Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
12/2012
12/26/2012CN102841990A Method and system for detecting malicious codes based on uniform resource locator
12/26/2012CN102841989A Operation system protection method and operation system protection device
12/26/2012CN102841902A Database data management method and system
12/26/2012CN102841795A Remote thread injection technology method
12/26/2012CN102841785A File handle closuring operation method and device
12/26/2012CN102841672A Dormancy interception method and system
12/26/2012CN102184367B Method and system for destroying electronic documents regularly
12/26/2012CN102004879B Method for identifying credible progress
12/26/2012CN101821747B Multi-factor content protection method and system
12/26/2012CN101772770B Method and apparatus for checking the integrity of data stored in a predetermined memory area of a memory
12/26/2012CN101669126B Method and apparatus for composing a digital rights management license format
12/26/2012CN101571894B System and method for managing digital contents
12/26/2012CN101461210B A method and device for providing a security breach indicative audio alert
12/26/2012CN101398872B Method of protecting a password from unauthorized access and data processing unit
12/25/2012US8341759 Detecting counterfeit electronic components using EMI telemetric fingerprints
12/25/2012US8341758 Secure device and method for preventing side channel attack
12/25/2012US8341755 Image forming apparatus
12/25/2012US8341752 RFID enabled media system and method that provides dynamic downloadable media content
12/25/2012US8341749 Preventing malware attacks in virtualized mobile devices
12/25/2012US8341747 Method to provide a secure virtual machine launcher
12/25/2012US8341746 Identifying malware
12/25/2012US8341743 Detection of viral code using emulation of operating system functions
12/25/2012US8341740 Method and system for identifying enterprise network hosts infected with slow and/or distributed scanning malware
12/25/2012US8341736 Detection and dynamic alteration of execution of potential software threats
12/25/2012US8341735 Method and arrangement for automatically controlling access between a computer and a communication network
12/25/2012US8341734 Method and system to audit physical copy data leakage
12/25/2012US8341731 IC card authentication apparatus, IC card authentication method, and recording medium having IC card authentication program recorded thereon
12/25/2012US8341730 Image forming apparatus and computer-readable storage medium for computer program
12/25/2012US8341722 Load balancing and failover of gateway devices
12/25/2012US8341720 Information protection applied by an intermediary device
12/25/2012US8341717 Dynamic network policies based on device classification
12/25/2012US8341715 System and method for shared resource owner based access control
12/25/2012US8341714 Security token and method for authentication of a user with the security token
12/25/2012US8341709 Pushing certificate chains to remote devices
12/25/2012US8341708 Systems and methods for authenticating credentials for management of a client
12/25/2012US8341707 Near real-time multi-party task authorization access control
12/25/2012US8341706 Method of processing authorization messages destined for a plurality of mobile receivers and method of transmitting such messages
12/25/2012US8341699 Method and system to detect human interaction with a computer
12/25/2012US8341697 Image processing system, image processing apparatus, and control method of image processing apparatus
12/25/2012US8341693 Enterprise-wide security system for computer devices
12/25/2012US8341691 Policy based selection of remediation
12/25/2012US8341475 Microprocessor comprising signature means for detecting an attack by error injection
12/25/2012US8341431 Scalable and extensible secure rendering of digital content
12/25/2012US8341429 Data transfer device
12/25/2012US8341428 System and method to protect computing systems
12/25/2012US8341427 Trusted cloud computing and services framework
12/25/2012US8341426 Methods and devices for instruction level software encryption
12/25/2012US8341424 Methods for playing protected content
12/25/2012US8341422 Method and apparatus for incremental code signing
12/25/2012US8341420 Methods, systems, and computer program products for entering sensitive and padding data using user-defined criteria
12/25/2012US8341419 Apparatus and method for limiting access to model specific registers in a microprocessor
12/25/2012US8341418 Electronic mail transmission and reception system
12/25/2012US8341417 Data storage using encoded hash message authentication code
12/25/2012US8341402 Method of controlling content access and method of obtaining content key using the same
12/25/2012US8341395 Media independent handover protocol security
12/25/2012US8341389 Device, systems, and method for securely starting up a computer installation
12/25/2012US8341270 Methods and systems for providing access to a computing environment
12/25/2012US8341085 Methods and apparatus for playback of an electronic file
12/25/2012US8340299 Key management system and method
12/25/2012US8340296 Method and system for registering and verifying smart card certificate for users moving between public key infrastructure domains
12/25/2012US8340089 Apparatus and method for managing data transfer in VoIP gateway
12/25/2012US8336772 Data storage and access systems
12/21/2012CA2780393A1 Key based secure operating system with secure dongle and method, and cryptographic method
12/20/2012WO2012174084A1 Use of master resolution image to establish authorship, and applications thereof
12/20/2012WO2012173843A2 Mobile device operations with battery optimization
12/20/2012WO2012173681A1 Passporting credentials between a mobile app and a web browser
12/20/2012WO2012173637A1 Establishing a secure connection based on a joint gesture
12/20/2012WO2012173599A1 System and method for controlling access
12/20/2012WO2012173508A1 Portable information storage device with unauthorized data access protection function
12/20/2012WO2012173337A1 Method for securing a virtual keypad
12/20/2012WO2012173267A1 Video processing system, video processing method, method of creating video processing database, video processing database, video processing apparatus, and control method and control program therefor
12/20/2012WO2012172947A1 Authentication system and authentication method
12/20/2012WO2012172748A1 Terminal device, server device, content recording control system, recording method, and recording permission/non-permission control method
12/20/2012WO2012172743A1 Information processing device, information processing method, program, and integrated circuit
12/20/2012WO2012172245A1 Secure transfer between non-volatile memory and volatile memory
12/20/2012WO2012172047A1 Input means for a touchscreen
12/20/2012WO2012171761A1 Apparatus and method for erasing stored data
12/20/2012WO2012122621A8 Change-tolerant method of generating an identifier for a collection of assets in a computing environment using a secret sharing scheme
12/20/2012WO2012112640A4 On-line membership verification utilizing an associated organization certificate
12/20/2012US20120324592 System and method for flexible security access management in an enterprise
12/20/2012US20120324591 System and method to protect a resource using an active avatar
12/20/2012US20120324590 Method and Apparatus for Content Management
12/20/2012US20120324589 Automatic sharing of event content by linking devices
12/20/2012US20120324588 Data model optimization
12/20/2012US20120324587 System and method for permitting use of content using transfer rights
12/20/2012US20120324586 System and method for controlling utilization of content
12/20/2012US20120324585 Methods, Devices and Computer Program Products for Regulating Network Activity Using a Subscriber Scoring System
12/20/2012US20120324584 System and method for managing and/or rendering internet multimedia content in a network
12/20/2012US20120324583 System and Method for Processing and Protecting Content
12/20/2012US20120324582 Service system that diagnoses the vulnerability of a web service in real time mode and provides the result information thereof
12/20/2012US20120324580 Method and Apparatus for Selective E-Mail Processing
12/20/2012US20120324578 Mobile device operations with battery optimization
12/20/2012US20120324577 Detecting malicious software on a computing device with a mobile device
12/20/2012US20120324576 Blocking intrusion attacks at an offending host
12/20/2012US20120324575 System, Method, Program, and Recording Medium for Detecting and Blocking Unwanted Programs in Real Time Based on Process Behavior Analysis and Recording Medium for Storing Program
12/20/2012US20120324574 Engine, system and method of providing a domain social network having business intelligence logic
12/20/2012US20120324573 Method for determining whether or not specific network session is under denial-of-service attack and method for the same
12/20/2012US20120324572 Systems and methods that perform application request throttling in a distributed computing environment
12/20/2012US20120324571 Information input display device and control program thereof
12/20/2012US20120324570 Information processor, information processing method, and computer program product