Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
08/2012
08/30/2012US20120222123 Detection of Vulnerabilities in Computer Systems
08/30/2012US20120222122 Mechanism for Generating Vulnerability Reports Based on Application Binary Interface/Application Programming Interface Usage
08/30/2012US20120222121 Systems and Methods for Detecting Malicious PDF Network Content
08/30/2012US20120222119 Active computer system defense technology
08/30/2012US20120222118 Tiered object-related trust decisions
08/30/2012US20120222117 Method and system for preventing transmission of malicious contents
08/30/2012US20120222116 System and method for detecting web browser attacks
08/30/2012US20120222115 Using a declaration of security requirements to determine whether to permit application operations
08/30/2012US20120222114 Method and apparatus for network filtering and firewall protection on a secure partition
08/30/2012US20120222113 Logical Partition Media Access Control Impostor Detector
08/30/2012US20120222112 Information technology governance and controls methods and apparatuses
08/30/2012US20120222111 Classifying a message based on fraud indicators
08/30/2012US20120222110 Data leakage protection in cloud applications
08/30/2012US20120222109 Providing a declaration of security requirements to a security program to use to control application operations
08/30/2012US20120222108 System and method for automatically initiating and dynamically establishing secure internet connections between a fire-walled server and a fire-walled client
08/30/2012US20120222107 Method and apparatus for providing proxy-based access controls
08/30/2012US20120222106 Automated Hybrid Connections Between Multiple Environments In A Data Center
08/30/2012US20120222105 System and method for establishing historical usage-based hardware trust
08/30/2012US20120222103 Access control method, and associated lock device and administration server
08/30/2012US20120222102 Authentication using mobile devices
08/30/2012US20120222101 Information processing system, information processing device, server device, and method
08/30/2012US20120222100 Advanced captcha using integrated images
08/30/2012US20120222096 Open market content distribution
08/30/2012US20120222095 Information communication system, information communication method, node apparatus and recording medium
08/30/2012US20120222094 Method and arrangement for enabling the use of a consumable unit
08/30/2012US20120222092 Controlling access to media for an electronic device
08/30/2012US20120222091 Methods and apparatus for use in a generic bootstrapping architecture
08/30/2012US20120222089 Network topology aided by smart agent download
08/30/2012US20120222088 Method and Apparatus for Implementing Communication of Stand-Alone Software
08/30/2012US20120222087 Application based intrusion detection
08/30/2012US20120222086 System and method for dynamic security provisioning of computing resources
08/30/2012US20120222085 Method and system for trusted contextual communications
08/30/2012US20120222084 Virtual Securty Zones for Data Processing Environments
08/30/2012US20120221955 End user device that secures an association of application to service policy with an application certificate check
08/30/2012US20120221866 System and method for securely storing firmware
08/30/2012US20120221865 Method and apparatus for protecting cached streams
08/30/2012US20120221864 Method and apparatus for computer code obfuscation and deobfuscation using boot installation
08/30/2012US20120221863 Authentication system
08/30/2012US20120221862 Multifactor Authentication System and Methodology
08/30/2012US20120221860 Method and apparatus for encoding and decoding data transmitted to an authentication token
08/30/2012US20120221859 Strong authentication token with acoustic data input
08/30/2012US20120221858 Accelerated Key Agreement With Assisted Computations
08/30/2012US20120221856 Secure data parser method and system
08/30/2012US20120221855 Secure data parser method and system
08/30/2012US20120221686 Data collection method and apparatus
08/30/2012US20120221603 Distributed mobile services
08/30/2012US20120221473 Method and System for Using a Mobile Device for Secure Access to Electric Vehicle Supply Equipment
08/30/2012US20120221464 Communications system for performing secure transactions based upon mobile wireless communications device proximity and related methods
08/30/2012US20120221318 Information processing device
08/30/2012US20120219152 Key information management system, record reproduction apparatus, and key information management apparatus
08/30/2012US20120219150 Information processing device, information processing method
08/30/2012US20120219149 Encryption and decryption processing method, system and computer-accessible medium for achieving sms4 cryptographic procedure
08/30/2012US20120216726 Device for handling value notes
08/30/2012DE102011012471A1 Verfahren zum Schutz vor maschinengenerierten Zugriffen auf eine geschützte Ressource einer Rechnereinheit Techniques to protect against machine-generated traffic to a protected resource of a computer unit
08/30/2012DE102011012470A1 Method for classification of answer space for protecting resources e.g. software applications, from machine-generated access, involves extending answer space based on frequency of identification and selection of correct phrase
08/30/2012DE102011012328A1 Verschlüsseltes Rechnen Convert Encrypted
08/30/2012DE102011012227A1 Verfahren zum Datenaustausch in einer gesicherten Laufzeitumgebung Method for exchanging data in a secure runtime environment
08/30/2012DE102011012226A1 Verfahren zum Betrieb einer Mikroprozessoreinheit, insbesondere in einem mobilen Endgerät Method for operating a microprocessor unit, in particular in a mobile terminal
08/30/2012CA2828046A1 Methods and apparatus to connect wireless-enabled devices
08/30/2012CA2827838A1 Apparatus for use in a vehicle to warn a user that he has left behind a mobile device
08/30/2012CA2827199A1 Systems and methods for rule-driven management of sensor data across geographic areas and derived actions
08/29/2012EP2493228A1 Method and device for setting graph password of communication terminal
08/29/2012EP2492914A2 Data storage medium having security function and output device thereof
08/29/2012EP2492839A1 Method and system for authenticating a user
08/29/2012EP2492838A1 Method for protecting against machine access to a resource of a computer unit that is to be protected
08/29/2012EP2492837A1 Network communication system, server system and terminals
08/29/2012EP2492836A1 Terminal management system and terminal management method
08/29/2012EP2492835A1 Data security management systems and methods
08/29/2012EP2492834A1 Method for authenticating a user
08/29/2012EP2492833A1 Method and apparatus for detecting malicious software
08/29/2012EP2492774A2 Secure media path methods, systems, and architectures
08/29/2012EP2491694A1 Method for managing access to protected resources in a computer network, physical entities and computer programs therefor
08/29/2012EP2491524A2 System and device for consolidating sim, personal token, and associated applications
08/29/2012EP2491515A2 Resource access based on multiple credentials
08/29/2012EP2491514A1 System and method for consumer-to-consumer-lending of digital content
08/29/2012EP2491513A1 Method and system for making edrm-protected data objects available
08/29/2012EP2491512A1 Data content checking
08/29/2012EP2491511A1 Checking data content
08/29/2012EP2491510A1 Distribution system and method for distributing digital information
08/29/2012CN202404601U Controller for computer network security
08/29/2012CN202404600U Protective device of handheld electronic product
08/29/2012CN202404599U Intelligent identification control device for mining equipment
08/29/2012CN102652386A Method for testing electric components in mains supply, in particular in mains supply for building
08/29/2012CN102652318A Communication control system, server device, communication device and method of controlling communication
08/29/2012CN102651088A Classification method for malicious code based on A_Kohonen neural network
08/29/2012CN102651061A System and method of protecting computing device from malicious objects using complex infection schemes
08/29/2012CN102651060A Method and system for detecting vulnerability
08/29/2012CN102651059A Method for certificating GIS (Geographic Information System) vector data copyright based on multi-element spatial feature
08/29/2012CN102651058A Method for realizing follow attack prevention in device with data sign determining function
08/29/2012CN102651057A OOXML (office open extensible markup language)-based electronic document digital evidence collecting method and device thereof
08/29/2012CN102651036A Universal and reliable file coping operation identifying method
08/29/2012CN102650934A Method, device and system for printing variable data coded pattern
08/29/2012CN102650927A Verification method and computer system using the same
08/29/2012CN102289634B Restrictive region permission authentication device based on visible optical communication and file encryption method
08/29/2012CN101950332B Chip protecting method and system
08/29/2012CN101944166B System and method for controlling right representation by item risk undertaker
08/29/2012CN101931537B Digital certificate generation method for limiting signature contents
08/29/2012CN101901221B Method and device for detecting cross site scripting
08/29/2012CN101854344B Contents transmitter apparatus, contents reciever apparatus and contents transmitting method
08/29/2012CN101763613B Method for signing on mixed electronic bill