/26/2013CN103177022A Method and device of malicious file search
06/26/2013CN103176866A File permission back-up method applied in new technology file system (NTFS)
06/26/2013CN103176805A Executable program installation method and executable program installation system
06/26/2013CN103176786A Security configuration checking framework based on plug-in unit and construction method thereof
06/26/2013CN103176771A System and method to automatically generate kernel program in real time in chip software system
06/26/2013CN103176743A Information processing system based on fingerprint and touch control operation
06/26/2013CN103176705A Mobile terminal and preview method thereof
06/26/2013CN103176589A Screen display method and system in time of editing content
06/26/2013CN102301373B Health-based Access To Network Resources
06/26/2013CN101689241B Secure authentication of electronic prescriptions
06/25/2013US8474058 Method and system for managing a data object so as to comply with predetermined conditions for usage
06/25/2013US8474055 Method and apparatus for managing digital content
06/25/2013US8474051 Information processing system, information processor, image forming apparatus, and information processing method
06/25/2013US8474042 Insider threat correlation tool
06/25/2013US8474037 Stateless attestation system
06/25/2013US8474034 Method and apparatus for fast check and update of anti-replay window without bit-shifting in internet protocol security
06/25/2013US8474031 Access control method and apparatus
06/25/2013US8474029 Method and system of user authentication using a portable authenticator
06/25/2013US8474025 Methods and apparatus for credential validation
06/25/2013US8474022 Self-service credential management
06/25/2013US8474021 Security system and method for computers
06/25/2013US8474020 User authentication method, wireless communication apparatus, base station, and account management apparatus
06/25/2013US8474019 Securing asynchronous client server transactions
06/25/2013US8474012 Progressive consent
06/25/2013US8474011 On-line centralized and local authorization of executable files
06/25/2013US8474008 Methods and devices for managing events linked to the security of the computer systems of aircraft
06/25/2013US8474006 Retrospective policy safety net
06/25/2013US8474004 System for implementing security on telecommunications terminals
06/25/2013US8473810 Memory chip having a security function and for which reading and writing of data is controlled by an authenticated controller
06/25/2013US8473757 Protecting digital data such as images on a device with image acquisition capabilities
06/25/2013US8473753 Real-time secure self-acquiring root authority
06/25/2013US8473748 Mobile device-based authentication
06/25/2013US8473747 Secure boot with minimum number of re-boots
06/25/2013US8473745 Rights enforcement and usage reporting on a client device
06/25/2013US8473739 Advanced content authentication and authorization
06/25/2013US8473732 Method and system for secure block acknowledgment (block ACK) with protected MAC sequence number
06/25/2013US8473729 Method and apparatus for managing the privacy and disclosure of location information
06/25/2013US8473671 Semiconductor memory card access apparatus, a computer-readable medium, an initialization method, and a semiconductor memory card
06/25/2013US8473612 Trusted network transfer of content using off network input code
06/25/2013US8473514 Media validation system
06/25/2013US8473452 System and method for analyzing de-identified health care data
06/25/2013US8473417 Signing program data payload sequence in program loading
06/25/2013US8473416 Jukebox with customizable avatar
06/25/2013US8473312 Diagnostic image security system
06/25/2013US8472625 Method and system for protecting 3D video content
06/25/2013DE202008018393U1 System zum Vorsehen eines biometrischen Schnellstarts System for providing a biometric QuickStarts
06/25/2013CA2777125C Using file prevalence to inform agressiveness of behavioral heuristics
06/25/2013CA2653204C An automated adaptive method for identity verification with performance guarantees
06/23/2013CA2798972A1 Method and system for controlling system settings of a computing device
06/22/2013CA2799908A1 System and method for accessing a software application
06/20/2013WO2013090867A2 Personal space (data) v. corporate space (data)
06/20/2013WO2013090718A1 Multi-user login for shared mobile devices
06/20/2013WO2013090467A1 Conditional access using embedded watermarks
06/20/2013WO2013090466A1 Watermark embedding workflow improvements
06/20/2013WO2013090462A1 Coordinated watermarking
06/20/2013WO2013090412A1 Improving startup times of streaming digital media playback
06/20/2013WO2013090359A1 Cryptography for secure shell in emulated environments
06/20/2013WO2013090314A1 Secure operating system/web server systems and methods
06/20/2013WO2013090166A2 System and method for trusted pair security
06/20/2013WO2013090103A1 Identifying application resources through implicit application models
06/20/2013WO2013090091A2 Counter operation in a state machine lattice
06/20/2013WO2013090045A1 Cryptographic certification of secure hosted execution environments
06/20/2013WO2013090044A1 Facilitating system service request interactions for hardware-protected applications
06/20/2013WO2013090020A1 Storage device and method for super-distribution of content protected with a localized content encryption key
06/20/2013WO2013090019A1 Host device and method for super-distribution of content protected with a localized content encryption key
06/20/2013WO2013089728A1 Method, device, and system for securely sharing media content from a source device
06/20/2013WO2013089726A1 Method, device, and system for protecting and securely delivering media content
06/20/2013WO2013089607A1 Method for detection of persistent malware on a network node
06/20/2013WO2013089591A1 Authentication of devices
06/20/2013WO2013089576A1 Fuzzy whitelisting anti-malware systems and methods
06/20/2013WO2013088885A1 Information processing device
06/20/2013WO2013088867A1 Authentication method, authentication device, and authentication program
06/20/2013WO2013088837A1 Input information authentication device, server, input information authentication system, and device program
06/20/2013WO2013088681A1 Anonymization device, anonymization method, and computer program
06/20/2013WO2013088485A1 Computer system and volume migration control method using the same
06/20/2013WO2013088258A2 Systems and methods for authenticating benefit recipients
06/20/2013WO2013088180A1 Method and internet terminal for remotely performing operations on a secure element connected to a communication device
06/20/2013WO2013087984A1 Method and apparatus for providing federated service accounts