Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
11/2013
11/12/2013US8583555 Synchronizing multiple playback device timing utilizing DRM encoding
11/12/2013US8582778 Integrated key server
11/12/2013US8582763 Method and apparatus for decoding broadband data
11/12/2013US8581692 Electronic system and method of operating an electronic system
11/12/2013US8579705 Software verification and authentication
11/12/2013US8579190 Device for reading magnetic stripe and/or chip cards with a touch screen for pin entry
11/12/2013CA2733222C Management of communications from stolen devices
11/07/2013WO2013166418A2 Methods and systems of digital rights management for vehicles
11/07/2013WO2013166126A1 Systems and methods for providing mobile security based on dynamic attestation
11/07/2013WO2013165801A1 Electronic device including a finger sensor having a valid authentication threshold time period and related methods
11/07/2013WO2013165651A1 Method and system for activation
11/07/2013WO2013165317A1 Method and system for protecting a password during an authentication process
11/07/2013WO2013164821A2 Malicious threat detection, malicious threat prevention, and a learning systems and methods for malicious threat detection and prevention
11/07/2013WO2013164306A1 Method of loading an application in a secure device
11/07/2013WO2013163720A1 User identity detection on interactive surfaces
11/07/2013WO2013079923A3 A method of securing electronic information
11/07/2013WO2003048892A3 Access, identity, and ticketing system for providing multiple access methods for smart devices
11/07/2013US20130298262 System and Method for Manipulating Security of Integrated Circuit Layout
11/07/2013US20130298261 Activating licensable component provided by third party to audio video device
11/07/2013US20130298260 Federation of email
11/07/2013US20130298259 Database and Method for Controlling Access to a Database
11/07/2013US20130298258 Managing network identities
11/07/2013US20130298257 Device for right managing web data, recording medium for performing method for right managing web data on computer, and device and method for providing right management information
11/07/2013US20130298256 Systems and methods for monitoring and mitigating information leaks
11/07/2013US20130298255 System and method for defining programmable processing steps applied when protecting the data
11/07/2013US20130298252 System for mechanical and electronic protection of safe equipment
11/07/2013US20130298251 Method and Apparatus for Secure Execution Using a Secure Memory Partition
11/07/2013US20130298250 Systems, Methods, and Apparatus to Virtualize TPM Accesses
11/07/2013US20130298249 Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
11/07/2013US20130298248 Method and apparatus for providing location privacy
11/07/2013US20130298247 Method And Apparatus For User Information Exchange
11/07/2013US20130298246 Obfuscating entry of sensitive information
11/07/2013US20130298245 Generating vulnerability reports based on application binary interface/application programming interface usage
11/07/2013US20130298244 Systems and methods for threat identification and remediation
11/07/2013US20130298243 Systems and methods for orchestrating runtime operational integrity
11/07/2013US20130298242 Systems and methods for providing mobile security based on dynamic attestation
11/07/2013US20130298239 Method and System for Monitoring a Computer System
11/07/2013US20130298238 Method and system for automatic detection of eavesdropping of an account based on identifiers and conditions
11/07/2013US20130298237 Systems and methods for spontaneously configuring a computer network
11/07/2013US20130298236 Systems and methods for identifying, deterring and/or delaying attacks to a network using shadow networking techniques
11/07/2013US20130298235 Systems and methods for dynamically changing network states
11/07/2013US20130298234 Method for protecting computer programs and data from hostile code
11/07/2013US20130298230 Systems and methods for network flow remediation based on risk correlation
11/07/2013US20130298229 Enterprise security manager remediator
11/07/2013US20130298228 Router for communicating data in a dynamic computer network
11/07/2013US20130298227 Systems and methods for implementing moving target technology in legacy hardware
11/07/2013US20130298226 Method and Terminal for Locking/Unlocking Terminal Screen Based on RFID
11/07/2013US20130298225 Mobile information terminal and gripping-feature learning method
11/07/2013US20130298223 Methods and computing devices for password verification
11/07/2013US20130298221 Firewalls for filtering communications in a dynamic computer network
11/07/2013US20130298219 Secure Layered Iterative Gateway
11/07/2013US20130298217 Security model for industrial devices
11/07/2013US20130298216 Single sign-on account management for a display device
11/07/2013US20130298215 Single sign-on user registration for online or client account services
11/07/2013US20130298213 Systems and Methods for Using Voiceprints to Generate Passwords on Mobile Devices
11/07/2013US20130298210 Certificate based connection to cloud virtual machine
11/07/2013US20130298208 System for mobile security
11/07/2013US20130298205 Architecture for virtual security module
11/07/2013US20130298200 Account security protection method and system
11/07/2013US20130298197 Device-based authentication for secure online access
11/07/2013US20130298195 Image-Based CAPTCHA Exploiting Context in Object Recognition
11/07/2013US20130298192 Systems and methods for using reputation scores in network services and transactions to calculate security risks to computer systems and platforms
11/07/2013US20130298189 Functionality Watermarking and Management
11/07/2013US20130298187 Managing virtual identities
11/07/2013US20130298186 System and Method for Policy Based Privileged User Access Management
11/07/2013US20130298185 Mobile application management systems and methods thereof
11/07/2013US20130298184 System and method for monitoring application security in a network environment
11/07/2013US20130298183 CARTRIDGES IN A MULTI-TENANT PLATFORM-AS-A-SERVICE (PaaS) SYSTEM IMPLEMENTED IN A CLOUD COMPUTING ENVIRONMENT
11/07/2013US20130298182 Policy-based configuration of internet protocol security for a virtual private network
11/07/2013US20130298181 Noise, encryption, and decoys for communications in a dynamic computer network
11/07/2013US20130297948 System on chip, method of operating the same, and devices including the system on chip
11/07/2013US20130297946 Selective authorization of the loading of dependent code modules by running processes
11/07/2013US20130297945 Using biometrics as an encryption key
11/07/2013US20130297944 Integrity protected smart card transaction
11/07/2013US20130297931 Systems and methods for authenticating an electronic message
11/07/2013US20130297925 Authentication system for gaming machines and related methods
11/07/2013US20130297737 Multiparty watermarking method and system
11/07/2013US20130297654 Method and system for generating database access objects
11/07/2013US20130297472 Identify Potential Account Numbers in a Single Pass of a List of Digits
11/07/2013US20130297456 Methods and Systems of Digital Rights Management for Vehicles
11/07/2013US20130297379 Privacy protection system and method
11/07/2013US20130297100 Methods and Systems for Authenticating One or More Users of a Vehicle Communications and Information System
11/07/2013US20130294599 Pluggable cryptography
11/07/2013US20130293920 Image forming apparatus, user restriction method and use history generation method
11/07/2013US20130292460 Control of Devices via Interaction with an Object
11/07/2013DE102013104167A1 Ein-Chip-System, Verfahren zum Betreiben desselben und Vorrichtung mit dem Ein-Chip-System A-chip system, and method of operating the same apparatus with the on-chip system
11/07/2013DE102012207293A1 Method for protecting programmable device for manufacture of product e.g. electronic product, involves distorting operation code associated with selected memory address and providing distorted operation codes in second table
11/07/2013DE102012008987A1 Method for operating mobile telephone, involves detecting whether cryptographic routine of trusted region is disrupted during execution, and setting non volatile backup when faulty operation counter reaches predetermined threshold value
11/07/2013DE102009013606B4 Speichervorrichtung zur Verhinderung einer unautorisierten Verwendung von Daten und Verfahren zum Betreiben derselben Storage device for preventing unauthorized use of data and methods for operating the same
11/06/2013EP2661049A2 System and method for malware detection
11/06/2013EP2660752A2 Memory protection circuit, processing unit, and memory protection method
11/06/2013EP2660751A1 Systems and methods for securing controllers
11/06/2013EP2660750A1 System and method for securing controllers
11/06/2013EP2660749A1 Operating device with authentication means
11/06/2013EP2660748A1 Method and system for managing password
11/06/2013EP2660747A1 Safety module
11/06/2013EP2660721A1 Method of loading an application in a secure device
11/06/2013EP2660668A2 Systems and methods for controlling file execution for industrial control systems
11/06/2013EP2659694A2 System and method for secure containment of sensitive financial information stored in a mobile communication terminal
11/06/2013EP2659657A1 Biometric user equipment gui trigger