Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
10/2012
10/18/2012WO2012139923A1 Method for testing tamper protection of a field device and field device having tamper protection
10/18/2012WO2012139903A2 A method and a system to generate and manage native applications
10/18/2012WO2012139629A1 Method and apparatus for sharing user data
10/18/2012WO2012139482A1 Network encyclopedia user management system and method of accessing applications thereof
10/18/2012WO2012094332A3 Smart grid device authenticity verification
10/18/2012WO2012057632A8 Secure computer system
10/18/2012US20120266259 Approaches for firmware to trust an application
10/18/2012US20120266258 Methods for providing cross-vendor support services
10/18/2012US20120266257 System and method for blocking objectionable communications in a social network
10/18/2012US20120266256 Determining whether object is genuine or fake in metaverse
10/18/2012US20120266255 Dynamic De-Identification of Data
10/18/2012US20120266254 De-Identification of Data
10/18/2012US20120266253 Grouping cooperation system, grouping cooperation method, and grouping processing flow management program
10/18/2012US20120266252 Hardware-based root of trust for cloud environments
10/18/2012US20120266251 Systems and methods for disease management
10/18/2012US20120266250 Selective Masking Of Identity-Indicating Information In Messages For An Online Community
10/18/2012US20120266249 Automatic Selection of Routines for Protection
10/18/2012US20120266248 Pinpointing security vulnerabilities in computer software applications
10/18/2012US20120266247 Automatic Inference Of Whitelist-Based Validation As Part Of Static Analysis For Security
10/18/2012US20120266246 Pinpointing security vulnerabilities in computer software applications
10/18/2012US20120266245 Multi-Nodal Malware Analysis
10/18/2012US20120266244 Detecting Script-Based Malware using Emulation and Heuristics
10/18/2012US20120266243 Emulation for malware detection
10/18/2012US20120266242 Apparatus and method for defending distributed denial of service attack from mobile terminal
10/18/2012US20120266241 Communications system having security apparatus, security apparatus and method herefor
10/18/2012US20120266240 Method and apparatus for filtering malicious call completion indicator and calling-side network device
10/18/2012US20120266239 Authorized data access based on the rights of a user and a location
10/18/2012US20120266238 Computer Including at Least One Connector for a Replaceable Storage Medium, and Method for Starting and Operating a Computer Via a Replaceable Storage Medium
10/18/2012US20120266236 Password input method using visual object
10/18/2012US20120266235 Method for reconfiguring a peripheral device using a magnetic swipe card
10/18/2012US20120266234 Network Traffic Routing
10/18/2012US20120266233 Signal Transfer Point Front End Processor
10/18/2012US20120266232 Method and system for protecting a computer system during boot operation
10/18/2012US20120266231 Secure Network Cloud Architecture
10/18/2012US20120266229 Inter-application management of user credential data
10/18/2012US20120266228 Secure management of user rights during accessing of external systems
10/18/2012US20120266227 Verification and authentication systems and methods
10/18/2012US20120266226 Secure authentication systems and methods
10/18/2012US20120266225 Network system of projector
10/18/2012US20120266224 Method and system for user authentication
10/18/2012US20120266223 Method and apparatus for providing machine-to-machine service
10/18/2012US20120266222 Provisioning using a generic configuration
10/18/2012US20120266221 Method for secure communication between devices
10/18/2012US20120266220 System and Method for Controlling Access to a Third-Party Application with Passwords Stored in a Secure Element
10/18/2012US20120266219 Method and system for dynamic identity validation
10/18/2012US20120266218 Differential Encryption Utilizing Trust Modes
10/18/2012US20120266216 Registration of Applications and Complimentary Features for Interactive User Interfaces
10/18/2012US20120266215 Captcha Image Scramble
10/18/2012US20120266214 Creating secure interactive connections with remote resources
10/18/2012US20120266213 Trusted hardware for attesting to authenticity in a cloud environment
10/18/2012US20120266212 Apparatus and method for authenticating smart card
10/18/2012US20120266211 Transparent database connection reconnect
10/18/2012US20120266210 Method and apparatus for creating an information security policy based on a pre-configured template
10/18/2012US20120266209 Method of Secure Electric Power Grid Operations Using Common Cyber Security Services
10/18/2012US20120266208 Methods and apparatus for malware threat research
10/18/2012US20120266000 Trusted storage systems and methods
10/18/2012US20120265999 Processing data stored in external storage device
10/18/2012US20120265998 Methods And Apparatus For Authenticating Components Of Processing Systems
10/18/2012US20120265997 Privacy-preserving flexible anonymous-pseudonymous access
10/18/2012US20120265996 Permitting Access To A Network
10/18/2012US20120265990 Authentication system, method and device
10/18/2012US20120265985 Application executing device, managing method, and program
10/18/2012US20120265980 Apparatus and method for securing user input data
10/18/2012US20120265976 Secure Network Cloud Architecture
10/18/2012US20120265975 Microcontroller with Embedded Secure Feature
10/18/2012US20120265952 Data communicating apparatus and method for managing memory of data communicating apparatus
10/18/2012US20120265671 Systems and Methods for Validating an Order Purchased With an Unspecified Term
10/18/2012US20120264402 Method of and system for utilizing a first network authentication result for a second network
10/18/2012DE112010003539T5 System und verfahren zuim verifizieren des alters eines internetbenutzers System and method zuim verify the age of an Internet user
10/18/2012DE102011007572A1 Verfahren zur Überwachung eines Tamperschutzes sowie Überwachungssystem für ein Feldgerät mit Tamperschutz Method for monitoring a Tamperschutzes and monitoring system for a field device with Tamperschutz
10/18/2012DE102011007571A1 Tamperschutzvorrichtung zum Tamperschutz eines Feldgeräts Tamperschutzvorrichtung to Tamperschutz a field device
10/18/2012CA2774622A1 Interactive audio/video system and device for use in a secure facility
10/18/2012CA2771485A1 Authorized data access based on the rights of a user and a location
10/17/2012EP2512090A1 Method for authenticating a subscriber
10/17/2012EP2511848A2 Multiple independent encryption domains
10/17/2012EP2511847A1 Automatic selection of routines for protection
10/17/2012EP2511846A1 Method, apparatus and system for obtaining user information
10/17/2012EP2511845A1 Biometric authentication system and biometric authentication method
10/17/2012EP2511844A2 Advanced drug development and manufacturing
10/17/2012EP2511830A1 Information processing device
10/17/2012EP2511823A2 Methods and systems to distribute content via a network utilizing distributed conditional access agents and secure agents, and to perform digital rights management (DRM)
10/17/2012EP2511787A1 Data decompression and search using FPGA devices
10/17/2012EP2510713A1 Preservation of user data privacy in a network
10/17/2012EP2510665A1 Proactive commands over secure channel between a mobile equipment and a uicc
10/17/2012EP2510475A1 Hardware device
10/17/2012EP2510474A2 Steganographic messaging system using code invariants
10/17/2012EP2510473A1 Unified user login for co-location facilities
10/17/2012EP2510430A1 Storage device and method for using a virtual file in a public memory area to access a plurality of protected files in a private memory area
10/17/2012CN202496132U Multilayer protective frame and protective device for preventing sensitive data from being stolen
10/17/2012CN202495044U USB interface isolation control system for multi-security-domain computer
10/17/2012CN202495043U System based on audio interface for providing identify authentication
10/17/2012CN202495042U Remote control system for face recognition computer
10/17/2012CN202495041U A trusted computing chip
10/17/2012CN202495040U Verification system
10/17/2012CN202494965U All-in-one computer capable of preventing information leakage
10/17/2012CN1776701B Techniques for defining, using and manipulating rights management data structures
10/17/2012CN102742243A Checking a configuration modification for an ied
10/17/2012CN102742211A Improvements relating to multifunction authentication systems
10/17/2012CN102741853A System and method for preventing data loss using virtual machine wrapped applications
10/17/2012CN102741851A System and method for improving security of user account access