Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
10/2013
10/15/2013US8560661 System and methods for launching antivirus application tasks during computer downtime
10/15/2013US8560489 System and method to measure continued engagement with software application
10/15/2013US8560455 System and method for operating multiple rental domains within a single credit card domain
10/15/2013US8560454 Systems and methods for providing users with customized renewal policies
10/15/2013US8560453 Method and apparatus for dynamic, real-time ad insertion based on meta-data within a hardware based root of trust
10/15/2013US8560450 Interactive bill payment center
10/15/2013US8560381 System and method for elections and government accountability
10/15/2013US8559764 Editing an image representation of a text
10/15/2013US8559639 Method and apparatus for secure cryptographic key generation, certification and use
10/15/2013US8559625 Elliptic curve point transformations
10/15/2013CA2701676C Method and system for providing extended authentication
10/15/2013CA2627267C System, method & computer program product for video fingerprinting
10/15/2013CA2501470C Method and system for identity recognition
10/10/2013WO2013152248A1 Cross-provider cross-certification content protection
10/10/2013WO2013152202A1 Securely performing programmatic data computations
10/10/2013WO2013152159A1 System and method for automatic provisioning of managed devices
10/10/2013WO2013152050A1 Detection of potentially copyrighted content in user-initiated live streams
10/10/2013WO2013151905A2 Network virtual user risk control method and system
10/10/2013WO2013151899A1 Device pinning capability for enterprise cloud service and storage accounts
10/10/2013WO2013151791A1 System and method of multiple login overlay from a single browser interface
10/10/2013WO2013151732A1 Systems and methods for securing and restoring virtual machines
10/10/2013WO2013151454A1 Hosted application sandboxing
10/10/2013WO2013151376A1 Security system using dual os and method therefor
10/10/2013WO2013150872A1 Information processing device, information processing method, and computer program
10/10/2013WO2013150492A1 Systems and methods to input or access data using remote submitting mechanism
10/10/2013WO2013150343A1 Identification for apparatuses
10/10/2013WO2013150238A1 Method for securing access to a computer device
10/10/2013WO2013150186A1 Secure method for remote grant of operating rights
10/10/2013WO2013150147A1 Authentication in computer networks
10/10/2013WO2013150041A1 Online-id-handling computer system and method
10/10/2013WO2013149588A1 Character displaying method, device and system, and electronic signature token
10/10/2013WO2013149569A1 Installation package virus checking and killing method and device
10/10/2013WO2013149553A1 Information input method, device, terminal and storage medium
10/10/2013WO2013149296A1 Digital rights management for three dimensional object production
10/10/2013WO2013113025A3 Authenticating entities engaging in automated or electronic transactions or activities
10/10/2013WO2013109330A3 System and methods for analyzing and modifying passwords
10/10/2013WO2013105877A3 Electronic signature security algorithms
10/10/2013US20130269044 Non-invasive safety wrapper for computer systems
10/10/2013US20130269043 System and Method for Analyzing A Device
10/10/2013US20130269041 Access to application programming interface systems and methods
10/10/2013US20130269040 Authorising use of a computer program
10/10/2013US20130269039 Data access control
10/10/2013US20130269038 Information protection device and information protection method
10/10/2013US20130269037 System and apparatus for transferring data between communication elements
10/10/2013US20130269036 Method for protecting an application program
10/10/2013US20130269035 Data privacy engine
10/10/2013US20130269032 Detecting Network Intrusion Using a Decoy Cryptographic Key
10/10/2013US20130269030 Detection of unexpected server operation through physical attribute monitoring
10/10/2013US20130269029 Unified scan engine
10/10/2013US20130269028 Unified scan management
10/10/2013US20130269027 Techniques to explain authorization origins for protected resource objects in a resource object domain
10/10/2013US20130269025 Resource access based on multiple scope levels
10/10/2013US20130269024 Electronic device and method for controlling access to the electronic device
10/10/2013US20130269020 Authenticating Cloud Computing Enabling Secure Services
10/10/2013US20130269019 Systems and Methods for Controlling a Local Application Through a Web Page
10/10/2013US20130269017 Centralized single sign on service for websites and online services
10/10/2013US20130269016 Method for integrating account management function in input method software
10/10/2013US20130269010 Pattern entropy password strength estimator
10/10/2013US20130269008 Key assignment for a brand
10/10/2013US20130269007 Authentication system, authentication server, service providing server, authentication method, and computer-readable recording medium
10/10/2013US20130269004 Unified identity verification
10/10/2013US20130268999 Device pinning capability for enterprise cloud service and storage accounts
10/10/2013US20130268996 Method of executing virtualized application able to run in virtualized environment
10/10/2013US20130268994 System and method for determining and using local reputations of users and hosts to protect information in a network environment
10/10/2013US20130268934 Dynamic method for controlling the integrity of the execution of an executable code
10/10/2013US20130268811 Portable data carrier having operating error counter
10/10/2013US20130268778 Semiconductor memory card access apparatus, a computer-readable recording medium, an initialization method, and a semiconductor memory card
10/10/2013US20130268777 Securing Inputs from Malware
10/10/2013US20130268776 Cryptographic processing apparatus and ic card
10/10/2013US20130268775 Method and device for generating a code
10/10/2013US20130268774 Systems and methods for securing and restoring virtual machines
10/10/2013US20130268773 Computational systems and methods for preparing data for double-encryption and anonymous storage
10/10/2013US20130268772 Computer-Implemented System And Method For Providing Private Stable Matchings Through A Re-encryption Mix Network
10/10/2013US20130268771 Digital rights management system and methods for accessing content from an intelligent storag
10/10/2013US20130268769 Methods, Systems, and Product for Hashing Using Twisted Tabulation
10/10/2013US20130268768 User authentication
10/10/2013US20130268767 Wireless token authentication
10/10/2013US20130268766 Wireless token device
10/10/2013US20130268758 Wireless storage device
10/10/2013US20130268756 Computational systems and methods for anonymized storage of double-encrypted data
10/10/2013US20130268753 Anti-tamper device, system, method, and computer-readable medium
10/10/2013US20130268750 Encoded database management system, client and server, natural joining method and program
10/10/2013US20130268749 Digital rights management system and methods for provisioning content to an intelligent storage
10/10/2013US20130268746 System-on-chip and booting method thereof
10/10/2013US20130268683 System and method employing an agile network protocol for secure communications using secure domain names
10/10/2013US20130268679 Information processing apparatus, information processing method, and program
10/10/2013US20130268617 Distributed cache for state transfer operations
10/10/2013US20130268562 Enterprise level data element review systems and methodologies
10/10/2013US20130266135 System for DNA Identification Hiding Personal Traits
10/10/2013US20130265224 Display system, display device, display control method, and pharmaceutical management system
10/10/2013US20130265163 Magnetic Field Activated Intrusion Detection
10/10/2013DE112012000279T5 Ermitteln der Anfälligkeit von Computer-Software-Anwendungen gegenüber Rechteausweitungsangriffen Determining the vulnerability of computer software applications against privilege escalation attacks
10/10/2013DE102013205851A1 Method for transmission of e.g. video data for engine control modules of motor car, involves integrating digital signature in content file, and downloading another content file at service and production servers and/or provider network
10/10/2013DE102013101515A1 Hand-guided wireless communication apparatus i.e. mobile equipment, for performing e.g. wired communication with external electronic payment reader, has data/control interface for transferring secure data to master processor
10/10/2013CA2812383A1 Restricted access memory device providing short range communication-based security features and related methods
10/09/2013EP2648387A1 Biometric sensor for human presence detection and associated methods
10/09/2013EP2648129A1 Method and apparatus for securing touch input
10/09/2013EP2648128A1 Detection of phishing attempts
10/09/2013EP2648127A1 Access control method, server device, and storage device
10/09/2013EP2648126A1 Method of authenticating user, server and mobile terminal performing the same