Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
09/23/2014 | US8843760 Biometric identification method |
09/23/2014 | US8843759 Methods, systems, and computer program products for media-based authentication |
09/23/2014 | US8843758 Migrating authenticated content towards content consumer |
09/23/2014 | US8843757 One time PIN generation |
09/23/2014 | US8843756 Image processing apparatus and image processing method |
09/23/2014 | US8843755 User authentication |
09/23/2014 | US8843754 Continuous user identification and situation analysis with identification of anonymous users through behaviormetrics |
09/23/2014 | US8843753 Machine-to-machine node erase procedure |
09/23/2014 | US8843751 IP address delegation |
09/23/2014 | US8843745 Methods of authorizing a computer license |
09/23/2014 | US8843742 Hypervisor security using SMM |
09/23/2014 | US8843734 Protecting information using policies and encryption |
09/23/2014 | US8843732 Mechanism for detecting a no-processor swap condition and modification of high speed bus calibration during boot |
09/23/2014 | US8843647 Systems and methods for application server self-service console |
09/23/2014 | US8843643 System and method employing an agile network protocol for secure communications using secure domain names |
09/23/2014 | US8843567 Managing electronic messages |
09/23/2014 | US8843552 System, method and computer program for conducting transactions remotely |
09/23/2014 | US8843520 Document management system and method that detects presence of user inaccessible files and folders, and computer-readable medium storing a computer program for implementing the method |
09/23/2014 | US8843516 Internet security |
09/23/2014 | US8843461 Data archiving system |
09/23/2014 | US8843444 Systems and methods to determine security holes of a backup image |
09/23/2014 | US8843422 Cloud anomaly detection using normalization, binning and entropy determination |
09/23/2014 | US8843415 Secure software service systems and methods |
09/23/2014 | US8843414 Techniques for accessing controlled media objects |
09/23/2014 | US8843413 Binding content to a domain |
09/23/2014 | US8843412 Validating system property requirements for use of software applications |
09/23/2014 | US8843141 Computer, internet and telecommunications based network |
09/23/2014 | US8843109 Device with a communication module that performs wireless communication using unique information, method for controlling the device, and computer-readable recording medium having program for controlling the device recorded thereon |
09/23/2014 | US8843065 Method and device for managing information exchange between for example a NFC controller and a set of at least two secure elements |
09/23/2014 | US8843057 Physical presence digital authentication system |
09/23/2014 | US8842887 Method and system for combining a PIN and a biometric sample to provide template encryption and a trusted stand-alone computing device |
09/23/2014 | US8842837 Method and apparatus for providing seamless file system encryption from a pre-boot environment into a firmware interface aware operating system |
09/23/2014 | US8842836 System for and method of cryptographic provisioning |
09/23/2014 | US8842831 Authentication of an RFID tag using an asymmetric cryptography method |
09/23/2014 | US8842825 Data encoding apparatus, data encoding method, data encoding program, and recording medium |
09/23/2014 | US8842823 Technique for determining usage of encrypted media content |
09/23/2014 | US8842326 Image processing device |
09/23/2014 | US8842314 Image processing apparatus capable of wirelessly exchanging data, image processing method capable of wirelessly exchanging data, and image processing program capable of wirelessly exchanging data |
09/23/2014 | US8842311 Electronic apparatus, image forming apparatus, and security level management method |
09/23/2014 | US8842310 Method and system for establishing secure communications between a multifunction device and a mobile communications device |
09/23/2014 | US8842307 Authentication apparatus, authentication system, authentication method, and recording medium having authentication program recorded thereon |
09/23/2014 | US8842018 Systems and methods for tracking insertion and removal cycles of optical transceiver modules |
09/23/2014 | CA2712694C Method and apparatus for controlling access to a computing device |
09/23/2014 | CA2611043C System and method for locking and unlocking access to an electronic device |
09/22/2014 | CA2846795A1 Method and system ensuring sensitive data are not accessible |
09/20/2014 | CA2810044A1 Method and apparatus for restricting the operation of usb devices |
09/18/2014 | WO2014145805A1 System and method employing structured intelligence to verify and contain threats at endpoints |
09/18/2014 | WO2014145626A1 Cloud forensics |
09/18/2014 | WO2014145597A2 Systems and methods for identifying electronic equipment among a plurality of electronic equipment in an environment |
09/18/2014 | WO2014145186A1 Methods and apparatus for securing user input in a mobile device |
09/18/2014 | WO2014145039A1 Intra-computer protected communications between applications |
09/18/2014 | WO2014144961A1 Establishing trust between applications on a computer |
09/18/2014 | WO2014144939A1 Security services management for computer applications by modifying their object code |
09/18/2014 | WO2014144857A2 Systems, methods, and apparatus to enhance the integrity assessment when using power fingerprinting systems for computer-based systems |
09/18/2014 | WO2014144808A1 System and method for secure application communication between networked processors |
09/18/2014 | WO2014144700A1 Systems and methods for identifying a secure application when connecting to a network |
09/18/2014 | WO2014144602A1 Reducing authentication confidence over time based on user history |
09/18/2014 | WO2014144483A1 Managing policy and permissions profiles |
09/18/2014 | WO2014144246A1 Cyber security |
09/18/2014 | WO2014144159A1 Waterproof mobile device case |
09/18/2014 | WO2014144114A1 Systems, methods and apparatus for monitoring online activity and storing and displaying information concerning the online activity |
09/18/2014 | WO2014143912A2 Method and system providing mutli-level security to gate level information flow |
09/18/2014 | WO2014143904A1 Method and system for integrated color storage management |
09/18/2014 | WO2014143859A1 Accessing a cloud-based service using a communication device linked to another communication device storing the required password |
09/18/2014 | WO2014143756A1 Online transaction verification |
09/18/2014 | WO2014143671A1 Method, apparatus, system, and computer readable medium to provide secure operation |
09/18/2014 | WO2014143645A1 Generation of one time use login pairs via a secure mobile communication device for login on an unsecure communication device |
09/18/2014 | WO2014143588A1 Dynamically loaded measured environment for secure code launch |
09/18/2014 | WO2014143514A1 System and method for database searching |
09/18/2014 | WO2014143356A1 Specifying applications to share in a shared access mode |
09/18/2014 | WO2014143355A1 Switching a mobile device from operating in a primary access mode to a secondary access mode |
09/18/2014 | WO2014143354A1 Mobile computing device with multiple access modes |
09/18/2014 | WO2014143134A1 Parental control method and apparatus for media service system |
09/18/2014 | WO2014143070A1 Efficient prevention of fraud |
09/18/2014 | WO2014143047A1 Computing device security |
09/18/2014 | WO2014143029A1 Generic privilege escalation prevention |
09/18/2014 | WO2014143012A1 Remote malware remediation |
09/18/2014 | WO2014143009A1 Key revocation in system on chip devices |
09/18/2014 | WO2014143005A1 Hypervisor-based buffer overflow detection and prevention |
09/18/2014 | WO2014143000A1 Server-assisted anti-malware |
09/18/2014 | WO2014142986A1 Server-assisted anti-malware client |
09/18/2014 | WO2014142960A1 Mechanisms for locking computing devices |
09/18/2014 | WO2014142951A1 Display privacy with dynamic configuration |
09/18/2014 | WO2014142941A1 Technologies for secure storage and use of biometric authentication information |
09/18/2014 | WO2014142919A1 Managing data in a cloud computing environment using management metadata |
09/18/2014 | WO2014142904A1 Context based switching to a secure operating system environment |
09/18/2014 | WO2014142838A1 Method and apparatus for hardware-assisted secure real time clock management |
09/18/2014 | WO2014142835A1 User authentication via image manipulation |
09/18/2014 | WO2014142817A1 Managing device driver cross ring accesses |
09/18/2014 | WO2014142810A1 Preventing malicious instruction execution |
09/18/2014 | WO2014142791A1 Event correlation based on confidence factor |
09/18/2014 | WO2014142779A1 Secure user authentication with improved one-time-passcode verification |
09/18/2014 | WO2014142742A2 Policy based data protection |
09/18/2014 | WO2014142659A1 Data storage device and computer system comprising such data storage device |
09/18/2014 | WO2014142545A1 Digital note service method, recording medium that records program carrying out same, server and mobile device carrying out same |
09/18/2014 | WO2014142537A1 Computing system with identification mechanism and method of operation thereof |
09/18/2014 | WO2014142532A1 Information delivery system with advertising mechanism and method of operation thereof |
09/18/2014 | WO2014142528A1 Digital copyright-applied epub file generating apparatus and method |
09/18/2014 | WO2014142496A1 Computing system with privacy mechanism and method of operation thereof |
09/18/2014 | WO2014142430A1 Dex file binary obfuscation method in android system |