Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
06/05/2013 | CN103136456A Data encrypted storage system and method |
06/05/2013 | CN103136455A Encryption method |
06/05/2013 | CN103136454A Encryption device and encryption method |
06/05/2013 | CN103136125A Protecting method of computer module |
06/05/2013 | CN102194071B Time-domain-based data evidence acquisition and cross analysis method |
06/05/2013 | CN102184360B Information flow safety monitoring method applied to embedded processor |
06/05/2013 | CN102110205B Method for checking operating authority of smart card and smart card |
06/05/2013 | CN102096787B Method and device for hiding information based on word2007 text segmentation |
06/05/2013 | CN101964031B License management system and authentication method for the same, server device and method for the same |
06/05/2013 | CN101908106B Memory system with versatile content control |
06/05/2013 | CN101695068B Content delivery service providing apparatus and content delivery service terminal unit |
06/05/2013 | CN101681410B Apparatus for controlling processor execution in a secure environment |
06/05/2013 | CN101661544B Method and apparatus for providing a secure display window inside the primary display |
06/05/2013 | CN101414263B Software installation method and anti-pirate module |
06/05/2013 | CN101409719B Method and client terminal for implementing network safety payment |
06/05/2013 | CN101356536B Mobile security system and method |
06/04/2013 | US8458804 Systems and methods for preventing data remanence in memory |
06/04/2013 | US8458801 High-assurance secure boot content protection |
06/04/2013 | US8458800 Secure smartphone |
06/04/2013 | US8458793 Methods, computer program products and data structures for intrusion detection, intrusion response and vulnerability remediation across target computer systems |
06/04/2013 | US8458791 Hardware-implemented hypervisor for root-of-trust monitoring and control of computer system |
06/04/2013 | US8458790 Defending smart cards against attacks by redundant processing |
06/04/2013 | US8458788 System and method for authentication of input devices |
06/04/2013 | US8458773 Method, device, and system for authentication |
06/04/2013 | US8458770 Application context based access control |
06/04/2013 | US8458766 Method and system for management of security rule set |
06/04/2013 | US8458493 Protection of a digital content on a physical medium |
06/04/2013 | US8458488 Method and system for diagnosing operation of tamper-resistant software |
06/04/2013 | US8458486 Problem-based account generation |
06/04/2013 | US8458485 Image-based unlock functionality on a computing device |
06/04/2013 | US8458484 Password generator |
06/04/2013 | US8458483 Techniques for message-passing using shared memory of an RF tag |
06/04/2013 | US8458480 Method and apparatus for binding TPM keys to execution entities |
06/04/2013 | US8458476 Watermarking computer program code |
06/04/2013 | US8458473 Information processing apparatus, method for switching cipher and program |
06/04/2013 | US8458468 Method and system for protecting information exchanged during communication between users |
06/04/2013 | US8458465 Biometric authentication |
06/04/2013 | US8458464 Mechanism to handle events in a machine with isolated execution |
06/04/2013 | US8458463 Method for safe operation and a system thereof |
06/04/2013 | US8458423 Data processing apparatus and data processing method of data processing apparatus |
06/04/2013 | US8458344 Establishing tunnels between selective endpoint devices along communication paths |
06/04/2013 | US8458340 Distributed cache for state transfer operations |
06/04/2013 | US8458273 Content rights management for document contents and systems, structures, and methods therefor |
06/04/2013 | US8458098 Methods of tracking remote software installations and registrations and related systems and computer program products |
06/04/2013 | US8458097 System, method and software for healthcare selection based on pangenetic data |
06/04/2013 | US8458070 System and method for providing customers with seamless entry to a remote server |
06/04/2013 | US8457597 Method for authenticating a mobile unit attached to a femtocell that operates according to code division multiple access |
06/04/2013 | US8457347 Monitoring usage of a computer by performing character recognition on screen capture images |
06/04/2013 | US8457310 Print system, control method therefor, information processing apparatus, control method therefor, program for implementing the control method, and storage medium storing the control program |
06/04/2013 | US8457302 Access-controlled data storage medium |
06/04/2013 | US8456439 Graphical authentication for a portable device and methods for use therewith |
06/02/2013 | CA2760414A1 Content-based video copy detection |
05/30/2013 | WO2013078427A1 Method and system for registering and scanning an id tag linked to information about a user |
05/30/2013 | WO2013078268A1 Providing verification of user identification information |
05/30/2013 | WO2013077565A1 Malicious code diagnosis/removal service device and method therefor |
05/30/2013 | WO2013077158A1 Authentication device and control method for same |
05/30/2013 | WO2013076823A1 Portable terminal authentication system, and method therefor |
05/30/2013 | WO2013076822A1 Authentication method and authentication server for authenticating portable terminal |
05/30/2013 | WO2013076821A1 Authentication method and authentication server for authenticating portable terminal |
05/30/2013 | WO2013076447A1 Secure database searching |
05/30/2013 | WO2013075799A1 Method for authenticating a person at a server instance |
05/30/2013 | WO2013075419A1 Method for managing right to use of function, and mobile terminal |
05/30/2013 | WO2012159940A3 Method and control unit for detecting manipulations of a vehicle network |
05/30/2013 | US20130139272 Resource-Type Weighting of Use Rights |
05/30/2013 | US20130139271 Content provider with multi-device secure application integration |
05/30/2013 | US20130139270 Information processing apparatus and information processing apparatus startup control method |
05/30/2013 | US20130139269 Contextual use and expiration of digital content |
05/30/2013 | US20130139268 Agent apparatus and method for sharing anonymous identifier-based security information among security management domains |
05/30/2013 | US20130139267 Detecting vulnerabilities in web applications |
05/30/2013 | US20130139265 System and method for correcting antivirus records to minimize false malware detections |
05/30/2013 | US20130139264 Application sandboxing using a dynamic optimization framework |
05/30/2013 | US20130139262 Taint injection and tracking |
05/30/2013 | US20130139261 Method and apparatus for detecting malicious software through contextual convictions |
05/30/2013 | US20130139259 Deceptive indicia profile generation from communications interactions |
05/30/2013 | US20130139258 Deceptive indicia profile generation from communications interactions |
05/30/2013 | US20130139257 Deceptive indicia profile generation from communications interactions |
05/30/2013 | US20130139256 Deceptive indicia profile generation from communications interactions |
05/30/2013 | US20130139255 Detection of deceptive indicia masking in a communications interaction |
05/30/2013 | US20130139254 Deceptive indicia notification in a communications interaction |
05/30/2013 | US20130139253 Deceptive indicia notification in a communications interaction |
05/30/2013 | US20130139252 Securing network communications from blind attacks with checksum comparisons |
05/30/2013 | US20130139251 Electronic device system and electronic device |
05/30/2013 | US20130139250 Virtual appliance pre-boot authentication |
05/30/2013 | US20130139249 Image processing apparatus, method for controlling the same, and storage medium for carrying out login processing |
05/30/2013 | US20130139248 Method of authenticating password and portable device thereof |
05/30/2013 | US20130139244 Enhancing network controls in mandatory access control computing environments |
05/30/2013 | US20130139240 Network system, information processing apparatus, method for controlling the information processing apparatus, and computer-readable storage medium for computer program |
05/30/2013 | US20130139238 Method and System For Authenticating User Access To A Restricted Resource Across A Computer Network |
05/30/2013 | US20130139237 Method for digital identity authentication |
05/30/2013 | US20130139236 Imposter account report management in a social networking system |
05/30/2013 | US20130139235 Application-based credential management for multifactor authentication |
05/30/2013 | US20130139234 System and method for remote management of a plurality of target computers from a common graphical interface |
05/30/2013 | US20130139231 System and method of verifying a number of a mobile terminal |
05/30/2013 | US20130139230 Trusted Service Management Process |
05/30/2013 | US20130139227 Security Architecture For A Process Control Platform Executing Applications |
05/30/2013 | US20130139226 Secure Authorization |
05/30/2013 | US20130139225 Communication apparatus |
05/30/2013 | US20130139224 System and Method for Registering Users for Communicating Information on a Web Site |
05/30/2013 | US20130139223 Secure network system request support via a ping request |
05/30/2013 | US20130139216 Method and Computer Device to Control Software File Downloads |