Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
06/2012
06/14/2012US20120151601 Image distribution apparatus
06/14/2012US20120151600 Method and system for protecting intellectual property in software
06/14/2012US20120151599 Electronic system for the protection and control of license transactions associated with the disablement of replicated read only media and its bound licensed content
06/14/2012US20120151598 Apparatus and method for forensic marking of digital content
06/14/2012US20120151597 De-Identification of Data
06/14/2012US20120151596 System and method for network vulnerability detection and reporting
06/14/2012US20120151595 System and method for network vulnerability detection and reporting
06/14/2012US20120151594 System and method for network vulnerability detection and reporting
06/14/2012US20120151593 Distributed denial of service attack detection apparatus and method, and distributed denial of service attack detection and prevention apparatus for reducing false-positive
06/14/2012US20120151591 System and method for network edge data protection
06/14/2012US20120151590 Analyzing Traffic Patterns to Detect Infectious Messages
06/14/2012US20120151589 Intelligent system and method for mitigating cyber attacks in critical systems through controlling latency of messages in a communications network
06/14/2012US20120151588 Malware Detection for SMS/MMS Based Attacks
06/14/2012US20120151587 Devices, Systems, and Methods for Detecting Proximity-Based Mobile Malware Propagation
06/14/2012US20120151585 Method and System for Identifying Malicious Messages in Mobile Communication Networks, Related Network and Computer Program Product Therefor
06/14/2012US20120151584 Method for blocking denial-of-service attack
06/14/2012US20120151583 Ddos attack detection and defense apparatus and method
06/14/2012US20120151582 Offline Scan, Clean and Telemetry Using Installed Antimalware Protection Components
06/14/2012US20120151581 Method and system for information property management
06/14/2012US20120151580 Computing system
06/14/2012US20120151578 Detecting a suspicious entity in a communication network
06/14/2012US20120151577 Archive of Text Captures from Rendered Documents
06/14/2012US20120151576 Method and system for creating and accessing a secure storage area in a non-volatile memory card
06/14/2012US20120151575 Apparatus and method for certificating security in portable terminal
06/14/2012US20120151574 Software activation using digital licenses
06/14/2012US20120151573 Utilizing virtual private networks to provide object level security on a multi-node computer system
06/14/2012US20120151572 Architecture for network management in a multi-service network
06/14/2012US20120151571 "Push" Keep-Alive Mechanism For SIP User Agents Located Behind NATS/Firewalls
06/14/2012US20120151570 system for and method of authenticating media manager and obtaining a digital transmission content protection (dtcp) certificate
06/14/2012US20120151569 Portable Identity Rating
06/14/2012US20120151567 Reusable Authentication Experience Tool
06/14/2012US20120151566 Method and device for verifying dynamic password
06/14/2012US20120151565 System, apparatus and method for identifying and blocking anomalous or improper use of identity information on computer networks
06/14/2012US20120151564 System and method for associating a universal user indentification and a domain specific user identification
06/14/2012US20120151563 Automated management of system credentials
06/14/2012US20120151562 Method, system and server for authorizing computing devices for receipt of venue-based data based on the geographic location of a user
06/14/2012US20120151558 Network security appliance
06/14/2012US20120151556 Method and apparatus for digital rights management policies
06/14/2012US20120151555 A scalable firewall policy management platform
06/14/2012US20120151553 System, method, and apparatus for data cognition incorporating autonomous security protection
06/14/2012US20120151552 Domain-based isolation and access control on dynamic objects
06/14/2012US20120151515 Physical presence digital authentication system
06/14/2012US20120151223 Method for securing a computing device with a trusted platform module-tpm
06/14/2012US20120151219 Security usb storage medium generation and decryption method, and medium recorded with program for generating security usb storage medium
06/14/2012US20120151218 Methods, Systems, And Computer Program Products For Entering Sensitive And Padding Data Using User-Defined Criteria
06/14/2012US20120151216 Methods and systems for encoding and protecting data using digital signature and watermarking techniques
06/14/2012US20120151211 Systems, methods and apparatus to apply permissions to applications
06/14/2012US20120151210 Extended security for wireless device handset authentication
06/14/2012US20120151098 Systems and methods for providing a universal computing system
06/14/2012US20120151077 Systems And Methods For Distributed Authentication Of Video Services
06/14/2012US20120150843 System and method for coordinating asset entitlements
06/14/2012US20120150685 Monetizing product features as part of enforcing license terms
06/14/2012US20120150575 Quotation system and method
06/14/2012US20120150450 Biometric authentication system, method, and program
06/14/2012US20120148051 Method for generating an identifier
06/14/2012US20120148047 Detecting key corruption
06/14/2012US20120147937 Methods, apparatus, and systems for secure demand paging and other paging operations for processor devices
06/14/2012US20120145783 Powered authenticating cards
06/14/2012DE112010003464T5 Modifikation von Zugangskontrolllisten Modification of access control lists
06/14/2012DE102010054446A1 Portabler Datenträger mit Fehlbedienungszähler Portable media with retry counter
06/14/2012DE102010054445A1 Method for personalizing portable data carrier e.g. chip card, involves configuring data carrier according to one of configurations, and authenticating data carrier using authentication key corresponding to activated configuration
06/14/2012DE102010054059A1 Verfahren zum Verschlüsseln einer elektronischen Textnachricht A method of encrypting an electronic text message
06/14/2012CA2821090A1 Method and device for providing improved perpetrator imaging
06/14/2012CA2819949A1 Method for personalizing a secure element comprised in a terminal
06/14/2012CA2819870A1 Dispositif d'appairage dynamique
06/14/2012CA2819782A1 Method for transferring subscription information between terminals
06/14/2012CA2819781A1 Method for managing content on a secure element connected to an equipment
06/14/2012CA2819766A1 Method for remotely delivering a full subscription profile to a uicc over ip
06/14/2012CA2819764A1 Method for downloading a subscription in an uicc embedded in a terminal
06/14/2012CA2819396A1 Method for transmitting a sim application of a first terminal to a second terminal
06/14/2012CA2817245A1 Antimalware protection of virtual machines
06/13/2012EP2463800A1 System and method for associating a universal user identification and a domain specific user identification
06/13/2012EP2463799A1 System and method for coordinating asset entitlements
06/13/2012EP2463798A1 Pressure password for a touchscreen device
06/13/2012EP2463797A1 Detection of duress condition at a communication device
06/13/2012EP2462587A1 Authentication of data streams
06/13/2012EP2462556A2 Authorization scheme to minimize the use of unauthorized medical device disposables on a medical device instrument
06/13/2012EP2462533A1 System and method for managing entitlements to data over a network
06/13/2012EP2462532A1 Application authentication system and method
06/13/2012EP2462531A1 Method for encoded input and control by means of fingerprint
06/13/2012EP2462530A1 Portable data carrier having a decoder
06/13/2012EP2462529A1 Method for issuing a digital certificate by a certification authority, arrangement for performing the method, and computer system of a certification authority
06/13/2012EP2462507A2 Methods and apparatuses for user-verifiable trusted path in the presence of malware
06/13/2012EP2462504A1 Security element having an electronic display device for displaying security-relevant information or patterns
06/13/2012EP2368207B1 Authenticated transmission of data
06/13/2012EP1496642B1 Information processing device and method, information providing device and method, use right management device and method, recording medium, and program
06/13/2012CN202275429U 一种物流盾 One stream Shield
06/13/2012CN202275415U 隔离传输器 Isolation Transmitter
06/13/2012CN202275414U 具有静脉识别功能的平板电脑 Tablet PC has a vein recognition function
06/13/2012CN202275413U 一种兼容多种可信计算模式的可信计算系统 A variety of trusted computing in a consistent pattern of trusted computing systems
06/13/2012CN1656803B Digital rights management method and system
06/13/2012CN102498500A Method for creating biometric information for use with biometric authentication device, authentication method, and authentication device
06/13/2012CN102498493A Method for using rights to contents
06/13/2012CN102498491A Secure audit system and secure audit method
06/13/2012CN102498479A Content managing device and content managing method
06/13/2012CN102498465A Method of providing user interface of mobile terminal equipped with touch screen and mobile terminal thereof
06/13/2012CN102497479A Method for smart phone to judge Trojan programs according to application software behaviors
06/13/2012CN102497465A High-secrecy mobile information safety system and safety method for distributed secret keys
06/13/2012CN102497449A Remote updating method of software license
06/13/2012CN102497352A Method and system for increasing efficiency of floating-point type license