Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
02/2014
02/20/2014WO2014028304A1 Secure behavior analysis over trusted execution environment
02/20/2014WO2014028273A2 System and method for secure synchronization of data across multiple computing devices
02/20/2014WO2014028194A1 Securely generating and storing passwords in a computer system
02/20/2014WO2014027870A1 Work management method
02/20/2014WO2014027782A1 System for providing captcha based on drawing mode image, and method for providing captcha
02/20/2014WO2014027242A1 Systems and methods for mitigating the unauthorized use of a device
02/20/2014WO2014027195A1 Display device
02/20/2014WO2014026607A1 Api monitoring method and device therefor
02/20/2014WO2014026563A1 Method and device for securing information interaction process
02/20/2014WO2014026462A1 Digital rights management method
02/20/2014WO2014002041A3 Privacy control in a social network
02/20/2014WO2013156847A3 Secure zone for secure purchases
02/20/2014US20140053286 Dynamically reconfigurable 2d topology communication and verification scheme
02/20/2014US20140053285 Methods for detecting plagiarism in software code and devices thereof
02/20/2014US20140053284 Data transmission device and method for aggregating media content from a content provider
02/20/2014US20140053283 System, Method, and Device for Communicating and Storing and Delivering Data
02/20/2014US20140053282 System and method of integrating modules for execution on a computing device and controlling during runtime an ability of a first module to access a service provided by a second module
02/20/2014US20140053281 Configuration of a new enrollee device for use in a communication network
02/20/2014US20140053279 Authentication method for authenticating a first party to a second party
02/20/2014US20140053278 Data and key separation using a secure central processing unit
02/20/2014US20140053277 Method and apparatus for provisioning subscription products
02/20/2014US20140053276 Safe data storage method and device
02/20/2014US20140053275 System and Method for Secure File Transmission
02/20/2014US20140053274 System and method for replacing software components with corresponding known-good software components without regard to whether the software components have been compromised or potentially compromised
02/20/2014US20140053273 System and method for limiting exploitable or potentially exploitable sub-components in software components
02/20/2014US20140053272 Multilevel Introspection of Nested Virtual Machines
02/20/2014US20140053270 Detecting malicious computer code in an executing program module
02/20/2014US20140053269 Attack resistant continuous network service trustworthiness controller
02/20/2014US20140053268 Method of detecting potential phishing by analyzing universal resource locators
02/20/2014US20140053267 Method for identifying malicious executables
02/20/2014US20140053266 Method and server for discriminating malicious attribute of program
02/20/2014US20140053261 On-Line Behavioral Analysis Engine in Mobile Device with Multiple Analyzer Model Providers
02/20/2014US20140053260 Adaptive Observation of Behavioral Features on a Mobile Device
02/20/2014US20140053259 Security Central Processing Unit Monitoring of On-Chip Conditions
02/20/2014US20140053258 Handheld device and method for unlocking the handheld device
02/20/2014US20140053256 User authentication device having multiple isolated host interfaces
02/20/2014US20140053253 Method of obtaining a network address
02/20/2014US20140053247 Controlling Access to Resources Based on Affinity Planes and Sectors
02/20/2014US20140053244 Anonymization as a service
02/20/2014US20140053242 Management of private information
02/20/2014US20140053236 Threshold reporting platform apparatuses, methods and systems
02/20/2014US20140053235 Method, system, and computer program product for facilitating communication in an interoperability network
02/20/2014US20140053232 Automated redaction of documents based on security-level determination
02/20/2014US20140053231 Streamlined security-level determination of an electronic document and selective release into an information system
02/20/2014US20140053230 Multi-security-cpu system
02/20/2014US20140053229 Systems and Methods for Policy Propagation and Enforcement
02/20/2014US20140053228 System and methods for automatically disseminating content based on contexual information
02/20/2014US20140053227 System and Method for Secure Synchronization of Data Across Multiple Computing Devices
02/20/2014US20140053226 Self-adaptive and proactive virtual machine images adjustment to environmental security risks in a cloud environment
02/20/2014US20140053002 System and method for encrypting secondary copies of data
02/20/2014US20140053000 Instructions to perform jh cryptographic hashing
02/20/2014US20140052999 Searchable Encrypted Data
02/20/2014US20140052998 Security model for actor-based languages and apparatus, methods, and computer programming products using same
02/20/2014US20140052997 Security model for actor-based languages and apparatus, methods, and computer programming products using same
02/20/2014US20140052996 Extending the number of applications for accessing protected content in a media using media key blocks
02/20/2014US20140052995 Dynamic token seed key injection and deformation method
02/20/2014US20140052976 Wireless router remote firmware upgrade
02/20/2014US20140052975 Protecting secure software in a multi-security-cpu system
02/20/2014US20140052610 System and method for software allocation based on forecasts and calendars
02/20/2014US20140051397 Apparatus and Method of Securing Private Content Stored in a Memory
02/20/2014US20140049359 Security device and integrated circuit including the same
02/20/2014DE102013213153A1 Bildübermittlungsvorrichtung, Bildübermittlungsverfahren, Bildübermittlungsprogramm, Bilderkennungs- und authentifizierungssystem und Bildempfangsvorrichtung Image transmission apparatus, image transmission method, image transmission program, image recognition and authentication system and image receiving device
02/19/2014EP2699017A1 Security processing unit with secure connection to head end
02/19/2014EP2698746A2 Method and system for secure configuration of an electronic device via an RFID IC
02/19/2014EP2698739A1 Method for dynamic management of codes associated with security countermeasures, corresponding computer program product and device
02/19/2014EP2698738A2 User authentication device having multiple isolated host interfaces
02/19/2014EP2698736A2 A multi-security-CPU system
02/19/2014EP2698735A2 Speculative Pre-Authorization of Encrypted Data Streams
02/19/2014EP2698717A1 Integrated circuit
02/19/2014EP2698695A2 Application menu user interface
02/19/2014EP2697992A2 Method and apparatus for providing machine-to-machine service
02/19/2014EP2697949A1 Method and apparatus for providing secret delegation
02/19/2014EP2697933A2 Method and apparatus for providing machine-to-machine service
02/19/2014EP2697929A2 Information security systems and methods
02/19/2014EP2697916A2 Machine-to-machine node erase procedure
02/19/2014EP2697786A1 Method and apparatus for identity based ticketing
02/19/2014EP2697733A2 Methods for providing cross-vendor support services
02/19/2014EP2697731A2 Method and system to generate and manage native applications
02/19/2014CN203444486U Movable case protecting cabinet
02/19/2014CN203444485U Anti-theft computer with folding feet
02/19/2014CN203444484U USB data transmission device
02/19/2014CN203444483U Automatic safety identification device
02/19/2014CN203444482U Safe memorizer of portable computer
02/19/2014CN103597775A Medical information authentication system
02/19/2014CN103597691A Setting method, device authentication method, device authentication system, and controller
02/19/2014CN103597520A Method and apparatus for identity-based ticketing
02/19/2014CN103597496A Method and apparatus for authenticating a non-volatile memory device
02/19/2014CN103597495A Information processing device, information processing method, program, and integrated circuit
02/19/2014CN103597494A Method and device for managing digital usage rights of documents
02/19/2014CN103597493A Secure boot with trusted computing group platform registers
02/19/2014CN103597492A Improved security function-based cloud service system and method for supporting same
02/19/2014CN103597491A Secured repair data package
02/19/2014CN103597490A Protection of applets against hidden-channel analyses
02/19/2014CN103597489A Data custodian and curation system
02/19/2014CN103597488A Information security systems and methods
02/19/2014CN103597474A Efficient indexing and searching of access control listed documents
02/19/2014CN103597423A Mobile device operations with battery optimization
02/19/2014CN103596163A Account management method of mobile phone application software
02/19/2014CN103596123A Method executed by M2ME
02/19/2014CN103595853A Mobile phone information leakage prevention system based on encryption security control