Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
05/2013
05/02/2013WO2013060196A1 Security protection method and apparatus for touch screen of electronic device
05/02/2013WO2013060186A1 Method and apparatus for processing website address risk detection
05/02/2013WO2013060107A1 Widget installation management system and method
05/02/2013WO2013060102A1 Bluetooth-based computer security protection method and system
05/02/2013WO2013059931A1 Temporally controlling access to software assets on user devices
05/02/2013WO2013059870A1 System and method for maintaining network compliance
05/02/2013WO2013059866A1 Remote device authentication system and method
05/02/2013US20130111610 Temporally controlling access to software assets on user devices
05/02/2013US20130111609 Highly secure method for accessing a dispersed storage network
05/02/2013US20130111606 Mapping identities to documents to enable multiple user logins
05/02/2013US20130111605 Information processing apparatus and information processing method
05/02/2013US20130111604 Method and apparatus for sharing licenses between secure removable media
05/02/2013US20130111603 Information processing apparatus and method, recording medium, and program
05/02/2013US20130111602 System and/or Method for Distributing Media Content
05/02/2013US20130111601 Apparatus and method for using contents information in digital rights management
05/02/2013US20130111600 Method and device for sensing and responding to an unauthorized opening of a biometric trait capture device
05/02/2013US20130111598 Mobile communications device providing secure element data wiping features and related methods
05/02/2013US20130111597 Obscuring an accelerometer signal
05/02/2013US20130111596 Data privacy for smart services
05/02/2013US20130111595 Detection of dom-based cross-site scripting vulnerabilities
05/02/2013US20130111594 Detection of dom-based cross-site scripting vulnerabilities
05/02/2013US20130111593 Transforming untrusted applications into trusted executables through static previrtualization
05/02/2013US20130111592 Mobile application security and management service
05/02/2013US20130111591 Fuzzy Whitelisting Anti-Malware Systems and Methods
05/02/2013US20130111589 System and method for detecting address resolution protocol (arp) spoofing
05/02/2013US20130111588 Method and system for detecting intrusive anomalous use of a software system using multiple detection algorithms
05/02/2013US20130111587 Detecting Software Vulnerabilities in an Isolated Computing Environment
05/02/2013US20130111585 System, method and computer program product for rendering data of an on-demand database service safe
05/02/2013US20130111584 Method and apparatus for preventing unwanted code execution
05/02/2013US20130111583 System and method for hybrid role mining
05/02/2013US20130111582 Security access method for automotive electronic control units
05/02/2013US20130111581 Combined passcode and activity launch modifier
05/02/2013US20130111579 Electronic device mode, associated apparatus and methods
05/02/2013US20130111578 Relay apparatus, program of relay apparatus and transmitting apparatus
05/02/2013US20130111577 Connection server, communication system, and communication method
05/02/2013US20130111576 Secure server architecture for web based data management
05/02/2013US20130111573 Single sign-on for applications
05/02/2013US20130111572 Ip push platform and connection protocol in a push notification framework
05/02/2013US20130111571 Systems and methods for creating a user credential and authentication using the created user credential
05/02/2013US20130111565 Method and system of plug-in privilege control
05/02/2013US20130111564 Image forming apparatus, license server, terminal apparatus, method for installing application, and method for providing application file
05/02/2013US20130111563 Access control in a hybrid environment
05/02/2013US20130111562 Method and apparatus for delivering application service using pre-configured access control corresponding to organizational hierarchy
05/02/2013US20130111561 System and method for providing private session-based access to a redirected usb device or local device
05/02/2013US20130111560 Techniques for dynamic domain-based isolation
05/02/2013US20130111559 Intelligent Caching for Security Trimming
05/02/2013US20130111558 Secure machine enrollment in multi-tenant subscription environment
05/02/2013US20130111557 Access control in a hybrid environment
05/02/2013US20130111556 Methods and apparatuses for hybrid desktop environment data usage authentication
05/02/2013US20130111554 Enabling Access to a Secured Wireless Local Network without User Input of a Network Password
05/02/2013US20130111553 System to establish trustworthiness of autonomous agent
05/02/2013US20130111552 Acquiring a Trusted Set of Encoded Data Slices
05/02/2013US20130111551 Method for Securing Computers from Malicious Code Attacks
05/02/2013US20130111550 Service broker systems, methods, and apparatus
05/02/2013US20130111549 Mechanisms to Use Network Session Identifiers for Software-As-A-Service Authentication
05/02/2013US20130111548 Method for adapting security policies of an information system infrastructure
05/02/2013US20130111547 Security Policy Deployment and Enforcement System for the Detection and Control of Polymorphic and Targeted Malware
05/02/2013US20130111546 Systems, methods, and computer program products for managing secure elements
05/02/2013US20130111545 Privacy Management for Subscriber Data
05/02/2013US20130111544 Management of context-aware policies
05/02/2013US20130111543 Techniques for controlling authentication
05/02/2013US20130111542 Security policy tokenization
05/02/2013US20130111541 Policy enforcement of client devices
05/02/2013US20130111540 Cloud protection techniques
05/02/2013US20130111224 Integrated circuit with logic circuitry and multiple concealing circuits
05/02/2013US20130111220 Protecting sensitive data in a transmission
05/02/2013US20130111219 Delivering data from a secure execution environment to a display controller
05/02/2013US20130111216 Method and apparatus for incremental code signing
05/02/2013US20130111215 Software self-checking systems and methods
05/02/2013US20130111214 Biometric authentication method and computer system
05/02/2013US20130111211 External Reference Monitor
05/02/2013US20130111207 Writing application data to a secure element
05/02/2013US20130110726 Systems and methods for managing software licensing agreements
05/02/2013US20130108243 Recording medium and apparatus for protecting copyrighted digital data
05/02/2013US20130108051 Code Diversity Method and System
05/02/2013US20130107839 Control channel transmitting method, base station and terminal
05/02/2013DE112011102256T5 System und Verfahren zum Speichern eines Passwortwiederherstellungsgeheimnisses System and method for storing a password recovery mystery
05/02/2013DE102012218945A1 Zugriffssteuerung in einer hybriden Umgebung Access control in a hybrid environment
05/02/2013DE102012218704A1 Erkennung von schwachstellen für dom-basiertes cross-site-scripting Detection of vulnerabilities for dom-based cross-site scripting
05/02/2013DE102012109619A1 Verfahren zum Bereitstellen einer digitalen Signatur zum Sichern einer Flash-Programmierfunktion A method for providing a digital signature for securing a flash programming function
05/02/2013DE102012109617A1 Verfahren zum Ersetzen eines öffentlichen Schlüssels eines Bootloaders A method of replacing a public key of the boot loader
05/02/2013DE102012109615A1 Verwendung eines Manifest zur Präsenzaufzeichnung von gültiger Software und Kalibrierung Using a manifesto on the presence of valid recording software and calibration
05/02/2013DE102011117214A1 Verfahren zur Erkennung einer unberechtigten Öffnung eines Signaturgeräts,Signaturgerät und Computersystem mit demselben A method for detecting unauthorized opening of a signature device, signature device and computer system with the same
05/02/2013DE102011085487A1 Integrated circuit, has activation unit for activating technical functions, key generating unit for generating keys that identify circuit and/or functions, and comparator for comparing keys generated by generating unit with read key
05/02/2013DE102011057103A1 Method for protecting data in computer network, involves reading existing data for physical separation of memory from computer networks with limit time
05/02/2013CA2852361A1 Method and device for managing a key matrix, corresponding computer program product and storage means
05/01/2013EP2587854A1 Device for mobile communication
05/01/2013EP2587768A1 Transmitting apparatus and receiving apparatus
05/01/2013EP2587758A2 Setting default security features for use with web applications and extensions
05/01/2013EP2587717A2 Geothentication based on network ranging
05/01/2013EP2587411A1 Electronic device and method for signing per hour period
05/01/2013EP2587402A1 Hardware countermeasure against cryptographic attack
05/01/2013EP2587401A1 Enforcing input validation through aspect oriented programming
05/01/2013EP2587400A1 Simplified multi-factor authentication
05/01/2013EP2587399A1 Method to transmit data from a first network to a plurality of destination networks with heterogene security levels
05/01/2013EP2587398A1 Analog circuitry to conceal activity of logic circuitry
05/01/2013EP2587397A1 Browser device access proxy
05/01/2013EP2587375A1 Securely hosting workloads in virtual computing environments
05/01/2013EP2586175A1 Method and device for verifying physical recognition between a caller and a called party
05/01/2013EP2586173A1 Security method, associated chip card, module and terminal