Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
08/22/2013 | WO2013122815A1 Coordination of processes in cloud computing environments |
08/22/2013 | WO2013122557A1 Detecting component removal |
08/22/2013 | WO2013122443A1 Method and apparatus for protecting digital content using device authentication |
08/22/2013 | WO2013121457A1 Computer system equipped with an encryption key management function at the time of hot swap of a storage medium |
08/22/2013 | WO2013121309A1 Encrypted biometric data management and retrieval |
08/22/2013 | WO2013121275A1 Portable device for data encryption/decryption and/or compression/decompression |
08/22/2013 | WO2013121084A1 Method and apparatus for providing backend support for device control in risk conditions |
08/22/2013 | WO2013120538A1 Digital rights management |
08/22/2013 | WO2013120196A1 Generating and utilizing a data fingerprint to enable analysis of previously available data |
08/22/2013 | WO2013120169A1 Key management on device for perimeters |
08/22/2013 | WO2013098284A9 Method for determining anonymously a given user's data among a plurality of user's data in a network |
08/22/2013 | WO2013090867A3 Personal space (data) v. corporate space (data) |
08/22/2013 | WO2013055872A3 An integrated circuit for cyber security processing |
08/22/2013 | US20130219526 Security System and Methods for Integrated Devices |
08/22/2013 | US20130219525 Secure audio peripheral device |
08/22/2013 | US20130219524 System and/or Method for Distributing Media Content |
08/22/2013 | US20130219523 Selectively exposing base class libraries based on application execution context |
08/22/2013 | US20130219522 Data processing method and device |
08/22/2013 | US20130219521 Music-content using apparatus capable of managing copying of music content, and program therefor |
08/22/2013 | US20130219520 Systems and methods for controlling rights associated with a product |
08/22/2013 | US20130219519 Physical key secure peripheral interconnection |
08/22/2013 | US20130219518 Methods and Systems for Generating History Data of System Use and Replay Mode for Identifying Security Events Showing Data and User Bindings |
08/22/2013 | US20130219517 Parent-child guidance support for social networks |
08/22/2013 | US20130219515 System and Method for Providing Tools VIA Automated Process Allowing Secure Creation, Transmittal, Review of And Related Operations on, High Value Electronic Files |
08/22/2013 | US20130219514 Applicant screening |
08/22/2013 | US20130219513 Blade, computer product, and management method |
08/22/2013 | US20130219512 Apparatuses and methods for processing file content using digital rights management (drm) in web browser |
08/22/2013 | US20130219510 Drm/cas service device and method using security context |
08/22/2013 | US20130219509 Method and apparatus for efficiently fixing transformed part of content |
08/22/2013 | US20130219508 Method and apparatus for outputting content in portable terminal supporting secure execution environment |
08/22/2013 | US20130219507 Method and apparatus for protecting digital content using device authentication |
08/22/2013 | US20130219506 Confidential common subject identification system |
08/22/2013 | US20130219505 Validating license servers in virtualized environments |
08/22/2013 | US20130219504 Method, System and Program Product for Document Verification |
08/22/2013 | US20130219502 Managing a ddos attack |
08/22/2013 | US20130219501 Malicious code real-time inspecting device in a drm environment and recording medium for recording a program to execute a method thereof |
08/22/2013 | US20130219500 Network intrusion detection in a network that includes a distributed virtual switch fabric |
08/22/2013 | US20130219499 Apparatus and method for providing security for virtualization |
08/22/2013 | US20130219498 Mobile terminal having security diagnosis functionality and method of making diagnosis on security of mobile terminal |
08/22/2013 | US20130219497 Network intrusion detection in a network that includes a distributed virtual switch fabric |
08/22/2013 | US20130219494 Method of analyzing the behavior of a secure electronic token |
08/22/2013 | US20130219492 System for finding code in a data flow |
08/22/2013 | US20130219491 System and method for integrity reconstitution |
08/22/2013 | US20130219490 Biometric-rich gestures for authentication on multi-touch devices |
08/22/2013 | US20130219489 System and method for storing a password recovery secret |
08/22/2013 | US20130219488 Electronic device and method for unlocking electronic device |
08/22/2013 | US20130219483 Content filtering apparatus and method |
08/22/2013 | US20130219480 Online Pseudonym Verification and Identity Validation |
08/22/2013 | US20130219478 Reduced authentication times for shared-media network migration |
08/22/2013 | US20130219473 Controlling access |
08/22/2013 | US20130219469 Mobile device identify factor for access control policies |
08/22/2013 | US20130219468 Connection Leasing for Hosted Services |
08/22/2013 | US20130219467 Network authentication method, method for client to request authentication, client, and device |
08/22/2013 | US20130219464 Method for standardizing computer system action |
08/22/2013 | US20130219463 Methods and Systems for Enterprise Data Use Monitoring and Auditing User-Data Interactions |
08/22/2013 | US20130219462 Generating a distrubition package having an access control execution program for implementing an access control mechanism and loading unit for a client |
08/22/2013 | US20130219460 Remote Security Self-Assessment Framework |
08/22/2013 | US20130219458 Methods and systems for secure digital content distribution and analytical reporting |
08/22/2013 | US20130219456 Secure Virtual File Management System |
08/22/2013 | US20130219454 Location-based security system for portable electronic device |
08/22/2013 | US20130219453 Data leak prevention from a device with an operating system |
08/22/2013 | US20130219452 Bus monitor for enhancing soc system security and realization method thereof |
08/22/2013 | US20130219451 Document digest allowing selective changes to a document |
08/22/2013 | US20130219408 Computer program product, and information processing apparatus and method |
08/22/2013 | US20130219193 Encrypted biometric data management and retrieval |
08/22/2013 | US20130219192 Contents security apparatus and method thereof |
08/22/2013 | US20130219191 Platform firmware armoring technology |
08/22/2013 | US20130219190 Determine Authorization of a Software Product Based on a First and Second Authorization Item |
08/22/2013 | US20130219188 Apparatus and method for reproducing contents in electronic device |
08/22/2013 | US20130219186 Personal Digital Key Initialization and Registration for Secure Transactions |
08/22/2013 | US20130219181 Method for reading an attribute from an id token |
08/22/2013 | US20130219180 Data processing for securing local resources in a mobile device |
08/22/2013 | US20130219177 Secure data processing device and method |
08/22/2013 | US20130218550 Acceleration of memory walking sequences during simulation |
08/22/2013 | US20130215275 Enrollment kiosk including biometric enrollment and verification, face recognition and fingerprint matching systems |
08/22/2013 | DE102013200159A1 Management von Sicherheitsrichtlinien unter Verwendung einer Störungsanalyse Management of security policies by using a disturbance analysis |
08/22/2013 | DE102013101709A1 Schaltkreis-Anordnung, Verfahren zum Bilden einer Schaltkreis-Anordnung und Verfahren zum Prüfen der Integrität Circuit arrangement, method for forming a circuit arrangement and method for testing the integrity |
08/22/2013 | DE102008010788B4 Verfahren zur Authentisierung und Authentifizierung von Personen und Einheiten Method for authentication and authentication of individuals and entities |
08/22/2013 | DE102006001872B4 Vorrichtung und Verfahren zum Überprüfen einer Fehlererkennungsfunktionalität einer Datenverarbeitungseinrichtung auf Angriffe Apparatus and method for checking an error detection functionality of a data processing device to attacks |
08/21/2013 | EP2629480A2 Designation Of Classes For Certificates And Keys |
08/21/2013 | EP2629234A2 Security-enhanced computer systems and methods |
08/21/2013 | EP2629233A1 Apparatus, system, and method of relaying data, and recording medium storing data relay control program |
08/21/2013 | EP2629232A2 Methods and apparatus for dealing with malware |
08/21/2013 | EP2629231A2 Methods and apparatus for dealing with malware |
08/21/2013 | EP2629230A1 Method and apparatus for management of multiple grouped resources on device |
08/21/2013 | EP2629229A2 Bootstrapping access models in the absence of training data |
08/21/2013 | EP2629228A1 Location-based security system for portable electronic device |
08/21/2013 | EP2629227A1 Key management on device for perimeters |
08/21/2013 | EP2629226A1 Content data playback device, update management method, and update management program |
08/21/2013 | EP2629225A1 System, devices and methods for collaborative execution of a software application comprising at least one encrypted instruction |
08/21/2013 | EP2629224A1 Method and apparatus for outputting content in portable terminal supporting secure execution environment |
08/21/2013 | EP2629223A1 System, devices and methods for collaborative execution of a software application comprising at least one encrypted instruction |
08/21/2013 | EP2629222A1 Portable, protected data storage device |
08/21/2013 | EP2629221A1 Altering sampling rate to thwart attacks that involve analyzing hardware sensor output |
08/21/2013 | EP2629220A1 Thwarting attacks that involve analyzing hardware sensor output |
08/21/2013 | EP2629185A1 Method and device for locking and unlocking with touch graphic |
08/21/2013 | EP2628133A1 Authenticate a fingerprint image |
08/21/2013 | EP2628125A2 Method and apparatus for downloading drm module |
08/21/2013 | EP2628124A1 A system and method of generating encryption/decryption keys and encrypting/decrypting a derivative work |
08/21/2013 | EP2628123A1 A system for generating an incrementally completed 3d security mark |