| Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
|---|
| 09/09/2014 | US8832727 Method and authentication server for verifying access identity of set-top box |
| 09/09/2014 | US8832724 Remote storage digital video recorder that supports shared and per-subscriber content rights |
| 09/09/2014 | US8832691 Compliance-based adaptations in managed virtual systems |
| 09/09/2014 | US8832686 Inherited product activation for virtual machines |
| 09/09/2014 | US8832467 Digital rights management metafile, management protocol and applications thereof |
| 09/09/2014 | US8832464 Processor and method for implementing instruction support for hash algorithms |
| 09/09/2014 | US8832461 Trusted sensors |
| 09/09/2014 | US8832458 Data transcription in a data storage device |
| 09/09/2014 | US8832457 Methods and apparatus for authenticating components of processing systems |
| 09/09/2014 | US8832456 Data leakage prevention system, method, and computer program product for preventing a predefined type of operation on predetermined data |
| 09/09/2014 | US8832455 Verified boot path retry |
| 09/09/2014 | US8832454 Apparatus and method for runtime integrity verification |
| 09/09/2014 | US8832453 Token recycling |
| 09/09/2014 | US8832452 System and method for implementing a trusted dynamic launch and trusted platform module (TPM) using secure enclaves |
| 09/09/2014 | US8832448 Dual-channel electronic signature system using image codes and related computer program product |
| 09/09/2014 | US8832443 Methods and systems for increasing the security of private keys |
| 09/09/2014 | US8832441 Mobile terminal, data communication method, and computer program |
| 09/09/2014 | US8832437 Stateless human detection for real-time messaging systems |
| 09/09/2014 | US8832435 Providing a real-time indication of platform trust |
| 09/09/2014 | US8832427 Range-based queries for searchable symmetric encryption |
| 09/09/2014 | US8832425 Wide area network access management computer |
| 09/09/2014 | US8832402 Self-initiated secure erasure responsive to an unauthorized power down event |
| 09/09/2014 | US8832311 Diverter |
| 09/09/2014 | US8832283 Content provided DNS resolution validation and use |
| 09/09/2014 | US8832259 Virtual service mode methods for network remote monitoring and managing system |
| 09/09/2014 | US8832257 System, method and computer readable medium for determining an event generator type |
| 09/09/2014 | US8832227 Base station, web application server, system, and method |
| 09/09/2014 | US8832225 Multipart encoding in data aggregation for network page generation |
| 09/09/2014 | US8832180 Function module dispatcher |
| 09/09/2014 | US8832151 Distribution of content document to varying users with security, customization and scalability |
| 09/09/2014 | US8832150 Variable user interface based on document access privileges |
| 09/09/2014 | US8832149 Method for subscription media on-demand |
| 09/09/2014 | US8832051 Information processing apparatus, information processing method, and storage medium |
| 09/09/2014 | US8832048 Techniques and system to monitor and log access of information based on system and user context using policies |
| 09/09/2014 | US8832032 Acceleration of cloud-based migration/backup through pre-population |
| 09/09/2014 | US8831996 Computer system and program |
| 09/09/2014 | US8831995 Optimized server for streamed applications |
| 09/09/2014 | US8831994 System and method for tokenless biometric authorization of electronic communications |
| 09/09/2014 | US8831993 Techniques for sharing virtual machine (VM) resources |
| 09/09/2014 | US8831991 Limited-life electronic mail account as intermediary |
| 09/09/2014 | US8831982 Fiscal board receiving case and fiscal printer |
| 09/09/2014 | US8831966 Method for delegated administration |
| 09/09/2014 | US8831826 Gesture recognition for on-board display |
| 09/09/2014 | US8831568 Automatic configuration of a wireless device |
| 09/09/2014 | US8831567 Mobile terminal and method of controlling a mode switching therein |
| 09/09/2014 | US8831564 System and method for identity protection using mobile device signaling network derived location pattern recognition |
| 09/09/2014 | US8831272 Content item identifier |
| 09/09/2014 | US8831227 Method and system for establishing secure connection between stations |
| 09/09/2014 | US8831224 Method and apparatus for secure pairing of mobile devices with vehicles using telematics system |
| 09/09/2014 | US8831223 Abstraction function for mobile handsets |
| 09/09/2014 | US8831218 Digital rights management system and methods for provisioning content to an intelligent storage |
| 09/09/2014 | US8831217 Digital rights management system and methods for accessing content from an intelligent storage |
| 09/09/2014 | US8831216 Pseudo-random number generation based on periodic sampling of one or more linear feedback shift registers |
| 09/09/2014 | US8830806 Optical disc with a theft deterrent coating |
| 09/09/2014 | US8830499 Information processing apparatus, information processing system, image forming apparatus, image forming system, and computer readable medium |
| 09/09/2014 | US8827802 Electronic gaming machine including a smartcard for protection, and method of use |
| 09/09/2014 | US8827154 Verification of portable consumer devices |
| 09/09/2014 | CA2608254C A system and method for protecting the privacy and security of stored biometric data |
| 09/08/2014 | CA2844557A1 Multi-tiered static chain of trust |
| 09/04/2014 | WO2014134389A1 Continuation of trust for platform boot firmware |
| 09/04/2014 | WO2014134163A1 Splitting application permissions on devices |
| 09/04/2014 | WO2014134085A1 Web ticket based upon a symmetric key for authenticating a client of a unified communications application |
| 09/04/2014 | WO2014134081A1 Real-time communications using a restlike api |
| 09/04/2014 | WO2014134080A1 Compiler based obfuscation |
| 09/04/2014 | WO2014134036A1 Systems and methods for authenticating a user based on a biometric model associated with the user |
| 09/04/2014 | WO2014133917A1 Discretionary policy management in cloud-based environment |
| 09/04/2014 | WO2014133711A1 Determining human stimuli at computing devices |
| 09/04/2014 | WO2014133528A1 Determining coverage of dynamic security scans using runtime and static code analyses |
| 09/04/2014 | WO2014133520A1 Performing security operations using binary translation |
| 09/04/2014 | WO2014133496A1 Resource fencing for vlan multi-tenant systems |
| 09/04/2014 | WO2014132145A1 Web service black box testing |
| 09/04/2014 | WO2014131652A1 A method for software anti-rollback recovery |
| 09/04/2014 | WO2014131102A1 Biometric authentication systems and methods |
| 09/04/2014 | WO2014108280A3 Computer system and method for securely booting a computer system |
| 09/04/2014 | WO2014102523A3 Processing device and method of operation thereof |
| 09/04/2014 | WO2014093508A3 Whiteboard records accessibility |
| 09/04/2014 | WO2014081698A3 Delegate authorization in cloud-based storage system |
| 09/04/2014 | WO2013090166A3 System and method for trusted pair security |
| 09/04/2014 | WO2013058663A3 A driver related data storage system and method |
| 09/04/2014 | WO2010035949A3 Network id based federation and single sign on authentication method |
| 09/04/2014 | US20140250541 Anti-tamper system based on dual random bits generators for integrated circuits |
| 09/04/2014 | US20140250540 Dynamic resource sharing |
| 09/04/2014 | US20140250539 Real-Time Management System for Mobile Electronic Devices |
| 09/04/2014 | US20140250538 DISTINGUISH VALID USERS FROM BOTS, OCRs AND THIRD PARTY SOLVERS WHEN PRESENTING CAPTCHA |
| 09/04/2014 | US20140250537 Systems, methods, and computer program products for data governance and licensing |
| 09/04/2014 | US20140250536 Add-in digital rights management |
| 09/04/2014 | US20140250535 Apparatus for preventing replay attack and method for preventing replay attack |
| 09/04/2014 | US20140250534 Management of digital information |
| 09/04/2014 | US20140250532 A render engine, and method of using the same, to verify data for access and/or publication via a computer system |
| 09/04/2014 | US20140250527 Method and device for determining propagation relationship of trojan horse files |
| 09/04/2014 | US20140250526 Detecting fraudulent activity by analysis of information requests |
| 09/04/2014 | US20140250525 Systems and methods for preventing data remanence in memory |
| 09/04/2014 | US20140250524 Deception-Based Responses to Security Attacks |
| 09/04/2014 | US20140250523 Continuous Authentication, and Methods, Systems, and Software Therefor |
| 09/04/2014 | US20140250522 Systems and methods using drawings which incorporate biometric data as security information |
| 09/04/2014 | US20140250521 Rule based access for removable storage |
| 09/04/2014 | US20140250518 Computer implemented multi-factor authentication |
| 09/04/2014 | US20140250514 Methods and systems for protecting website forms from automated access |
| 09/04/2014 | US20140250508 System and Method for Creating and Managing Object Credentials for Multiple Applications |
| 09/04/2014 | US20140250504 System and method for validating a user of an account for a wireless device |