Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
08/2013
08/13/2013US8510859 Methods and arrangements to launch trusted, co-existing environments
08/13/2013US8510853 Content management method and apparatus of mobile terminal
08/13/2013US8510851 Method and apparatus for accessing content protected media streams
08/13/2013US8510850 Functionality for providing de-identified data
08/13/2013US8510843 Security status and information display system
08/13/2013US8510838 Malware protection using file input/output virtualization
08/13/2013US8510836 Lineage-based reputation system
08/13/2013US8510832 Method and system for content categorization
08/13/2013US8510827 Taint tracking mechanism for computer security
08/13/2013US8510815 Virtual computer system, access control method and communication device for the same
08/13/2013US8510813 Management of network login identities
08/13/2013US8510811 Network transaction verification and authentication
08/13/2013US8510807 Real-time granular statistical reporting for distributed platforms
08/13/2013US8510802 Home network access node usage prevention by blocking access node entries in a preferred roaming list
08/13/2013US8510797 Online user authentication
08/13/2013US8510794 Methods and apparatus for a unified identity management interface across internal and shared computing applications
08/13/2013US8510792 Gated network service
08/13/2013US8510789 Data output method, system and apparatus
08/13/2013US8510572 Remote access system, gateway, client device, program, and storage medium
08/13/2013US8510568 Method and apparatus for importing a transport stream
08/13/2013US8510567 Conditional biometric access in a gaming environment
08/13/2013US8510557 Secure message and file delivery
08/13/2013US8510556 Authentication method, system, server, and user node
08/13/2013US8510549 Transmission of packet data over a network with security protocol
08/13/2013US8510544 Starts up of modules of a second module group only when modules of a first group have been started up legitimately
08/13/2013US8510421 Server, terminal apparatus, device registering system, registering method, registering program and recording medium
08/13/2013US8510227 Systems and methods for electronically managing content
08/13/2013US8510226 Method for synchronous encryption between a client and a licensing agent
08/13/2013US8510225 Split channel authenticity queries in multi-party dialog
08/13/2013US8509680 Physical presence digital authentication system
08/13/2013US8509448 Methods and device for secure transfer of symmetric encryption keys
08/13/2013US8509230 Software streaming system and method
08/13/2013US8508786 System and method of billing for scanning service costs
08/13/2013US8508763 Image forming apparatus, user restriction method and use history generation method
08/13/2013US8508760 Output device capable of preventing the leakage of confidential information
08/13/2013US8506649 Electronic device security and tracking system and method
08/13/2013CA2659826C Managing information relating to secure module applications
08/13/2013CA2641258C System and method for improving restrictiveness on accessing software applications
08/13/2013CA2624712C Method and system for secure password/pin input via mouse scroll wheel
08/13/2013CA2524405C Method and system for controlled media sharing in a network
08/13/2013CA2521474C Method and apparatus to facilitate security-enabled content caching
08/13/2013CA2450834C An electronic data vault providing biometrically protected electronic signatures
08/08/2013WO2013116743A1 Method and apparatus to authenticate a user to a mobile device using mnemonic based digital signatures
08/08/2013WO2013116214A1 Remote trust attestation and geo-location of servers and clients in cloud computing environments
08/08/2013WO2013116169A1 Efficiently throttling user authentication
08/08/2013WO2013116117A1 Facial recognition streamlined login
08/08/2013WO2013116084A1 Educating users and enforcing data dissemination policies
08/08/2013WO2013115990A2 System for protecting sensitive data with distributed tokenization
08/08/2013WO2013115927A1 Centralized operation management
08/08/2013WO2013115773A1 Secure information access over network
08/08/2013WO2013114166A1 Known plaintext attack protection
08/08/2013WO2013113812A1 Dynamic configuration of an industrial control system
08/08/2013WO2013113399A1 A method and a system for controlling at least one process running on an operating system running on a computer system to access at least one input multimedia resource associated with the computer system
08/08/2013WO2013113119A1 Zone based presence determination via voiceprint location awareness
08/08/2013WO2013088258A3 Systems and methods for authenticating benefit recipients
08/08/2013WO2013067989A3 Method for assessing and containing risks from smartphone applications
08/08/2013US20130205415 Network linker for secure execution of unsecured apps on a device
08/08/2013US20130205413 Data processing apparatus and method using secure domain and less secure domain
08/08/2013US20130205412 On board vehicle media controller
08/08/2013US20130205411 Method for protecting data content
08/08/2013US20130205410 Methods and Systems for Securing Data by Providing Continuous User-System Binding Authentication
08/08/2013US20130205407 User interface, machine and method
08/08/2013US20130205406 Data protection method and device
08/08/2013US20130205404 Protecting privacy of shared personal information
08/08/2013US20130205403 Maintaining secure data isolated from non-secure access when switching between domains
08/08/2013US20130205402 Apparatuses and methods for content protection using Digital Rights Management (DRM) in WebView or WebKit
08/08/2013US20130205401 Apparatuses and methods for content protection using digital rights management (DRM) in webview or webkit
08/08/2013US20130205399 Automatic synthesis of unit tests for security testing
08/08/2013US20130205398 Automatic synthesis of unit tests for security testing
08/08/2013US20130205397 Adaptive fuzzing system for web services
08/08/2013US20130205396 Detecting Malicious Software
08/08/2013US20130205395 Pre-boot firmware based virus scanner
08/08/2013US20130205394 Threat Detection in a Data Processing System
08/08/2013US20130205393 Increasing Availability of an Industrial Control System
08/08/2013US20130205391 Formal Analysis of the Quality and Conformance of Information Flow Downgraders
08/08/2013US20130205389 Data processing apparatus and method for protecting secure data and program code from non-secure access when switching between secure and less secure domains
08/08/2013US20130205388 Selective randomization for non-deterministically compiled code
08/08/2013US20130205387 Method and Apparatus to Authenticate a User to a Mobile Device Using Mnemonic Based Digital Signatures
08/08/2013US20130205386 Method and system for verification of human presence at a mobile device
08/08/2013US20130205385 Providing intent-based access to user-owned resources
08/08/2013US20130205383 Consolidating disparate cloud service data and behavior based on trust relationships between cloud services
08/08/2013US20130205381 Service Protection
08/08/2013US20130205379 Authentication method between client and server, machine-readable storage medium, client and server
08/08/2013US20130205378 Communication apparatus, server apparatus, relay apparatus, control apparatus, and computer program product
08/08/2013US20130205377 Methods using biometric characteristics to facilitate access of web services
08/08/2013US20130205376 System and method for securing distributed exporting models in a network environment
08/08/2013US20130205371 Method for Securing Digital Data and Identities in Particular in a Process Using Information and Communication Technologies
08/08/2013US20130205368 Retrospective policy safety net
08/08/2013US20130205367 Methods and Systems for Active Data Security Enforcement During Protected Mode Use of a System
08/08/2013US20130205365 Policy and compliance management for user provisioning systems
08/08/2013US20130205364 Centralized operation management
08/08/2013US20130205363 Centralized operation management
08/08/2013US20130205362 Centralized operation management
08/08/2013US20130205361 Dynamic threat protection in mobile networks
08/08/2013US20130205360 Protecting user credentials from a computing device
08/08/2013US20130205359 Policy and compliance management for user provisioning systems
08/08/2013US20130205209 Content Identification, Personal Domain, Copyright Notification, Metadata and E-Commerce
08/08/2013US20130205139 Scrambling An Address And Encrypting Write Data For Storing In A Storage Device
08/08/2013US20130205138 System and method for real world biometric analytics through the use of a multimodal biometric analytic wallet
08/08/2013US20130205135 System and method of storing data