Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
03/2013
03/19/2013US8402283 Secure content enabled drive system and method
03/19/2013US8402281 Data security system for a database
03/19/2013US8402277 Secure mailbox printing system with authentication on both host and device
03/19/2013US8402276 Creating and verifying electronic documents
03/19/2013US8402269 System and method for controlling exit of saved data from security zone
03/19/2013US8402267 Security enhanced network device and method for secure operation of same
03/19/2013US8402240 Systems and methods for locking and exporting the locking of a removable memory device
03/19/2013US8402079 Security and report generation system for networked multimedia workstations
03/19/2013US8401971 Document processing apparatus and document processing method
03/19/2013US8401909 Content distribution system and content distribution method
03/19/2013US8401368 Video data reproducing apparatus, video data generating apparatus and recording medium
03/19/2013US8401195 Method of automatically populating a list of managed secure communications group members
03/19/2013US8401187 Processing recordable content in a stream
03/19/2013US8401184 Device to generate a machine specific identification key
03/19/2013US8401182 Method of and device for updating group key
03/19/2013US8400645 Printer with selectable capabilities
03/19/2013CA2561335C Method and system for linking certificates to signed files
03/15/2013DE202012011442U1 Adapter für elektronische Vorrichtungen Adapter for electronic devices
03/14/2013WO2013036784A1 Computer system security dashboard
03/14/2013WO2013036673A1 Malware risk scanner
03/14/2013WO2013036664A1 Dynamic cleaning for malware using cloud technology
03/14/2013WO2013036470A1 Content handling for applications
03/14/2013WO2013036269A1 Systems and methods for evaluation of events based on a reference baseline according to temporal position in a sequence of events
03/14/2013WO2013036253A1 Per process networking capabilities
03/14/2013WO2013036097A1 A system and method to establish trusted boot loader using self-substantiated boot loader
03/14/2013WO2013035409A1 Cloud computing system
03/14/2013WO2013035267A1 Recording medium device, terminal device, delivery device, control method, program, and recording medium for program
03/14/2013WO2013035006A1 Preventing data extraction by side-channel attack
03/14/2013WO2013033807A1 Method and system for enhancing content security
03/14/2013WO2013002538A3 Method and apparatus for preventing distributed denial of service attack
03/14/2013WO2012170565A3 Code generation and implementation method, system, and storage medium for delivering bidirectional data aggregation and updates
03/14/2013WO2012154367A3 Secure user credential control
03/14/2013WO2012116355A3 Named object view over multiple files
03/14/2013US20130067602 Copyrights with Post-Payments for P2P File Sharing
03/14/2013US20130067601 Generating developer license to execute developer application
03/14/2013US20130067600 Selective file access for applications
03/14/2013US20130067598 Techniques for presenting and collecting end user license agreement acceptance
03/14/2013US20130067597 System for controlling access to user resources and method thereof
03/14/2013US20130067596 Detection filter
03/14/2013US20130067595 Data Isolation Service for Data and Information Sharing
03/14/2013US20130067594 Shared Item Account Selection
03/14/2013US20130067593 Systems and methods to distribute content over a network
03/14/2013US20130067592 System and method for role based analysis and access control
03/14/2013US20130067589 Dynamic community generator
03/14/2013US20130067588 Method for Enhancing Privacy of Internet Browser Users
03/14/2013US20130067587 Protecting archive structure with directory verifiers
03/14/2013US20130067585 Separate script context to isolate malicious script
03/14/2013US20130067584 Content-Checking of Embedded Content in Digitally Encoded Documents
03/14/2013US20130067583 Analyzing access control configurations
03/14/2013US20130067582 Systems, methods and devices for providing device authentication, mitigation and risk analysis in the internet and cloud
03/14/2013US20130067581 Information security control self assessment
03/14/2013US20130067580 Computer Virus Screening Methods and Systems
03/14/2013US20130067579 System and Method for Statistical Analysis of Comparative Entropy
03/14/2013US20130067577 Malware scanning
03/14/2013US20130067576 Restoration of file damage caused by malware
03/14/2013US20130067575 Detection of network security breaches based on analysis of network record logs
03/14/2013US20130067574 Fight-through nodes for survivable computer network
03/14/2013US20130067573 System and method for human identification proof for use in virtual environments
03/14/2013US20130067572 Security event monitoring device, method, and program
03/14/2013US20130067571 Method and system for managing suspicious devices on network
03/14/2013US20130067570 Content Inspection
03/14/2013US20130067569 Methods and structure for managing visibility of devices in a clustered storage system
03/14/2013US20130067568 Resource Access Authorization
03/14/2013US20130067567 Chip integrated protection means
03/14/2013US20130067566 Device to perform authentication according to surrounding information and method for performing authentication
03/14/2013US20130067565 Image forming apparatus, access control method, access control program and computer readable information recording medium
03/14/2013US20130067564 Access management system
03/14/2013US20130067563 Apparatus and method for managing permission information of application
03/14/2013US20130067562 System, method and program to limit rate of transferring messages from suspected spammers
03/14/2013US20130067561 Intelligent integrated network security device
03/14/2013US20130067560 Multi-method gateway-based network security systems and methods
03/14/2013US20130067558 Assured pipeline threat detection
03/14/2013US20130067557 Authentication sharing in a firewall cluster
03/14/2013US20130067556 Application state sharing in a firewall cluster
03/14/2013US20130067555 Method and Apparatus for Trust-Based, Fine-Grained Rate Limiting of Network Requests
03/14/2013US20130067554 Methods, devices and computer program supports for password generation and verification
03/14/2013US20130067553 Control apparatus and method for executing application
03/14/2013US20130067551 Multilevel Authentication
03/14/2013US20130067550 Private cloud server and client architecture without utilizing a routing server
03/14/2013US20130067547 Transaction authentication management including authentication confidence testing
03/14/2013US20130067546 Transaction authentication management system with multiple authentication levels
03/14/2013US20130067543 Printer server, printer control method, and storage medium
03/14/2013US20130067542 Connection authorization with a privileged access
03/14/2013US20130067541 Image processing device, access control method and computer readable recording medium
03/14/2013US20130067540 Techniques for achieving storage and network isolation in a cloud storage environment
03/14/2013US20130067538 Context Aware Recertification
03/14/2013US20130067537 Apparatus, methods, and computer program products for providing portable communication identity services
03/14/2013US20130067536 Information processing apparatus and information processing program
03/14/2013US20130067535 Apparatus and method for controlling a network connection
03/14/2013US20130067534 Computer motherboard having peripheral security functions
03/14/2013US20130067533 Generating a test license for a developer application
03/14/2013US20130067532 Generating security permissions
03/14/2013US20130067531 Access Brokering Based on Declarations and Consent
03/14/2013US20130067530 DNS-Based Content Routing
03/14/2013US20130067508 Controlling access of a user to media content
03/14/2013US20130067356 Information processing system, service providing apparatus and method, information processing apparatus and method, recording medium, and program
03/14/2013US20130067241 Contents data utilization system and method, and mobile communication terminal used for the same
03/14/2013US20130067238 Security mechanism for developmental operating systems
03/14/2013US20130067236 Systems for validating hardware devices
03/14/2013US20130067230 Method for generating rights object and device to perform the method, method for transmitting rights object and device to perform the method, and method for receiving rights object and device to perform the method