Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
11/2014
11/04/2014US8880590 Information processing apparatus and execution control method
11/04/2014US8880466 System and method for storage operation access security
11/04/2014US8880427 Beverage dispensing and tracking system
11/04/2014US8880036 Retrieving data wirelessly from a mobile device
11/04/2014US8879802 Image processing apparatus and image processing method
11/04/2014US8879733 Random bit stream generator with guaranteed minimum period
11/04/2014US8879728 Key creation and rotation for data encryption
11/04/2014US8879725 Combining instructions including an instruction that performs a sequence of transformations to isolate one transformation
11/04/2014US8879724 Differential power analysis—resistant cryptographic processing
11/04/2014US8879640 Memory efficient implementation of LDPC decoder
11/04/2014US8879109 Image processing device
11/04/2014US8879099 Printing system and method including authentication and owner name acquisition
11/04/2014US8879095 Image forming system, information forming apparatus, and computer readable medium having management apparatus with distributed storage
11/04/2014US8877525 Low cost secure chip identification
10/2014
10/30/2014US20140325689 Shutdown verification method and device
10/30/2014US20140325688 Tamperproof housing module
10/30/2014US20140325687 Digital rights management handler and related methods
10/30/2014US20140325686 Terminal apparatus and method for playing multimedia content encrypted based on drm
10/30/2014US20140325685 Method for controlling access to data and electronic device thereof
10/30/2014US20140325683 Licensing verification for application use
10/30/2014US20140325681 Single-Chip Virtualizing and Obfuscating Storage System for Portable Computing Devices
10/30/2014US20140325679 Method and apparatus for notifying of security information in electronic device and computer-readable recording medium for the same
10/30/2014US20140325678 Optical security enhancement device
10/30/2014US20140325677 Optical security enhancement device
10/30/2014US20140325676 Method and system for digital contents lending
10/30/2014US20140325675 Method and device for supplying of a data set stored in a database
10/30/2014US20140325674 Terminal apparatus and method for adjusting permission for drm content
10/30/2014US20140325673 Live broadcast content protection based on watermarking
10/30/2014US20140325671 Apparatus and method for providing drm service based on cloud
10/30/2014US20140325670 System and method for providing risk score based on sensitive information inside user device
10/30/2014US20140325669 Cloud-Basd Digital Verification System and Method
10/30/2014US20140325666 Guaranteeing anonymity of linked data graphs
10/30/2014US20140325665 Computer system for preventing the disabling of content blocking software functionality therein, and method therefor
10/30/2014US20140325664 Systems and methods for replacing application methods at runtime
10/30/2014US20140325663 Automatic recovery of license key information
10/30/2014US20140325659 Malware risk scanner
10/30/2014US20140325658 Method and System for Simulating the Effects of an Attack on a Computer Code
10/30/2014US20140325657 Systems and methods for assessing security risk
10/30/2014US20140325654 Method for neutralizing pc blocking malware using a separate device for an antimalware procedure activated by user
10/30/2014US20140325650 Selective assessment of maliciousness of software code executed in the address space of a trusted process
10/30/2014US20140325646 Device, system, and method of detecting multiple users accessing the same account
10/30/2014US20140325644 Operating system-independent integrity verification
10/30/2014US20140325642 Storage device reader having security function and security method using thereof
10/30/2014US20140325641 Method and apparatus for face recognition
10/30/2014US20140325640 Secure access-based enumeration of a junction or mount point on a clustered server
10/30/2014US20140325639 Electronic device and authentication method
10/30/2014US20140325638 Computing device security
10/30/2014US20140325633 Computer or microchip with its system bios protected by one or more internal hardware firewalls
10/30/2014US20140325631 Method and system for maintaining login preference information of users in a network-based transaction facility
10/30/2014US20140325624 Projector projecting password
10/30/2014US20140325616 File system level data protection during potential security breach
10/30/2014US20140325609 Method and System for Secure Mobile Messaging
10/30/2014US20140325608 Method and System for Multi-Factor Remote Data Access
10/30/2014US20140325604 Image Processing Apparatus Automatically Requesting Permission to Use Server
10/30/2014US20140325595 Image processing apparatus, image processing system, method of performing status monitoring to check if authentication server recovers from down status, and recording medium
10/30/2014US20140325593 User security comparison and reversion
10/30/2014US20140325592 Information management method and information management system
10/30/2014US20140325499 Static redirection for objective c
10/30/2014US20140325241 Device specific information generation device and device specific generation method
10/30/2014US20140325240 Programming on-chip non-volatile memory in a secure processor using a sequence number
10/30/2014US20140325239 System and method for validating program execution at run-time using control flow signatures
10/30/2014US20140325238 System and method for validating program execution at run-time
10/30/2014US20140325237 Physically unclonable function (puf) with improved error correction
10/30/2014US20140325236 Vehicular image processing apparatus and data processing method using the same
10/30/2014US20140325234 System and Method for Controlling User Access to Encrypted Data
10/30/2014US20140325229 Method and system for secure digital file sharing
10/30/2014US20140325217 Database apparatus, method, and program
10/30/2014US20140325216 Segment deduplication system with encryption and compression of segments
10/30/2014US20140325215 Encryption Method and System
10/30/2014US20140325214 Encryption solution for protecting file systems in multi-host clusters
10/30/2014US20140325212 Distribution of encrypted information in multiple locations
10/30/2014US20140325176 Security memory access method and apparatus
10/30/2014US20140324912 Method and device for information security management and storage medium
10/30/2014US20140324834 Providing Path-Level Access Control for Structured Documents Stored in a Database
10/30/2014US20140324708 Raw sensor input encryption for passcode entry security
10/30/2014US20140324705 System and method for exchanging physical media for a secured digital copy
10/30/2014US20140324702 High volume serialized postage at an automated teller machine or other kiosk
10/30/2014US20140321640 Apparatus and Method for Generating Digital Images
10/30/2014US20140320151 Tamper Detection Arrangement
10/28/2014US8875310 System and method of protecting digital media contents
10/28/2014US8875309 Content server and method of providing content therefrom
10/28/2014US8875306 Customization restrictions for multi-layer XML customization
10/28/2014US8875305 Anonymization of data over multiple temporal releases
10/28/2014US8875304 Application and data removal system
10/28/2014US8875303 Detecting pirated applications
10/28/2014US8875302 Classification of an electronic document
10/28/2014US8875301 Software license incompatibility determination
10/28/2014US8875299 User based content key encryption for a DRM system
10/28/2014US8875298 Method for scalable analysis of android applications for security vulnerability
10/28/2014US8875297 Interactive analysis of a security specification
10/28/2014US8875296 Methods and systems for providing a framework to test the security of computing system over a network
10/28/2014US8875295 Memory introspection engine for integrity protection of virtual machines
10/28/2014US8875294 System and method for cloud-based detection of computer malware
10/28/2014US8875293 System, method, and logic for classifying communications
10/28/2014US8875292 Systems and methods for managing malware signatures
10/28/2014US8875291 Network virtual user risk control method and system
10/28/2014US8875290 Systems and methods for aggressive window probing
10/28/2014US8875288 Taint tracking mechanism for computer security
10/28/2014US8875286 Method and apparatus for detecting malicious software using machine learning techniques
10/28/2014US8875284 Personal identifiable information (PII) theft detection and remediation system and method
1 ... 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 ... 1193