Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
10/29/2013 | US8572754 System and method for facilitating unlocking a device connected locally to a client |
10/29/2013 | US8572751 Method, system, and program product for preventing unauthorized changes to an electronic document |
10/29/2013 | US8572750 Web application exploit mitigation in an information technology environment |
10/29/2013 | US8572745 System, method, and computer program product for selecting a wireless network based on security information |
10/29/2013 | US8572741 Providing security for a virtual machine by selectively triggering a host security scan |
10/29/2013 | US8572740 Method and system for detection of previously unknown malware |
10/29/2013 | US8572737 Methods and apparatuses for providing internet-based proxy services |
10/29/2013 | US8572728 Initiation of storage device scans |
10/29/2013 | US8572727 System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies |
10/29/2013 | US8572717 Dynamic access control policy with port restrictions for a network security appliance |
10/29/2013 | US8572715 Method for use in a network based safety data storage system |
10/29/2013 | US8572713 Universal authentication token |
10/29/2013 | US8572705 Method and system for ordering, loading and using admission tickets |
10/29/2013 | US8572695 Method for applying a physical seal authorization to documents in electronic workflows |
10/29/2013 | US8572694 Integrated security roles |
10/29/2013 | US8572693 Reception apparatus |
10/29/2013 | US8572688 Method and apparatus for session validation to access third party resources |
10/29/2013 | US8572687 Apparatus and method for performing session validation |
10/29/2013 | US8572683 Method and apparatus for token-based re-authentication |
10/29/2013 | US8572682 System and method of accessing data objects in a dynamic language environment |
10/29/2013 | US8572678 Security policy flow down system |
10/29/2013 | US8572673 Data processing apparatus and method |
10/29/2013 | US8572632 Devices as services in a decentralized operating system |
10/29/2013 | US8572611 Managing conflicts between multiple users accessing a computer system having shared resources assigned to one or more logical partitions and one or more appliance partitions |
10/29/2013 | US8572576 Executing dynamically assigned functions while providing services |
10/29/2013 | US8572411 Systems and methods for secure transaction management and electronic rights protection |
10/29/2013 | US8572410 Virtualized protected storage |
10/29/2013 | US8572408 Digital rights management of a digital device |
10/29/2013 | US8572404 Security and safety manager implementation in a multi-core processor |
10/29/2013 | US8572398 Systems and methods for identifying biometric information as trusted and authenticating persons using trusted biometric information |
10/29/2013 | US8572397 Biometric authentication and identification |
10/29/2013 | US8572395 Information processing apparatus, authentication method, and computer program |
10/29/2013 | US8572394 OTP generation using a camouflaged key |
10/29/2013 | US8572393 Mobile communication terminal having password notify function and method for notifying password in mobile communication terminal |
10/29/2013 | US8572392 Access authentication method, information processing unit, and computer product |
10/29/2013 | US8572391 System and method for risk based authentication |
10/29/2013 | US8572386 Secure device, information processing terminal, integrated circuit, terminal application generation apparatus, application authentication method |
10/29/2013 | US8572381 Challenge protected user queries |
10/29/2013 | US8572380 Streaming system and streaming method |
10/29/2013 | US8572377 Method for authentication |
10/29/2013 | US8572374 Continuous isochronous read access and measurement of data stored in non-volatile memory |
10/29/2013 | US8572372 Method for selectively enabling access to file systems of mobile terminals |
10/29/2013 | US8572371 Discovery of kernel rootkits with memory scan |
10/29/2013 | US8572348 Method of establishing hard disk physical partition |
10/29/2013 | US8572277 Self-policing, rate limiting online forums |
10/29/2013 | US8572219 Selective tunneling based on a client configuration and request |
10/29/2013 | US8571994 Method and system for allocating access to digital media content |
10/29/2013 | US8571993 Reprogrammable security for controlling piracy and enabling interactive content |
10/29/2013 | US8571221 On-chip storage, creation, and manipulation of an encryption key |
10/29/2013 | US8571220 Method and apparatus for securing data in a memory device |
10/29/2013 | US8571216 Eliminating plaintext video from external memory |
10/29/2013 | US8571212 Image encrypting device, image decrypting device and method |
10/29/2013 | CA2482243C Securely identifying an executable to a trust-determining entity |
10/27/2013 | CA2814367A1 Packaged digital rights messaging |
10/27/2013 | CA2813425A1 Security system and method for controlling interactions between components of a computer system |
10/27/2013 | CA2813332A1 Software distribution accounting |
10/24/2013 | WO2013159110A1 Multi-factor mobile transaction authentication |
10/24/2013 | WO2013159086A1 Secure identification system and method |
10/24/2013 | WO2013158999A1 Secure lock for mobile device |
10/24/2013 | WO2013158833A1 Electronic device including finger-operated input device based biometric matching and related methods |
10/24/2013 | WO2013158831A1 Electronic device including finger-operated input device based biometric enrollment and related methods |
10/24/2013 | WO2013158789A1 Detection and prevention of installation of malicious mobile applications |
10/24/2013 | WO2013158064A1 Trusted user interaction |
10/24/2013 | WO2013158037A1 A method for real-time synchronization between a device and host servers |
10/24/2013 | WO2013157957A1 Method for secure storing and sharing of a data file via a computer communication network and open cloud services |
10/24/2013 | WO2013157938A1 Computer network for services retrieval, method for managing such network and a computer system for such network |
10/24/2013 | WO2013157864A1 Method for authenticating user using icon combined with input pattern, and password input device |
10/24/2013 | WO2013157124A1 License management system, management server and management method |
10/24/2013 | WO2013156847A2 Secure zone for secure purchases |
10/24/2013 | WO2013156764A1 Method and computer device for handling com objects |
10/24/2013 | WO2013156665A1 Communication equipment for secure communication |
10/24/2013 | WO2013156531A1 Secure password-based authentication for cloud computing services |
10/24/2013 | WO2013156448A1 Method and system for user authentication |
10/24/2013 | WO2013156315A1 Method of secure management of a memory space for microcontroller |
10/24/2013 | WO2013156314A1 System for managing secure and nonsecure applications on one and the same microcontroller |
10/24/2013 | WO2013156230A1 Device for digitising documents and method |
10/24/2013 | WO2013155635A1 System and method for controlling privacy settings of user interface with internet applications |
10/24/2013 | WO2013155562A1 Nfc card lock |
10/24/2013 | US20130283402 Apparatus and method for embedding and extracting information in analog signals using distributed signal features and replica modulation |
10/24/2013 | US20130283401 Information content validation for electronic devices |
10/24/2013 | US20130283398 Versatile Log System |
10/24/2013 | US20130283397 Method and apparatus for provisioning a mobile application |
10/24/2013 | US20130283396 System and method for limiting execution of software to authorized users |
10/24/2013 | US20130283395 Content protection in a wireless network |
10/24/2013 | US20130283393 Method for playing digital contents protected with a drm (digital right management) scheme and corresponding system |
10/24/2013 | US20130283392 Method and apparatus for policy-based content sharing in a peer to peer manner using a hardware based root of trust |
10/24/2013 | US20130283391 Secure direct memory access |
10/24/2013 | US20130283390 System, method and apparatus for controlling the dissemination of digital works |
10/24/2013 | US20130283388 Method and system for information content validation in electronic devices |
10/24/2013 | US20130283387 Method for data security and electronic device having data security function |
10/24/2013 | US20130283386 Tamper respondent covering |
10/24/2013 | US20130283385 Restricting communication over an encrypted network connection to internet domains that share common ip addresses and shared ssl certificates |
10/24/2013 | US20130283384 Electronic book content protection |
10/24/2013 | US20130283383 Platform based verification of contents of input-output devices |
10/24/2013 | US20130283382 System and method for detecting malware in file based on genetic map of file |
10/24/2013 | US20130283381 Systems and methods for providing anti-malware protection on storage devices |
10/24/2013 | US20130283380 User controllable platform-level trigger to set policy for protecting platform from malware |
10/24/2013 | US20130283378 System and method for distinguishing human swipe input sequence behavior and using a confidence value on a score to detect fraudsters |
10/24/2013 | US20130283377 Detection and prevention of installation of malicious mobile applications |
10/24/2013 | US20130283375 Browser System and Method for Warning Users of Potentially Fraudulent Websites |