Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
08/2012
08/07/2012US8239925 Evaluating removal of access permissions
08/07/2012US8239924 Method and system for authenticating a user based on a physical object
08/07/2012US8239923 Controlling computer program extensions in a network device
08/07/2012US8239921 System and method of retrieving a service contact identifier
08/07/2012US8239918 Application marketplace administrative controls
08/07/2012US8239916 Methods, data processing systems, and computer program products for assigning privacy levels to data elements
08/07/2012US8239833 Statistical control of the integrity of a program
08/07/2012US8239690 Storage device and storage method, and information-processing device and information-processing method
08/07/2012US8239689 Device and method for a secure execution of a program
08/07/2012US8239687 Apparatus method and medium for tracing the origin of network transmissions using n-gram distribution of data
08/07/2012US8239685 Biometric authentication method
08/07/2012US8239683 Method for producing acknowledged transaction data and corresponding device
08/07/2012US8239678 Method for combining data to be processed with a data-specific apparatus, and apparatus and computer program for implementing the method
08/07/2012US8239677 Verification and authentication systems and methods
08/07/2012US8239674 System and method of protecting files from unauthorized modification or deletion
08/07/2012US8239673 Methods, apparatus and systems with loadable kernel architecture for processors
08/07/2012US8239663 System and method for maintaining the security of memory contents and computer architecture employing the same
08/07/2012US8239508 Storage system and data management method in storage system
08/07/2012US8239459 Data processing apparatus and data processing method
08/07/2012US8239329 Data storage medium, software installation method and copyright protection module
08/07/2012US8239328 Information processing apparatus, print control apparatus, printed control system
08/07/2012US8239327 System and method for user logging of audio and video broadcast content
08/07/2012US8239013 EEG prediction method for medication response
08/07/2012US8238692 Device and method for outputting a private image using a public display
08/07/2012US8238616 Biometric authentication system and biometric authentication method
08/07/2012US8238352 System and apparatus for rogue VoIP phone detection and managing VoIP phone mobility
08/07/2012US8238110 Device to shield against interference from electrical appliances
08/07/2012CA2504609C A method and system for management of software product licences
08/07/2012CA2475322C Method of personalizing and identifying communications
08/07/2012CA2464828C Method and system for auxiliary processing of information for a computing device
08/03/2012CA2766731A1 Method and system for cloud based storage
08/02/2012WO2012103517A1 Internet isolation for avoiding internet security threats
08/02/2012WO2012103236A1 Systems, methods, apparatuses, and computer program products for forensic monitoring
08/02/2012WO2012102720A1 Identify potential account numbers in a single pass of a list of digits
08/02/2012WO2012102717A1 Importance class based data management
08/02/2012WO2012102365A1 Mobile information terminal and grip-characteristic learning method
08/02/2012WO2012102111A1 Mobile information terminal, grip characteristic learning method, and grip characteristic authentication method
08/02/2012WO2012102110A1 Mobile information terminal, grip characteristic learning method, and grip characteristic authentication method
08/02/2012WO2012101910A1 Information processing apparatus, information processing method, and program
08/02/2012WO2012101424A1 Software activation systems
08/02/2012WO2012100942A1 Method for detecting improper advertisement diversions on the internet
08/02/2012WO2012058486A3 Automated policy builder
08/02/2012WO2012052581A3 Sci (simple cluster interface): architecture for managing user tasks in a cluster via the web
08/02/2012WO2012031755A3 Method of authentification for access to a website
08/02/2012US20120198571 Digital works having usage rights and method for creating the same
08/02/2012US20120198570 Geo-Enabled Access Control
08/02/2012US20120198569 Associated with abnormal application-specific activity monitoring in a computing network
08/02/2012US20120198568 Security Classification Applying Social Norming
08/02/2012US20120198567 Digital works having usage rights and method for creating the same
08/02/2012US20120198565 Business method for aggregation and presentation of the media data
08/02/2012US20120198564 Security Classification Based on User Interaction
08/02/2012US20120198563 Digital works having usage rights and method for creating the same
08/02/2012US20120198562 Digital works having usage rights and method for creating the same
08/02/2012US20120198561 Data transmission apparatus, control method therefor, and image input/output apparatus
08/02/2012US20120198560 Secure active element machine
08/02/2012US20120198559 Policy based management of content rights in enterprise/cross enterprise collaboration
08/02/2012US20120198558 Xss detection method and device
08/02/2012US20120198555 Testing web services that are accessible via service oriented architecture (soa) interceptors
08/02/2012US20120198554 Obfuscated Malware Detection
08/02/2012US20120198553 Secure auditing system and secure auditing method
08/02/2012US20120198552 Method, computer software, and system for providing end to end security protection of an online transaction
08/02/2012US20120198550 Electronic transaction risk management
08/02/2012US20120198549 Method and system for detecting malicious domain names at an upper dns hierarchy
08/02/2012US20120198547 Enhanced organization and automatic navigation of display screens facilitating automation control
08/02/2012US20120198546 Apparatus, methods, and computer program products for entering secure passwords
08/02/2012US20120198545 System and Method for Providing Digital Content
08/02/2012US20120198544 System and method for controlling user access to an electronic device
08/02/2012US20120198543 Accessible files
08/02/2012US20120198542 Shared Security Device
08/02/2012US20120198541 Methods and apparatus for preventing network intrusion
08/02/2012US20120198540 Internet-based fill-level measurement value and diagnostic information polling system
08/02/2012US20120198538 Multi-enclave token
08/02/2012US20120198537 Utilizing a dispersed storage network access token module to retrieve data from a dispersed storage network memory
08/02/2012US20120198536 Utilizing a dispersed storage network access token module to store data in a dispersed storage network memory
08/02/2012US20120198535 System and method for embedded authentication
08/02/2012US20120198534 Information processing system, apparatus, method, and program storage medium
08/02/2012US20120198533 Methods for remote monitoring and control of home devices over a computer network
08/02/2012US20120198532 User Authentication for Social Networks
08/02/2012US20120198531 Multi-device session pairing using a visual tag
08/02/2012US20120198530 Real time password generation apparatus and method
08/02/2012US20120198529 Blacklisting of frequently used gesture passwords
08/02/2012US20120198528 Methods and systems to detect attacks on internet transactions
08/02/2012US20120198527 IP Multimedia Security
08/02/2012US20120198525 Server reservation method, reservation control apparatus and program storage medium
08/02/2012US20120198523 Apparatus and method for managing access among devices
08/02/2012US20120198522 Method for Information Editorial Controls
08/02/2012US20120198521 Communication apparatus, communication apparatus system, and method controlling relay apparatus
08/02/2012US20120198520 Machine-To-Machine (M2M) Call Flow Security
08/02/2012US20120198518 Observable moment encryption
08/02/2012US20120198517 Rule-based contest handling
08/02/2012US20120198516 Inspecting Code and Reducing Code Size Associated to a Target
08/02/2012US20120198515 Flexibly assigning security configurations to applications
08/02/2012US20120198514 Methods and Apparatuses for User-Verifiable Trusted Path in the Presence of Malware
08/02/2012US20120198513 Secure social web orchestration via a security model
08/02/2012US20120198512 System and method for combining an access control system with a traffic management system
08/02/2012US20120198511 Web service security cockpit
08/02/2012US20120198474 Application associating based on cryptographic identification
08/02/2012US20120198437 Terminal, method and computer program product for validating a software application
08/02/2012US20120198244 Hardware-based key generation and recovery
08/02/2012US20120198243 Program execution device