Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
06/18/2013 | US8468097 Method and apparatus for protecting the privacy of responder information |
06/18/2013 | US8467773 System and methods for pre-caching broadcast content for merchandising on a wireless mobile device |
06/18/2013 | US8467534 Method and system for secure access and processing of an encryption/decryption key |
06/18/2013 | US8467527 Efficient key derivation for end-to-end network security with traffic visibility |
06/18/2013 | US8466773 Method of authorization |
06/18/2013 | US8464941 Method and terminal for providing controlled access to a memory card |
06/18/2013 | CA2516925C Method for the carrying out the premium-based recommendation of content objects that can be downloaded to a mobile radio terminal |
06/18/2013 | CA2495018C Method and apparatus for secure e-mail |
06/18/2013 | CA2482558C Mobile account authentication service |
06/13/2013 | WO2013086532A1 Systems and methods for using cipher objects to protect data |
06/13/2013 | WO2013086474A1 Digital authentication and security method and system |
06/13/2013 | WO2013086289A1 Predictive heap overflow protection |
06/13/2013 | WO2013086069A2 Method, system and program for verifying the authenticity of a website using a reliable telecommunication channel and pre-login message |
06/13/2013 | WO2013085867A1 Contextual and location awareness for device interaction |
06/13/2013 | WO2013085807A1 Systems and methods for fast authentication with a mobile device |
06/13/2013 | WO2013085717A1 Data center infrastructure management system incorporating security for managed infrastructure devices |
06/13/2013 | WO2013085685A1 Limiting concurrent viewing sessions on multiple user devices |
06/13/2013 | WO2013085517A1 Method and apparatus for policy-based content sharing in a peer to peer manner using a hardware based root of trust |
06/13/2013 | WO2013084563A1 Privacy information management device, method and program |
06/13/2013 | WO2013084428A1 Electronic device |
06/13/2013 | WO2013083941A1 Data security device |
06/13/2013 | WO2013083940A1 Trigger device |
06/13/2013 | WO2013083923A1 Method of encrypted data exchange between a terminal and a machine |
06/13/2013 | WO2013083485A1 Cryptographic method for protecting a key hardware register against fault attacks |
06/13/2013 | WO2013083224A1 Method and device for protecting a computer program against unauthorised use |
06/13/2013 | WO2013083072A1 Method and system for digital content online reading authentication |
06/13/2013 | WO2013059189A3 Defensive techniques to increase computer security |
06/13/2013 | US20130152221 Limiting concurrent viewing sessions on multiple user devices |
06/13/2013 | US20130152220 Method, Apparatus and System for Software Management |
06/13/2013 | US20130152218 Computer-readable medium recorded with information processing program, information processing apparatus, information processing system, and information processing method |
06/13/2013 | US20130152216 Systems and methods for storage of user information and for verifying user identity |
06/13/2013 | US20130152215 Secure location collection and analysis service |
06/13/2013 | US20130152213 Apparatus, system and method for preventing data loss |
06/13/2013 | US20130152211 Using social signals to identify unauthorized content on a social networking system |
06/13/2013 | US20130152210 Coordinated watermarking |
06/13/2013 | US20130152209 Facilitating System Service Request Interactions for Hardware-Protected Applications |
06/13/2013 | US20130152208 Security key management based on service packaging |
06/13/2013 | US20130152206 Method and apparatus for preventing unauthorized access to information stored in a non-volatile memory |
06/13/2013 | US20130152205 Interactive analysis of a security specification |
06/13/2013 | US20130152203 Operation of a dual instruction pipe virus co-processor |
06/13/2013 | US20130152202 Apparatus and method for analyzing malware in data analysis system |
06/13/2013 | US20130152201 Adjunct Computing Machine for Remediating Malware on Compromised Computing Machine |
06/13/2013 | US20130152200 Predictive Heap Overflow Protection |
06/13/2013 | US20130152198 Anomaly Detection To Implement Security Protection of a Control System |
06/13/2013 | US20130152197 Event detection method and apparatus in a distributed environment |
06/13/2013 | US20130152196 Throttling of rogue entities to push notification servers |
06/13/2013 | US20130152195 Replay Attack Protection With Small State For Use In Secure Group Communication |
06/13/2013 | US20130152194 System, method and software for controlling access to virtual machine consoles |
06/13/2013 | US20130152193 Method for authentication with dynamic and random passwords |
06/13/2013 | US20130152192 Restricting access to the resources of a terminal |
06/13/2013 | US20130152191 Timing management in a large firewall cluster |
06/13/2013 | US20130152188 Port allocation in a firewall cluster |
06/13/2013 | US20130152185 Transaction provisioning for mobile wireless communications devices and related methods |
06/13/2013 | US20130152183 User Identity Management and Authentication in Network Environments |
06/13/2013 | US20130152182 System and method for enabling, verification of one or more credentials of entities and sharing result of verification |
06/13/2013 | US20130152180 Device using secure processing zone to establish trust for digital rights management |
06/13/2013 | US20130152179 System and method for user authentication using one-time identification |
06/13/2013 | US20130152178 Secure enterprise service delivery |
06/13/2013 | US20130152176 Secure authentication |
06/13/2013 | US20130152173 Method, apparatus, and computer-readable medium for content access authorization |
06/13/2013 | US20130152172 Entitled Data Cache Management |
06/13/2013 | US20130152169 Controlling access to resources on a network |
06/13/2013 | US20130152166 System And Method For Trusted Pair Security |
06/13/2013 | US20130152165 End user license agreements associated with messages |
06/13/2013 | US20130152160 Systems and methods for using cipher objects to protect data |
06/13/2013 | US20130152159 Enhanced lifecycle management of security module |
06/13/2013 | US20130152158 Confidential information identifying method, information processing apparatus, and program |
06/13/2013 | US20130152157 Automatic filtering in social networks |
06/13/2013 | US20130152156 Vpn support in a large firewall cluster |
06/13/2013 | US20130152155 Providing user attributes to complete an online transaction |
06/13/2013 | US20130151866 Method and system for secure data storage |
06/13/2013 | US20130151865 Securing microprocessors against information leakage and physical tampering |
06/13/2013 | US20130151864 Clipboard protection system in drm environment and recording medium in which program for executing method in computer is recorded |
06/13/2013 | US20130151863 Interfaces for combining calls in an emulated environment |
06/13/2013 | US20130151861 System and method to protect computer software from unauthorized use |
06/13/2013 | US20130151859 Key and method for entering computer related passwords via a mnemonic combination |
06/13/2013 | US20130151854 Method for authenticating a portable data carrier |
06/13/2013 | US20130151848 Cryptographic certification of secure hosted execution environments |
06/13/2013 | US20130151836 Semiconductor device including encryption section, semiconductor device including external interface, and content reproduction method |
06/13/2013 | US20130148867 External controller and method for delaying screen locking of computing device |
06/13/2013 | US20130148804 Anti-prying encrypted keyboard |
06/13/2013 | US20130147795 Mobile terminal and control method thereof |
06/13/2013 | DE102012221512A1 Steuern der Verwendung virtueller Festplatten vor deren Anbindung an virtuelle Maschinen Controlling the use of virtual hard disks before their connection to virtual machines |
06/13/2013 | DE102011056191A1 Vorrichtung zum Schutz von Sicherheitstoken gegen Malware Device for protecting against malware security token |
06/13/2013 | CA2858719A1 Systems and methods for using cipher objects to protect data |
06/12/2013 | EP2603025A1 Apparatus and method for secure storage of private information on a mobile terminal and control of private information transmitted by the mobile terminal |
06/12/2013 | EP2602954A1 Secure data parser method and system |
06/12/2013 | EP2602953A1 Secure data parser method and system |
06/12/2013 | EP2602952A1 Cryptographic method for protecting a key hardware register against fault attacks |
06/12/2013 | EP2602738A2 Device for protecting security tokens against malware |
06/12/2013 | EP2602737A2 Display apparatus and control method thereof |
06/12/2013 | EP2602736A2 Systems and methods for electronically publishing content |
06/12/2013 | EP2602735A1 Secure authentication |
06/12/2013 | EP2602728A1 Device and method for selecting and updating the profile of a user |
06/12/2013 | EP2602699A1 Information processing device, method for controlling information processing device, program, and information storage medium |
06/12/2013 | EP2601613A1 Efficient implementation of hash algorithm on a processor |
06/12/2013 | EP2601588A2 Providing fast non-volatile storage in a secure environment |
06/12/2013 | CN202998240U System employing mobile phone as mobile digit certificate carrier |
06/12/2013 | CN202995743U Computer data information anti-eavesdropping device |
06/12/2013 | CN202995742U Encryption adapter for data storage device |