Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
08/26/2014 | US8818902 Digital storage media dispensing device |
08/26/2014 | US8818900 Distributed license management |
08/26/2014 | US8818899 Method and apparatus for deploying and licensing wireless communication device computer software infrastructure to manufacturers |
08/26/2014 | US8818897 System and method for validation and enforcement of application security |
08/26/2014 | US8818895 Vehicle device, ad hoc network and method for a road toll system |
08/26/2014 | US8818474 Sensor with signature of data relating to sensor |
08/26/2014 | US8818335 Device security |
08/26/2014 | US8818017 Geographic-based signal detection |
08/26/2014 | US8817990 Kerberized handover keying improvements |
08/26/2014 | US8817989 Method and apparatus for storing and distributing encryption keys |
08/26/2014 | US8817981 Generation of registration codes, keys and passcodes using non-determinism |
08/26/2014 | US8817980 Semiconductor device and IC card |
08/26/2014 | US8817977 Method for generating a digital signature |
08/26/2014 | US8817972 Method of authentication using a decoding of an error correcting code on the basis of a public matrix |
08/26/2014 | US8817291 Image forming apparatus for selectively powering a user authentication device |
08/26/2014 | US8817193 Method and apparatus for hiding caption when displaying video image |
08/26/2014 | US8816818 Biometric authentication device and method, computer-readable recording medium recorded with biometric authentication computer program, and computer system |
08/26/2014 | DE202014102898U1 System und Computerprogrammprodukt zur Sicherstellung der Vertraulichkeit von während Authentifizierungs- und Autorisierungsvorgängen verwendeter Information System and computer program product for ensuring the confidentiality of information during authentication and authorization processes used |
08/26/2014 | CA2671804C Improvements in resisting the spread of unwanted code and data |
08/21/2014 | WO2014127194A2 Computer access control apparatus and method |
08/21/2014 | WO2014127147A1 Systems and methods for a cryptographic file system layer |
08/21/2014 | WO2014127078A1 Managed biometric identity |
08/21/2014 | WO2014126987A1 Authentication to a first device using a second device |
08/21/2014 | WO2014126948A1 Lock screen with socialized applications |
08/21/2014 | WO2014126882A1 Data security service |
08/21/2014 | WO2014126816A1 Delayed data access |
08/21/2014 | WO2014126779A1 On-line behavioral analysis engine in mobile device with multiple analyzer model providers |
08/21/2014 | WO2014126762A1 Binary translator driven program state relocation |
08/21/2014 | WO2014126616A1 Trusted and authenticating using trusted biometric information |
08/21/2014 | WO2014126597A1 Hardware enforced content protection for graphics processing units |
08/21/2014 | WO2014126574A1 Method and apparatus for application awareness in a network |
08/21/2014 | WO2014125161A1 Method and apparatus for accepting third-party use of services based on touch selection |
08/21/2014 | WO2014124806A1 Improved malware detection |
08/21/2014 | WO2014124710A1 Wearable device for storing sensitive data |
08/21/2014 | WO2014124603A1 System and method for a secure display module |
08/21/2014 | WO2014093896A3 System and method for binding drm lincenses to a customer domain |
08/21/2014 | WO2014087425A3 An iris pattern capturing device |
08/21/2014 | WO2014077914A3 System and method for ensuring compliance with organizational policies |
08/21/2014 | US20140237629 Electronic communication |
08/21/2014 | US20140237628 Enhanced content management based on watermark extraction records |
08/21/2014 | US20140237627 Protecting data in a mobile environment |
08/21/2014 | US20140237626 Secure workflow and data management facility |
08/21/2014 | US20140237625 Method for unified end user license management in a drm system |
08/21/2014 | US20140237624 Terminal device, server device, content recording control system, recording method, and recording permission control method |
08/21/2014 | US20140237623 Computing system with protocol protection mechanism and method of operation thereof |
08/21/2014 | US20140237622 System and method for inserting security mechanisms into a software program |
08/21/2014 | US20140237621 Microprocessor system with secured runtime environment |
08/21/2014 | US20140237620 System and method for database privacy protection |
08/21/2014 | US20140237619 Electronic device and security control method |
08/21/2014 | US20140237617 Origin and custody of copies from a stored electronic record verified page by page |
08/21/2014 | US20140237616 Profile and consent accrual |
08/21/2014 | US20140237615 Portable license server |
08/21/2014 | US20140237614 Communication system and method |
08/21/2014 | US20140237613 Distribution apparatus, device, control method for distribution apparatus, and storage medium |
08/21/2014 | US20140237612 Privacy setting implementation in a co-browsing environment |
08/21/2014 | US20140237611 Method for protecting the integrity of a group of memory elements using an aggregate authentication code |
08/21/2014 | US20140237610 Method and system for distributed control of user privacy preferences |
08/21/2014 | US20140237606 System and method for providing automated computer security compromise as a service |
08/21/2014 | US20140237605 Automatic correction of security downgraders |
08/21/2014 | US20140237604 Rule Matching In The Presence Of Languages With No Types Or As An Adjunct To Current Analyses For Security Vulnerability Analysis |
08/21/2014 | US20140237603 Rule matching in the presence of languages with no types or as an adjunct to current analyses for security vulnerability analysis |
08/21/2014 | US20140237601 Operation of a dual instruction pipe virus co-processor |
08/21/2014 | US20140237600 System and method for detecting executable machine instructions in a data stream |
08/21/2014 | US20140237597 Automatic signature generation for malicious pdf files |
08/21/2014 | US20140237596 Robust malware detector |
08/21/2014 | US20140237594 Methods and systems for api-level intrusion detection |
08/21/2014 | US20140237592 Method and system for detecting data modification within computing device |
08/21/2014 | US20140237591 Protecting multi-factor authentication |
08/21/2014 | US20140237590 Simultaneous screening of untrusted digital files |
08/21/2014 | US20140237589 Personalization Data of an Active Application |
08/21/2014 | US20140237588 Method and system for managing and controlling direct access of an administrator to a computer system |
08/21/2014 | US20140237587 Managed Biometric Identity |
08/21/2014 | US20140237586 Apparatus for processing with a secure system manager |
08/21/2014 | US20140237581 Authentication platform and related method of operation |
08/21/2014 | US20140237576 User authentication method and apparatus based on audio and video data |
08/21/2014 | US20140237574 Methods, Systems, and Products for Identity Verification |
08/21/2014 | US20140237570 Authentication based on social graph transaction history data |
08/21/2014 | US20140237566 Password audit system |
08/21/2014 | US20140237560 Security context passing for stateless system management |
08/21/2014 | US20140237558 Device for generating a virtual network user |
08/21/2014 | US20140237554 Unified platform for big data processing |
08/21/2014 | US20140237550 System and method for intelligent workload management |
08/21/2014 | US20140237548 Computing device with environment aware features |
08/21/2014 | US20140237540 Establishing an interactive environment for rendered documents |
08/21/2014 | US20140237537 Method and technique for application and device control in a virtualized environment |
08/21/2014 | US20140237262 System and method for establishing perpetual trust among platform domains |
08/21/2014 | US20140237260 Telecommunications device security |
08/21/2014 | US20140237259 Systems/methods of encryption |
08/21/2014 | US20140237257 Scalable precomputation system for host-opaque processing of encrypted databases |
08/21/2014 | US20140237255 Decryption and Encryption of Application Data |
08/21/2014 | US20140237248 Mobile communication system implementing integration of multiple logins of mobile device applications |
08/21/2014 | US20140237245 Device and authentication method therefor |
08/21/2014 | US20140237244 Device and authentication method therefor |
08/21/2014 | US20140237238 Document authentication data embedding method and apparatus |
08/21/2014 | US20140237235 Information processing device, information storage device, server, information processing system, information processing method, and program |
08/21/2014 | US20140237234 Enhanced system security |
08/21/2014 | US20140237233 Method and apparatus for providing content |
08/21/2014 | US20140237232 Selective shredding in a deduplication system |
08/21/2014 | US20140237231 Computer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method |
08/21/2014 | US20140237230 Computer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method |