Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
09/2011
09/15/2011WO2011112365A2 Efficient security-constrained optimal power flow (sc opf) analysis using convexification of continuos variable constraints within a bi-level decomposition scheme
09/15/2011WO2011112348A1 System and method for host-level malware detection
09/15/2011WO2011112347A2 System and method for malware detection
09/15/2011WO2011112345A1 Secure dynamic authority delegation
09/15/2011WO2011111375A1 Server device, client device, and method for connecting server device and client device
09/15/2011WO2011111370A1 Recording system, reproduction system, key distribution server, recording device, recording medium device, reproduction device, recording method, and reproduction method
09/15/2011WO2011111213A1 Content delivery system, delivery server, and user terminal
09/15/2011WO2011111155A1 Biometric authentication device, biometric authentication program and method
09/15/2011WO2011111124A1 Unauthorized operation detecting system and unauthorized operation detecting method
09/15/2011WO2011111115A1 Storage system and file access judgment method for the same
09/15/2011WO2011111104A1 Load balancing device for biometric authentication system
09/15/2011WO2011111011A1 A secured personal data handling and management system
09/15/2011WO2011110847A1 Data capture tool and method
09/15/2011WO2011110639A2 Method for producing and managing a large-volume long-term archive
09/15/2011WO2011110449A2 Method and apparatus for software boot revocation
09/15/2011WO2011110318A1 Method for authenticating a portable data carrier
09/15/2011WO2011110307A1 Protection against access violation during the execution of an operating sequence in a portable data carrier
09/15/2011WO2011083180A3 Encoding and accessing method
09/15/2011WO2011068975A3 Dynamic code insertion and removal for static analysis based sandboxes
09/15/2011US20110225659 Semantic controls on data storage and access
09/15/2011US20110225658 End user license agreement on demand
09/15/2011US20110225656 Network security server suitable for unified communications network
09/15/2011US20110225655 Malware protection
09/15/2011US20110225654 Write-Proof Protection Method of a Storage Device
09/15/2011US20110225653 Monitoring system, program-executing device, monitoring program, recording medium and integrated circuit
09/15/2011US20110225652 Identity theft countermeasures
09/15/2011US20110225651 Trojan-Resistant Bus Architecture and Methods
09/15/2011US20110225650 Systems and methods for detecting and investigating insider fraud
09/15/2011US20110225648 Method and apparatus for reducing the use of insecure passwords
09/15/2011US20110225647 Cloud Based Firewall System And Service
09/15/2011US20110225646 Policy-based content filtering
09/15/2011US20110225645 Basic architecture for secure internet computers
09/15/2011US20110225644 Behavior-based security system
09/15/2011US20110225642 Configuration of computer and communication systems responsive to physical presence of a user at a site
09/15/2011US20110225640 Cloud-based device information storage
09/15/2011US20110225637 Authentication and authorization of user and access to network resources using openid
09/15/2011US20110225636 Method For Automating Onboarding Application Developers To Sales Distribution Channel
09/15/2011US20110225633 Data Processing Methods and Systems for Processing Data in an Operation having a Predetermined Flow Based on CAPTCHA (Completely Automated Public Test to Tell Computers and Humans Apart) Data, and Computer Program Products Thereof
09/15/2011US20110225632 Trustworthiness decision making for access authentication
09/15/2011US20110225631 Interactive networking systems with user classes
09/15/2011US20110225629 CAPTCHA (Completely Automated Public Test to Tell Computers and Humans Apart) Management Methods and Systems
09/15/2011US20110225628 Information input assistance device, computer-readable medium, and information input assistance method
09/15/2011US20110225627 Access Limited Search Results
09/15/2011US20110225626 Reliable Reporting Of Location Data
09/15/2011US20110225624 Systems and Methods for Providing Network Access Control in Virtual Environments
09/15/2011US20110225623 Web-Hosted Self-Managed Virtual Systems With Complex Rule-Based Content Access
09/15/2011US20110225622 System, method, and computer program product for displaying network events in terms of objects managed by a security appliance and/or a routing device
09/15/2011US20110225447 Preferred resource selector
09/15/2011US20110225431 System and Method for General Purpose Encryption of Data
09/15/2011US20110225430 Secured database system with built-in antivirus protection
09/15/2011US20110225429 Cryptographic accumulators for authenticated hash tables
09/15/2011US20110225420 Module signing for unprivileged users to create and load trustworthy kernel modules
09/15/2011US20110225409 Method and Apparatus for Software Boot Revocation
09/15/2011US20110225407 System and Method for Recovering From an Interrupted Encryption and Decryption Operation Performed on a Volume
09/15/2011US20110225406 System and Method for Pre-Operating System Encryption and Decryption of Data
09/15/2011US20110225383 Method for securely storing data in a memory of a portable data carrier
09/15/2011US20110225310 Content delivery system
09/15/2011US20110225200 Privacy-preserving method for skimming of data from a collaborative infrastructure
09/15/2011US20110225193 Active tags
09/15/2011US20110225114 Data structure, method, and system for predicting medical conditions
09/15/2011US20110225060 Mobility Network Operator Service Delivery Hub
09/15/2011US20110225008 Self-Similar Medical Communications System
09/15/2011US20110224808 Security for Objects in a Process Plant Configuration System
09/15/2011US20110222684 Protection of registers against unilateral disturbances
09/15/2011US20110222549 Home Gateway Expansion
09/15/2011US20110221681 Projected and secured virtual keyboard
09/15/2011US20110221673 System and method for monitoring a mobile computing product/arrangement
09/15/2011DE102011013337A1 System und Verfahren zum Übermitteln von Softwareanwendungen an ein Kraftfahrzeug System and method for transferring of software applications to a motor vehicle
09/15/2011DE102010011344A1 Verfahren zur Herstellung und Verwaltung eines großvolumigen Langzeitarchivs Process for the preparation and administration of a large-scale long-term archive
09/15/2011DE102010010950A1 Verfahren zum Authentisieren eines portablen Datenträgers A method of authenticating a portable data carrier
09/15/2011DE102010010851A1 Ausspähungsschutz bei der Ausführung einer Operationssequenz in einem tragbaren Datenträger Spying protection during execution of an operation sequence in a portable data carrier
09/15/2011CA2792951A1 Web-hosted self-managed virtual systems with complex rule-based content access
09/15/2011CA2791348A1 A secured personal data handling and management system
09/14/2011EP2365660A1 System and method for remote reset of password and encryption key
09/14/2011EP2365462A2 Image forming apparatus, authority management method of image forming apparatus, and authority management system of image forming apparatus
09/14/2011EP2365461A2 Reputation management for network content classification
09/14/2011EP2365460A1 Displaying useful information on a display element
09/14/2011EP2365459A2 Data storage apparatus
09/14/2011EP2365458A2 A computer implemented method for determining the presence of a disease in a patient
09/14/2011EP2365457A1 Tag-based secured connection on open device
09/14/2011EP2365456A2 Data structure, method and system for predicting medical conditions
09/14/2011EP2364482A1 System and method for managing confidential information
09/14/2011EP2364481A1 Method for securing java bytecode.
09/14/2011CN201974813U 主动控制功能的可信设备 Active Control feature trusted devices
09/14/2011CN1926616B Portable data storing device using storage address mapping table
09/14/2011CN1694458B Remote daignostic system for printing machine
09/14/2011CN102187366A 内容项标识符 Content item identifier
09/14/2011CN102187353A Systems and methods for authentication of a virtual stored value card
09/14/2011CN102187346A Sadeckas robert
09/14/2011CN102187345A Midlet signing and revocation
09/14/2011CN102184373A Method for designing safety core of operation system based on protection mode and virtualization mechanism
09/14/2011CN102184372A Reverse-sandbox-based mobilephone payment protection method
09/14/2011CN102184371A Detecting method and system for database operation authority of SQL (Structured Query Language)
09/14/2011CN102184370A Document security system based on microfiltration drive model
09/14/2011CN102184369A Method for reducing cryptographic algorithm of binary system application program
09/14/2011CN102184368A Method for safely using mobile storage device
09/14/2011CN102184367A Method and system for destroying electronic documents regularly
09/14/2011CN102184366A External program security access architecture based on system on chip (SoC) and control method
09/14/2011CN102184365A External data security memory architecture based on system on chip (SoC) and access control method
09/14/2011CN102184364A Semi-supervised learning-based recommendation system shilling attack detection method