Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
10/2013
10/01/2013US8549651 Determining a trust level in a social network environment
10/01/2013US8549649 Systems and methods for sensitive data remediation
10/01/2013US8549648 Systems and methods for identifying hidden processes
10/01/2013US8549647 Classifying portable executable files as malware or whiteware
10/01/2013US8549644 Systems and method for regulating software access to security-sensitive processor resources
10/01/2013US8549635 Malware detection using external call characteristics
10/01/2013US8549631 Internet site security system and method thereto
10/01/2013US8549629 Classification and identification of computer use
10/01/2013US8549628 Method and apparatus to measure the security of a system, network, or application
10/01/2013US8549626 Method and apparatus for securing a computer from malicious threats through generic remediation
10/01/2013US8549620 Information processing device, data processing method, and program
10/01/2013US8549619 Removable hard disk with embedded security card
10/01/2013US8549618 Client computer, remote control system, and remote control method
10/01/2013US8549614 Establishing internet protocol security sessions using the extensible messaging and presence protocol
10/01/2013US8549606 Device for protecting digital content, device for processing protected digital content, method for protecting digital content, method for processing protected digital content, storage medium storing program for protecting digital content, and storage medium storing program for processing protected digital content
10/01/2013US8549603 System and method for addressing a unique device from a common address book
10/01/2013US8549599 Fingerprint authentication server, client computer and fingerprint authentication method
10/01/2013US8549580 Method and apparatus for providing software security
10/01/2013US8549546 Method and system for containment of usage of language interfaces
10/01/2013US8549511 Information processing apparatus, executability determining method, and computer program for the same
10/01/2013US8549328 Memory controller, memory system including the same, and method for operating the same
10/01/2013US8549325 Reducing information leakage between processes sharing a cache
10/01/2013US8549319 Systems and algorithms for stateless biometric recognition
10/01/2013US8549317 Authentication method, authentication apparatus and authentication program storage medium
10/01/2013US8549316 Method and apparatus for password output
10/01/2013US8549315 System and method for generating and managing administrator passwords
10/01/2013US8549314 Password generation methods and systems
10/01/2013US8549313 Method and system for integrated securing and managing of virtual machines and virtual appliances
10/01/2013US8549312 Mobile terminal and method for protecting its system data
10/01/2013US8549311 Electronic device, password deletion method, and program
10/01/2013US8549310 Method and apparatus for secure measurement certification
10/01/2013US8549308 Data certification method and system
10/01/2013US8549304 System and method for controlled copying and moving of content between devices and domains based on conditional encryption of content key depending on usage state
10/01/2013US8549301 Method and computer system for ensuring authenticity of an electronic transaction
10/01/2013US8549297 Data transfer device library and key distribution
10/01/2013US8549282 Method and system for monitoring encrypted data transmissions
10/01/2013US8549275 Method and apparatus for secure execution using a secure memory partition
10/01/2013US8549166 Execution of unverified programs in a wireless, device operating environment
10/01/2013US8549038 Pluggable session context
10/01/2013US8548948 Methods and apparatus for a fine grained file data storage system
10/01/2013US8548923 Method and system for facilitating data access and management on a secure token
10/01/2013US8548920 System and method of authentication, monitoring, and advertisement distribution
10/01/2013US8548919 System and method for self-provisioning of virtual images
10/01/2013US8548918 Methods and systems for automated content distribution
10/01/2013US8548208 Multifactor multimedia biometric authentication
10/01/2013US8548160 Determination of pairings on a curve using aggregated inversions
10/01/2013CA2733522C Directional sensing mechanism and communications authentication
10/01/2013CA2457127C Test enabled application execution
09/2013
09/27/2013CA2809992A1 System and method enabling parallel processing of hash functions using authentication checkpoint hashes
09/26/2013WO2013142802A1 Offline authentication with embedded authorization attributes
09/26/2013WO2013142722A1 Methods and systems for persistent cross-application mobile device identification
09/26/2013WO2013142588A1 Risk manager optimizer
09/26/2013WO2013142574A1 Hardware and software association and authentication
09/26/2013WO2013142573A1 System and method for crowdsourcing of mobile application reputations
09/26/2013WO2013142439A1 System and method for formula calculation and payment authorization with electronic signatures
09/26/2013WO2013142417A2 Enhancing security of sensor data for a system via an embedded controller
09/26/2013WO2013142228A1 Computing device to detect malware
09/26/2013WO2013142021A1 Identity services for organizations transparently hosted in the cloud
09/26/2013WO2013141545A1 Anti-malware system and method for processing data in system
09/26/2013WO2013140908A1 Reception device, reception method, program, decryption processing device, reception processing system, and information processing device
09/26/2013WO2013140778A1 Information processing device, method for authenticating user, and program for authenticating user
09/26/2013WO2013140774A1 Server device, player device, and content distribution system
09/26/2013WO2013140403A1 Database antivirus system and method
09/26/2013WO2013140117A1 Method and system for malicious code detection
09/26/2013WO2013140079A1 Method for generating public identity for authenticating an individual carrying an identification object
09/26/2013WO2013140078A1 Method for identity generation and verification indicating the uniqueness of a carrier-object pair
09/26/2013WO2013140027A1 Method and apparatus for providing information authentication from external sensors to secure environments
09/26/2013WO2013139710A1 A computerized authorization system and method
09/26/2013WO2013139398A1 Software fingerprinting
09/26/2013WO2013139223A1 Method and device for prompting information about e-mail
09/26/2013WO2013139216A1 Method and device for extracting characteristic code of apk virus
09/26/2013WO2013139215A1 Method and device for identifying virus apk
09/26/2013WO2013139194A1 Financial pos system capable of resisting channel trojan attack and anti-attack implementation method thereof
09/26/2013WO2013138934A1 External log storage in an asset storage and transfer system
09/26/2013WO2013138867A1 Secure nfc apparatus and method
09/26/2013WO2013110261A3 Method for multilateral and thorough detection and improvement of the mobile service quality with the aid of customer terminals giving feedback to the customer
09/26/2013WO2013082313A3 Adapter for electronic devices
09/26/2013WO2012047912A3 Apparatus and methods for enforcing content protection rules during data transfer between devices
09/26/2013US20130254906 Hardware and Software Association and Authentication
09/26/2013US20130254905 Launching A Secure Kernel In A Multiprocessor System
09/26/2013US20130254904 Ic card and ic card control method
09/26/2013US20130254903 Information processing system, information processor, image forming apparatus, and information processing method
09/26/2013US20130254901 Managing Secure Sharing of Private Information Pertaining to Abuse or Neglect Across Security Domains
09/26/2013US20130254900 Method and apparatus for secure shared personal map layer
09/26/2013US20130254899 Data protecting system and protecting method
09/26/2013US20130254898 Tiered object-related trust decisions
09/26/2013US20130254897 Digital content delivery
09/26/2013US20130254896 Method to Detect Tampering of Data
09/26/2013US20130254894 Information processing device, non-transitory computer readable medium, and information processing method
09/26/2013US20130254893 Apparatus and method for removing malicious code
09/26/2013US20130254892 Detecting malicious computer code in an executing program module
09/26/2013US20130254891 Computer system, controller and network monitoring method
09/26/2013US20130254890 Method, System and Program Product for Optimizing Emulation of a Suspected Malware
09/26/2013US20130254889 Server-Side Restricted Software Compliance
09/26/2013US20130254886 Mitigating Low-Rate Denial-Of-Service Attacks in Packet-Switched Networks
09/26/2013US20130254885 System and method for detecting potential threats by monitoring user and system behavior associated with computer and network activity
09/26/2013US20130254884 Systems and methods for behavioral sandboxing
09/26/2013US20130254882 Multi-domain identity interoperability and compliance verification
09/26/2013US20130254881 Method to Detect Tampering of Data
09/26/2013US20130254880 System and method for crowdsourcing of mobile application reputations