Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
02/21/2013 | US20130047206 Method and Apparatus for Session Validation to Access from Uncontrolled Devices |
02/21/2013 | US20130047205 Apparatus and Method for Making Access Decision Using Exceptions |
02/21/2013 | US20130047204 Apparatus and Method for Determining Resource Trust Levels |
02/21/2013 | US20130047203 Method and Apparatus for Third Party Session Validation |
02/21/2013 | US20130047202 Apparatus and Method for Handling Transaction Tokens |
02/21/2013 | US20130047201 Apparatus and Method for Expert Decisioning |
02/21/2013 | US20130047200 Apparatus and Method for Performing Data Tokenization |
02/21/2013 | US20130047199 Method and Apparatus for Subject Recognition Session Validation |
02/21/2013 | US20130047197 Sealing secret data with a policy that includes a sensor-based constraint |
02/21/2013 | US20130047196 Transitive closure security |
02/21/2013 | US20130047195 Method and apparatus for making token-based access decisions |
02/21/2013 | US20130047143 Protection for Unauthorized Firmware and Software Upgrades to Consumer Electronic Devices |
02/21/2013 | US20130046995 Method and computer program product for order preserving symbol based encryption |
02/21/2013 | US20130046994 Integrated genomic and proteomic security protocol |
02/21/2013 | US20130046979 Protecting the information encoded in a bloom filter using encoded bits of data |
02/21/2013 | US20130046977 Secure streaming container |
02/21/2013 | US20130046975 System, method, and program for information management |
02/21/2013 | US20130046800 Systems for Distributed Secure Storage of Personal Data, In Particular Biometric Impressions, and System, Local Device, and Method for Monitoring Identity |
02/21/2013 | US20130046696 Method and Apparatus for Object Transaction Session Validation |
02/21/2013 | US20130046694 Method and system using a license key to conditionally allow edition of a document |
02/21/2013 | US20130046658 Data Storage and Access Systems |
02/21/2013 | DE102011110665A1 Sicherheitsdatensystem und Verfahren dafür Safety Data System and method therefor |
02/21/2013 | DE102011052751A1 Autorisierung von Check-Einreichungen Authorization of check-submissions |
02/21/2013 | CA2845523A1 Secure recovery apparatus and method |
02/20/2013 | EP2560339A2 Access management system, access management method, access management server, cooperation server, program and recording medium |
02/20/2013 | EP2560131A1 Card shaped data carrier and system for electronic tickets |
02/20/2013 | EP2560124A1 Access rights management in enterprise digital rights management systems |
02/20/2013 | EP2560123A1 Method and system for liveness detection by conducting a host-directed illumination during biometric authentication |
02/20/2013 | EP2560122A1 Multi-Channel Multi-Factor Authentication |
02/20/2013 | EP2560121A1 Communication terminal device, communication device, electronic card, method for a communication terminal device and method for a communication device for providing a verification |
02/20/2013 | EP2560120A2 Systems and methods for identifying associations between malware samples |
02/20/2013 | EP2560101A2 Information storage system |
02/20/2013 | EP2559273A1 Method and apparatus for secure element management |
02/20/2013 | EP2558973A2 Streaming insertion of tokens into content to protect against csrf |
02/20/2013 | EP2558972A1 Staged control release in boot process |
02/20/2013 | CN202748796U Verification system for electric power device maintenance task |
02/20/2013 | CN202748795U USBKEY safety protection device |
02/20/2013 | CN102939608A System and method for dynamic, variably-timed operation paths as a resistance to side channel and repeated invocation attacks |
02/20/2013 | CN102939590A Method for providing data protection for data stored within a memory element and integrated circuit device therefor |
02/20/2013 | CN102939587A Method for linking and loading to protect applications |
02/20/2013 | CN102938046A Code protection method based on static encrypted storage and dynamic decrypted operation |
02/20/2013 | CN102938045A Encryption method and authorization method after encryption for electronic product |
02/20/2013 | CN102938044A Method and device for controlling file |
02/20/2013 | CN102938043A Access of authorized application to secure resources |
02/20/2013 | CN102938042A Method and device for detecting webpage tampering |
02/20/2013 | CN102938041A Comprehensive detection method and system for page tampering |
02/20/2013 | CN102938040A Malicious Android application program detection method, system and device |
02/20/2013 | CN102938039A Selective file access for applications |
02/20/2013 | CN102938038A Method for enhancing software security based on COP (Coefficient of Performance) |
02/20/2013 | CN102938037A Plug-in calling method and plug-in manager for browser |
02/20/2013 | CN102938036A Section double encryption and safe loading method of Windows dynamic link library |
02/20/2013 | CN102938035A Driving separation system inside virtual machine and method |
02/20/2013 | CN102938034A Working method for conversion device |
02/20/2013 | CN102938033A System for enhancing safety of U shield for bank and application method thereof |
02/20/2013 | CN102938032A Method and system for encrypting and decrypting application program on communication terminal as well as terminal |
02/20/2013 | CN102938031A Electrical equipment |
02/20/2013 | CN102938030A Method and terminal for setting permission of application and controlling restricted region |
02/20/2013 | CN102937974A Search server and search method |
02/20/2013 | CN102937907A Method for utilizing secure digital (SD) card to perform licensed software installation and update |
02/20/2013 | CN102937879A Mobile terminal with two-point touch unlocking system and two-point touch unlocking method |
02/20/2013 | CN102937870A Method and terminal for unlocking man-machine operation interface |
02/20/2013 | CN102073825B Path drive-based executable program security detection method and system |
02/20/2013 | CN102054142B Platform for simulating and training on hardware safety defects |
02/20/2013 | CN102024102B Offline DRM certificate management and control method in embedded equipment |
02/20/2013 | CN101957893B File permission management system |
02/19/2013 | US8381310 Systems, methods, and program applications for selectively restricting the placeshifting of copy protected digital media content |
02/19/2013 | US8381308 Computer-implemented multi-resource shared lock |
02/19/2013 | US8381307 Method for protecting a converted applet (CAP) file including encrypting the CAP file |
02/19/2013 | US8381306 Translating role-based access control policy to resource authorization policy |
02/19/2013 | US8381304 Apparatus and method for assuring secure disposal of a hard disk drive unit |
02/19/2013 | US8381302 Systems and methods for translating non-comparable values into comparable values for use in heuristics |
02/19/2013 | US8381297 System and method for providing network security to mobile devices |
02/19/2013 | US8381295 Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems |
02/19/2013 | US8381293 Identity theft countermeasures |
02/19/2013 | US8381290 Intrusion detection systems and methods |
02/19/2013 | US8381288 Restricted component access to application memory |
02/19/2013 | US8381285 Systems and methods for generating constraints for use in access control |
02/19/2013 | US8381284 System and method for enforcing security policies in a virtual environment |
02/19/2013 | US8381275 Staged user deletion |
02/19/2013 | US8381273 System and method for providing a secure connection between networked computers |
02/19/2013 | US8381265 Member registration method, community service system, portable terminal, and member invitation processing program |
02/19/2013 | US8381261 Method for selecting policy decision functional entity in a resource and admission control system |
02/19/2013 | US8381242 Static analysis for verification of software program access to secure resources for computer systems |
02/19/2013 | US8381115 Method of managing character fonts within multimedia scenes, and the corresponding computer program and terminal |
02/19/2013 | US8381114 Method of managing character fonts within multimedia scenes, and the corresponding computer program and terminal |
02/19/2013 | US8380996 Copy-protected software cartridge |
02/19/2013 | US8380995 Process for login of a computing device with a touchscreen |
02/19/2013 | US8380987 Protection agents and privilege modes |
02/19/2013 | US8380985 Certificate validation method and certificate validation server and storage medium |
02/19/2013 | US8380976 System, server, method, and computer program for relaying electronic mail |
02/19/2013 | US8380849 Digital rights management |
02/19/2013 | US8380728 Personalized searchable library with highlighting capabilities |
02/19/2013 | US8380654 General market prediction using position specification language |
02/19/2013 | US8380634 First computer process and second computer process proxy-executing code on behalf of first process |
02/19/2013 | US8380631 Communication of emergency medical data over a vulnerable system |
02/19/2013 | US8380630 Information record infrastructure, system and method |
02/19/2013 | US8380219 Controlling an amount of information disclosed by a position-determining system |
02/19/2013 | US8380099 Image forming apparatus and authentication method |
02/19/2013 | US8379861 Integrated circuit and a method for secure testing |
02/19/2013 | US8379852 Processing video content |