Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
04/2014
04/29/2014US8713648 Information processing apparatus capable of authentication processing with improved user convenience, control program for information processing apparatus, and recording medium having control program for information processing apparatus recorded thereon
04/29/2014US8713647 End-of-session authentication
04/29/2014US8713644 System and method for providing security in browser-based access to smart cards
04/29/2014US8713643 Method and devices for handling access privileges
04/29/2014US8713636 Computer network running a distributed application
04/29/2014US8713631 System and method for detecting malicious code executed by virtual machine
04/29/2014US8713629 Method for accessing wireless network
04/29/2014US8713628 Method and system for providing cloud based network security services
04/29/2014US8713626 Network client validation of network management frames
04/29/2014US8713543 Evaluation compiler method
04/29/2014US8713525 Software management system for network data processing systems
04/29/2014US8713450 Detecting patterns of abuse in a virtual environment
04/29/2014US8713327 Circuit for and method of enabling communication of cryptographic data
04/29/2014US8713325 Key management using quasi out of band authentication architecture
04/29/2014US8713324 Systems and methods for tracking mobile terrestrial terminals for satellite communications
04/29/2014US8713322 Author signatures for legal purposes
04/29/2014US8713310 Method and device for authenticating transmitted user data
04/29/2014US8713309 System and method for distributed security
04/29/2014US8713304 Method and system for controlled media sharing in a network
04/29/2014US8713089 Dynamic lookup service in a distributed system
04/29/2014US8712915 System and method for providing private demand-driven pricing
04/29/2014US8712825 Web-based royalty system and user interface
04/29/2014US8712057 Apparatus and method for an iterative cryptographic block
04/29/2014US8712048 Information recording medium and information processing method for accessing content with license or copyright protection
04/29/2014US8711176 Virtual billboards
04/29/2014CA2715439C Use of media storage structure with multiple pieces of content in a content-distribution system
04/29/2014CA2652221C Combining virus checking and replication filtration
04/29/2014CA2624207C Enhanced handling of duress situations
04/26/2014CA2831194A1 Multi-factor untethered standalone authentication device
04/26/2014CA2831193A1 Methods and systems for capturing biometric data
04/24/2014WO2014063133A1 Real-time module protection
04/24/2014WO2014063129A1 Providing a virtual security appliance architecture to a virtual cloud infrastructure
04/24/2014WO2014063126A1 Data loss prevention for mobile computing devices
04/24/2014WO2014063124A1 Mobile application management
04/24/2014WO2014063121A1 Personal safety and emergency services
04/24/2014WO2014063110A1 Network infrastructure obfuscation
04/24/2014WO2014063082A1 Premises aware security
04/24/2014WO2014063050A1 Encrypted data inspection in a network environment
04/24/2014WO2014063030A1 Computerized method and system for managing networked secure collaborative exchange environment
04/24/2014WO2014062979A1 Storing and accessing licensing information in operating system-independent storage
04/24/2014WO2014062964A1 Application modes determined from previous and current states of a license
04/24/2014WO2014062804A1 Application wrapping for application management framework
04/24/2014WO2014062629A1 System and method for correlating security events with subscriber information in a mobile network environment
04/24/2014WO2014062592A1 License information access based on developer profiles
04/24/2014WO2014062420A1 Controlling mobile device access to secure data
04/24/2014WO2014062395A1 Configuring and providing profiles that manage execution of mobile applications
04/24/2014WO2014062340A1 Transitioning between access states of a computing device
04/24/2014WO2014062252A1 Secure disk access control
04/24/2014WO2014062178A1 Unauthorized access and/or instruction prevention, detection, and/or remediation, at least in part, by storage processor
04/24/2014WO2014062136A1 Cipher devices and cipher methods
04/24/2014WO2014062093A1 Method for signing electronic documents with an analog-digital signature with additional verification
04/24/2014WO2014061895A1 Electronic signing method based on biometric information recognition and method for verifying electronically signed electronic document based on said biometric information recognition, and terminal, server, and computer-readable recording medium using same
04/24/2014WO2014061622A1 Biometric authentication server and method for managing operation of biometric authentication
04/24/2014WO2014061326A1 Security-function-design support device, security-function-design support method, and program
04/24/2014WO2014061325A1 Security-function-design support device, security-function-design support method, and program
04/24/2014WO2014061275A1 Information processing device and information processing method
04/24/2014WO2014061203A1 Information processing terminal
04/24/2014WO2014060618A1 Method for limiting and ensuring the operability and operation of a unique computer program, exclusively with the computer equipment wherein it is installed
04/24/2014WO2014060482A1 System and method for securing data exchange, portable user object and remote device for downloading data
04/24/2014WO2014060316A1 System and method for remotely unlocking security devices
04/24/2014WO2014060266A1 Method for generating a one-time-password (otp)
04/24/2014WO2014060265A1 Method for authentication by means of a token
04/24/2014WO2014059933A1 Method and user device for processing virus files
04/24/2014WO2014059885A1 Apparatus and method for preventing a virus file from illegally manipulating a device
04/24/2014WO2014059852A1 Search server and search method
04/24/2014WO2014059761A1 Fingerprint identification device
04/24/2014WO2014059575A1 Method and apparatus for processing input/output operation
04/24/2014WO2014059547A1 Cryptographic sequencing system and method
04/24/2014WO2014059534A1 Cooperative intrusion detection ecosystem for ip reputation-based security
04/24/2014WO2014035220A3 Method and system for program authentication
04/24/2014WO2012122117A3 Content playback apis using encrypted streams
04/24/2014US20140115725 File using restriction method, user device and computer-readable storage
04/24/2014US20140115724 Token-Based Validation Method for Segmented Content Delivery
04/24/2014US20140115723 System and Method for Digital Media Distribution
04/24/2014US20140115721 Media Resource Access Control Method and Device
04/24/2014US20140115720 License verification method and apparatus
04/24/2014US20140115719 Information processing apparatus and control method
04/24/2014US20140115718 Set Top Box Architecture With Application Based Security Definitions
04/24/2014US20140115717 Method and Apparatus for an End User Identity Protection Suite
04/24/2014US20140115716 Copyright detection and protection system and method
04/24/2014US20140115715 System and method for controlling, obfuscating and anonymizing data and services when using provider services
04/24/2014US20140115714 Method and apparatus for prevention of tampering and unauthorized extraction of information from microdevices
04/24/2014US20140115713 Providing electronic signature services to third party applications based on api calls
04/24/2014US20140115712 Method and apparatus for generating privacy profiles
04/24/2014US20140115710 Privacy Server for Protecting Personally Identifiable Information
04/24/2014US20140115709 Secured deletion of information
04/24/2014US20140115708 Secure information handling system matrix bar code
04/24/2014US20140115707 Systems, methods, and computer program products for collecting and reporting sensor data in a communication network
04/24/2014US20140115704 Homoglyph monitoring
04/24/2014US20140115703 Threat detection through the accumulated detection of threat characteristics
04/24/2014US20140115702 Encrypted data inspection in a network environment
04/24/2014US20140115701 Defending against clickjacking attacks
04/24/2014US20140115698 Method for Versatile Content Control with Partitioning
04/24/2014US20140115697 Data Management Method and Apparatus
04/24/2014US20140115696 Embedded Authentication Systems in an Electronic Device
04/24/2014US20140115695 Embedded Authentication Systems in an Electronic Device
04/24/2014US20140115694 Embedded Authentication Systems in an Electronic Device
04/24/2014US20140115693 Managing permission settings applied to applications
04/24/2014US20140115692 Method of protecting user and electronic device therefor
04/24/2014US20140115691 Unlocking system and method