Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
10/2012
10/25/2012US20120272339 Method and system for accessing password-protected data on a device
10/25/2012US20120272338 Unified tracking data management
10/25/2012US20120272337 Content object encapsulating content items for accessing content and access authorization information
10/25/2012US20120272336 Transcoding Content Based On Verification of Ownership of the Content
10/25/2012US20120272335 Identity verification systems and methods
10/25/2012US20120272334 Method and apparatus for processing rights object
10/25/2012US20120272333 Methods, data processing systems, and computer program products for assigning privacy levels to data elements
10/25/2012US20120272332 Systems and methods for dynamically generating a privacy summary
10/25/2012US20120272331 Method and system for abuse route aggregation and distribution
10/25/2012US20120272330 Anti-Phishing System and Method
10/25/2012US20120272329 Obfuscating sensitive data while preserving data usability
10/25/2012US20120272328 Method, system and apparatus for secure data editing
10/25/2012US20120272327 Watermarking method and apparatus for tracking hacked content and method and apparatus for blocking hacking of content using the same
10/25/2012US20120272326 Tokenization system
10/25/2012US20120272325 Digital content management system and methods
10/25/2012US20120272324 Electronic device and copyright protection method of audio file thereof
10/25/2012US20120272323 Origination verification using execution transparent marker context
10/25/2012US20120272322 Determining the vulnerability of computer software applications to privilege-escalation attacks
10/25/2012US20120272321 Antivirus computing system
10/25/2012US20120272320 Method and system for providing mobile device scanning
10/25/2012US20120272319 Apparatus, and system for determining and cautioning users of Internet connected clients of potentially malicious software and method for operating such
10/25/2012US20120272318 System and method for dynamic generation of anti-virus databases
10/25/2012US20120272317 System and method for detecting infectious web content
10/25/2012US20120272316 Method for detecting the hijacking of computer resources
10/25/2012US20120272315 Quarantining packets received at device in network communications utilizing virtual network connection
10/25/2012US20120272314 Data collection system
10/25/2012US20120272313 Controlled access to functionality of a wireless device
10/25/2012US20120272312 Upper-order computer, lower-order computer, monitoring system and monitoring method
10/25/2012US20120272311 Method for authenticating a user on a computing unit
10/25/2012US20120272308 Management system, management method and management program for managing industrial control system
10/25/2012US20120272307 Multi-Factor Authentication Using A Smartcard
10/25/2012US20120272306 Authentication ticket validation
10/25/2012US20120272305 Creating tests to identify fraudulent users
10/25/2012US20120272304 Crawling secure data sources
10/25/2012US20120272303 Method and device for enhancing security of user security model
10/25/2012US20120272301 Controlled user account access with automatically revocable temporary password
10/25/2012US20120272300 Method and system for configuring local and remote resources to accomplish rendering of multimedia content on dissimilar format devices based on user biometric data
10/25/2012US20120272299 Information processing system, image processing apparatus, information processing apparatus, control method therefor and computer-readable storage medium
10/25/2012US20120272298 Method to provide chip based security for i/o packets in an array using dynamic topology
10/25/2012US20120272297 Cross-transport authentication
10/25/2012US20120272296 Method and system for protecting against the execution of unauthorized software
10/25/2012US20120272295 Method and system for enabling and controlling communication topology, access to resources, and document flow in a distributed networking environment
10/25/2012US20120272294 Access permissions management system and method
10/25/2012US20120272292 Method and apparatus for protecting against attacks from outside content
10/25/2012US20120272291 Methods, Communication Networks, and Computer Program Products for Monitoring, Examining, and/or Blocking Traffic Associated with a Network Element Based on Whether the Network Element can be Trusted
10/25/2012US20120272290 System and Method for Reducing Security Risk in Computer Network
10/25/2012US20120272289 Devices, systems, and methods for providing increased security when multiplexing one or more services at a customer premises
10/25/2012US20120272288 Methods and apparatuses for determining strength of a rhythm-based password
10/25/2012US20120272229 Communications techniques for an intelligent digital audiovisual reproduction system
10/25/2012US20120272072 Apparatus and method for processing application package in portable terminal
10/25/2012US20120272071 Gaming Security System
10/25/2012US20120272070 Information processing apparatus, information processing system and information processing method, and program
10/25/2012US20120272067 Authentication method
10/25/2012US20120272061 Method and Device for Accessing Files of a Secure File Server
10/25/2012US20120272057 Method and Apparatus for Secured Embedded Device Communication
10/25/2012US20120272052 Method for generating a cryptographic key for a protected digital data object on the basis of current components of a computer
10/25/2012US20120271934 Storage system and data management method in storage system
10/25/2012US20120271851 Media validation system
10/25/2012US20120271772 Internet System for Facilitating Human User Advisement and Licensing of Copyrighted Works of Authorship
10/25/2012US20120271769 Encrypted banner overlays
10/25/2012US20120271688 Method of switching media content for a mobile apparatus
10/25/2012US20120271656 Genetic profiling and banking system and method
10/25/2012US20120269348 System for protecting an encrypted information unit
10/25/2012US20120269342 Block encryption device and method and computer program
10/25/2012US20120269341 Method For Operating A Tachograph And Tachograph
10/25/2012US20120268650 System and method for a thin-client terminal system using a serial bus
10/25/2012US20120268240 Operating device for operating a machine in the field of automation engineering
10/25/2012DE102008000067C5 Verfahren zum Lesen von Attributen aus einem ID-Token A method of reading out an ID-token attributes
10/24/2012EP2515500A1 Method and mobile station for sequential biometric authentication
10/24/2012EP2515499A1 Method for generating a cryptographic key for a secure digital data object on the basis of the current components of a computer
10/24/2012EP2515496A1 System and method for generating trust among data network users
10/24/2012EP2515302A1 Information processing device, information processing system, information processing method, and program
10/24/2012EP2515253A1 Antivirus computing system
10/24/2012EP2515252A2 System and method for reducing security risk in computer network
10/24/2012EP2515251A1 Dual environment computing system and method and system for providing a dual environment computing system
10/24/2012EP2515250A1 System and method for detection of complex malware
10/24/2012EP2515239A1 Information processing apparatus
10/24/2012EP2515231A1 Broadcast receiving apparatus and method of installing service
10/24/2012EP2515202A1 File processing system and management device
10/24/2012EP2514056A1 Method for testing electric components in a mains supply, in particular in a mains supply for a building
10/24/2012EP2513901A1 Content control method using certificate revocation lists
10/24/2012EP2513837A2 Providing integrity verification and attestation in a hidden execution environment
10/24/2012EP2513836A2 Obfuscated malware detection
10/24/2012EP2513835A2 Secured file-based application programming interface
10/24/2012EP2513834A1 System and method for verifying the identity of an individual by employing biometric data features associated with the individual as well as a computer program product for performing said method
10/24/2012EP2513833A2 Verifiable trust for data through wrapper composition
10/24/2012EP2513832A1 Digital rights management using attribute-based encryption
10/24/2012EP2513810A2 Methods and systems for communicating between trusted and non-trusted virtual machines
10/24/2012EP2513809A2 Systems and methods for service isolation
10/24/2012EP2513804A2 Trustworthy extensible markup language for trustworthy computing and data services
10/24/2012CN202502506U Computer startup detection control system
10/24/2012CN202502505U Intelligent time-keeping and timing-service device for computer
10/24/2012CN202502504U Fingerprint protector for computer
10/24/2012CN202502503U Cloud-computing-based fingerprint password management system
10/24/2012CN202502502U Development board protection box
10/24/2012CN202502461U Password keyboard
10/24/2012CN102754104A Systems and methods for sharing the results of computing operations among related computing systems
10/24/2012CN102754098A Method and apparatus for secure cross-site scripting
10/24/2012CN102752742A Apparatus and methods for managing firmware verification on a wireless device
10/24/2012CN102752321A Firewall realization method based on multicore network processor