Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
04/04/2013 | US20130086675 Information processing apparatus and method of executing an application in the apparatus |
04/04/2013 | US20130086672 Security method of a portable device |
04/04/2013 | US20130086671 Information terminal device and method of personal authentication using the same |
04/04/2013 | US20130086669 Mobile application, single sign-on management |
04/04/2013 | US20130086666 Method and computer system for providing time ratio-based password/challenge authentication |
04/04/2013 | US20130086663 Key derivation techniques |
04/04/2013 | US20130086662 Parameter based key derivation |
04/04/2013 | US20130086661 Techniques for client contructed sessions |
04/04/2013 | US20130086660 System for preventing illegal copy of software and method for preventing illegal copy of software |
04/04/2013 | US20130086659 Data processing apparatus, activation control method, and computer-readable storage medium |
04/04/2013 | US20130086658 Privileged account manager, access management |
04/04/2013 | US20130086657 Relying party platform |
04/04/2013 | US20130086656 Method and Apparatus for Protecting a Single Sign-on Domain from Credential Leakage |
04/04/2013 | US20130086655 Password changing |
04/04/2013 | US20130086653 Mobile network operator and data service provider interoperation |
04/04/2013 | US20130086652 Session sharing in secure web service conversations |
04/04/2013 | US20130086651 Re-authentication in secure web service conversations |
04/04/2013 | US20130086648 Updating resource access permissions in a virtual computing environment |
04/04/2013 | US20130086647 Encryption sentinel system and method |
04/04/2013 | US20130086643 Tamper proof mutating software |
04/04/2013 | US20130086642 Obtaining a signed certificate for a dispersed storage network |
04/04/2013 | US20130086641 System and method for validating users using social network or other information from a wed site |
04/04/2013 | US20130086640 Information processing apparatus and method |
04/04/2013 | US20130086639 Mobile application, identity interface |
04/04/2013 | US20130086638 Systems, apparatus, and computer-readable storage medium for recording images on a recording medium |
04/04/2013 | US20130086636 System and method for restricting pathways to harmful hosts in computer networks |
04/04/2013 | US20130086635 System and method for communication in a network |
04/04/2013 | US20130086632 System, method, and computer program product for applying a rule to associated events |
04/04/2013 | US20130086630 Dynamic identity switching |
04/04/2013 | US20130086629 Dynamic identity context propagation |
04/04/2013 | US20130086628 Privileged account manager, application account management |
04/04/2013 | US20130086627 Conflict resolution when identical policies are attached to a single policy subject |
04/04/2013 | US20130086626 Constraint definition for conditional policy attachments |
04/04/2013 | US20130086625 Enforcing security rules at runtime |
04/04/2013 | US20130086623 Systems and methods for establishing isolation between content hosting services executing on common support server |
04/04/2013 | US20130086393 Increasing data security in enterprise applications by obfuscating encryption keys |
04/04/2013 | US20130086392 Increasing data security in enterprise applications by using formatting, checksums, and encryption to detect tampering of a data buffer |
04/04/2013 | US20130086391 System, architecture and method for secure encryption and decryption |
04/04/2013 | US20130086390 System and Method of Securing Private Health Information |
04/04/2013 | US20130086389 Security Token and Authentication System |
04/04/2013 | US20130086388 Credentials management |
04/04/2013 | US20130086387 Method for Certifying and Verifying Digital Web Content Using Public Cryptography |
04/04/2013 | US20130086382 Systems and methods for securely transferring personal identifiers |
04/04/2013 | US20130086378 Proxy system for security processing without entrusting certified secret information to a proxy |
04/04/2013 | US20130086376 Secure integrated cyberspace security and situational awareness system |
04/04/2013 | US20130085914 Authenticated name resolution |
04/04/2013 | US20130084831 Methods of Using Biometric Data in a Phone System and Apparatuses to Perform the Methods |
04/04/2013 | US20130083096 Authentication systems and methods |
04/04/2013 | US20130082823 Method and system to authenticate an object |
04/04/2013 | DE112011102224T5 Identitätsvermittlung zwischen Client- und Server-Anwendungen Identity mediation between client and server applications |
04/04/2013 | CA2849904A1 Policy compliance-based secure data access |
04/03/2013 | EP2575384A1 System and method for remote wipe through voice mail |
04/03/2013 | EP2575288A1 Password protection |
04/03/2013 | EP2575287A1 Method for publishing content over a communication network |
04/03/2013 | EP2575084A1 Security token and authentication system |
04/03/2013 | EP2575071A2 Information storing device, information processing device, information processing system, information processing method, and program |
04/03/2013 | EP2575070A1 Classification-based digital rights management |
04/03/2013 | EP2575069A2 Security vulnerability correction |
04/03/2013 | EP2575068A1 System and method for providing hardware-based security |
04/03/2013 | EP2575043A1 Method to secure an application executable in a distant server accessible via a public computer network, and improved virtual server. |
04/03/2013 | CN202854816U Safe and anti-stealing notebook computer |
04/03/2013 | CN202854815U Anti-fake seal encryption chip |
04/03/2013 | CN202854814U Apparatus realizing embedded software code protection by using hardware encryption module |
04/03/2013 | CN202854813U Monitoring system based on fingerprint identification and global position system (GPS) positioning |
04/03/2013 | CN202854812U Electronic product |
04/03/2013 | CN202854649U Electronic equipment protective casing |
04/03/2013 | CN103026723A Method of protecting a content |
04/03/2013 | CN103026686A Method and apparatus for providing a one-time password |
04/03/2013 | CN103026683A Communication system, communication device, communication method, and computer program |
04/03/2013 | CN103024035A Safe and energy-saving encryption searching method based on mobile cloud platform |
04/03/2013 | CN103023983A System and method for distributing processing of computer security tasks |
04/03/2013 | CN103023889A Safety margin risk quantification method |
04/03/2013 | CN103023877A Method for data protection and forcible self-destruction in public cloud |
04/03/2013 | CN103023862A Method, server and system used for integrity protection and authentication |
04/03/2013 | CN103023710A Safety test system and method |
04/03/2013 | CN103023651A Method and device for monitoring access of mobile device |
04/03/2013 | CN103023539A Method and system for starting functions of electronic devices |
04/03/2013 | CN103020854A Service function authorization method and system |
04/03/2013 | CN103020824A Mobile payment method and device |
04/03/2013 | CN103020682A Two-dimension code identification generating device, two-dimension code identification recognition device and two-dimension code identification system of book |
04/03/2013 | CN103020553A Anti-theft protection method for mobile terminal |
04/03/2013 | CN103020552A PUF (Physical Unclonable Function) On-chip self enrollment system based on SRAM (Static Random Access Memories) of PUF and implementation method thereof |
04/03/2013 | CN103020551A Memory architecture |
04/03/2013 | CN103020550A Solid state disk and secure access method thereof as well as solid state disk system |
04/03/2013 | CN103020549A Protection device and storage device of storer |
04/03/2013 | CN103020548A Card reader-based electronic signing tool and card reader |
04/03/2013 | CN103020547A Method and device for executing commands, intelligent card and mobile terminal |
04/03/2013 | CN103020546A Intelligent physical isolation secure data exchange equipment and method |
04/03/2013 | CN103020545A Over-temperature protection method based on Loongson processor |
04/03/2013 | CN103020544A Encryption and decryption method for shp line-surface graph layer data hierarchy |
04/03/2013 | CN103020543A System and method for image encryption management of virtual disk |
04/03/2013 | CN103020542A Technology for storing secret information for global data center |
04/03/2013 | CN103020541A Personal space (data) in contrast to company space (data) |
04/03/2013 | CN103020540A Processing method and system for sensitive data, mobile terminal and server equipment |
04/03/2013 | CN103020539A English words encryption and decryption method |
04/03/2013 | CN103020538A Terminal data protection method and terminal |
04/03/2013 | CN103020537A Data encrypting method, data encrypting device, data deciphering method and data deciphering device |
04/03/2013 | CN103020536A Terminal equipment |
04/03/2013 | CN103020535A Data encryption and decryption system with comparing function |
04/03/2013 | CN103020534A Method and system for managing mobile terminal |