Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
12/2012
12/13/2012US20120317645 Threat level assessment of applications
12/13/2012US20120317644 Applying Antimalware Logic without Revealing the Antimalware Logic to Adversaries
12/13/2012US20120317643 Apparatus and method preventing overflow of pending interest table in name based network system
12/13/2012US20120317642 Parallel Tracing Apparatus For Malicious Websites
12/13/2012US20120317641 Peer-to-peer (p2p) botnet tracking at backbone level
12/13/2012US20120317640 Variable length, multidimensional authentication keys
12/13/2012US20120317639 Biometric data system
12/13/2012US20120317638 Method and devices for managing permission requests to allow access to a computing resource
12/13/2012US20120317637 Communication between private network and public network
12/13/2012US20120317636 Management system, management method and management program for managing industrial control system
12/13/2012US20120317635 System and method for monitoring unauthorized transport of digital content
12/13/2012US20120317634 Method of securely controlling a computer or microchip with a master or central controller connected by a secure control bus to networked microprocessors or cores
12/13/2012US20120317633 System and method to control display of a realm name
12/13/2012US20120317632 Method and Apparatus for a Token
12/13/2012US20120317630 Remote login arrangement for heterogeneous systems using centralized authentication
12/13/2012US20120317629 Reverse mapping method and apparatus for form filling
12/13/2012US20120317628 Systems and methods for authorizing a transaction
12/13/2012US20120317627 Tool, method and apparatus for assessing network security
12/13/2012US20120317626 Network resource access control methods and systems using transactional artifacts
12/13/2012US20120317624 Method for managing access to protected resources and delegating authority in a computer network
12/13/2012US20120317623 Systems and methods for managing database authentication and sessions
12/13/2012US20120317622 Hardware identity in multi-factor authentication at the application layer
12/13/2012US20120317621 Cloud system, license management method for cloud service
12/13/2012US20120317620 Website visitor identification algorithm
12/13/2012US20120317619 Automated seamless reconnection of client devices to a wireless network
12/13/2012US20120317618 Method and system for managing delayed user authentication
12/13/2012US20120317617 Cross domain notification
12/13/2012US20120317616 Node device and method to prevent overflow of pending interest table in name based network system
12/13/2012US20120317615 Use of user location information for remote actions
12/13/2012US20120317614 Independent role based authorization in boundary interface elements
12/13/2012US20120317613 Network apparatus based on content name and method for protecting content
12/13/2012US20120317612 Electronic apparatus and method of controlling the same
12/13/2012US20120317611 Dynamically defining rules for network access
12/13/2012US20120317610 Dynamically defining network access rules
12/13/2012US20120317609 Methods and devices for controlling access to a computing resource by applications executable on a computing device
12/13/2012US20120317565 Methods and devices for controlling access to computing resources
12/13/2012US20120317424 Switching between unsecure system software and secure system software
12/13/2012US20120317423 Memory randomization for protection against side channel attacks
12/13/2012US20120317422 Method, apparatus and system for acquiring service by portable device
12/13/2012US20120317421 Fingerprinting Executable Code
12/13/2012US20120317420 Electronic signature device and electronic signature method
12/13/2012US20120317419 System for controlling the distribution and use of rendered digital works through watermarking
12/13/2012US20120317414 Method and system for securing documents on a remote shared storage resource
12/13/2012US20120317344 Method of and apparatus for storing data
12/13/2012US20120317202 GPS Pathfinder Cell Phone And Method
12/13/2012US20120317033 Generating business process objects
12/13/2012US20120317022 Digital Watermarking Applications
12/13/2012US20120316958 Communication system, communication method, distribution apparatus, distribution method and terminal apparatus
12/13/2012DE112010005349T5 Sicherheitssysteme und Verfahren Security systems and processes
12/13/2012DE102011077218A1 Zugriff auf in einer Cloud gespeicherte Daten Access to stored data in the cloud
12/13/2012DE102010024622B4 Identifikationsschaltung und Verfahren zum Erzeugen eines Identifikationsbits Identification circuit and method for generating an identification bits
12/13/2012CA2838203A1 Squaring binary finite field elements
12/13/2012CA2836798A1 System and method for providing automated computer security compromise as a service
12/12/2012EP2533172A1 Secure access to data in a device
12/12/2012EP2533171A2 Biometric authentication technology
12/12/2012EP2533170A1 Methods and devices for controlling access to a computing resource by applications executable on a computing device
12/12/2012EP2533169A1 Method of determining an attribute of a server
12/12/2012EP2533168A1 Method and devices for managing permission requests to allow access to computing resource
12/12/2012EP2533157A2 Pre-caching resources based on a cache manifest
12/12/2012EP2533131A1 Management of the interaction between security and operating system power management unit
12/12/2012EP2532155A1 Method to manage members of at least one group of decoders having access to audio/video data
12/12/2012EP2532132A1 Improved identity management
12/12/2012EP2531950A1 Software feature authorization through delegated agents
12/12/2012EP2531949A1 Method for executing an application
12/12/2012CN202600715U Information safety computer
12/12/2012CN202600714U Embedded terminal based on SD (Secure Digital) trusted computing module
12/12/2012CN202600692U Medical data transmission device
12/12/2012CN1770299B Method and device for controlling distribution and use of digital works.
12/12/2012CN102823218A Method and apparatus for identity federation gateway
12/12/2012CN102822842A Method for updating advertisement content using drm
12/12/2012CN102822841A Thin-client system, access control method, and access control method in same
12/12/2012CN102822838A Connection destination limitation system, connection destination limitation method, terminal setting control system, terminal setting control method, and program
12/12/2012CN102822837A Methods and apparatus for device applet management on smart cards
12/12/2012CN102822836A Method for executing application program
12/12/2012CN102822835A Personal portable secured network access system
12/12/2012CN102821094A Method and system for secure data processing in virtual desktop
12/12/2012CN102821093A Content protection authorizing system and content protection authorizing method supporting cross-terminal application
12/12/2012CN102819723A Method and system for detecting malicious two-dimension codes
12/12/2012CN102819717A Method and device for carrying out protection processing on file
12/12/2012CN102819716A Method, device and system for encrypting and decrypting picture
12/12/2012CN102819715A API (application programming interface) monitoring method and device
12/12/2012CN102819714A Terminal and safe control method of application program
12/12/2012CN102819713A Method and system for detecting security of popup window
12/12/2012CN102819712A Method and device for ensuring security of virtual machine operation system
12/12/2012CN102819711A Restoring protection method for magnetic disk
12/12/2012CN102819710A Cross-site script vulnerability detection method based on percolation test
12/12/2012CN102819709A Method and device for realizing system safety
12/12/2012CN102819708A Method and device for obtaining type matrix and electronic equipment
12/12/2012CN102819707A Second generation USB (Universal Serial Bus) key system for implementing safety pavement of mobile terminals
12/12/2012CN102819706A Device and method for implementing credible embedded system on existing embedded equipment
12/12/2012CN102819705A System and method for realizing system file integrity verification in master boot sector
12/12/2012CN102819704A Document copyright protection method for intelligent terminal
12/12/2012CN102819703A Method and equipment used for preventing webpage attack
12/12/2012CN102819702A File encryption operation method and file encryption operation system
12/12/2012CN102819701A Method and device for prompting password security of form filling component
12/12/2012CN102819700A Device and method for identifying a plurality of biological characteristics in isolation environment
12/12/2012CN102819699A Processor system
12/12/2012CN102819698A Method and device for detecting malicious code in webpage
12/12/2012CN102819697A Method and system for detecting multi-platform malicious codes based on thread decompiling
12/12/2012CN102819696A Method and device for preventing account data from being illegally accessed