|
 |
|
Class Information
Number: 726/16
Name: Information security > Access control or authentication > Stand-alone
Description: Subject matter wherein the access control or authentication includes the means of limiting access to the resources of a system based on a single computer or end user level.
Sub-classes under this class:
Patents under this class:
Patent Number |
Title Of Patent |
Date Issued |
8713657 |
System and methods for weak authentication data reinforcement |
Apr. 29, 2014 |
8713670 |
Ascertaining presentation format based on device primary control determination |
Apr. 29, 2014 |
8713696 |
Method and system for dynamic digital rights bundling |
Apr. 29, 2014 |
8707452 |
Secure data management device |
Apr. 22, 2014 |
8707449 |
Acquiring access to a token controlled system resource |
Apr. 22, 2014 |
8707423 |
Programmable display device, and control system |
Apr. 22, 2014 |
8707051 |
Method and system for embedded high performance reconfigurable firmware cipher |
Apr. 22, 2014 |
8695085 |
Self-protecting storage |
Apr. 8, 2014 |
8689320 |
Image forming apparatus with hard disk drive securely formatted |
Apr. 1, 2014 |
8689294 |
Systems and methods for managing offline authentication |
Apr. 1, 2014 |
8689212 |
Information processing device for controlling an application able to access a predetermined device, and control method using an information processing device for controlling an application abl |
Apr. 1, 2014 |
8684264 |
Mobile communication device and data verification system comprising smart card having double chips |
Apr. 1, 2014 |
8689321 |
Restricting access to the resources of a terminal |
Apr. 1, 2014 |
8683547 |
System and method for implementing adaptive security zones |
Mar. 25, 2014 |
8683575 |
Secure operation of transitory computer applications |
Mar. 25, 2014 |
8671278 |
Multiprotocol communication authentication |
Mar. 11, 2014 |
8667576 |
Method for preventing data in a computer system from being accessed by unauthorized user |
Mar. 4, 2014 |
8656154 |
Cloud based service logout using cryptographic challenge response |
Feb. 18, 2014 |
8656155 |
Dynamic generation and processing of certificate public information directories |
Feb. 18, 2014 |
8656166 |
Storage and authentication of data transactions |
Feb. 18, 2014 |
8656483 |
System for locking electronic device and method thereof |
Feb. 18, 2014 |
8656484 |
System and method for mutually authenticated cryptographic key exchange using matrices |
Feb. 18, 2014 |
8650653 |
Trusted graphics rendering for safer browsing on mobile devices |
Feb. 11, 2014 |
8650633 |
Integrated circuit for preventing chip swapping and/or device cloning in a host device |
Feb. 11, 2014 |
8650629 |
Interface logic for a multi-core system-on-a-chip (SoC) |
Feb. 11, 2014 |
8650390 |
Tunnel interface for securing traffic over a network |
Feb. 11, 2014 |
8650256 |
Communications security by enforcing offline consumption and auto-termination of electronic messages |
Feb. 11, 2014 |
8650391 |
Systems and methods for securely providing and/or accessing information |
Feb. 11, 2014 |
8645685 |
Token authentication |
Feb. 4, 2014 |
8646048 |
System, method and computer program product for authenticating and authorizing an external entity |
Feb. 4, 2014 |
8646068 |
Home image content securely isolated from corporate IT |
Feb. 4, 2014 |
8646100 |
Method for executing an application in a restricted operating environment |
Feb. 4, 2014 |
RE44739 |
Data security method and device for computer modules |
Jan. 28, 2014 |
8640223 |
Auxiliary display system, device and method |
Jan. 28, 2014 |
8640201 |
Mail server coordination activities using message metadata |
Jan. 28, 2014 |
8635450 |
IP encapsulation with exposed classifiers |
Jan. 21, 2014 |
8635688 |
Image processing apparatus, image processing method, and recording medium |
Jan. 21, 2014 |
8635689 |
Hybrid role mining |
Jan. 21, 2014 |
8631487 |
Simple algebraic and multi-layer passwords |
Jan. 14, 2014 |
8631485 |
Identification of malicious activities through non-logged-in host usage |
Jan. 14, 2014 |
8631430 |
Enabling DRM-encrypted broadcast content through gateway into the home |
Jan. 14, 2014 |
8627439 |
Processing communication events in a communications system |
Jan. 7, 2014 |
8627451 |
Systems and methods for providing an isolated execution environment for accessing untrusted content |
Jan. 7, 2014 |
8627452 |
System and method for providing network security to mobile devices |
Jan. 7, 2014 |
8627492 |
Image processing apparatus, image processing method, and recording medium |
Jan. 7, 2014 |
8621561 |
Selective authorization based on authentication input attributes |
Dec. 31, 2013 |
8621191 |
Methods, apparatuses, and computer program products for providing a secure predefined boot sequence |
Dec. 31, 2013 |
8615788 |
Method and apparatus for scalable integrity attestation in virtualization environments |
Dec. 24, 2013 |
8615796 |
Managing resource allocations |
Dec. 24, 2013 |
8615797 |
Selective item access provision in response to active item ascertainment upon device transfer |
Dec. 24, 2013 |
|
|
|