Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
08/19/2014 | US8812832 Method and system of using a non-native operating system for scanning and modifying system configuration data of a native operating system |
08/19/2014 | US8812829 Information processing apparatus and start-up method |
08/19/2014 | US8812828 Methods and apparatuses for recovering usage of trusted platform module |
08/19/2014 | US8812827 Wi-Fi router with integrated touch-screen and enhanced security features |
08/19/2014 | US8812804 Methods, apparatus, and systems for secure demand paging and other paging operations for processor devices |
08/19/2014 | US8812766 File mapping and converting for dynamic disk personalization for multiple platforms |
08/19/2014 | US8812756 Method of dispatching and transmitting data streams, memory controller and storage apparatus |
08/19/2014 | US8812702 System and method for globally and securely accessing unified information in a computer network |
08/19/2014 | US8812697 Method of controlling a browser window |
08/19/2014 | US8812669 Device for generating a virtual network user |
08/19/2014 | US8812668 Enhanced human interactive proof (HIP) for accessing on-line resources |
08/19/2014 | US8812638 Method, apparatus and computer program product for controlling devices |
08/19/2014 | US8812563 System for permanent file deletion |
08/19/2014 | US8812550 Systems, methods and apparatus for assessing compliance and federating databases |
08/19/2014 | US8812524 Method and system for preserving privacy of a dataset |
08/19/2014 | US8812439 Folder structure and authorization mirroring from enterprise resource planning systems to document management systems |
08/19/2014 | US8812423 Object qualifiers for multi-dimensional object model |
08/19/2014 | US8812400 Managing a memory segment using a memory virtual appliance |
08/19/2014 | US8811971 Mobile communication device and method for disabling applications |
08/19/2014 | US8811620 Secure sharing of item level data in the cloud |
08/19/2014 | US8811619 Encryption key management system and methods thereof |
08/19/2014 | US8811609 Information protection system and method |
08/19/2014 | US8811606 Asymmetric cryptography using shadow numbers |
08/19/2014 | US8810831 Print control apparatus, image forming apparatus and computer readable medium storing program |
08/19/2014 | US8810362 Recognition system and recognition method |
08/19/2014 | US8807426 Mobile computing device authentication using scannable images |
08/19/2014 | DE202014102648U1 System und Computerprogrammprodukt zur Isolierung von Ressourcen unter Verwendung eines Ressourcenmanagers System and computer program product for the isolation of resources using a resource manager |
08/19/2014 | CA2625235C System and method for maintaining in the field an activation secure module |
08/15/2014 | CA2842741A1 Password audit system |
08/14/2014 | WO2014124467A1 Resilient portals through sandboxing |
08/14/2014 | WO2014124276A1 Identifying and preventing leaks of sensitive information |
08/14/2014 | WO2014124175A1 Privacy against interference attack against mismatched prior |
08/14/2014 | WO2014123893A1 Privacy against interference attack for large data |
08/14/2014 | WO2014123779A1 Method for protecting the integrity of a fixed-length data structure |
08/14/2014 | WO2014123723A1 A domain-specific hardwired symbolic machine |
08/14/2014 | WO2014123663A1 Barcode authentication for resource requests |
08/14/2014 | WO2014123581A1 Privacy protection against curious recommenders |
08/14/2014 | WO2014122662A1 Method and product for providing a predictive security product and evaluating existing security products |
08/14/2014 | WO2014122519A1 Adapting content and monitoring user behavior based on facial recognition |
08/14/2014 | WO2014122501A1 Document authentication |
08/14/2014 | WO2014122063A1 Device and method for detecting unauthorised manipulations of the system state of an open-loop and closed-loop control unit of a nuclear plant |
08/14/2014 | WO2014121397A1 Entertainment apparatus, systems and methods involving pari-mutuel wagering |
08/14/2014 | WO2014078154A4 Generating challenge questions inferred from user history data |
08/14/2014 | WO2014075944A9 Biometric system with body coupled communication interface |
08/14/2014 | WO2013126852A3 Partitioning systems operating in multiple domains |
08/14/2014 | WO2013089607A9 Method for detection of persistent malware on a network node |
08/14/2014 | US20140230079 Response to tamper detection in a memory device |
08/14/2014 | US20140230078 Managing basic input/output system (bios) access |
08/14/2014 | US20140230077 Instruction set architecture with secure clear instructions for protecting processing unit architected state information |
08/14/2014 | US20140230076 Systems and methods for content management in an on-demand environment |
08/14/2014 | US20140230075 Physical and electronic book reconciliation |
08/14/2014 | US20140230074 Method, device, and system for downloading contents on the basis of a rights verification |
08/14/2014 | US20140230073 Virtualized security processor |
08/14/2014 | US20140230071 Device and method for generating and displaying graphic codes specific for medical devices and medical treatment |
08/14/2014 | US20140230070 Auditing of sql queries using select triggers |
08/14/2014 | US20140230068 System and method for packaging and authenticating a software product |
08/14/2014 | US20140230066 Identifying and Preventing Leaks of Sensitive Information |
08/14/2014 | US20140230064 Simulated phishing attack with sequential messages |
08/14/2014 | US20140230063 Method and device for scanning data for signatures prior to storage in a storage device |
08/14/2014 | US20140230062 Detecting network intrusion and anomaly incidents |
08/14/2014 | US20140230057 Always-available embedded theft reaction subsystem |
08/14/2014 | US20140230055 Method for checking an m out of n code |
08/14/2014 | US20140230052 System and method for testing a secured manufactured device |
08/14/2014 | US20140230049 Embedded authentication systems in an electronic device |
08/14/2014 | US20140230048 Method and computer program product of switching locked state of electronic device |
08/14/2014 | US20140230047 Techniques for biometric authentication of user of mobile device |
08/14/2014 | US20140230046 Turing test based user authentication and user presence verification system, device, and method |
08/14/2014 | US20140230045 Graphical object-based user authentication for computerized devices |
08/14/2014 | US20140230039 Barcode authentication for resource requests |
08/14/2014 | US20140230033 Systems and Methods for Identifying Biometric Information as Trusted and Authenticating Persons Using Trusted Biometric Information |
08/14/2014 | US20140230028 Auxiliary password |
08/14/2014 | US20140230025 Notifications in a geo-spatial social network |
08/14/2014 | US20140230019 Authentication to a first device using a second device |
08/14/2014 | US20140230017 Programmable security token |
08/14/2014 | US20140230014 Information processing device and information processing method |
08/14/2014 | US20140230012 Systems, methods, and media for policy-based monitoring and controlling of applications |
08/14/2014 | US20140230011 User Interface for Secure Virtual Document Management System |
08/14/2014 | US20140230010 Trusted and secure techniques for item delivery and execution |
08/14/2014 | US20140230009 Retroactive shared content item links |
08/14/2014 | US20140230007 Policy enforcement with associated data |
08/14/2014 | US20140229942 Isolated guest creation in a virtualized computing system |
08/14/2014 | US20140229929 Accessing a patch file in a system center configuration manager (sccm) environment |
08/14/2014 | US20140229744 Enabling a software application to be executed on a hardware device |
08/14/2014 | US20140229743 Malware and tamper resistant computer architecture |
08/14/2014 | US20140229742 Methods and devices for protecting digital objects through format preserving coding |
08/14/2014 | US20140229741 Dual Composite Field Advanced Encryption Standard Memory Encryption Engine |
08/14/2014 | US20140229739 Delayed data access |
08/14/2014 | US20140229732 Data security service |
08/14/2014 | US20140229731 Systems and methods for a cryptographic file system layer |
08/14/2014 | US20140229717 Binary translator driven program state relocation |
08/14/2014 | US20140229508 System and method for enabling users to select combination of numeric or alpha numeric characters |
08/14/2014 | US20140229507 Method To Delay Locking Of Server Files On Edit |
08/14/2014 | US20140229380 Systems and Methods for Identifying Biometric Information as Trusted and Authenticating Persons Using Trusted Biometric Information |
08/14/2014 | US20140226598 Control channel transmitting method, base station and terminal |
08/14/2014 | DE102013202339A1 Vorrichtung und Verfahren zum Verwalten von Zugangscodes Apparatus and method for managing access codes |
08/13/2014 | EP2765750A1 Controlling application access to mobile device functions |
08/13/2014 | EP2765541A1 Physical and electronic book reconciliation |
08/13/2014 | EP2765530A1 Securing display output data against malicious software attacks |
08/13/2014 | EP2765529A1 A method of authenticating a user of a peripheral apparatus, a peripheral apparatus, and a system for authenticating a user of a peripheral apparatus |
08/13/2014 | EP2764670A1 Method for securely downloading access keys using a mobile device |