Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
06/2012
06/21/2012US20120159569 Method of managing web application policy using smart card, and web server and mobile terminal for implementing the same
06/21/2012US20120159568 Method and Apparatus for Limiting Digital Content Consumption Inside Defined Real-world Geographic Area(s)
06/21/2012US20120159566 Access control framework
06/21/2012US20120159565 Techniques for Performing Data Loss Prevention
06/21/2012US20120159564 Applying activity actions to frequent activities
06/21/2012US20120159197 Secure data parser method and system
06/21/2012US20120159191 Method and apparatus for transitioning between states of security policies used to secure electronic documents
06/21/2012US20120159190 Encryption device, decryption device, encrypting method, and decrypting method
06/21/2012US20120159189 Modular exponentiation resistant against skipping attacks
06/21/2012US20120159188 Systems and Methods for Identity-Based Encryption and Related Cryptographic Techniques
06/21/2012US20120159184 Technique for Supporting Multiple Secure Enclaves
06/21/2012US20120159183 Method and apparatus for securing a computing device
06/21/2012US20120159182 Drm plugins
06/21/2012US20120159181 Virus Localization Using Cryptographic Hashing
06/21/2012US20120159180 Server-side Encrypted Pattern Matching
06/21/2012US20120159177 System and Method for Website Authentication Using a Shared Secret
06/21/2012US20120159172 Secure and private location
06/21/2012US20120159171 Method and system for activating a portable data carrier
06/21/2012US20120159160 High security display of private data
06/21/2012US20120159151 Evolved Packet System Non Access Stratum Deciphering Using Real-Time LTE Monitoring
06/21/2012US20120159146 System and Method for Transcoding Content
06/21/2012US20120158626 Detection and categorization of malicious urls
06/21/2012US20120157166 Mobile terminal and method of managing information therein
06/21/2012US20120157165 Mobile terminal and method of controlling a mode switching therein
06/21/2012US20120157049 Creating a restricted zone within an operating system
06/21/2012US20120157044 Mobile terminal and method of controlling a mode screen display therein
06/21/2012US20120156994 Communication processing apparatus, computer program product and data processing method
06/21/2012US20120155233 Method for copy protection
06/21/2012US20120154265 Mobile terminal and method of controlling a mode screen display therein
06/21/2012DE102010055237A1 Verfahren zum geschützten Ausführen einer kryptographischen Berechnung A method for carrying out a cryptographic calculation protected
06/21/2012CA2847942A1 Writing application data to a secure element
06/20/2012EP2466848A1 Pairing of angle sensor and electronic control unit
06/20/2012EP2466782A1 Method for protected execution of a cryptographic calculation
06/20/2012EP2466583A1 Information processing apparatus, information processing method, and program
06/20/2012EP2466524A1 Terminal device, communication system, data management method, server device, and recording medium
06/20/2012EP2466523A1 Method and apparatus for securing a computing device
06/20/2012EP2466522A1 Method for providing a user with an authentificated remote access to a remote secure device
06/20/2012EP2466521A1 Obscuring visual login
06/20/2012EP2466520A1 Multi-layer multi-point or pathway-based passwords
06/20/2012EP2466519A1 Password entry using moving images
06/20/2012EP2466518A1 Password entry using 3D image with spatial alignment
06/20/2012EP2466517A1 Simple algebraic and multi-layered passwords
06/20/2012EP2466516A1 Adjusting the position of an endpoint reference for increasing security during device log-on
06/20/2012EP2466515A1 Multi-layer orientation-changing password
06/20/2012EP2466514A1 Multi-layer multi-point or randomized passwords
06/20/2012EP2466513A1 Visual or touchscreen password entry
06/20/2012EP2466512A1 Pressure sensitive multi-layer passwords
06/20/2012EP2466511A1 Media storage structures for storing content and devices for using such structures
06/20/2012EP2466510A1 Collaborative rules based security
06/20/2012EP2466509A2 Random function for smartcards
06/20/2012EP2466508A1 Deduplicated and encrypted backups
06/20/2012EP2466507A1 Method for updating an encoded file
06/20/2012EP2466506A1 Dynamic method for verifying the integrity of the execution of executable code
06/20/2012EP2466505A1 Method for authenticating a terminal
06/20/2012EP2466470A1 Hardware security module and processing method in such a module
06/20/2012EP2465102A1 Mechanisms for detecting tampering of an electronic device
06/20/2012EP2465075A1 An intelligent peripheral device and system for the authentication and verification of individuals and/ or documents through a secure multifunctional authentication service with data storage capability
06/20/2012EP2465072A1 Content rights management
06/20/2012EP2465071A1 Using confidence metrics of client devices in a reputation system
06/20/2012EP2465070A1 Systems, methods, and program applications for selectively restricting the placeshifting of copy protected digital media content
06/20/2012EP2465069A2 Physically unclonable function with tamper prevention and anti-aging system
06/20/2012EP2465068A1 Malware detection
06/20/2012EP2465067A1 Method and device for executing applications in a secure, autonomous environment
06/20/2012EP2465045A2 Shared server-side macros
06/20/2012EP1177654B1 Method and system for authenticating users
06/20/2012CN1550995B Issuing a digital rights management (DRM) license for content based on cross-forest directory information
06/20/2012CN102510370A File system authentication
06/20/2012CN102509058A Point type GIS vector data disguise and recovery method based on redundant bit replacement
06/20/2012CN102509057A Mark-based method for safely filtering unstructured data
06/20/2012CN102509056A GIS (geographic information system) vector data camouflage and reduction method based on geometric accuracy weakening of elements
06/20/2012CN102509055A Mobile terminal and method for hiding programs of mobile terminal
06/20/2012CN102509054A Mobile terminal and application program control method for mobile terminal
06/20/2012CN102509053A Authentication and authorization method, processor, equipment and mobile terminal
06/20/2012CN102509052A Safety protection method and device of electronic device touch screen
06/20/2012CN102509051A Method and system preventing software from copying
06/20/2012CN102509050A Digital copyright control technology based on TF (T-Flash) intelligent card and cloud computing platform
06/20/2012CN102509049A Program validity verification method and system
06/20/2012CN102509048A Method for preventing illegal transferring of interruption procedures of operating system
06/20/2012CN102509047A Method and system for verifying program code in set-top box
06/20/2012CN102509046A Globally valid measured operating system launch with hibernation support
06/20/2012CN102509045A Printing permission control method based on local area network
06/20/2012CN102509044A Mouse behavior characteristic-based password authentication method
06/20/2012CN102509043A Digital-copyright-based download method and device thereof
06/20/2012CN102509042A Method and system for comparing digital fingerprint databases of written works
06/20/2012CN102509041A Content filing system and method used for registering digital content work copyright
06/20/2012CN102509040A Method for processing audit information in safe operation system
06/20/2012CN102509039A Realtime multiple engine selection and combining
06/20/2012CN102509038A Single-signature multi-channel software releasing method, device and system of Symbian platform
06/20/2012CN102509037A Trading system, method and device
06/20/2012CN102509036A Reconfigurable cipher processor and anti-power consumption attach method
06/20/2012CN102509035A Data protection method based on sliding type true skin living fingerprint identification technology
06/20/2012CN102509034A Software license control device and method
06/20/2012CN102509033A Processing method of communication terminal after being stolen and communication terminal
06/20/2012CN102509032A Implementation method of print security monitoring system based on Windows underlying driver
06/20/2012CN102509031A Fingerprinting of data
06/20/2012CN102509030A Anonymous preservation of a relationship and its application in account system management
06/20/2012CN102508931A Database protection method
06/20/2012CN102508914A Dating website sincerity testing task interaction system and method
06/20/2012CN102508792A Method for realizing secure access of data in hard disk
06/20/2012CN102508791A Method and device for encrypting hard disk partition