Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
10/2013
10/31/2013WO2013163487A1 Retrieving content from website through sandbox
10/31/2013WO2013163285A1 Fraud resistant passcode entry system
10/31/2013WO2013163273A1 Security method and apparatus having digital and analog components
10/31/2013WO2013163164A1 Application-specific file type generation and use
10/31/2013WO2013163098A1 Systems and methods for controlling output of content based on human recognition data detection
10/31/2013WO2013162941A1 Automatic user swap
10/31/2013WO2013162843A1 Tamper respondent covering
10/31/2013WO2013162778A1 Identity verification
10/31/2013WO2013162434A1 Method and system for controlled communication between applications
10/31/2013WO2013162402A1 Digital information protection method
10/31/2013WO2013162296A1 Passcode operating system, passcode apparatus, and super-passcode generating method
10/31/2013WO2013162208A1 Scalable and secure application resource management and access control for multicore operating systems
10/31/2013WO2013161974A1 Method for distributing and executing application program capable of detecting falsification
10/31/2013WO2013161635A1 Information processing apparatus, authentication system, authentication method, and program
10/31/2013WO2013161586A1 Encrypted database system, client terminal, database server, connecting method, and program
10/31/2013WO2013161371A1 Program providing device, system, program providing method and program
10/31/2013WO2013161297A1 Medical information authentication system
10/31/2013WO2013161212A1 Policy-based dynamic information flow controlon mobile devices
10/31/2013WO2013160766A2 Data manager centralized storage for multiple service applications
10/31/2013WO2013160765A2 Cyber security analyzer
10/31/2013WO2013160575A1 Cyclic redundancy check method with protection from side channel attacks
10/31/2013WO2013160539A1 Method and apparatus for privacy protection in images
10/31/2013WO2013160320A1 An electronic educational device comprising a user recognition unit
10/31/2013WO2013160309A1 Industrial automation and control device user access
10/31/2013WO2013160032A1 Method for establishing the originality of a component
10/31/2013WO2013160009A1 Method and device for recognizing a manipulation on an electrical line
10/31/2013WO2013159632A1 Method, firewall, terminal and readable storage medium for implementing security protection
10/31/2013WO2013159609A1 Security device and display method thereof
10/31/2013WO2013159607A1 Security detection method and system
10/31/2013WO2013159466A1 Method for processing digital rights management file, terminal device, and cloud
10/31/2013WO2013130561A3 Method of operating a computing device, computing device and computer program
10/31/2013US20130291131 Approaches for a location aware client
10/31/2013US20130291130 Protection of Memory Field Using Illegal Values
10/31/2013US20130291129 Accepting third party content contributions
10/31/2013US20130291128 Anonymizing apparatus and anonymizing method
10/31/2013US20130291125 Method and Apparatus for Facilitating the Transfer of a Software License between Computer Systems
10/31/2013US20130291124 Method and System for Managing Data in a Communication Network
10/31/2013US20130291123 Privacy management across multiple devices
10/31/2013US20130291122 Document security
10/31/2013US20130291119 Packaged digital rights messaging
10/31/2013US20130291118 Protecting privacy data in mapreduce system
10/31/2013US20130291117 Protecting address resolution protocol neighbor discovery cache against denial of service attacks
10/31/2013US20130291116 Method for External Storage of Medical Device Program Design Parameters
10/31/2013US20130291115 System and method for logging security events for an industrial control system
10/31/2013US20130291114 Methods, systems, and computer readable media for combining ip fragmentation evasion techniques
10/31/2013US20130291113 Process flow optimized directed graph traversal
10/31/2013US20130291112 Architecture for removable media usb-arm
10/31/2013US20130291111 Method and Device for Program Identification Based on Machine Learning
10/31/2013US20130291110 Systems and methods for providing anti-malware protection and malware forensics on storage devices
10/31/2013US20130291108 Apparatus and method for detecting traffic flooding attack and conducting in-depth analysis using data mining
10/31/2013US20130291107 System and Method for Mitigating Application Layer Distributed Denial of Service Attacks Using Human Behavior Analysis
10/31/2013US20130291106 Enterprise level information alert system
10/31/2013US20130291103 System and Method for Run-Time Attack Prevention
10/31/2013US20130291101 Detecting and blocking domain name system cache poisoning attacks
10/31/2013US20130291100 Detection And Prevention Of Machine-To-Machine Hijacking Attacks
10/31/2013US20130291099 Notification services with anomaly detection
10/31/2013US20130291098 Determining trust between parties for conducting business transactions
10/31/2013US20130291097 Mobile information terminal, gripping-feature learning method, and gripping-feature authentication method
10/31/2013US20130291096 Fraud resistant passcode entry system
10/31/2013US20130291095 Security device and display method thereof
10/31/2013US20130291094 Systems and methods for securing controllers
10/31/2013US20130291093 Automatic user swap
10/31/2013US20130291092 Security Method and Apparatus Having Digital and Analog Components
10/31/2013US20130291091 Location Bound Secure Domains
10/31/2013US20130291090 Identifying user by measuring pressure of button presses on user input device
10/31/2013US20130291089 Data communication method and device and data interaction system based on browser
10/31/2013US20130291087 Systems and methods for integrating cloud services with information management systems
10/31/2013US20130291085 Systems and methods for secure operation of an industrial controller
10/31/2013US20130291081 System and method for computer authentication using image analysis of a shared secret
10/31/2013US20130291080 Systems and methods for data access protection
10/31/2013US20130291079 System and method for posting content to network sites
10/31/2013US20130291076 Dynamic replacement of security credentials for secure proxying
10/31/2013US20130291073 Multi-stack subscriber sign on
10/31/2013US20130291068 Managing Cloud Zones
10/31/2013US20130291067 Identification of Unauthorized or Misconfigured Wireless Access Point Using Distributed Endpoints
10/31/2013US20130291066 Method and apparatus to keep consistency of acls among a meta data server and data servers
10/31/2013US20130291065 Gathering gamification data from business applications
10/31/2013US20130291064 Authentication using lights-out management credentials
10/31/2013US20130291063 Identification of Unauthorized or Misconfigured Wireless Access Point Using Distributed Endpoints
10/31/2013US20130291062 Secure Administration of Virtual Machines
10/31/2013US20130291060 Security facility for maintaining health care data pools
10/31/2013US20130291059 System and method for using partial evaluation for efficient remote attribute retrieval
10/31/2013US20130291057 Security system and method for controlling interactions between components of a computer system
10/31/2013US20130291054 Method and apparatus for providing audio or video capture functionality according to a security policy
10/31/2013US20130291053 Security Controlled Multi-Processor System
10/31/2013US20130291052 Trusted public infrastructure grid cloud
10/31/2013US20130291051 System call interception
10/31/2013US20130290961 Multiple Mode Mobile Device
10/31/2013US20130290958 System and method for on-demand cloning of virtual machines
10/31/2013US20130290738 Memory chip
10/31/2013US20130290737 Method of distributing a decryption key in fixed-content data
10/31/2013US20130290736 Data storage device, data control device and method for encrypting data
10/31/2013US20130290735 Authentication device and system
10/31/2013US20130290729 Systems and methods for controlling file execution for industrial control systems
10/31/2013US20130290727 Encrypting operating system
10/31/2013US20130290726 Methods for secure restoration of personal identity credentials into electronic devices
10/31/2013US20130290720 Process and system for selectable data transmission
10/31/2013US20130290717 Method and system for providing continued access to authentication and encryption services
10/31/2013US20130290709 Policy-based dynamic information flow control on mobile devices
10/31/2013US20130290705 Method and apparatus for on-site authorisation