Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
05/2014
05/08/2014WO2014069998A1 Method and system for protected exchange of data
05/08/2014WO2014069787A1 Security through metadata orchestrators
05/08/2014WO2014069777A1 Transit control for data
05/08/2014WO2014069226A1 Transaction device, transaction method and transaction system
05/08/2014WO2014068968A1 Information processing device
05/08/2014WO2014068862A1 Information processing apparatus, information processing system, information processing method and computer program
05/08/2014WO2014068792A1 Access control method and access control system
05/08/2014WO2014068632A1 Facility management device, facility management system and program
05/08/2014WO2014068618A1 Storage system and license management method
05/08/2014WO2014068576A1 Hierarchical code locking system
05/08/2014WO2014068362A1 Method and system for secure computer file management and storage having high level of usability
05/08/2014WO2014068336A1 Content protection
05/08/2014WO2014068305A1 Device and method for secure memory access
05/08/2014WO2014068173A1 Method and apparatus for providing attribution to the creators of the components in a compound media
05/08/2014WO2014068051A1 Method for the protected deposit of event protocol data of a computer system, computer programme product and computer system
05/08/2014WO2014068049A1 Method for the protected recovery of data, computer programme product and computer system
05/08/2014WO2014067945A1 Method and system for verifying the security of an application with a view to its use on a user apparatus
05/08/2014WO2014067760A1 Device for processing multimedia contents implementing a plurality of virtual machines
05/08/2014WO2014067428A1 Full life-cycle management method for sensitive data file based on fingerprint information implantation
05/08/2014WO2014067410A1 Method for rapidly generating coordinate point in embedded system
05/08/2014WO2014067102A1 Information coding method, system and computer-readable medium
05/08/2014WO2014066986A1 Data distribution methods and systems
05/08/2014WO2014066924A1 Content management system
05/08/2014WO2014041561A3 A system for analyzing applications in order to find security and quality issues
05/08/2014WO2014028226A3 System and method for software allocation based on forecasts and calendars
05/08/2014WO2014012106A3 Retroactively detecting malicious or undesirable software
05/08/2014WO2013188599A4 Securely communicating between a card reader and a mobile device
05/08/2014US20140130189 Transition between states in a processor
05/08/2014US20140130188 Techniques For Secure Storage Hijacking Protection
05/08/2014US20140130187 Protecting Systems from Unauthorized Access to System Resources Using Browser Independent Web Page Technology
05/08/2014US20140130186 Methods and systems for increasing the security of electronic messages
05/08/2014US20140130185 Methods And Systems For Processing Content Rights
05/08/2014US20140130184 System and Method for Providing Access to Verified Personal Background Data
05/08/2014US20140130183 Managing Confidential Information
05/08/2014US20140130182 Controlled Grant Of Access To Media Content
05/08/2014US20140130181 Drm system
05/08/2014US20140130180 Control of access to files
05/08/2014US20140130179 System and method for providing a multimedia degital rights transfer follow me service
05/08/2014US20140130178 Automated Determination of Quasi-Identifiers Using Program Analysis
05/08/2014US20140130177 System and method for creating a certified electronic record
05/08/2014US20140130176 Automatic software audit system and associated method
05/08/2014US20140130175 Data Leakage Detection in a Multi-Tenant Data Architecture
05/08/2014US20140130174 Application and Data Removal System
05/08/2014US20140130173 Expression rewriting for secure computation optimization
05/08/2014US20140130172 Systems and methods for automating blind detection of computational vulnerabilities
05/08/2014US20140130171 Method and system of processing application security
05/08/2014US20140130170 Information security audit method, system and computer readable storage medium for storing thereof
05/08/2014US20140130169 Identification of malicious activities through non-logged-in host usage
05/08/2014US20140130168 Antivirus system and method for removable media devices
05/08/2014US20140130161 System and Method for Cloud-Based Detection of Computer Malware
05/08/2014US20140130159 Methods and systems for detecting an electronic intrusion
05/08/2014US20140130158 Identification of malware detection signature candidate code
05/08/2014US20140130157 Method and system for discrete stateful behavioral analysis
05/08/2014US20140130156 Refinement-based security analysis
05/08/2014US20140130154 Sound and effective data-flow analysis in the presence of aliasing
05/08/2014US20140130152 Defense against dns dos attack
05/08/2014US20140130151 Methods for providing anti-rollback protection of a firmware version in a device which has no internal non-volatile memory
05/08/2014US20140130150 Content-based isolation for computing device security
05/08/2014US20140130149 Refinement-based security analysis
05/08/2014US20140130148 Information processing device, information processing method, and computer program
05/08/2014US20140130147 Enabling access to a subset of data
05/08/2014US20140130145 User device adding secure token to network requests
05/08/2014US20140130143 Mobile terminal and control method thereof
05/08/2014US20140130142 Method and Cloud Security Framework for Implementing Tenant License Verification
05/08/2014US20140130135 Integrated collaboration environment
05/08/2014US20140130134 Managing and Providing Access to Applications in an Application-Store Module
05/08/2014US20140130127 Risk Adjusted, Multifactor Authentication
05/08/2014US20140130123 Method for operating invisible system services on android platform
05/08/2014US20140130121 System and Method for Information Risk Management
05/08/2014US20140130060 User-level re-initialization instruction interception
05/08/2014US20140129954 Tailored System Management Interface
05/08/2014US20140129953 Apparatus and method for single action control of social network profile access
05/08/2014US20140129849 Semiconductor device including encryption section, semiconductor device including external interface, and content reproduction method
05/08/2014US20140129848 Method and Apparatus for Writing and Reading Hard Disk Data
05/08/2014US20140129847 Trusted Storage
05/08/2014US20140129846 Method and System for Protecting a Driver
05/08/2014US20140129845 Attribute based encryption using lattices
05/08/2014US20140129844 Storage security using cryptographic splitting
05/08/2014US20140129843 Methods and Apparatus for Managing Service Access Using a Touch-Display Device Integrated with Fingerprint Imager
05/08/2014US20140129842 Unauthorized contents detection system
05/08/2014US20140129836 Information distribution system and program for the same
05/08/2014US20140129832 Transparent real-time access to encrypted non-relational data
05/08/2014US20140129831 Computer-Implemented System And Method For Individual Message Encryption Using A Unique Key
05/08/2014US20140129817 Device booting with an initial protection component
05/08/2014US20140129656 Internet content marking
05/08/2014US20140129646 Method and apparatus for performing security control by using captured image
05/08/2014US20140129341 Customizable application functionality activity
05/08/2014US20140129282 Automatic License Entitlement Calculation
05/08/2014US20140125455 Systems and algorithms for classification of user based on their personal features
05/08/2014DE102012220268A1 Mobilgerät zum Konfigurieren eines anderen Gerätes, Verfahren zum Konfigurieren eines anderen Gerätes und entsprechende Anordnung mit mindestens einer Nahbereich-Kommunikationsverbindung Mobile device to configure another device, method for configuring another device and corresponding arrangement with at least one short-range communication link
05/08/2014DE102012110510A1 Verfahren zum geschützten Hinterlegen von Ereignisprotokoll-Daten eines Computersystems, Computerprogrammprodukt sowie Computersystem A method for protected Leave event log data of a computer system, computer program product and computer system
05/08/2014DE102012110507A1 Verfahren zum geschützten Wiederherstellen von Daten, Computerprogrammprodukt sowie Computersystem A method for recovering data protected, computer program product and computer system
05/08/2014DE102012023965A1 Verfahren und Vorrichtung zum Ausführen der Sicherheitssteuerung durch verwenden eines erfassten Bilds Method and apparatus for performing the safety controller by use of a captured image
05/07/2014EP2728919A1 Digital communication device and anti-theft method thereof
05/07/2014EP2728891A2 Systems and methods for distributed authentication of video services
05/07/2014EP2728825A1 Terminal apparatus with DRM decoding function and DRM decoding method in terminal apparatus
05/07/2014EP2728509A2 Semiconductor Device and Encryption Key Writing Method
05/07/2014EP2728508A1 Dynamic data masking
05/07/2014EP2728507A1 Method and system for enabling and disabling execution of computer instructions
05/07/2014EP2728506A1 Apparatus & method for facilitating container-based management