Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
08/2013
08/29/2013WO2013034310A3 Method for accessing and sharing a medical record
08/29/2013US20130227714 System and method for using file hashes to track data leakage and document propagation in a network
08/29/2013US20130227712 Method and system for resource management based on adaptive risk-based access controls
08/29/2013US20130227711 Controlled Access by Applications to Mobile Device Resources
08/29/2013US20130227710 System and method for securing leased images in a cloud environment
08/29/2013US20130227709 Content Control System
08/29/2013US20130227708 System and method for delivering geographically restricted content, such as over-air broadcast programming, to a recipient over a network, namely the internet
08/29/2013US20130227706 Method, apparatus and system for controlling read rights of digital contents
08/29/2013US20130227705 Terminal and method for hiding and restoring message
08/29/2013US20130227704 Processor and data processing method with non-hierarchical computer security enhancements for context states
08/29/2013US20130227703 Device, Method, and System for Secure Mobile Data Storage
08/29/2013US20130227702 System and method for syntagmatically managing and operating certification using anonymity code and quasi-public syntagmatic certification center
08/29/2013US20130227700 Dynamic Trust Score for Evaulating Ongoing Online Relationships
08/29/2013US20130227699 System and method for virtual image security in a cloud environment
08/29/2013US20130227696 Automated Security Management
08/29/2013US20130227695 Systems and methods for fixing application vulnerabilities through a correlated remediation approach
08/29/2013US20130227694 Hygienic charging station for mobile device security
08/29/2013US20130227693 Software module object analysis
08/29/2013US20130227692 System and method for optimization of antivirus processing of disk files
08/29/2013US20130227691 Detecting Malicious Network Content
08/29/2013US20130227690 Program analysis system and method thereof
08/29/2013US20130227688 Method and apparatus for detecting tampered application
08/29/2013US20130227687 Mobile terminal to detect network attack and method thereof
08/29/2013US20130227686 Method and apparatus for blocking malicious access to process
08/29/2013US20130227685 System and method for intelligent coordination of host and guest intrusion prevention in virtualized environment
08/29/2013US20130227684 Method and system for protection against information stealing software
08/29/2013US20130227683 Quantifying the risks of applications for mobile devices
08/29/2013US20130227682 Apparatus for E-Learning and method therefor
08/29/2013US20130227681 System, apparatus, and method for verifying augmented reality service
08/29/2013US20130227680 Automated protection against computer exploits
08/29/2013US20130227679 Method for accessing an application and a corresponding device
08/29/2013US20130227678 Method and system for authenticating user of a mobile device via hybrid biometics information
08/29/2013US20130227677 Password authentication
08/29/2013US20130227676 Access request authentication and authorization information generation
08/29/2013US20130227675 Tablet computer
08/29/2013US20130227673 Apparatus and method for cloud networking
08/29/2013US20130227672 Next generation secure gateway
08/29/2013US20130227670 Service aggregation in a cloud services center
08/29/2013US20130227668 Secure single sign-on
08/29/2013US20130227661 Systems and methods for generating and authenticating one time dynamic password based on context information
08/29/2013US20130227657 Communication with a web compartment in a client application
08/29/2013US20130227652 Terminal and method for assigning permission to application
08/29/2013US20130227651 Method and system for multi-factor biometric authentication
08/29/2013US20130227643 Wireless access to device functions
08/29/2013US20130227642 Apparatus and method for detecting illegal user
08/29/2013US20130227639 Provisioning access control using sddl on the basis of a xacml policy
08/29/2013US20130227638 Provisioning authorization claims using attribute-based access-control policies
08/29/2013US20130227637 Method and apparatus for management of multiple grouped resources on device
08/29/2013US20130227635 Mechanism for Applying Security Category Labels to Multi-Tenant Applications of a Node in a Platform-as-a-Service (PaaS) Environment
08/29/2013US20130227634 System and method for protecting service-level entities
08/29/2013US20130227538 Security chip used in a contents data playing device, update management method, and update management program
08/29/2013US20130227521 Validation of applications for graphics processing unit
08/29/2013US20130227304 Disk array device and data management method for disk array device
08/29/2013US20130227302 Method and system for a recursive security protocol for digital copyright control
08/29/2013US20130227301 Using storage controller bus interfaces to secure data transfer between storage devices and hosts
08/29/2013US20130227299 Methods for secure enrollment and backup of personal identity credentials into electronic devices
08/29/2013US20130227298 Information processing apparatus, information processing method, information processing program and information processing system
08/29/2013US20130227282 Method for synchronous encryption between a client and a licensing agent
08/29/2013US20130227281 Managing data
08/29/2013US20130227274 Privacy-preserving publish-subscribe protocol in a cloud-assisted model
08/29/2013US20130227271 Method for distributing digital documents to which user rights are attached, which support multiple copying, exchange, and multiple platforms
08/29/2013US20130227267 Information processing apparatus, method, and computer-readable storage medium that encrypts and decrypts data using a value calculated from operating-state data
08/29/2013US20130227266 Processor boot security device and methods thereof
08/29/2013US20130227264 Integrity protection method and apparatus for mobile terminal
08/29/2013US20130227263 Application processing apparatus and method for mobile terminal
08/29/2013US20130227262 Authentication device and authentication method
08/29/2013US20130227090 Remote enterprise policy/client configuration installation for computing devices
08/29/2013US20130226938 Detection and prevention of unwanted content on cloud-hosted services
08/29/2013US20130226924 System and method to determine the validity of an interaction on a network
08/29/2013US20130225079 Providing Continued Operation of NFC Mobile Devices and Tags
08/29/2013US20130222617 Digital camera having image processor and printer
08/29/2013US20130222409 Projector, projection display system, and corresponding method and recording medium
08/29/2013DE112011103830T5 System und Verfahren für den Handel mit nicht genutzten digitalen Rechten System and method for trading with unused digital rights
08/29/2013DE102013101828A1 Verfahren und Vorrichtungen zum Durchführen einer Transaktion Methods and apparatus for performing a transaction
08/29/2013DE102013003071A1 Verifizierungs-(Sperrungs)-Verfahren mit Authentifizierungschip zur Identifizierung eines Chips auf Systemebene Verification (Disable) method with authentication chip to identify a chip system level
08/29/2013DE102013002593A1 Sicherheitsüberwachungssystem und Sicherheitsüberwachungsverfahren Security monitoring system and security monitoring procedures
08/29/2013DE102012003710A1 Verlängerung der Betriebszeit eines Sicherheitselements Extend the operational life of a security element
08/28/2013EP2631841A2 Provisioning authorization claims using attribute-based access-control policies
08/28/2013EP2631840A1 Authentication device and authentication method
08/28/2013EP2631839A1 Program analysis system and method thereof
08/28/2013EP2631838A1 System and method for detecting unknown packers and cryptors
08/28/2013EP2631837A1 Method for generating a pseudonym with the help of an ID token
08/28/2013EP2631836A1 Computer-implemented method for usage control, computer program product, data processing system and transport system
08/28/2013EP2631835A1 Secure read-write storage device
08/28/2013EP2631834A1 Method and secure device for performing a transaction
08/28/2013EP2631833A1 Method, device and system for verifying binding data card and mobile host
08/28/2013EP2631795A1 Terminal and method for assigning permission to application
08/28/2013EP2630629A2 Single-point-of-access cyber system
08/28/2013EP2630611A2 Method and system for protecting against unknown malicious activities by determining a reputation of a link
08/28/2013EP2630610A2 Protecting websites and website users by obscuring urls
08/28/2013EP2630609A1 Method for distributing digital documents to which user rights are attached, which support multiple copying, exchange, and multiple platforms
08/28/2013EP2630608A1 Method and apparatus including architecture for protecting multi-user sensitive code and data
08/28/2013EP2630607A1 Method and apparatus including architecture for protecting sensitive code and data
08/28/2013EP2630606A2 Application usage policy enforcement
08/28/2013EP2630605A1 Method for securing the execution of a computer code by means of dynamic redundancy
08/28/2013EP2630604A1 Computer system analysis method and apparatus
08/28/2013EP2630580A1 Methods and systems for generation of authorized virtual appliances
08/28/2013CN203166984U System controlling type and scale of non principal node
08/28/2013CN203165249U Multifunctional teaching instrument
08/28/2013CN203164996U Non-contact identification card