Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
03/2014
03/18/2014US8677508 Confidential information leakage prevention system, confidential information leakage prevention method and confidential information leakage prevention program
03/18/2014US8677504 Method and apparatus for encrypting/decrypting multimedia content to allow random access
03/18/2014US8677503 Mechanism for embedding device identification information into graphical user interface objects
03/18/2014US8677501 Privilege violation detecting program
03/18/2014US8677498 Apparatus and method of managing security data
03/18/2014US8677495 Dynamic trap for detecting malicious applications in computing devices
03/18/2014US8677492 Detection of hidden objects in a computer system
03/18/2014US8677491 Malware detection
03/18/2014US8677486 System and method for near-real time network attack detection, and system and method for unified detection via detection routing
03/18/2014US8677482 Hardware security for software processes
03/18/2014US8677480 Anomaly information distribution with threshold
03/18/2014US8677477 Application program launching method and system for improving security of embedded Linux kernel
03/18/2014US8677469 Firewall device
03/18/2014US8677467 Method and apparatus in combination with a storage means for carrying out an authentication process for authenticating a subsequent transaction
03/18/2014US8677466 Verification of digital certificates used for encrypted computer communications
03/18/2014US8677457 Security for codes running in non-trusted domains in a processor core
03/18/2014US8677455 Authentication method
03/18/2014US8677454 Utilization of virtual machines by a community cloud
03/18/2014US8677449 Exposing data to virtual machines
03/18/2014US8677326 Detecting applications in a virtualization environment
03/18/2014US8677248 Requesting computer user's context data
03/18/2014US8677155 System for detecting intrusions by devices with openable casing
03/18/2014US8677147 Method for accessing services by a user unit
03/18/2014US8677144 Secure software and hardware association technique
03/18/2014US8677140 Delivery point validation system
03/18/2014US8677139 Method to provide authentication using a universal identifier
03/18/2014US8677138 System and method of secure authentication information distribution
03/18/2014US8677137 Communication device, communication method, information processing device, information processing method, program, and communication system
03/18/2014US8677135 Digital signatures with error polynomials
03/18/2014US8677129 Consumer-driven secure sockets layer modulator
03/18/2014US8677122 Method for processing a secure system manager
03/18/2014US8677119 Remote data viewer
03/18/2014US8677110 Termination-log acquiring program, termination-log acquiring device, and termination-log acquiring method
03/18/2014US8676844 Graph authorization
03/18/2014US8676822 System and method for quality assured media file storage
03/18/2014US8676714 Hardware specific product license validation
03/18/2014US8676713 Dynamic constraints for content rights
03/18/2014US8676712 Computer architecture for managing courseware in a shared use operating environment
03/18/2014US8676710 Providing security in a cloud storage environment
03/18/2014US8676694 Secure and efficient payment processing system
03/18/2014US8676616 Transaction tracking, managing, assessment, and auditing data processing system and network
03/18/2014US8675910 Monitoring usage of a computer by performing character recognition on screen capture images
03/18/2014US8675878 Interoperable keychest for use by service providers
03/18/2014US8675873 Method of making secure a link between a data terminal and a data processing local area network, and a data terminal for implementing the method
03/18/2014CA2691666C System and method for simulating computer network attacks
03/18/2014CA2593952C Method and apparatus for providing a border guard between security domains
03/13/2014WO2014039811A1 Threat detection for return oriented programming
03/13/2014WO2014039620A1 Snippet matching in file sharing networks
03/13/2014WO2014039497A1 Security layer and methods for protecting tenant data in a cloud-mediated computing network
03/13/2014WO2014039455A1 Systems and methods for detecting illegitimate applications
03/13/2014WO2014039373A1 Securely handling server certificate errors in synchronization communication
03/13/2014WO2014039363A1 Measuring platform components with a single trusted platform module
03/13/2014WO2014038926A1 A system and method of mutual trusted authentication and identity encryption
03/13/2014WO2014038925A1 User-centric online identity management
03/13/2014WO2014038765A1 Method for controlling content and digital device using the same
03/13/2014WO2014038430A1 Portable terminal, and method and program for controlling portable terminal
03/13/2014WO2014038342A1 Device pairing method and device
03/13/2014WO2014038227A1 System and electronic device
03/13/2014WO2014038034A1 Information processing system, information processing method, and program
03/13/2014WO2014037845A1 Method and apparatus for delivering encrypted content to web browsers based on entropy of the content
03/13/2014WO2014037741A1 Method and system for verifying an access request
03/13/2014WO2014037740A1 Method and system for verifying an access request
03/13/2014WO2014037666A1 Device for authenticating a bottle and authentication method using said device
03/13/2014WO2014037136A1 Method for personalizing a secure element (se) and computer system
03/13/2014WO2014037037A1 Method and system for biometrical identification of a user
03/13/2014WO2014036932A1 A user interface hijacking prevention device and method
03/13/2014WO2014036888A1 Method, device, and system for processing virus-infected applications
03/13/2014WO2014036801A1 Method for detecting phishing website without depending on sample
03/13/2014WO2014036605A1 Technology adapted to enable devices for delivering data in a lockdown mode, methods for operating such devices, and reporting on activity at tablet devices that provide remote content
03/13/2014WO2014012863A3 Method of automatically extracting features from a computer readable file
03/13/2014WO2014011131A3 A method enabling verification of the user id by means of an interactive voice response system
03/13/2014WO2014008079A3 Systems and methods for identity authentication using a social network
03/13/2014WO2013186682A4 Biometric confirmation for bank card transaction
03/13/2014WO2013165279A3 Multi factor user authentication
03/13/2014US20140075584 Security apparatus and method
03/13/2014US20140075583 Management of media items
03/13/2014US20140075581 Secure mechanism to switch between different domains of operation in a data processor
03/13/2014US20140075580 Address Exchange System and Methods
03/13/2014US20140075579 Method to enable development mode of a secure electronic control unit
03/13/2014US20140075578 Method for providing license corresponding to encrypted contents to client apparatus and digitial rights management conversion system using the method
03/13/2014US20140075577 File security control system and method
03/13/2014US20140075574 Api monitoring method and device therefor
03/13/2014US20140075573 Privileged access to managed content
03/13/2014US20140075572 Rfid system with segmented rfid data ownership
03/13/2014US20140075570 Method, electronic device, and machine readable storage medium for protecting information security
03/13/2014US20140075569 Display apparatus and display program
03/13/2014US20140075568 Security Layer and Methods for Protecting Tenant Data in a Cloud-Mediated Computing Network
03/13/2014US20140075567 Service Processor Configurations for Enhancing or Augmenting System Software of a Mobile Communications Device
03/13/2014US20140075566 Computer-Implemented Method and Apparatus for Encoding Natural-Language Text Content And/Or Detecting Plagiarism
03/13/2014US20140075562 Static security analysis using a hybrid representation of string values
03/13/2014US20140075561 Static security analysis using a hybrid representation of string values
03/13/2014US20140075560 Automatic classification of security vulnerabilities in computer software applications
03/13/2014US20140075559 Method and device for processing virus-infected applications
03/13/2014US20140075557 Streaming Method and System for Processing Network Metadata
03/13/2014US20140075556 Threat Detection for Return Oriented Programming
03/13/2014US20140075555 System and method for protecting computer systems from malware attacks
03/13/2014US20140075554 Systems and methods for performing selective deep packet inspection
03/13/2014US20140075553 Domain name system rebinding attack protection
03/13/2014US20140075552 Authentication using multi-tier multi-class objects
03/13/2014US20140075551 Method and apparatus to manage user account of device