Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
06/2014
06/26/2014WO2014099028A1 Platform-hardened digital rights management key provisioning
06/26/2014WO2014099012A1 Method and apparatus for assigning devices to a media service
06/26/2014WO2014098998A1 Securing data transmissions between processor packages
06/26/2014WO2014098901A1 Active component embedded in cable
06/26/2014WO2014098745A1 Methods and apparatuses in a data communication system for proving authenticity of electronically signed human readable data
06/26/2014WO2014098662A1 Exposing data to query generating applications using usage profiles
06/26/2014WO2014098387A1 Apparatus and method for diagnosing malicious application
06/26/2014WO2014098372A1 Harmful site collection device and method
06/26/2014WO2014098337A1 Harmful site collection device and method
06/26/2014WO2014098293A1 Method of controlling application execution, method of determining whether to execute application, and computer-readable recording medium having program to execute same
06/26/2014WO2014098239A1 Monitoring device and monitoring method
06/26/2014WO2014098048A1 Authentication assisting device, terminal device, authentication system, and storage medium
06/26/2014WO2014097655A1 Input device, input method, and program
06/26/2014WO2014097502A1 Personal information management system, personal information management method and program
06/26/2014WO2014097164A1 System and method for determining a measure of identity authenticity
06/26/2014WO2014096908A1 Spatial audio apparatus
06/26/2014WO2014096607A1 Method of processing data in a distributed storage system
06/26/2014WO2014096553A1 Generating a customized application
06/26/2014WO2014096334A1 Displaying a forgery-proof identity indicator
06/26/2014WO2014096027A1 Control system for a motor vehicle
06/26/2014WO2014095673A1 Method, computer program product and device system for switching application programs
06/26/2014WO2014095362A1 Online transaction system
06/26/2014WO2014094857A1 Technique for enabling a client to provide a server entity
06/26/2014WO2014094653A1 Device, method and system for detecting malicious links
06/26/2014WO2014094151A1 System and method for monitoring data in a client environment
06/26/2014WO2014094059A1 A database access system and method for a multi - tier computer architecture
06/26/2014WO2014094034A1 Computer intrusion detection
06/26/2014WO2014094033A1 Computer implemented frameworks and methodologies for enabling identification verification in an online environment
06/26/2014WO2014075056A3 Using temporary access codes
06/26/2014WO2014062349A3 System and method for managing entitlement of digital assets
06/26/2014US20140182002 Process for capturing and transmitting window screen display data
06/26/2014US20140182001 Service Management Apparatus, Program, and Service Management Method
06/26/2014US20140181999 System and Method for Creating Conditional Immutable Objects in a Storage Device
06/26/2014US20140181998 Automatic sanitization of data on a mobile device in a network environment
06/26/2014US20140181997 Private Queue Indicator
06/26/2014US20140181995 Publication and removal of attributes in a multi-user computing system
06/26/2014US20140181993 Storage Device and Method for Using a Common Digital Rights Management Module to Enforce an Association between Content and a User Interface Application
06/26/2014US20140181992 Multi-tenant content provider
06/26/2014US20140181991 Advanced multi-channel watermarking system and method
06/26/2014US20140181989 Information processing apparatus, communication terminal apparatus, and storage medium
06/26/2014US20140181988 Information processing technique for data hiding
06/26/2014US20140181987 Secure storage and retrieval of confidential information
06/26/2014US20140181986 Unique and unclonable platform identifiers using data-dependent circuit path responses
06/26/2014US20140181985 Content Specific Data Scrambling
06/26/2014US20140181984 Method and apparatus for authentication of solution topology
06/26/2014US20140181983 Identifying primarily monosemous keywords to include in keyword lists for detection of domain-specific language
06/26/2014US20140181982 Method and system for data protection
06/26/2014US20140181981 System and method for protection from buffer overflow vulnerability due to placement new constructs in c++
06/26/2014US20140181980 System and method for protection from buffer overflow vulnerability due to placement new constructs in c++
06/26/2014US20140181979 Content filtering of remote file-system access protocols
06/26/2014US20140181978 Design and evaluation of a fast and robust worm detection algorithm
06/26/2014US20140181976 Methods, systems, and computer readable media for detecting injected machine code
06/26/2014US20140181975 Method to scan a forensic image of a computer system with multiple malicious code detection engines simultaneously from a master control point
06/26/2014US20140181974 System and Method for Detecting Malware Using Isolated Environment
06/26/2014US20140181973 Method and system for detecting malicious application
06/26/2014US20140181971 System and method for detecting malware that interferes with the user interface
06/26/2014US20140181970 System and method for improving the efficiency of application emulation acceleration
06/26/2014US20140181965 Access Requests at IAM System Implementing IAM Data Model
06/26/2014US20140181964 Method for managing security for applications and an electronic device thereof
06/26/2014US20140181963 Electronic device and file protection method
06/26/2014US20140181962 Application executing method using fingerprint recognition, device therefor, and computer readable recording medium therefor
06/26/2014US20140181961 Electronic device and method for unlocking electronic device
06/26/2014US20140181960 Methods and apparatuses for controlling access to computer systems and for annotating media files
06/26/2014US20140181959 Secure element biometric authentication system
06/26/2014US20140181958 Secure and convenient authentication
06/26/2014US20140181957 Methods and apparatus for authenticating user login
06/26/2014US20140181956 Methods, systems, and media for measuring quality of gesture-based passwords
06/26/2014US20140181955 Two factor authentication using near field communications
06/26/2014US20140181954 System for conveying an identity and method of doing the same
06/26/2014US20140181948 Authenticating Using Cloud Authentication
06/26/2014US20140181945 Single-point login system and method
06/26/2014US20140181942 Startup method and apparatus, startup-acceptance method and apparatus, and mutual-startup method and system
06/26/2014US20140181929 Method and apparatus for user authentication
06/26/2014US20140181925 Privacy Enhanced Key Management For A Web Service Provider Using A Converged Security Engine
06/26/2014US20140181922 Systems and methods for determining a strength of a created credential
06/26/2014US20140181921 Audio based human-interaction proof
06/26/2014US20140181920 Locked element for use in a graphical modeling environment
06/26/2014US20140181918 System and method for preventing access to data on a compromised remote device
06/26/2014US20140181900 Quantifying Risk Based on Relationships and Applying Protections Based on Business Rules
06/26/2014US20140181896 System and Method for Protecting Computer Resources from Unauthorized Access Using Isolated Environment
06/26/2014US20140181890 Quantifying Risk Based on Relationships and Applying Protections Based on Business Rules
06/26/2014US20140181889 Method and aparatus for presence based resource management
06/26/2014US20140181888 Secure local web application data manager
06/26/2014US20140181534 Cryptographic circuit protection from differential power analysis
06/26/2014US20140181533 Secure object having protected region, integrity tree, and unprotected region
06/26/2014US20140181531 Systems and methods for queue level ssl card mapping to multi-core packet engine
06/26/2014US20140181512 Computer implemented method for performing cloud computing on data being stored pseudonymously in a database
06/26/2014US20140181511 Secure system for allowing the execution of authorized computer program code
06/26/2014US20140181510 Control system, information processing apparatus, terminal device, control method, and computer readable medium
06/26/2014US20140181498 Method and apparatus for supporting dynamic change of authentication means secure booting
06/26/2014US20140181148 Distributed Management Framework for Personal Attributes
06/26/2014US20140180980 Information identification method, program product, and system
06/26/2014US20140180950 Method and system providing advice and services to consumers
06/26/2014US20140180835 Digital signatures for online advertisement security
06/26/2014US20140180241 Method For Configuring An Insulin Pump With Configuring Device
06/26/2014US20140179271 Smart card with domain-trust evaluation and domain policy management functions
06/26/2014US20140177904 Recording medium and producing method thereof, reproducing method and reproducing apparatus, and copyright managing method
06/26/2014US20140177833 Downloadable security and protection methods and apparatus
06/26/2014US20140177007 Printer consumable locking
06/26/2014US20140176332 Piezo based fingerprint sensor structure
1 ... 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 ... 1193