Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
12/23/2014 | US8918877 Signature compilation on a security device |
12/23/2014 | US8918876 Deviating behaviour of a user terminal |
12/23/2014 | US8918874 Malware scanning |
12/23/2014 | US8918870 Identification of content by metadata |
12/23/2014 | US8918869 Methods and systems for implementing a self defending/repairing database |
12/23/2014 | US8918865 System and method for protecting data accessed through a network connection |
12/23/2014 | US8918862 Managing access to storage media |
12/23/2014 | US8918861 Marking one or more items in response to determining device transfer |
12/23/2014 | US8918857 Distributed multi-processing security gateway |
12/23/2014 | US8918856 Trusted intermediary for network layer claims-enabled access control |
12/23/2014 | US8918855 Transaction provisioning for mobile wireless communications devices and related methods |
12/23/2014 | US8918853 Method and system for automatic recovery from lost security token on embedded device |
12/23/2014 | US8918852 Method of authentication user using server and image forming apparatus using the method |
12/23/2014 | US8918851 Juxtapositional image based authentication system and apparatus |
12/23/2014 | US8918850 Share cookie on native platform in mobile device without having to ask for the user's login information |
12/23/2014 | US8918849 Secure user credential control |
12/23/2014 | US8918846 Method and system for secure mobile messaging |
12/23/2014 | US8918842 Utility grid command filter system |
12/23/2014 | US8918841 Hardware interface access control for mobile applications |
12/23/2014 | US8918840 Systems and methods for identity-based communication gate for social networks |
12/23/2014 | US8918836 Predicting next characters in password generation |
12/23/2014 | US8918728 Rule-based content filtering in a virtual universe |
12/23/2014 | US8918679 Apparatus and method for checking an error detection functionality of a data processor |
12/23/2014 | US8918655 Data whitening for writing and reading data to and from a non-volatile memory |
12/23/2014 | US8918654 Information processing device, program verification method, and recording medium |
12/23/2014 | US8918653 Protection of interpreted source code in virtual appliances |
12/23/2014 | US8918651 Cryptographic erasure of selected encrypted data |
12/23/2014 | US8918650 Secure data processing for unaligned data |
12/23/2014 | US8918649 Device for transferring data between an unconscious capture device and another device |
12/23/2014 | US8918647 Authentication system |
12/23/2014 | US8918646 Data processing apparatus |
12/23/2014 | US8918642 Protection of secret value using hardware instability |
12/23/2014 | US8918641 Dynamic platform reconfiguration by multi-tenant service providers |
12/23/2014 | US8918639 Smarter leveraging of the power grid to substantially improve security of distributed systems via a control plane data communication network over the smart power grid |
12/23/2014 | US8918637 Remote authentication system |
12/23/2014 | US8918633 Information processing device, information processing system, and program |
12/23/2014 | US8918632 Methods for analyzing application privacy and devices thereof |
12/23/2014 | US8918611 Semiconductor device and data processing method |
12/23/2014 | US8918610 Protection of chips against attacks |
12/23/2014 | US8918604 Information processing apparatus, information processing method, program, and recording medium |
12/23/2014 | US8918575 Method and system for securely programming OTP memory |
12/23/2014 | US8918574 Apparatus, system, and method for deliberately preventing unauthorized access to data stored in a non-volatile memory device |
12/23/2014 | US8918561 Hardware resource arbiter for logical partitions |
12/23/2014 | US8918508 Method for transferring resource and method for providing information |
12/23/2014 | US8918480 Method, system, and device for the distribution of internet radio content |
12/23/2014 | US8918479 User-browser interaction analysis authentication system |
12/23/2014 | US8918462 Using user-attribute ontologies to calculate user-anonymity degrees |
12/23/2014 | US8918426 Role engineering scoping and management |
12/23/2014 | US8918425 Role engineering scoping and management |
12/23/2014 | US8918398 Maintaining a historical record of anonymized user profile data by location for users in a mobile environment |
12/23/2014 | US8918359 System and method for data mining and security policy management |
12/23/2014 | US8918307 Automated system latency detection for fabric simulation |
12/23/2014 | US8918306 System and method for providing dynamic insurance portal transaction authentication and authorization |
12/23/2014 | US8918244 System and method of synchronizing an in-vehicle control system with a remote source |
12/23/2014 | US8918232 Short range wireless communication between a vehicle and a handheld communications device |
12/23/2014 | US8918195 Media management and tracking |
12/23/2014 | US8918094 Systems and method for media transfer |
12/23/2014 | US8918089 Method and device for verifying physical recognition between a caller and a called party |
12/23/2014 | US8918078 Security for mobile communications device |
12/23/2014 | US8917899 Methods and systems for watermarking digital media |
12/23/2014 | US8917837 Consumer contact portal |
12/23/2014 | US8917631 System and method for sharing information between two or more devices |
12/23/2014 | US8917409 Image forming apparatus and image forming system |
12/23/2014 | US8917259 Muti-touch interfaces for user authentication, partitioning, and external device control |
12/23/2014 | US8917159 Fully secure item-level tagging |
12/23/2014 | US8917158 Mobile terminal and method of controlling the same |
12/23/2014 | US8915971 Security device for electronics |
12/23/2014 | US8915450 Dual deterent incremental information object |
12/18/2014 | US20140373185 Anti-theft Method and Computer System thereof |
12/18/2014 | US20140373184 Mobile device persistent security mechanism |
12/18/2014 | US20140373183 Computer and control method thereof |
12/18/2014 | US20140373182 Systems and methods of automated compliance with data privacy laws |
12/18/2014 | US20140373181 Method for protecting computer programs and data from hostile code |
12/18/2014 | US20140373180 System and method for virtual image security in a cloud environment |
12/18/2014 | US20140373179 Method for Scalable Access Control Decisions |
12/18/2014 | US20140373178 Method, Apparatus and Server for User Verification |
12/18/2014 | US20140373177 Providing access control for public and private document fields |
12/18/2014 | US20140373176 Providing access control for public and private document fields |
12/18/2014 | US20140373175 On-demand custom entitlement cards for products and services |
12/18/2014 | US20140373174 Instant personalization security |
12/18/2014 | US20140373173 Method for requiring user actions for the access or delivery of items of value |
12/18/2014 | US20140373172 System and method for a parallel world of security for non secure environments |
12/18/2014 | US20140373171 Security protection of software libraries in a data processing apparatus |
12/18/2014 | US20140373170 System and method for initially establishing and periodically confirming trust in a software application |
12/18/2014 | US20140373169 Processing copyright notice of media file |
12/18/2014 | US20140373168 Method of protecting privacy data of an application program and apparatus using the same |
12/18/2014 | US20140373167 Trace center apparatus and method for enabling contents to be traced |
12/18/2014 | US20140373166 Data security device |
12/18/2014 | US20140373165 Privacy-Protective Data Transfer |
12/18/2014 | US20140373164 Associating first and second watermarks with audio or video content |
12/18/2014 | US20140373163 Filtering Confidential Information In Voice and Image Data |
12/18/2014 | US20140373162 Security status and information display system |
12/18/2014 | US20140373160 Vulnerability countermeasure device and vulnerability countermeasure method |
12/18/2014 | US20140373159 After-The-Fact Configuration Of Static Analysis Tools Able To Reduce User Burden |
12/18/2014 | US20140373158 Detecting security vulnerabilities on computing devices |
12/18/2014 | US20140373157 After-the-Fact Configuration of Static Analysis Tools Able to Reduce User Burden |
12/18/2014 | US20140373156 Notification for reassembly-free file scanning |
12/18/2014 | US20140373155 System and method for controlling applications to mitigate the effects of malicious software |
12/18/2014 | US20140373154 Defensive Techniques to Increase Computer Security |
12/18/2014 | US20140373153 Anti-Malware Tool for Mobile Apparatus |