Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
10/2012
10/04/2012WO2012091348A3 System and method for managing ota provisioning applications through use of profiles and data preparation
10/04/2012WO2012082708A3 Method and system for enabling parental control for filtering content of terminal on the internet
10/04/2012WO2011139302A3 Steganographic messaging system using code invariants
10/04/2012US20120255038 Dual Trust Architecture
10/04/2012US20120255037 License management for digital content
10/04/2012US20120255036 Proprietary access control algorithms in content delivery networks
10/04/2012US20120255035 Secure data parser method and system
10/04/2012US20120255034 Secure data parser method and system
10/04/2012US20120255033 Licensing software on a single-user basis
10/04/2012US20120255032 Method, a system and an apparatus for delivering media layers
10/04/2012US20120255031 System and method for securing memory using below-operating system trapping
10/04/2012US20120255030 Secret sharing apparatus, sharing apparatus and secret sharing method
10/04/2012US20120255029 System and method for preventing the leaking of digital content
10/04/2012US20120255028 Providing Trusted Services Management Using a Hybrid Service Model
10/04/2012US20120255027 Detecting code injections through cryptographic methods
10/04/2012US20120255026 Method and device for managing digital usage rights of documents
10/04/2012US20120255025 Automatic Analysis of Software License Usage in a Computer Network
10/04/2012US20120255024 Compiling Information Obtained By Combinatorial Searching
10/04/2012US20120255023 Methods and systems of detecting and analyzing correlated operations in a common storage
10/04/2012US20120255022 Systems and methods for determining vulnerability to session stealing
10/04/2012US20120255021 System and method for securing an input/output path of an application against malware with a below-operating system security agent
10/04/2012US20120255019 Method and system for operating system identification in a network based security monitoring solution
10/04/2012US20120255017 System and method for providing a secured operating system execution environment
10/04/2012US20120255016 System and method for below-operating system protection of an operating system kernel
10/04/2012US20120255014 System and method for below-operating system repair of related malware-infected threads and resources
10/04/2012US20120255013 System and method for below-operating system modification of malicious code on an electronic device
10/04/2012US20120255011 Systems and methods for identifying hidden processes
10/04/2012US20120255010 System and method for firmware based anti-malware security
10/04/2012US20120255009 Method and apparatus for combating malicious code
10/04/2012US20120255008 Method of Handling Malicious Application in Telco's Application Store System and Related Communication Device
10/04/2012US20120255007 Systems and methods for managing applications
10/04/2012US20120255006 Two-tier deep analysis of html traffic
10/04/2012US20120255005 Information processing apparatus and method, and program
10/04/2012US20120255004 System and method for securing access to system calls
10/04/2012US20120255003 System and method for securing access to the objects of an operating system
10/04/2012US20120255002 System and method for below-operating system trapping of driver loading and unloading
10/04/2012US20120255001 System and method for below-operating system trapping of driver filter attachment
10/04/2012US20120255000 System and method for below-operating system trapping and securing of interdriver communication
10/04/2012US20120254999 Systems and method for regulating software access to security-sensitive processor resources
10/04/2012US20120254998 Method for blocking the execution of a hacking process
10/04/2012US20120254996 Dns resolution, policies, and views for large volume systems
10/04/2012US20120254995 System and method for below-operating system trapping and securing loading of code into memory
10/04/2012US20120254994 System and method for microcode based anti-malware security
10/04/2012US20120254992 Providing greater access to one or more items in response to determining device transfer
10/04/2012US20120254991 Access restriction in response to determining device transfer
10/04/2012US20120254990 Authentication of an end user
10/04/2012US20120254989 Providing greater access to one or more items in response to verifying device transfer
10/04/2012US20120254987 Pairing and authentication process between a host device and a limited input wireless device
10/04/2012US20120254986 Providing particular level of access to one or more items in response to determining primary control of a computing device
10/04/2012US20120254984 Selective item access provision in response to active item ascertainment upon device transfer
10/04/2012US20120254983 Selective item access provision in response to active item ascertainment upon device transfer
10/04/2012US20120254982 System and method for protecting and securing storage devices using below-operating system trapping
10/04/2012US20120254981 Access restriction in response to determining device transfer
10/04/2012US20120254979 Unattackable hardware internet packet processing device for network security
10/04/2012US20120254978 Policy-based content filtering
10/04/2012US20120254977 Method, device, and system for network attack protection
10/04/2012US20120254976 Directory server for automatic network information access systems
10/04/2012US20120254975 System and method for automatically regulating messages between networks
10/04/2012US20120254974 Local Data Appliance for Collecting and Storing Remote Sensor Data
10/04/2012US20120254971 Captcha method and system
10/04/2012US20120254969 Systems and methods for implementing security services
10/04/2012US20120254967 External device having at least one memory
10/04/2012US20120254966 Apparatus for secured distributed computing
10/04/2012US20120254965 Method and system for secured distributed computing using devices
10/04/2012US20120254964 Method and system for generating a touch captcha
10/04/2012US20120254963 Dynamic pin dual factor authentication using mobile device
10/04/2012US20120254962 Management system, a management process, and a quick access method of information content for a digital networking device
10/04/2012US20120254960 Connecting mobile devices, internet-connected vehicles, and cloud services
10/04/2012US20120254958 Method to achieve coexistence of multiple wireless networks using unique network identifiers
10/04/2012US20120254956 Securely Managing Password Access to a Computer System
10/04/2012US20120254955 Personal authentication method, personal authentication system, and portable-type communication terminal
10/04/2012US20120254954 System for multimedia viewing based on entitlements
10/04/2012US20120254953 Method for providing and obtaining content
10/04/2012US20120254952 Interface device for an intelligent electronic device and method of operating an interface device
10/04/2012US20120254951 Providing protection against unauthorized network access
10/04/2012US20120254950 Delivery control for messages communicated among end user communication devices
10/04/2012US20120254949 Method and apparatus for generating unique identifier values for applications and services
10/04/2012US20120254948 Methods and systems for authenticating one or more users of a vehicle communications and information system
10/04/2012US20120254947 Distributed Real-Time Network Protection for Authentication Systems
10/04/2012US20120254946 Establishing privileges through claims of valuable assets
10/04/2012US20120254945 Enforcing web services security through user specific xml schemas
10/04/2012US20120254943 Methods for controlling a traffic of an authentication server
10/04/2012US20120254942 Connection destination determination device, connection destination determination method, and service collaboration system
10/04/2012US20120254941 Providing particular level of access to one or more items in response to determining primary control of a computing device
10/04/2012US20120254940 Authenticating online users with distorted challenges based on transaction histories
10/04/2012US20120254939 Systems and methods of controlling network access
10/04/2012US20120254938 Systems and methods of controlling network access
10/04/2012US20120254937 Systems and methods of controlling network access
10/04/2012US20120254936 Apparatus and method for security and network management based on flow
10/04/2012US20120254935 Authentication collaboration system and authentication collaboration method
10/04/2012US20120254853 Customizing mobile applications
10/04/2012US20120254844 Computer program product containing instructions for providing a processor the capability of executing an application derived from a compiled form
10/04/2012US20120254843 Computer program product containing instructions for providing a processor the capability of executing an application derived from a compiled form
10/04/2012US20120254637 Information terminal and method of reducing information leakage
10/04/2012US20120254630 Method, host, storage, and machine-readable storage medium for protecting content
10/04/2012US20120254628 Cipher message execution in a computing system
10/04/2012US20120254625 Protecting states of a cryptographic process using group automorphisms
10/04/2012US20120254623 Information Processing Apparatus and Data Protection Method
10/04/2012US20120254622 Secure Access to Electronic Devices
10/04/2012US20120254621 Process for executing a downloadable service receiving restrictive access rights to at least one profile file