Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
11/2013
11/28/2013WO2013174437A1 Enhanced secure virtual machine provisioning
11/28/2013WO2013174397A1 Theft- prevention device for mobile phone
11/28/2013WO2013174395A1 Remote key safe laptop anti theft
11/28/2013WO2013174321A1 Command execution method and device, smart card and mobile terminal
11/28/2013WO2013139692A3 Method for configuring a wind energy installation, and wind energy installation
11/28/2013US20130318639 Security device for functional display, security, and charging of handheld electronic devices
11/28/2013US20130318638 Method for Programming a Mobile End Device Chip
11/28/2013US20130318637 Location-based recovery device and risk management system for portable computing devices and data
11/28/2013US20130318636 Computer chassis with protection against insects
11/28/2013US20130318634 Image forming apparatus, launching method of program in the apparatus, image forming system, and program and storage medium therefor
11/28/2013US20130318633 Data exchange between applications of an electronic device
11/28/2013US20130318632 Secure access to personal health records in emergency situations
11/28/2013US20130318631 Fraud Prevention in Online Systems
11/28/2013US20130318630 Systems and methods for validated secure data access
11/28/2013US20130318628 Systems and Methods for Providing Access to Computer Programs Based on Physical Activity Level of a User
11/28/2013US20130318627 Secure Handling of Information Related to a User
11/28/2013US20130318626 Securing access to distributed data in an unsecure data network
11/28/2013US20130318625 Method for protecting data stored in device and device thereof
11/28/2013US20130318624 Method and device for controlling distribution of licenses
11/28/2013US20130318623 Risk-management device
11/28/2013US20130318622 Private information sharing system
11/28/2013US20130318621 System and Method for Providing Information Access on a Portable Device
11/28/2013US20130318620 Location-based recovery device and risk management system for portable computing devices and data
11/28/2013US20130318619 Encapsulated security tokens for electronic transactions
11/28/2013US20130318618 Systems and methods for securing information by hiding identity on a computing device
11/28/2013US20130318616 Predicting attacks based on probabilistic game-theory
11/28/2013US20130318615 Predicting attacks based on probabilistic game-theory
11/28/2013US20130318614 Mobile application security assessment
11/28/2013US20130318613 Mobile application security score calculation
11/28/2013US20130318612 Rootkit monitoring agent built into an operating system kernel
11/28/2013US20130318610 System and Method for Detection and Treatment of Malware on Data Storage Devices
11/28/2013US20130318607 Using Power Fingerprinting (PFP) to Monitor the Integrity and Enhance Security of Computer Based Systems
11/28/2013US20130318606 Systems and Methods for Correlating and Distributing Intrusion Alert Information Among Collaborating Computer Systems
11/28/2013US20130318605 System for detecting rogue network protocol service providers
11/28/2013US20130318601 Method and system for real time classification of events in computer integrity system
11/28/2013US20130318600 Reporting and Management of Computer Systems and Data Sources
11/28/2013US20130318599 Protecting virtual machine console from misuse, hijacking or eavesdropping in cloud environments
11/28/2013US20130318598 Alternative Unlocking Patterns
11/28/2013US20130318597 Computer implemented security method and system
11/28/2013US20130318596 Password management system and method for electronic device
11/28/2013US20130318595 Authenticate a Hypervisor with Encoded Information
11/28/2013US20130318588 Identity verification systems and methods
11/28/2013US20130318584 Learning information on usage by a user, of one or more device(s), for cumulative inference of user's situation
11/28/2013US20130318583 System and method to enable external processing device running a cloud application to control a mail processing machine
11/28/2013US20130318582 Inboxes for documents, music, videos, and photos
11/28/2013US20130318581 Multi-factor authentication using a unique identification header (uidh)
11/28/2013US20130318580 Security based on usage activity associated with user device
11/28/2013US20130318578 Password management and smart honey pot system
11/28/2013US20130318575 Method and apparatus for dynamic authentication
11/28/2013US20130318573 Method and apparatus for guest access sharing
11/28/2013US20130318572 Wireless gateway supporting public and private networks
11/28/2013US20130318571 Managing distributed operating system physical resources
11/28/2013US20130318569 Propagating Delegated Authorized Credentials Through Legacy Systems
11/28/2013US20130318567 Reporting and Management of Computer Systems and Data Sources
11/28/2013US20130318361 Encrypting and storing biometric information on a storage device
11/28/2013US20130318360 Proxy computing system, computing apparatus, capability providing apparatus, proxy computing method, capability providing method, program, and recording medium
11/28/2013US20130318359 Systems and methods for verifying uniqueness in anonymous authentication
11/28/2013US20130318358 Apparatus for generating secure key using device and user authentication information
11/28/2013US20130318357 System and Method for Secure Software Update
11/28/2013US20130318356 Distribution of digital content protected by watermark-generating password
11/28/2013US20130318354 Method for generating a certificate
11/28/2013US20130318345 Multi-tunnel virtual private network
11/28/2013US20130318339 Systems and Methods for Protecting Communications Between Nodes
11/28/2013US20130318338 Selective Management Controller Authenticated Access Control to Host Mapped Resources
11/28/2013US20130315394 Data encryption method, data verification method and electronic apparatus
11/28/2013US20130315392 Method for displaying readable contents on a mobile reading device in a location-restricted manner
11/28/2013US20130315387 Encryption method characterized by three dimensional computation, feedback control, and dynamic transition box
11/28/2013DE102012010102A1 Verfahren und Vorrichtung zur Datenverarbeitung Method and device for data processing
11/27/2013EP2667579A1 Mobile information terminal and gripping characteristics authentication method
11/27/2013EP2667337A2 Transparent control of access invoking real-time analysis of the query history
11/27/2013EP2667329A1 Authorized party authentication template learning system and authorized party authentication template learning method
11/27/2013EP2667322A2 Microprocessor having a secure execution mode with provisions for monitoring, indicating, and managing security levels
11/27/2013EP2667321A1 Method for requesting digital content, for providing digital content, and for producing a personal profile of a user
11/27/2013EP2667320A1 Security verification device and security verification method
11/27/2013EP2667319A2 Computer implemented security system and method
11/27/2013EP2667318A1 Information processing apparatus, control method thereof, program, and image processing apparatus
11/27/2013EP2667317A1 Image processing apparatus, method for controlling image processing apparatus, and program
11/27/2013EP2667316A1 Electronic memory device
11/27/2013EP2667315A1 Encrypted digital content player
11/27/2013EP2667314A1 System and method for detection and treatment of malware on data storage devices
11/27/2013EP2667303A2 Methods, architectures and security mechanisms for a third-party application to access content in a cloud-based platform
11/27/2013EP2666117A1 Method for testing tamper protection of a field device and field device having tamper protection
11/27/2013EP2666116A1 System and method for supporting jit in a secure system with randomly allocated memory ranges
11/27/2013CN203311464U Dual-function security terminal for intelligent device
11/27/2013CN203311424U Electronic lock of electronic notebook
11/27/2013CN203311423U Display device and display system
11/27/2013CN203311422U Local area network computer external-connection-prevention warning device
11/27/2013CN203311421U Remote control equipment for encrypting or decrypting computer files
11/27/2013CN203311420U Intelligent control USB key
11/27/2013CN203311419U Novel computer information security device
11/27/2013CN203311418U Mobile terminal with encrypted radio frequency
11/27/2013CN203311417U Fingerprint password enter device
11/27/2013CN103415856A Device and method for online storage, transmission device and method, and receiving device and method
11/27/2013CN103415855A Mass storage device memory encryption methods, systems, and apparatus
11/27/2013CN103414723A Pet-based socialization platform registration system
11/27/2013CN103414570A Method for remotely controlling password
11/27/2013CN103414564A Secrete key card, secrete key device and method for protecting private key
11/27/2013CN103414555A Array key management method based on IO block encryption
11/27/2013CN103413267A Digital watermark smooth transition embedded method and device
11/27/2013CN103413202A Automatic authorization relation collection method applied to operation and maintenance auditing system