Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
10/2011
10/04/2011US8032938 Method and system to verify data received, at a server system, for access and/or publication via the server system
10/04/2011US8032936 Systems and methods for detecting a security breach in a computer system
10/04/2011US8032931 Fabric manager multiple device login
10/04/2011US8032929 Safety judgment method, safety judgment system, safety judgment apparatus, first authentication apparatus, and computer program product
10/04/2011US8032928 Methods, devices, and computer program products for controlling wireless connection access
10/04/2011US8032927 Verification engine for user authentication
10/04/2011US8032765 Secure database access through partial encryption
10/04/2011US8032760 Method and system for authentication of a physical object
10/04/2011US8032758 Content authentication and recovery using digital watermarks
10/04/2011US8032757 Methods and apparatus for content fingerprinting for information leakage prevention
10/04/2011US8032753 Server and system for transmitting certificate stored in fixed terminal to mobile terminal and method using the same
10/04/2011US8032749 Method for remotely controlling and/or regulating a system
10/04/2011US8032744 Method and apparatus for self-authenticating digital records
10/04/2011US8032663 Information processing system, information processing apparatus and integrated circuit chip
10/04/2011US8032642 Distributed cache for state transfer operations
10/04/2011US8032631 Information providing apparatus, information providing method, and program
10/04/2011US8032542 Creating, verifying, managing, and using original digital files
10/04/2011US8032492 Simultaneous activation of virtual devices
10/04/2011US8032463 Method and apparatus for increasing charitable donations by providing instantaneous donor recognition
10/04/2011US8031982 Pen-shaped sensing device for sensing surface regions
10/04/2011US8031871 Method of updating an authentication algorithm in a computer system
10/04/2011US8031869 Information recording medium, usage management method, and usage management apparatus
10/04/2011US8031187 Method for managing information
10/04/2011US8031185 System for printing coded data providing interaction with computer software
10/04/2011US8031051 Privacy protection method, device for transmitting identifier for privacy protection, privacy protection system and program, and monitoring system
10/04/2011US8029107 Printhead with double omega-shaped heater elements
10/04/2011US8029101 Ink ejection mechanism with thermal actuator coil
10/04/2011CA2697995C Detecting component removal
09/2011
09/29/2011WO2011119985A2 Firmware authentication and deciphering for secure tv receiver
09/29/2011WO2011119976A2 System and method for early detection of fraudulent transactions
09/29/2011WO2011119761A2 Merchant fraud risk score
09/29/2011WO2011119300A2 System and methods for remote maintenance in an electronic network with multiple clients
09/29/2011WO2011119298A1 System and methods for remote maintenance of multiple clients in an electronic network using virtualization and attestation
09/29/2011WO2011119169A1 Storage device access authentication upon resuming from a standby mode of a computing device
09/29/2011WO2011118548A1 Authentication processing method and device
09/29/2011WO2011118432A1 Measurement data management method and measurement data management system
09/29/2011WO2011118237A1 Authentication device and authentication method
09/29/2011WO2011118222A1 Playback device, content distribution system, playback method, computer program and integrated circuit
09/29/2011WO2011118034A1 Information recording device
09/29/2011WO2011117942A1 Content receiver, content utilization system, content reproduction method, program, and recording medium
09/29/2011WO2011117781A1 Countermeasure method and device for protecting data circulating in electronic microcircuit
09/29/2011WO2011117632A1 Method and system for authenticating user access to a restricted resource across a computer network
09/29/2011WO2011117370A2 Trusted content distribution system
09/29/2011WO2011117268A1 Secure data scanning method and system
09/29/2011WO2011117196A1 Cabinet, especially safety cabinet or hazardous substances safety cabinet for storing preferably liquid hazardous substances
09/29/2011WO2011116570A1 Method for safely inputting information on mobile terminal and mobile terminal thereof
09/29/2011WO2011116459A1 System and method for secure cloud computing
09/29/2011WO2011116448A1 System and method for dynamic, variably-timed operation paths as a resistance to side channel and repeated invocation attacks
09/29/2011WO2011116446A1 System and method for random algorithm selection to dynamically conceal the operation of software
09/29/2011WO2011066331A3 Approaches for a location aware client
09/29/2011WO2011050363A3 Transaction processing method and system
09/29/2011US20110239309 Data dependence analyzer, information processor, data dependence analysis method and program
09/29/2011US20110239308 System and method of vetting data
09/29/2011US20110239307 Method for securing java bytecode
09/29/2011US20110239306 Data leak protection application
09/29/2011US20110239305 Wireless communication device, information distribution system, program
09/29/2011US20110239304 Managing information relating to secure module applications
09/29/2011US20110239303 Threat management system and method
09/29/2011US20110239301 Technique of detecting denial of service attacks
09/29/2011US20110239300 Web based remote malware detection
09/29/2011US20110239298 Concurrent and delayed processing of malware with reduced i/o interference
09/29/2011US20110239297 Tampering monitoring system, control device, and tampering control method
09/29/2011US20110239294 System and method for detecting malicious script
09/29/2011US20110239293 Auditing access to data based on resource properties
09/29/2011US20110239292 System and method of security function activation for a mobile eletronic device
09/29/2011US20110239291 Detecting and Thwarting Browser-Based Network Intrusion Attacks For Intellectual Property Misappropriation System and Method
09/29/2011US20110239289 System and Method to Associate a Private User Identity with a Public User Identity
09/29/2011US20110239288 Executable code validation in a web browser
09/29/2011US20110239287 Method for sharing content
09/29/2011US20110239286 Mobile communications terminal authentication and settlement system and method
09/29/2011US20110239284 Id bridge service system and method thereof
09/29/2011US20110239283 Security token destined for multiple or group of service providers
09/29/2011US20110239277 Method for Managing Computer Network Access
09/29/2011US20110239274 Methods for acouiring an internet user's consent to be located and for authenticating the identity of the user using location information
09/29/2011US20110239273 Network utilization and resource control based on traffic patterns
09/29/2011US20110239271 Trusted network connection implementing method based on tri-element peer authentication
09/29/2011US20110239270 Method and apparatus for providing heterogeneous security management
09/29/2011US20110239269 Automated security analysis for federated relationship
09/29/2011US20110239268 Network policy implementation for a multi-virtual machine appliance
09/29/2011US20110239267 Password complexity policy for externally controlled systems
09/29/2011US20110239125 Using multiple display servers to protect data
09/29/2011US20110239116 Electric vehicle charging stations with touch screen user interface
09/29/2011US20110239049 Computer Data Protection Lock
09/29/2011US20110239005 Secure Repository With Layers Of Tamper Resistance And System And Method For Providing Same
09/29/2011US20110239002 Differential uncloneable variability-based cryptography
09/29/2011US20110239000 Password-protected physical transfer of password-protected devices
09/29/2011US20110238999 Internet Based E-Will Management System Using Certificate and Method Thereof
09/29/2011US20110238988 Appliance authentication system, and method of controlling power supply
09/29/2011US20110238982 Trust-Management Systems and Methods
09/29/2011US20110238979 Device for Preventing, Detecting and Responding to Security Threats
09/29/2011US20110238970 System and method to lock electronic device
09/29/2011US20110238729 Data storing system using network
09/29/2011US20110238587 Policy management system and method
09/29/2011US20110238582 Service Method For Customer Self-Service And Rapid On-Boarding For Remote Information Technology Infrastructure Monitoring And Management
09/29/2011US20110238569 Mobile payments
09/29/2011US20110238541 Audit trails for electronic financial transactions
09/29/2011US20110238520 Wireless jukebox ordering and administration application with restaurant and administrative support
09/29/2011US20110238260 Using Trust Points To Provide Services
09/29/2011US20110234629 Device and method for outputting a private image using a public display
09/29/2011US20110234307 Countermeasure method and device against an attack by fault injection in an electronic microcircuit