Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
10/18/2012 | WO2012139923A1 Method for testing tamper protection of a field device and field device having tamper protection |
10/18/2012 | WO2012139903A2 A method and a system to generate and manage native applications |
10/18/2012 | WO2012139629A1 Method and apparatus for sharing user data |
10/18/2012 | WO2012139482A1 Network encyclopedia user management system and method of accessing applications thereof |
10/18/2012 | WO2012094332A3 Smart grid device authenticity verification |
10/18/2012 | WO2012057632A8 Secure computer system |
10/18/2012 | US20120266259 Approaches for firmware to trust an application |
10/18/2012 | US20120266258 Methods for providing cross-vendor support services |
10/18/2012 | US20120266257 System and method for blocking objectionable communications in a social network |
10/18/2012 | US20120266256 Determining whether object is genuine or fake in metaverse |
10/18/2012 | US20120266255 Dynamic De-Identification of Data |
10/18/2012 | US20120266254 De-Identification of Data |
10/18/2012 | US20120266253 Grouping cooperation system, grouping cooperation method, and grouping processing flow management program |
10/18/2012 | US20120266252 Hardware-based root of trust for cloud environments |
10/18/2012 | US20120266251 Systems and methods for disease management |
10/18/2012 | US20120266250 Selective Masking Of Identity-Indicating Information In Messages For An Online Community |
10/18/2012 | US20120266249 Automatic Selection of Routines for Protection |
10/18/2012 | US20120266248 Pinpointing security vulnerabilities in computer software applications |
10/18/2012 | US20120266247 Automatic Inference Of Whitelist-Based Validation As Part Of Static Analysis For Security |
10/18/2012 | US20120266246 Pinpointing security vulnerabilities in computer software applications |
10/18/2012 | US20120266245 Multi-Nodal Malware Analysis |
10/18/2012 | US20120266244 Detecting Script-Based Malware using Emulation and Heuristics |
10/18/2012 | US20120266243 Emulation for malware detection |
10/18/2012 | US20120266242 Apparatus and method for defending distributed denial of service attack from mobile terminal |
10/18/2012 | US20120266241 Communications system having security apparatus, security apparatus and method herefor |
10/18/2012 | US20120266240 Method and apparatus for filtering malicious call completion indicator and calling-side network device |
10/18/2012 | US20120266239 Authorized data access based on the rights of a user and a location |
10/18/2012 | US20120266238 Computer Including at Least One Connector for a Replaceable Storage Medium, and Method for Starting and Operating a Computer Via a Replaceable Storage Medium |
10/18/2012 | US20120266236 Password input method using visual object |
10/18/2012 | US20120266235 Method for reconfiguring a peripheral device using a magnetic swipe card |
10/18/2012 | US20120266234 Network Traffic Routing |
10/18/2012 | US20120266233 Signal Transfer Point Front End Processor |
10/18/2012 | US20120266232 Method and system for protecting a computer system during boot operation |
10/18/2012 | US20120266231 Secure Network Cloud Architecture |
10/18/2012 | US20120266229 Inter-application management of user credential data |
10/18/2012 | US20120266228 Secure management of user rights during accessing of external systems |
10/18/2012 | US20120266227 Verification and authentication systems and methods |
10/18/2012 | US20120266226 Secure authentication systems and methods |
10/18/2012 | US20120266225 Network system of projector |
10/18/2012 | US20120266224 Method and system for user authentication |
10/18/2012 | US20120266223 Method and apparatus for providing machine-to-machine service |
10/18/2012 | US20120266222 Provisioning using a generic configuration |
10/18/2012 | US20120266221 Method for secure communication between devices |
10/18/2012 | US20120266220 System and Method for Controlling Access to a Third-Party Application with Passwords Stored in a Secure Element |
10/18/2012 | US20120266219 Method and system for dynamic identity validation |
10/18/2012 | US20120266218 Differential Encryption Utilizing Trust Modes |
10/18/2012 | US20120266216 Registration of Applications and Complimentary Features for Interactive User Interfaces |
10/18/2012 | US20120266215 Captcha Image Scramble |
10/18/2012 | US20120266214 Creating secure interactive connections with remote resources |
10/18/2012 | US20120266213 Trusted hardware for attesting to authenticity in a cloud environment |
10/18/2012 | US20120266212 Apparatus and method for authenticating smart card |
10/18/2012 | US20120266211 Transparent database connection reconnect |
10/18/2012 | US20120266210 Method and apparatus for creating an information security policy based on a pre-configured template |
10/18/2012 | US20120266209 Method of Secure Electric Power Grid Operations Using Common Cyber Security Services |
10/18/2012 | US20120266208 Methods and apparatus for malware threat research |
10/18/2012 | US20120266000 Trusted storage systems and methods |
10/18/2012 | US20120265999 Processing data stored in external storage device |
10/18/2012 | US20120265998 Methods And Apparatus For Authenticating Components Of Processing Systems |
10/18/2012 | US20120265997 Privacy-preserving flexible anonymous-pseudonymous access |
10/18/2012 | US20120265996 Permitting Access To A Network |
10/18/2012 | US20120265990 Authentication system, method and device |
10/18/2012 | US20120265985 Application executing device, managing method, and program |
10/18/2012 | US20120265980 Apparatus and method for securing user input data |
10/18/2012 | US20120265976 Secure Network Cloud Architecture |
10/18/2012 | US20120265975 Microcontroller with Embedded Secure Feature |
10/18/2012 | US20120265952 Data communicating apparatus and method for managing memory of data communicating apparatus |
10/18/2012 | US20120265671 Systems and Methods for Validating an Order Purchased With an Unspecified Term |
10/18/2012 | US20120264402 Method of and system for utilizing a first network authentication result for a second network |
10/18/2012 | DE112010003539T5 System und verfahren zuim verifizieren des alters eines internetbenutzers System and method zuim verify the age of an Internet user |
10/18/2012 | DE102011007572A1 Verfahren zur Überwachung eines Tamperschutzes sowie Überwachungssystem für ein Feldgerät mit Tamperschutz Method for monitoring a Tamperschutzes and monitoring system for a field device with Tamperschutz |
10/18/2012 | DE102011007571A1 Tamperschutzvorrichtung zum Tamperschutz eines Feldgeräts Tamperschutzvorrichtung to Tamperschutz a field device |
10/18/2012 | CA2774622A1 Interactive audio/video system and device for use in a secure facility |
10/18/2012 | CA2771485A1 Authorized data access based on the rights of a user and a location |
10/17/2012 | EP2512090A1 Method for authenticating a subscriber |
10/17/2012 | EP2511848A2 Multiple independent encryption domains |
10/17/2012 | EP2511847A1 Automatic selection of routines for protection |
10/17/2012 | EP2511846A1 Method, apparatus and system for obtaining user information |
10/17/2012 | EP2511845A1 Biometric authentication system and biometric authentication method |
10/17/2012 | EP2511844A2 Advanced drug development and manufacturing |
10/17/2012 | EP2511830A1 Information processing device |
10/17/2012 | EP2511823A2 Methods and systems to distribute content via a network utilizing distributed conditional access agents and secure agents, and to perform digital rights management (DRM) |
10/17/2012 | EP2511787A1 Data decompression and search using FPGA devices |
10/17/2012 | EP2510713A1 Preservation of user data privacy in a network |
10/17/2012 | EP2510665A1 Proactive commands over secure channel between a mobile equipment and a uicc |
10/17/2012 | EP2510475A1 Hardware device |
10/17/2012 | EP2510474A2 Steganographic messaging system using code invariants |
10/17/2012 | EP2510473A1 Unified user login for co-location facilities |
10/17/2012 | EP2510430A1 Storage device and method for using a virtual file in a public memory area to access a plurality of protected files in a private memory area |
10/17/2012 | CN202496132U Multilayer protective frame and protective device for preventing sensitive data from being stolen |
10/17/2012 | CN202495044U USB interface isolation control system for multi-security-domain computer |
10/17/2012 | CN202495043U System based on audio interface for providing identify authentication |
10/17/2012 | CN202495042U Remote control system for face recognition computer |
10/17/2012 | CN202495041U A trusted computing chip |
10/17/2012 | CN202495040U Verification system |
10/17/2012 | CN202494965U All-in-one computer capable of preventing information leakage |
10/17/2012 | CN1776701B Techniques for defining, using and manipulating rights management data structures |
10/17/2012 | CN102742243A Checking a configuration modification for an ied |
10/17/2012 | CN102742211A Improvements relating to multifunction authentication systems |
10/17/2012 | CN102741853A System and method for preventing data loss using virtual machine wrapped applications |
10/17/2012 | CN102741851A System and method for improving security of user account access |