Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
02/2014
02/11/2014US8650616 User definable policy for graduated authentication based on the partial orderings of principals
02/11/2014US8650614 Interactive phishing detection (IPD)
02/11/2014US8650612 Security context lockdown
02/11/2014US8650611 Image forming apparatus and method of setting security policy thereof
02/11/2014US8650569 User-level re-initialization instruction interception
02/11/2014US8650558 Online marketplace for pre-installed software and online services
02/11/2014US8650481 Stable and secure use of content scripts in browser extensions
02/11/2014US8650409 FPGA configuration data scrambling using input multiplexers
02/11/2014US8650407 Applicant screening
02/11/2014US8650405 Authentication using dynamic, client information based PIN
02/11/2014US8650398 Device authentication using restricted memory
02/11/2014US8650394 Certifying the identity of a network device
02/11/2014US8650275 Requester-side distributed ID management device, provider-side distributed ID management device, distributed ID management system, and provider-side distributed ID management method
02/11/2014US8650128 Rights management system and methods
02/11/2014US8650125 Content distribution system and method
02/11/2014US8650103 Verification of a person identifier received online
02/11/2014US8649516 Digital video protection for authenticity verification
02/11/2014US8649512 Duo codes for product authentication
02/11/2014US8649510 Device having coded output of operational data
02/11/2014CA2640198C Application associating based on cryptographic identification
02/11/2014CA2568155C Method and apparatus for playing back content based on digital rights management between portable storage and device, and portable storage for the same
02/11/2014CA2476340C Moving principals across security boundaries without service interruption
02/11/2014CA2474122C Information recording apparatus and method, and information reproduction apparatus and method
02/09/2014CA2822514A1 Method for verifying authenticity, corresponding server, system and computer program
02/08/2014CA2823446A1 Static tainting anasystem and method for taint analysis of computer program codelysis
02/06/2014WO2014022795A1 Accessing a secure locker via a mobile device
02/06/2014WO2014022778A1 User-convenient authentication method and apparatus using a mobile authentication application
02/06/2014WO2014022604A1 Trusted execution environment virtual machine cloning
02/06/2014WO2014022439A1 Transfer of digital media objects via migration
02/06/2014WO2014022323A1 Security and data isolation for tenants in a business data system
02/06/2014WO2014022062A1 Media encryption based on biometric data
02/06/2014WO2014022029A1 Integrated non-volatile monotonic counters
02/06/2014WO2014021919A2 Methods, systems, and computer readable medium for active monitoring, memory protection and integrity verification of target devices
02/06/2014WO2014021866A1 Vulnerability vector information analysis
02/06/2014WO2014021865A1 Conjoint vulnerability identifiers
02/06/2014WO2014021848A1 Unauthorized user classification
02/06/2014WO2014021721A1 System and device for authenticating a user
02/06/2014WO2014021190A1 Program execution device and program analysis device
02/06/2014WO2014020619A1 Method for securing an order or purchase operation means of a client device
02/06/2014WO2014020092A1 Method for generating a code, authorization method and authorization system for authorizing an operation
02/06/2014WO2014020087A1 Biometric personal authentication
02/06/2014WO2014019815A1 Mandatory protection control in virtual machines
02/06/2014WO2014019679A1 Method for providing chips with high re-engineering protection, particularly for digital authentication systems, such as smart cards or the like, and chips produced using said method
02/06/2014WO2014019129A1 Automating password maintenance
02/06/2014WO2013188390A3 Decoding a quilted image representation into a digital asset along with content control data
02/06/2014WO2013181361A3 System, method and apparatus for electromagnetic detection and analysis of biometric information
02/06/2014US20140041061 Tamper protection device for protecting a field device against tampering
02/06/2014US20140041060 Keypad Device
02/06/2014US20140041059 Analyzing apparatus validating system and program for the system
02/06/2014US20140041058 Methods and apparatus for sharing, transferring and removing previously owned digital media
02/06/2014US20140041057 Digital delivery system and user interface for enabling the digital delivery of media content
02/06/2014US20140041056 Systems and methods for multiple photo fee stories
02/06/2014US20140041055 System and method for online access control based on users social network context
02/06/2014US20140041054 Attestation of possession of media content items using fingerprints
02/06/2014US20140041053 Data block access control
02/06/2014US20140041052 Methods and systems for establishing and enforcing document visibitily rights with an electronic signature service
02/06/2014US20140041051 Accessing media
02/06/2014US20140041050 Method for displaying information on a display device of a terminal
02/06/2014US20140041049 Method and apparatus for variable privacy preservation in data mining
02/06/2014US20140041047 Privacy preserving method for summarizing user data
02/06/2014US20140041046 Systems and methods for conditional access and digital rights management
02/06/2014US20140041045 Digital rights management (drm) locker
02/06/2014US20140041044 Controlling access to a shared file
02/06/2014US20140041042 Obstructing user content based on location
02/06/2014US20140041041 Meteorology and oceanography geospatial analysis toolset
02/06/2014US20140041040 Creating secure multiparty communication primitives using transistor delay quantization in public physically unclonable functions
02/06/2014US20140041039 Vectorial private equality testing
02/06/2014US20140041038 Receiving information about a user from a third party application based on action types
02/06/2014US20140041037 Detecting pirated applications
02/06/2014US20140041035 Method and system for file scanning
02/06/2014US20140041034 Performing virus scan during decompression of an application installation package
02/06/2014US20140041031 Statistical fingerprinting for malware detection and classification
02/06/2014US20140041030 System for finding code in a data flow
02/06/2014US20140041029 Method and system for processing website address risk detection
02/06/2014US20140041027 Safe command execution and error recovery for storage devices
02/06/2014US20140041026 Hybrid Virtual Machine
02/06/2014US20140041024 Method and Apparatus for Baiting Phishing Websites
02/06/2014US20140041023 Flexible and secure clickjacking protection mechanism
02/06/2014US20140041022 Method and apparatus for providing notification of detected error conditions in a network
02/06/2014US20140041021 Apparatus, methods, and computer program products for entering secure passwords
02/06/2014US20140041020 Orientation aware authentication on mobile platforms
02/06/2014US20140041019 Electronic device and method for hiding login information
02/06/2014US20140041018 Tokenized data security
02/06/2014US20140041017 Law enforcement agency portal
02/06/2014US20140041016 Providing remotely defined security data to a local application extension
02/06/2014US20140041015 Systems and Methods of Exchanging Information for a Reward
02/06/2014US20140041009 Information processing apparatus, information processing method and program
02/06/2014US20140041008 Establishing historical usage-based hardware trust
02/06/2014US20140041007 Web based extranet architecture providing applications to non-related subscribers
02/06/2014US20140041006 Secure messaging center
02/06/2014US20140040999 Hybrid multi-tenancy cloud platform
02/06/2014US20140040998 Providing an operational dashboard
02/06/2014US20140040997 Self-deleting virtual machines
02/06/2014US20140040993 Method for providing authorized access to a service application in order to use a protected resource of an end user
02/06/2014US20140040990 Verification of computer system prior to and subsequent to computer program installation
02/06/2014US20140040987 Network Application Security Utilizing Network-Provided Identities
02/06/2014US20140040984 Dynamic trust session
02/06/2014US20140040983 Terminal authentication method and terminal
02/06/2014US20140040982 Functionality Watermarking and Management
02/06/2014US20140040981 Systems and methods for applying a security policy to a device based on location