Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
10/07/2014 | US8856473 Computer system protection based on virtualization |
10/07/2014 | US8856363 Content delivery system where in a content marker information registered by one user may be viewed and/or requested by a user other than a specific user |
10/07/2014 | US8856266 Apparatus and associated method for downloading an application with a variable lifetime to a mobile terminal |
10/07/2014 | US8856223 Limiting access to instant messaging content on a display screen |
10/07/2014 | US8856177 Personal profile data repository |
10/07/2014 | US8856175 Method and computer-readable media for managing business transactions |
10/07/2014 | US8856169 Multi-modality, multi-resource, information integration environment |
10/07/2014 | US8856158 Secured searching |
10/07/2014 | US8856157 Automatic detection of columns to be obfuscated in database schemas |
10/07/2014 | US8856136 Information update system |
10/07/2014 | US8856116 Method and apparatus for information exchange |
10/07/2014 | US8856072 Method for providing of content data to a client |
10/07/2014 | US8856044 Segmented access of remotely stored biographical data to a client device |
10/07/2014 | US8856042 Method, apparatus and program for performing personal authentication and inputting operation instruction on the basis of biometric information including posture information |
10/07/2014 | US8855600 Method and system for authenticating a non-native user of a mobile device |
10/07/2014 | US8855469 Method for remotely controlling a streaming media server with a pause and resume functionality |
10/07/2014 | US8855317 System for protecting an encrypted information unit |
10/07/2014 | US8855315 Method and system for realizing secure forking call session in IP multimedia subsystem |
10/07/2014 | US8855314 Hierarchization of crytographic keys in an electronic circuit |
10/07/2014 | US8855312 Mobile trust broker |
10/07/2014 | US8855309 Apparatus and method for providing security service |
10/07/2014 | US8855300 Image-based key exchange |
10/07/2014 | US8855298 Table lookup operation on masked data |
10/07/2014 | US8855297 Device and authentication method therefor |
10/07/2014 | US8855296 Data processing systems with format-preserving encryption and decryption engines |
10/07/2014 | US8854866 Identification circuit and method for generating an identification bit |
10/07/2014 | US8854812 Anti-theft device and method and related computer system |
10/07/2014 | US8854650 Network printing system executing printing by comparing certification information in a database |
10/07/2014 | US8854644 Instruction accepting system for contacting one or more instruction devices on display device and validate identification information to process images |
10/07/2014 | US8854494 Portable hand-held device having stereoscopic image camera |
10/07/2014 | US8854492 Portable device with image sensors and multi-core processor |
10/07/2014 | US8854177 System, method and database for managing permissions to use physical devices and logical assets |
10/07/2014 | US8852096 System and method for medical information monitoring and processing |
10/02/2014 | WO2014160996A1 Method and system for sandbox visibility |
10/02/2014 | WO2014160901A1 Distributed traffic pattern analysis and entropy prediction for detecting malware in a network environment |
10/02/2014 | WO2014160894A1 Identifying unauthorized content presentation within media collaborations |
10/02/2014 | WO2014160853A1 Seamless authentication across multiple entities |
10/02/2014 | WO2014160448A1 Integrated workforce management and access control |
10/02/2014 | WO2014160023A1 Systems and methods for intelligent gaming filters |
10/02/2014 | WO2014159905A1 Multi-identity for secure file sharing |
10/02/2014 | WO2014159750A1 Providing devices as a service |
10/02/2014 | WO2014159563A1 Usage modeling |
10/02/2014 | WO2014159270A1 System and method for transparently injecting policy in a platform as a service infrastructure |
10/02/2014 | WO2014159071A1 Differentiated containerization and execution of web content based on trust level and other attributes |
10/02/2014 | WO2014159001A1 Software upgrades using tokens and existing licenses |
10/02/2014 | WO2014158832A1 Resource-based action attribution |
10/02/2014 | WO2014158760A1 Profiling code execution |
10/02/2014 | WO2014158759A1 Anti-malware scanning of database tables |
10/02/2014 | WO2014158744A1 A method, apparatus, system for qualifying cpu transactions with security attributes |
10/02/2014 | WO2014158736A1 Provisioning sensitive data into third party network-enabled devices |
10/02/2014 | WO2014158692A1 Programmable device personalization |
10/02/2014 | WO2014158605A1 Policy-based secure web boot |
10/02/2014 | WO2014158604A1 Community-based de-duplication for encrypted data |
10/02/2014 | WO2014158596A1 Rfid secure authentication |
10/02/2014 | WO2014158431A1 Protection and confidentiality of trusted service manager data |
10/02/2014 | WO2014158228A1 Providing a managed browser |
10/02/2014 | WO2014158227A1 Providing an enterprise application store |
10/02/2014 | WO2014158223A1 Systems and methods for performing actions for users from a locked device |
10/02/2014 | WO2014158197A1 Securing user credentials |
10/02/2014 | WO2014157826A1 System and method for blocking attack of smart device-based malicious code |
10/02/2014 | WO2014157797A1 Device for quantifying vulnerability of system and method therefor |
10/02/2014 | WO2014157757A1 Mobile input device and method for inputting input by using same |
10/02/2014 | WO2014156762A1 Document management system, document management method, and document management program |
10/02/2014 | WO2014156693A1 Information terminal, lock disengage method, and lock disengage program |
10/02/2014 | WO2014156620A1 Integrated circuit, communication method, computer program, and communication device |
10/02/2014 | WO2014156328A1 Car onboard communication system and communication device |
10/02/2014 | WO2014155749A1 Information processing device, method for controlling information processing device, program, and information storage medium |
10/02/2014 | WO2014155634A1 Biometric registration/authentication system, biometric registration/authentication device, and biometric registration/authentication method |
10/02/2014 | WO2014155616A1 Information management device, information management system, information management method, and information management program |
10/02/2014 | WO2014155498A1 Electronic device |
10/02/2014 | WO2014155363A1 Systems, methods and apparatuses for secure storage of data using a security-enhancing chip |
10/02/2014 | WO2014155229A1 Secure execution of software modules on a computer |
10/02/2014 | WO2014155196A1 Method to unlock a screen using a touch input |
10/02/2014 | WO2014155124A1 Document tamper detection |
10/02/2014 | WO2014155051A1 Method and apparatus for detecting a multi-stage event |
10/02/2014 | WO2014155036A1 Suspicious program detection |
10/02/2014 | WO2014155000A1 Method and device for transmitting a file containing a controlled-access multimedia content |
10/02/2014 | WO2014154973A1 Method for storing data in a computer system performing data deduplication |
10/02/2014 | WO2014154952A1 Method and system for correlation analysis of faults for a computer centre |
10/02/2014 | WO2014154934A1 Expected user response |
10/02/2014 | WO2014154892A1 Security system |
10/02/2014 | WO2014154323A1 Method of preventing access to sensitive data of a computing device |
10/02/2014 | WO2014154291A1 Protection of digital content |
10/02/2014 | WO2014154280A1 Obfuscating access to a data store by a software application |
10/02/2014 | WO2014154261A1 Storing and accessing data |
10/02/2014 | WO2014154236A1 Obtaining or providing key data |
10/02/2014 | WO2014153975A1 Online game anti-cheating method and server |
10/02/2014 | WO2014153959A1 Method, related apparatus and system for preventing cross-site request forgery |
10/02/2014 | WO2014153760A1 Detecting exploits against software applications |
10/02/2014 | WO2014153680A1 Protecting software application |
10/02/2014 | WO2014153679A1 Watermarking executable files |
10/02/2014 | WO2014153649A1 Systems and methods for providing an emulator |
10/02/2014 | WO2014153635A1 Method and system for platform and user application security on a device |
10/02/2014 | US20140298492 Security case |
10/02/2014 | US20140298491 Techniques for recovering missing devices |
10/02/2014 | US20140298490 Access request authorization |
10/02/2014 | US20140298489 Multi-user universal serial bus (usb) key with customizable file sharing permissions |
10/02/2014 | US20140298488 Method for automating the management and interpretation of digital documents and their owners rights metadata for generating digital rights management protected contents |
10/02/2014 | US20140298487 Multi-user universal serial bus (usb) key with customizable file sharing permissions |
10/02/2014 | US20140298486 Granting access to digital content obtained from a third-party service |