Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
05/2014
05/22/2014WO2014077914A2 System and method for ensuring compliance with organizational policies
05/22/2014WO2014077808A1 Enhanced server/client login method
05/22/2014WO2014077702A1 Security system and method for operating systems
05/22/2014WO2014077698A1 Signature porting
05/22/2014WO2014077657A1 Method and system for authenticating stamp touch
05/22/2014WO2014077615A1 Anti-malware system, method of processing packet in the same, and computing device
05/22/2014WO2014077614A1 Anti-malware system, method of processing data in the same, and computing device
05/22/2014WO2014077611A1 A device and method of controlling the device
05/22/2014WO2014077474A1 Apparatus and method for managing security content using virtual folder
05/22/2014WO2014077048A1 Reproduction device, control device, control method, and control program
05/22/2014WO2014076940A1 Service provision system, network server, and proxy server
05/22/2014WO2014076927A1 Method used in system for remotely operating device
05/22/2014WO2014076773A1 Network filtering device, and filtering method
05/22/2014WO2014076604A1 Method and apparatus for managing a transaction right
05/22/2014WO2014076255A1 Network based collaborative interactive activity
05/22/2014WO2014076176A1 Computer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method
05/22/2014WO2014076175A1 Computer system for storing and retrieval of encrypted data items using a tablet computer and computer-implemented method
05/22/2014WO2014076116A1 Manipulation-proof installation of building control software in authorised runtime environments
05/22/2014WO2014075944A1 Biometric system with body coupled communication interface
05/22/2014WO2014075891A1 Method to counter side channel attack on sensitive data
05/22/2014WO2014075836A1 Pseudonymisation and re-identification of identifiers
05/22/2014WO2014075818A1 Area of responsibility based access in control systems
05/22/2014WO2014075704A1 Method and automation arrangement for controlling the data traffic between data processing devices
05/22/2014WO2014075527A1 Method, device and system for performing redundancy backup among network virtualization edge devices
05/22/2014WO2014075504A1 Security control method and device for running application
05/22/2014WO2014049499A3 Identifying whether an application is malicious
05/22/2014WO2014044403A3 A security module and a method for optimum memory utilization
05/22/2014WO2014044187A3 A method and device for checking and removing computer viruses
05/22/2014US20140143896 Digital Certificate Based Theft Control for Computers
05/22/2014US20140143895 System and method for loading application classes
05/22/2014US20140143893 Method for Authentication for In-Store Reading
05/22/2014US20140143892 Architecture System for In-Store Reading
05/22/2014US20140143891 Context-based security screening for accessing data
05/22/2014US20140143890 Dynamic constraints for content rights
05/22/2014US20140143888 Method and system for software licensing under machine virtualization
05/22/2014US20140143887 Security measures for data protection
05/22/2014US20140143886 Personal Data Management System With Sharing Revocation
05/22/2014US20140143885 Firmware-implemented software licensing
05/22/2014US20140143884 System and method for protecting data stored on a removable data storage device
05/22/2014US20140143883 Preventing Data Extraction by Side-Channel Attack
05/22/2014US20140143882 Systems and methods for preserving privacy for web applications
05/22/2014US20140143881 Implementing conductive microcapsule rupture to generate a tamper event for data theft prevention
05/22/2014US20140143880 Global Variable Security Analysis
05/22/2014US20140143879 Security Capability Reference Model for Goal-based Gap Analysis
05/22/2014US20140143878 Security Capability Reference Model for Goal-based Gap Analysis
05/22/2014US20140143877 Data identification system
05/22/2014US20140143876 Virus co-processor instructions and methods for using such
05/22/2014US20140143875 Detecting Application Behavior
05/22/2014US20140143869 Using telemetry to reduce malware definition package size
05/22/2014US20140143868 Monitoring for anomalies in a computing environment
05/22/2014US20140143865 Software identification
05/22/2014US20140143863 Enhanced network security
05/22/2014US20140143862 Mechanisms to secure data on hard reset of device
05/22/2014US20140143861 Computer with safeguard function
05/22/2014US20140143860 Two tier verification system and method
05/22/2014US20140143859 Unlock touch screen using touch password
05/22/2014US20140143858 Processing arrangement and a method for processing information in a machine-to-human communications interface
05/22/2014US20140143857 Methods for granting access to resources modifiable by users in a computer environment, and resources structured therefore
05/22/2014US20140143856 Operational shortcuts for computing devices
05/22/2014US20140143845 System and Method for Password Recovery
05/22/2014US20140143844 Secure Access by a User to a Resource
05/22/2014US20140143842 System and Method for Component Authentication of a Secure Client Hosted Virtualization in an Information Handling System
05/22/2014US20140143839 On board vehicle remote control module
05/22/2014US20140143838 Personal Data Management System With Global Data Store
05/22/2014US20140143836 Extended OAuth Architecture
05/22/2014US20140143830 Inspecting Code and Reducing Code Size Associated to a Target
05/22/2014US20140143829 Automated local exception rule generation system, method and computer program product
05/22/2014US20140143827 Malicious Mobile Code Runtime Monitoring System and Methods
05/22/2014US20140143826 Policy-based techniques for managing access control
05/22/2014US20140143825 Reputation-Based In-Network Filtering of Client Event Information
05/22/2014US20140143722 Identity Based User Interface
05/22/2014US20140143552 Glitch Resistant Device
05/22/2014US20140143551 Encoding biometric identification information into digital files
05/22/2014US20140143550 Securing speech recognition data
05/22/2014US20140143546 Request-specific authentication for accessing web service resources
05/22/2014US20140143544 Rights enforcement and usage reporting on a client device
05/22/2014US20140143541 Method and Apparatus for Managing Encrypted Files in Network System
05/22/2014US20140143540 Method and Apparatus for Splitting and Encrypting Files in Computer Device
05/22/2014US20140143535 Authenticated file handles for network file systems
05/22/2014US20140143156 Computer architecture for managing courseware in a shared use operating environment
05/22/2014US20140143153 Information distribution apparatus, information distribution system, information distribution method, and recording medium
05/22/2014US20140143149 Contextualized Access Control
05/22/2014US20140143103 Methods and apparatus for complementing user entries associated with events of interest through context
05/22/2014US20140140587 "home" button with integrated user biometric sensing and verification system for mobile device
05/22/2014US20140140505 System and methods for generating unclonable security keys in integrated circuits
05/22/2014US20140139318 Mapping Biometrics To A Unique Key
05/22/2014DE112011105393T5 Systen und Verfahren zum Steuern des Zugriffs auf geschützte Inhalte Systen and method for controlling access to protected content
05/22/2014DE102013222384A1 Sicherheits-Screening auf Kontextgrundlage für Zugriff auf Daten Security screening on context basis for access to data
05/22/2014DE102013112417A1 Verarbeitungsanordnung und Verfahren für die Verarbeitung von Informationen in einer Mensch-Maschine-Kommunikationsschnittstelle Processing device and method for processing information in a human-machine communication interface
05/22/2014DE102013112157A1 Device for authenticating authority of users to access image processing system in factory, accesses user access level of camera, so that privileges corresponding to functions whose execution is allowed on camera are allowed to be used
05/22/2014DE102012022874A1 Applikationsinstallation Application Installation
05/21/2014EP2733884A1 Communication device, communication method, communication system, and computer program
05/21/2014EP2733638A1 Security authorization queries
05/21/2014EP2733637A1 Method to counter side channel attack on sensitive data
05/21/2014EP2733636A1 Secure screen lock with pressure pattern
05/21/2014EP2733635A2 Mobile communications device providing heuristic security authentication features and related methods
05/21/2014EP2733594A1 Method and apparatus for unlocking mobile terminal
05/21/2014EP2732636A2 Method and apparatus for providing content to an earpiece in accordance with a privacy filter and content selection rule
05/21/2014EP2732415A1 A security device and a method for supporting validation in a validation process for an end user interacting with a web site
05/21/2014EP2732400A1 Method and system for verifying an access request