Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
05/2014
05/01/2014US20140123303 Dynamic data masking
05/01/2014US20140123302 Device and method for concealing customer information from a customer service representative
05/01/2014US20140123300 Methods and systems for managing services and device data
05/01/2014US20140123299 Methods and systems for managing one or more services and/or device data
05/01/2014US20140123298 Methods and systems for managing services and device data
05/01/2014US20140123297 Terminal apparatus with drm decoding function and drm decoding method in terminal apparatus
05/01/2014US20140123295 Systems and methods for advanced dynamic analysis scanning
05/01/2014US20140123292 Transit control for data
05/01/2014US20140123291 Weighted security analysis
05/01/2014US20140123290 Method, device and system for processing computer virus
05/01/2014US20140123287 Securing thermal management parameters in firmware from cyber attack
05/01/2014US20140123286 Detection Of Return Oriented Programming Attacks
05/01/2014US20140123285 Software exploit detection
05/01/2014US20140123284 Unpacking javascript with an actionscript emulator
05/01/2014US20140123283 Detection of heap spraying by flash with an actionscript emulator
05/01/2014US20140123282 Unpacking flash exploits with an actionscript emulator
05/01/2014US20140123281 Detection of return oriented programming attacks
05/01/2014US20140123280 Runtime detection of self-replicating malware
05/01/2014US20140123279 Dynamic quarantining for malware detection
05/01/2014US20140123278 Denial-of-service attack protection
05/01/2014US20140123276 Automation system access control system and method
05/01/2014US20140123275 System and method for disabling secure access to an electronic device using detection of a predetermined device orientation
05/01/2014US20140123274 Password Setting and Verification
05/01/2014US20140123273 Contextual Device Locking/Unlocking
05/01/2014US20140123272 System and Method For Accessing A Restricted Object
05/01/2014US20140123271 Image processing apparatus, access control method, and storage medium
05/01/2014US20140123259 System and Method for Providing Access to a Software Application
05/01/2014US20140123258 Device and method for authenticating a user
05/01/2014US20140123256 System and Method for Human Identity Validation via a Mobile Device
05/01/2014US20140123255 System and method for device authentication with built-in tolerance
05/01/2014US20140123254 Website relationship and sharing account
05/01/2014US20140123253 Behavioral Fingerprinting Via Inferred Personal Relation
05/01/2014US20140123249 Behavioral Fingerprinting Via Corroborative User Device
05/01/2014US20140123248 Communication between authentication plug-ins of a single-point authentication manager and client systems
05/01/2014US20140123243 System, method and computer program product for authenticating and authorizing an external entity
05/01/2014US20140123242 BUSINESS METHOD INCLUDING HANDSHAKE PROTOCOL TO CONTROL ACTORS AND FUNCTIONS TO PROPAGATE ACCEPTANCE OF AN IP LICENSE TO SECURELY AUTHENTICATE SOFTWARE APPLICATION PROGRAM INTERFACES (APIs)
05/01/2014US20140123235 Allocating Memory Access Control Policies
05/01/2014US20140123234 User terminal, reliability management server, and method and program for preventing unauthorized remote operation
05/01/2014US20140123233 Verification of network device position
05/01/2014US20140123232 Providing network access to a device associated with a user account
05/01/2014US20140123231 Extending authentication and authorization capabilities of an application without code changes
05/01/2014US20140123230 Virtual relay device for providing a secure connection to a remote device
05/01/2014US20140123229 Antenna/actuation key assembly
05/01/2014US20140123222 Method and system for facilitating controlled access to network services
05/01/2014US20140123221 Secure connection for a remote device through a virtual relay device
05/01/2014US20140123220 BUSINESS METHOD INCLUDING CHALLENGE-RESPONSE SYSTEM TO SECURELY AUTHENTICATE SOFTWARE APPLICATION PROGRAM INTERFACES (APIs)
05/01/2014US20140123218 System for controlling access and distribution of digital property
05/01/2014US20140123214 Establishing and Maintaining an Authenticated Connection Between a Smart Pen and a Computing Device
05/01/2014US20140123209 Input/output gatekeeping
05/01/2014US20140123208 Privacy aware camera and device status indicator system
05/01/2014US20140123207 Keystore access control system
05/01/2014US20140123206 System and method for writing to removable media
05/01/2014US20140122903 Semiconductor device and encryption key writing method
05/01/2014US20140122901 Device and Method For Secure Memory Access
05/01/2014US20140122900 Providing searching over encrypted keywords in a database
05/01/2014US20140122899 Information processing apparatus, information processing method, computer program, and information processing system
05/01/2014US20140122898 Hash value generation apparatus
05/01/2014US20140122896 Data encryption method
05/01/2014US20140122895 Providing Security Support for Digital Rights Management in Different Formats
05/01/2014US20140122881 Method and system for controlling a device
05/01/2014US20140122879 Secure computing system
05/01/2014US20140122867 Encryption and decryption of user data across tiered self-encrypting storage devices
05/01/2014US20140122859 Configuring configuration settings using a user context
05/01/2014US20140122820 System-on-chip processing secure contents and mobile device comprising the same
05/01/2014US20140122508 Systems and methods for secure storage of user information in a user profile
05/01/2014US20140122342 Host based content security and protection
05/01/2014US20140122123 Controlling Access to Medical Records
05/01/2014US20140118774 Image forming apparatus, instruction execution method, and printing system
05/01/2014US20140118147 Directional sensing mechanism and communications authentication
05/01/2014CA2794132A1 Configuring configuration settings using a user context
04/2014
04/30/2014EP2725835A1 Method for authenticating a user
04/30/2014EP2725532A1 Contextual device locking/unlocking
04/30/2014EP2725518A1 Method and apparatus for securing and segregating host to host messaging on pcie fabric
04/30/2014EP2725517A1 System-on-chip processing secure contents and mobile device comprising the same
04/30/2014EP2725516A2 Privacy preserving registry browsing
04/30/2014EP2725515A1 Privacy preserving data querying
04/30/2014EP2725514A2 Security information sharing system and execution method thereof
04/30/2014EP2725513A1 Managing permission settings applied to applications
04/30/2014EP2725512A1 System and method for malware detection using multi-dimensional feature clustering
04/30/2014EP2725511A1 Managing application execution and data access on a device
04/30/2014EP2725510A1 Method, system and relevant device for detecting malicious codes
04/30/2014EP2725486A1 System and method for accessing a restricted object
04/30/2014EP2725480A2 Image forming apparatus and controlling method thereof
04/30/2014EP2725473A1 Method, apparatus and computer-readable medium for switching a mobile device screen from lock to unlocked state
04/30/2014EP2724509A1 Method for detecting attacks and for protection
04/30/2014EP2724286A1 Method for provisioning cryptographic keys during manufacturing
04/30/2014EP2724285A1 Method for plagiarism protection and arrangement for carrying out said method
04/30/2014EP2724284A1 Access control architecture
04/30/2014EP2724283A1 Retrieval of data across multiple partitions of a storage device using digital signatures
04/30/2014EP2724282A1 Fast start of streaming digital media playback with deferred license retrieval
04/30/2014EP2724281A1 Method for communicating data in a vehicle, and system for operating a mobile device in a vehicle
04/30/2014EP2724280A2 Persistent key access to a resources in a collection
04/30/2014EP2724279A1 System, method and apparatus for facilitating resource security
04/30/2014EP2724229A1 Service for adding functionality to applications
04/30/2014EP2602735A9 Secure authentication
04/30/2014DE102012021395A1 Method for encrypting data in computer program for data processing system with memory size variation, involves encrypting and storing or only storing content values by mathematical accounting and/or logic function with part of password
04/30/2014CN203573421U ATM (automatic teller machine) input device
04/30/2014CN203573321U Current-limiting protection regulating circuit applicable to computer
04/30/2014CN203573320U Electronic document encryption equipment
04/30/2014CN103765820A Systems and methods for evaluation of events based on a reference baseline according to temporal position in a sequence of events