Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
01/2014
01/28/2014US8640208 Authentication enforcement at resource level
01/28/2014US8640203 Methods and systems for the authentication of a user
01/28/2014US8640201 Mail server coordination activities using message metadata
01/28/2014US8640191 Inspecting code and reducing code size associated to a target
01/28/2014US8640187 Systems and methods for providing an fully functional isolated execution environment for accessing content
01/28/2014US8640185 Personal-information managing apparatus and personal-information handling apparatus
01/28/2014US8640178 Server, content providing apparatus, content receiving apparatus, content providing method, content receiving method, and program
01/28/2014US8640102 Removal of program licensed to user
01/28/2014US8640035 Identity based user interface
01/28/2014US8639950 Systems and methods for management of secure data in cloud-based network
01/28/2014US8639949 Device with a secure virtual machine
01/28/2014US8639947 Structure preserving database encryption method and system
01/28/2014US8639946 System and method of using a protected non-volatile memory
01/28/2014US8639945 Branch and switch key instruction in a microprocessor that fetches and decrypts encrypted instructions
01/28/2014US8639940 Methods and systems for assigning roles on a token
01/28/2014US8639939 Control method using identity objects
01/28/2014US8639937 Method and apparatus for extracting authentication information from a user
01/28/2014US8639923 System and method for component authentication of a secure client hosted virtualization in an information handling system
01/28/2014US8639916 Method of maintaining software integrity
01/28/2014US8639751 License information exchange system
01/28/2014US8639721 Variably controlling access to content
01/28/2014US8639627 Portable digital rights for multiple devices
01/28/2014US8639626 Encrypted e-commerce product
01/28/2014US8639624 Entrance management system, control method thereof, information storage medium, authentication server, gate apparatus, and storage medium storing program
01/28/2014US8639062 Ensuring image integrity using document characteristics
01/28/2014US8638938 Symmetric key subscription
01/28/2014US8638933 Method for cryptographically verifiable identification of a physical unit in a public, wireless telecommunications network
01/28/2014US8638916 Method and apparatus for providing fraud detection using connection frequency and cumulative duration thresholds
01/28/2014US8638861 Reproducing apparatus, reproducing method and reproducing program
01/28/2014CA2784879C Method and system for revenue allocation of a digital work among multiple fulfillers
01/28/2014CA2480906C Integration of high-assurance features into an application through application factoring
01/28/2014CA2414246C System for managing program stored in storage block of mobile terminal
01/23/2014WO2014015346A1 Systems and methods for identifying an individual
01/23/2014WO2014015305A1 Information targeting systems and methods
01/23/2014WO2014015147A1 Systems and methods of using a temporary private key between two devices
01/23/2014WO2014015073A1 Protecting media items using a media security controller
01/23/2014WO2014014793A1 Anti-cloning system and method
01/23/2014WO2014014747A2 Secure data access for multi-purpose mobile devices
01/23/2014WO2014014724A1 Defense against search engine tracking
01/23/2014WO2014014565A1 Method and system for browser identity
01/23/2014WO2014014527A1 Distributing authorized tokens to conduct mobile transactions
01/23/2014WO2014013513A1 Method and system for verifying identity of a person
01/23/2014WO2014013252A2 Authentication method and system
01/23/2014WO2014013189A1 Transmission of digital content between a source terminal and a recipient terminal
01/23/2014WO2014012863A2 Method of automatically extracting features from a computer readable file
01/23/2014WO2014012701A1 Use of a (digital) puf for carrying out physical degradation / tamper recognition of a digital ics
01/23/2014WO2014012515A1 Method and system to decrypt private contents
01/23/2014WO2014012503A1 Method and apparatus for performing virus scan during decompression of application installation package
01/23/2014WO2014012501A1 Method and system for running encrypted files
01/23/2014WO2014012494A1 Method and apparatus for determining virus-infected files
01/23/2014WO2014012448A1 Method and system for controlling access to applications on mobile terminal
01/23/2014WO2014012441A1 Method and apparatus for determining malicious program
01/23/2014WO2014012392A1 Display device, authentication system comprising display device and authentication method
01/23/2014WO2013086069A3 Method, system and program for verifying the authenticity of a website using a reliable telecommunication channel and pre-login message
01/23/2014WO2012166640A9 Apparatus and method of in-application licensing
01/23/2014US20140026231 Self-generation of virtual machine security clusters
01/23/2014US20140026230 Method, System, Login Device, and Application Software Unit for Logging in to Document Management System
01/23/2014US20140026229 Delegation of access rights to an account after the disappearance of the user
01/23/2014US20140026228 Information processing apparatus and control method
01/23/2014US20140026227 Method for generating a secure copy of media data
01/23/2014US20140026226 Device, method and program for preventing information leakage
01/23/2014US20140026225 Electronic storage device and data protection method thereof
01/23/2014US20140026224 Electronic device
01/23/2014US20140026223 Mobile device recording
01/23/2014US20140026222 Framework for providing electronic licenses and licensing programs
01/23/2014US20140026221 Defense against search engine tracking
01/23/2014US20140026218 Rollback feature
01/23/2014US20140026217 Methods for identifying key logging activities with a portable device and devices thereof
01/23/2014US20140026216 System, method, and computer program product for detecting unwanted data based on scanning associated with a payload execution and a behavioral analysis
01/23/2014US20140026214 Method of Securing Non-Native Code
01/23/2014US20140026213 Card for interaction with a computer
01/23/2014US20140026212 User Identification with Biokinematic Input
01/23/2014US20140026211 Strong password entry
01/23/2014US20140026209 Distribution device, image forming device, system, control method and storage medium
01/23/2014US20140026208 Electronic device switchable to a user-interface unlocked mode based upon spoof detection and related methods
01/23/2014US20140026206 System and method for supporting web authentication
01/23/2014US20140026196 Anti-cloning system and method
01/23/2014US20140026194 ePHI-COMPLIANT GATEKEEPER SYSTEM & METHODS
01/23/2014US20140026193 Systems and Methods of Using a Temporary Private Key Between Two Devices
01/23/2014US20140026187 Secure data access for multi-purpose mobile devices
01/23/2014US20140026185 System, Method, and Apparatus for Modular, String-Sensitive, Access Rights Analysis with Demand-Driven Precision
01/23/2014US20140026184 Method for configuring personal data distribution rules
01/23/2014US20140026183 Information processing device and computer program product
01/23/2014US20140026182 Data loss prevention (dlp) methods by a cloud service including third party integration architectures
01/23/2014US20140026154 Method for the distribution of audio-visual information and a system for the distribution of audio-visual information
01/23/2014US20140026128 Educational Management System and Method of Operation for Same
01/23/2014US20140025964 Mobile terminal encryption method, hardware encryption device and mobile terminal
01/23/2014US20140025963 Discarding sensitive data from persistent point-in-time image
01/23/2014US20140025962 Information processing apparatus, information processing method, information processing system, and program
01/23/2014US20140025961 Virtual machine validation
01/23/2014US20140025960 Method and apparatus for deterring a timing-based glitch attack during a secure boot process
01/23/2014US20140025959 Secured critical information storage and transaction
01/23/2014US20140025953 Secure streaming container
01/23/2014US20140025948 System and method for distributed deduplication of encrypted chunks
01/23/2014US20140025947 Single command functionality for providing data security and preventing data access within a decommisioned information handling system
01/23/2014US20140025941 Providing an immutable antivirus payload for internet ready compute nodes
01/23/2014US20140025940 Updating an operating system for secure element
01/23/2014US20140025939 Methods and apparatus for trusted boot optimization
01/23/2014US20140025903 Multi-core processor system
01/23/2014US20140025849 Dynamic pairing device