Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
12/26/2012 | CN102841990A Method and system for detecting malicious codes based on uniform resource locator |
12/26/2012 | CN102841989A Operation system protection method and operation system protection device |
12/26/2012 | CN102841902A Database data management method and system |
12/26/2012 | CN102841795A Remote thread injection technology method |
12/26/2012 | CN102841785A File handle closuring operation method and device |
12/26/2012 | CN102841672A Dormancy interception method and system |
12/26/2012 | CN102184367B Method and system for destroying electronic documents regularly |
12/26/2012 | CN102004879B Method for identifying credible progress |
12/26/2012 | CN101821747B Multi-factor content protection method and system |
12/26/2012 | CN101772770B Method and apparatus for checking the integrity of data stored in a predetermined memory area of a memory |
12/26/2012 | CN101669126B Method and apparatus for composing a digital rights management license format |
12/26/2012 | CN101571894B System and method for managing digital contents |
12/26/2012 | CN101461210B A method and device for providing a security breach indicative audio alert |
12/26/2012 | CN101398872B Method of protecting a password from unauthorized access and data processing unit |
12/25/2012 | US8341759 Detecting counterfeit electronic components using EMI telemetric fingerprints |
12/25/2012 | US8341758 Secure device and method for preventing side channel attack |
12/25/2012 | US8341755 Image forming apparatus |
12/25/2012 | US8341752 RFID enabled media system and method that provides dynamic downloadable media content |
12/25/2012 | US8341749 Preventing malware attacks in virtualized mobile devices |
12/25/2012 | US8341747 Method to provide a secure virtual machine launcher |
12/25/2012 | US8341746 Identifying malware |
12/25/2012 | US8341743 Detection of viral code using emulation of operating system functions |
12/25/2012 | US8341740 Method and system for identifying enterprise network hosts infected with slow and/or distributed scanning malware |
12/25/2012 | US8341736 Detection and dynamic alteration of execution of potential software threats |
12/25/2012 | US8341735 Method and arrangement for automatically controlling access between a computer and a communication network |
12/25/2012 | US8341734 Method and system to audit physical copy data leakage |
12/25/2012 | US8341731 IC card authentication apparatus, IC card authentication method, and recording medium having IC card authentication program recorded thereon |
12/25/2012 | US8341730 Image forming apparatus and computer-readable storage medium for computer program |
12/25/2012 | US8341722 Load balancing and failover of gateway devices |
12/25/2012 | US8341720 Information protection applied by an intermediary device |
12/25/2012 | US8341717 Dynamic network policies based on device classification |
12/25/2012 | US8341715 System and method for shared resource owner based access control |
12/25/2012 | US8341714 Security token and method for authentication of a user with the security token |
12/25/2012 | US8341709 Pushing certificate chains to remote devices |
12/25/2012 | US8341708 Systems and methods for authenticating credentials for management of a client |
12/25/2012 | US8341707 Near real-time multi-party task authorization access control |
12/25/2012 | US8341706 Method of processing authorization messages destined for a plurality of mobile receivers and method of transmitting such messages |
12/25/2012 | US8341699 Method and system to detect human interaction with a computer |
12/25/2012 | US8341697 Image processing system, image processing apparatus, and control method of image processing apparatus |
12/25/2012 | US8341693 Enterprise-wide security system for computer devices |
12/25/2012 | US8341691 Policy based selection of remediation |
12/25/2012 | US8341475 Microprocessor comprising signature means for detecting an attack by error injection |
12/25/2012 | US8341431 Scalable and extensible secure rendering of digital content |
12/25/2012 | US8341429 Data transfer device |
12/25/2012 | US8341428 System and method to protect computing systems |
12/25/2012 | US8341427 Trusted cloud computing and services framework |
12/25/2012 | US8341426 Methods and devices for instruction level software encryption |
12/25/2012 | US8341424 Methods for playing protected content |
12/25/2012 | US8341422 Method and apparatus for incremental code signing |
12/25/2012 | US8341420 Methods, systems, and computer program products for entering sensitive and padding data using user-defined criteria |
12/25/2012 | US8341419 Apparatus and method for limiting access to model specific registers in a microprocessor |
12/25/2012 | US8341418 Electronic mail transmission and reception system |
12/25/2012 | US8341417 Data storage using encoded hash message authentication code |
12/25/2012 | US8341402 Method of controlling content access and method of obtaining content key using the same |
12/25/2012 | US8341395 Media independent handover protocol security |
12/25/2012 | US8341389 Device, systems, and method for securely starting up a computer installation |
12/25/2012 | US8341270 Methods and systems for providing access to a computing environment |
12/25/2012 | US8341085 Methods and apparatus for playback of an electronic file |
12/25/2012 | US8340299 Key management system and method |
12/25/2012 | US8340296 Method and system for registering and verifying smart card certificate for users moving between public key infrastructure domains |
12/25/2012 | US8340089 Apparatus and method for managing data transfer in VoIP gateway |
12/25/2012 | US8336772 Data storage and access systems |
12/21/2012 | CA2780393A1 Key based secure operating system with secure dongle and method, and cryptographic method |
12/20/2012 | WO2012174084A1 Use of master resolution image to establish authorship, and applications thereof |
12/20/2012 | WO2012173843A2 Mobile device operations with battery optimization |
12/20/2012 | WO2012173681A1 Passporting credentials between a mobile app and a web browser |
12/20/2012 | WO2012173637A1 Establishing a secure connection based on a joint gesture |
12/20/2012 | WO2012173599A1 System and method for controlling access |
12/20/2012 | WO2012173508A1 Portable information storage device with unauthorized data access protection function |
12/20/2012 | WO2012173337A1 Method for securing a virtual keypad |
12/20/2012 | WO2012173267A1 Video processing system, video processing method, method of creating video processing database, video processing database, video processing apparatus, and control method and control program therefor |
12/20/2012 | WO2012172947A1 Authentication system and authentication method |
12/20/2012 | WO2012172748A1 Terminal device, server device, content recording control system, recording method, and recording permission/non-permission control method |
12/20/2012 | WO2012172743A1 Information processing device, information processing method, program, and integrated circuit |
12/20/2012 | WO2012172245A1 Secure transfer between non-volatile memory and volatile memory |
12/20/2012 | WO2012172047A1 Input means for a touchscreen |
12/20/2012 | WO2012171761A1 Apparatus and method for erasing stored data |
12/20/2012 | WO2012122621A8 Change-tolerant method of generating an identifier for a collection of assets in a computing environment using a secret sharing scheme |
12/20/2012 | WO2012112640A4 On-line membership verification utilizing an associated organization certificate |
12/20/2012 | US20120324592 System and method for flexible security access management in an enterprise |
12/20/2012 | US20120324591 System and method to protect a resource using an active avatar |
12/20/2012 | US20120324590 Method and Apparatus for Content Management |
12/20/2012 | US20120324589 Automatic sharing of event content by linking devices |
12/20/2012 | US20120324588 Data model optimization |
12/20/2012 | US20120324587 System and method for permitting use of content using transfer rights |
12/20/2012 | US20120324586 System and method for controlling utilization of content |
12/20/2012 | US20120324585 Methods, Devices and Computer Program Products for Regulating Network Activity Using a Subscriber Scoring System |
12/20/2012 | US20120324584 System and method for managing and/or rendering internet multimedia content in a network |
12/20/2012 | US20120324583 System and Method for Processing and Protecting Content |
12/20/2012 | US20120324582 Service system that diagnoses the vulnerability of a web service in real time mode and provides the result information thereof |
12/20/2012 | US20120324580 Method and Apparatus for Selective E-Mail Processing |
12/20/2012 | US20120324578 Mobile device operations with battery optimization |
12/20/2012 | US20120324577 Detecting malicious software on a computing device with a mobile device |
12/20/2012 | US20120324576 Blocking intrusion attacks at an offending host |
12/20/2012 | US20120324575 System, Method, Program, and Recording Medium for Detecting and Blocking Unwanted Programs in Real Time Based on Process Behavior Analysis and Recording Medium for Storing Program |
12/20/2012 | US20120324574 Engine, system and method of providing a domain social network having business intelligence logic |
12/20/2012 | US20120324573 Method for determining whether or not specific network session is under denial-of-service attack and method for the same |
12/20/2012 | US20120324572 Systems and methods that perform application request throttling in a distributed computing environment |
12/20/2012 | US20120324571 Information input display device and control program thereof |
12/20/2012 | US20120324570 Information processor, information processing method, and computer program product |