Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
07/08/2014 | US8773260 System and method for monitoring a mobile computing product/arrangement |
07/08/2014 | US8772653 Encryption keyboard |
07/08/2014 | US8769784 Secure and efficient authentication using plug-in hardware compatible with desktops, laptops and/or smart mobile communication devices such as iPhones |
07/08/2014 | CA2839068A1 Touch event processing method and portable device implementing the same |
07/08/2014 | CA2616981C System and method for managing encrypted content using logical partitions |
07/08/2014 | CA2587306C System and method for processing certificates located in a certificate search |
07/08/2014 | CA2564285C System and method of owner application control of electronic devices |
07/03/2014 | WO2014106282A1 Identification of obfuscated computer items using visual algorithms |
07/03/2014 | WO2014106149A1 Techniques for validating cryptographic applications |
07/03/2014 | WO2014105960A1 Timeline wrinkling system and method |
07/03/2014 | WO2014105949A1 System and method for the programmatic runtime de-obfuscation of obfuscated software utilizing virtual machine introspection and manipulation of virtual machine guest memory permissions |
07/03/2014 | WO2014105919A1 Identifying web pages in malware distribution networks |
07/03/2014 | WO2014105918A1 Permitting a user access to password protected data by using a simple password and a normal password |
07/03/2014 | WO2014105856A1 Web application container for client-level runtime control |
07/03/2014 | WO2014105580A1 A privacy-preserving database system |
07/03/2014 | WO2014105549A1 Mobile device security using multiple profiles |
07/03/2014 | WO2014105535A1 Real-time representation of security-relevant system state |
07/03/2014 | WO2014105506A1 Systems and methods for non-destructive testing user profiles |
07/03/2014 | WO2014105505A1 Protocol for biometric device capture and quality analysis |
07/03/2014 | WO2014105418A1 Alarm condition processing in network element |
07/03/2014 | WO2014105356A1 Systems and methods for synchronizing nondestructive testing devices |
07/03/2014 | WO2014105330A1 Systems and methods for licensing non destructive testing content |
07/03/2014 | WO2014105310A1 Device authentication using a physically unclonable functions based key generation system |
07/03/2014 | WO2014105308A1 Herd based scan avoidance system in a network environment |
07/03/2014 | WO2014105167A1 Apparatus and method for page walk extension for enhanced security checks |
07/03/2014 | WO2014105146A1 Secure key derivation and cryptography logic for integrated circuits |
07/03/2014 | WO2014105135A1 Instructions processors, methods, and systems to process secure hash algorithms |
07/03/2014 | WO2014105130A1 Measuring applications loaded in secure enclaves at runtime |
07/03/2014 | WO2014105028A1 System for asset management |
07/03/2014 | WO2014104601A1 P2p-based update device and method of operating p2p-based update device |
07/03/2014 | WO2014104539A1 Method and apparatus for managing passcode |
07/03/2014 | WO2014104511A1 Crum chip and image forming device for authentication and communication, and methods thereof |
07/03/2014 | WO2014104507A1 System and method for secure login, and apparatus for same |
07/03/2014 | WO2014104440A1 System and method for providing cloud service |
07/03/2014 | WO2014103971A1 Payment collection method and payment collection system using verifiable image information |
07/03/2014 | WO2014103663A1 Digital contract system |
07/03/2014 | WO2014103242A1 Specific information play device, automobile whereupon same is mounted, and program thereof |
07/03/2014 | WO2014103115A1 Illicit intrusion sensing device, illicit intrusion sensing method, illicit intrusion sensing program, and recording medium |
07/03/2014 | WO2014102526A1 Processing device and method of operation thereof |
07/03/2014 | WO2014102525A1 Method and device for secure network access |
07/03/2014 | WO2014102303A1 Method, system and computer program product for managing operations of service terminals |
07/03/2014 | WO2014102301A1 Method to provide connectivity capabilities to a computing device |
07/03/2014 | WO2014102277A1 Method for a user to prove the ownership of an anonymous document |
07/03/2014 | WO2014102276A1 Method for controlling a contactless transaction |
07/03/2014 | WO2014102274A1 Method for protecting an electronic device against use by unauthorized persons, and associated server |
07/03/2014 | WO2014102067A1 Device adapted for emulating tactile contacts on a capacitive screen |
07/03/2014 | WO2014102017A1 Method for managing data |
07/03/2014 | WO2014101783A1 Method and server for performing cloud detection for malicious information |
07/03/2014 | WO2014101610A1 Method for java application to access intelligent key apparatus |
07/03/2014 | WO2014101589A1 Method, server and system for rating reputation of web site |
07/03/2014 | WO2014101495A1 Control method of java card object access |
07/03/2014 | WO2014101144A1 Data storage method and device |
07/03/2014 | WO2014078194A3 Information handling resources with external storage resource boot |
07/03/2014 | WO2014078154A3 Generating challenge questions inferred from user history data |
07/03/2014 | WO2014070515A3 Privacy aware camera and device status indicator system |
07/03/2014 | WO2014062853A3 Secure communication architecture |
07/03/2014 | WO2014060964A3 Method and system for detecting intrusion in networks and systems based on business-process specification |
07/03/2014 | US20140189892 Communication device and communication system |
07/03/2014 | US20140189891 Hard disk assembly and electronic device using same |
07/03/2014 | US20140189890 Device authentication using a physically unclonable functions based key generation system |
07/03/2014 | US20140189889 Managing authorization of actions associated with data objects |
07/03/2014 | US20140189885 Permitting a user access to password protected data |
07/03/2014 | US20140189884 Lengthy Hosting Internet System |
07/03/2014 | US20140189883 Distributing content to subscribers of a communications service provider |
07/03/2014 | US20140189882 System and method for the programmatic runtime de-obfuscation of obfuscated software utilizing virtual machine introspection and manipulation of virtual machine guest memory permissions |
07/03/2014 | US20140189881 Enhanced security for accessing virtual memory |
07/03/2014 | US20140189880 System and method for administrating access control rules on a secure element |
07/03/2014 | US20140189879 Method for identifying file type and apparatus for identifying file type |
07/03/2014 | US20140189878 Image forming apparatus |
07/03/2014 | US20140189876 Systems and methods for licensing non-destructive testing content |
07/03/2014 | US20140189875 Hybrid analysis of vulnerable information flows |
07/03/2014 | US20140189874 Hybrid analysis of vulnerable information flows |
07/03/2014 | US20140189873 System and method for vulnerability risk analysis |
07/03/2014 | US20140189872 Method and device for monitoring virus trend abnormality |
07/03/2014 | US20140189871 Identifying Code Signatures Using Metamorphic Code Generation |
07/03/2014 | US20140189870 Visual component and drill down mapping |
07/03/2014 | US20140189869 Method of intrusion detection in terminal device and intrusion detecting apparatus |
07/03/2014 | US20140189866 Identification of obfuscated computer items using visual algorithms |
07/03/2014 | US20140189865 Security management in a networked computing environment |
07/03/2014 | US20140189864 Identifying web pages in malware distribution networks |
07/03/2014 | US20140189862 Virtual machine monitor (vmm) extension for time shared accelerator management and side-channel vulnerability prevention |
07/03/2014 | US20140189860 Control system cyber security |
07/03/2014 | US20140189858 Generation Method and Device for generating anonymous dataset, and method and device for risk evaluation |
07/03/2014 | US20140189857 Method, system, and apparatus for securely operating computer |
07/03/2014 | US20140189856 Method and apparatus for inputting password using game |
07/03/2014 | US20140189855 Gestures for Unlocking a Mobile Device |
07/03/2014 | US20140189854 Techniques for skin tone activation |
07/03/2014 | US20140189853 Content protection key management |
07/03/2014 | US20140189852 Method for executing an application in a restricted operating environment |
07/03/2014 | US20140189851 Systems and methods for non-destructive testing user profiles |
07/03/2014 | US20140189850 Mobile device security using multiple profiles |
07/03/2014 | US20140189849 Inferring Security Decisions From Trusted Users |
07/03/2014 | US20140189848 Inferring security decisions from trusted users |
07/03/2014 | US20140189841 Apparatus for and method of multi-factor authentication among collaborating communication devices |
07/03/2014 | US20140189836 System for controlling access to an account |
07/03/2014 | US20140189835 Systems and methods for efficient authentication of users |
07/03/2014 | US20140189833 Information processing apparatus capable of authentication processing with improved user convenience, control program for information processing apparatus, and recording medium having control program for information processing apparatus recorded thereon |
07/03/2014 | US20140189832 Transcoding Content Based on Verification of Ownership of the Content |
07/03/2014 | US20140189826 Techniques for dynamic generation and management of password dictionaries |
07/03/2014 | US20140189825 Multi Mode Operation Using User Interface Lock |