Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
05/15/2013 | CN103106356A Method for generating code in safe environment and improving software protection intensity |
05/15/2013 | CN103106355A Implementation method and system of software version protection |
05/15/2013 | CN103106354A Method for limiting protected data in storing device from being copied to personal computer (PC) end |
05/15/2013 | CN103106285A Recommendation algorithm based on information security professional social network platform |
05/15/2013 | CN103106085A Remote thread injection method based on intelligence |
05/15/2013 | CN102129528B WEB page tampering identification method and system |
05/15/2013 | CN102025507B Digital copyright management method for protecting digital content consumer privacy |
05/15/2013 | CN101796764B Biometric authentication device, system and method of biometric authentication |
05/15/2013 | CN101764844B Method and system for sharing a result related to contents |
05/14/2013 | US8443458 Method and device for detecting the opening of a cover enclosing the device |
05/14/2013 | US8443457 System and method for controlling the use of a digital work in accordance with usage rights associated with the digital work |
05/14/2013 | US8443455 Apparatus, method, and computer program for controlling use of a content |
05/14/2013 | US8443452 URL filtering based on user browser history |
05/14/2013 | US8443449 Silent detection of malware and feedback over a network |
05/14/2013 | US8443448 System and method for detection of non-compliant software installation |
05/14/2013 | US8443443 Security system and method for detecting intrusion in a computerized system |
05/14/2013 | US8443441 System and methods for detecting malicious email transmission |
05/14/2013 | US8443440 System and method for intelligent coordination of host and guest intrusion prevention in virtualized environment |
05/14/2013 | US8443438 Method and system for deployment of agents |
05/14/2013 | US8443432 Method for calibrating a temperature float of a one time password token and a one time password token thereof |
05/14/2013 | US8443427 Method and apparatus for controlling access to a network resource |
05/14/2013 | US8443426 Method and system for preventing impersonation of a computer system user |
05/14/2013 | US8443424 Method and system for reducing the proliferation of electronic messages |
05/14/2013 | US8443422 Methods and apparatus for a configurable protection architecture for on-chip systems |
05/14/2013 | US8443420 System for communicating with a mobile device server |
05/14/2013 | US8443208 System, method and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks, or other media |
05/14/2013 | US8443207 File system filter authentication |
05/14/2013 | US8443203 Secure boot method and semiconductor memory system using the method |
05/14/2013 | US8443202 Methods and systems for authenticating users |
05/14/2013 | US8443200 Biometric verification for electronic transactions over the web |
05/14/2013 | US8443199 Mobile terminal and method of controlling the mobile terminal |
05/14/2013 | US8443198 Trusted and secure techniques for item delivery and execution |
05/14/2013 | US8443191 System and method for accessing information resources using cryptographic authorization permits |
05/14/2013 | US8443186 Method and device of data encryption |
05/14/2013 | US8443115 Method and system for managing access to presence attribute information |
05/14/2013 | US8442916 Digital rights management of content when content is a future live event |
05/14/2013 | US8442915 Modifiable authentication levels in authentication systems for transactions |
05/14/2013 | US8442527 Cellular authentication for authentication to a service |
05/14/2013 | US8442376 Image data recording/playback device, system, and method |
05/14/2013 | US8441342 Pseudo-random authentification code altering scheme for a transponder and a base station |
05/14/2013 | US8441338 RFID enabled media system and method |
05/14/2013 | CA2496677C Method and apparatus for secure data transmission in a mobile communication system |
05/14/2013 | CA2450056C Securely processing client credentials used for web-based access to resources |
05/10/2013 | WO2013067486A1 Secure boot administration in a unified extensible firmware interface (uefi)- compliant computing device |
05/10/2013 | WO2013067006A1 System and method for application security and performance assessment |
05/10/2013 | WO2013066755A1 System and method for click fraud protection |
05/10/2013 | WO2013066621A1 Systems, methods, and computer program products for managing secure elements |
05/10/2013 | WO2013066620A1 Systems, methods, and computer program products for interfacing multiple service provider trusted service managers and secure elements |
05/10/2013 | WO2013066580A1 Method and apparatus for authenticating a digital certificate status and authorization credentials |
05/10/2013 | WO2013066397A1 File lock preservation |
05/10/2013 | WO2013065939A1 Ic chip, and data-checking method therefor |
05/10/2013 | WO2013065886A1 Detection method for signaling dos traffic in mobile communication networks |
05/10/2013 | WO2013065545A1 Data sharing system |
05/10/2013 | WO2013065544A1 Data distribution management system |
05/10/2013 | WO2013065241A1 Incremental mac tag generation device, method, and program, and message authentication device |
05/10/2013 | WO2013065135A1 Data sharing system |
05/10/2013 | WO2013065134A1 Data distribution management system |
05/10/2013 | WO2013065133A1 Time verification system and time verification program |
05/10/2013 | WO2013065103A1 Viewer device, number input system, number input method, and conversion program |
05/10/2013 | WO2013065087A1 Diagnostic device |
05/10/2013 | WO2013065057A1 Secure introduction |
05/10/2013 | WO2013064927A1 Protecting sensitive data in a transmission |
05/10/2013 | WO2013064799A2 Method and apparatus for securing a computer |
05/10/2013 | WO2013064730A1 Method and apparatus for providing authentication using hashed personally identifiable information |
05/10/2013 | WO2013064727A1 Method and apparatus for providing identity based encryption in distributed computations |
05/10/2013 | WO2013064716A1 Security mechanism for external code |
05/10/2013 | WO2013064697A1 Device for viewing a digital image |
05/10/2013 | WO2013064565A2 Method and device for storing confidential data in a database and consulting said data |
05/10/2013 | WO2013064540A1 Radio module |
05/10/2013 | WO2013064504A1 Device for mobile communication |
05/10/2013 | WO2013064493A1 Authentication method |
05/10/2013 | WO2013064453A1 Method and device for managing an array of keys, with protection against an active spy device, computer program product and storage means corresponding thereto |
05/10/2013 | WO2013064359A1 Document, process for authenticating a user, more particularly for releasing a smart-card function, and computer system |
05/10/2013 | WO2013063944A1 Right management method and system, and computer storage medium |
05/10/2013 | WO2013040496A3 System and method for real-time customized threat protection |
05/10/2013 | WO2013036785A3 Visual component and drill down mapping |
05/10/2013 | WO2012071037A8 Scripting web services |
05/10/2013 | CA2854466A1 Intrusion prevention system (ips) mode for a malware detection system |
05/10/2013 | CA2854277A1 Systems, methods, and computer program products for managing secure elements |
05/10/2013 | CA2854276A1 Systems, methods, and computer program products for interfacing multiple service provider trusted service managers and secure elements |
05/10/2013 | CA2854183A1 Systems and methods for virtualized malware detection |
05/10/2013 | CA2854182A1 Systems and methods for virtualization and emulation assisted malware detection |
05/10/2013 | CA2853867A1 Security mechanism for external code |
05/10/2013 | CA2853301A1 Method and device for managing an array of keys, with protection against an active spy device, computer program product and storage means corresponding thereto |
05/10/2013 | CA2851693A1 Device for mobile communication |
05/10/2013 | CA2851691A1 Authentication method |
05/09/2013 | US20130117867 Theft Prevention for Networked Robot |
05/09/2013 | US20130117866 Method and system for securing access to configuration information stored in universal plug and play data models |
05/09/2013 | US20130117864 Authentication system |
05/09/2013 | US20130117863 Method and Apparatus for Enabling Secure Distribution of Digital Content |
05/09/2013 | US20130117861 System allowing the display of a private computer file on a screen of a telecommunications terminal and corresponding method |
05/09/2013 | US20130117859 Distinguishing legitimate hardware upgrades from unauthorized installations of software on additional computers |
05/09/2013 | US20130117858 Method and System for Ensuring a Sharing Violation Free Environment for a Trusted Software Agent |
05/09/2013 | US20130117857 Method for Processing Data in One or More Control Devices of a Vehicle, in Particular a Motor Vehicle |
05/09/2013 | US20130117855 Apparatus for automatically inspecting security of applications and method thereof |
05/09/2013 | US20130117854 System and Method for Bidirectional Trust Between Downloaded Applications and Mobile Devices Including a Secure Charger and Malware Scanner |
05/09/2013 | US20130117853 Methods for detecting malicious programs using a multilayered heuristics approach |
05/09/2013 | US20130117852 Detecting Emergent Behavior in Communications Networks |
05/09/2013 | US20130117850 System and Method for Bidirectional Trust Between Downloaded Applications and Mobile Devices Including a Secure Charger and Malware Scanner |
05/09/2013 | US20130117849 Systems and Methods for Virtualized Malware Detection |