Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
11/04/2014 | US8880590 Information processing apparatus and execution control method |
11/04/2014 | US8880466 System and method for storage operation access security |
11/04/2014 | US8880427 Beverage dispensing and tracking system |
11/04/2014 | US8880036 Retrieving data wirelessly from a mobile device |
11/04/2014 | US8879802 Image processing apparatus and image processing method |
11/04/2014 | US8879733 Random bit stream generator with guaranteed minimum period |
11/04/2014 | US8879728 Key creation and rotation for data encryption |
11/04/2014 | US8879725 Combining instructions including an instruction that performs a sequence of transformations to isolate one transformation |
11/04/2014 | US8879724 Differential power analysis—resistant cryptographic processing |
11/04/2014 | US8879640 Memory efficient implementation of LDPC decoder |
11/04/2014 | US8879109 Image processing device |
11/04/2014 | US8879099 Printing system and method including authentication and owner name acquisition |
11/04/2014 | US8879095 Image forming system, information forming apparatus, and computer readable medium having management apparatus with distributed storage |
11/04/2014 | US8877525 Low cost secure chip identification |
10/30/2014 | US20140325689 Shutdown verification method and device |
10/30/2014 | US20140325688 Tamperproof housing module |
10/30/2014 | US20140325687 Digital rights management handler and related methods |
10/30/2014 | US20140325686 Terminal apparatus and method for playing multimedia content encrypted based on drm |
10/30/2014 | US20140325685 Method for controlling access to data and electronic device thereof |
10/30/2014 | US20140325683 Licensing verification for application use |
10/30/2014 | US20140325681 Single-Chip Virtualizing and Obfuscating Storage System for Portable Computing Devices |
10/30/2014 | US20140325679 Method and apparatus for notifying of security information in electronic device and computer-readable recording medium for the same |
10/30/2014 | US20140325678 Optical security enhancement device |
10/30/2014 | US20140325677 Optical security enhancement device |
10/30/2014 | US20140325676 Method and system for digital contents lending |
10/30/2014 | US20140325675 Method and device for supplying of a data set stored in a database |
10/30/2014 | US20140325674 Terminal apparatus and method for adjusting permission for drm content |
10/30/2014 | US20140325673 Live broadcast content protection based on watermarking |
10/30/2014 | US20140325671 Apparatus and method for providing drm service based on cloud |
10/30/2014 | US20140325670 System and method for providing risk score based on sensitive information inside user device |
10/30/2014 | US20140325669 Cloud-Basd Digital Verification System and Method |
10/30/2014 | US20140325666 Guaranteeing anonymity of linked data graphs |
10/30/2014 | US20140325665 Computer system for preventing the disabling of content blocking software functionality therein, and method therefor |
10/30/2014 | US20140325664 Systems and methods for replacing application methods at runtime |
10/30/2014 | US20140325663 Automatic recovery of license key information |
10/30/2014 | US20140325659 Malware risk scanner |
10/30/2014 | US20140325658 Method and System for Simulating the Effects of an Attack on a Computer Code |
10/30/2014 | US20140325657 Systems and methods for assessing security risk |
10/30/2014 | US20140325654 Method for neutralizing pc blocking malware using a separate device for an antimalware procedure activated by user |
10/30/2014 | US20140325650 Selective assessment of maliciousness of software code executed in the address space of a trusted process |
10/30/2014 | US20140325646 Device, system, and method of detecting multiple users accessing the same account |
10/30/2014 | US20140325644 Operating system-independent integrity verification |
10/30/2014 | US20140325642 Storage device reader having security function and security method using thereof |
10/30/2014 | US20140325641 Method and apparatus for face recognition |
10/30/2014 | US20140325640 Secure access-based enumeration of a junction or mount point on a clustered server |
10/30/2014 | US20140325639 Electronic device and authentication method |
10/30/2014 | US20140325638 Computing device security |
10/30/2014 | US20140325633 Computer or microchip with its system bios protected by one or more internal hardware firewalls |
10/30/2014 | US20140325631 Method and system for maintaining login preference information of users in a network-based transaction facility |
10/30/2014 | US20140325624 Projector projecting password |
10/30/2014 | US20140325616 File system level data protection during potential security breach |
10/30/2014 | US20140325609 Method and System for Secure Mobile Messaging |
10/30/2014 | US20140325608 Method and System for Multi-Factor Remote Data Access |
10/30/2014 | US20140325604 Image Processing Apparatus Automatically Requesting Permission to Use Server |
10/30/2014 | US20140325595 Image processing apparatus, image processing system, method of performing status monitoring to check if authentication server recovers from down status, and recording medium |
10/30/2014 | US20140325593 User security comparison and reversion |
10/30/2014 | US20140325592 Information management method and information management system |
10/30/2014 | US20140325499 Static redirection for objective c |
10/30/2014 | US20140325241 Device specific information generation device and device specific generation method |
10/30/2014 | US20140325240 Programming on-chip non-volatile memory in a secure processor using a sequence number |
10/30/2014 | US20140325239 System and method for validating program execution at run-time using control flow signatures |
10/30/2014 | US20140325238 System and method for validating program execution at run-time |
10/30/2014 | US20140325237 Physically unclonable function (puf) with improved error correction |
10/30/2014 | US20140325236 Vehicular image processing apparatus and data processing method using the same |
10/30/2014 | US20140325234 System and Method for Controlling User Access to Encrypted Data |
10/30/2014 | US20140325229 Method and system for secure digital file sharing |
10/30/2014 | US20140325217 Database apparatus, method, and program |
10/30/2014 | US20140325216 Segment deduplication system with encryption and compression of segments |
10/30/2014 | US20140325215 Encryption Method and System |
10/30/2014 | US20140325214 Encryption solution for protecting file systems in multi-host clusters |
10/30/2014 | US20140325212 Distribution of encrypted information in multiple locations |
10/30/2014 | US20140325176 Security memory access method and apparatus |
10/30/2014 | US20140324912 Method and device for information security management and storage medium |
10/30/2014 | US20140324834 Providing Path-Level Access Control for Structured Documents Stored in a Database |
10/30/2014 | US20140324708 Raw sensor input encryption for passcode entry security |
10/30/2014 | US20140324705 System and method for exchanging physical media for a secured digital copy |
10/30/2014 | US20140324702 High volume serialized postage at an automated teller machine or other kiosk |
10/30/2014 | US20140321640 Apparatus and Method for Generating Digital Images |
10/30/2014 | US20140320151 Tamper Detection Arrangement |
10/28/2014 | US8875310 System and method of protecting digital media contents |
10/28/2014 | US8875309 Content server and method of providing content therefrom |
10/28/2014 | US8875306 Customization restrictions for multi-layer XML customization |
10/28/2014 | US8875305 Anonymization of data over multiple temporal releases |
10/28/2014 | US8875304 Application and data removal system |
10/28/2014 | US8875303 Detecting pirated applications |
10/28/2014 | US8875302 Classification of an electronic document |
10/28/2014 | US8875301 Software license incompatibility determination |
10/28/2014 | US8875299 User based content key encryption for a DRM system |
10/28/2014 | US8875298 Method for scalable analysis of android applications for security vulnerability |
10/28/2014 | US8875297 Interactive analysis of a security specification |
10/28/2014 | US8875296 Methods and systems for providing a framework to test the security of computing system over a network |
10/28/2014 | US8875295 Memory introspection engine for integrity protection of virtual machines |
10/28/2014 | US8875294 System and method for cloud-based detection of computer malware |
10/28/2014 | US8875293 System, method, and logic for classifying communications |
10/28/2014 | US8875292 Systems and methods for managing malware signatures |
10/28/2014 | US8875291 Network virtual user risk control method and system |
10/28/2014 | US8875290 Systems and methods for aggressive window probing |
10/28/2014 | US8875288 Taint tracking mechanism for computer security |
10/28/2014 | US8875286 Method and apparatus for detecting malicious software using machine learning techniques |
10/28/2014 | US8875284 Personal identifiable information (PII) theft detection and remediation system and method |