Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
03/2014
03/25/2014US8683219 Method and apparatus for checking the integrity of data stored in a predetermined memory area of a memory
03/25/2014US8683218 System and method for N-dimensional encryption
03/25/2014US8683214 Method and device that verifies application program modules
03/25/2014US8683213 Progressive boot for a wireless device
03/25/2014US8683211 Method of projecting a secure USB key
03/25/2014US8683210 Non-networked RFID-PUF authentication
03/25/2014US8683209 Method and apparatus for pseudonym generation and authentication
03/25/2014US8683208 Information processing device, program developing device, program verifying method, and program product
03/25/2014US8683203 Subsystem authenticity and integrity verification (SAIV)
03/25/2014US8683201 Third-party-secured zones on web pages
03/25/2014US8683199 System, method and program for protecting information on computer screen
03/25/2014US8683198 Master key trust grants and revocations for minor keys
03/25/2014US8683196 Token renewal
03/25/2014US8683189 On-chip security method and apparatus
03/25/2014US8683168 Memory card including a computing device for obtaining a physical address corresponding to a logical address and computer system including the memory card
03/25/2014US8683004 Apparatus for controlling a machine
03/25/2014US8682826 News topic-interest-based recommendations twiddling
03/25/2014US8682801 Method and arrangement for provision of security relevant services via a security module of a franking machine
03/25/2014US8682800 Controlling access to technology based upon authorization
03/25/2014US8682797 Methods and systems for distributing digitally encoded information
03/25/2014US8682796 Digital resource acquisition
03/25/2014US8682785 Bank card authorization with balance indicator
03/25/2014US8682193 Image forming apparatus and authentication method
03/25/2014US8681994 Systems and methods for document control using public key encryption
03/25/2014US8681991 System and method for providing user media
03/25/2014US8681972 Method of executing a cryptographic calculation
03/25/2014US8680995 Access control system based upon behavioral patterns
03/25/2014US8680968 Biometric access control protection
03/25/2014US8678278 Removable-medium apparatus and control method thereof
03/25/2014CA2562358C Method and system for distinguishing relevant network security threats using comparison of refined intrusion detection audits and intelligent security analysis
03/25/2014CA2561906C System, method and program for user authentication, and recording medium on which the program is recorded
03/25/2014CA2467353C Key management protocol and authentication system for secure internet protocol rights management architecture
03/20/2014WO2014043497A1 Methods and systems for evaluating software for known vulnerabilities
03/20/2014WO2014043471A1 System, method and apparatus for securely saving/retrieving data on a data storage
03/20/2014WO2014043307A1 System and method for providing gesture-based user identification
03/20/2014WO2014043228A1 Domain name system rebinding attack protection
03/20/2014WO2014043152A1 Selective content disclosure in an ad-hoc network based on social cohesion
03/20/2014WO2014043081A1 Hardware-enforced access protection
03/20/2014WO2014043056A1 Mobile platform with sensor data security
03/20/2014WO2014042908A2 Rule-based derived-group security data management
03/20/2014WO2014042687A1 A global identification number and portal platform technology
03/20/2014WO2014042512A1 Management of storage encryption over network-based elastic block store volume
03/20/2014WO2014042476A1 File management method using fingerprint, user terminal and recording medium
03/20/2014WO2014042344A1 Apparatus and method for detecting malicious shellcode by using debug event
03/20/2014WO2014042269A1 Vpn connection authentication system, user terminal, authentication server, biometric-authentication result evidence-information validation server, vpn connection server, and program
03/20/2014WO2014041561A2 A system for analyzing applications accurately for finding security and quality issues
03/20/2014WO2014041396A1 Electronic device and method for protecting an electronic device against unauthorized use
03/20/2014WO2014041066A1 Method and system to perform secure boolean search over encrypted documents
03/20/2014WO2014040724A1 Content management for mobile station with runtime environment
03/20/2014WO2014040522A1 System and method for sharing login status between an application platform and an application
03/20/2014WO2014040278A1 Method, circuit and device for encrypting integrated circuit of single chip microcomputer
03/20/2014WO2014040124A1 Voice authentication system and method
03/20/2014WO2014013252A3 Pin verification
03/20/2014WO2014001803A3 Memory protection
03/20/2014WO2014001037A3 STORING OPERATIONAL DATA OF AN INDUSTRIAL CONTROL SYSTEM Storing operational data of an industrial control syste
03/20/2014WO2013188039A3 User interface for combined biometric mobile device
03/20/2014WO2013182103A3 Encryption and decryption terminal and encryption and decryption method applied to same
03/20/2014WO2013175080A3 Method of managing digital images
03/20/2014WO2013126437A3 Apparatus for remote application of manual signatures to electronic documents
03/20/2014WO2011034813A3 System and method for determining true computer file type identity
03/20/2014US20140082756 Secure pin entry device
03/20/2014US20140082755 Detection and handling of aggregated online content using decision criteria to compare similar or identical content items
03/20/2014US20140082754 Electronic device and method for disabling application and hardware
03/20/2014US20140082753 Systems and methods for data privacy and destruction in multi-system landscapes
03/20/2014US20140082752 Read-Once Data Sets and Access Method
03/20/2014US20140082751 Protecting iat/eat hooks from rootkit attacks using new cpu assists
03/20/2014US20140082749 Systems and methods for secure and persistent retention of sensitive information
03/20/2014US20140082748 User information management apparatus and user information management method
03/20/2014US20140082747 Information processing system, operating device, and program
03/20/2014US20140082746 Extensible protocol for low memory agent
03/20/2014US20140082745 Content-driven screen polarization with application sessions
03/20/2014US20140082744 Automatic sharing of user interactions
03/20/2014US20140082743 Privacy of location information
03/20/2014US20140082741 Data protection systems and methods
03/20/2014US20140082740 Computing system with privacy mechanism and method of operation thereof
03/20/2014US20140082738 Dynamic risk management
03/20/2014US20140082736 Certifying server side web applications against security vulnerabilities
03/20/2014US20140082735 Mining attack vectors for black-box security testing
03/20/2014US20140082734 Certifying server side web applications against security vulnerabilities
03/20/2014US20140082733 Methods and systems for evaluating software for known vulnerabilities
03/20/2014US20140082732 System and Method for Bidirectional Trust Between Downloaded Applications and Mobile Devices Including a Secure Charger and Malware Scanner
03/20/2014US20140082731 Contextual Alert of an Invasion of a Computer System
03/20/2014US20140082729 System and method for analyzing repackaged application through risk calculation
03/20/2014US20140082727 Electronic devcie and method for monitoring application
03/20/2014US20140082726 Real-time classification of email message traffic
03/20/2014US20140082724 Methods and apparatus to protect memory regions during low-power states
03/20/2014US20140082722 Computer Recovery or Return
03/20/2014US20140082721 Secured computing system with asynchronous authentication
03/20/2014US20140082720 Method and System for Authentication of Device Using Hardware DNA
03/20/2014US20140082717 System and Method for Providing Secure Access to a Remote File
03/20/2014US20140082714 Method and system of providing access point data associated with a network access point
03/20/2014US20140082701 Dynamically configurable online data update system
03/20/2014US20140082696 Distance bounding protocol with minimal variance processing
03/20/2014US20140082694 Antibot mechanisms optimized for mobile computing
03/20/2014US20140082693 Updating security bindings in a network device
03/20/2014US20140082692 Stateful Reference Monitor
03/20/2014US20140082690 Mobile computing system for providing high-security execution environment
03/20/2014US20140082689 Creation of security roles through user walkthrough of business process workflow
03/20/2014US20140082688 Rule-based derived-group security data management
03/20/2014US20140082388 Firmware agent