Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
02/2013
02/21/2013US20130047206 Method and Apparatus for Session Validation to Access from Uncontrolled Devices
02/21/2013US20130047205 Apparatus and Method for Making Access Decision Using Exceptions
02/21/2013US20130047204 Apparatus and Method for Determining Resource Trust Levels
02/21/2013US20130047203 Method and Apparatus for Third Party Session Validation
02/21/2013US20130047202 Apparatus and Method for Handling Transaction Tokens
02/21/2013US20130047201 Apparatus and Method for Expert Decisioning
02/21/2013US20130047200 Apparatus and Method for Performing Data Tokenization
02/21/2013US20130047199 Method and Apparatus for Subject Recognition Session Validation
02/21/2013US20130047197 Sealing secret data with a policy that includes a sensor-based constraint
02/21/2013US20130047196 Transitive closure security
02/21/2013US20130047195 Method and apparatus for making token-based access decisions
02/21/2013US20130047143 Protection for Unauthorized Firmware and Software Upgrades to Consumer Electronic Devices
02/21/2013US20130046995 Method and computer program product for order preserving symbol based encryption
02/21/2013US20130046994 Integrated genomic and proteomic security protocol
02/21/2013US20130046979 Protecting the information encoded in a bloom filter using encoded bits of data
02/21/2013US20130046977 Secure streaming container
02/21/2013US20130046975 System, method, and program for information management
02/21/2013US20130046800 Systems for Distributed Secure Storage of Personal Data, In Particular Biometric Impressions, and System, Local Device, and Method for Monitoring Identity
02/21/2013US20130046696 Method and Apparatus for Object Transaction Session Validation
02/21/2013US20130046694 Method and system using a license key to conditionally allow edition of a document
02/21/2013US20130046658 Data Storage and Access Systems
02/21/2013DE102011110665A1 Sicherheitsdatensystem und Verfahren dafür Safety Data System and method therefor
02/21/2013DE102011052751A1 Autorisierung von Check-Einreichungen Authorization of check-submissions
02/21/2013CA2845523A1 Secure recovery apparatus and method
02/20/2013EP2560339A2 Access management system, access management method, access management server, cooperation server, program and recording medium
02/20/2013EP2560131A1 Card shaped data carrier and system for electronic tickets
02/20/2013EP2560124A1 Access rights management in enterprise digital rights management systems
02/20/2013EP2560123A1 Method and system for liveness detection by conducting a host-directed illumination during biometric authentication
02/20/2013EP2560122A1 Multi-Channel Multi-Factor Authentication
02/20/2013EP2560121A1 Communication terminal device, communication device, electronic card, method for a communication terminal device and method for a communication device for providing a verification
02/20/2013EP2560120A2 Systems and methods for identifying associations between malware samples
02/20/2013EP2560101A2 Information storage system
02/20/2013EP2559273A1 Method and apparatus for secure element management
02/20/2013EP2558973A2 Streaming insertion of tokens into content to protect against csrf
02/20/2013EP2558972A1 Staged control release in boot process
02/20/2013CN202748796U Verification system for electric power device maintenance task
02/20/2013CN202748795U USBKEY safety protection device
02/20/2013CN102939608A System and method for dynamic, variably-timed operation paths as a resistance to side channel and repeated invocation attacks
02/20/2013CN102939590A Method for providing data protection for data stored within a memory element and integrated circuit device therefor
02/20/2013CN102939587A Method for linking and loading to protect applications
02/20/2013CN102938046A Code protection method based on static encrypted storage and dynamic decrypted operation
02/20/2013CN102938045A Encryption method and authorization method after encryption for electronic product
02/20/2013CN102938044A Method and device for controlling file
02/20/2013CN102938043A Access of authorized application to secure resources
02/20/2013CN102938042A Method and device for detecting webpage tampering
02/20/2013CN102938041A Comprehensive detection method and system for page tampering
02/20/2013CN102938040A Malicious Android application program detection method, system and device
02/20/2013CN102938039A Selective file access for applications
02/20/2013CN102938038A Method for enhancing software security based on COP (Coefficient of Performance)
02/20/2013CN102938037A Plug-in calling method and plug-in manager for browser
02/20/2013CN102938036A Section double encryption and safe loading method of Windows dynamic link library
02/20/2013CN102938035A Driving separation system inside virtual machine and method
02/20/2013CN102938034A Working method for conversion device
02/20/2013CN102938033A System for enhancing safety of U shield for bank and application method thereof
02/20/2013CN102938032A Method and system for encrypting and decrypting application program on communication terminal as well as terminal
02/20/2013CN102938031A Electrical equipment
02/20/2013CN102938030A Method and terminal for setting permission of application and controlling restricted region
02/20/2013CN102937974A Search server and search method
02/20/2013CN102937907A Method for utilizing secure digital (SD) card to perform licensed software installation and update
02/20/2013CN102937879A Mobile terminal with two-point touch unlocking system and two-point touch unlocking method
02/20/2013CN102937870A Method and terminal for unlocking man-machine operation interface
02/20/2013CN102073825B Path drive-based executable program security detection method and system
02/20/2013CN102054142B Platform for simulating and training on hardware safety defects
02/20/2013CN102024102B Offline DRM certificate management and control method in embedded equipment
02/20/2013CN101957893B File permission management system
02/19/2013US8381310 Systems, methods, and program applications for selectively restricting the placeshifting of copy protected digital media content
02/19/2013US8381308 Computer-implemented multi-resource shared lock
02/19/2013US8381307 Method for protecting a converted applet (CAP) file including encrypting the CAP file
02/19/2013US8381306 Translating role-based access control policy to resource authorization policy
02/19/2013US8381304 Apparatus and method for assuring secure disposal of a hard disk drive unit
02/19/2013US8381302 Systems and methods for translating non-comparable values into comparable values for use in heuristics
02/19/2013US8381297 System and method for providing network security to mobile devices
02/19/2013US8381295 Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems
02/19/2013US8381293 Identity theft countermeasures
02/19/2013US8381290 Intrusion detection systems and methods
02/19/2013US8381288 Restricted component access to application memory
02/19/2013US8381285 Systems and methods for generating constraints for use in access control
02/19/2013US8381284 System and method for enforcing security policies in a virtual environment
02/19/2013US8381275 Staged user deletion
02/19/2013US8381273 System and method for providing a secure connection between networked computers
02/19/2013US8381265 Member registration method, community service system, portable terminal, and member invitation processing program
02/19/2013US8381261 Method for selecting policy decision functional entity in a resource and admission control system
02/19/2013US8381242 Static analysis for verification of software program access to secure resources for computer systems
02/19/2013US8381115 Method of managing character fonts within multimedia scenes, and the corresponding computer program and terminal
02/19/2013US8381114 Method of managing character fonts within multimedia scenes, and the corresponding computer program and terminal
02/19/2013US8380996 Copy-protected software cartridge
02/19/2013US8380995 Process for login of a computing device with a touchscreen
02/19/2013US8380987 Protection agents and privilege modes
02/19/2013US8380985 Certificate validation method and certificate validation server and storage medium
02/19/2013US8380976 System, server, method, and computer program for relaying electronic mail
02/19/2013US8380849 Digital rights management
02/19/2013US8380728 Personalized searchable library with highlighting capabilities
02/19/2013US8380654 General market prediction using position specification language
02/19/2013US8380634 First computer process and second computer process proxy-executing code on behalf of first process
02/19/2013US8380631 Communication of emergency medical data over a vulnerable system
02/19/2013US8380630 Information record infrastructure, system and method
02/19/2013US8380219 Controlling an amount of information disclosed by a position-determining system
02/19/2013US8380099 Image forming apparatus and authentication method
02/19/2013US8379861 Integrated circuit and a method for secure testing
02/19/2013US8379852 Processing video content