Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
04/2013
04/30/2013US8433656 Group licenses for virtual objects in a distributed virtual world
04/30/2013US8433655 Software installation system and method
04/30/2013US8433577 Detection of creative works on broadcast media
04/30/2013US8433285 Method and device for increasing complexity of password of communication terminal by setting character password through pictures
04/30/2013US8433066 Method for generating an encryption/decryption key
04/30/2013CA2536610C Debugging port security interface
04/27/2013CA2793492A1 Hardware countermeasure against cryptographic attack
04/27/2013CA2789047A1 Integrated circuit with logic circuitry and multiple concealing circuits
04/27/2013CA2788474A1 Analog circuitry to conceal activity of logic circuitry
04/25/2013WO2013059520A1 Integrating security policy and event management
04/25/2013WO2013059464A1 Context-dependent authentication
04/25/2013WO2013059367A1 Systems and methods of source software code modification
04/25/2013WO2013059348A1 User behavioral risk assessment
04/25/2013WO2013059270A1 User-defined countermeasures
04/25/2013WO2013059219A1 System and method for detecting a file embedded in an arbitrary location and determining the reputation of the file
04/25/2013WO2013059189A2 Defensive techniques to increase computer security
04/25/2013WO2013059138A1 System and method for whitelisting applications in a mobile network environment
04/25/2013WO2013059131A1 System and method for whitelisting applications in a mobile network environment
04/25/2013WO2013058965A1 System and method for transitioning to a whitelist mode during a malware attack in a network environment
04/25/2013WO2013058964A1 System and method for detecting a malicious command and control channel
04/25/2013WO2013058663A2 A driver related data storage system and method
04/25/2013WO2013058515A1 Login system and method with strengthened security
04/25/2013WO2013058029A1 Management device, management method and storage medium
04/25/2013WO2013057885A1 Information processing apparatus, server, information processing system and information processing method
04/25/2013WO2013057874A1 Electronic receipt system, terminal device, electronic receipt provision method and program
04/25/2013WO2013057361A2 Method and apparatus for providing data sharing schemes to provision device services
04/25/2013WO2013057305A1 Fuel dispenser user interface system architecture
04/25/2013WO2013057213A1 Method, device and system for entering data
04/25/2013WO2013056922A2 Method for calling up a client program
04/25/2013WO2013056644A1 Role engineering scoping and management
04/25/2013WO2013056542A1 Locking method, device and communication device when cover is opened
04/25/2013WO2013025085A3 Apparatus and method for supporting family cloud in cloud computing system
04/25/2013WO2012174169A3 Delaying or deterring counterfeiting and/or cloning of a component
04/25/2013WO2012120257A3 Controlling web page behaviour
04/25/2013US20130104252 Tamper detection countermeasures to deter physical attack on a security asic
04/25/2013US20130104251 Security systems and methods for use with structured and unstructured data
04/25/2013US20130104249 Verification Of Integrity Of Peer-Received Content In A Peer-To-Peer Content Distribution System
04/25/2013US20130104246 E-mail, text, and message monitoring system and method
04/25/2013US20130104245 Authentication system
04/25/2013US20130104244 Interoperability between a plurality of data protection systems
04/25/2013US20130104243 Protecting privacy when communicating with a web server
04/25/2013US20130104242 Method and system for forensic marking of digital contents
04/25/2013US20130104241 Devices for Controlling Rendering Protected Content and Related Methods
04/25/2013US20130104238 Method and apparatus for verifying proof of presence
04/25/2013US20130104235 Detection of undesired computer files in archives
04/25/2013US20130104234 Defensive Techniques to Increase Computer Security
04/25/2013US20130104231 Cyber security in an automotive network
04/25/2013US20130104230 System and Method for Detection of Denial of Service Attacks
04/25/2013US20130104229 Private Domain Name Registration
04/25/2013US20130104228 Stealth network node
04/25/2013US20130104218 Method and system for securely accessing to protected resource
04/25/2013US20130104217 Mask based challenge response test
04/25/2013US20130104213 Authentication method
04/25/2013US20130104207 Method of Connecting a Mobile Station to a Communcations Network
04/25/2013US20130104206 System and Method for Providing User Lifecycle Management and Service Orchestration of Multiple Media Services Across Multiple Display Screens
04/25/2013US20130104202 Systems and methods for authorizing third-party authentication to a service
04/25/2013US20130104201 Authentication system and related method
04/25/2013US20130104197 Authentication system
04/25/2013US20130104192 System and method for intelligence based security
04/25/2013US20130104191 Method and system for managing confidential information
04/25/2013US20130104190 System and method for document policy enforcement
04/25/2013US20130104189 Controlling Transmission of Unauthorized Unobservable Content in Email Using Policy
04/25/2013US20130104188 Secure option rom control
04/25/2013US20130104187 Context-dependent authentication
04/25/2013US20130104184 System and method for enablement of desktop software functionality based on it policy
04/25/2013US20130104049 Methods and Systems for Preventing Unauthorized Access to Patient Information
04/25/2013US20130104046 Role Engineering Scoping and Management
04/25/2013US20130103954 Key usage policies for cryptographic keys
04/25/2013US20130103952 User Authentication System and Method for Encryption and Decryption
04/25/2013US20130103950 System and method for securely creating mobile device application workgroups
04/25/2013US20130103949 Secure password generation
04/25/2013US20130103947 Temporal proximity to verify physical proximity
04/25/2013US20130103943 Displaying private information using alternate frame sequencing
04/25/2013US20130103941 Method for updating data in a security module
04/25/2013US20130103940 Methods, systems, and computer readable media for performing encapsulating security payload (esp) rehashing
04/25/2013US20130103938 Reconfiguring A Secure System
04/25/2013US20130103639 Creating web applications using cloud-based friction-free databases without requiring web hosting knowledge
04/25/2013US20130103544 Authentication system
04/25/2013US20130102297 Method and device for verifying physical recognition between a caller and a called party
04/25/2013US20130102285 Mobile communication terminal, startup method thereof, and network communication system
04/25/2013US20130101114 Apparatus and method for generating identification key
04/25/2013US20130101112 Method and apparatus for minimizing differential power attacks on processors
04/25/2013US20130100553 Recording medium and apparatus for protecting copyrighted digital data
04/25/2013DE102012219155A1 Verschlüsseln von Datenobjekten zur Datensicherung Encrypting of data objects for data backup
04/25/2013DE102012218436A1 Verteilen von lizenziertem Inhalt auf mehrere Einheiten Distribution of licensed content across several devices
04/25/2013DE102012109665A1 Manipulationserkennungsmaßnahmen zum Abschecken physischer Angriffe auf ein Sicherheits-ASIC Tamper detection measures Abschecken physical attacks on a security ASIC
04/25/2013DE102011116407A1 Mobile Recheneinheit Mobile computing unit
04/25/2013DE102006048980B4 Anordnung und Verfahren zur Bereitstellung von Daten Apparatus and method for providing data
04/25/2013CA2853050A1 Defensive techniques to increase computer security
04/25/2013CA2852799A1 Fuel dispenser user interface system architecture
04/25/2013CA2852634A1 A driver related data storage system and method
04/24/2013EP2584752A1 Method, apparatus, terminal and system for channel encryption
04/24/2013EP2584490A1 Displaying private information using alternate frame sequencing
04/24/2013EP2584489A1 Mobile computing unit
04/24/2013EP2584488A1 System and method for detecting computer security threats based on verdicts of computer users
04/24/2013EP2584486A2 Meter access management system
04/24/2013EP2584485A1 Method, device and system for entering data
04/24/2013EP2584484A1 System and method for protecting a computer system from the activity of malicious objects
04/24/2013EP2584459A1 System and method for changing an activation state of an electronic device using acoustic signals
04/24/2013EP2583213A2 Non-volatile memory for anti-cloning and authentication method for the same