Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
06/2013
06/18/2013US8468097 Method and apparatus for protecting the privacy of responder information
06/18/2013US8467773 System and methods for pre-caching broadcast content for merchandising on a wireless mobile device
06/18/2013US8467534 Method and system for secure access and processing of an encryption/decryption key
06/18/2013US8467527 Efficient key derivation for end-to-end network security with traffic visibility
06/18/2013US8466773 Method of authorization
06/18/2013US8464941 Method and terminal for providing controlled access to a memory card
06/18/2013CA2516925C Method for the carrying out the premium-based recommendation of content objects that can be downloaded to a mobile radio terminal
06/18/2013CA2495018C Method and apparatus for secure e-mail
06/18/2013CA2482558C Mobile account authentication service
06/13/2013WO2013086532A1 Systems and methods for using cipher objects to protect data
06/13/2013WO2013086474A1 Digital authentication and security method and system
06/13/2013WO2013086289A1 Predictive heap overflow protection
06/13/2013WO2013086069A2 Method, system and program for verifying the authenticity of a website using a reliable telecommunication channel and pre-login message
06/13/2013WO2013085867A1 Contextual and location awareness for device interaction
06/13/2013WO2013085807A1 Systems and methods for fast authentication with a mobile device
06/13/2013WO2013085717A1 Data center infrastructure management system incorporating security for managed infrastructure devices
06/13/2013WO2013085685A1 Limiting concurrent viewing sessions on multiple user devices
06/13/2013WO2013085517A1 Method and apparatus for policy-based content sharing in a peer to peer manner using a hardware based root of trust
06/13/2013WO2013084563A1 Privacy information management device, method and program
06/13/2013WO2013084428A1 Electronic device
06/13/2013WO2013083941A1 Data security device
06/13/2013WO2013083940A1 Trigger device
06/13/2013WO2013083923A1 Method of encrypted data exchange between a terminal and a machine
06/13/2013WO2013083485A1 Cryptographic method for protecting a key hardware register against fault attacks
06/13/2013WO2013083224A1 Method and device for protecting a computer program against unauthorised use
06/13/2013WO2013083072A1 Method and system for digital content online reading authentication
06/13/2013WO2013059189A3 Defensive techniques to increase computer security
06/13/2013US20130152221 Limiting concurrent viewing sessions on multiple user devices
06/13/2013US20130152220 Method, Apparatus and System for Software Management
06/13/2013US20130152218 Computer-readable medium recorded with information processing program, information processing apparatus, information processing system, and information processing method
06/13/2013US20130152216 Systems and methods for storage of user information and for verifying user identity
06/13/2013US20130152215 Secure location collection and analysis service
06/13/2013US20130152213 Apparatus, system and method for preventing data loss
06/13/2013US20130152211 Using social signals to identify unauthorized content on a social networking system
06/13/2013US20130152210 Coordinated watermarking
06/13/2013US20130152209 Facilitating System Service Request Interactions for Hardware-Protected Applications
06/13/2013US20130152208 Security key management based on service packaging
06/13/2013US20130152206 Method and apparatus for preventing unauthorized access to information stored in a non-volatile memory
06/13/2013US20130152205 Interactive analysis of a security specification
06/13/2013US20130152203 Operation of a dual instruction pipe virus co-processor
06/13/2013US20130152202 Apparatus and method for analyzing malware in data analysis system
06/13/2013US20130152201 Adjunct Computing Machine for Remediating Malware on Compromised Computing Machine
06/13/2013US20130152200 Predictive Heap Overflow Protection
06/13/2013US20130152198 Anomaly Detection To Implement Security Protection of a Control System
06/13/2013US20130152197 Event detection method and apparatus in a distributed environment
06/13/2013US20130152196 Throttling of rogue entities to push notification servers
06/13/2013US20130152195 Replay Attack Protection With Small State For Use In Secure Group Communication
06/13/2013US20130152194 System, method and software for controlling access to virtual machine consoles
06/13/2013US20130152193 Method for authentication with dynamic and random passwords
06/13/2013US20130152192 Restricting access to the resources of a terminal
06/13/2013US20130152191 Timing management in a large firewall cluster
06/13/2013US20130152188 Port allocation in a firewall cluster
06/13/2013US20130152185 Transaction provisioning for mobile wireless communications devices and related methods
06/13/2013US20130152183 User Identity Management and Authentication in Network Environments
06/13/2013US20130152182 System and method for enabling, verification of one or more credentials of entities and sharing result of verification
06/13/2013US20130152180 Device using secure processing zone to establish trust for digital rights management
06/13/2013US20130152179 System and method for user authentication using one-time identification
06/13/2013US20130152178 Secure enterprise service delivery
06/13/2013US20130152176 Secure authentication
06/13/2013US20130152173 Method, apparatus, and computer-readable medium for content access authorization
06/13/2013US20130152172 Entitled Data Cache Management
06/13/2013US20130152169 Controlling access to resources on a network
06/13/2013US20130152166 System And Method For Trusted Pair Security
06/13/2013US20130152165 End user license agreements associated with messages
06/13/2013US20130152160 Systems and methods for using cipher objects to protect data
06/13/2013US20130152159 Enhanced lifecycle management of security module
06/13/2013US20130152158 Confidential information identifying method, information processing apparatus, and program
06/13/2013US20130152157 Automatic filtering in social networks
06/13/2013US20130152156 Vpn support in a large firewall cluster
06/13/2013US20130152155 Providing user attributes to complete an online transaction
06/13/2013US20130151866 Method and system for secure data storage
06/13/2013US20130151865 Securing microprocessors against information leakage and physical tampering
06/13/2013US20130151864 Clipboard protection system in drm environment and recording medium in which program for executing method in computer is recorded
06/13/2013US20130151863 Interfaces for combining calls in an emulated environment
06/13/2013US20130151861 System and method to protect computer software from unauthorized use
06/13/2013US20130151859 Key and method for entering computer related passwords via a mnemonic combination
06/13/2013US20130151854 Method for authenticating a portable data carrier
06/13/2013US20130151848 Cryptographic certification of secure hosted execution environments
06/13/2013US20130151836 Semiconductor device including encryption section, semiconductor device including external interface, and content reproduction method
06/13/2013US20130148867 External controller and method for delaying screen locking of computing device
06/13/2013US20130148804 Anti-prying encrypted keyboard
06/13/2013US20130147795 Mobile terminal and control method thereof
06/13/2013DE102012221512A1 Steuern der Verwendung virtueller Festplatten vor deren Anbindung an virtuelle Maschinen Controlling the use of virtual hard disks before their connection to virtual machines
06/13/2013DE102011056191A1 Vorrichtung zum Schutz von Sicherheitstoken gegen Malware Device for protecting against malware security token
06/13/2013CA2858719A1 Systems and methods for using cipher objects to protect data
06/12/2013EP2603025A1 Apparatus and method for secure storage of private information on a mobile terminal and control of private information transmitted by the mobile terminal
06/12/2013EP2602954A1 Secure data parser method and system
06/12/2013EP2602953A1 Secure data parser method and system
06/12/2013EP2602952A1 Cryptographic method for protecting a key hardware register against fault attacks
06/12/2013EP2602738A2 Device for protecting security tokens against malware
06/12/2013EP2602737A2 Display apparatus and control method thereof
06/12/2013EP2602736A2 Systems and methods for electronically publishing content
06/12/2013EP2602735A1 Secure authentication
06/12/2013EP2602728A1 Device and method for selecting and updating the profile of a user
06/12/2013EP2602699A1 Information processing device, method for controlling information processing device, program, and information storage medium
06/12/2013EP2601613A1 Efficient implementation of hash algorithm on a processor
06/12/2013EP2601588A2 Providing fast non-volatile storage in a secure environment
06/12/2013CN202998240U System employing mobile phone as mobile digit certificate carrier
06/12/2013CN202995743U Computer data information anti-eavesdropping device
06/12/2013CN202995742U Encryption adapter for data storage device