Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
07/15/2014 | US8782761 Generating authentication challenges based on preferences of a user's contacts |
07/15/2014 | US8782760 Authentication system, authentication server, and sub-authentication server |
07/15/2014 | US8782758 Biometric authentication system, biometric authentication server, method and program thereof |
07/15/2014 | US8782756 Time clock |
07/15/2014 | US8782755 Systems and methods for selecting an authentication virtual server from a plurality of virtual servers |
07/15/2014 | US8782754 Implementing secured, event-based layered logout from a computer system |
07/15/2014 | US8782751 Systems and methods for user access authentication based on network access point |
07/15/2014 | US8782750 Collaborative gateway |
07/15/2014 | US8782749 Information processing device, information processing method, and program |
07/15/2014 | US8782747 Information processing apparatus and information processing method |
07/15/2014 | US8782743 Methods and apparatus for use in a generic bootstrapping architecture |
07/15/2014 | US8782742 Communication apparatus, authentication apparatus, communication method and authentication method |
07/15/2014 | US8782740 Systems and methods for detection of unauthorized or unsecured access points |
07/15/2014 | US8782737 Image forming apparatus, image forming method, and authentication program product |
07/15/2014 | US8782734 Semantic controls on data storage and access |
07/15/2014 | US8782603 Standardized configuration checklists for software development |
07/15/2014 | US8782521 Graphical user interface with improved media presentation |
07/15/2014 | US8782494 Reproducing data utilizing a zero information gain function |
07/15/2014 | US8782446 Security of cryptographic devices against differential power analysis |
07/15/2014 | US8782441 Methods and systems for storage of large data objects |
07/15/2014 | US8782440 Extending the number of applications for accessing protected content in a media using media key blocks |
07/15/2014 | US8782439 Securing a data segment for storage |
07/15/2014 | US8782436 Method and system for transformation of logical data objects for storage |
07/15/2014 | US8782435 System and method for validating program execution at run-time using control flow signatures |
07/15/2014 | US8782434 System and method for validating program execution at run-time |
07/15/2014 | US8782433 Data security |
07/15/2014 | US8782432 Semiconductor device |
07/15/2014 | US8782431 Digital data authentication and security system |
07/15/2014 | US8782430 Secure external buffer for hard disk drive system on a chip |
07/15/2014 | US8782429 Securing execution of computational resources |
07/15/2014 | US8782427 System and method for sequentially processing a biometric sample |
07/15/2014 | US8782426 Security for a personal communication device |
07/15/2014 | US8782425 Client-side CAPTCHA ceremony for user verification |
07/15/2014 | US8782424 System and method for sharing data |
07/15/2014 | US8782422 System and method for authenticating documents |
07/15/2014 | US8782421 System and method for verification of personal identity |
07/15/2014 | US8782418 Entertainment device |
07/15/2014 | US8782416 Family dwelling restricted communication system |
07/15/2014 | US8782407 Information processing device, information processing method, and program |
07/15/2014 | US8782403 Method and apparatus for securing confidential data for a user in a computer |
07/15/2014 | US8782402 System and method for secure communications |
07/15/2014 | US8782400 Trapdoor one-way functions on elliptic curves and their application to shorter signatures and asymmetric encryption |
07/15/2014 | US8782393 Accessing SSL connection data by a third-party |
07/15/2014 | US8782391 Service activation using algorithmically defined key |
07/15/2014 | US8782389 Storage device and method for updating a shadow master boot record |
07/15/2014 | US8782388 Information processing apparatus, method, and computer-readable storage medium that encrypt data in a blob based on a hash value |
07/15/2014 | US8782385 System and method of enabling use of software applications using stored software licensing information |
07/15/2014 | US8782367 Memory area protection circuit |
07/15/2014 | US8782351 Protecting memory of a virtual guest |
07/15/2014 | US8782343 System and method for optimizing data remanence over hybrid disk clusters using various storage technologies |
07/15/2014 | US8782125 Robust filters for social networking environments |
07/15/2014 | US8782084 System, method, and computer program product for conditionally allowing access to data on a device based on a location of the device |
07/15/2014 | US8781972 Distributed license management |
07/15/2014 | US8781971 Method and apparatus for enforcing software licenses |
07/15/2014 | US8781969 Extensible media rights |
07/15/2014 | US8781968 Dynamic display based on estimated viewers |
07/15/2014 | US8781967 Watermarking in an encrypted domain |
07/15/2014 | US8781905 System and method for transponder-enabled account transactions |
07/15/2014 | US8781904 System and method for transponder-enabled account transactions |
07/15/2014 | US8781901 System and methods for protecting the privacy of user information in a recommendation system |
07/15/2014 | US8781131 Key distribution method and system |
07/15/2014 | US8781130 Access control |
07/15/2014 | US8781127 Device with privileged memory and applications thereof |
07/15/2014 | US8781124 Protection of a ciphering key against unidirectional attacks |
07/15/2014 | US8781116 Generator of chaotic sequences and corresponding generating system |
07/15/2014 | US8781112 Signed montgomery arithmetic |
07/15/2014 | US8777100 Method for inputting a password and a device therefor |
07/15/2014 | CA2737631C Protected application stack and method and system of utilizing |
07/15/2014 | CA2607540C Host intrusion prevention server |
07/15/2014 | CA2561880C Method and system for protecting content in a programmable system |
07/15/2014 | CA2508959C System and methods providing enhanced security model |
07/14/2014 | CA2839072A1 Secure online distributed data storage services |
07/11/2014 | CA2801730A1 Mobile itinerant software agent carrying itinerary and data within |
07/10/2014 | WO2014107671A1 Unified communications with a cloud client device |
07/10/2014 | WO2014107618A1 Cognitive-based captcha system |
07/10/2014 | WO2014107443A1 Resource protection on un-trusted devices |
07/10/2014 | WO2014107435A1 Systems and methods for enforcing data-loss-prevention policies using mobile sensors |
07/10/2014 | WO2014107420A1 Opacity baffle to prevent viewing of internal structures in secure electronic equipment |
07/10/2014 | WO2014107390A2 Managing authorization of actions associated with data objects |
07/10/2014 | WO2014107104A1 System and method for the scoring, evaluation and ranking of the assets of the information system |
07/10/2014 | WO2014107028A1 System for preventing malware invasion, and method for operating said system for preventing malware invasion |
07/10/2014 | WO2014106906A1 Authentication method and system using id pattern |
07/10/2014 | WO2014106784A1 Identifying confidential data in data item |
07/10/2014 | WO2014106728A1 Access device and system for an electronic device |
07/10/2014 | WO2014106546A1 Rfid tag and method for operating an rfid tag |
07/10/2014 | WO2014106530A1 Method for loading an application consisting of a plurality of components onto a device consisting of a plurality of components |
07/10/2014 | WO2014047135A3 Method and device for a generalized cryptographic framework |
07/10/2014 | WO2013160765A3 Cyber security analyzer |
07/10/2014 | US20140196159 System and method for controlling access to protected content |
07/10/2014 | US20140196158 Method and system for protecting privacy and enhancing security on an electronic device |
07/10/2014 | US20140196157 Dynamically updating privacy settings in a social network |
07/10/2014 | US20140196156 Capturing and manipulating content using biometric data |
07/10/2014 | US20140196154 Systems and methods for controlling access to secure debugging and profiling features of a computer system |
07/10/2014 | US20140196153 System and method for network administration and local administration of privacy protection criteria |
07/10/2014 | US20140196152 Digital media privacy protection |
07/10/2014 | US20140196150 Quantifying the risks of applications for mobile devices |
07/10/2014 | US20140196149 Anti-malware system, method of processing data in the same, and computing device |
07/10/2014 | US20140196147 Apparatus method and medium for detecting payload anomaly using n-gram distribution of normal data |
07/10/2014 | US20140196145 Prevention of user input capture |
07/10/2014 | US20140196143 Method and apparatus for real-time verification of live person presence on a network |