Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
01/2014
01/03/2014WO2014003516A1 Method and apparatus for providing data sharing
01/03/2014WO2014003497A1 Generation and verification of alternate data having specific format
01/03/2014WO2014002621A1 Teller machine and storage medium storing program
01/03/2014WO2014002343A1 Terminal device, information processing system, information processing method, and program
01/03/2014WO2014002083A1 Secure transaction systems and methodologies
01/03/2014WO2014001875A1 Systems, methods and apparatuses for the application-specific identification of devices
01/03/2014WO2014001803A2 Memory protection
01/03/2014WO2014001695A1 Method for authenticating a device for access to a service
01/03/2014WO2014000927A1 Method for protecting a computer program product, computer program product and computer-readable storage medium
01/03/2014WO2014000819A1 A method of and network server for detecting data patterns in an input data stream
01/03/2014WO2014000696A1 Security detection method and system for android application program
01/03/2014WO2014000616A1 Scanning method and device, and client apparatus
01/03/2014WO2014000601A1 Security information interaction system, device and method
01/03/2014WO2014000554A1 Method for constructing role-based access control system and cloud server
01/03/2014WO2014000537A1 System and method for finding phishing website
01/03/2014WO2014000468A1 Security detection method and security detection apparatus
01/03/2014CA2877205A1 Systems, methods and apparatuses for the application-specific identification of devices
01/03/2014CA2875823A1 System and method for establishing and monetizing trusted identities in cyberspace with personal data service and user console
01/03/2014CA2839078A1 Virtual storage system and methods of copying electronic documents into the virtual storage system
01/02/2014US20140007264 Always-available embedded theft reaction subsystem
01/02/2014US20140007263 Selection of sandbox for initiating application
01/02/2014US20140007262 Method, an Apparatus and a Computer Program Product for Extending an Application in a Client Device
01/02/2014US20140007260 File Reading Protection System and a Protection Method Thereof
01/02/2014US20140007259 Methods for governing the disclosure of restricted data
01/02/2014US20140007258 Systems and methods for governing the disclosure of restricted data
01/02/2014US20140007256 Remotely Defining Security Data for Authorization of Local Application Activity
01/02/2014US20140007254 Selection of sandbox for initiating application
01/02/2014US20140007253 Graduated authentication in an identity management system
01/02/2014US20140007252 Change-Tolerant Method of Generating an Identifier for a Collection of Assets in a Computing Environment Using a Secret Sharing Scheme
01/02/2014US20140007251 Method for interchanging data in a secure runtime environment
01/02/2014US20140007250 Concealing access patterns to electronic data storage for privacy
01/02/2014US20140007249 Privacy Control in a Social Network
01/02/2014US20140007248 Timer for hardware protection of virtual machine monitor runtime integrity watcher
01/02/2014US20140007247 Dynamic Security Question Compromise Checking Based on Incoming Social Network Postings
01/02/2014US20140007245 Enforcing e-meeting attendee guidelines
01/02/2014US20140007244 Systems and methods for generating risk assessments
01/02/2014US20140007243 Static analysis for discovery of timing attack vulnerabilities in a computer software application
01/02/2014US20140007241 System and method for identifying exploitable weak points in a network
01/02/2014US20140007240 Static analysis for discovery of timing attack vulnerabilities in a computer software application
01/02/2014US20140007239 Performing anti-virus checks for a distributed filesystem
01/02/2014US20140007238 Collective Threat Intelligence Gathering System
01/02/2014US20140007236 Systems, methods, and apparatus for improved application security
01/02/2014US20140007235 Identification of Infected Devices in Broadband Environments
01/02/2014US20140007234 PREVENTING ATTACKS ON DEVICES WITH MULTIPLE CPUs
01/02/2014US20140007233 System and method for real time data awareness
01/02/2014US20140007230 Method, system, and device for securely handling virtual function driver communications with a physical function driver
01/02/2014US20140007229 System and method for identifying installed software products
01/02/2014US20140007228 System and method for prevention of malware attacks on data
01/02/2014US20140007227 Mobile information terminal and gripping-feature authentication method
01/02/2014US20140007226 Electric apparatus, authentication device and authentication method
01/02/2014US20140007225 Multi-person gestural authentication and authorization system and method of operation thereof
01/02/2014US20140007224 Real human detection and confirmation in personal credential verification
01/02/2014US20140007223 Biometric Capture for Unauthorized User Identification
01/02/2014US20140007221 Secure image authentication
01/02/2014US20140007206 Notification of Security Question Compromise Level based on Social Network Interactions
01/02/2014US20140007205 No-Click Log-In Access to User's Web Account Using a Mobile Device
01/02/2014US20140007204 Web-Based Security Proxy for Computing System Environment Scanning
01/02/2014US20140007198 Application authorization for video services
01/02/2014US20140007197 Delegation within a computing environment
01/02/2014US20140007196 Subscriber authentication using a user device-generated security code
01/02/2014US20140007195 User Authentication of Applications on Third-Party Devices Via User Devices
01/02/2014US20140007191 Managing Personal Information on a Network
01/02/2014US20140007190 Social Sharing of Security Information in a Group
01/02/2014US20140007188 Systems and methods for secure handling of secure attention sequences
01/02/2014US20140007186 Prevention of information leakage from a document based on dynamic database label based access control (lbac) policies
01/02/2014US20140007184 Method and System for Protecting Data Flow at a Mobile Device
01/02/2014US20140007181 System and method for data loss prevention in a virtualized environment
01/02/2014US20140007180 Prevention of information leakage from a document based on dynamic database label based access control (lbac) policies
01/02/2014US20140007179 Identity risk score generation and implementation
01/02/2014US20140007178 Model for managing hosted resources using logical scopes
01/02/2014US20140007177 Secure authentication using memory cards
01/02/2014US20140007120 Method for operating a microprocessor unit, in particular in a mobile terminal
01/02/2014US20140006806 Effective data protection for mobile devices
01/02/2014US20140006804 Virtualized trusted descriptors
01/02/2014US20140006803 System And Method For Securely Binding And Node-Locking Program Execution To A Trusted Signature Authority
01/02/2014US20140006802 Ordered deletion of content in storage systems
01/02/2014US20140006801 Start Method for Application Cryptographic Keystores
01/02/2014US20140006800 Method and apparatus for providing provably secure user input/output
01/02/2014US20140006796 System and method for identifying software changes
01/02/2014US20140006794 Private/public gesture security system and method of operation thereof
01/02/2014US20140006793 Trusted System Network
01/02/2014US20140006791 Systems and methods using cryptography to protect secure computing environments
01/02/2014US20140006782 Document encryption and decryption
01/02/2014US20140006776 Certification of a virtual trusted platform module
01/02/2014US20140006765 Information processing apparatus and start-up control method
01/02/2014US20140006452 Method and apparatus for constructing and maintaining a user knowledge profile
01/02/2014US20140006347 Secure container for protecting enterprise data on a mobile device
01/02/2014US20140005951 Blood Glucose Measuring Device with Reliable Transmission of Values to an External Device
01/02/2014US20140004935 Game system, and control method and computer readable medium therefor
01/02/2014US20140002849 Image forming apparatus, wireless connection setting method, and storage medium
01/02/2014US20140002240 Expedited Biometric Validation
01/02/2014DE102013210837A1 Startanwendung kryptographischer Schlüsselspeicher Start application of cryptographic key store
01/02/2014DE102012210747A1 Verfahren zum schutz eines computerprogrammprodukts, computerprogrammprodukt und computerlesbares speichermedium A method for protecting a computer program product, computer program product, and computer-readable storage medium
01/01/2014EP2680185A1 Electronic device
01/01/2014EP2680184A1 Integrated circuit protected against intrusions of an attacker
01/01/2014EP2680183A1 Method of managing a memory embedded in an electronic token
01/01/2014EP2680182A1 Mobile device and method to monitor a baseband processor in relation to the actions on an application processor
01/01/2014EP2680181A1 System and method of securely creating and controlling access to a virtualised space
01/01/2014EP2680180A1 System and method for securely allocating a virtualised space
01/01/2014EP2680179A1 Selection of sandbox for initiating application