Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
12/2014
12/23/2014US8918877 Signature compilation on a security device
12/23/2014US8918876 Deviating behaviour of a user terminal
12/23/2014US8918874 Malware scanning
12/23/2014US8918870 Identification of content by metadata
12/23/2014US8918869 Methods and systems for implementing a self defending/repairing database
12/23/2014US8918865 System and method for protecting data accessed through a network connection
12/23/2014US8918862 Managing access to storage media
12/23/2014US8918861 Marking one or more items in response to determining device transfer
12/23/2014US8918857 Distributed multi-processing security gateway
12/23/2014US8918856 Trusted intermediary for network layer claims-enabled access control
12/23/2014US8918855 Transaction provisioning for mobile wireless communications devices and related methods
12/23/2014US8918853 Method and system for automatic recovery from lost security token on embedded device
12/23/2014US8918852 Method of authentication user using server and image forming apparatus using the method
12/23/2014US8918851 Juxtapositional image based authentication system and apparatus
12/23/2014US8918850 Share cookie on native platform in mobile device without having to ask for the user's login information
12/23/2014US8918849 Secure user credential control
12/23/2014US8918846 Method and system for secure mobile messaging
12/23/2014US8918842 Utility grid command filter system
12/23/2014US8918841 Hardware interface access control for mobile applications
12/23/2014US8918840 Systems and methods for identity-based communication gate for social networks
12/23/2014US8918836 Predicting next characters in password generation
12/23/2014US8918728 Rule-based content filtering in a virtual universe
12/23/2014US8918679 Apparatus and method for checking an error detection functionality of a data processor
12/23/2014US8918655 Data whitening for writing and reading data to and from a non-volatile memory
12/23/2014US8918654 Information processing device, program verification method, and recording medium
12/23/2014US8918653 Protection of interpreted source code in virtual appliances
12/23/2014US8918651 Cryptographic erasure of selected encrypted data
12/23/2014US8918650 Secure data processing for unaligned data
12/23/2014US8918649 Device for transferring data between an unconscious capture device and another device
12/23/2014US8918647 Authentication system
12/23/2014US8918646 Data processing apparatus
12/23/2014US8918642 Protection of secret value using hardware instability
12/23/2014US8918641 Dynamic platform reconfiguration by multi-tenant service providers
12/23/2014US8918639 Smarter leveraging of the power grid to substantially improve security of distributed systems via a control plane data communication network over the smart power grid
12/23/2014US8918637 Remote authentication system
12/23/2014US8918633 Information processing device, information processing system, and program
12/23/2014US8918632 Methods for analyzing application privacy and devices thereof
12/23/2014US8918611 Semiconductor device and data processing method
12/23/2014US8918610 Protection of chips against attacks
12/23/2014US8918604 Information processing apparatus, information processing method, program, and recording medium
12/23/2014US8918575 Method and system for securely programming OTP memory
12/23/2014US8918574 Apparatus, system, and method for deliberately preventing unauthorized access to data stored in a non-volatile memory device
12/23/2014US8918561 Hardware resource arbiter for logical partitions
12/23/2014US8918508 Method for transferring resource and method for providing information
12/23/2014US8918480 Method, system, and device for the distribution of internet radio content
12/23/2014US8918479 User-browser interaction analysis authentication system
12/23/2014US8918462 Using user-attribute ontologies to calculate user-anonymity degrees
12/23/2014US8918426 Role engineering scoping and management
12/23/2014US8918425 Role engineering scoping and management
12/23/2014US8918398 Maintaining a historical record of anonymized user profile data by location for users in a mobile environment
12/23/2014US8918359 System and method for data mining and security policy management
12/23/2014US8918307 Automated system latency detection for fabric simulation
12/23/2014US8918306 System and method for providing dynamic insurance portal transaction authentication and authorization
12/23/2014US8918244 System and method of synchronizing an in-vehicle control system with a remote source
12/23/2014US8918232 Short range wireless communication between a vehicle and a handheld communications device
12/23/2014US8918195 Media management and tracking
12/23/2014US8918094 Systems and method for media transfer
12/23/2014US8918089 Method and device for verifying physical recognition between a caller and a called party
12/23/2014US8918078 Security for mobile communications device
12/23/2014US8917899 Methods and systems for watermarking digital media
12/23/2014US8917837 Consumer contact portal
12/23/2014US8917631 System and method for sharing information between two or more devices
12/23/2014US8917409 Image forming apparatus and image forming system
12/23/2014US8917259 Muti-touch interfaces for user authentication, partitioning, and external device control
12/23/2014US8917159 Fully secure item-level tagging
12/23/2014US8917158 Mobile terminal and method of controlling the same
12/23/2014US8915971 Security device for electronics
12/23/2014US8915450 Dual deterent incremental information object
12/18/2014US20140373185 Anti-theft Method and Computer System thereof
12/18/2014US20140373184 Mobile device persistent security mechanism
12/18/2014US20140373183 Computer and control method thereof
12/18/2014US20140373182 Systems and methods of automated compliance with data privacy laws
12/18/2014US20140373181 Method for protecting computer programs and data from hostile code
12/18/2014US20140373180 System and method for virtual image security in a cloud environment
12/18/2014US20140373179 Method for Scalable Access Control Decisions
12/18/2014US20140373178 Method, Apparatus and Server for User Verification
12/18/2014US20140373177 Providing access control for public and private document fields
12/18/2014US20140373176 Providing access control for public and private document fields
12/18/2014US20140373175 On-demand custom entitlement cards for products and services
12/18/2014US20140373174 Instant personalization security
12/18/2014US20140373173 Method for requiring user actions for the access or delivery of items of value
12/18/2014US20140373172 System and method for a parallel world of security for non secure environments
12/18/2014US20140373171 Security protection of software libraries in a data processing apparatus
12/18/2014US20140373170 System and method for initially establishing and periodically confirming trust in a software application
12/18/2014US20140373169 Processing copyright notice of media file
12/18/2014US20140373168 Method of protecting privacy data of an application program and apparatus using the same
12/18/2014US20140373167 Trace center apparatus and method for enabling contents to be traced
12/18/2014US20140373166 Data security device
12/18/2014US20140373165 Privacy-Protective Data Transfer
12/18/2014US20140373164 Associating first and second watermarks with audio or video content
12/18/2014US20140373163 Filtering Confidential Information In Voice and Image Data
12/18/2014US20140373162 Security status and information display system
12/18/2014US20140373160 Vulnerability countermeasure device and vulnerability countermeasure method
12/18/2014US20140373159 After-The-Fact Configuration Of Static Analysis Tools Able To Reduce User Burden
12/18/2014US20140373158 Detecting security vulnerabilities on computing devices
12/18/2014US20140373157 After-the-Fact Configuration of Static Analysis Tools Able to Reduce User Burden
12/18/2014US20140373156 Notification for reassembly-free file scanning
12/18/2014US20140373155 System and method for controlling applications to mitigate the effects of malicious software
12/18/2014US20140373154 Defensive Techniques to Increase Computer Security
12/18/2014US20140373153 Anti-Malware Tool for Mobile Apparatus
1 ... 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 ... 1193