Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
09/2012
09/20/2012US20120240233 Method and system for detecting malicious web content
09/20/2012US20120240232 Quarantine network system and quarantine client
09/20/2012US20120240231 Apparatus and method for detecting malicious code, malicious code visualization device and malicious code determination device
09/20/2012US20120240230 Memory storage device and memory controller and virus scanning method thereof
09/20/2012US20120240229 Systems and methods for looking up anti-malware metadata
09/20/2012US20120240228 Multi-dimensional reputation scoring
09/20/2012US20120240227 Methods and apparatus for conducting electronic transactions
09/20/2012US20120240226 Network routers and network traffic routing methods
09/20/2012US20120240225 Verification apparatus and verification method
09/20/2012US20120240224 Security systems and methods for distinguishing user-intended traffic from malicious traffic
09/20/2012US20120240223 Process and apparatus for automatically identifying user of consumer electronics
09/20/2012US20120240222 Methods and systems for preventing security breaches
09/20/2012US20120240221 Provisional administrator privileges
09/20/2012US20120240220 Method and system for controlling data access on user interfaces
09/20/2012US20120240219 Information processing apparatus, information processing method, and storage medium
09/20/2012US20120240216 Method for Lawfully Intercepting Communication IP Packets Exchanged Between Terminals
09/20/2012US20120240215 Soc-based device for packet filtering and packet filtering method thereof
09/20/2012US20120240214 System, method of authenticating information management, and computer-readable medium storing program
09/20/2012US20120240213 Gateway device and method for using the same to prevent phishing attacks
09/20/2012US20120240212 Systems and methods for generating modular security delegates for applications
09/20/2012US20120240210 Service access control
09/20/2012US20120240209 Secure information distribution between nodes (network devices)
09/20/2012US20120240207 Apparatus, method, and program for validating user
09/20/2012US20120240206 Configuration of a Data Collection Agent and Its Distribution System
09/20/2012US20120240205 Selective internet priority service
09/20/2012US20120240204 System, design and process for strong authentication using bidirectional OTP and out-of-band multichannel authentication
09/20/2012US20120240202 Communication Abuse Prevention
09/20/2012US20120240201 System and Method for Providing Multimedia Services
09/20/2012US20120240200 Location-targeted online services
09/20/2012US20120240199 Confidential presentations in virtual world infrastructure
09/20/2012US20120240198 Computerized authorization system and method
09/20/2012US20120240196 Automated sniffer apparatus and method for monitoring computer systems for unauthorized access
09/20/2012US20120240195 Apparatus, system and method employing a wireless user-device
09/20/2012US20120240194 Systems and Methods for Controlling Access to Electronic Data
09/20/2012US20120240193 System and method for assigning permissions to access data and perform actions in a computer system
09/20/2012US20120240191 Wireless device nearfield security configuration
09/20/2012US20120240190 Method, system, and computer program product for facilitating communication in an interoperability network
09/20/2012US20120240189 Method, system, and computer program product for facilitating communication in an interoperability network
09/20/2012US20120240188 Method, system, and computer program product for facilitating communication in an interoperability network
09/20/2012US20120240187 Policy based auditing of workflows
09/20/2012US20120240186 Soc-based device for packet filtering and packet filtering method thereof
09/20/2012US20120240185 Systems and methods for processing data flows
09/20/2012US20120240184 System and method for on the fly protocol conversion in obtaining policy enforcement information
09/20/2012US20120240183 Cloud based mobile device security and policy enforcement
09/20/2012US20120240182 Security enforcement in virtualized systems
09/20/2012US20120240181 Techniques for securing a checked-out virtual machine in a virtual desktop infrastructure
09/20/2012US20120240140 Method for the distribution of audio-visual information and a system for the distribution of audio-visual information
09/20/2012US20120239944 Selective Encryption of Data Stored on Removable Media in an Automated Data Storage Library
09/20/2012US20120239943 Storage system, storage control apparatus, and storage control method
09/20/2012US20120239941 Programmable controller system, tool device, tool program, storage medium, and programmable controller
09/20/2012US20120239940 Identification by means of checking a user's biometric data
09/20/2012US20120239939 Secure Resume for Encrypted Drives
09/20/2012US20120239936 Credential transfer
09/20/2012US20120239929 Hybrid networking master passphrase
09/20/2012US20120239925 Secure messaging
09/20/2012US20120239924 System and method for sequentially processing a biometric sample
09/20/2012US20120239906 Launching A Secure Kernel In A Multiprocessor System
09/20/2012US20120239795 Method, system, and computer program product for facilitating communication in an interoperability network
09/20/2012US20120239555 Process for Controlling Battery Authentication
09/20/2012US20120239540 Systems, devices and methods for automatic detection and masking of private data
09/20/2012US20120238244 Proactive commands over secure channel between a mobile equipment and a uicc
09/20/2012US20120237031 Generating Identical Numerical Sequences Utilizing a Physical Property and Secure Communication Using Such Sequences
09/20/2012US20120237029 Method and system for maintaining secure data input and output
09/20/2012US20120237022 Sensor with signature of data relating to sensor
09/20/2012US20120234923 Method and/or device for managing authentication data
09/20/2012DE112010004885T5 Bereitstellen von Integritätsüberprüfung und -bestätigung in einer verborgenen Ausführungsumgebung Providing integrity checking and confirmation in a hidden execution environment
09/20/2012DE112010000940T5 Managementsystem für biologische Informationen und Managementverfahren für biologische Informationen Management system for biological information management and process biological information
09/20/2012DE112009004762T5 System und verfahren zum durchführen einer verwaltunosoperation System and method for performing a verwaltunosoperation
09/20/2012CA2830100A1 Change-tolerant method of generating an identifier for a collection of assets in a computing environment using a secret sharing scheme
09/19/2012EP2501099A1 Method and system for detecting malicious web content
09/19/2012EP2501076A1 Server for long-term signature, terminal for long-term signature, terminal program for long-term signature, and server for long-term signature verification
09/19/2012EP2500880A1 Handy terminal and payment method used for the handy terminal
09/19/2012EP2500839A1 Access control system, communication terminal, server, and access control method
09/19/2012EP2500838A1 SOC-based device for packet filtering and packet filtering method thereof
09/19/2012EP2499807A1 An apparatus, method, computer program and user interface
09/19/2012EP2499774A1 Method and system for the accelerated decryption of cryptographically protected user data units
09/19/2012EP2499617A1 Method for establishing an element of proof when checking an individual using an electronic document belonging to him
09/19/2012EP2499598A1 System and method for preventing data loss using virtual machine wrapped applications
09/19/2012EP2499597A1 Method for securely interacting with a security element
09/19/2012EP2499596A1 Device and method for verifying connectivity
09/19/2012EP2499595A2 Secure kvm system having multiple emulated edid functions
09/19/2012EP2499594A1 Method and system for confidentially providing software components
09/19/2012EP2499593A1 Method and system for resolving a naming conflict
09/19/2012EP2499549A2 Clock turn-on strategy for power management
09/19/2012EP2302476A9 Method, system and storage medium for providing an executable program to a coordinate measurement system
09/19/2012EP1998528B1 Method and apparatus to provide secure communication
09/19/2012CN202443525U Password stealing preventive system for automatic teller machine of bank
09/19/2012CN1954281B Processing rights in DRM systems
09/19/2012CN102687160A Response determining device,response determining method,response determining program,recording medium and response determining system
09/19/2012CN102687159A Terminal management system and terminal management method
09/19/2012CN102687158A Search term security
09/19/2012CN102687157A Digital content management and delivery
09/19/2012CN102687149A Media storage system and method
09/19/2012CN102685180A Cloud computing-oriented network security early warning method
09/19/2012CN102685106A Safety verification method and equipment
09/19/2012CN102684879A Method and system for remote bid opening and bid evaluation
09/19/2012CN102682471A Method for realizing digital image three-dimensional sample display
09/19/2012CN102682417A Compressed-sensing-based vector geographic data watermark information generation method
09/19/2012CN102682247A Digital-watermark-based vector geographic data updating method
09/19/2012CN102682246A Vector geographic data digital watermark method based on data point positioning