Resources Contact Us Home
Browse by Category: Main > Information Technology
Class Information
Number: 726/26
Name: Information security > Prevention of unauthorized use of data including prevention of piracy, privacy violations, or unauthorized data modification
Description: Subject matter comprising systems, methods, and apparatus for prohibiting any impersonation, unauthorized browsing, falsification or theft of data, or alteration of data not consistent with defined security policy.

Sub-classes under this class:

Class Number Class Name Patents
726/27 Access control 3,275
726/32 Copy detection 402
726/33 Copy inactivation 283
726/31 Limitations on number or amount of copies 425

Patents under this class:

Patent Number Title Of Patent Date Issued
8695067 Method to authenticate device and service, and system thereof Apr. 8, 2014
8695060 System and method for creating secure applications Apr. 8, 2014
8695059 Method and system for providing network security services in a multi-tenancy format Apr. 8, 2014
8695056 Method for information tracking in multiple interdependent dimensions Apr. 8, 2014
8694796 Secure data deletion in a database Apr. 8, 2014
8694767 Method and system for NAND flash support in an autonomously loaded secure reprogrammable system Apr. 8, 2014
8694577 Providing personalized platform application content Apr. 8, 2014
8690049 Method for generating an image file for forgery verification and a method for forgeryverification of an image file Apr. 8, 2014
8689354 Method and apparatus for accessing secure data in a dispersed storage system Apr. 1, 2014
8689353 Management of access rights Apr. 1, 2014
8689349 Information flow tracking and protection Apr. 1, 2014
8689345 Mitigating forgery of electronic submissions Apr. 1, 2014
8689344 System and method of integrating modules for execution on a computing device and controlling during runtime an ability of a first module to access a service provided by a second module Apr. 1, 2014
8689343 System and method for securely transmitting video data Apr. 1, 2014
8689341 Anti-phishing system based on end user data submission quarantine periods for new websites Apr. 1, 2014
8689340 Disk protection system Apr. 1, 2014
8689339 Method, system and apparatus for game data transmission Apr. 1, 2014
8689338 Secure terminal, a routine and a method of protecting a secret key Apr. 1, 2014
8689337 Systems and methods of fingerprinting and identifying video objects Apr. 1, 2014
8689336 Tiered exposure model for event correlation Apr. 1, 2014
8689304 Multiple independent authentications for enhanced security Apr. 1, 2014
8689193 Method and apparatus for protecting a software application against a virus Apr. 1, 2014
8689013 Dual-interface key management Apr. 1, 2014
8689009 Authentication-secured access to a data carrier comprising a mass storage device and chip Apr. 1, 2014
8688995 Method and apparatus for detection of a fault attack Apr. 1, 2014
8688992 System and method for generating agreements Apr. 1, 2014
8687807 Cascading dynamic crypto periods Apr. 1, 2014
8687806 Conditional access system employing constrained encryption keys Apr. 1, 2014
8686887 NFC transceiver with current converter Apr. 1, 2014
8683610 Method and apparatus for managing digital rights of secure removable media Mar. 25, 2014
8683607 Method of web service and its apparatus Mar. 25, 2014
8683606 Navigation system Mar. 25, 2014
8683605 Long-term validation of a digital signature status indicator Mar. 25, 2014
8683604 System for protecting personal data Mar. 25, 2014
8683603 Centralized administration-based licensing system Mar. 25, 2014
8683602 System and method for multilevel secure object management Mar. 25, 2014
8683601 Audio/video identification watermarking Mar. 25, 2014
8683600 Print policy commands Mar. 25, 2014
8683597 Risk-based authentication duration Mar. 25, 2014
8683568 Using packet interception to integrate risk-based user authentication into online services Mar. 25, 2014
8683552 Information distribution system and terminal device Mar. 25, 2014
8683550 System and method for validating a user of an account using a wireless device Mar. 25, 2014
8683547 System and method for implementing adaptive security zones Mar. 25, 2014
8683452 Dynamically obfuscated javascript Mar. 25, 2014
8683228 System and method for WORM data storage Mar. 25, 2014
8683209 Method and apparatus for pseudonym generation and authentication Mar. 25, 2014
8683205 Accessing data utilizing entity registration in multiple dispersed storage networks Mar. 25, 2014
8683199 System, method and program for protecting information on computer screen Mar. 25, 2014
8683115 Programmable mapping of external requestors to privilege classes for access protection Mar. 25, 2014
8683114 Device security features supporting a distributed shared memory system Mar. 25, 2014

  Recently Added Patents
Atomic oscillator and manufacturing method
Silicon carbide substrate, epitaxial wafer and manufacturing method of silicon carbide substrate
Storage device, data processing device, registration method, and recording medium
Automated incorporation of expert feedback into a monitoring system
Operation controlling apparatus
Method of forming a semiconductor package
Method and apparatus for supporting management actions for very high throughput in wireless communications
  Randomly Featured Patents
Command executing method for CD-ROM disk drive
Electronic sphygmomanometer capable of adjusting pressure release rate during measurement
Piezoelectric resonator
Transcription repressor
Apparatus for measuring impurity concentrations in a liquid
Push-pull type exercising device
Feedback and lockout mechanism for surgical instrument
High density CMOS process
Rail anchor application machine
Sheaths for implantable fixation devices