Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
02/12/2013 | US8374402 Data security system |
02/12/2013 | US8374353 Method and apparatus for updating a group key |
02/12/2013 | US8374349 Image encryption apparatus and image decryption apparatus |
02/12/2013 | US8374345 Data processing system and data processing method |
02/12/2013 | US8374320 Environment information transmission method, service controlling system, and computer product |
02/12/2013 | US8374189 Control channel transmitting method, receiving method, base station and terminal |
02/12/2013 | US8373886 Image processing device |
02/12/2013 | US8373753 Adaptive multi-modal integrated biometric identification detection and surveillance systems |
02/12/2013 | US8371855 Sharing electronic books |
02/12/2013 | CA2683273C Computer network intrusion detection |
02/12/2013 | CA2549092C System and method for providing improved claimant authentication |
02/12/2013 | CA2495147C Control systems and methods using a partially-observable markov decision process (po-mdp) |
02/12/2013 | CA2463542C Method and apparatus for security in a data processing system |
02/12/2013 | CA2447451C Information security method and system |
02/08/2013 | DE202013000847U1 Anordnung zur Vergabe und Kontrolle von Zugriftsberechtigungen Arrangement for the allocation and control of Zugriftsberechtigungen |
02/07/2013 | WO2013019880A1 Method and apparatus for using a multi-factor password or a dynamic password for enhanced security on a device |
02/07/2013 | WO2013019595A2 Providing security traceability of changes in endpoint programming through auditing |
02/07/2013 | WO2013019570A2 Efficient, high volume digital signature system for medical and business applications |
02/07/2013 | WO2013019369A1 Firmware-based trusted platform module for arm® trustzone™ implementations |
02/07/2013 | WO2013019198A1 Systems and methods for distributed rule-based correlation of events |
02/07/2013 | WO2013019193A1 Credential validation |
02/07/2013 | WO2013019185A1 Migrating virtual machines |
02/07/2013 | WO2013019059A2 Sandboxing technology for webruntime system |
02/07/2013 | WO2013017815A1 Distributed computing system |
02/07/2013 | WO2013017732A1 Methods and apparatuses for determining a user attention level using facial orientation detection |
02/07/2013 | WO2013017394A1 Access control for data or applications of a network |
02/07/2013 | WO2013017271A1 Mechanism for communicating between two applications on a safety module |
02/07/2013 | WO2013017004A1 Method, system, client and server for scanning file |
02/07/2013 | WO2013016764A1 System and method for access control and usage monitoring |
02/07/2013 | US20130036480 System and method for sharing of data securely between electronic devices |
02/07/2013 | US20130036479 Content record terminal, content record/reproduction system, and content recording method |
02/07/2013 | US20130036478 Identifying and Redacting Privileged Information |
02/07/2013 | US20130036477 Method and Apparatus Encoding a Rule for a Lookup Request in a Processor |
02/07/2013 | US20130036476 Rights-based system |
02/07/2013 | US20130036475 Access rights management in enterprise digital rights management systems |
02/07/2013 | US20130036474 Method and Apparatus for Secure Data Representation Allowing Efficient Collection, Search and Retrieval |
02/07/2013 | US20130036473 System and method for branch function based obfuscation |
02/07/2013 | US20130036472 Computer Worm Defense System and Method |
02/07/2013 | US20130036471 System and Method for Rule Matching in a Processor |
02/07/2013 | US20130036470 Cross-vm network filtering |
02/07/2013 | US20130036469 Detecting suspicious network activity using flow sampling |
02/07/2013 | US20130036468 Anti-phishing domain advisor and method thereof |
02/07/2013 | US20130036467 Method and process for pin entry in a consistent software stack in cash machines |
02/07/2013 | US20130036466 Internet infrastructure reputation |
02/07/2013 | US20130036465 Security controller |
02/07/2013 | US20130036464 Processor operable to ensure code integrity |
02/07/2013 | US20130036463 Biometric-enabled smart card |
02/07/2013 | US20130036462 Method and apparatus for using a multi-factor password or a dynamic password for enhanced security on a device |
02/07/2013 | US20130036461 Image-based authentication |
02/07/2013 | US20130036457 Multiple Image Reverse Turing Test |
02/07/2013 | US20130036456 Credential provision and proof system |
02/07/2013 | US20130036455 Method for controlling acess to resources |
02/07/2013 | US20130036453 System, method and user interface for network status reporting |
02/07/2013 | US20130036452 User authentication method, user authentication device, and program |
02/07/2013 | US20130036451 System and method for client-server communication facilitating utilization of authentication and network-based procedure call |
02/07/2013 | US20130036449 Techniques for providing tenant based storage security and service level assurance in cloud storage environment |
02/07/2013 | US20130036448 Sandboxing technology for webruntime system |
02/07/2013 | US20130036313 Persistent Encryption with XML Encryption |
02/07/2013 | US20130036312 Method and Device for Protecting Memory Content |
02/07/2013 | US20130036310 Low-level code signing mechanism |
02/07/2013 | US20130036309 System and method for verifying the identity of an individual by employing biometric data features associated with the individual |
02/07/2013 | US20130036298 Securely recovering a computing device |
02/07/2013 | US20130036159 Dual Blind Method and System for Attributing Activity to a User |
02/07/2013 | US20130036059 Electronic price-proposing system, electronic price-proposing device, and electronic price-proposing method |
02/07/2013 | DE112011101357T5 Dynamisches Token für den vorübergehenden Datenzugriff Dynamic token for the temporary data access |
02/07/2013 | DE102011080467A1 Zugangsregelung für Daten oder Applikationen eines Netzwerks Access control for data or applications on a network |
02/07/2013 | DE102004020870B4 Verfahren und Vorrichtung zur Erfassung einer externen Manipulation einer elektrischen Schaltung Method and device for detection of an external manipulation of an electrical circuit |
02/06/2013 | EP2555135A2 Method and system for obtaining identification information on a mobile device |
02/06/2013 | EP2555133A1 Thin-client system, access control method, and access control method in same |
02/06/2013 | EP2555132A1 Biometric processing using random projection transforms |
02/06/2013 | EP2553905A2 Systems and methods for securing data in motion |
02/06/2013 | EP2553904A2 Systems and methods for securing data in motion |
02/06/2013 | EP2553622A2 Secure data recorder |
02/06/2013 | EP2553621A1 Method, secure device, system and computer program product for digitally signing a document |
02/06/2013 | EP2553620A1 Methods and apparatus for device applet management on smart cards |
02/06/2013 | EP2553571A1 A system and method for encapsulating and enabling protection through diverse variations in software libraries |
02/06/2013 | EP2553570A1 Method for linking and loading to protect applications |
02/06/2013 | EP2466513A9 Visual or touchscreen password entry |
02/06/2013 | CN202720653U Ledger encryption card |
02/06/2013 | CN202720652U Dual-computer system for information security protection |
02/06/2013 | CN202720651U Computer information and document encryption card |
02/06/2013 | CN102918541A Device and method for blocking malicious code using executable files |
02/06/2013 | CN102918540A Creating and launching a web application with credentials |
02/06/2013 | CN102918539A Methods and apparatuses for securing playback content |
02/06/2013 | CN102916941A Method and system for safely managing files based on pre-installation environment (PE) system |
02/06/2013 | CN102915425A Confidential display method and confidential display device |
02/06/2013 | CN102915424A Handling defined areas within an electronic document to preserve integrity and context |
02/06/2013 | CN102915423A System and method for filtering electric power business data on basis of rough sets and gene expressions |
02/06/2013 | CN102915422A Method, device and system for protecting safety of computer |
02/06/2013 | CN102915421A Method and system for scanning files |
02/06/2013 | CN102915420A Synergetic security audit and situation evaluation system based on dynamic audit domain models |
02/06/2013 | CN102915419A Virus scanning method and scanning system |
02/06/2013 | CN102915418A Computer security protecting method, computer security protecting device and computer |
02/06/2013 | CN102915417A Application monitoring system and application monitoring method |
02/06/2013 | CN102915416A System for implementing security sharing of virtual articles among application programs |
02/06/2013 | CN102915415A Safety control method and system of mobile terminal |
02/06/2013 | CN102915414A Data storage system and method for security information interaction |
02/06/2013 | CN102915413A Intelligent protection method of computer software |
02/06/2013 | CN102915412A Software part validation using hash values |
02/06/2013 | CN102915411A Dereplication encryption lock for software and hardware of embedded system |