Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
08/2013
08/20/2013US8516263 Electronic apparatus and communication control method
08/20/2013US8516260 Method, apparatus, and device for providing security among a calling function and a target function
08/20/2013US8516258 Generator for generating a message authentication code, method of generating a message authentication code, program element and computer-readable medium
08/20/2013US8516235 Basic input/output system read only memory image integration system and method
08/20/2013US8516212 Data processing apparatus, computer program therefor, and data processing method
08/20/2013US8516086 Generalized credential and protocol management of infrastructure
08/20/2013US8516033 Computers or microchips with a hardware side protected by a primary internal hardware firewall leaving an unprotected hardware side connected to a network, and with multiple internal hardware compartments protected by multiple secondary interior hardware firewalls
08/20/2013US8515981 Program distribution server, image forming apparatus, program distribution system, and contract document integration method
08/20/2013US8515081 Approach for managing access to messages using encryption key management policies
08/20/2013US8515075 Method of and system for malicious software detection using critical address space protection
08/20/2013US8515062 Image encryption/decryption apparatus, method and program
08/20/2013US8511567 Smart card chip arrangement
08/17/2013CA2800504A1 Designation of classes for certificates and keys
08/17/2013CA2799903A1 Certificate management method based on connectivity and policy
08/16/2013CA2806262A1 Secure audio peripheral device
08/16/2013CA2805960A1 Method and apparatus for management of multiple grouped resources on device
08/15/2013WO2013119934A1 Systems and methods for testing online systems and content
08/15/2013WO2013119750A2 Dynamic psk for hotspots
08/15/2013WO2013119664A1 Digital data commerce system and methods with digital media object to cloud redirection
08/15/2013WO2013119401A1 Security policy for device data
08/15/2013WO2013119385A1 Protecting user credentials from a computing device
08/15/2013WO2013119103A1 Hardware authentication system
08/15/2013WO2013119065A1 Securely upgrading or downgrading platform components
08/15/2013WO2013118046A1 Policy management and compliance for user provisioning system
08/15/2013WO2013117899A1 Exception handling in a data processing apparatus having a secure domain and a less secure domain
08/15/2013WO2013117896A1 Maintaining secure data isolated from non-secure access when switching between domains
08/15/2013WO2013116918A1 Method and apparatus for program flow in software operation
08/15/2013WO2013116916A1 System and method for generating and protecting cryptographic keys
08/15/2013WO2013078535A8 Methods, media, and system for monitoring access to computer environments
08/15/2013WO2013077929A3 Retention based intrinsic fingerprint identification featuring a fuzzy algorithm and a dynamic key
08/15/2013WO2013067072A3 Mapping identities to documents to enable multiple user logins
08/15/2013WO2013067066A3 Intelligent caching for security trimming
08/15/2013WO2013054074A3 Id authentication
08/15/2013US20130212714 Information Management System And Device
08/15/2013US20130212713 Method and apparatus for providing backend support for device control in risk conditions
08/15/2013US20130212711 Solution for Continuous Control and Protection of Enterprise Data Based on Authorization Projection
08/15/2013US20130212710 Data Leakage Prevention for Cloud and Enterprise Networks
08/15/2013US20130212709 System and Method for Securing Virtual Computing Environments
08/15/2013US20130212708 System and methods thereof for detection of content servers, caching popular content therein, and providing support for proper authentication
08/15/2013US20130212706 Broadcasting of electronic documents preserving copyright and permitting private copying
08/15/2013US20130212705 System and method of generating a per sale watermarking on digital files
08/15/2013US20130212704 Secure digital storage
08/15/2013US20130212703 Role-Based Content Rendering
08/15/2013US20130212702 Apparatus and Method for Data Security on Mobile Devices
08/15/2013US20130212700 Exception handling in a data processing apparatus having a secure domain and a less secure domain
08/15/2013US20130212699 Methods and systems for facilitating personal data propagation
08/15/2013US20130212698 Method and device for the secure transfer of data
08/15/2013US20130212697 Secure data exchange technique
08/15/2013US20130212696 Apparatuses, systems, and methods for renewability with digital content protection systems
08/15/2013US20130212695 Segmented media content rights management
08/15/2013US20130212694 Method and apparatus for rf transmitable data protection
08/15/2013US20130212693 Anonymous whistle blower system with reputation reporting of anonymous whistle blower
08/15/2013US20130212692 Systems and Methods for Managing Data Incidents
08/15/2013US20130212691 Electronic system for the protection and control of license transactions associated with the alteration of replicated read only media and its bound licensed content
08/15/2013US20130212690 Private decayed sum estimation under continual observation
08/15/2013US20130212688 System for sharing a users personal data
08/15/2013US20130212687 Bridge for communicating with a dynamic computer network
08/15/2013US20130212684 Detecting Application Harmful Behavior and Grading Application Risks for Mobile Devices
08/15/2013US20130212683 Systems and Methods for Managing Data Incidents
08/15/2013US20130212682 Automatic discovery of system integrity exposures in system code
08/15/2013US20130212678 Altering Sampling Rate to Thwart Attacks that involve Analyzing Hardware Sensor Output
08/15/2013US20130212677 Thwarting Attacks that involve Analyzing Hardware Sensor Output
08/15/2013US20130212676 Mission management for dynamic computer networks
08/15/2013US20130212675 Dynamic computer network with variable identity parameters
08/15/2013US20130212674 System and method for signature pathway authentication and identification
08/15/2013US20130212673 Entering a secured computing environment using multiple authenticated code modules
08/15/2013US20130212672 Execution of a secured environment initialization instruction on a point-to-point interconnect system
08/15/2013US20130212671 Security-Enhanced Computer Systems and Methods
08/15/2013US20130212669 Detecting and Combating Attack In Protection System of an Industrial Control System
08/15/2013US20130212668 Suspension of Processes in Industrial Control System When an Anomaly Occurs
08/15/2013US20130212666 Tokenization in mobile environments
08/15/2013US20130212665 Signing off from multiple domains accessible using single sign-on
08/15/2013US20130212662 Security access in a computer-based flow of tasks
08/15/2013US20130212660 Credential manangement system
08/15/2013US20130212657 Electronic device and method for resetting unlocking password of the electronic device
08/15/2013US20130212656 Dynamic PSK for Hotspots
08/15/2013US20130212655 Efficient prevention fraud
08/15/2013US20130212653 Systems and methods for password-free authentication
08/15/2013US20130212647 Method for opening a session of a machine belonging to a machine set
08/15/2013US20130212643 Transmission apparatus, electronic appliance, reception apparatus, and authentication system
08/15/2013US20130212642 Resilient Device Authentication System
08/15/2013US20130212618 Individualized program guide based on system and user constraints
08/15/2013US20130212406 Technique for providing secure firmware
08/15/2013US20130212405 Secure data parser method and system
08/15/2013US20130212404 Document modification detection and prevention
08/15/2013US20130212403 Electronic content rights with and-or expression
08/15/2013US20130212402 Techniques for calibrating measuring devices
08/15/2013US20130212399 Travel Vault
08/15/2013US20130212398 Method and system for validating a device that uses a dynamic identifier
08/15/2013US20130212397 Apparatus and method for incorporating signature into electronic documents
08/15/2013US20130212389 Enterprise computer investigation system
08/15/2013US20130212381 System and method for controlling authorized access to a structured testing procedure on a medical device
08/15/2013US20130212376 Data access management in a hybrid memory server
08/15/2013US20130212375 Method of Checking and Protecting Data and Identity Especially Within Processes Using Information and Communication Technologies.
08/15/2013US20130212370 Method and apparatus for establishing safe processor operating points
08/15/2013US20130212369 Attesting use of an interactive component during a boot process
08/15/2013US20130212367 Security Policy for Device Data
08/15/2013US20130211876 System and method for collection, aggregation, analysis, reporting, and monetization of personal data generated across heterogeneous systems and devices
08/15/2013US20130211833 Techniques for overlaying a custom interface onto an existing kiosk interface
08/15/2013US20130210519 Secure game download