Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
05/09/2013 | US20130117848 Systems and Methods for Virtualization and Emulation Assisted Malware Detection |
05/09/2013 | US20130117847 Streaming Method and System for Processing Network Metadata |
05/09/2013 | US20130117846 System and method for server-coupled application re-analysis to obtain characterization assessment |
05/09/2013 | US20130117845 Encoding labels in values to capture information flows |
05/09/2013 | US20130117844 Microcircuit card protected by a fuse |
05/09/2013 | US20130117843 Methods, Devices, And Systems For Detecting Return-Oriented Programming Exploits |
05/09/2013 | US20130117840 User-driven access control |
05/09/2013 | US20130117839 Method for controlling application usage on a mobile device while the device is in motion |
05/09/2013 | US20130117838 Superpositional Control of Integrated Circuit Processing |
05/09/2013 | US20130117835 Image Forming Apparatus, Image Forming System, and Method for Realizing Pseudo Single Sign-On |
05/09/2013 | US20130117833 Authentication device and authentication system |
05/09/2013 | US20130117831 Method and system for enabling computer access |
05/09/2013 | US20130117826 Home realm discovery in mixed-mode federated realms |
05/09/2013 | US20130117823 System and method for enforcing security policies in a virtual environment |
05/09/2013 | US20130117819 Cost-effective device for transferring data unidirectionally |
05/09/2013 | US20130117817 Prevention of cross site request forgery attacks by conditional use cookies |
05/09/2013 | US20130117816 Accessing multiple client domains using a single application |
05/09/2013 | US20130117813 Kill switch security method and system |
05/09/2013 | US20130117812 Supervision of the security in a computer system |
05/09/2013 | US20130117811 Method and system for encrypted file access |
05/09/2013 | US20130117809 Intrusion prevention system (ips) mode for a malware detection system |
05/09/2013 | US20130117808 Apparatus and method for enhancing security in heterogeneous computing environment |
05/09/2013 | US20130117807 Setting default security features for use with web applications and extensions |
05/09/2013 | US20130117806 Network based provisioning |
05/09/2013 | US20130117805 Techniques to apply and share remote policies on mobile devices |
05/09/2013 | US20130117804 Browser-based secure desktop applications for open computing platforms |
05/09/2013 | US20130117803 Security and safety manager implementation in a multi-core processor |
05/09/2013 | US20130117802 Authorization-based redaction of data |
05/09/2013 | US20130117699 Granting object authority via a multi-touch screen to a collaborator |
05/09/2013 | US20130117579 Apparatus and method of portable terminal for application data protection |
05/09/2013 | US20130117578 Method for verifying a memory block of a nonvolatile memory |
05/09/2013 | US20130117575 Encryption apparatus, encryption method, decryption apparatus, decryption method and system |
05/09/2013 | US20130117573 Method for verifying a password |
05/09/2013 | US20130117566 Memory system |
05/09/2013 | US20130117562 Security method, associated chip card, module and terminal |
05/09/2013 | US20130117550 Accessing secure volumes |
05/09/2013 | US20130117315 Automatic resource ownership assignment system and method |
05/09/2013 | US20130117294 Trail log analysis system, medium storing trail log analysis program, and trail log analysis method |
05/09/2013 | US20130117244 Data security method using database engine |
05/09/2013 | US20130117170 System and method for secure provision of customer data in a loyalty program |
05/09/2013 | US20130114865 System and Method for Providing Secure Access to an Electronic Device Using Facial Biometrics |
05/08/2013 | EP2590389A1 Mobile communication terminal, method for activating same, and network communication system |
05/08/2013 | EP2590380A1 Image forming apparatus, image forming system, and method for realizing pseudo single sign-on |
05/08/2013 | EP2590354A1 Method, apparatus and system for software management |
05/08/2013 | EP2590106A2 Security and safety manager implementation in a multi-core processor |
05/08/2013 | EP2590105A1 Apparatus and method for managing control information of an application in a portable terminal |
05/08/2013 | EP2590104A1 Method for verifying a password |
05/08/2013 | EP2590103A1 Control device |
05/08/2013 | EP2590102A1 Trail log analysis system, trail log analysis program, and trail log analysis method |
05/08/2013 | EP2590101A2 Authentication using stored biometric data |
05/08/2013 | EP2590100A1 Method and apparatus for securing a computer |
05/08/2013 | EP2590099A1 Combined passcode and activity launch modifier |
05/08/2013 | EP2589232A1 Automatic creation and modification of dynamic geofences |
05/08/2013 | EP2588989A1 System and method for storing a password recovery secret |
05/08/2013 | EP2588988A1 System and method for self-service configuration of authorization |
05/08/2013 | EP2588987A1 Storage device and method for storage state recovery |
05/08/2013 | EP2588986A1 Mobile content distribution with digital rights management |
05/08/2013 | EP2588985A1 Mobile computing device |
05/08/2013 | EP2588984A1 Systems and methods for creating customized confidence bands for use in malware detection |
05/08/2013 | EP2588983A1 Systems and methods for alternating malware classifiers in an attempt to frustrate brute-force malware testing |
05/08/2013 | EP2588956A1 Systems and methods for sharing the results of analyses among virtual machines |
05/08/2013 | EP2588950A1 User management framework for multiple environments on a computing device |
05/08/2013 | DE102012020933A1 Protective device for, e.g. tablet computer used in coffee shop, has a monitoring unit that sends message to monitoring center to make loaner computer transfer back to factory default settings, when tampering/embezzlement is detected |
05/08/2013 | DE102011117855A1 Verfahren zum Bewerten und Eindämmen von Risiken durch Smart-Phone-Applikationen. A method for evaluating and containment of risks through smart-phone applications. |
05/08/2013 | CN202929633U Computer data information safety device |
05/08/2013 | CN202929632U Encryption card |
05/08/2013 | CN202929556U Antitheft computer case |
05/08/2013 | CN202929541U Anti-theft computer case |
05/08/2013 | CN1900944B Printing system and printer capable of electronic signature and method using the same |
05/08/2013 | CN1336051B Method and system for the application of a safety marking |
05/08/2013 | CN103098539A Securing a component prior to manufacture of a device |
05/08/2013 | CN103098482A Secure remote control for audio/video receiver/decoder |
05/08/2013 | CN103098414A Method for certificate-based authentication |
05/08/2013 | CN103098072A Recording medium device, terminal device, delivery device, control method, program, and recording medium for program |
05/08/2013 | CN103098071A Providing differential access to a digital document |
05/08/2013 | CN103098070A Methods, apparatus and systems for monitoring locations of data within a network service |
05/08/2013 | CN103098069A Secure upgrade supplies and methods |
05/08/2013 | CN103098068A Method and apparatus for an ephemeral trusted device |
05/08/2013 | CN103098067A Portable data carrier with operating error counter |
05/08/2013 | CN103098066A Environmental condition identifying type license consumption system and method, and function providing server and program |
05/08/2013 | CN103098065A License install support system, license install support method |
05/08/2013 | CN103098064A Method and apparatus for authenticating a non-volatile memory device |
05/08/2013 | CN103098063A Non-volatile memory for anti-cloning and authentication method for the same |
05/08/2013 | CN103095700A Electronic data forensics system and forensics control method based on virtual desktop |
05/08/2013 | CN103095672A Multi-dimensional reputation scoring |
05/08/2013 | CN103095485A Network risk assessment method based on combination of Bayesian algorithm and matrix method |
05/08/2013 | CN103093561A Computer intelligent burglar alarm |
05/08/2013 | CN103093160A Device assisting intelligent storage card in achieving multiple functions |
05/08/2013 | CN103093159A Security verification method for mobile device |
05/08/2013 | CN103093158A Data storage method |
05/08/2013 | CN103093157A Method of permanent protection of cache data of serial attached scsi (SAS) redundant array of independent disks (RAID) card |
05/08/2013 | CN103093156A Method and system for providing safety protection measures |
05/08/2013 | CN103093155A Information hiding method based on source code modification |
05/08/2013 | CN103093154A Secret-level setting information management system and secret-level setting information management method |
05/08/2013 | CN103093153A Data security storage transfer sharing method |
05/08/2013 | CN103093152A Encryption-decryption method of executable file |
05/08/2013 | CN103093151A Smart card data power fail safeguard circuit |
05/08/2013 | CN103093150A Dynamic integrity protection method based on credible chip |
05/08/2013 | CN103093149A Repair method of infected common software/files and system and repair server |
05/08/2013 | CN103093148A Detection method, system and device of malicious advertisements |