Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
06/2012
06/20/2012CN102508611A Information verification method and information verification system based on touch screen
06/20/2012CN102508534A Startup control method of credible main board
06/20/2012CN101782955B File protecting system
06/20/2012CN101751658B Image visual separate-management method with minimum pixel expansion and optimal contrast
06/20/2012CN101689238B File management system, device
06/20/2012CN101669128B Cascading authentication system
06/20/2012CN101639879B Database security monitoring method, device and system
06/20/2012CN101589400B Right management method, its system, server device used in the system, and information device terminal
06/20/2012CN101373502B Automatic analysis system of virus behavior based on Win32 platform
06/20/2012CN101346930B Secure system-on-chip
06/20/2012CN101086759B Unauthorized contents detection system
06/20/2012CN101076988B Method and apparatus for providing authorized remote access to application session
06/19/2012US8205266 Digital rights management
06/19/2012US8205263 Systems and methods for identifying an executable file obfuscated by an unknown obfuscator program
06/19/2012US8205259 Adaptive behavioral intrusion detection systems and methods
06/19/2012US8205251 Policy-based content filtering
06/19/2012US8205249 Method for carrying out a secure electronic transaction using a portable data support
06/19/2012US8205243 Control of enhanced application features via a conditional access system
06/19/2012US8205240 Activation, initialization, authentication, and authorization for a multi-services gateway device at user premises
06/19/2012US8205097 Microprocessor in a security-sensitive system
06/19/2012US8205096 Software license embedded in shell code
06/19/2012US8205094 Tamper evident removable media storing executable code
06/19/2012US8205093 Restricting access to information
06/19/2012US8205092 Time-based method for authorizing access to resources
06/19/2012US8205091 System and method for securing wireless data
06/19/2012US8205090 Secure recovery in a serverless distributed file system
06/19/2012US8205089 System for controlling the distribution and use of rendered digital works through watermarking
06/19/2012US8205088 Method for the authenticated transmission of a personalized data set or program to a hardware security module in particular of a franking machine
06/19/2012US8205086 Watermark information embedding device and method, watermark information detecting device and method, watermarked document
06/19/2012US8205078 Handling files containing confidential or sensitive information
06/19/2012US8205077 Management apparatus
06/19/2012US8205075 Authentication device and method
06/19/2012US8205071 Method for moving rights objects into other device in digital rights management
06/19/2012US8205043 Single nodename cluster system for fibre channel
06/19/2012US8204999 Query string processing
06/19/2012US8204945 Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail
06/19/2012US8204929 Hiding sensitive information
06/19/2012US8204832 Medical image diagnostic apparatus and remote maintenance system
06/19/2012US8204831 Post-anonymous fuzzy comparisons without the use of pre-anonymization variants
06/19/2012US8204227 Information processing apparatus, control method thereof, and computer program
06/19/2012US8204224 Wireless network security using randomness
06/19/2012US8204219 Cryptographic method and apparatus for enhancing computation performance of a central processing unit
06/19/2012US8204180 Systems and methods for preventing sensitive information from being communicated into a non-secure environment
06/19/2012US8203423 Portable access device
06/19/2012CA2591336C System and method for secure conditional access download and reconfiguration
06/19/2012CA2242596C System for controlling access and distribution of digital property
06/16/2012CA2762129A1 Visual or touchscreen password entry
06/16/2012CA2761341A1 Obscuring visual login
06/16/2012CA2761219A1 Method and apparatus for securing a computing device
06/16/2012CA2760998A1 Multi-layer multi-point or randomized passwords
06/16/2012CA2760828A1 Simple algebraic and multi-layer passwords
06/16/2012CA2760826A1 Multi-layered color-sensitive passwords
06/16/2012CA2760824A1 Multi-layer multi-point or pathway-based passwords
06/16/2012CA2760820A1 Multi-layer orientation-changing password
06/16/2012CA2760433A1 Pressure sensitive multi-layer passwords
06/16/2012CA2760337A1 Password entry using 3d image with spatial alignment
06/16/2012CA2760222A1 Adjusting the position of an endpoint reference for increasing security during device log-on
06/16/2012CA2759725A1 Password entry using moving images
06/14/2012WO2012079069A2 Electronic health record web-based platform
06/14/2012WO2012078914A1 Method and device for providing improved perpetrator imaging
06/14/2012WO2012078690A1 Antimalware protection of virtual machines
06/14/2012WO2012078570A2 Smart card with domain-trust evaluation and domain policy management functions
06/14/2012WO2012078427A2 Software system for denying remote access to computer cameras
06/14/2012WO2012078407A1 Purchase transaction system with encrypted payment card data
06/14/2012WO2012078338A1 Switch to perform non-destructive and secure disablement of ic functionality utilizing mems and method thereof
06/14/2012WO2012078328A2 Pattern matching
06/14/2012WO2012078212A1 System and method for identity verification on a computer
06/14/2012WO2012078118A1 Device for controlled safe access to applications and data by two-factor authentication
06/14/2012WO2012078113A2 System and method for verifying authenticity of documents
06/14/2012WO2012078081A1 Pairing of devices by sensing of events
06/14/2012WO2012077966A1 Apparatus and method for removing malicious code
06/14/2012WO2012077856A1 Device and method for generating an identification key
06/14/2012WO2012077300A1 Information processing device and information processing method
06/14/2012WO2012077098A1 A method for authentication and verification of user identity
06/14/2012WO2012076939A1 Method, apparatus, and computer program product for implementing graphical authentication
06/14/2012WO2012076571A1 Dynamic pairing device
06/14/2012WO2012076482A1 Method for managing content on a secure element connected to an equipment
06/14/2012WO2012076480A1 Method for exporting on a secure server data comprised on a uicc comprised in a terminal
06/14/2012WO2012076464A1 Method for transferring subscription information between terminals
06/14/2012WO2012076425A1 Method for remotely delivering a full subscription profile to a uicc over ip
06/14/2012WO2012076424A1 Method for downloading a subscription in an uicc embedded in a terminal
06/14/2012WO2012076421A1 Method for personalizing a secure element comprised in a terminal
06/14/2012WO2012076419A1 Method for transmitting a sim application of a first terminal to a second terminal
06/14/2012WO2012076266A1 Computer-readable storage mediums for encrypting and decrypting a virtual disc
06/14/2012WO2012076172A1 Method for encrypting an electronic text message
06/14/2012WO2012075904A1 Method, device and system for verifying binding data card and mobile host
06/14/2012WO2012075866A1 Method, device and system for preventing distributed denial of service attack in cloud system
06/14/2012WO2012075816A1 Method for integrating account management function in input method software
06/14/2012WO2012054646A3 Variable risk engine
06/14/2012WO2012050379A3 Method for extracting fingerprint of publication, apparatus for extracting fingerprint of publication, system for identifying publication using fingerprint, and method for identifying publication using fingerprint
06/14/2012WO2012049592A3 Electronic signature apparatus and method
06/14/2012WO2012047409A3 Remote access to tracking system contact information
06/14/2012WO2012037422A3 Improvements in watermark extraction efficiency
06/14/2012US20120151608 Systems and methods for securing the power supply of command means of a microcircuit card in case of attack
06/14/2012US20120151607 System for detecting intrusions by devices with openable casing
06/14/2012US20120151606 Software system for denying remote access to computer cameras
06/14/2012US20120151605 Information Exchange Engine Providing a Critical Infrastructure Layer and Methods of Use Thereof
06/14/2012US20120151604 Seeding of account setup operations
06/14/2012US20120151603 Method, Apparatus and Server for User Verification
06/14/2012US20120151602 Method and Apparatus for Digital Rights Decomposition