Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
03/2014
03/04/2014CA2800657C Systems and methods for using a domain-specific security sandbox to facilitate secure transactions
03/04/2014CA2771057C Secure media path methods, systems, and architecture
03/04/2014CA2710614C Intrusion detection systems and methods
02/2014
02/28/2014CA2825635A1 Transaction verification system
02/27/2014WO2014032051A1 Method and system for facilitating isolated workspace for applications
02/27/2014WO2014032001A1 Method for producing dynamic data structures for authentication and/or password identification
02/27/2014WO2014031912A1 Virtual sim
02/27/2014WO2014031551A1 A method and apparatus for privacy-preserving data mapping under a privacy-accuracy trade-off
02/27/2014WO2014031328A1 Method and device for connecting to a wireless network using a visual code
02/27/2014WO2014031183A1 Systems, methods, and computer program products for securing and managing applications on secure elements
02/27/2014WO2014031041A1 Policy composing apparatus and control method therefor
02/27/2014WO2014030978A1 Mobile storage medium safety system and method thereof
02/27/2014WO2014030916A1 Apparatus and method for controlling printing using virtual printer, and authentication server and authentication method therefor
02/27/2014WO2014030302A1 Information processing device for executing anonymization and anonymization processing method
02/27/2014WO2014030284A1 Information processing device, information processing method, program and server device
02/27/2014WO2014030283A1 Signature validation information transmission method, information processing device, information processing method, and broadcast transmission device
02/27/2014WO2014030227A1 Authentication method and authentication program
02/27/2014WO2014030116A1 A system for the customized capturing, collation and verification of a subscriber's data for the purpose of transacting online and / or accessing databases
02/27/2014WO2014030017A1 Calibration of eye tracking system
02/27/2014WO2014029959A1 Data verification
02/27/2014WO2014029768A1 Method for securing an electronic device having a signal output against removal from a carrying device, and carrying device
02/27/2014WO2014029389A1 Method for secured use of transportable data storage media in closed networks
02/27/2014WO2014029356A1 Method and mobile terminal for enhancing the security of a mobile terminal
02/27/2014WO2014029322A1 Method and system for fixing loopholes
02/27/2014WO2014029258A1 Certificate processing method and terminal
02/27/2014WO2014029221A1 Recognition method and apparatus for pirated encryption lock
02/27/2014WO2014028987A1 Process and devices for authentication of persons
02/27/2014WO2013188599A3 Securely communicating between a card reader and a mobile device
02/27/2014WO2013188365A3 Device-specific secure licensing
02/27/2014WO2013185101A3 Dashboards for displaying threat insight information
02/27/2014WO2013184529A3 Malicious message detection and processing
02/27/2014WO2013172898A3 System for detecting, analyzing, and controlling infiltration of computer and network systems
02/27/2014WO2013148097A4 Converting a digital media item from a rental to a purchase
02/27/2014US20140059708 Apparatuses and methods for protecting program file content using digital rights management (drm)
02/27/2014US20140059706 Method and system for facilitating data access and management on a secure token
02/27/2014US20140059705 Document control apparatus and document control method
02/27/2014US20140059704 Client device, server, and storage medium
02/27/2014US20140059703 Method and System to Impose Enterprise Security Mechanisms throughout a Mobile Application Lifecycle
02/27/2014US20140059701 Method of protecting and managing digital contents and apparatus thereof
02/27/2014US20140059700 Device and method for determining content of access control of data
02/27/2014US20140059698 Information processing device, lock controlling method, and lock controlling program
02/27/2014US20140059697 Testing device for removing customer personal information from an electronic device
02/27/2014US20140059696 Method for removing customer personal information from an electronic device
02/27/2014US20140059695 Systems and methods for managing location data and providing a privacy framework
02/27/2014US20140059694 Privacy-Enhanced Car Data Distribution
02/27/2014US20140059693 Anonymous shipment brokering
02/27/2014US20140059692 System and method for cross domain flight data import and export
02/27/2014US20140059691 Method and device for prompting program uninstallation
02/27/2014US20140059690 Method for Scalable Analysis of Android Applications for Security Vulnerability
02/27/2014US20140059688 Detection and mitigation of side-channel attacks
02/27/2014US20140059687 File scanning
02/27/2014US20140059686 System and Method for Detecting Behavior Anomaly in Information Access
02/27/2014US20140059685 System, Method and Computer Program Product for Monitoring and/or Analyzing at Least One Aspect of an Invocation of an Interface
02/27/2014US20140059684 System and method for computer inspection of information objects for shared malware components
02/27/2014US20140059683 Cooperative intrusion detection ecosystem for IP reputation-based security
02/27/2014US20140059680 Local secure service partitions for operating system security
02/27/2014US20140059679 Software updating apparatus, software updating system, invalidation method, and invalidation program
02/27/2014US20140059678 Analysis of network operation
02/27/2014US20140059677 Medical device customization system
02/27/2014US20140059676 Systems and methods for dual reader emulation
02/27/2014US20140059675 Biometric authentication
02/27/2014US20140059674 Authentication method and code setting method and authentication system for electronic apparatus
02/27/2014US20140059673 System and Method for Disabling Secure Access to an Electronic Device Using Detection of a Unique Motion
02/27/2014US20140059672 Method for producing dynamic data structures for authentication and/or password identification
02/27/2014US20140059671 Device identification for externalizing password from device coupled with user control of external password service
02/27/2014US20140059670 Method and system for controlling access to applications on mobile terminal
02/27/2014US20140059669 Method and mobile terminal for enhancing the security of a mobile terminal
02/27/2014US20140059665 Fraud-proof location identification system
02/27/2014US20140059660 Controlling Access to an Accessible Object with an Online Access Control List
02/27/2014US20140059659 System and method for authenticating manual interaction in a computing environment
02/27/2014US20140059658 Privacy broker
02/27/2014US20140059657 Method and system for transmitting authentication context information
02/27/2014US20140059651 Account Elevation Management
02/27/2014US20140059650 Dynamic routing of authentication requests
02/27/2014US20140059642 Method and system for facilitating isolated workspace for applications
02/27/2014US20140059641 Automated feedback for proposed security rules
02/27/2014US20140059357 System and Method for Providing Secure Inter-Process Communications
02/27/2014US20140059356 Technique for reconfigurable data storage media encryption
02/27/2014US20140059345 Oblivious transfer with hidden access control lists
02/27/2014US20140059344 File protection using session-based digital rights management
02/27/2014US20140059341 Creating and accessing encrypted web based content in hybrid applications
02/27/2014US20140059340 Perimeter encryption method and system
02/27/2014US20140059338 Method for secure booting of a printer controller
02/27/2014DE10335116B4 Integrierte elektronische Authentifizierung für die Freigabe von Softwareobjekten für ein Prozesssteuerungssystem Integrated electronic authentication for the release of software objects for a process control system
02/27/2014DE102013109112A1 System zur kundenspezifischen Anpassung eines medizinischen Gerätes System for customizing a medical device
02/27/2014DE102013109088A1 Verfahren zum Schützen der Integrität von gecachten GPT-Plattendaten in einer externen Betriebssystem-Umgebung A method of protecting the integrity of cached GPT disk data in an external operating environment
02/27/2014DE102012215011A1 Method for securing control unit i.e. field programmable gate array, of e.g. secure digital memory card, involves de-energizing function of control unit as function of cryptographic result data computed based on cryptographic key
02/27/2014CA2862077A1 Method and system for fixing loopholes
02/26/2014EP2701416A1 Mobile Electronic Device And Use Thereof For Electronic Transactions
02/26/2014EP2701107A1 Apparatus and method for providing interaction information by using image on device display
02/26/2014EP2701092A1 Method for identifying malicious executables
02/26/2014EP2701091A1 Control and monitoring module of safe devices
02/26/2014EP2701090A1 Method and system for enforcing 3D restricted rights in a rapid manufacturing and prototyping environment
02/26/2014EP2700033A1 Method for displaying information on a display device of a terminal
02/26/2014CN203455843U Computer network security control device for teaching
02/26/2014CN203455842U Rapid bilinear pairing operation device
02/26/2014CN103609059A Systems and methods for secure data sharing
02/26/2014CN103608822A Method for masking the end-of-life transition of an electronic device and device comprising a corresponding control module
02/26/2014CN103608821A Information terminal, information terminal control method, control program and recording medium
02/26/2014CN103608820A Enabling a software application to be executed on a hardware device