Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
05/22/2014 | WO2014077914A2 System and method for ensuring compliance with organizational policies |
05/22/2014 | WO2014077808A1 Enhanced server/client login method |
05/22/2014 | WO2014077702A1 Security system and method for operating systems |
05/22/2014 | WO2014077698A1 Signature porting |
05/22/2014 | WO2014077657A1 Method and system for authenticating stamp touch |
05/22/2014 | WO2014077615A1 Anti-malware system, method of processing packet in the same, and computing device |
05/22/2014 | WO2014077614A1 Anti-malware system, method of processing data in the same, and computing device |
05/22/2014 | WO2014077611A1 A device and method of controlling the device |
05/22/2014 | WO2014077474A1 Apparatus and method for managing security content using virtual folder |
05/22/2014 | WO2014077048A1 Reproduction device, control device, control method, and control program |
05/22/2014 | WO2014076940A1 Service provision system, network server, and proxy server |
05/22/2014 | WO2014076927A1 Method used in system for remotely operating device |
05/22/2014 | WO2014076773A1 Network filtering device, and filtering method |
05/22/2014 | WO2014076604A1 Method and apparatus for managing a transaction right |
05/22/2014 | WO2014076255A1 Network based collaborative interactive activity |
05/22/2014 | WO2014076176A1 Computer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method |
05/22/2014 | WO2014076175A1 Computer system for storing and retrieval of encrypted data items using a tablet computer and computer-implemented method |
05/22/2014 | WO2014076116A1 Manipulation-proof installation of building control software in authorised runtime environments |
05/22/2014 | WO2014075944A1 Biometric system with body coupled communication interface |
05/22/2014 | WO2014075891A1 Method to counter side channel attack on sensitive data |
05/22/2014 | WO2014075836A1 Pseudonymisation and re-identification of identifiers |
05/22/2014 | WO2014075818A1 Area of responsibility based access in control systems |
05/22/2014 | WO2014075704A1 Method and automation arrangement for controlling the data traffic between data processing devices |
05/22/2014 | WO2014075527A1 Method, device and system for performing redundancy backup among network virtualization edge devices |
05/22/2014 | WO2014075504A1 Security control method and device for running application |
05/22/2014 | WO2014049499A3 Identifying whether an application is malicious |
05/22/2014 | WO2014044403A3 A security module and a method for optimum memory utilization |
05/22/2014 | WO2014044187A3 A method and device for checking and removing computer viruses |
05/22/2014 | US20140143896 Digital Certificate Based Theft Control for Computers |
05/22/2014 | US20140143895 System and method for loading application classes |
05/22/2014 | US20140143893 Method for Authentication for In-Store Reading |
05/22/2014 | US20140143892 Architecture System for In-Store Reading |
05/22/2014 | US20140143891 Context-based security screening for accessing data |
05/22/2014 | US20140143890 Dynamic constraints for content rights |
05/22/2014 | US20140143888 Method and system for software licensing under machine virtualization |
05/22/2014 | US20140143887 Security measures for data protection |
05/22/2014 | US20140143886 Personal Data Management System With Sharing Revocation |
05/22/2014 | US20140143885 Firmware-implemented software licensing |
05/22/2014 | US20140143884 System and method for protecting data stored on a removable data storage device |
05/22/2014 | US20140143883 Preventing Data Extraction by Side-Channel Attack |
05/22/2014 | US20140143882 Systems and methods for preserving privacy for web applications |
05/22/2014 | US20140143881 Implementing conductive microcapsule rupture to generate a tamper event for data theft prevention |
05/22/2014 | US20140143880 Global Variable Security Analysis |
05/22/2014 | US20140143879 Security Capability Reference Model for Goal-based Gap Analysis |
05/22/2014 | US20140143878 Security Capability Reference Model for Goal-based Gap Analysis |
05/22/2014 | US20140143877 Data identification system |
05/22/2014 | US20140143876 Virus co-processor instructions and methods for using such |
05/22/2014 | US20140143875 Detecting Application Behavior |
05/22/2014 | US20140143869 Using telemetry to reduce malware definition package size |
05/22/2014 | US20140143868 Monitoring for anomalies in a computing environment |
05/22/2014 | US20140143865 Software identification |
05/22/2014 | US20140143863 Enhanced network security |
05/22/2014 | US20140143862 Mechanisms to secure data on hard reset of device |
05/22/2014 | US20140143861 Computer with safeguard function |
05/22/2014 | US20140143860 Two tier verification system and method |
05/22/2014 | US20140143859 Unlock touch screen using touch password |
05/22/2014 | US20140143858 Processing arrangement and a method for processing information in a machine-to-human communications interface |
05/22/2014 | US20140143857 Methods for granting access to resources modifiable by users in a computer environment, and resources structured therefore |
05/22/2014 | US20140143856 Operational shortcuts for computing devices |
05/22/2014 | US20140143845 System and Method for Password Recovery |
05/22/2014 | US20140143844 Secure Access by a User to a Resource |
05/22/2014 | US20140143842 System and Method for Component Authentication of a Secure Client Hosted Virtualization in an Information Handling System |
05/22/2014 | US20140143839 On board vehicle remote control module |
05/22/2014 | US20140143838 Personal Data Management System With Global Data Store |
05/22/2014 | US20140143836 Extended OAuth Architecture |
05/22/2014 | US20140143830 Inspecting Code and Reducing Code Size Associated to a Target |
05/22/2014 | US20140143829 Automated local exception rule generation system, method and computer program product |
05/22/2014 | US20140143827 Malicious Mobile Code Runtime Monitoring System and Methods |
05/22/2014 | US20140143826 Policy-based techniques for managing access control |
05/22/2014 | US20140143825 Reputation-Based In-Network Filtering of Client Event Information |
05/22/2014 | US20140143722 Identity Based User Interface |
05/22/2014 | US20140143552 Glitch Resistant Device |
05/22/2014 | US20140143551 Encoding biometric identification information into digital files |
05/22/2014 | US20140143550 Securing speech recognition data |
05/22/2014 | US20140143546 Request-specific authentication for accessing web service resources |
05/22/2014 | US20140143544 Rights enforcement and usage reporting on a client device |
05/22/2014 | US20140143541 Method and Apparatus for Managing Encrypted Files in Network System |
05/22/2014 | US20140143540 Method and Apparatus for Splitting and Encrypting Files in Computer Device |
05/22/2014 | US20140143535 Authenticated file handles for network file systems |
05/22/2014 | US20140143156 Computer architecture for managing courseware in a shared use operating environment |
05/22/2014 | US20140143153 Information distribution apparatus, information distribution system, information distribution method, and recording medium |
05/22/2014 | US20140143149 Contextualized Access Control |
05/22/2014 | US20140143103 Methods and apparatus for complementing user entries associated with events of interest through context |
05/22/2014 | US20140140587 "home" button with integrated user biometric sensing and verification system for mobile device |
05/22/2014 | US20140140505 System and methods for generating unclonable security keys in integrated circuits |
05/22/2014 | US20140139318 Mapping Biometrics To A Unique Key |
05/22/2014 | DE112011105393T5 Systen und Verfahren zum Steuern des Zugriffs auf geschützte Inhalte Systen and method for controlling access to protected content |
05/22/2014 | DE102013222384A1 Sicherheits-Screening auf Kontextgrundlage für Zugriff auf Daten Security screening on context basis for access to data |
05/22/2014 | DE102013112417A1 Verarbeitungsanordnung und Verfahren für die Verarbeitung von Informationen in einer Mensch-Maschine-Kommunikationsschnittstelle Processing device and method for processing information in a human-machine communication interface |
05/22/2014 | DE102013112157A1 Device for authenticating authority of users to access image processing system in factory, accesses user access level of camera, so that privileges corresponding to functions whose execution is allowed on camera are allowed to be used |
05/22/2014 | DE102012022874A1 Applikationsinstallation Application Installation |
05/21/2014 | EP2733884A1 Communication device, communication method, communication system, and computer program |
05/21/2014 | EP2733638A1 Security authorization queries |
05/21/2014 | EP2733637A1 Method to counter side channel attack on sensitive data |
05/21/2014 | EP2733636A1 Secure screen lock with pressure pattern |
05/21/2014 | EP2733635A2 Mobile communications device providing heuristic security authentication features and related methods |
05/21/2014 | EP2733594A1 Method and apparatus for unlocking mobile terminal |
05/21/2014 | EP2732636A2 Method and apparatus for providing content to an earpiece in accordance with a privacy filter and content selection rule |
05/21/2014 | EP2732415A1 A security device and a method for supporting validation in a validation process for an end user interacting with a web site |
05/21/2014 | EP2732400A1 Method and system for verifying an access request |