Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
08/2013
08/22/2013WO2013122815A1 Coordination of processes in cloud computing environments
08/22/2013WO2013122557A1 Detecting component removal
08/22/2013WO2013122443A1 Method and apparatus for protecting digital content using device authentication
08/22/2013WO2013121457A1 Computer system equipped with an encryption key management function at the time of hot swap of a storage medium
08/22/2013WO2013121309A1 Encrypted biometric data management and retrieval
08/22/2013WO2013121275A1 Portable device for data encryption/decryption and/or compression/decompression
08/22/2013WO2013121084A1 Method and apparatus for providing backend support for device control in risk conditions
08/22/2013WO2013120538A1 Digital rights management
08/22/2013WO2013120196A1 Generating and utilizing a data fingerprint to enable analysis of previously available data
08/22/2013WO2013120169A1 Key management on device for perimeters
08/22/2013WO2013098284A9 Method for determining anonymously a given user's data among a plurality of user's data in a network
08/22/2013WO2013090867A3 Personal space (data) v. corporate space (data)
08/22/2013WO2013055872A3 An integrated circuit for cyber security processing
08/22/2013US20130219526 Security System and Methods for Integrated Devices
08/22/2013US20130219525 Secure audio peripheral device
08/22/2013US20130219524 System and/or Method for Distributing Media Content
08/22/2013US20130219523 Selectively exposing base class libraries based on application execution context
08/22/2013US20130219522 Data processing method and device
08/22/2013US20130219521 Music-content using apparatus capable of managing copying of music content, and program therefor
08/22/2013US20130219520 Systems and methods for controlling rights associated with a product
08/22/2013US20130219519 Physical key secure peripheral interconnection
08/22/2013US20130219518 Methods and Systems for Generating History Data of System Use and Replay Mode for Identifying Security Events Showing Data and User Bindings
08/22/2013US20130219517 Parent-child guidance support for social networks
08/22/2013US20130219515 System and Method for Providing Tools VIA Automated Process Allowing Secure Creation, Transmittal, Review of And Related Operations on, High Value Electronic Files
08/22/2013US20130219514 Applicant screening
08/22/2013US20130219513 Blade, computer product, and management method
08/22/2013US20130219512 Apparatuses and methods for processing file content using digital rights management (drm) in web browser
08/22/2013US20130219510 Drm/cas service device and method using security context
08/22/2013US20130219509 Method and apparatus for efficiently fixing transformed part of content
08/22/2013US20130219508 Method and apparatus for outputting content in portable terminal supporting secure execution environment
08/22/2013US20130219507 Method and apparatus for protecting digital content using device authentication
08/22/2013US20130219506 Confidential common subject identification system
08/22/2013US20130219505 Validating license servers in virtualized environments
08/22/2013US20130219504 Method, System and Program Product for Document Verification
08/22/2013US20130219502 Managing a ddos attack
08/22/2013US20130219501 Malicious code real-time inspecting device in a drm environment and recording medium for recording a program to execute a method thereof
08/22/2013US20130219500 Network intrusion detection in a network that includes a distributed virtual switch fabric
08/22/2013US20130219499 Apparatus and method for providing security for virtualization
08/22/2013US20130219498 Mobile terminal having security diagnosis functionality and method of making diagnosis on security of mobile terminal
08/22/2013US20130219497 Network intrusion detection in a network that includes a distributed virtual switch fabric
08/22/2013US20130219494 Method of analyzing the behavior of a secure electronic token
08/22/2013US20130219492 System for finding code in a data flow
08/22/2013US20130219491 System and method for integrity reconstitution
08/22/2013US20130219490 Biometric-rich gestures for authentication on multi-touch devices
08/22/2013US20130219489 System and method for storing a password recovery secret
08/22/2013US20130219488 Electronic device and method for unlocking electronic device
08/22/2013US20130219483 Content filtering apparatus and method
08/22/2013US20130219480 Online Pseudonym Verification and Identity Validation
08/22/2013US20130219478 Reduced authentication times for shared-media network migration
08/22/2013US20130219473 Controlling access
08/22/2013US20130219469 Mobile device identify factor for access control policies
08/22/2013US20130219468 Connection Leasing for Hosted Services
08/22/2013US20130219467 Network authentication method, method for client to request authentication, client, and device
08/22/2013US20130219464 Method for standardizing computer system action
08/22/2013US20130219463 Methods and Systems for Enterprise Data Use Monitoring and Auditing User-Data Interactions
08/22/2013US20130219462 Generating a distrubition package having an access control execution program for implementing an access control mechanism and loading unit for a client
08/22/2013US20130219460 Remote Security Self-Assessment Framework
08/22/2013US20130219458 Methods and systems for secure digital content distribution and analytical reporting
08/22/2013US20130219456 Secure Virtual File Management System
08/22/2013US20130219454 Location-based security system for portable electronic device
08/22/2013US20130219453 Data leak prevention from a device with an operating system
08/22/2013US20130219452 Bus monitor for enhancing soc system security and realization method thereof
08/22/2013US20130219451 Document digest allowing selective changes to a document
08/22/2013US20130219408 Computer program product, and information processing apparatus and method
08/22/2013US20130219193 Encrypted biometric data management and retrieval
08/22/2013US20130219192 Contents security apparatus and method thereof
08/22/2013US20130219191 Platform firmware armoring technology
08/22/2013US20130219190 Determine Authorization of a Software Product Based on a First and Second Authorization Item
08/22/2013US20130219188 Apparatus and method for reproducing contents in electronic device
08/22/2013US20130219186 Personal Digital Key Initialization and Registration for Secure Transactions
08/22/2013US20130219181 Method for reading an attribute from an id token
08/22/2013US20130219180 Data processing for securing local resources in a mobile device
08/22/2013US20130219177 Secure data processing device and method
08/22/2013US20130218550 Acceleration of memory walking sequences during simulation
08/22/2013US20130215275 Enrollment kiosk including biometric enrollment and verification, face recognition and fingerprint matching systems
08/22/2013DE102013200159A1 Management von Sicherheitsrichtlinien unter Verwendung einer Störungsanalyse Management of security policies by using a disturbance analysis
08/22/2013DE102013101709A1 Schaltkreis-Anordnung, Verfahren zum Bilden einer Schaltkreis-Anordnung und Verfahren zum Prüfen der Integrität Circuit arrangement, method for forming a circuit arrangement and method for testing the integrity
08/22/2013DE102008010788B4 Verfahren zur Authentisierung und Authentifizierung von Personen und Einheiten Method for authentication and authentication of individuals and entities
08/22/2013DE102006001872B4 Vorrichtung und Verfahren zum Überprüfen einer Fehlererkennungsfunktionalität einer Datenverarbeitungseinrichtung auf Angriffe Apparatus and method for checking an error detection functionality of a data processing device to attacks
08/21/2013EP2629480A2 Designation Of Classes For Certificates And Keys
08/21/2013EP2629234A2 Security-enhanced computer systems and methods
08/21/2013EP2629233A1 Apparatus, system, and method of relaying data, and recording medium storing data relay control program
08/21/2013EP2629232A2 Methods and apparatus for dealing with malware
08/21/2013EP2629231A2 Methods and apparatus for dealing with malware
08/21/2013EP2629230A1 Method and apparatus for management of multiple grouped resources on device
08/21/2013EP2629229A2 Bootstrapping access models in the absence of training data
08/21/2013EP2629228A1 Location-based security system for portable electronic device
08/21/2013EP2629227A1 Key management on device for perimeters
08/21/2013EP2629226A1 Content data playback device, update management method, and update management program
08/21/2013EP2629225A1 System, devices and methods for collaborative execution of a software application comprising at least one encrypted instruction
08/21/2013EP2629224A1 Method and apparatus for outputting content in portable terminal supporting secure execution environment
08/21/2013EP2629223A1 System, devices and methods for collaborative execution of a software application comprising at least one encrypted instruction
08/21/2013EP2629222A1 Portable, protected data storage device
08/21/2013EP2629221A1 Altering sampling rate to thwart attacks that involve analyzing hardware sensor output
08/21/2013EP2629220A1 Thwarting attacks that involve analyzing hardware sensor output
08/21/2013EP2629185A1 Method and device for locking and unlocking with touch graphic
08/21/2013EP2628133A1 Authenticate a fingerprint image
08/21/2013EP2628125A2 Method and apparatus for downloading drm module
08/21/2013EP2628124A1 A system and method of generating encryption/decryption keys and encrypting/decrypting a derivative work
08/21/2013EP2628123A1 A system for generating an incrementally completed 3d security mark