Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
06/2013
06/05/2013CN103136456A Data encrypted storage system and method
06/05/2013CN103136455A Encryption method
06/05/2013CN103136454A Encryption device and encryption method
06/05/2013CN103136125A Protecting method of computer module
06/05/2013CN102194071B Time-domain-based data evidence acquisition and cross analysis method
06/05/2013CN102184360B Information flow safety monitoring method applied to embedded processor
06/05/2013CN102110205B Method for checking operating authority of smart card and smart card
06/05/2013CN102096787B Method and device for hiding information based on word2007 text segmentation
06/05/2013CN101964031B License management system and authentication method for the same, server device and method for the same
06/05/2013CN101908106B Memory system with versatile content control
06/05/2013CN101695068B Content delivery service providing apparatus and content delivery service terminal unit
06/05/2013CN101681410B Apparatus for controlling processor execution in a secure environment
06/05/2013CN101661544B Method and apparatus for providing a secure display window inside the primary display
06/05/2013CN101414263B Software installation method and anti-pirate module
06/05/2013CN101409719B Method and client terminal for implementing network safety payment
06/05/2013CN101356536B Mobile security system and method
06/04/2013US8458804 Systems and methods for preventing data remanence in memory
06/04/2013US8458801 High-assurance secure boot content protection
06/04/2013US8458800 Secure smartphone
06/04/2013US8458793 Methods, computer program products and data structures for intrusion detection, intrusion response and vulnerability remediation across target computer systems
06/04/2013US8458791 Hardware-implemented hypervisor for root-of-trust monitoring and control of computer system
06/04/2013US8458790 Defending smart cards against attacks by redundant processing
06/04/2013US8458788 System and method for authentication of input devices
06/04/2013US8458773 Method, device, and system for authentication
06/04/2013US8458770 Application context based access control
06/04/2013US8458766 Method and system for management of security rule set
06/04/2013US8458493 Protection of a digital content on a physical medium
06/04/2013US8458488 Method and system for diagnosing operation of tamper-resistant software
06/04/2013US8458486 Problem-based account generation
06/04/2013US8458485 Image-based unlock functionality on a computing device
06/04/2013US8458484 Password generator
06/04/2013US8458483 Techniques for message-passing using shared memory of an RF tag
06/04/2013US8458480 Method and apparatus for binding TPM keys to execution entities
06/04/2013US8458476 Watermarking computer program code
06/04/2013US8458473 Information processing apparatus, method for switching cipher and program
06/04/2013US8458468 Method and system for protecting information exchanged during communication between users
06/04/2013US8458465 Biometric authentication
06/04/2013US8458464 Mechanism to handle events in a machine with isolated execution
06/04/2013US8458463 Method for safe operation and a system thereof
06/04/2013US8458423 Data processing apparatus and data processing method of data processing apparatus
06/04/2013US8458344 Establishing tunnels between selective endpoint devices along communication paths
06/04/2013US8458340 Distributed cache for state transfer operations
06/04/2013US8458273 Content rights management for document contents and systems, structures, and methods therefor
06/04/2013US8458098 Methods of tracking remote software installations and registrations and related systems and computer program products
06/04/2013US8458097 System, method and software for healthcare selection based on pangenetic data
06/04/2013US8458070 System and method for providing customers with seamless entry to a remote server
06/04/2013US8457597 Method for authenticating a mobile unit attached to a femtocell that operates according to code division multiple access
06/04/2013US8457347 Monitoring usage of a computer by performing character recognition on screen capture images
06/04/2013US8457310 Print system, control method therefor, information processing apparatus, control method therefor, program for implementing the control method, and storage medium storing the control program
06/04/2013US8457302 Access-controlled data storage medium
06/04/2013US8456439 Graphical authentication for a portable device and methods for use therewith
06/02/2013CA2760414A1 Content-based video copy detection
05/2013
05/30/2013WO2013078427A1 Method and system for registering and scanning an id tag linked to information about a user
05/30/2013WO2013078268A1 Providing verification of user identification information
05/30/2013WO2013077565A1 Malicious code diagnosis/removal service device and method therefor
05/30/2013WO2013077158A1 Authentication device and control method for same
05/30/2013WO2013076823A1 Portable terminal authentication system, and method therefor
05/30/2013WO2013076822A1 Authentication method and authentication server for authenticating portable terminal
05/30/2013WO2013076821A1 Authentication method and authentication server for authenticating portable terminal
05/30/2013WO2013076447A1 Secure database searching
05/30/2013WO2013075799A1 Method for authenticating a person at a server instance
05/30/2013WO2013075419A1 Method for managing right to use of function, and mobile terminal
05/30/2013WO2012159940A3 Method and control unit for detecting manipulations of a vehicle network
05/30/2013US20130139272 Resource-Type Weighting of Use Rights
05/30/2013US20130139271 Content provider with multi-device secure application integration
05/30/2013US20130139270 Information processing apparatus and information processing apparatus startup control method
05/30/2013US20130139269 Contextual use and expiration of digital content
05/30/2013US20130139268 Agent apparatus and method for sharing anonymous identifier-based security information among security management domains
05/30/2013US20130139267 Detecting vulnerabilities in web applications
05/30/2013US20130139265 System and method for correcting antivirus records to minimize false malware detections
05/30/2013US20130139264 Application sandboxing using a dynamic optimization framework
05/30/2013US20130139262 Taint injection and tracking
05/30/2013US20130139261 Method and apparatus for detecting malicious software through contextual convictions
05/30/2013US20130139259 Deceptive indicia profile generation from communications interactions
05/30/2013US20130139258 Deceptive indicia profile generation from communications interactions
05/30/2013US20130139257 Deceptive indicia profile generation from communications interactions
05/30/2013US20130139256 Deceptive indicia profile generation from communications interactions
05/30/2013US20130139255 Detection of deceptive indicia masking in a communications interaction
05/30/2013US20130139254 Deceptive indicia notification in a communications interaction
05/30/2013US20130139253 Deceptive indicia notification in a communications interaction
05/30/2013US20130139252 Securing network communications from blind attacks with checksum comparisons
05/30/2013US20130139251 Electronic device system and electronic device
05/30/2013US20130139250 Virtual appliance pre-boot authentication
05/30/2013US20130139249 Image processing apparatus, method for controlling the same, and storage medium for carrying out login processing
05/30/2013US20130139248 Method of authenticating password and portable device thereof
05/30/2013US20130139244 Enhancing network controls in mandatory access control computing environments
05/30/2013US20130139240 Network system, information processing apparatus, method for controlling the information processing apparatus, and computer-readable storage medium for computer program
05/30/2013US20130139238 Method and System For Authenticating User Access To A Restricted Resource Across A Computer Network
05/30/2013US20130139237 Method for digital identity authentication
05/30/2013US20130139236 Imposter account report management in a social networking system
05/30/2013US20130139235 Application-based credential management for multifactor authentication
05/30/2013US20130139234 System and method for remote management of a plurality of target computers from a common graphical interface
05/30/2013US20130139231 System and method of verifying a number of a mobile terminal
05/30/2013US20130139230 Trusted Service Management Process
05/30/2013US20130139227 Security Architecture For A Process Control Platform Executing Applications
05/30/2013US20130139226 Secure Authorization
05/30/2013US20130139225 Communication apparatus
05/30/2013US20130139224 System and Method for Registering Users for Communicating Information on a Web Site
05/30/2013US20130139223 Secure network system request support via a ping request
05/30/2013US20130139216 Method and Computer Device to Control Software File Downloads