Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
11/2012
11/01/2012US20120278904 Content distribution regulation by viewing user
11/01/2012US20120278903 Dynamic management of groups for entitlement and provisioning of computer resources
11/01/2012US20120278902 Incremental deployment of computer software program logic
11/01/2012US20120278901 Management of access rights
11/01/2012US20120278900 Systems and methods for regulatory compliance with qualified systems
11/01/2012US20120278899 Apparatus, systems and methods for parental control synchronization with mobile media devices
11/01/2012US20120278898 System and Method for Controlling Multicast Geographic Distribution
11/01/2012US20120278897 System and method of sort-order preserving tokenization
11/01/2012US20120278896 Systems and methods for updating content detection devices and systems
11/01/2012US20120278895 Methods and apparatus for dealing with malware
11/01/2012US20120278894 Resisting the spread of unwanted code and data
11/01/2012US20120278893 Ring oscillator based design-for-trust
11/01/2012US20120278891 Methods and apparatus for dealing with malware
11/01/2012US20120278890 Intrusion detection in communication networks
11/01/2012US20120278889 Detecting malicious behaviour on a network
11/01/2012US20120278888 Gateway and method for avoiding attacks
11/01/2012US20120278886 Detection and filtering of malware based on traffic observations made in a distributed mobile traffic management system
11/01/2012US20120278884 Method and system for processing a file to identify unexpected file types
11/01/2012US20120278883 Method and System for Protecting a Computing System
11/01/2012US20120278882 Accessory device authentication
11/01/2012US20120278881 Domain aware time-based logins
11/01/2012US20120278880 Secure Time/Date Virtualization
11/01/2012US20120278879 Authenticating human interface device
11/01/2012US20120278878 Systems and methods for establishing secure virtual private network communications using non-privileged vpn client
11/01/2012US20120278877 Takeover Processes In Security Network Integrated With Premise Security System
11/01/2012US20120278874 Method and system for accessing network through public equipment
11/01/2012US20120278873 Techniques for resource operation based on usage, sharing, and recommendations with modular authentication
11/01/2012US20120278872 System and method of federated authentication with reverse proxy
11/01/2012US20120278871 User identification method applicable to network transaction and system thereof
11/01/2012US20120278870 Multiple independent authentications for enhanced security
11/01/2012US20120278869 Registration and credential roll-out for accessing a subscription-based service
11/01/2012US20120278868 Fraud detection system audit capability
11/01/2012US20120278867 System for online compromise tool
11/01/2012US20120278866 Methods and apparatuses for securely operating shared host computers with portable apparatuses
11/01/2012US20120278865 Method, system and apparatus for identification
11/01/2012US20120278864 Monitoring Method and Device
11/01/2012US20120278863 Ad-hoc user account creation
11/01/2012US20120278862 Methods and systems for auto-marking, watermarking, auditing, reporting, tracing and policy enforcement via e-mail and networking systems
11/01/2012US20120278860 Personal lifestyle device
11/01/2012US20120278859 Digital social network trust propagation
11/01/2012US20120278858 System and method of providing information access on a portable device
11/01/2012US20120278857 Method for unlocking a secure device
11/01/2012US20120278856 Method, device, and system for service presentation
11/01/2012US20120278855 Communication apparatus, authentication apparatus, communication method and authentication method
11/01/2012US20120278854 System and method for device addressing
11/01/2012US20120278853 Enforcing alignment of approved changes and deployed changes in the software change life-cycle
11/01/2012US20120278852 Executable content filtering
11/01/2012US20120278851 Automated policy builder
11/01/2012US20120278636 Remote wake mechanism for a network system and remote wake method thereof
11/01/2012US20120278634 Method and apparatus for secure access to execution context
11/01/2012US20120278632 Method and apparatus for securing programming data of a programmable device
11/01/2012US20120278630 Debugging port security interface
11/01/2012US20120278629 System and method for secure authentication of a "smart" battery by a host
11/01/2012US20120278627 Security based on subliminal and supraliminal channels for data objects
11/01/2012US20120278622 Method and system for electronic content storage and retrieval with galois fields on cloud computing networks
11/01/2012US20120278617 Method and System for Establishing a Trusted and Decentralized Peer-To-Peer Network
11/01/2012US20120278612 Authenticating Digitally Encoded Products without Private Key Sharing
11/01/2012US20120278608 Information processing apparatus, secure module, information processing method and computer product
11/01/2012US20120278606 Methods and apparatuses for securely operating shared host devices with portable apparatuses
11/01/2012US20120278597 Compatible trust in a computing device
11/01/2012US20120276871 Method and Apparatus for Improving Computing Device Security
11/01/2012US20120275595 Cryptographically secure authentication device, system and method
11/01/2012US20120275594 Method and Apparatus for Performing Elliptic Curve Scalar Multiplication in a Manner that Counters Power Analysis Attacks
11/01/2012US20120275593 Apparatus for performing a fault detection operation and method thereof
11/01/2012US20120275592 Decoupling rights in a digital content unit from download
11/01/2012US20120275572 Security apparatus and method
11/01/2012US20120274987 Electronically message capture through interaction with printed document
11/01/2012CA2834509A1 Secure data storage
10/2012
10/31/2012EP2518969A1 Method for operating an automation device
10/31/2012EP2518659A1 User authentication method, user authentication system, and portable communications terminal
10/31/2012EP2518658A2 Information processing apparatus, secure module, information processing method, and program
10/31/2012EP2518657A1 Method and system for communicating data to a contact-less communicating device
10/31/2012EP2518637A1 System and method for cross-domain social networking
10/31/2012EP2518603A2 Multi-touch and multi-user detecting device
10/31/2012EP2518587A1 Management of secure element deadlock
10/31/2012EP2517452A1 Method for updating a security processor, and corresponding system, computer program and security processor
10/31/2012EP2517431A1 Usage control of digital data exchanged between terminals of a telecommunications network
10/31/2012EP2517403A2 Methods and systems for cross site forgery protection
10/31/2012EP2517399A1 Systems and methods for accessing and controlling media stored remotely
10/31/2012EP2517145A2 Fully electronic notebook (eln) system and method
10/31/2012EP2517144A2 Protected device management
10/31/2012EP2517143A1 Authenticating human interface device
10/31/2012EP2517142A1 User authentication
10/31/2012EP2517141A1 Multiple application chip card having biometric validation
10/31/2012EP2517140A1 Securing execution of computational resources
10/31/2012EP2517139A1 Method for detecting the hijacking of computer resources
10/31/2012EP2517138A1 Malware identification and scanning
10/31/2012EP2517137A1 Method for securing the communication between a home automation server and a central configuration server
10/31/2012EP2517127A1 Method and apparatus for secure cross-site scripting
10/31/2012EP2517112A2 Mechanism for detecting a no-processor swap condition and modification of high speed bus calibration during boot
10/31/2012EP2517102A2 Removing an active application from a remote device
10/31/2012DE112010004651T5 1Dynamische Zugangskontrolle für Dokumente in elektronischen Datenübertragungsvorgängen in einer Cloud-Computing-Umgebung 1Dynamische access control for documents in electronic data transfer operations in a cloud computing environment
10/31/2012DE112009005466T5 Verfahren und Vorrichtung zum Bereitstellen einer sicheren Anwendungsausführung Method and apparatus for providing a secure application execution
10/31/2012DE112009002738T5 System und Verfahren zur Laufzeitangriffsprävention System and method for run-time attack prevention
10/31/2012DE102012006225A1 Verfahren und Vorrichtung zum Sichern einer programmierbaren Logikvorrichtung unter Verwendung eines Notausschalters Method and apparatus for securing a programmable logic device using an emergency stop switch
10/31/2012CN202512577U Electronic information protection device
10/31/2012CN202512576U Computer security device capable of achieving physical isolation of network
10/31/2012CN102763397A Method and apparatus for providing authentication session sharing
10/31/2012CN102763395A Method and apparatus for providing an authentication context-based session
10/31/2012CN102763116A Fully electronic notebook (eln) system and method