Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
01/2015
01/27/2015US8941464 Authorization system and a method of authorization
01/27/2015US8939834 Software verification and authentication
01/27/2015CA2563144C System and method for file encryption and decryption
01/26/2015CA2857504A1 Device for securing a capacitive keypad and corresponding terminal
01/22/2015WO2015009773A1 Gesture-based control of electronic devices
01/22/2015WO2015009563A1 Palm identification and in-place personalized interactive display
01/22/2015WO2015009508A1 Systems and methods for securing email in mobile devices
01/22/2015WO2015009458A1 Light installer
01/22/2015WO2015009411A1 System and method for detecting malicious links in electronic messages
01/22/2015WO2015009308A1 Time based ip address hopping
01/22/2015WO2015009247A1 System for granting web trust seals with detection of ip-address redirection attacks
01/22/2015WO2015009119A1 Deniable encryption system and method
01/22/2015WO2015008769A1 Directory service device, client device, key cloud system, method thereof, and program
01/22/2015WO2015008623A1 Key storage device, key storage method, and program therefor
01/22/2015WO2015008521A1 Content transmission device, content transmission method, content reception device, content reception method, computer program, and content transferring system
01/22/2015WO2015008484A1 Backup control device and backup control method
01/22/2015WO2015008480A1 Information processing device that performs anonymization, and anonymization method
01/22/2015WO2015008126A1 System and method for discovery moment monetization of media
01/22/2015WO2015008114A1 Illegal message destroyer
01/22/2015WO2015008112A1 System on chip and method therefor
01/22/2015WO2015007491A1 Method for transferring user data between two instances of an application
01/22/2015WO2015007234A1 Method and device for operating encrypted files
01/22/2015WO2015007224A1 Malicious program finding and killing method, device and server based on cloud security
01/22/2015WO2015007220A1 Method, device, and terminal for exiting operating interface of application program
01/22/2015WO2015007166A1 Method and apparatus for detecting security vulnerability for animation source file
01/22/2015WO2015006912A1 Methods, apparatuses, and computer program products for hiding access to information in an image
01/22/2015WO2015006798A1 Secure data object generation and management
01/22/2015US20150026830 Method and system for locating a notebook computer
01/22/2015US20150026829 Anti-keylog editor
01/22/2015US20150026828 Methods and apparatus for character set control, verification and reporting
01/22/2015US20150026827 Method for application management, corresponding system, and user device
01/22/2015US20150026825 Method of navigating through digital content
01/22/2015US20150026824 Device and method for providing user activity information in portable terminal
01/22/2015US20150026823 Method and system for entitlement setting, mapping, and monitoring in big data stores
01/22/2015US20150026822 Protection of proprietary embedded instruments
01/22/2015US20150026821 Management of digital information
01/22/2015US20150026820 Alternate content playlist for locked media content
01/22/2015US20150026819 Selectively allowing reference to object on unlock display screen
01/22/2015US20150026818 Method and device for providing temporary contact information
01/22/2015US20150026817 Hiding Sensitive Data In Plain Text Environment
01/22/2015US20150026816 Display method and electronic device
01/22/2015US20150026815 Managing and accounting for privacy settings through tiered cookie set access
01/22/2015US20150026814 Invisible interface for managing secured data transactions
01/22/2015US20150026812 Method and device for detecting virus of installation package
01/22/2015US20150026807 Page Fault Injection In Virtual Machines
01/22/2015US20150026805 Device reputation management
01/22/2015US20150026803 Native Code Module Security for Arm Instruction Set Architectures
01/22/2015US20150026798 Electronic device and method for identifying a remote device
01/22/2015US20150026797 Electronic device and authentication system therein and method
01/22/2015US20150026796 Event-Based Security Challenges
01/22/2015US20150026795 Method and system for extending the sign-in process for accessing computer systems
01/22/2015US20150026788 Authentication by image manipulation
01/22/2015US20150026771 Methods and systems for authenticating users
01/22/2015US20150026764 Detecting, enforcing and controlling access privileges based on sandbox usage
01/22/2015US20150026763 Educating users and enforcing data dissemination policies
01/22/2015US20150026760 System and Method for Policy-Based Confidentiality Management
01/22/2015US20150026759 Method of enforcing control of access by a device to a secure element, and corresponding secure element
01/22/2015US20150026755 Enterprise collaboration content governance framework
01/22/2015US20150026703 Methods and systems for setting access to a list of class entities
01/22/2015US20150026682 Redirection of information from secure virtual machines to unsecure virtual machines
01/22/2015US20150026485 Method and apparatus for prevention of tampering and unauthorized use, and unauthorized extraction of information from secured devices
01/22/2015US20150026484 Smart storage device
01/22/2015US20150026483 Systems and Methods for Mobile Application Protection
01/22/2015US20150026482 Systems, methods, software, and components using tamper-proof real-time clock
01/22/2015US20150026481 Computation Protected Against Spying
01/22/2015US20150026480 Personal Digital Key Initialization And Registration For Secure Transactions
01/22/2015US20150026479 Creation and authentication of biometric information
01/22/2015US20150026476 Method for reading an attribute from an id token
01/22/2015US20150026471 Staged Control Release in Boot Process
01/22/2015US20150026468 Token-based security for links to media streams
01/22/2015US20150026467 Methods and Apparatus for Authenticating Data as Originating from a Storage and Processing Device and for Securing Software and Data Stored on the Storage and Processing Device
01/22/2015US20150026463 Secure system for allowing the execution of authorized computer program code
01/22/2015US20150026462 Method and system for access-controlled decryption in big data stores
01/22/2015US20150026461 System and Method to Create Resilient Site Master-key for Automated Access
01/22/2015US20150026460 Systems, Methods and Media for Selective Decryption of Files Containing Sensitive Data
01/22/2015US20150026457 Controlling access by code
01/22/2015US20150026456 Apparatus and method for managing digital copyright on epub-based content, and apparatus and method for providing epub-based content according to user's right
01/22/2015US20150026452 Digital rights management
01/22/2015US20150026451 Multiprocessor Fabric Having Configurable Communication that is Selectively Disabled for Secure Processing
01/22/2015US20150026215 Autonomous role-based security for database management systems
01/22/2015US20150026208 Dynamic authorization to features and data in java-based enterprise applications
01/22/2015US20150026080 Methods and apparatus for title protocol, authentication, and sharing
01/22/2015US20150026078 Generating and providing an authorization indication in relation to a media content item
01/22/2015US20150026068 Focus-based challenge-response authentication
01/22/2015US20150026054 Customer-defined online-banking access restrictions
01/22/2015US20150023567 Palm identification and in-place personalized interactive display
01/22/2015US20150022969 Computer case with recorded open and closed states
01/22/2015US20150022848 Image forming system and image forming device
01/22/2015DE112013002396T5 Anwendungsprogrammausführungsgerät Application program execution unit
01/22/2015DE112012006329T5 Speicherprogrammierbare Steuerung Programmable logic controller
01/22/2015DE102011016163B4 Dokumentiervorrichtung mit Satellitennavigationssystem-Datenempfänger und Verfahren zum Dokumentieren des Zustands einer in oder an einem Gebäude installierten technischen Vorrichtung Dokumentiervorrichtung with satellite navigation system data receiver and method for documenting the state of a device installed in or on a building technical device
01/21/2015EP2827627A1 Automatic configuration of a wireless device
01/21/2015EP2827537A1 Filtering messages containing illegally copied content out of a telecommunication network
01/21/2015EP2827279A1 Electro-mechanic USB locking device
01/21/2015EP2827278A1 Mobile electronic device, operation control program, and operation control method
01/21/2015EP2827277A1 Privacy protection in personalisation services
01/21/2015EP2827276A1 Secure data processing
01/21/2015EP2827275A1 Method for transferring user data between two instances of an application
01/21/2015EP2827274A1 Method of enforcing control of access by a device to a secure element, and corresponding secure element
01/21/2015EP2827273A1 System and method for dynamic generation of anti-virus databases
1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 ... 1193