Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
09/18/2014 | WO2014142234A1 Electronic system, control device, lock release method, and program |
09/18/2014 | WO2014141659A1 Information receiving device, information receiving system, and information receiving method |
09/18/2014 | WO2014141642A1 Information terminal device |
09/18/2014 | WO2014141595A1 Content distribution method, content distribution system, source device, and sink device |
09/18/2014 | WO2014141518A1 Gateway device, and service providing system |
09/18/2014 | WO2014141363A1 Storage system and storage system control method |
09/18/2014 | WO2014141263A1 Asymmetric otp authentication system |
09/18/2014 | WO2014141206A1 Secure zone on a virtual machine for digital communications |
09/18/2014 | WO2014141202A1 Systems, methods and apparatuses for securely storing and providing payment information |
09/18/2014 | WO2014141159A1 Systems, methods and apparatuses for using a secure non-volatile storage with a computer processor |
09/18/2014 | WO2014141158A1 Methods, apparatuses and systems for providing user authentication |
09/18/2014 | WO2014141074A1 Systems, methods and apparatuses for remote attestation |
09/18/2014 | WO2014141022A1 Systems, methods and apparatuses for device attestation based on speed of computation |
09/18/2014 | WO2014140969A1 Session attribute propagation through secure database server tiers |
09/18/2014 | WO2014140736A1 Automated contact list matching with improved privacy |
09/18/2014 | WO2014140698A1 Improved resistance to cache timing attacks on block cipher encryption |
09/18/2014 | WO2014140559A1 Data security device |
09/18/2014 | WO2014140456A1 Method, device and computer program for optimising the creation of a secure application domain between a computer system and an electronic entity |
09/18/2014 | WO2014140426A1 Multi-factor authentication techniques |
09/18/2014 | WO2014140208A1 Method and device for secure viewing on a screen of an electronic terminal, and corresponding terminal |
09/18/2014 | WO2014140008A1 Secure data processing method, and use in biometry |
09/18/2014 | WO2014139956A1 Method and system for user acceptability |
09/18/2014 | WO2014139556A1 A method, a system, a computer system and a computer program product for certifying a procedure of signature of an electronic file relating to an agreement between at least two parties |
09/18/2014 | WO2014139295A1 Data processing method and terminal |
09/18/2014 | WO2014139162A1 Security co-processor boot performance |
09/18/2014 | WO2014138903A1 Game access system |
09/18/2014 | WO2014138895A1 Systems and methods for partitioning computing applications to optimize deployment resources |
09/18/2014 | WO2014138893A1 Systems and methods for determining trust levels for computing components |
09/18/2014 | WO2014138882A1 Encrypted network storage space |
09/18/2014 | WO2014138877A1 System and method for distributing, monitoring and controlling information based on user specified classes |
09/18/2014 | US20140283148 Flying wirebonds for creating a secure cage for integrated circuits and pathways |
09/18/2014 | US20140283147 Methods And Systems For Preventing Hardware Trojan Insertion |
09/18/2014 | US20140283146 Tamper sensor |
09/18/2014 | US20140283145 System, method, and computer program product for preventing access to data with respect to a data access attempt associated with a remote data sharing session |
09/18/2014 | US20140283143 Software application for managing product manuals |
09/18/2014 | US20140283142 Analyzing Applications for Different Access Modes |
09/18/2014 | US20140283141 Switching a Mobile Device from Operating in a Primary Access Mode to a Secondary Access Mode |
09/18/2014 | US20140283140 Digital media content management apparatus and method |
09/18/2014 | US20140283139 Systems and methods for parsing user-generated content to prevent attacks |
09/18/2014 | US20140283138 Secure Data Sharing With Publicly Accessible Computing Nodes |
09/18/2014 | US20140283137 Media service delivery system providing conditional access to media content from various client devices |
09/18/2014 | US20140283136 Systems and methods for securing and locating computing devices |
09/18/2014 | US20140283135 Mobile Computing Device with Multiple Access Modes |
09/18/2014 | US20140283134 Device and Method for Asset Protection Scheme |
09/18/2014 | US20140283133 Code-enabled remote activation of software for industrial automation systems |
09/18/2014 | US20140283132 Computing application security and data settings overrides |
09/18/2014 | US20140283131 Assignment of Security Contexts to Define Access Permissions for File System Objects |
09/18/2014 | US20140283130 Media management system |
09/18/2014 | US20140283129 Method, system, and device for providing a market for digital goods |
09/18/2014 | US20140283128 Specifying Applications to Share in a Shared Access Mode |
09/18/2014 | US20140283127 Masking sensitive data in HTML while allowing data updates without modifying client and server |
09/18/2014 | US20140283126 Managing Privacy For User-Generated Lists In An Online System |
09/18/2014 | US20140283125 Facial recognition-based information discovery |
09/18/2014 | US20140283124 Method for Managing Access to Documents Protected by Digital Rights Management |
09/18/2014 | US20140283121 Computer Systems and Methods for Capturing Electronic Service Requests and Responses |
09/18/2014 | US20140283120 Methods And Systems For Managing Data Assets |
09/18/2014 | US20140283119 Tiered Access to On Chip Features |
09/18/2014 | US20140283118 OS Security Filter |
09/18/2014 | US20140283117 Protection unit and method for controlling access by plural processes to a storage unit |
09/18/2014 | US20140283116 Method for protected execution of code and protection of executable code and data against modifications |
09/18/2014 | US20140283115 Method and system for monitoring access attempts of shared memory of databases |
09/18/2014 | US20140283114 Rights management for content aggregators |
09/18/2014 | US20140283113 Efficient prevention of fraud |
09/18/2014 | US20140283112 Operating a Computer with a Touchscreen |
09/18/2014 | US20140283111 Spatial security for stored data |
09/18/2014 | US20140283110 Using a file whitelist |
09/18/2014 | US20140283109 Using a uri whitelist |
09/18/2014 | US20140283108 Providing content items from alternate sources |
09/18/2014 | US20140283107 Secure data management |
09/18/2014 | US20140283106 Domain protected marks list based techniques for managing domain name registrations |
09/18/2014 | US20140283105 Method and service for user transparent certificate verifications for web mashups and other composite applications |
09/18/2014 | US20140283104 Object Rendering Systems and Methods |
09/18/2014 | US20140283102 Method for receiving entered data and information processing device |
09/18/2014 | US20140283101 Computing system with privacy mechanism and method of operation thereof |
09/18/2014 | US20140283100 Display privacy with dynamic configuration |
09/18/2014 | US20140283099 Privacy aware dhcp service |
09/18/2014 | US20140283098 Mutually assured data sharing between distrusting parties in a network environment |
09/18/2014 | US20140283097 Anonymizing Sensitive Identifying Information Based on Relational Context Across a Group |
09/18/2014 | US20140283096 Validating normalized code representations |
09/18/2014 | US20140283095 Collaborative publishing within a social network |
09/18/2014 | US20140283094 System and method for systematic detection of fraud rings |
09/18/2014 | US20140283093 Method, apparatus, system, and computer readable medium to provide secure operation |
09/18/2014 | US20140283092 Controlled Application Distribution |
09/18/2014 | US20140283091 Differentially private linear queries on histograms |
09/18/2014 | US20140283090 Licensing using a node locked virtual machine |
09/18/2014 | US20140283089 Sensitive personal information data protection |
09/18/2014 | US20140283088 Preventing stack buffer overflow attacks |
09/18/2014 | US20140283087 Selective content sharing on computing devices |
09/18/2014 | US20140283086 System and Method for Performing Sensitive Geo-Spatial Processing in Non-Sensitive Operator Environments |
09/18/2014 | US20140283085 Internet protocol threat prevention |
09/18/2014 | US20140283082 Systems and methods for determining potential impacts of applications on the security of computing systems |
09/18/2014 | US20140283081 Techniques for correlating vulnerabilities across an evolving codebase |
09/18/2014 | US20140283077 Peer-aware self-regulation for virtualized environments |
09/18/2014 | US20140283076 Profiling code execution |
09/18/2014 | US20140283066 Server-assisted anti-malware client |
09/18/2014 | US20140283064 Network attack offensive appliance |
09/18/2014 | US20140283063 System and Method to Manage Sinkholes |
09/18/2014 | US20140283060 Mitigating vulnerabilities associated with return-oriented programming |
09/18/2014 | US20140283059 Continuous Monitoring of Computer User and Computer Activities |
09/18/2014 | US20140283058 Generic unpacking of applications for malware detection |