Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
11/2014
11/06/2014US20140331043 Electro device for protecting user's privacy and method for controlling thereof
11/06/2014US20140331038 Methods for firmware signature
11/06/2014US20140331009 Selectively securing a hot-swappable data storage device to prevent data corruption
11/06/2014US20140330869 Secure isolation of tenant resources in a multi-tenant storage system using a security gateway
11/06/2014US20140330856 Fine-grained relational database access-control policy enforcement using reverse queries
11/06/2014US20140330824 System and method for storing and sharing images
11/06/2014US20140330726 Smart card with verification means
11/06/2014US20140328483 Method for producing a hardware device and hardware device
11/06/2014US20140328407 Processing system with register arbitration and methods for use therewith
11/04/2014US8881309 Systems for finding a lost transient storage device
11/04/2014US8881308 Method to enable development mode of a secure electronic control unit
11/04/2014US8881307 Electronic file security management platform
11/04/2014US8881306 Architecture system for in-store reading
11/04/2014US8881304 Method of controlled access to content
11/04/2014US8881303 System and method for executing web services
11/04/2014US8881300 Automated detection of flaws and incompatibility problems in information flow downgraders
11/04/2014US8881299 Dynamic community generator
11/04/2014US8881298 System for preventing unauthorized acquisition of information and method thereof
11/04/2014US8881297 Access arbitration module and system for semiconductor fabrication equipment and methods for using and operating the same
11/04/2014US8881294 Methods and systems for securely uploading files onto aircraft
11/04/2014US8881293 Static application security testing
11/04/2014US8881292 Evaluating whether data is safe or malicious
11/04/2014US8881291 System and method for inhibiting the processing of new code modules by an outdated runtime environment
11/04/2014US8881290 Method and apparatus for computer code obfuscation and deobfuscation using boot installation
11/04/2014US8881289 User behavioral risk assessment
11/04/2014US8881288 Graphical models for cyber security analysis in enterprise networks
11/04/2014US8881286 Clustering processing method and device for virus files
11/04/2014US8881285 Method and system for content distribution network security
11/04/2014US8881283 System and method of malware sample collection on mobile networks
11/04/2014US8881282 Systems and methods for malware attack detection and identification
11/04/2014US8881281 Application and network abuse detection with adaptive mitigation utilizing multi-modal intelligence data
11/04/2014US8881278 System and method for detecting malicious content
11/04/2014US8881276 Dynamically generated whitelist for high throughput intrusion prevention system (IPS) functionality
11/04/2014US8881274 Method for providing data to a personal portable device via network and a system thereof
11/04/2014US8881273 Device reputation management
11/04/2014US8881272 System and method for selecting and applying filters for intrusion protection system within a vulnerability management system
11/04/2014US8881271 System and method for forensic identification of elements within a computer system
11/04/2014US8881270 Method and apparatus for selectively enabling a microprocessor-based system
11/04/2014US8881269 Device, method, and graphical user interface for integrating recognition of handwriting gestures with a screen reader
11/04/2014US8881268 Secure area for apps
11/04/2014US8881267 Systems and methods for supporting pre-boot log in
11/04/2014US8881266 Enterprise password reset
11/04/2014US8881264 Method for controlling the execution of an applet for an IC card
11/04/2014US8881263 Location-based security system for portable electronic device
11/04/2014US8881262 Image processing apparatus and user authentication method for image processing apparatus
11/04/2014US8881256 Portable access to auditing information
11/04/2014US8881255 Selection of access conditions for portable tokens
11/04/2014US8881253 Method and apparatus for accepting a digital identity of a user based on transitive trust among parties
11/04/2014US8881252 System and method for physical access control
11/04/2014US8881251 Electronic authentication using pictures and images
11/04/2014US8881249 Scalable and automated secret management
11/04/2014US8881248 Service provider access
11/04/2014US8881244 Authorizing computing resource access based on calendar events in a networked computing environment
11/04/2014US8881240 Method and apparatus for automatically administrating access rights for confidential information
11/04/2014US8881239 Method and apparatus for securing transactions using verified resource locations
11/04/2014US8881237 Method and system for managing security in mobile communication system
11/04/2014US8881232 Visualization of access permission status
11/04/2014US8881230 Secure social web orchestration via a security model
11/04/2014US8881229 Policy-based application management
11/04/2014US8881228 Providing a managed browser
11/04/2014US8881227 Secure web container for a secure online user environment
11/04/2014US8881224 Method and system for providing masking services
11/04/2014US8881223 Enterprise security assessment sharing for off-premise users using globally distributed infrastructure
11/04/2014US8881137 Creating a relatively unique environment for computing platforms
11/04/2014US8881119 Computer program product containing instructions for providing a processor the capability of executing an application derived from a compiled form
11/04/2014US8881118 Computer program product containing instructions for providing a processor the capability of executing an application derived from a compiled form
11/04/2014US8881092 Stack or project extensibility and certification for stacking tool
11/04/2014US8881006 Managing digital signatures
11/04/2014US8880993 Handling unexpected responses to script executing in client-side application
11/04/2014US8880954 Temperature-profiled device fingerprint generation and authentication from power-up states of static cells
11/04/2014US8880906 Storing encrypted contents in digital archives
11/04/2014US8880905 Methods for processing private metadata
11/04/2014US8880904 System and method for securing data
11/04/2014US8880903 Removable drive with data encryption
11/04/2014US8880902 Microprocessor that securely decrypts and executes encrypted instructions
11/04/2014US8880900 Memory system
11/04/2014US8880898 Anti-roll-back mechanism for counter
11/04/2014US8880897 Method and apparatus for incremental code signing
11/04/2014US8880895 Methods, systems, and computer program products for recovering a password using user-selected third party authorization
11/04/2014US8880893 Enterprise information asset protection through insider attack specification, monitoring and mitigation
11/04/2014US8880890 Write accessibility for electronic paper
11/04/2014US8880889 Systems and methods for remote authorization of financial transactions using public key infrastructure (PKI)
11/04/2014US8880884 System and method for enabling seamless transfer of a secure session
11/04/2014US8880883 Secure end-to-end permitting system for device operations
11/04/2014US8880879 Accelerated cryptography with an encryption attribute
11/04/2014US8880875 System, apparatus and method for decentralizing attribute-based encryption information
11/04/2014US8880874 Automated computer biometric identity assurance
11/04/2014US8880872 System, method and program product for consolidated authentication
11/04/2014US8880866 Method and system for disabling communication paths in a multiprocessor fabric by setting register values to disable the communication paths specified by a configuration
11/04/2014US8880859 Method and arrangement for configuring electronic devices
11/04/2014US8880827 Method for executing security-relevant and non-security-relevant software components on a hardware platform
11/04/2014US8880826 System and method for write once read many (WORM) storage in an information handling system
11/04/2014US8880776 Data access at a storage device using cluster information
11/04/2014US8880773 Guaranteeing deterministic bounded tunable downtime for live migration of virtual machines over reliable channels
11/04/2014US8880736 Methods and systems for archiving and restoring securely installed applications on a computing device
11/04/2014US8880731 Method, system and device for controlling and/or limiting electronic communication
11/04/2014US8880693 Network service provider-assisted authentication
11/04/2014US8880692 Method of cascading transfer of authorization rights for file access
11/04/2014US8880667 Self regulation of the subject of attestation
11/04/2014US8880643 Method, device and system for forwarding document content in extensible markup language document management
1 ... 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 ... 1193