Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
03/2015
03/05/2015WO2015031861A1 Making a user's data, settings, and licensed content available in the cloud
03/05/2015WO2015031847A1 Distributed dynamic memory management unit (mmu)-based secure inter-processor communication
03/05/2015WO2015031843A1 Approval of a payment by reading a qr code generated by a separate user or device
03/05/2015WO2015031537A1 Systems and methods for identifying private keys that have been compromised
03/05/2015WO2015031489A1 Authentication system
03/05/2015WO2015031403A1 Web browser fingerprinting
03/05/2015WO2015031167A1 Overlay user-private data onto shared public screen using a head mounted display (hmd)
03/05/2015WO2015031014A1 Systems and methods for managing resetting of user online identities or accounts
03/05/2015WO2015030912A1 Secure provisioning of credentials on an electronic device
03/05/2015WO2015030894A2 Stego key management
03/05/2015WO2015030788A1 Comparing real-time movements to pattern profile background
03/05/2015WO2015030748A1 Hardware and software execution profiling
03/05/2015WO2015030742A1 Systems and methods for authenticating access to an operating system by a user before the operating system is booted using a wireless communication token
03/05/2015WO2015030741A1 Distributed pattern discovery
03/05/2015WO2015030565A1 Electronic device and method for controlling locking of electronic device
03/05/2015WO2015030512A1 Terminal device, terminal protecting method for same, and terminal managing server device
03/05/2015WO2015030511A1 Terminal device for terminal protection, terminal protecting method for same, and terminal managing server device
03/05/2015WO2015030467A1 Electronic device and content providing method in electronic device
03/05/2015WO2015030341A1 User authentication apparatus using virtual account and one-time passwords and method for controlling same
03/05/2015WO2015029464A1 Simulation device, information generation device, simulation method, simulation program, environment provision system, environment provision method, and program
03/05/2015WO2015029242A1 License management device, license management method, and program
03/05/2015WO2015029191A1 On-vehicle process management system, on-vehicle process management method, and program
03/05/2015WO2015029037A2 Method and system handling malware
03/05/2015WO2015028916A1 Context-dependent authentication system, method and device
03/05/2015WO2015028856A1 Pose and sub-pose clustering-based identification of individuals
03/05/2015WO2015028824A1 System for accessing data from multiple devices
03/05/2015WO2015028782A1 Authentication system
03/05/2015WO2015028773A1 Apparatus and methods for identity verification
03/05/2015WO2015028772A1 Data encryption and smartcard storing encrypted data
03/05/2015WO2015028712A1 A method and system for authentication and a marker therefor
03/05/2015WO2015028438A1 System and method for processing documents
03/05/2015WO2015027852A1 Method and apparatus for resetting a user-login password for a virtual machine
03/05/2015WO2015027846A1 Permission determining method and device for application program
03/05/2015WO2015027298A1 Proxy system with integrated identity management
03/05/2015US20150067896 Asserting physical presence to a trusted platform module by physically connecting or disconnecting a hot pluggable device
03/05/2015US20150067895 Security device having physical unclonable function
03/05/2015US20150067894 Object based privacy control
03/05/2015US20150067893 Cloud e-drm system and service method thereof
03/05/2015US20150067891 Method and system for digital rights management enforcement
03/05/2015US20150067890 Identification system
03/05/2015US20150067889 Entitlement Predictions
03/05/2015US20150067888 Environmental monitoring device
03/05/2015US20150067887 Digital content rights management method and system
03/05/2015US20150067886 Dynamic data masking system and method
03/05/2015US20150067885 Privacy protection for a life-log system
03/05/2015US20150067884 Method and system for protecting software
03/05/2015US20150067883 Computing system with identity protection mechanism and method of operation thereof
03/05/2015US20150067882 Methods and systems for encoding and protecting data using digital signature and watermarking techniques
03/05/2015US20150067881 Method and system for providing anonymized data from a database
03/05/2015US20150067880 Location spoofing for privacy and security
03/05/2015US20150067878 Apparatus, system, and method for obfuscation and de-obfuscation of digital content
03/05/2015US20150067877 Apparatus and method for setting rights for each object of piece of content
03/05/2015US20150067876 Method and device for managing security of information in mobile terminal, and mobile terminal
03/05/2015US20150067875 Securing accessible systems using variable dependent coding
03/05/2015US20150067874 Securing accessible systems using cross-linking
03/05/2015US20150067873 Information processing device and method for limiting function
03/05/2015US20150067871 Network Device, System and Method for Rendering an Interactive Multimedia Playlist
03/05/2015US20150067870 Secret communication method with self-authentication capability
03/05/2015US20150067868 Apparatus and method for manifesting event to verify security of mobile application
03/05/2015US20150067866 Identifying malicious devices within a computer network
03/05/2015US20150067865 Threat Condition Management
03/05/2015US20150067864 Secured automated or semi-automated systems
03/05/2015US20150067862 Malware analysis methods and systems
03/05/2015US20150067861 Detecting malware using revision control logs
03/05/2015US20150067856 System, method and computer program product for scanning portions of data
03/05/2015US20150067855 Server and method for attesting application in smart device using random executable code
03/05/2015US20150067852 Malicious Activity Detection of a Processing Thread
03/05/2015US20150067849 Neutralizing propagation of malicious information
03/05/2015US20150067845 Detecting Anomalous User Behavior Using Generative Models of User Actions
03/05/2015US20150067843 Method and System for Scanning a Computer System for Sensitive Content
03/05/2015US20150067838 Trusted execution of binaries and modules
03/05/2015US20150067837 Software self-checking systems and methods
03/05/2015US20150067835 Detecting Anomalous User Behavior Using Generative Models of User Actions
03/05/2015US20150067834 Building Reusable Function Summaries for Frequently Visited Methods to Optimize Data-Flow Analysis
03/05/2015US20150067832 Client Side Phishing Avoidance
03/05/2015US20150067831 Systems and methods for identifying private keys that have been compromised
03/05/2015US20150067829 Electronic Device and Method for Unlocking Screen of Electronic Device
03/05/2015US20150067828 Industrial automation and control device user access
03/05/2015US20150067827 Apparatus and method for setting a user-defined pattern for an application
03/05/2015US20150067826 Recording medium, authentication device, and authentication method
03/05/2015US20150067825 Visual authentication to a computing device
03/05/2015US20150067824 Wearable user device authentication system
03/05/2015US20150067823 Motion-based credentials using magnified motion
03/05/2015US20150067822 Biometric Verification Using Predicted Signatures
03/05/2015US20150067821 Method for unlocking electronic device
03/05/2015US20150067813 Method and Apparatus for Trusted Federated Identity Management and Data Access Authorization
03/05/2015US20150067808 Client Identification System Using Video Conferencing Technology
03/05/2015US20150067806 Authentication device, and non-transitory computer-readable device storing authentication program
03/05/2015US20150067803 Computer device, a method for controlling a login status of a computer device and a server
03/05/2015US20150067780 Mobile Terminal Detection Method And Mobile Terminal
03/05/2015US20150067779 Server apparatus, login management system, and non-transitory storage medium
03/05/2015US20150067773 System for managing secure and nonsecure applications on one and the same microcontroller
03/05/2015US20150067771 Access Enablement Security Circuit
03/05/2015US20150067768 Zone policy administration for entity tracking and privacy assurance
03/05/2015US20150067765 Method and system for updating media lists in portable media devices
03/05/2015US20150067763 Hardware and software execution profiling
03/05/2015US20150067760 Conforming passwords to a password policy
03/05/2015US20150067654 Tracing System for Application and Module Tracing
03/05/2015US20150067652 Module Specific Tracing in a Shared Module Environment
03/05/2015US20150067607 Password fraud protection apparatus
1 2 3 4 5 6 7 8 9 10 11 ... 1193