Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
05/22/2013 | EP2594036A2 System and method for data deduplication for disk storage subsystems |
05/22/2013 | EP2593897A1 Method for certificate-based authentication |
05/22/2013 | EP2593896A1 Supervision of the security in a computer system |
05/22/2013 | EP2593895A1 Storage device and method for providing a partially-encrypted content file to a host device |
05/22/2013 | EP2593894A1 System and method to prevent manipulation of transmitted video data |
05/22/2013 | EP2593893A1 Identifying polymorphic malware |
05/22/2013 | CN202948455U Fingerprint identification apparatus of mobile communication apparatus |
05/22/2013 | CN202948452U Anti-steal device for data information of computer |
05/22/2013 | CN202948451U Anti-tamper protection device of sensitive data of display |
05/22/2013 | CN103119603A Web-based electronically signed documents |
05/22/2013 | CN103119602A Providing fast non-volatile storage in a secure environment |
05/22/2013 | CN103119601A Method and apparatus for enforcing a mandatory security policy on an operating system (os) independent anti-virus (av) scanner |
05/22/2013 | CN103119600A Information processing device, method of controlling information processing device, information processing device control program and computer readable recording medium with information processing device control program recorded thereon |
05/22/2013 | CN103119599A A mechanism for managing authentication device lifecycles |
05/22/2013 | CN103119598A Service provision system and unit device |
05/22/2013 | CN103118135A Method and system for protecting user data privacy in cloud computing |
05/22/2013 | CN103117998A Safety reinforcing method based on JavaEE application system |
05/22/2013 | CN103117851A Encryption control method and device capable of achieving tamper-proofing and repudiation-proofing by means of public key infrastructure (PKI) |
05/22/2013 | CN103117073A Information processing apparatus, information processing method and program |
05/22/2013 | CN103116731A Metal encryption password keyboard triggering and locking circuit |
05/22/2013 | CN103116730A Deciphering method and system of data protection application programming interface (DPAPI) enciphered data |
05/22/2013 | CN103116729A Method and system of automatic export of data of portable device |
05/22/2013 | CN103116728A Methods of program document signing and signature detecting |
05/22/2013 | CN103116727A Access method and system of protected file free of installing file security control software |
05/22/2013 | CN103116726A Research and development information storage and control method based on fashion design industry |
05/22/2013 | CN103116725A Screen locking method, device and browser for webpage |
05/22/2013 | CN103116724A Method and device for detecting dangerous behavior of program sample |
05/22/2013 | CN103116723A Method, device and system of web site interception process |
05/22/2013 | CN103116722A Processing method, processing device and processing system of notification board information |
05/22/2013 | CN103116721A Method of achieving Koji certification and module |
05/22/2013 | CN103116720A Universal serial bus (USB) Key device and account management method and authentication application method thereof |
05/22/2013 | CN103116719A Light emitting diode (LED) control method and control system |
05/22/2013 | CN103116718A Password setting and verification method based on spatial position code log-in computer system |
05/22/2013 | CN103116717A User login method and system |
05/22/2013 | CN103116716A Immediate access conferring method aiming at low interference of mobile platform |
05/22/2013 | CN103116715A API (application programming interface) delay import protection method for executable files of Windows platform |
05/22/2013 | CN103116714A Double-process protection method for executable files of Windows platform |
05/22/2013 | CN103116670A Transition consistency verification method of computer network defending strategy |
05/22/2013 | CN103116509A Self-function and manufacturing method of electronic book files and system of electronic book files |
05/22/2013 | CN103116489A Registration code acquisition device and registration code acquisition method |
05/22/2013 | CN103116442A Terminal interface display method and device |
05/22/2013 | CN103116413A Mouse device with digital certificate function |
05/22/2013 | CN103116388A Fixing device of mobile equipment |
05/22/2013 | CN102063359B Method and device for monitoring data for USE mobile storage device |
05/22/2013 | CN101841523B Method for detecting network behavior of malicious code sample and system thereof |
05/22/2013 | CN101795340B Print system and printing method |
05/22/2013 | CN101689232B Obfuscating execution traces of computer program code |
05/22/2013 | CN101681407B Trusted operating environment for malware detection |
05/22/2013 | CN101421740B Recording resource usage |
05/22/2013 | CN101022335B Method for the secure transmission of operating data |
05/22/2013 | CA2795601A1 Methods and systems for determining biometric data for use in authentication transactions |
05/22/2013 | CA2791743A1 Private web browsing using encrytion |
05/21/2013 | US8448260 Electronic clipboard protection |
05/21/2013 | US8448259 Content reproduction device, content reproduction device control method, content reproduction program, recording medium, and integrated circuit |
05/21/2013 | US8448254 Digital content management system and apparatus |
05/21/2013 | US8448253 Program licence management technique in an audio signal processing system |
05/21/2013 | US8448251 Method and apparatus for processing and displaying secure and non-secure data |
05/21/2013 | US8448247 Adaptive behavioral intrusion detection systems and methods |
05/21/2013 | US8448246 Protecting sensitive email |
05/21/2013 | US8448242 Systems, methods, and media for outputting data based upon anomaly detection |
05/21/2013 | US8448239 Secure controller for block oriented storage |
05/21/2013 | US8448224 Intercepting malicious access |
05/21/2013 | US8448223 Security management program, security management method, and portable terminal device |
05/21/2013 | US8448216 Method and apparatus for orchestrating policies in service model of service-oriented architecture system |
05/21/2013 | US8448009 Method and memory device for generating a time estimate |
05/21/2013 | US8447992 Method for distributing content to a mobile device with digital rights and mobile device therefor |
05/21/2013 | US8447991 Card authentication system |
05/21/2013 | US8447990 Password encryption key |
05/21/2013 | US8447989 Method and apparatus for tamper proof camera logs |
05/21/2013 | US8447985 Watermarking apparatus, software enabling an implementation of an electronic circuit comprising a watermark, method for detecting a watermark and apparatus for detecting a watermark |
05/21/2013 | US8447975 Workstation application server programming protection via classloader policy based visibility control |
05/21/2013 | US8447838 System and method for providing mobile service |
05/21/2013 | US8447698 Communication system, communication method, distribution apparatus, distribution method and terminal apparatus |
05/21/2013 | US8447696 System and method for handling peripheral connections to mobile devices |
05/21/2013 | US8447695 System and method for processing feedback entries received from software |
05/21/2013 | US8447038 Method and systems using identifier tags and authenticity certificates for detecting counterfeited or stolen brand objects |
05/21/2013 | US8446250 Method and device for providing digital security |
05/21/2013 | CA2777363C Hardware-based key generation and recovery |
05/21/2013 | CA2487536C Device for automatic reading of a plurality of codes by means of a single key code |
05/21/2013 | CA2487151C Digital goods representation based upon matrix invariances |
05/16/2013 | WO2013070885A1 System and method for bidirectional trust between downloaded applications and mobile devices including a secure charger and malware scanner |
05/16/2013 | WO2013070812A1 Techniques to apply and share remote policies on mobile devices |
05/16/2013 | WO2013070334A1 Encoding labels in values to capture information flows |
05/16/2013 | WO2013070282A2 Managing the progressive legible obfuscation and de-obfuscation of public and quasi-public broadcast messages |
05/16/2013 | WO2013070222A1 Apparatus, system, and method for protecting electronic devices in a virtual perimeter |
05/16/2013 | WO2013070124A1 Apparatus and methods for obtaining a password hint |
05/16/2013 | WO2013069776A1 Database encryption system, method and program |
05/16/2013 | WO2013069770A1 Database device, method and program |
05/16/2013 | WO2013069758A1 Unauthorized application detection system and method |
05/16/2013 | WO2013069695A1 Security box |
05/16/2013 | WO2013069587A1 Information processing space management method, external device, and information processing device |
05/16/2013 | WO2013069461A1 Transmission management apparatus, program, transmission management system, and transmission management method |
05/16/2013 | WO2013068217A1 Method for protection against reverse-engineering of a computer program |
05/16/2013 | WO2013067989A2 Method for assessing and containing risks from smartphone applications |
05/16/2013 | WO2013067645A1 Presenting metadata from multiple perimeters |
05/16/2013 | WO2012109640A3 System and method for secure software update |
05/16/2013 | US20130125251 Mobile Device Peripherals Management System and Multi-Data Stream Technology (MdS) |
05/16/2013 | US20130125250 Anti-tamper device for integrated circuits |
05/16/2013 | US20130125249 Remote Access Control Of Storage Devices |
05/16/2013 | US20130125248 Variably Controlling Access To Content |