Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
12/2013
12/17/2013US8613042 Access control list conversion system, and method and program threrfor
12/17/2013US8612777 Apparatus and method for writing data to be stored to a predetermined memory area
12/17/2013US8612776 Storage control apparatus to which thin provisioning is applied
12/17/2013US8612775 Computer system for managing storage area state of a storage system
12/17/2013US8612774 Secure OTP using external memory
12/17/2013US8612770 Biometric authentication method and computer system
12/17/2013US8612769 Electronic signature method and device
12/17/2013US8612768 Unique account identification
12/17/2013US8612767 Obscuring an accelerometer signal
12/17/2013US8612766 Secure credential unlock using trusted execution environments
12/17/2013US8612765 Security based on subliminal and supraliminal channels for data objects
12/17/2013US8612760 Decrypting identity key from battery with root key in host
12/17/2013US8612755 Security policy in trusted computing systems
12/17/2013US8612747 System and method for establishing historical usage-based hardware trust
12/17/2013US8612744 Distributed firewall architecture using virtual machines
12/17/2013US8612708 Hardware data protection device
12/17/2013US8612492 Relationship collaboration system
12/17/2013US8612356 Voucher code redemption via SMS
12/17/2013US8612354 Method for controlling digital rights of the “Play N times” type for a digital audio and/or video content and device implementing this method
12/17/2013US8610538 Memory-tag data authentication
12/17/2013US8610454 System and methods for generating unclonable security keys in integrated circuits
12/17/2013CA2587155C System and method for processing messages with encryptable message parts
12/17/2013CA2511531C Protected media path and refusal response enabler
12/12/2013WO2013185099A1 System and methods for determing decomposition graph complexity
12/12/2013WO2013185020A1 Method and apparatus for unlocking an electronic device that allows for profile selection
12/12/2013WO2013184799A1 Evaluating whether to block or allow installation of a software application
12/12/2013WO2013184705A1 Method, apparatus and system of controlling remote login
12/12/2013WO2013184653A1 Method and system for resilient and adaptive detection of malicious websites
12/12/2013WO2013184567A1 Apparatus and method for forming secure computational resources
12/12/2013WO2013184529A2 Malicious message detection and processing
12/12/2013WO2013184523A1 Sql transformation-based optimization techniques for enforcement of data access control
12/12/2013WO2013184501A1 Component analysis of software applications on computing devices
12/12/2013WO2013184365A1 System management using messages
12/12/2013WO2013184281A1 Kernel-level security agent
12/12/2013WO2013184267A1 Enhanced 2chk authentication security with query transactions
12/12/2013WO2013184266A2 Enhanced 2chk authentication security with query transactions
12/12/2013WO2013184265A1 Enterprise triggered 2chk association
12/12/2013WO2013184016A1 Method for carrying out secure communication in computer networks (variants)
12/12/2013WO2013183250A1 Information processing device for anonymization and anonymization method
12/12/2013WO2013183083A1 Storage system and storage system management method
12/12/2013WO2013183039A2 Clickjacking protection
12/12/2013WO2013183012A1 Off-line content delivery
12/12/2013WO2013183010A1 Auxiliary input device for encrypted data entry
12/12/2013WO2013182639A1 Method of anonymization
12/12/2013WO2013182632A1 Random number distribution
12/12/2013WO2013182417A1 Method of managing a memory embedded in an electronic token
12/12/2013WO2013182376A1 Method and system for executing a secure application on an untrusted user equipment
12/12/2013WO2013182286A1 Secure data processing
12/12/2013WO2013182285A1 Secure data processing
12/12/2013WO2013182154A1 Method, system and terminal for encrypting/decrypting application program on communication terminal
12/12/2013WO2013182131A1 Configuration method, configuration apparatus and electronic device
12/12/2013WO2013182119A1 Screen unlocking method, device and terminal
12/12/2013WO2013182073A1 Method and system for identifying file security and storage medium
12/12/2013WO2013182048A1 Malware removal method and system, and computer storage medium
12/12/2013WO2013182008A1 Computer health index display apparatus and method
12/12/2013WO2013182006A1 Method and device for use in intercepting call for service by application
12/12/2013WO2013182005A1 Method and device for use in intercepting call for service by application
12/12/2013WO2013181938A1 Media playing method and device
12/12/2013WO2013181682A1 Method and device for control of a lock mechanism using a mobile terminal
12/12/2013WO2013070773A3 Methods, devices, and systems for detecting return-oriented programming exploits
12/12/2013US20130333056 System and method for changing abilities of a process
12/12/2013US20130333054 Post-download patient data protection in a medical device
12/12/2013US20130333053 Method for protecting firmware being updated
12/12/2013US20130333052 Information processing system, information processing apparatus, and computer-readable storage medium
12/12/2013US20130333051 Random value identification device, random value identification system, and random value identification method
12/12/2013US20130333050 Method for producing a secured data object and system
12/12/2013US20130333049 Data protection method for portable electronic device and computer program product for the same
12/12/2013US20130333046 System and method of automatically detecting outliers in usage patterns
12/12/2013US20130333045 Security level visualization device
12/12/2013US20130333044 Vulnerability-based remediation selection
12/12/2013US20130333043 Mechanism to Calculate Probability of a Cyber Security Incident
12/12/2013US20130333042 Storage system and storage system management method
12/12/2013US20130333041 Method and Apparatus for Automatic Identification of Affected Network Resources After a Computer Intrusion
12/12/2013US20130333040 Kernel-Level Security Agent
12/12/2013US20130333039 Evaluating Whether to Block or Allow Installation of a Software Application
12/12/2013US20130333037 Methods, systems, and media for detecting covert malware
12/12/2013US20130333036 System, method and program for identifying and preventing malicious intrusions
12/12/2013US20130333034 Method and Apparatus for Automatic Identification of Affected Network Resources After a Computer Intrusion
12/12/2013US20130333033 Software protection mechanism
12/12/2013US20130333032 Network based device security and controls
12/12/2013US20130333031 Dynamic code insertion and removal for static analysis based sandboxes
12/12/2013US20130333027 Dynamic rights assignment
12/12/2013US20130333026 Malicious message detection and processing
12/12/2013US20130333025 System and method for role based analysis and access control
12/12/2013US20130333024 Random value identification device, random value identification system, and random value identification method
12/12/2013US20130333023 Electronic paper with mode switch unit
12/12/2013US20130333022 Sharing Content Online
12/12/2013US20130333021 Preventing malicious software from utilizing access rights
12/12/2013US20130333020 Method and Apparatus for Unlocking an Electronic Device that Allows for Profile Selection
12/12/2013US20130333010 Enhancing Password Protection
12/12/2013US20130333009 Dynamic trust connection
12/12/2013US20130333008 Enhanced 2chk authentication security with query transactions
12/12/2013US20130333006 Enterprise triggered 2chk association
12/12/2013US20130333004 Client computer, remote control system, and remote control method
12/12/2013US20130333003 Systems and methods for implementing multi-factor authentication
12/12/2013US20130333002 Dynamic authentication in alternate operating environment
12/12/2013US20130332997 Computerized system and method for deployment of management tunnels
12/12/2013US20130332996 System and process for managing network communications
12/12/2013US20130332995 System and method for using machine readable code to commission device applications
12/12/2013US20130332992 Methods and systems for identifying a trustable workflow based on a comprehensive trust model