Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
12/13/2012 | US20120317645 Threat level assessment of applications |
12/13/2012 | US20120317644 Applying Antimalware Logic without Revealing the Antimalware Logic to Adversaries |
12/13/2012 | US20120317643 Apparatus and method preventing overflow of pending interest table in name based network system |
12/13/2012 | US20120317642 Parallel Tracing Apparatus For Malicious Websites |
12/13/2012 | US20120317641 Peer-to-peer (p2p) botnet tracking at backbone level |
12/13/2012 | US20120317640 Variable length, multidimensional authentication keys |
12/13/2012 | US20120317639 Biometric data system |
12/13/2012 | US20120317638 Method and devices for managing permission requests to allow access to a computing resource |
12/13/2012 | US20120317637 Communication between private network and public network |
12/13/2012 | US20120317636 Management system, management method and management program for managing industrial control system |
12/13/2012 | US20120317635 System and method for monitoring unauthorized transport of digital content |
12/13/2012 | US20120317634 Method of securely controlling a computer or microchip with a master or central controller connected by a secure control bus to networked microprocessors or cores |
12/13/2012 | US20120317633 System and method to control display of a realm name |
12/13/2012 | US20120317632 Method and Apparatus for a Token |
12/13/2012 | US20120317630 Remote login arrangement for heterogeneous systems using centralized authentication |
12/13/2012 | US20120317629 Reverse mapping method and apparatus for form filling |
12/13/2012 | US20120317628 Systems and methods for authorizing a transaction |
12/13/2012 | US20120317627 Tool, method and apparatus for assessing network security |
12/13/2012 | US20120317626 Network resource access control methods and systems using transactional artifacts |
12/13/2012 | US20120317624 Method for managing access to protected resources and delegating authority in a computer network |
12/13/2012 | US20120317623 Systems and methods for managing database authentication and sessions |
12/13/2012 | US20120317622 Hardware identity in multi-factor authentication at the application layer |
12/13/2012 | US20120317621 Cloud system, license management method for cloud service |
12/13/2012 | US20120317620 Website visitor identification algorithm |
12/13/2012 | US20120317619 Automated seamless reconnection of client devices to a wireless network |
12/13/2012 | US20120317618 Method and system for managing delayed user authentication |
12/13/2012 | US20120317617 Cross domain notification |
12/13/2012 | US20120317616 Node device and method to prevent overflow of pending interest table in name based network system |
12/13/2012 | US20120317615 Use of user location information for remote actions |
12/13/2012 | US20120317614 Independent role based authorization in boundary interface elements |
12/13/2012 | US20120317613 Network apparatus based on content name and method for protecting content |
12/13/2012 | US20120317612 Electronic apparatus and method of controlling the same |
12/13/2012 | US20120317611 Dynamically defining rules for network access |
12/13/2012 | US20120317610 Dynamically defining network access rules |
12/13/2012 | US20120317609 Methods and devices for controlling access to a computing resource by applications executable on a computing device |
12/13/2012 | US20120317565 Methods and devices for controlling access to computing resources |
12/13/2012 | US20120317424 Switching between unsecure system software and secure system software |
12/13/2012 | US20120317423 Memory randomization for protection against side channel attacks |
12/13/2012 | US20120317422 Method, apparatus and system for acquiring service by portable device |
12/13/2012 | US20120317421 Fingerprinting Executable Code |
12/13/2012 | US20120317420 Electronic signature device and electronic signature method |
12/13/2012 | US20120317419 System for controlling the distribution and use of rendered digital works through watermarking |
12/13/2012 | US20120317414 Method and system for securing documents on a remote shared storage resource |
12/13/2012 | US20120317344 Method of and apparatus for storing data |
12/13/2012 | US20120317202 GPS Pathfinder Cell Phone And Method |
12/13/2012 | US20120317033 Generating business process objects |
12/13/2012 | US20120317022 Digital Watermarking Applications |
12/13/2012 | US20120316958 Communication system, communication method, distribution apparatus, distribution method and terminal apparatus |
12/13/2012 | DE112010005349T5 Sicherheitssysteme und Verfahren Security systems and processes |
12/13/2012 | DE102011077218A1 Zugriff auf in einer Cloud gespeicherte Daten Access to stored data in the cloud |
12/13/2012 | DE102010024622B4 Identifikationsschaltung und Verfahren zum Erzeugen eines Identifikationsbits Identification circuit and method for generating an identification bits |
12/13/2012 | CA2838203A1 Squaring binary finite field elements |
12/13/2012 | CA2836798A1 System and method for providing automated computer security compromise as a service |
12/12/2012 | EP2533172A1 Secure access to data in a device |
12/12/2012 | EP2533171A2 Biometric authentication technology |
12/12/2012 | EP2533170A1 Methods and devices for controlling access to a computing resource by applications executable on a computing device |
12/12/2012 | EP2533169A1 Method of determining an attribute of a server |
12/12/2012 | EP2533168A1 Method and devices for managing permission requests to allow access to computing resource |
12/12/2012 | EP2533157A2 Pre-caching resources based on a cache manifest |
12/12/2012 | EP2533131A1 Management of the interaction between security and operating system power management unit |
12/12/2012 | EP2532155A1 Method to manage members of at least one group of decoders having access to audio/video data |
12/12/2012 | EP2532132A1 Improved identity management |
12/12/2012 | EP2531950A1 Software feature authorization through delegated agents |
12/12/2012 | EP2531949A1 Method for executing an application |
12/12/2012 | CN202600715U Information safety computer |
12/12/2012 | CN202600714U Embedded terminal based on SD (Secure Digital) trusted computing module |
12/12/2012 | CN202600692U Medical data transmission device |
12/12/2012 | CN1770299B Method and device for controlling distribution and use of digital works. |
12/12/2012 | CN102823218A Method and apparatus for identity federation gateway |
12/12/2012 | CN102822842A Method for updating advertisement content using drm |
12/12/2012 | CN102822841A Thin-client system, access control method, and access control method in same |
12/12/2012 | CN102822838A Connection destination limitation system, connection destination limitation method, terminal setting control system, terminal setting control method, and program |
12/12/2012 | CN102822837A Methods and apparatus for device applet management on smart cards |
12/12/2012 | CN102822836A Method for executing application program |
12/12/2012 | CN102822835A Personal portable secured network access system |
12/12/2012 | CN102821094A Method and system for secure data processing in virtual desktop |
12/12/2012 | CN102821093A Content protection authorizing system and content protection authorizing method supporting cross-terminal application |
12/12/2012 | CN102819723A Method and system for detecting malicious two-dimension codes |
12/12/2012 | CN102819717A Method and device for carrying out protection processing on file |
12/12/2012 | CN102819716A Method, device and system for encrypting and decrypting picture |
12/12/2012 | CN102819715A API (application programming interface) monitoring method and device |
12/12/2012 | CN102819714A Terminal and safe control method of application program |
12/12/2012 | CN102819713A Method and system for detecting security of popup window |
12/12/2012 | CN102819712A Method and device for ensuring security of virtual machine operation system |
12/12/2012 | CN102819711A Restoring protection method for magnetic disk |
12/12/2012 | CN102819710A Cross-site script vulnerability detection method based on percolation test |
12/12/2012 | CN102819709A Method and device for realizing system safety |
12/12/2012 | CN102819708A Method and device for obtaining type matrix and electronic equipment |
12/12/2012 | CN102819707A Second generation USB (Universal Serial Bus) key system for implementing safety pavement of mobile terminals |
12/12/2012 | CN102819706A Device and method for implementing credible embedded system on existing embedded equipment |
12/12/2012 | CN102819705A System and method for realizing system file integrity verification in master boot sector |
12/12/2012 | CN102819704A Document copyright protection method for intelligent terminal |
12/12/2012 | CN102819703A Method and equipment used for preventing webpage attack |
12/12/2012 | CN102819702A File encryption operation method and file encryption operation system |
12/12/2012 | CN102819701A Method and device for prompting password security of form filling component |
12/12/2012 | CN102819700A Device and method for identifying a plurality of biological characteristics in isolation environment |
12/12/2012 | CN102819699A Processor system |
12/12/2012 | CN102819698A Method and device for detecting malicious code in webpage |
12/12/2012 | CN102819697A Method and system for detecting multi-platform malicious codes based on thread decompiling |
12/12/2012 | CN102819696A Method and device for preventing account data from being illegally accessed |