Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
02/2015
02/10/2015US8955072 Single sign on for a remote user session
02/10/2015US8955071 Controlled password modification method
02/10/2015US8955070 Controlled password modification method and apparatus
02/10/2015US8955069 Event-based biometric authentication using mobile device
02/10/2015US8955067 System and method for providing controlled application programming interface security
02/10/2015US8955065 Recovery of managed security credentials
02/10/2015US8955063 Terminal device authentication method, terminal device and program
02/10/2015US8955062 Method and system for permitting access to resources based on instructions of a code tagged with an identifier assigned to a domain
02/10/2015US8955061 Information processing apparatus, authentication system, authentication method, and program
02/10/2015US8955060 Collaborative parental control of streaming media
02/10/2015US8955058 Automatically generating challenge questions inferred from user history data for user authentication
02/10/2015US8955057 Managing access to class objects in a system utilizing a role-based access control framework
02/10/2015US8955056 Terminal and method for assigning permission to application
02/10/2015US8955055 Customer extendable AAA framework for network elements
02/10/2015US8955052 System and method for maintaining dual identity in a server process
02/10/2015US8955050 Generating secure roaming user profiles over a network
02/10/2015US8955047 Method client and system for authentication of a low-security client and a high-security client in a mobile radio network
02/10/2015US8955045 Facilitating varied access based on authentication scoring
02/10/2015US8955044 Time managed challenge-response test
02/10/2015US8955043 Type-preserving compiler for security verification
02/10/2015US8955042 Systems and methods for implementing transparent encryption
02/10/2015US8955040 Provisioning authorization claims using attribute-based access-control policies
02/10/2015US8955038 Methods and systems for controlling access to computing resources based on known security vulnerabilities
02/10/2015US8955037 Access management architecture
02/10/2015US8955035 Anonymous principals for policy languages
02/10/2015US8955008 Television decoding unit with multiple wireless access modules
02/10/2015US8954958 Method of configuring a virtual application
02/10/2015US8954804 Secure boot circuit and method
02/10/2015US8954760 Authentication of solution topology
02/10/2015US8954759 Secure spin torque transfer magnetic random access memory (STTMRAM)
02/10/2015US8954757 Method, host, storage, and machine-readable storage medium for protecting content
02/10/2015US8954756 Systems and methods for transformation of logical data objects for storage
02/10/2015US8954755 Memory address translation-based data encryption with integrated encryption engine
02/10/2015US8954754 Method and apparatus to process SHA-1 secure hashing algorithm
02/10/2015US8954752 Building and distributing secure object software
02/10/2015US8954751 Secure memory control parameters in table look aside buffer data fields and support memory array
02/10/2015US8954750 Secure PIN entry device
02/10/2015US8954749 Methods, systems, and product for hashing using twisted tabulation
02/10/2015US8954747 Protecting keystrokes received from a keyboard in a platform containing embedded controllers
02/10/2015US8954745 Method and apparatus for generating one-time passwords
02/10/2015US8954744 Verification methods and apparatus for use in providing application services to mobile communication devices
02/10/2015US8954742 Method and apparatus for digital authentication of valuable goods
02/10/2015US8954741 Apparatus and method for supporting family cloud in cloud computing system
02/10/2015US8954738 Method and device for verifying the integrity of platform software of an electronic device
02/10/2015US8954737 Method and apparatus for performing distributed privacy-preserving computations on user locations
02/10/2015US8954736 Limiting the functionality of a software program based on a security model
02/10/2015US8954734 Method for transmitting contents for contents management technology interworking, and recording medium for storing program thereof
02/10/2015US8954730 Establishing historical usage-based hardware trust
02/10/2015US8954729 Creating and using a specific user unique id for security login authentication
02/10/2015US8954722 Enforcing software updates in an electronic device
02/10/2015US8954720 IC chip, information processing apparatus, software module control method, information processing system, information processing method, and program
02/10/2015US8954716 Master security policy server
02/10/2015US8954696 Secure memory management system and method
02/10/2015US8954695 Secure pool memory management
02/10/2015US8954645 Storage writes in a mirrored virtual machine system
02/10/2015US8954624 Method and system for securing input from an external device to a host
02/10/2015US8954620 Techniques for using an assigned switch identification at an input/output device
02/10/2015US8954594 Communication device, communication method and program
02/10/2015US8954593 Method and device for implementing remote control of a terminal
02/10/2015US8954560 Incremental browser-based device fingerprinting
02/10/2015US8954559 System and method for extending IMS SCIM / service broker to enable application servers using MSCML to execute on CDMA win networks
02/10/2015US8954547 Method and system for updating the telecommunication network service access conditions of a telecommunication device
02/10/2015US8954513 Auditor system
02/10/2015US8954486 Secured identities collaboration system and method
02/10/2015US8954403 Systems and methods for transformation of logical data objects for storage
02/10/2015US8954301 System and method for configuring an aircraft passenger cabin
02/10/2015US8953851 Ocular biometric authentication with system verification
02/10/2015US8953845 Login method based on direction of gaze
02/10/2015US8953808 System and method for effectively performing data restore/migration procedures
02/10/2015US8953807 Method and apparatus for remotely provisioning software-based security coprocessors
02/10/2015US8953806 Method and apparatus for remotely provisioning software-based security coprocessors
02/10/2015US8953805 Authentication information generating system, authentication information generating method, client apparatus, and authentication information generating program for implementing the method
02/10/2015US8953799 Mobile device management
02/10/2015US8953796 Techniques for accessing features of a hardware adapter
02/10/2015US8953795 Forensic decryption tools
02/10/2015US8953790 Secure generation of a device root key in the field
02/10/2015US8953784 Lightweight stream cipher cryptosystems
02/10/2015US8953783 Arithmetic device
02/10/2015US8953646 Method and apparatus of multiplexing media streams
02/10/2015US8953330 Security protection device and method
02/10/2015US8953190 Automated method and system for holding and authenticating a device configuration change payload job
02/10/2015US8953178 Camera system with color display and processor for reed-solomon decoding
02/10/2015US8953061 Image capture device with linked multi-core processor and orientation sensor
02/10/2015US8953060 Hand held image capture device with multi-core processor and wireless interface to input device
02/10/2015US8952781 Method and apparatus for access control using dual biometric authentication
02/10/2015CA2825457C Secure reset of personal and service provider information on mobile devices
02/06/2015CA2870732A1 Digital activity recorder
02/05/2015WO2015017581A1 Centralized selective application approval for mobile devices
02/05/2015WO2015017219A1 Mobile computing device and wearable computing device having automatic access mode control
02/05/2015WO2015017217A1 Controlling a current access mode of a computing device based on a state of an attachment mechanism
02/05/2015WO2015017130A1 Raw sensor input encryption for passcode entry security
02/05/2015WO2015017121A1 Limited-access state for inadvertent inputs
02/05/2015WO2015017065A1 Coerced encryption on connected devices
02/05/2015WO2015017024A1 Irrelevant code identification
02/05/2015WO2015016994A1 System for processing an encrypted instruction stream in hardware
02/05/2015WO2015016952A1 Determining malware based on signal tokens
02/05/2015WO2015016940A1 Communication using over-the -top identities without centralized authority
02/05/2015WO2015016901A1 Signal tokens indicative of malware
02/05/2015WO2015016863A1 Protecting data in memory of a consumable product
02/05/2015WO2015016828A1 Data management
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 1193