Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
09/2013
09/19/2013WO2013136862A1 Portable information terminal and program
09/19/2013WO2013136723A1 Content sharing system, information communicating apparatus, content sharing method, and communication method
09/19/2013WO2013136392A1 Access control device, access control system and access control method
09/19/2013WO2013136324A1 Dynamic data masking system and method
09/19/2013WO2013135846A1 Method for encrypting a plurality of data in a secure set
09/19/2013WO2013135439A1 Method and system for authenticating a user by an application
09/19/2013WO2013135064A1 Method for binding software with hardware and system therefor
09/19/2013WO2013134854A1 Method of navigating through digital content
09/19/2013WO2013134852A1 Method of distributing digital publications incorporating user generated and encrypted content with unique fingerprints
09/19/2013US20130247231 Secure processing unit systems and methods
09/19/2013US20130247230 Methods and devices for trusted protocols for a non-secured, distributed environment with applications to virtualization and cloud-computing security and management
09/19/2013US20130247229 Using flash storage device to prevent unauthorized use of software
09/19/2013US20130247228 Method, system and server for digital right management
09/19/2013US20130247222 Systems and Methods for Preventing Access to Stored Electronic Data
09/19/2013US20130247221 Providing access to documents requiring a non-disclosure agreement (nda) in an online document sharing community
09/19/2013US20130247218 System And Method For Verifying Authenticity Of Documents
09/19/2013US20130247217 On-demand service security system and method for managing a risk of access as a condition of permitting access to the on-demand service
09/19/2013US20130247216 System, method and computer program product for publicly providing web content of a tenant using a multi-tenant on-demand database service
09/19/2013US20130247215 Information processing device for detecting an illegal stored document,illegal stored document detection method and recording medium
09/19/2013US20130247214 Anonymization of Data Over Multiple Temporal Releases
09/19/2013US20130247213 Method and devices to secure the entry of an alphanumerical code, corresponding computer program product and storage means
09/19/2013US20130247212 Providing User Confidence Information to Third-Party Systems
09/19/2013US20130247211 Authority changing device, generating device, and computer program product
09/19/2013US20130247210 Method and System for Protecting Software Authorization
09/19/2013US20130247209 Automated license management
09/19/2013US20130247207 System and method for grouping computer vulnerabilities
09/19/2013US20130247206 System and method for grouping computer vulnerabilities
09/19/2013US20130247205 Calculating quantitative asset risk
09/19/2013US20130247204 System and method for application security assessment
09/19/2013US20130247203 Identifying Relationships Between Security Metrics
09/19/2013US20130247202 Dynamic management of resource utilization by an antivirus application
09/19/2013US20130247201 System and method for malware and network reputation correlation
09/19/2013US20130247200 Scanning computer files for specified content
09/19/2013US20130247199 System, method and computer program product for removing null values during scanning
09/19/2013US20130247198 Emulator updating system and method
09/19/2013US20130247196 System and method for detection of non-compliant software installation
09/19/2013US20130247195 Output control apparatus, computer-readable medium for storing program for output control apparatus, output control method, and output control system
09/19/2013US20130247193 System and method for removal of malicious software from computer systems and management of treatment side-effects
09/19/2013US20130247192 System and method for botnet detection by comprehensive email behavioral analysis
09/19/2013US20130247191 System, method, and computer program product for performing a remedial action with respect to a first device utilizing a second device
09/19/2013US20130247190 System, method, and computer program product for utilizing a data structure including event relationships to detect unwanted activity
09/19/2013US20130247187 Computing device to detect malware
09/19/2013US20130247186 System to Bypass a Compromised Mass Storage Device Driver Stack and Method Thereof
09/19/2013US20130247185 Systems and methods for tracking and recording events in a network of computing systems
09/19/2013US20130247184 Stealth Network Attack Monitoring
09/19/2013US20130247183 System, method, and computer program product for preventing a modification to a domain name system setting
09/19/2013US20130247182 System, method, and computer program product for identifying hidden or modified data objects
09/19/2013US20130247181 Method of and system for computer system denial-of-service protection
09/19/2013US20130247180 System, method, and computer program product for comparing an object with object enumeration results to identify an anomaly that at least potentially indicates unwanted activity
09/19/2013US20130247179 System, method, and computer program product for sending data associated with content to a server for analysis
09/19/2013US20130247177 Apparatus and method of controlling permission to applications in a portable terminal
09/19/2013US20130247176 Non-transitory computer readable medium storing access rights update program, access rights management system, and access rights update method
09/19/2013US20130247175 Facial feature detection
09/19/2013US20130247174 Authentication system, processor, and computer-readable recording medium storing therein program
09/19/2013US20130247173 System and methods for secure entry of a personal identification number (pin)
09/19/2013US20130247172 Information processing device with user authentication that restores previous operation condition
09/19/2013US20130247171 Image-based unlock functionality on a computing device
09/19/2013US20130247168 Scalable Virtual Appliance Cloud (SVAC) and Devices Usable in an SVAC
09/19/2013US20130247165 Offline authentication
09/19/2013US20130247164 Multiple access point zero sign-on
09/19/2013US20130247163 Method for providing a user with an authenticated remote access to a remote secure device
09/19/2013US20130247161 Method and apparatus for subscription sharing
09/19/2013US20130247160 Method and System for User Authentication Over a Communication Network
09/19/2013US20130247159 Method and system for online third-party authentication of identity attributes
09/19/2013US20130247156 Method For Setting Up An Access Level For Use Of A Software Sytem, And Computer Program Products And Processor Devices Thereof
09/19/2013US20130247155 Application identity design
09/19/2013US20130247153 Electronic apparatuses and methods for access control and for data integrity verification
09/19/2013US20130247152 Access device, access system and computer program product
09/19/2013US20130247149 Internet protocol address authentication method
09/19/2013US20130247145 Temperature-profiled device fingerprint generation and authentication from power-up states of static cells
09/19/2013US20130247140 Method of protecting an individual's privacy when providing service based on electronic tag
09/19/2013US20130247138 Method and system for regulating host security configuration
09/19/2013US20130247136 Automated Validation of Configuration and Compliance in Cloud Servers
09/19/2013US20130247135 Method and apparatus for security-aware elasticity of application and services
09/19/2013US20130247134 Method And Apparatus For A Distributed Security Service In A Cloud Network
09/19/2013US20130247133 Security assessment of virtual machine environments
09/19/2013US20130247132 System, method, and computer program product for selecting a wireless network based on security information
09/19/2013US20130247131 System, method, and computer program product for preventing scanning of a copy of a message
09/19/2013US20130246931 User association of a computing application with a contact in a contact list
09/19/2013US20130246813 Database encryption system, method, and program
09/19/2013US20130246810 Systems and methods for securing data in motion
09/19/2013US20130246809 Differential uncloneable variability-based cryptography
09/19/2013US20130246808 Systems and methods for securing data in motion
09/19/2013US20130246807 Systems and methods for securing data in motion
09/19/2013US20130246806 Information processing apparatus, file encryption determination method and authority determination method
09/19/2013US20130246805 Secure interface for versatile key derivation function support
09/19/2013US20130246804 Delivery point validation system
09/19/2013US20130246796 System and method for securing database activity
09/19/2013US20130246779 Calling Firmware Runtime Services of Basic Input Output System
09/19/2013US20130246499 Processor Sharing Between In-Range Devices
09/19/2013US20130246478 Systems and methods for controlling subscribed access to data
09/19/2013US20130246477 Visualizatoin of access permission status
09/19/2013US20130246476 Visualization of access permission status
09/19/2013US20130246472 Query optimization in a multi-tenant database system
09/19/2013US20130246471 Query optimization in a multi-tenant database system
09/19/2013US20130246278 Method and system for verifying entitlement to access content by url validation
09/19/2013US20130246277 Copyright Protection System And Royalty Processing System
09/19/2013US20130246275 Enhanced communication platform and related communication method using the platform
09/19/2013US20130246201 Point of sale computer system delivering composited two- and three-dimensional images
09/19/2013US20130246038 Emulator updating system and method