Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
05/2013
05/15/2013CN103106356A Method for generating code in safe environment and improving software protection intensity
05/15/2013CN103106355A Implementation method and system of software version protection
05/15/2013CN103106354A Method for limiting protected data in storing device from being copied to personal computer (PC) end
05/15/2013CN103106285A Recommendation algorithm based on information security professional social network platform
05/15/2013CN103106085A Remote thread injection method based on intelligence
05/15/2013CN102129528B WEB page tampering identification method and system
05/15/2013CN102025507B Digital copyright management method for protecting digital content consumer privacy
05/15/2013CN101796764B Biometric authentication device, system and method of biometric authentication
05/15/2013CN101764844B Method and system for sharing a result related to contents
05/14/2013US8443458 Method and device for detecting the opening of a cover enclosing the device
05/14/2013US8443457 System and method for controlling the use of a digital work in accordance with usage rights associated with the digital work
05/14/2013US8443455 Apparatus, method, and computer program for controlling use of a content
05/14/2013US8443452 URL filtering based on user browser history
05/14/2013US8443449 Silent detection of malware and feedback over a network
05/14/2013US8443448 System and method for detection of non-compliant software installation
05/14/2013US8443443 Security system and method for detecting intrusion in a computerized system
05/14/2013US8443441 System and methods for detecting malicious email transmission
05/14/2013US8443440 System and method for intelligent coordination of host and guest intrusion prevention in virtualized environment
05/14/2013US8443438 Method and system for deployment of agents
05/14/2013US8443432 Method for calibrating a temperature float of a one time password token and a one time password token thereof
05/14/2013US8443427 Method and apparatus for controlling access to a network resource
05/14/2013US8443426 Method and system for preventing impersonation of a computer system user
05/14/2013US8443424 Method and system for reducing the proliferation of electronic messages
05/14/2013US8443422 Methods and apparatus for a configurable protection architecture for on-chip systems
05/14/2013US8443420 System for communicating with a mobile device server
05/14/2013US8443208 System, method and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks, or other media
05/14/2013US8443207 File system filter authentication
05/14/2013US8443203 Secure boot method and semiconductor memory system using the method
05/14/2013US8443202 Methods and systems for authenticating users
05/14/2013US8443200 Biometric verification for electronic transactions over the web
05/14/2013US8443199 Mobile terminal and method of controlling the mobile terminal
05/14/2013US8443198 Trusted and secure techniques for item delivery and execution
05/14/2013US8443191 System and method for accessing information resources using cryptographic authorization permits
05/14/2013US8443186 Method and device of data encryption
05/14/2013US8443115 Method and system for managing access to presence attribute information
05/14/2013US8442916 Digital rights management of content when content is a future live event
05/14/2013US8442915 Modifiable authentication levels in authentication systems for transactions
05/14/2013US8442527 Cellular authentication for authentication to a service
05/14/2013US8442376 Image data recording/playback device, system, and method
05/14/2013US8441342 Pseudo-random authentification code altering scheme for a transponder and a base station
05/14/2013US8441338 RFID enabled media system and method
05/14/2013CA2496677C Method and apparatus for secure data transmission in a mobile communication system
05/14/2013CA2450056C Securely processing client credentials used for web-based access to resources
05/10/2013WO2013067486A1 Secure boot administration in a unified extensible firmware interface (uefi)- compliant computing device
05/10/2013WO2013067006A1 System and method for application security and performance assessment
05/10/2013WO2013066755A1 System and method for click fraud protection
05/10/2013WO2013066621A1 Systems, methods, and computer program products for managing secure elements
05/10/2013WO2013066620A1 Systems, methods, and computer program products for interfacing multiple service provider trusted service managers and secure elements
05/10/2013WO2013066580A1 Method and apparatus for authenticating a digital certificate status and authorization credentials
05/10/2013WO2013066397A1 File lock preservation
05/10/2013WO2013065939A1 Ic chip, and data-checking method therefor
05/10/2013WO2013065886A1 Detection method for signaling dos traffic in mobile communication networks
05/10/2013WO2013065545A1 Data sharing system
05/10/2013WO2013065544A1 Data distribution management system
05/10/2013WO2013065241A1 Incremental mac tag generation device, method, and program, and message authentication device
05/10/2013WO2013065135A1 Data sharing system
05/10/2013WO2013065134A1 Data distribution management system
05/10/2013WO2013065133A1 Time verification system and time verification program
05/10/2013WO2013065103A1 Viewer device, number input system, number input method, and conversion program
05/10/2013WO2013065087A1 Diagnostic device
05/10/2013WO2013065057A1 Secure introduction
05/10/2013WO2013064927A1 Protecting sensitive data in a transmission
05/10/2013WO2013064799A2 Method and apparatus for securing a computer
05/10/2013WO2013064730A1 Method and apparatus for providing authentication using hashed personally identifiable information
05/10/2013WO2013064727A1 Method and apparatus for providing identity based encryption in distributed computations
05/10/2013WO2013064716A1 Security mechanism for external code
05/10/2013WO2013064697A1 Device for viewing a digital image
05/10/2013WO2013064565A2 Method and device for storing confidential data in a database and consulting said data
05/10/2013WO2013064540A1 Radio module
05/10/2013WO2013064504A1 Device for mobile communication
05/10/2013WO2013064493A1 Authentication method
05/10/2013WO2013064453A1 Method and device for managing an array of keys, with protection against an active spy device, computer program product and storage means corresponding thereto
05/10/2013WO2013064359A1 Document, process for authenticating a user, more particularly for releasing a smart-card function, and computer system
05/10/2013WO2013063944A1 Right management method and system, and computer storage medium
05/10/2013WO2013040496A3 System and method for real-time customized threat protection
05/10/2013WO2013036785A3 Visual component and drill down mapping
05/10/2013WO2012071037A8 Scripting web services
05/10/2013CA2854466A1 Intrusion prevention system (ips) mode for a malware detection system
05/10/2013CA2854277A1 Systems, methods, and computer program products for managing secure elements
05/10/2013CA2854276A1 Systems, methods, and computer program products for interfacing multiple service provider trusted service managers and secure elements
05/10/2013CA2854183A1 Systems and methods for virtualized malware detection
05/10/2013CA2854182A1 Systems and methods for virtualization and emulation assisted malware detection
05/10/2013CA2853867A1 Security mechanism for external code
05/10/2013CA2853301A1 Method and device for managing an array of keys, with protection against an active spy device, computer program product and storage means corresponding thereto
05/10/2013CA2851693A1 Device for mobile communication
05/10/2013CA2851691A1 Authentication method
05/09/2013US20130117867 Theft Prevention for Networked Robot
05/09/2013US20130117866 Method and system for securing access to configuration information stored in universal plug and play data models
05/09/2013US20130117864 Authentication system
05/09/2013US20130117863 Method and Apparatus for Enabling Secure Distribution of Digital Content
05/09/2013US20130117861 System allowing the display of a private computer file on a screen of a telecommunications terminal and corresponding method
05/09/2013US20130117859 Distinguishing legitimate hardware upgrades from unauthorized installations of software on additional computers
05/09/2013US20130117858 Method and System for Ensuring a Sharing Violation Free Environment for a Trusted Software Agent
05/09/2013US20130117857 Method for Processing Data in One or More Control Devices of a Vehicle, in Particular a Motor Vehicle
05/09/2013US20130117855 Apparatus for automatically inspecting security of applications and method thereof
05/09/2013US20130117854 System and Method for Bidirectional Trust Between Downloaded Applications and Mobile Devices Including a Secure Charger and Malware Scanner
05/09/2013US20130117853 Methods for detecting malicious programs using a multilayered heuristics approach
05/09/2013US20130117852 Detecting Emergent Behavior in Communications Networks
05/09/2013US20130117850 System and Method for Bidirectional Trust Between Downloaded Applications and Mobile Devices Including a Secure Charger and Malware Scanner
05/09/2013US20130117849 Systems and Methods for Virtualized Malware Detection