Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
09/04/2014 | US20140250502 Determining human stimuli at computing devices |
09/04/2014 | US20140250501 Secure element comprising separated containers and corresponding method |
09/04/2014 | US20140250495 Contactless Authentication Of Optical Disk Drives |
09/04/2014 | US20140250494 Application execution in a restricted application execution environment |
09/04/2014 | US20140250404 Secure data entry via a virtual keyboard |
09/04/2014 | US20140250306 Decision service manager |
09/04/2014 | US20140250305 Reducing decryption latency for encryption processing |
09/04/2014 | US20140250304 User Authentication System and Method for Encryption and Decryption |
09/04/2014 | US20140250300 Secure storage and accelerated transmission of information over communication networks |
09/04/2014 | US20140250294 Router And A Virtual Trusted Runtime BIOS |
09/04/2014 | US20140250291 Continuation of trust for platform boot firmware |
09/04/2014 | US20140250228 Method and system for securing user identities and creating virtual users to enhance privacy on a communication network |
09/04/2014 | US20140249907 Method to raise accuracy of targeting the segmentation for sample distribution |
09/04/2014 | US20140247989 Monitoring the emotional state of a computer user by analyzing screen capture images |
09/04/2014 | DE112013000440T5 Zonenorientierte Anwesenheitskontrolle durch Lokalisieren von Stimmprofilen Zone-based presence control by locating voice profiles |
09/04/2014 | DE112012005016T5 Zielgerichtete Sicherheitsprüfung Targeted safety inspection |
09/04/2014 | DE102013102068A1 Verfahren zur Unterscheidung von Computern und Menschen bei der Interaktion von Computern A method for distinguishing between computers and humans in the interaction of computers |
09/04/2014 | DE102011117299B4 Verfahren und System zur Betrugserkennung in einem IP-basierten Kommunikationsnetzwerk Method and system for fraud detection in an IP-based communications network |
09/03/2014 | EP2772869A1 Method and system for cryptographic processing using sensitive data |
09/03/2014 | EP2772868A1 Method of updating the operating system of a secure microcircuit |
09/03/2014 | EP2772044A1 Controlling access to a mobile device |
09/03/2014 | EP2772006A1 Charging an energy storage unit |
09/03/2014 | EP2772004A1 Secure distribution of content |
09/03/2014 | EP2771976A1 Method and device for managing a key matrix, corresponding computer program product and storage means |
09/03/2014 | EP2771836A1 Systems and methods of device authentication including features of circuit testing and verification in connection with known board information |
09/03/2014 | EP2771835A1 Policy enforcement of client devices |
09/03/2014 | EP2771834A1 Security systems and methods for encoding and decoding digital content |
09/03/2014 | EP2771833A1 Mobile device-type locking |
09/03/2014 | EP2771832A1 Typing profile identification |
09/03/2014 | EP2771831A1 System and method for managing industrial processes |
09/03/2014 | EP2771821A1 Registry |
09/03/2014 | EP2771776A1 Display apparatus for releasing locked state and method thereof |
09/03/2014 | EP2771761A1 Dead reckoning using proximity sensors |
09/02/2014 | US8826461 Method and system for protecting data, storage device, and storage device controller |
09/02/2014 | US8826460 Data exchange between applications of an electronic device |
09/02/2014 | US8826459 Systems and methods of automatic multimedia transfer and playback |
09/02/2014 | US8826457 System for enterprise digital rights management |
09/02/2014 | US8826456 Benchmark measurement for legitimate duplication validation |
09/02/2014 | US8826455 Method and apparatus for automated assignment of access permissions to users |
09/02/2014 | US8826454 Method for secure transfer of medical data to a mobile unit/terminal |
09/02/2014 | US8826449 Data security in a disconnected environment |
09/02/2014 | US8826447 Intelligent connectors integrating magnetic modular jacks and intelligent physical layer devices |
09/02/2014 | US8826446 System and method for applying privacy settings to a plurality of applications |
09/02/2014 | US8826445 Method and system of deterring unauthorized use of media content by degrading the contents waveform |
09/02/2014 | US8826443 Selective removal of protected content from web requests sent to an interactive website |
09/02/2014 | US8826442 Media playback decoder tracing |
09/02/2014 | US8826441 Event-based security state assessment and display for mobile devices |
09/02/2014 | US8826439 Encoding machine code instructions for static feature based malware clustering |
09/02/2014 | US8826438 Method and system for network-based detecting of malware from behavioral clustering |
09/02/2014 | US8826436 Systems, methods and apparatus to apply permissions to applications |
09/02/2014 | US8826435 Apparatus and methods for protecting removable storage devices from malware infection |
09/02/2014 | US8826431 Using telemetry to reduce malware definition package size |
09/02/2014 | US8826430 Method and system for tracing information leaks in organizations through syntactic and linguistic signatures |
09/02/2014 | US8826424 Run-time additive disinfection of malware functions |
09/02/2014 | US8826422 Methods, systems, and computer program products for detecting and mitigating fraudulent message service message traffic |
09/02/2014 | US8826421 Method and apparatus for security validation of user input |
09/02/2014 | US8826419 Computer device with anti-tamper resource security |
09/02/2014 | US8826417 Providing a user input interface prior to initiation of an operating system |
09/02/2014 | US8826416 Electronic device and method for unlocking electronic device |
09/02/2014 | US8826415 Automated device access |
09/02/2014 | US8826414 System-on-chip malicious code detection apparatus and application-specific integrated circuit for a mobile device |
09/02/2014 | US8826408 Consolidating disparate cloud service data and behavior based on trust relationships between cloud services |
09/02/2014 | US8826407 System and method for access control and identity management |
09/02/2014 | US8826405 Trusting an unverified code image in a computing device |
09/02/2014 | US8826402 Management of an instant message session |
09/02/2014 | US8826401 Method and system using a cyber ID to provide secure transactions |
09/02/2014 | US8826400 System for automated prevention of fraud |
09/02/2014 | US8826399 Systems and methods for fast authentication with a mobile device |
09/02/2014 | US8826398 Password changing |
09/02/2014 | US8826396 Password reset system |
09/02/2014 | US8826395 Method of improving online credentials |
09/02/2014 | US8826394 Methods, devices, and mediums associated with security access requested on an as-needed basis |
09/02/2014 | US8826393 Systems and methods for detection of session tampering and fraud prevention |
09/02/2014 | US8826392 Device and method for authenticating biological information |
09/02/2014 | US8826391 Virtualized trusted descriptors |
09/02/2014 | US8826387 Validation and fast channel change for broadcast system |
09/02/2014 | US8826386 Trust network integrating content popularity |
09/02/2014 | US8826380 Proxy server, control method thereof, content server, and control method thereof |
09/02/2014 | US8826376 Communication of session-specific information to user equipment from an access network |
09/02/2014 | US8826374 Approach for securely processing an electronic document |
09/02/2014 | US8826369 Terminal, communication system, data management method, server and storage medium |
09/02/2014 | US8826368 Platform authentication method suitable for trusted network connect architecture based on tri-element peer authentication |
09/02/2014 | US8826366 Verifying access-control policies with arithmetic quantifier-free form constraints |
09/02/2014 | US8826275 System and method for self-aware virtual machine image deployment enforcement |
09/02/2014 | US8826245 Method, system and program product for optimizing emulation of a suspected malware |
09/02/2014 | US8826142 Document handling in a web application |
09/02/2014 | US8826042 Memory controller, memory control apparatus, memory device, memory information protection system, control method for memory control apparatus, and control method for memory device |
09/02/2014 | US8826041 In-band detection mechanism for detecting intermediate layer in a storage I/O driver stack |
09/02/2014 | US8826040 Product security system |
09/02/2014 | US8826038 FPGA configuration bitstream protection using multiple keys |
09/02/2014 | US8826035 Cumulative integrity check value (ICV) processor based memory content protection |
09/02/2014 | US8826033 Data protection using virtual-machine-specific stable system values |
09/02/2014 | US8826031 Methods for secure enrollment and backup of personal identity credentials into electronic devices |
09/02/2014 | US8826030 Methods and systems for authenticating users |
09/02/2014 | US8826029 Providing time ratio-based password/challenge authentication |
09/02/2014 | US8826028 Cryptography secure input device |
09/02/2014 | US8826027 Method for producing acknowledged transaction data and corresponding device |
09/02/2014 | US8826026 Systems and methods for tracking electronic files in computer networks using electronic signatures |
09/02/2014 | US8826024 Trusted compliance operations inside secure computing boundaries |
09/02/2014 | US8826023 System and method for securing access to hash-based storage systems |