Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
01/03/2014 | WO2014003516A1 Method and apparatus for providing data sharing |
01/03/2014 | WO2014003497A1 Generation and verification of alternate data having specific format |
01/03/2014 | WO2014002621A1 Teller machine and storage medium storing program |
01/03/2014 | WO2014002343A1 Terminal device, information processing system, information processing method, and program |
01/03/2014 | WO2014002083A1 Secure transaction systems and methodologies |
01/03/2014 | WO2014001875A1 Systems, methods and apparatuses for the application-specific identification of devices |
01/03/2014 | WO2014001803A2 Memory protection |
01/03/2014 | WO2014001695A1 Method for authenticating a device for access to a service |
01/03/2014 | WO2014000927A1 Method for protecting a computer program product, computer program product and computer-readable storage medium |
01/03/2014 | WO2014000819A1 A method of and network server for detecting data patterns in an input data stream |
01/03/2014 | WO2014000696A1 Security detection method and system for android application program |
01/03/2014 | WO2014000616A1 Scanning method and device, and client apparatus |
01/03/2014 | WO2014000601A1 Security information interaction system, device and method |
01/03/2014 | WO2014000554A1 Method for constructing role-based access control system and cloud server |
01/03/2014 | WO2014000537A1 System and method for finding phishing website |
01/03/2014 | WO2014000468A1 Security detection method and security detection apparatus |
01/03/2014 | CA2877205A1 Systems, methods and apparatuses for the application-specific identification of devices |
01/03/2014 | CA2875823A1 System and method for establishing and monetizing trusted identities in cyberspace with personal data service and user console |
01/03/2014 | CA2839078A1 Virtual storage system and methods of copying electronic documents into the virtual storage system |
01/02/2014 | US20140007264 Always-available embedded theft reaction subsystem |
01/02/2014 | US20140007263 Selection of sandbox for initiating application |
01/02/2014 | US20140007262 Method, an Apparatus and a Computer Program Product for Extending an Application in a Client Device |
01/02/2014 | US20140007260 File Reading Protection System and a Protection Method Thereof |
01/02/2014 | US20140007259 Methods for governing the disclosure of restricted data |
01/02/2014 | US20140007258 Systems and methods for governing the disclosure of restricted data |
01/02/2014 | US20140007256 Remotely Defining Security Data for Authorization of Local Application Activity |
01/02/2014 | US20140007254 Selection of sandbox for initiating application |
01/02/2014 | US20140007253 Graduated authentication in an identity management system |
01/02/2014 | US20140007252 Change-Tolerant Method of Generating an Identifier for a Collection of Assets in a Computing Environment Using a Secret Sharing Scheme |
01/02/2014 | US20140007251 Method for interchanging data in a secure runtime environment |
01/02/2014 | US20140007250 Concealing access patterns to electronic data storage for privacy |
01/02/2014 | US20140007249 Privacy Control in a Social Network |
01/02/2014 | US20140007248 Timer for hardware protection of virtual machine monitor runtime integrity watcher |
01/02/2014 | US20140007247 Dynamic Security Question Compromise Checking Based on Incoming Social Network Postings |
01/02/2014 | US20140007245 Enforcing e-meeting attendee guidelines |
01/02/2014 | US20140007244 Systems and methods for generating risk assessments |
01/02/2014 | US20140007243 Static analysis for discovery of timing attack vulnerabilities in a computer software application |
01/02/2014 | US20140007241 System and method for identifying exploitable weak points in a network |
01/02/2014 | US20140007240 Static analysis for discovery of timing attack vulnerabilities in a computer software application |
01/02/2014 | US20140007239 Performing anti-virus checks for a distributed filesystem |
01/02/2014 | US20140007238 Collective Threat Intelligence Gathering System |
01/02/2014 | US20140007236 Systems, methods, and apparatus for improved application security |
01/02/2014 | US20140007235 Identification of Infected Devices in Broadband Environments |
01/02/2014 | US20140007234 PREVENTING ATTACKS ON DEVICES WITH MULTIPLE CPUs |
01/02/2014 | US20140007233 System and method for real time data awareness |
01/02/2014 | US20140007230 Method, system, and device for securely handling virtual function driver communications with a physical function driver |
01/02/2014 | US20140007229 System and method for identifying installed software products |
01/02/2014 | US20140007228 System and method for prevention of malware attacks on data |
01/02/2014 | US20140007227 Mobile information terminal and gripping-feature authentication method |
01/02/2014 | US20140007226 Electric apparatus, authentication device and authentication method |
01/02/2014 | US20140007225 Multi-person gestural authentication and authorization system and method of operation thereof |
01/02/2014 | US20140007224 Real human detection and confirmation in personal credential verification |
01/02/2014 | US20140007223 Biometric Capture for Unauthorized User Identification |
01/02/2014 | US20140007221 Secure image authentication |
01/02/2014 | US20140007206 Notification of Security Question Compromise Level based on Social Network Interactions |
01/02/2014 | US20140007205 No-Click Log-In Access to User's Web Account Using a Mobile Device |
01/02/2014 | US20140007204 Web-Based Security Proxy for Computing System Environment Scanning |
01/02/2014 | US20140007198 Application authorization for video services |
01/02/2014 | US20140007197 Delegation within a computing environment |
01/02/2014 | US20140007196 Subscriber authentication using a user device-generated security code |
01/02/2014 | US20140007195 User Authentication of Applications on Third-Party Devices Via User Devices |
01/02/2014 | US20140007191 Managing Personal Information on a Network |
01/02/2014 | US20140007190 Social Sharing of Security Information in a Group |
01/02/2014 | US20140007188 Systems and methods for secure handling of secure attention sequences |
01/02/2014 | US20140007186 Prevention of information leakage from a document based on dynamic database label based access control (lbac) policies |
01/02/2014 | US20140007184 Method and System for Protecting Data Flow at a Mobile Device |
01/02/2014 | US20140007181 System and method for data loss prevention in a virtualized environment |
01/02/2014 | US20140007180 Prevention of information leakage from a document based on dynamic database label based access control (lbac) policies |
01/02/2014 | US20140007179 Identity risk score generation and implementation |
01/02/2014 | US20140007178 Model for managing hosted resources using logical scopes |
01/02/2014 | US20140007177 Secure authentication using memory cards |
01/02/2014 | US20140007120 Method for operating a microprocessor unit, in particular in a mobile terminal |
01/02/2014 | US20140006806 Effective data protection for mobile devices |
01/02/2014 | US20140006804 Virtualized trusted descriptors |
01/02/2014 | US20140006803 System And Method For Securely Binding And Node-Locking Program Execution To A Trusted Signature Authority |
01/02/2014 | US20140006802 Ordered deletion of content in storage systems |
01/02/2014 | US20140006801 Start Method for Application Cryptographic Keystores |
01/02/2014 | US20140006800 Method and apparatus for providing provably secure user input/output |
01/02/2014 | US20140006796 System and method for identifying software changes |
01/02/2014 | US20140006794 Private/public gesture security system and method of operation thereof |
01/02/2014 | US20140006793 Trusted System Network |
01/02/2014 | US20140006791 Systems and methods using cryptography to protect secure computing environments |
01/02/2014 | US20140006782 Document encryption and decryption |
01/02/2014 | US20140006776 Certification of a virtual trusted platform module |
01/02/2014 | US20140006765 Information processing apparatus and start-up control method |
01/02/2014 | US20140006452 Method and apparatus for constructing and maintaining a user knowledge profile |
01/02/2014 | US20140006347 Secure container for protecting enterprise data on a mobile device |
01/02/2014 | US20140005951 Blood Glucose Measuring Device with Reliable Transmission of Values to an External Device |
01/02/2014 | US20140004935 Game system, and control method and computer readable medium therefor |
01/02/2014 | US20140002849 Image forming apparatus, wireless connection setting method, and storage medium |
01/02/2014 | US20140002240 Expedited Biometric Validation |
01/02/2014 | DE102013210837A1 Startanwendung kryptographischer Schlüsselspeicher Start application of cryptographic key store |
01/02/2014 | DE102012210747A1 Verfahren zum schutz eines computerprogrammprodukts, computerprogrammprodukt und computerlesbares speichermedium A method for protecting a computer program product, computer program product, and computer-readable storage medium |
01/01/2014 | EP2680185A1 Electronic device |
01/01/2014 | EP2680184A1 Integrated circuit protected against intrusions of an attacker |
01/01/2014 | EP2680183A1 Method of managing a memory embedded in an electronic token |
01/01/2014 | EP2680182A1 Mobile device and method to monitor a baseband processor in relation to the actions on an application processor |
01/01/2014 | EP2680181A1 System and method of securely creating and controlling access to a virtualised space |
01/01/2014 | EP2680180A1 System and method for securely allocating a virtualised space |
01/01/2014 | EP2680179A1 Selection of sandbox for initiating application |