Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
03/2013
03/05/2013US8392706 Method and system for searching for, and collecting, electronically-stored information
03/05/2013US8392705 Information source agent systems and methods for distributed data storage and management using content signatures
03/05/2013US8392593 Multiple control channels for multicast replication in a network
03/05/2013US8392506 Networked gaming system including a location monitor and dispatcher using personal data keys
03/05/2013US8392420 Managing access to digital identity information
03/05/2013US8392333 Method for providing protected audio/video content
03/05/2013US8391497 Method for importing rights object and rights issuer
03/05/2013US8391487 Secure remote configuration of device capabilities
03/05/2013US8391480 Digital authentication over acoustic channel
03/05/2013CA2546700C Method and system for the authentication of a user of a data processing system
02/2013
02/28/2013WO2013028997A2 System to identify multiple copyright infringements
02/28/2013WO2013028353A1 Digital signing authority dependent platform secret
02/28/2013WO2013028185A1 Forensic authentication system and method
02/28/2013WO2013027782A1 Anonymization device, anonymization method, and recording medium in which program therefor is recorded
02/28/2013WO2013027780A1 Anonymization device, anonymization method, and recording medium in which program therefor is recorded
02/28/2013WO2013026774A1 Security data system and method therefor
02/28/2013WO2013026662A1 Method for hard partitioning the resources of a secure computer system
02/28/2013WO2013026320A1 Method and system for detecting webpage trojan embedded
02/28/2013WO2013026304A1 Method and server for discriminating malicious attribute of program
02/28/2013WO2013026086A1 Virtual zeroisation system and method
02/28/2013WO2013026081A1 System and method of media streaming with enhanced security
02/28/2013WO2012167066A3 Method and system for providing information from third party applications to devices
02/28/2013WO2012167056A3 System and method for non-signature based detection of malicious processes
02/28/2013WO2012154540A3 Authorship technologies
02/28/2013WO2012138969A3 Sudoku arrays
02/28/2013WO2012135192A3 System and method for virtual machine monitor based anti-malware security
02/28/2013WO2009125151A9 Defence communication mode for an apparatus able to communicate by means of various communication services
02/28/2013US20130055416 Systems and Methods for Detecting and Thwarting Unauthorized Access and Hostile Attacks on Secured Systems
02/28/2013US20130055415 Software piracy prevention through remote enforcement of an activation threshold
02/28/2013US20130055414 Download terminal, and content utilization system
02/28/2013US20130055413 System and Method of Managing Protected Video Content
02/28/2013US20130055412 Data security authentication system and related multi-function memory card and computer program product
02/28/2013US20130055411 Apparatus and method for controlling permissions in mobile terminal
02/28/2013US20130055410 Method of accessing digital media content
02/28/2013US20130055409 Dynamic redemption codes
02/28/2013US20130055408 Techniques for defining, using and manipulating rights management data structures
02/28/2013US20130055407 Electronic device and method of transmitting content item
02/28/2013US20130055405 Method and system for mobile information security protection
02/28/2013US20130055404 System And Method For Providing Impact Modeling And Prediction Of Attacks On Cyber Targets
02/28/2013US20130055403 System for detecting vulnerabilities in web applications using client-side application interfaces
02/28/2013US20130055402 Detecting stored cross-site scripting vulnerabilities in web applications
02/28/2013US20130055401 Terminal and method for providing risk of application using the same
02/28/2013US20130055398 Systems and methods for performing vulnerability scans on virtual machines
02/28/2013US20130055397 Detecting stored cross-site scripting vulnerabilities in web applications
02/28/2013US20130055396 Securing anti-virus software with virtualization
02/28/2013US20130055395 Enhanced browsing with security scanning
02/28/2013US20130055394 Network security risk assessment
02/28/2013US20130055393 Method and apparatus for enhancing privacy of contact information in profile
02/28/2013US20130055392 File System Event Tracking
02/28/2013US20130055391 Method and apparatus for adaptive integrity measurement of computer software
02/28/2013US20130055390 Search infrastructure supporting trademark rights
02/28/2013US20130055389 Security event logging in process control
02/28/2013US20130055388 Method and system for tracking machines on a network using fuzzy guid technology
02/28/2013US20130055387 Apparatus and method for providing security information on background process
02/28/2013US20130055386 Apparatus and method for preventing falsification of client screen
02/28/2013US20130055385 Security event management apparatus, systems, and methods
02/28/2013US20130055384 Dealing with web attacks using cryptographically signed http cookies
02/28/2013US20130055383 Coordinated detection of a grey-hole attack in a communication network
02/28/2013US20130055382 Managing Access to Storage Media
02/28/2013US20130055381 Creation of rhythmic password and authentication based on rhythmic password
02/28/2013US20130055380 Method for Generating and Detecting Auditable Passwords
02/28/2013US20130055378 Method and portable device for controlling permission settings for application
02/28/2013US20130055377 Providing selective system privileges on an information handling device
02/28/2013US20130055376 Image processing apparatus, method of controlling the same, and storage medium
02/28/2013US20130055375 Method and Protection System for Mitigating Slow HTTP Attacks Using Rate and Time Monitoring
02/28/2013US20130055373 Protocol rate filtering at edge device
02/28/2013US20130055372 Dynamically providing algorithm-based password/challenge authentication
02/28/2013US20130055371 Storage control method and information processing apparatus
02/28/2013US20130055370 Security for future log-on location
02/28/2013US20130055369 System and method for day-zero authentication of activex controls
02/28/2013US20130055368 Multi-Factor Authentication
02/28/2013US20130055367 Multi-Factor Profile and Security Fingerprint Analysis
02/28/2013US20130055366 Dynamically providing algorithm-based password/challenge authentication
02/28/2013US20130055365 Credential Provider That Encapsulates Other Credential Providers
02/28/2013US20130055360 Contents service method, and member information providing service system and method using communication network
02/28/2013US20130055359 Secret information leakage prevention system, secret information leakage prevention method and secret information leakage prevention program
02/28/2013US20130055358 Systems and methods for providing content and services on a network system
02/28/2013US20130055357 Personal control of personal information
02/28/2013US20130055356 Method and system for authorizing an action at a site
02/28/2013US20130055355 Methods, systems, and computer-readable media for exception handling of interactive communications privileges governing interactive communications with entities outside a domain
02/28/2013US20130055350 Creating Incentives By Controlling Device Functions
02/28/2013US20130055349 Method and apparatus for releasing tcp connections in defense against distributed denial of service attacks
02/28/2013US20130055348 Progressive authentication
02/28/2013US20130055347 Hardware interface access control for mobile applications
02/28/2013US20130055345 Mobile Application Access Control
02/28/2013US20130055344 System and method for evaluating a reverse query
02/28/2013US20130055342 Risk-based model for security policy management
02/28/2013US20130055341 Restriction of program process capabilities
02/28/2013US20130055340 Information processing apparatus, information processing method, and computer program product
02/28/2013US20130055339 Security event management apparatus, systems, and methods
02/28/2013US20130055338 Detecting Addition of a File to a Computer System and Initiating Remote Analysis of the File for Malware
02/28/2013US20130055337 Risk-based model for security policy management
02/28/2013US20130055336 Security policy enforcement for mobile devices connecting to a virtual private network gateway
02/28/2013US20130055302 Trusted content access management using multiple social graphs across heterogeneous networks
02/28/2013US20130054975 Electronic password lock system and method for its use
02/28/2013US20130054970 Apparatuses and Methods for Enabling a User to Consume Protected Contents of a Content Provider
02/28/2013US20130054965 Usage Control of Digital Data Exchanged Between Terminals of a Telecommunications Network
02/28/2013US20130054960 Systems and methods for application identification
02/28/2013US20130054467 System for remote review of clinical data
02/28/2013US20130054433 Multi-Factor Identity Fingerprinting with User Behavior