Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
12/2013
12/27/2013WO2013190169A1 Arrangement and method for accessing a network service
12/27/2013WO2013189741A1 Method for producing an electronic device with a disabled sensitive mode, and method for transforming such an electronic device to re-activate its sensitive mode
12/27/2013WO2013189600A1 Method and device for exchanging the operating system of a resource-limited portable data carrier
12/27/2013WO2013189291A1 Security mode for mobile communications devices
12/27/2013WO2013189273A1 Method and device for monitoring preconfigured operation in mobile terminal
12/27/2013WO2013189231A1 Image-based face recognition unlocking method, system and electronic device
12/27/2013WO2013189214A1 User terminal file repair method and system
12/27/2013WO2013189008A1 Design pattern for secure store
12/27/2013WO2013188900A1 Validation of virtual entities of a multi-user application
12/27/2013WO2013165274A3 Single sign-on user registration for online or client account services
12/27/2013WO2012174664A9 Capturing and manipulating content using biometric data
12/27/2013CA2877451A1 Systems, methods and apparatuses for securing root certificates
12/27/2013CA2877409A1 Security mode for mobile communications devices
12/27/2013CA2877110A1 Protecting connector cover with attaching means
12/27/2013CA2875664A1 Network based management of protected data sets
12/27/2013CA2816007A1 Selection of sandbox for initiating application
12/26/2013US20130347132 Consumption Based Digital Content Rental Expiration
12/26/2013US20130347131 Systems and Methods Involving Features of Hardware Virtualization Such as Separation Kernel Hypervisors, Hypervisors, Hypervisor Guest Context, Hypervisor Contest, Rootkit Detection/Prevention, and/or Other Features
12/26/2013US20130347130 Methods and apparatus for dynamically providing modified versions of electronic device applications
12/26/2013US20130347129 System and Method for Second Factor Authentication Services
12/26/2013US20130347128 Methods and devices for presenting email addresses
12/26/2013US20130347127 Database management by analyzing usage of database fields
12/26/2013US20130347125 Secondary Asynchronous Background Authorization (SABA)
12/26/2013US20130347124 Accessing Restricted Resources In Computer Programming
12/26/2013US20130347123 Media data processing method and apparatus
12/26/2013US20130347121 System and Method For Providing Conditional access to Server-based Applications From Remote Access Devices
12/26/2013US20130347120 Secure data storage and retrieval
12/26/2013US20130347119 Data processor, communication device, data transmission method
12/26/2013US20130347118 License verification method and apparatus, and computer readable storage medium storing program therefor
12/26/2013US20130347117 Automated accounts for media playback
12/26/2013US20130347115 Tagging obtained content for white and black listing
12/26/2013US20130347114 System and method for malware detection
12/26/2013US20130347113 Determining populated ip addresses
12/26/2013US20130347110 Efficient packet handling, redirection, and inspection using offload processors
12/26/2013US20130347109 Techniques for Detecting Program Modifications
12/26/2013US20130347106 System and method of fraud and misuse detection using event logs
12/26/2013US20130347104 Analyzing executable binary code without detection
12/26/2013US20130347103 Packet capture for error tracking
12/26/2013US20130347102 Method, Apparatus and System for Access Mode Control of a Device
12/26/2013US20130347101 Terminal Authentication Method and Device
12/26/2013US20130347100 Mobile information terminal, behavioral feature learning method, and behavioral feature authentication method
12/26/2013US20130347099 Keyboard as biometric authentication device
12/26/2013US20130347098 Image forming apparatus
12/26/2013US20130347097 Image processing apparatus, image processing method, and non-transitory computer readable storage medium
12/26/2013US20130347096 Permission management method for applications, electronic device thereof, and computer readable medium
12/26/2013US20130347095 Isolation and security hardening among workloads in a multi-tenant networked environment
12/26/2013US20130347092 Remote Direct Memory Access Authentication of a Device
12/26/2013US20130347091 Single-Channel Multi-Factor Authentication
12/26/2013US20130347090 More secure image-based "captcha" technique
12/26/2013US20130347088 Remote Direct Memory Access Authentication of a Device
12/26/2013US20130347087 Authenticating A User Of A System Via An Authentication Image Mechanism
12/26/2013US20130347085 Data exfiltration attack simulation technology
12/26/2013US20130347077 Automatic authorization of users and configuration of software development environment
12/26/2013US20130347076 Automatic authorization of users and configuration of software development environment
12/26/2013US20130347075 Method and apparatus for secure consolidation of cloud services
12/26/2013US20130347074 Systems and methods for providing a one-time authorization
12/26/2013US20130347069 Referer verification apparatus and method
12/26/2013US20130347068 Detection And Management Of Unauthorized Use Of Cloud Computing Services
12/26/2013US20130347067 Dynamic human interactive proof
12/26/2013US20130347064 Method and apparatus for secure application execution
12/26/2013US20130347063 Handling claims traversing security boundaries
12/26/2013US20130347060 Systems and methods for combined physical and cyber data security
12/26/2013US20130347059 Method for Propagating Access Policies
12/26/2013US20130347058 Providing Geographic Protection To A System
12/26/2013US20130347057 Privacy Manager for Restricting Correlation of Meta-Content Having Protected Information Based on Privacy Rules
12/26/2013US20130347056 Content Rights Protection with Arbitrary Correlation of Second Content
12/26/2013US20130347055 Approach For Managing Access To Data On Client Devices
12/26/2013US20130347054 Approach For Managing Access To Data On Client Devices
12/26/2013US20130347053 Approach For Managing Access To Data On Client Devices
12/26/2013US20130347052 Multi-part internal-external process system for providing virtualization security protection
12/26/2013US20130346968 Automated controlling of host over network
12/26/2013US20130346928 Method for protecting rtl ip core
12/26/2013US20130346760 Systems, methods and apparatuses for the application-specific identification of devices
12/26/2013US20130346758 Managing use of a field programmable gate array with isolated components
12/26/2013US20130346757 Rollback protection for login security policy
12/26/2013US20130346752 Secure, auditable file exchange system and method
12/26/2013US20130346748 Systems and methods for secure multi-tenant data storage
12/26/2013US20130346738 Information processing apparatus and control method for information processing apparatus
12/26/2013US20130346492 Content Reading System and Method
12/26/2013US20130346450 System and method for detecting and integrating with native applications enabled for web-based storage
12/26/2013US20130346449 Online estate document management system
12/26/2013US20130346324 System and method for specifying and processing legality expressions
12/26/2013US20130346310 Privacy Enhancing Personal Data Brokerage Service
12/26/2013US20130345530 End-to-End Trusted Communications Infrastructure
12/25/2013EP2677682A1 Key management system
12/25/2013EP2677456A1 A memory device reminder
12/25/2013EP2677455A1 A user-interface for an electrical power converter
12/25/2013EP2677454A1 Computer, communication arrangement comprising such a computer, railway management system including such an arrangement, and method for enhancing the reliability of data in a computer
12/25/2013EP2677453A1 Secure data entry via a virtual keyboard
12/25/2013EP2677452A1 Encryption device and method for defending a physical attack
12/25/2013EP2677451A2 License verification method and apparatus, and computer readable storage medium storing program therefor
12/25/2013EP2677450A1 A system and method for compressed level-ordered edge sequence encoding
12/25/2013EP2677441A1 Storing operational data of an industrial control system
12/25/2013EP2677327A1 Method for producing an electronic device with a disabled sensitive mode, and method for transforming such an electronic device to re-activate its sensitive mode
12/25/2013EP2676246A1 Key fob with protected biometric sensor
12/25/2013EP2676219A1 Methods and apparatus for dealing with malware
12/25/2013EP2676218A1 Secure management and personalization of unique code signing keys
12/25/2013EP2587398B1 Analog circuitry to conceal activity of logic circuitry
12/25/2013EP2420949B1 Information processing system, information processing method, information processing program, computer readable medium and computer data signal
12/25/2013CN203368542U Handset or tablet computer protective housing