Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
03/2013
03/21/2013WO2013038478A1 Vehicular electronic control device
03/21/2013WO2013038418A1 System and method to authorize the access of the service to an end user
03/21/2013WO2013038181A1 Method and apparatus for enabling authorised users to access computer resources
03/21/2013WO2013038006A1 Provisioning user permissions using attribute-based access-control policies
03/21/2013WO2013037528A1 Malware scanning
03/21/2013WO2013037329A1 Secure digital content sharing method, device, and system
03/21/2013WO2013037304A1 Apparatus and methods for preventing payment webpage tampering
03/21/2013WO2013037261A1 Method, apparatus and virtual machine for detecting malicious program
03/21/2013WO2013016736A3 Product authentication based upon a hyperelliptic curve equation and a curve pairing function
03/21/2013WO2013013012A3 Selective vulnerability and infection testing website
03/21/2013WO2012154664A3 Methods, systems, and computer readable media for detecting injected machine code
03/21/2013WO2012148145A3 Method for generating and managing a user account using a multi-password
03/21/2013US20130074198 Methods and systems to fingerprint textual information using word runs
03/21/2013US20130074197 Rights managed distributable software
03/21/2013US20130074196 Signature Methods For Scientific Data Information Systems
03/21/2013US20130074195 Methods and systems for increasing the security of electronic messages
03/21/2013US20130074193 Methods, apparatuses, and computer program products for exception handling
03/21/2013US20130074192 Data security in a multi-nodal environment
03/21/2013US20130074191 Method for controlling content uploaded to a public content site
03/21/2013US20130074190 Apparatus and method for providing security functions in computing system
03/21/2013US20130074188 Methods and systems for improved risk scoring of vulnerabilities
03/21/2013US20130074187 Hacker virus security-integrated control device
03/21/2013US20130074186 Device-tailored whitelists
03/21/2013US20130074185 Providing a Network-Accessible Malware Analysis
03/21/2013US20130074184 Packet processing in a multiple processor system
03/21/2013US20130074183 Method and apparatus for defending distributed denial-of-service (ddos) attack through abnormally terminated session
03/21/2013US20130074182 Information processing apparatus and control method of the same
03/21/2013US20130074180 User certification in a structure design, analysis, and implementation system
03/21/2013US20130074178 Preventing access of a host device to malicious data in a portable device
03/21/2013US20130074174 Firewall access control with border gateway protocol attributes
03/21/2013US20130074173 Control of Security Application in a LAN from Outside the LAN
03/21/2013US20130074172 Method and system for establishing and maintaining an improved single sign-on (sso) facility
03/21/2013US20130074170 Authenticating a user of a system using near field communication
03/21/2013US20130074169 Restrictive Access of a Digital Object Based on Location
03/21/2013US20130074168 Streaming video authentication
03/21/2013US20130074167 Authenticating Linked Accounts
03/21/2013US20130074166 Systems and methods for secure and efficient enrollment into a federation which utilizes a biometric repository
03/21/2013US20130074165 Trusted Content Distribution System
03/21/2013US20130074164 Method and system of securing accounts
03/21/2013US20130074163 User equipment and control method therefor
03/21/2013US20130074162 Method for dynamically authorizing a mobile communications device
03/21/2013US20130074161 Authentication in heterogeneous ip networks
03/21/2013US20130074160 Method of controlling information processing system, computer-readable recording medium storing program for controlling apparatus
03/21/2013US20130074158 Method and apparatus for domain-based data security
03/21/2013US20130074157 Image processing apparatus in which process to be executed to image is limited, image processing program product executed thereby, management server executing prescribed process to image transmitted from the image processing apparatus, and information processing program product executed thereby
03/21/2013US20130074156 Method and system for execution monitor-based trusted computing
03/21/2013US20130074155 Network apparatus based on content name, method of generating and authenticating content name
03/21/2013US20130074154 Public network access server having a user-configurable firewall
03/21/2013US20130074153 Public network access server having a user-configurable firewall
03/21/2013US20130074152 Method and devices for security association (sa) between devices
03/21/2013US20130074151 Online Business Method, System and Apparatus Based on Open Application Programming Interface
03/21/2013US20130074150 Presenting Visual Challenges for Verifying Human Interaction
03/21/2013US20130074148 Method and system for compiling a unique sample code for specific web content
03/21/2013US20130074146 Data security for a database in a multi-nodal environment
03/21/2013US20130074145 Secure key self-generation
03/21/2013US20130074144 Application identification
03/21/2013US20130074143 System and method for real-time customized threat protection
03/21/2013US20130073949 System and method to aid assistive software in dynamically interpreting internet websites and the like
03/21/2013US20130073873 Signature generation apparatus, signature method, non-transitory computer readable medium storing signature generation program
03/21/2013US20130073872 Information processing apparatus, information processing method and program
03/21/2013US20130073869 Information processing apparatus, software updating method, and image processing apparatus
03/21/2013US20130073867 Method for strengthening the implementation of ecdsa against power analysis
03/21/2013US20130073863 Personal identification number security enhancement
03/21/2013US20130073862 Secure data exchange between data processing systems
03/21/2013US20130073861 Secure data exchange between data processing systems
03/21/2013US20130073858 Method and a system for a secure execution of workflow tasks of a workflow in a decentralized workflow system
03/21/2013US20130073849 Anti-keylogger computer network system
03/21/2013US20130073843 Network Security Content Checking
03/21/2013US20130073840 Apparatus and method for generating and managing an encryption key
03/21/2013US20130073693 Secure data exchange between data processing systems
03/21/2013US20130073598 Entropy source with magneto-resistive element for random number generator
03/21/2013US20130073591 System and method for self-service configuration of authorization
03/21/2013US20130073463 Issuer trusted party system
03/21/2013US20130073441 Methods and systems for transaction record delivery using thresholds and multi-stage protocol
03/21/2013US20130073110 Diagnostic and managing distributed processor system
03/21/2013US20130070301 Unit using operating system and image forming apparatus using the same
03/21/2013DE202012012333U1 Verwaltung einer Anwendungsausführung und eines Datenzugriffs auf einer Vorrichtung Management of an application execution and data access on a device
03/21/2013DE102012215729A1 System und Verfahren zum Authentisieren mehrerer Dateien unter Verwendung einer getrennten digitalen Signatur System and method for authenticating a plurality of files by using a separate digital signature
03/21/2013DE102012018519A1 Method for authorizing access to data/services of specific homepage for parked motor vehicle for querying about e.g. low charging state of battery, involves providing authorization to part of data/services of page based on authentication
03/21/2013CA2848655A1 Providing a network-accessible malware analysis
03/21/2013CA2847855A1 Secure key self-generation
03/21/2013CA2814007A1 Secure application directory
03/21/2013CA2813167A1 Enabling users to select between secure service providers using a central trusted service manager
03/20/2013EP2571227A1 System for controlling access to user resources and method thereof
03/20/2013EP2571025A2 Information processing apparatus, information processing method and program
03/20/2013EP2570961A1 Selectively wiping a remote device
03/20/2013EP2570960A2 Method of controlling information processing system, program for controlling apparatus
03/20/2013EP2570959A2 A method of estimating the potential damage of data leakage incident by assigning misuseability weight
03/20/2013EP2570958A1 Authentication device and authentication method
03/20/2013EP2570957A1 System, device and method for authentication
03/20/2013EP2570956A1 External boot device, external boot program, external boot method and network communication system
03/20/2013EP2570955A1 Restoration of file damage caused by malware
03/20/2013EP2570954A1 Method, device and system for preventing distributed denial of service attack in cloud system
03/20/2013EP2570953A1 Provisioning user permissions using attribute-based access-control policies
03/20/2013EP2570943A1 Protection of data privacy in an enterprise system
03/20/2013EP2569729A1 System allowing the display of a private computer file on a screen of a telecommunications terminal and corresponding method
03/20/2013EP2569728A2 Hardware encrypting storage device with physically separable key storage device
03/20/2013EP2569727A2 Overlay human interactive proof system and techniques
03/20/2013EP2569726A1 Method for checking whether program instructions have been executed by a portable terminal
03/20/2013EP2569725A1 Methods, devices and computer program supports for password generation and verification