Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
10/2013
10/29/2013US8572754 System and method for facilitating unlocking a device connected locally to a client
10/29/2013US8572751 Method, system, and program product for preventing unauthorized changes to an electronic document
10/29/2013US8572750 Web application exploit mitigation in an information technology environment
10/29/2013US8572745 System, method, and computer program product for selecting a wireless network based on security information
10/29/2013US8572741 Providing security for a virtual machine by selectively triggering a host security scan
10/29/2013US8572740 Method and system for detection of previously unknown malware
10/29/2013US8572737 Methods and apparatuses for providing internet-based proxy services
10/29/2013US8572728 Initiation of storage device scans
10/29/2013US8572727 System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies
10/29/2013US8572717 Dynamic access control policy with port restrictions for a network security appliance
10/29/2013US8572715 Method for use in a network based safety data storage system
10/29/2013US8572713 Universal authentication token
10/29/2013US8572705 Method and system for ordering, loading and using admission tickets
10/29/2013US8572695 Method for applying a physical seal authorization to documents in electronic workflows
10/29/2013US8572694 Integrated security roles
10/29/2013US8572693 Reception apparatus
10/29/2013US8572688 Method and apparatus for session validation to access third party resources
10/29/2013US8572687 Apparatus and method for performing session validation
10/29/2013US8572683 Method and apparatus for token-based re-authentication
10/29/2013US8572682 System and method of accessing data objects in a dynamic language environment
10/29/2013US8572678 Security policy flow down system
10/29/2013US8572673 Data processing apparatus and method
10/29/2013US8572632 Devices as services in a decentralized operating system
10/29/2013US8572611 Managing conflicts between multiple users accessing a computer system having shared resources assigned to one or more logical partitions and one or more appliance partitions
10/29/2013US8572576 Executing dynamically assigned functions while providing services
10/29/2013US8572411 Systems and methods for secure transaction management and electronic rights protection
10/29/2013US8572410 Virtualized protected storage
10/29/2013US8572408 Digital rights management of a digital device
10/29/2013US8572404 Security and safety manager implementation in a multi-core processor
10/29/2013US8572398 Systems and methods for identifying biometric information as trusted and authenticating persons using trusted biometric information
10/29/2013US8572397 Biometric authentication and identification
10/29/2013US8572395 Information processing apparatus, authentication method, and computer program
10/29/2013US8572394 OTP generation using a camouflaged key
10/29/2013US8572393 Mobile communication terminal having password notify function and method for notifying password in mobile communication terminal
10/29/2013US8572392 Access authentication method, information processing unit, and computer product
10/29/2013US8572391 System and method for risk based authentication
10/29/2013US8572386 Secure device, information processing terminal, integrated circuit, terminal application generation apparatus, application authentication method
10/29/2013US8572381 Challenge protected user queries
10/29/2013US8572380 Streaming system and streaming method
10/29/2013US8572377 Method for authentication
10/29/2013US8572374 Continuous isochronous read access and measurement of data stored in non-volatile memory
10/29/2013US8572372 Method for selectively enabling access to file systems of mobile terminals
10/29/2013US8572371 Discovery of kernel rootkits with memory scan
10/29/2013US8572348 Method of establishing hard disk physical partition
10/29/2013US8572277 Self-policing, rate limiting online forums
10/29/2013US8572219 Selective tunneling based on a client configuration and request
10/29/2013US8571994 Method and system for allocating access to digital media content
10/29/2013US8571993 Reprogrammable security for controlling piracy and enabling interactive content
10/29/2013US8571221 On-chip storage, creation, and manipulation of an encryption key
10/29/2013US8571220 Method and apparatus for securing data in a memory device
10/29/2013US8571216 Eliminating plaintext video from external memory
10/29/2013US8571212 Image encrypting device, image decrypting device and method
10/29/2013CA2482243C Securely identifying an executable to a trust-determining entity
10/27/2013CA2814367A1 Packaged digital rights messaging
10/27/2013CA2813425A1 Security system and method for controlling interactions between components of a computer system
10/27/2013CA2813332A1 Software distribution accounting
10/24/2013WO2013159110A1 Multi-factor mobile transaction authentication
10/24/2013WO2013159086A1 Secure identification system and method
10/24/2013WO2013158999A1 Secure lock for mobile device
10/24/2013WO2013158833A1 Electronic device including finger-operated input device based biometric matching and related methods
10/24/2013WO2013158831A1 Electronic device including finger-operated input device based biometric enrollment and related methods
10/24/2013WO2013158789A1 Detection and prevention of installation of malicious mobile applications
10/24/2013WO2013158064A1 Trusted user interaction
10/24/2013WO2013158037A1 A method for real-time synchronization between a device and host servers
10/24/2013WO2013157957A1 Method for secure storing and sharing of a data file via a computer communication network and open cloud services
10/24/2013WO2013157938A1 Computer network for services retrieval, method for managing such network and a computer system for such network
10/24/2013WO2013157864A1 Method for authenticating user using icon combined with input pattern, and password input device
10/24/2013WO2013157124A1 License management system, management server and management method
10/24/2013WO2013156847A2 Secure zone for secure purchases
10/24/2013WO2013156764A1 Method and computer device for handling com objects
10/24/2013WO2013156665A1 Communication equipment for secure communication
10/24/2013WO2013156531A1 Secure password-based authentication for cloud computing services
10/24/2013WO2013156448A1 Method and system for user authentication
10/24/2013WO2013156315A1 Method of secure management of a memory space for microcontroller
10/24/2013WO2013156314A1 System for managing secure and nonsecure applications on one and the same microcontroller
10/24/2013WO2013156230A1 Device for digitising documents and method
10/24/2013WO2013155635A1 System and method for controlling privacy settings of user interface with internet applications
10/24/2013WO2013155562A1 Nfc card lock
10/24/2013US20130283402 Apparatus and method for embedding and extracting information in analog signals using distributed signal features and replica modulation
10/24/2013US20130283401 Information content validation for electronic devices
10/24/2013US20130283398 Versatile Log System
10/24/2013US20130283397 Method and apparatus for provisioning a mobile application
10/24/2013US20130283396 System and method for limiting execution of software to authorized users
10/24/2013US20130283395 Content protection in a wireless network
10/24/2013US20130283393 Method for playing digital contents protected with a drm (digital right management) scheme and corresponding system
10/24/2013US20130283392 Method and apparatus for policy-based content sharing in a peer to peer manner using a hardware based root of trust
10/24/2013US20130283391 Secure direct memory access
10/24/2013US20130283390 System, method and apparatus for controlling the dissemination of digital works
10/24/2013US20130283388 Method and system for information content validation in electronic devices
10/24/2013US20130283387 Method for data security and electronic device having data security function
10/24/2013US20130283386 Tamper respondent covering
10/24/2013US20130283385 Restricting communication over an encrypted network connection to internet domains that share common ip addresses and shared ssl certificates
10/24/2013US20130283384 Electronic book content protection
10/24/2013US20130283383 Platform based verification of contents of input-output devices
10/24/2013US20130283382 System and method for detecting malware in file based on genetic map of file
10/24/2013US20130283381 Systems and methods for providing anti-malware protection on storage devices
10/24/2013US20130283380 User controllable platform-level trigger to set policy for protecting platform from malware
10/24/2013US20130283378 System and method for distinguishing human swipe input sequence behavior and using a confidence value on a score to detect fraudsters
10/24/2013US20130283377 Detection and prevention of installation of malicious mobile applications
10/24/2013US20130283375 Browser System and Method for Warning Users of Potentially Fraudulent Websites