Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
11/27/2012 | US8321687 High speed cryptographic system with modular architecture |
11/27/2012 | US8321685 Method and apparatus for managing confidential information |
11/27/2012 | US8321682 System and method for generating and managing administrator passwords |
11/27/2012 | US8321668 Control of data access by dynamically verifying legal references |
11/27/2012 | US8321666 Implementations of secure computation protocols |
11/27/2012 | US8321665 Apparatus and method for using contents information in digital rights management |
11/27/2012 | US8321664 Method and apparatus for efficient certificate revocation |
11/27/2012 | US8321660 Method and devices for reproducing encrypted content and approving reproduction |
11/27/2012 | US8321574 Apparatus, system and method for secure information dissemination |
11/27/2012 | US8321436 Method to raise accuracy of targeting the segmentation for sample distribution |
11/27/2012 | US8321369 Anti-intrusion method and system for a communication network |
11/27/2012 | US8321352 Fingerprinting for software license inventory management |
11/27/2012 | US8321351 Device management in a wireless network |
11/27/2012 | US8321287 Receipt printer, receipt printer control method, and program |
11/27/2012 | US8320742 Method and apparatus for playing data between external device and TV set |
11/27/2012 | US8320640 Biometrics authentication method and client terminal and authentication server used for biometrics authentication |
11/27/2012 | US8320556 Method to allow cryptographic processing of messages without sanitizing the cryptographic processor between messages |
11/27/2012 | US8319984 Image forming system, apparatus, and method executing a process designated by a service request after token validation |
11/27/2012 | US8319606 Universal validation module for access control systems |
11/27/2012 | US8317878 Enabling a service to return lost laptops |
11/27/2012 | CA2536210C Portable access device |
11/27/2012 | CA2481062C Secured virtual network in a gaming environment |
11/27/2012 | CA2450201C Method and apparatus for securing gaming machine operating data |
11/22/2012 | WO2012158654A2 Cloud file system with server-side deduplication of user-agnostic encrypted files |
11/22/2012 | WO2012158314A1 Retrieving contact information based on image recognition searches |
11/22/2012 | WO2012158175A1 System and method for managing a fraud exchange |
11/22/2012 | WO2012157767A1 Receiver and reception method |
11/22/2012 | WO2012157755A1 Cooperative broadcast communication receiver device, resource access control program and cooperative broadcast communication system |
11/22/2012 | WO2012157718A1 Receiver and reception method |
11/22/2012 | WO2012157698A1 Reception device, program and reception method |
11/22/2012 | WO2012157203A1 Communication control system, server device, and communication control method |
11/22/2012 | WO2012157196A1 Communication control system and method therefor, communication device and method therefor, and program |
11/22/2012 | WO2012156782A1 Safety system and portable filter module with several connection means for reading, virus identification and removal from data transport devices and computers in general |
11/22/2012 | WO2012156720A1 Network access control system and method |
11/22/2012 | WO2012156648A1 Biometrically protected access to electronic devices |
11/22/2012 | WO2012156143A1 Look ahead malware scanning |
11/22/2012 | WO2012155994A1 Anonymous signalling |
11/22/2012 | WO2012155982A1 Method for protecting a plurality of modules of an automation system |
11/22/2012 | WO2012155804A1 Data card and multi-user access method of external storage card thereof |
11/22/2012 | WO2012155456A1 License control method and system thereof |
11/22/2012 | WO2012134578A3 Application usage continuum across platforms |
11/22/2012 | WO2012123970A3 A method of optimizing asset risk controls |
11/22/2012 | WO2012121966A3 Methods and systems for full pattern matching in hardware |
11/22/2012 | WO2012112921A3 Non-repudiation process for credit approval and identity theft prevention |
11/22/2012 | WO2012103239A3 Determining fraudulent use of electronic devices utilizing matrix codes |
11/22/2012 | WO2012079069A3 Electronic health record web-based platform |
11/22/2012 | WO2012071037A3 Scripting web services |
11/22/2012 | US20120297492 System and method of integrating modules for execution on a computing device and controlling during runtime an ability of a first module to access a service provided by a second module |
11/22/2012 | US20120297491 Network security smart load balancing |
11/22/2012 | US20120297490 Media content device, system and method |
11/22/2012 | US20120297489 Computer network intrusion detection |
11/22/2012 | US20120297487 Distributing update information based on validated license information |
11/22/2012 | US20120297485 Information processing device and information processing method |
11/22/2012 | US20120297484 Detecting a compromised online user account |
11/22/2012 | US20120297483 Systems, methods, and apparatus for network intrusion detection based on monitoring network traffic |
11/22/2012 | US20120297481 Systems, methods, and apparatus for network intrusion detection |
11/22/2012 | US20120297480 Application revocation |
11/22/2012 | US20120297479 Method for executing an application |
11/22/2012 | US20120297478 Method and system for preventing dns cache poisoning |
11/22/2012 | US20120297477 Detection of account hijacking in a social network |
11/22/2012 | US20120297476 Verifying Transactions Using Out-of-Band Devices |
11/22/2012 | US20120297475 Methods, network services, and computer program products for recommending security policies to firewalls |
11/22/2012 | US20120297474 Relay node authentication method, apparatus, and system |
11/22/2012 | US20120297473 Certificate validation and channel binding |
11/22/2012 | US20120297472 Information processing system, control method for controlling the information processing system, and storage medium |
11/22/2012 | US20120297471 Approach for securely processing an electronic document |
11/22/2012 | US20120297470 Access authentication method for multiple devices and platforms |
11/22/2012 | US20120297469 Security Indicator Using Timing to Establish Authenticity |
11/22/2012 | US20120297467 Authentication platform and related method of operation |
11/22/2012 | US20120297466 Method, device, and system to share information between mobile computing devices |
11/22/2012 | US20120297465 User identification method applicable to network transaction and system thereof |
11/22/2012 | US20120297464 Authenticated transmission of data |
11/22/2012 | US20120297463 System for distribution permissions for network communications |
11/22/2012 | US20120297462 System, Method and Apparatus for Electronically Protecting Data and Digital Content |
11/22/2012 | US20120297461 System and method for reducing cyber crime in industrial control systems |
11/22/2012 | US20120297460 Method And System For Restricting Access To User Resources |
11/22/2012 | US20120297459 Zone migration in network access |
11/22/2012 | US20120297458 Remote video source authentication protocol |
11/22/2012 | US20120297457 Interactive Malware Detector |
11/22/2012 | US20120297456 Granular assessment of device state |
11/22/2012 | US20120297454 Systems and Methods for Security Verification in Electronic Learning Systems and Other Systems |
11/22/2012 | US20120297453 System and method for abstraction of objects for cross virtual universe deployment |
11/22/2012 | US20120297452 Providing protection against unauthorized network access |
11/22/2012 | US20120297451 Communications system |
11/22/2012 | US20120297450 Resource Upload |
11/22/2012 | US20120297449 Authentication method |
11/22/2012 | US20120297448 Authentication method for network connection and network device and network authentication system using the same method |
11/22/2012 | US20120297447 Authentication techniques |
11/22/2012 | US20120297446 Authentication System and Method |
11/22/2012 | US20120297445 Method of Managing Asset Associated with Work Order or Element Associated with Asset, and System and Computer Program for the Same |
11/22/2012 | US20120297444 System and method for ensuring compliance with organizational policies |
11/22/2012 | US20120297443 System and method for application program operation on a wireless device |
11/22/2012 | US20120297441 Method and apparatus for providing end-to-end privacy for distributed computations |
11/22/2012 | US20120297206 Securing Encrypted Virtual Hard Disks |
11/22/2012 | US20120297205 Secure User/Host Authentication |
11/22/2012 | US20120297204 Security Architecture For Using Host Memory in the Design of A Secure Element |
11/22/2012 | US20120297203 Computing device and method for controlling access to driver programs |
11/22/2012 | US20120297202 Secure Environment Management during Switches between Different Modes of Multicore Systems |
11/22/2012 | US20120297196 Maintaining privacy for transactions performable by a user device having a security module |
11/22/2012 | US20120297194 Device Authentication |