Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
02/2013
02/06/2013CN102915410A Computer file protection method and protection device
02/06/2013CN102915409A Software filing and comparing instrument applied to electric energy meter and implementing method of software filing and comparing instrument
02/06/2013CN102915374A Method, device and system for controlling access to database resources
02/06/2013CN102136046B High-speed low-power consumption safe secure digital (SD) card communicating method
02/06/2013CN101655652B Projector for projecting password and method therof
02/06/2013CN101622625B Method for modifying secrets in a cryptographic module, particularly in a non-protected environment
02/06/2013CN101523402B Trust management systems and methods
02/06/2013CN101477676B Securing content for playback
02/06/2013CN101458745B Tracing subsystem of digital copyright management proxy system and working method thereof
02/05/2013US8370959 Connection device authentication
02/05/2013US8370958 Decoding method for a probabilistic anti-collusion code comprising the selection of the collusion strategy
02/05/2013US8370957 Method and apparatus for transmitting contents with limited system permissions
02/05/2013US8370956 System and method for rendering digital content in accordance with usage rights information
02/05/2013US8370954 Content management systems and methods including content usage restrictions
02/05/2013US8370945 Identifying security breaches caused by web-enabled software applications
02/05/2013US8370940 Methods and apparatuses for providing internet-based proxy services
02/05/2013US8370939 Protection against malware on web resources
02/05/2013US8370934 Methods for detecting malicious programs using a multilayered heuristics approach
02/05/2013US8370933 Systems and methods for detecting the insertion of poisoned DNS server addresses into DHCP servers
02/05/2013US8370923 Access to a processing device
02/05/2013US8370914 Transition from WS-Federation passive profile to active profile
02/05/2013US8370911 System for integrating multiple access controls systems
02/05/2013US8370906 Method and system of plug-in privilege control
02/05/2013US8370901 Method and apparatus for providing identity management for users in a web environment
02/05/2013US8370646 Method and system for maintaining secure data input and output
02/05/2013US8370645 Protection of security parameters in storage devices
02/05/2013US8370640 Simplified multi-factor authentication
02/05/2013US8370639 System and method for providing secure access to an electronic device using continuous facial biometrics
02/05/2013US8370637 Virtual pad
02/05/2013US8370632 Apparatus and method for incorporating signature into electronic documents
02/05/2013US8370631 Trusted identities on a trusted computing platform
02/05/2013US8370628 Document collaboration system with alternative views
02/05/2013US8370619 Method and apparatus for booting host
02/05/2013US8370610 Remote configuration of computing platforms
02/05/2013US8370498 Method of using server, server reservation control apparatus and program storage medium
02/05/2013US8370450 Systems and methods for information backup
02/05/2013US8370419 Processing of metadata content and digital content received by a media distribution system
02/05/2013US8370262 System and method for performing secure online transactions
02/05/2013US8370261 System and a method for access management and billing
02/05/2013US8370152 Method, apparatus, and program for certifying a voice profile when transmitting text messages for synthesized speech
02/05/2013US8369520 Cryptographic device employing parallel processing
02/05/2013US8369516 Encryption apparatus having common key encryption function and embedded apparatus
02/05/2013US8369248 Information transmitting and receiving system, information transmitting device, and information receiving device
02/05/2013DE202013000846U1 Vorrichtung zur Vergabe und Kontrolle von Zugriffsberechtigungen Apparatus for allocation and control of access permissions
02/04/2013CA2784172A1 Modular tool for constructing a link to a rights program from article information
02/04/2013CA2781336A1 Software part validation using hash values
01/2013
01/31/2013WO2013016736A2 Product authentication based upon a hyperelliptic curve equation and a curve pairing function
01/31/2013WO2013016692A2 Selectively performing a positioning procedure at an access terminal based on a behavior model
01/31/2013WO2013016577A1 System and method for network-based asset operational dependence scoring
01/31/2013WO2013016243A1 Modeling contractual terms as structured data for license compliance analysis
01/31/2013WO2013016013A1 Generating dispersed storage network event records
01/31/2013WO2013015994A1 Monitoring mobile application activities for malicious traffic on a mobile device
01/31/2013WO2013015910A1 Software run-time provenance
01/31/2013WO2013014532A1 Systems and methods for dynamically assessing and mitigating risk of an insured entity
01/31/2013WO2013014482A1 Secure data authentication system and method
01/31/2013WO2013014033A1 Method and device for detecting mobile phone virus
01/31/2013WO2013013581A1 Document right management method, apparatus and system
01/31/2013WO2013013291A1 System, device, and method for authentication of a user accessing an on-line resource
01/31/2013WO2012118984A3 Protecting operating system configuration values
01/31/2013US20130031643 Methods and Apparatus for Sharing, Transferring and Removing Previously Owned Digital Media
01/31/2013US20130031641 Advanced audio captcha
01/31/2013US20130031640 Advanced captcha using images in sequence
01/31/2013US20130031637 System and method for automated processing and publication of content
01/31/2013US20130031635 System, Method and Computer Readable Medium for Evaluating a Security Characteristic
01/31/2013US20130031633 System and methods for adaptive model generation for detecting intrusion in computer systems
01/31/2013US20130031632 System and Method for Detecting Malicious Content
01/31/2013US20130031631 Detection of unauthorized device access or modifications
01/31/2013US20130031630 Method and Apparatus for Identifying Phishing Websites in Network Traffic Using Generated Regular Expressions
01/31/2013US20130031629 Apparatus and Method for Enhancing Security of Data on a Host Computing Device and a Peripheral Device
01/31/2013US20130031628 Preventing Phishing Attacks
01/31/2013US20130031627 Method and System for Preventing Phishing Attacks
01/31/2013US20130031626 Methods of detecting dns flooding attack according to characteristics of type of attack traffic
01/31/2013US20130031625 Cyber threat prior prediction apparatus and method
01/31/2013US20130031624 Applicant screening
01/31/2013US20130031623 Multi-factor authentication using digital images of barcodes
01/31/2013US20130031622 Static analysis for verification of software program access to secure resources for computer systems
01/31/2013US20130031621 Method for applying a host security service to a network
01/31/2013US20130031617 System and methods for use in communicating with an energy management device in an energy device network
01/31/2013US20130031614 Method for remotely locking/unlocking a machine
01/31/2013US20130031613 Secure access to customer log data in a multi-tenant environment
01/31/2013US20130031612 Server apparatus, information processing method, program, and storage medium
01/31/2013US20130031611 Cloud-enabled web-entry system for visitor access control
01/31/2013US20130031610 Collaborative information management
01/31/2013US20130031609 Device Ownership Security On A Network
01/31/2013US20130031608 Methods and apparatus to transfer management control of a client between servers
01/31/2013US20130031607 Software delivery models
01/31/2013US20130031606 Information processing device, information processing method and program
01/31/2013US20130031604 Method and Apparatus for Remote Authentication
01/31/2013US20130031603 Security method for engineering tools and industrial products, and security system
01/31/2013US20130031602 Thin client system, and access control method and access control program for thin client system
01/31/2013US20130031601 Parental control of mobile content on a mobile device
01/31/2013US20130031600 Automatic generation and distribution of policy information regarding malicious mobile traffic in a wireless network
01/31/2013US20130031599 Monitoring mobile application activities for malicious traffic on a mobile device
01/31/2013US20130031598 Contextual-Based Virtual Data Boundaries
01/31/2013US20130031597 Method and equipment for security isolation of a client computer
01/31/2013US20130031596 Evaluating Detectability of Information in Authorization Policies
01/31/2013US20130031375 Method and apparatus for protecting software of mobile terminal
01/31/2013US20130031374 Firmware-based trusted platform module for arm processor architectures and trustzone security extensions
01/31/2013US20130031373 Product authentication based upon a hyperelliptic curve equation and a curve pairing function
01/31/2013US20130031367 Facilitating access control in peer-to-peer overlay networks