Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
05/2014
05/20/2014US8732821 Method and apparatus for preventing accidential disclosure of confidential information via visual representation objects
05/20/2014US8732820 Method for inputting usernames and passwords to access or use different assets
05/20/2014US8732819 Method and a device for generating a secret value
05/20/2014US8732814 Method and apparatus for token-based packet prioritization
05/20/2014US8732812 Method of operating an item of on-board equipment, associated equipment and aircraft comprising such equipment
05/20/2014US8732811 Systems and methods for implementing security services
05/20/2014US8732810 IP push platform and connection protocol in a push notification framework
05/20/2014US8732809 System, server device, method, program, and recording medium that enable facilitation of user authentication
05/20/2014US8732807 Method and system using a cyber ID to provide secure transactions
05/20/2014US8732806 Method and system for hardware enforced virtualization in an integrated circuit
05/20/2014US8732805 Re-authentication in secure web service conversations
05/20/2014US8732789 Portable security policy and environment
05/20/2014US8732483 Methods and apparatus for securing keystrokes from being intercepted between the keyboard and a browser
05/20/2014US8732482 Incremental encryption of stored information
05/20/2014US8732478 Uniform modular framework for a host computer system
05/20/2014US8732477 Graphical image authentication and security system
05/20/2014US8732476 Automatic intervention
05/20/2014US8732471 Data communication method, computer and information storing medium
05/20/2014US8732469 Communication cutoff device, server device and method
05/20/2014US8732468 Protecting hardware circuit design by secret sharing
05/20/2014US8732461 Client apparatus, server apparatus, and program using entity authentication and biometric authentication
05/20/2014US8732455 Method and system for securing against leakage of source code
05/20/2014US8732452 Secure message delivery using a trust broker
05/20/2014US8732445 Information processing device, information processing method, information processing program, and integrated circuit
05/20/2014US8732284 Data serialization in a user switching environment
05/20/2014US8732122 Bonding contents on separate storage media
05/20/2014US8732086 Method and system for managing rights for digital music
05/20/2014US8731938 Computer-implemented system and method for identifying and masking special information within recorded speech
05/20/2014US8731471 Communication system and method, information processing terminal and method, and information processing device and method
05/20/2014US8731202 Storage-medium processing method, a storage-medium processing apparatus, and a storage-medium processing program
05/20/2014US8731191 Data encryption method and system and data decryption method
05/20/2014US8730009 Smart card and mobile communication device comprising the smart card
05/20/2014US8730008 Authentication method
05/20/2014US8729922 Licensing programmable hardware sub-designs using a host-identifier
05/20/2014CA2813167C Enabling users to select between secure service providers using a central trusted service manager
05/20/2014CA2682249C Methods and systems for internet security via virtual software
05/20/2014CA2418050C Linking public key of device to information during manufacture
05/20/2014CA2362786C Method and apparatus for information processing, and medium for storing program
05/15/2014WO2014075056A2 Using temporary access codes
05/15/2014WO2014074738A1 Personalized data management systems and methods
05/15/2014WO2014074674A1 Methods for providing anti-rollback protection in a device which has no internal non-volatile memory
05/15/2014WO2014074633A1 Single-pass data compression and encryption
05/15/2014WO2014074355A1 Colcked charge domain logic
05/15/2014WO2014074310A1 Protecting systems from unauthorized access to system resources using browser independent web page technology
05/15/2014WO2014074239A2 Method and system for sharing vpn connections between applications
05/15/2014WO2014074127A1 An improved implementation of robust and secure content protection in a system-on-a-chip apparatus
05/15/2014WO2014074041A1 Methods and nodes for verification of data
05/15/2014WO2014073617A1 Data communications system, data analysis device, data communications method, and program
05/15/2014WO2014073499A1 Information management device, information management system, information management method, and recording medium
05/15/2014WO2014073370A1 Information processing device, information processing method, and computer program
05/15/2014WO2014073256A1 Information processing system and information processing method
05/15/2014WO2014073214A1 Information processing system that analyzes personal information, and method for analyzing personal information
05/15/2014WO2014073171A1 Public post approval request method, public post approval request system, and public post approval request server
05/15/2014WO2014072579A1 Partially virtualizing pcr banks in mobile tpm
05/15/2014WO2014072574A1 Method and apparatus for privacy-oriented code optimization
05/15/2014WO2014072535A1 Method of identification
05/15/2014WO2014072312A1 Method and system for executing applications in an untrusted environment
05/15/2014WO2014072209A1 Compiler generating operator free code
05/15/2014WO2014071705A1 Fingerprint connector and fingerprint authentication system
05/15/2014WO2013184191A3 In-library lending activation
05/15/2014US20140137273 System and method for securing the upload of files from a system server
05/15/2014US20140137272 Limiting Information Leakage and Piracy due to Virtual Machine Cloning
05/15/2014US20140137269 Requesting access to restricted objects by a remote computer
05/15/2014US20140137268 Rights control method and apparatus for digital living network alliance
05/15/2014US20140137266 Access system and method thereof
05/15/2014US20140137265 System and Method For Securing Critical Data In A Remotely Accessible Database
05/15/2014US20140137264 Method and apparatus for privacy-oriented code optimization
05/15/2014US20140137263 Information processing apparatus with hibernation function, control method therefor, and storage medium storing control program therefor
05/15/2014US20140137262 Secure data copying
05/15/2014US20140137261 Methods and Apparatus for Software License Management
05/15/2014US20140137260 Privacy Preserving Statistical Analysis for Distributed Databases
05/15/2014US20140137259 Methods and apparatus for software license management
05/15/2014US20140137257 System, Method and Apparatus for Assessing a Risk of One or More Assets Within an Operational Technology Infrastructure
05/15/2014US20140137256 Security analysis using relational abstraction of data structures
05/15/2014US20140137255 Method, System, and Apparatus for Detecting Malicious Code
05/15/2014US20140137253 Security method and apparatus
05/15/2014US20140137252 Method and system for unlocking and deleting file and folder
05/15/2014US20140137251 System for identifying malicious code of high risk
05/15/2014US20140137249 Dynamic Selection and Loading of Anti-Malware Signatures
05/15/2014US20140137248 Client Token Storage for Cross-Site Request Forgery Protection
05/15/2014US20140137247 Limiting Information Leakage and Piracy due to Virtual Machine Cloning
05/15/2014US20140137246 Application-Level Anomaly Detection
05/15/2014US20140137244 Runtime Based Application Security and Regulatory Compliance in Cloud Environment
05/15/2014US20140137243 Automated security analytics platform with visualization agnostic selection linked portlets
05/15/2014US20140137238 Method and system for tracing information leaks in organizations through syntactic and linguistic signatures
05/15/2014US20140137237 Single system image via shell database
05/15/2014US20140137235 Proximity Based Device Security
05/15/2014US20140137234 Mobile device authentication through touch-based gestures
05/15/2014US20140137233 Key with integral biometric input device
05/15/2014US20140137231 INCORPORATING ACCESS CONTROL FUNCTIONALITY INTO A SYSTEM ON A CHIP (SoC)
05/15/2014US20140137230 Provisioning proxy for provisioning data on hardware resources
05/15/2014US20140137228 Web application vulnerability scanning
05/15/2014US20140137223 Method and apparatus for authenticating users of a hybrid terminal
05/15/2014US20140137220 Obtaining Password Data
05/15/2014US20140137218 Managing security credentials for scaled-out services
05/15/2014US20140137217 Verifying an individual using information from a social network
05/15/2014US20140137216 Password mismatch warning method and apparatus
05/15/2014US20140137209 Module for managing a transaction between a terminal and an electronic device
05/15/2014US20140137203 Automatically generating challenge questions inferred from user history data for user authentication
05/15/2014US20140137190 Methods and systems for passively detecting security levels in client devices