Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
10/2013
10/17/2013WO2013155226A1 A method, device and system for secure transactions
10/17/2013WO2013155143A1 Location-based access control for portable electronic device
10/17/2013WO2013154975A1 Method for malicious activity detection in a mobile station
10/17/2013WO2013154936A1 Systems, methods and apparatus for multivariate authentication
10/17/2013WO2013154839A1 Digital content aggregation
10/17/2013WO2013154459A1 Method for detecting malware in an operating system kernel
10/17/2013WO2013153601A1 Authentication program and authentication method
10/17/2013WO2013153441A1 Secure zone for digital communications
10/17/2013WO2013153437A1 Apparatuses, methods and systems for computer-based secure transactions
10/17/2013WO2013153403A1 Methods and systems for enabling a secure password entry using a non-secure device
10/17/2013WO2013153122A1 Method and device for generating a code
10/17/2013WO2013153099A1 Method and system for managing password
10/17/2013WO2013153060A2 Functional architecture pattern for safety applications
10/17/2013WO2013152986A1 Secure generation of a user account in a service server
10/17/2013WO2013152672A1 Method and device for monitoring virus trend abnormality
10/17/2013WO2013152431A1 Configuration of third party applications in a sandboxed environment
10/17/2013WO2013098804A3 Method, device, system and computer readable storage medium for ensuring authenticity of web content served by a web host
10/17/2013WO2012166440A3 External link processing
10/17/2013WO2001027716A8 Data management systems, apparatus and methods
10/17/2013US20130276152 Apparatus, system, and method for protecting electronic devices in a virtual perimeter
10/17/2013US20130276151 Electronic physical unclonable functions
10/17/2013US20130276150 Output Control Method
10/17/2013US20130276149 Secure memory management system and method
10/17/2013US20130276148 Proof-of-Purchase Watermarks
10/17/2013US20130276147 Semiconductor device, confidential data control system, confidential data control method
10/17/2013US20130276144 Wireless sensor field enumeration
10/17/2013US20130276143 Biometric User Equipment GUI Trigger
10/17/2013US20130276142 Method and system for granting access to secure data
10/17/2013US20130276141 System and Method for Processing User Rights
10/17/2013US20130276140 Transaction system for business and social networking
10/17/2013US20130276139 Method and apparatus for accessing content protected media streams
10/17/2013US20130276138 Copyright detection and protection system and method
10/17/2013US20130276137 Method and system for creating a protected object namespace for a WSDL resource description
10/17/2013US20130276136 Online Privacy Management
10/17/2013US20130276135 Filtering access to network content
10/17/2013US20130276134 Event driven permissive sharing of information
10/17/2013US20130276133 Methods and apparatus for information assurance in a multiple level security (mls) combat system
10/17/2013US20130276132 System, method, and computer program product for utilizing code stored in a protected area of memory for securing an associated system
10/17/2013US20130276130 Secure Digital Card, and Secure Digital Card Operating System and Operating Method
10/17/2013US20130276128 Secure option rom firmware updates
10/17/2013US20130276127 Model-based system, method, and computer program product for detecting at least potentially unwanted activity associated with confidential data
10/17/2013US20130276124 Systems, methods, apparatuses and computer program products for providing mobile device protection
10/17/2013US20130276123 Mechanism for providing a secure environment for acceleration of software applications at computing devices
10/17/2013US20130276122 System and method for providing storage device-based advanced persistent threat (apt) protection
10/17/2013US20130276119 System, method, and computer program product for reacting to a detection of an attempt by a process that is unknown to control a process that is known
10/17/2013US20130276117 Method and apparatus for detecting a malware in files
10/17/2013US20130276116 Environmental imaging
10/17/2013US20130276115 Network virtual user risk control method and system
10/17/2013US20130276114 Method and apparatus for retroactively detecting malicious or otherwise undesirable software
10/17/2013US20130276112 System, method, and computer program product for dynamically adjusting a level of security applied to a system
10/17/2013US20130276111 System, method, and computer program product for providing at least one statistic associated with a potentially unwanted activity to a user
10/17/2013US20130276109 System, method and computer program product for detecting activity in association with program resources that has at least a potential of an unwanted effect on the program
10/17/2013US20130276108 Flow data for security data loss prevention
10/17/2013US20130276107 Behavioral tracking system, method, and computer program product for undoing events based on user input
10/17/2013US20130276106 System, method, and computer program product for verifying an identification of program information as unwanted
10/17/2013US20130276105 System, method, and computer program product for detecting unwanted data based on an analysis of an icon
10/17/2013US20130276103 Methods and systems for enabling a secure password entry using a non-secure device
10/17/2013US20130276102 Methods and systems for enabling a secure password entry using a non-secure device
10/17/2013US20130276101 Method of, and a system for enabling a secure password entry using a non-secure device
10/17/2013US20130276100 Method and apparatus for authenticating password
10/17/2013US20130276099 Pass-pattern authentication for computer-based security
10/17/2013US20130276098 Method and Computer Device for Handling COM Objects
10/17/2013US20130276097 User authentication method and system
10/17/2013US20130276096 Management of data processing security in a secondary processor
10/17/2013US20130276095 Pass-pattern authentication for computer-based security
10/17/2013US20130276090 Cloud-based wan management
10/17/2013US20130276089 Method and system for improving security and reliability in a networked application environment
10/17/2013US20130276088 Identity management with high privacy features
10/17/2013US20130276087 Multifactor authentication
10/17/2013US20130276086 Peer applications trust center
10/17/2013US20130276081 Stateless attestation system
10/17/2013US20130276078 Two factor authentication using a one-time password
10/17/2013US20130276077 Password resetting method and electronic device having password resetting function
10/17/2013US20130276074 Secure data parser method and system
10/17/2013US20130276071 Method and system for providing internet services
10/17/2013US20130276070 Cross instance user authentication architecture
10/17/2013US20130276068 Methods and systems for generation of authorized virtual appliances
10/17/2013US20130276067 System for providing mobile data security
10/17/2013US20130276066 Authorization sharing
10/17/2013US20130276062 Watermarks for roaming
10/17/2013US20130276059 Electronic physical unclonable functions
10/17/2013US20130276058 Document verification with distributed calendar infrastructure
10/17/2013US20130276057 Authenticated launch of virtual machines and nested virtual machine managers
10/17/2013US20130276056 Automatic curation and modification of virtualized computer programs
10/17/2013US20130276054 Recording activity-triggered computer video output
10/17/2013US20130276053 System asset repository management
10/17/2013US20130275973 Virtualisation system
10/17/2013US20130275775 Storage device, protection method, and electronic device
10/17/2013US20130275774 Trusted storage systems and methods
10/17/2013US20130275773 Systems and methods for securing data using multi-factor or keyed dispersal
10/17/2013US20130275772 Accessing private data about the state of a data processing machine from storage that is publicly accessible
10/17/2013US20130275770 Always-available embedded theft reaction subsystem
10/17/2013US20130275769 Method, device, and system for protecting and securely delivering media content
10/17/2013US20130275768 Secure data parser method and system
10/17/2013US20130275764 Control of access to a secondary system
10/17/2013US20130275759 Transmitter, receiver, and transmitting method
10/17/2013US20130275748 Secure password-based authentication for cloud computing services
10/17/2013US20130275745 System and Method for Secure Communication
10/17/2013US20130275472 Individualized data sharing
10/17/2013US20130275471 Filesystem access for web applications and native code modules