Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
05/02/2013 | WO2013060196A1 Security protection method and apparatus for touch screen of electronic device |
05/02/2013 | WO2013060186A1 Method and apparatus for processing website address risk detection |
05/02/2013 | WO2013060107A1 Widget installation management system and method |
05/02/2013 | WO2013060102A1 Bluetooth-based computer security protection method and system |
05/02/2013 | WO2013059931A1 Temporally controlling access to software assets on user devices |
05/02/2013 | WO2013059870A1 System and method for maintaining network compliance |
05/02/2013 | WO2013059866A1 Remote device authentication system and method |
05/02/2013 | US20130111610 Temporally controlling access to software assets on user devices |
05/02/2013 | US20130111609 Highly secure method for accessing a dispersed storage network |
05/02/2013 | US20130111606 Mapping identities to documents to enable multiple user logins |
05/02/2013 | US20130111605 Information processing apparatus and information processing method |
05/02/2013 | US20130111604 Method and apparatus for sharing licenses between secure removable media |
05/02/2013 | US20130111603 Information processing apparatus and method, recording medium, and program |
05/02/2013 | US20130111602 System and/or Method for Distributing Media Content |
05/02/2013 | US20130111601 Apparatus and method for using contents information in digital rights management |
05/02/2013 | US20130111600 Method and device for sensing and responding to an unauthorized opening of a biometric trait capture device |
05/02/2013 | US20130111598 Mobile communications device providing secure element data wiping features and related methods |
05/02/2013 | US20130111597 Obscuring an accelerometer signal |
05/02/2013 | US20130111596 Data privacy for smart services |
05/02/2013 | US20130111595 Detection of dom-based cross-site scripting vulnerabilities |
05/02/2013 | US20130111594 Detection of dom-based cross-site scripting vulnerabilities |
05/02/2013 | US20130111593 Transforming untrusted applications into trusted executables through static previrtualization |
05/02/2013 | US20130111592 Mobile application security and management service |
05/02/2013 | US20130111591 Fuzzy Whitelisting Anti-Malware Systems and Methods |
05/02/2013 | US20130111589 System and method for detecting address resolution protocol (arp) spoofing |
05/02/2013 | US20130111588 Method and system for detecting intrusive anomalous use of a software system using multiple detection algorithms |
05/02/2013 | US20130111587 Detecting Software Vulnerabilities in an Isolated Computing Environment |
05/02/2013 | US20130111585 System, method and computer program product for rendering data of an on-demand database service safe |
05/02/2013 | US20130111584 Method and apparatus for preventing unwanted code execution |
05/02/2013 | US20130111583 System and method for hybrid role mining |
05/02/2013 | US20130111582 Security access method for automotive electronic control units |
05/02/2013 | US20130111581 Combined passcode and activity launch modifier |
05/02/2013 | US20130111579 Electronic device mode, associated apparatus and methods |
05/02/2013 | US20130111578 Relay apparatus, program of relay apparatus and transmitting apparatus |
05/02/2013 | US20130111577 Connection server, communication system, and communication method |
05/02/2013 | US20130111576 Secure server architecture for web based data management |
05/02/2013 | US20130111573 Single sign-on for applications |
05/02/2013 | US20130111572 Ip push platform and connection protocol in a push notification framework |
05/02/2013 | US20130111571 Systems and methods for creating a user credential and authentication using the created user credential |
05/02/2013 | US20130111565 Method and system of plug-in privilege control |
05/02/2013 | US20130111564 Image forming apparatus, license server, terminal apparatus, method for installing application, and method for providing application file |
05/02/2013 | US20130111563 Access control in a hybrid environment |
05/02/2013 | US20130111562 Method and apparatus for delivering application service using pre-configured access control corresponding to organizational hierarchy |
05/02/2013 | US20130111561 System and method for providing private session-based access to a redirected usb device or local device |
05/02/2013 | US20130111560 Techniques for dynamic domain-based isolation |
05/02/2013 | US20130111559 Intelligent Caching for Security Trimming |
05/02/2013 | US20130111558 Secure machine enrollment in multi-tenant subscription environment |
05/02/2013 | US20130111557 Access control in a hybrid environment |
05/02/2013 | US20130111556 Methods and apparatuses for hybrid desktop environment data usage authentication |
05/02/2013 | US20130111554 Enabling Access to a Secured Wireless Local Network without User Input of a Network Password |
05/02/2013 | US20130111553 System to establish trustworthiness of autonomous agent |
05/02/2013 | US20130111552 Acquiring a Trusted Set of Encoded Data Slices |
05/02/2013 | US20130111551 Method for Securing Computers from Malicious Code Attacks |
05/02/2013 | US20130111550 Service broker systems, methods, and apparatus |
05/02/2013 | US20130111549 Mechanisms to Use Network Session Identifiers for Software-As-A-Service Authentication |
05/02/2013 | US20130111548 Method for adapting security policies of an information system infrastructure |
05/02/2013 | US20130111547 Security Policy Deployment and Enforcement System for the Detection and Control of Polymorphic and Targeted Malware |
05/02/2013 | US20130111546 Systems, methods, and computer program products for managing secure elements |
05/02/2013 | US20130111545 Privacy Management for Subscriber Data |
05/02/2013 | US20130111544 Management of context-aware policies |
05/02/2013 | US20130111543 Techniques for controlling authentication |
05/02/2013 | US20130111542 Security policy tokenization |
05/02/2013 | US20130111541 Policy enforcement of client devices |
05/02/2013 | US20130111540 Cloud protection techniques |
05/02/2013 | US20130111224 Integrated circuit with logic circuitry and multiple concealing circuits |
05/02/2013 | US20130111220 Protecting sensitive data in a transmission |
05/02/2013 | US20130111219 Delivering data from a secure execution environment to a display controller |
05/02/2013 | US20130111216 Method and apparatus for incremental code signing |
05/02/2013 | US20130111215 Software self-checking systems and methods |
05/02/2013 | US20130111214 Biometric authentication method and computer system |
05/02/2013 | US20130111211 External Reference Monitor |
05/02/2013 | US20130111207 Writing application data to a secure element |
05/02/2013 | US20130110726 Systems and methods for managing software licensing agreements |
05/02/2013 | US20130108243 Recording medium and apparatus for protecting copyrighted digital data |
05/02/2013 | US20130108051 Code Diversity Method and System |
05/02/2013 | US20130107839 Control channel transmitting method, base station and terminal |
05/02/2013 | DE112011102256T5 System und Verfahren zum Speichern eines Passwortwiederherstellungsgeheimnisses System and method for storing a password recovery mystery |
05/02/2013 | DE102012218945A1 Zugriffssteuerung in einer hybriden Umgebung Access control in a hybrid environment |
05/02/2013 | DE102012218704A1 Erkennung von schwachstellen für dom-basiertes cross-site-scripting Detection of vulnerabilities for dom-based cross-site scripting |
05/02/2013 | DE102012109619A1 Verfahren zum Bereitstellen einer digitalen Signatur zum Sichern einer Flash-Programmierfunktion A method for providing a digital signature for securing a flash programming function |
05/02/2013 | DE102012109617A1 Verfahren zum Ersetzen eines öffentlichen Schlüssels eines Bootloaders A method of replacing a public key of the boot loader |
05/02/2013 | DE102012109615A1 Verwendung eines Manifest zur Präsenzaufzeichnung von gültiger Software und Kalibrierung Using a manifesto on the presence of valid recording software and calibration |
05/02/2013 | DE102011117214A1 Verfahren zur Erkennung einer unberechtigten Öffnung eines Signaturgeräts,Signaturgerät und Computersystem mit demselben A method for detecting unauthorized opening of a signature device, signature device and computer system with the same |
05/02/2013 | DE102011085487A1 Integrated circuit, has activation unit for activating technical functions, key generating unit for generating keys that identify circuit and/or functions, and comparator for comparing keys generated by generating unit with read key |
05/02/2013 | DE102011057103A1 Method for protecting data in computer network, involves reading existing data for physical separation of memory from computer networks with limit time |
05/02/2013 | CA2852361A1 Method and device for managing a key matrix, corresponding computer program product and storage means |
05/01/2013 | EP2587854A1 Device for mobile communication |
05/01/2013 | EP2587768A1 Transmitting apparatus and receiving apparatus |
05/01/2013 | EP2587758A2 Setting default security features for use with web applications and extensions |
05/01/2013 | EP2587717A2 Geothentication based on network ranging |
05/01/2013 | EP2587411A1 Electronic device and method for signing per hour period |
05/01/2013 | EP2587402A1 Hardware countermeasure against cryptographic attack |
05/01/2013 | EP2587401A1 Enforcing input validation through aspect oriented programming |
05/01/2013 | EP2587400A1 Simplified multi-factor authentication |
05/01/2013 | EP2587399A1 Method to transmit data from a first network to a plurality of destination networks with heterogene security levels |
05/01/2013 | EP2587398A1 Analog circuitry to conceal activity of logic circuitry |
05/01/2013 | EP2587397A1 Browser device access proxy |
05/01/2013 | EP2587375A1 Securely hosting workloads in virtual computing environments |
05/01/2013 | EP2586175A1 Method and device for verifying physical recognition between a caller and a called party |
05/01/2013 | EP2586173A1 Security method, associated chip card, module and terminal |