Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
10/2014
10/28/2014US8875282 Accessing a processing device
10/28/2014US8875281 Methods and systems for using derived user accounts
10/28/2014US8875280 Protecting an electronic device against unathorized hardware use
10/28/2014US8875279 Passwords for touch-based platforms using time-based finger taps
10/28/2014US8875273 Code domain isolation
10/28/2014US8875272 Firewall for controlling connections between a client machine and a network
10/28/2014US8875271 Executing unsigned content and securing access in a closed system
10/28/2014US8875270 ID authentication system, ID authentication method, and non-transitory computer readable medium storing ID authentication program
10/28/2014US8875267 Active learning-based fraud detection in adaptive authentication systems
10/28/2014US8875266 System and methods for enforcing software license compliance with virtual machines
10/28/2014US8875264 System, method and program for off-line two-factor user authentication
10/28/2014US8875263 Controlling a soft token running within an electronic apparatus
10/28/2014US8875262 Method and apparatus for secure communication between mobile devices
10/28/2014US8875261 Rules driven multiple passwords
10/28/2014US8875260 Serialized authentication and authorization services
10/28/2014US8875259 On-demand service security system and method for managing a risk of access as a condition of permitting access to the on-demand service
10/28/2014US8875258 Constraining a login to a subset of access rights
10/28/2014US8875257 Restricting mature content
10/28/2014US8875256 Data flow processing in a network environment
10/28/2014US8875255 Preventing user enumeration by an authentication server
10/28/2014US8875250 Method and system for authenticating an end user
10/28/2014US8875249 Minimum lifespan credentials for crawling data repositories
10/28/2014US8875248 Automatic resource ownership assignment system and method
10/28/2014US8875247 Instant personalization security
10/28/2014US8875246 Automatic resource ownership assignment system and method
10/28/2014US8875245 Authority delegating system, authority delegating method, authentication apparatus, information processing apparatus, control method, and computer-readable medium
10/28/2014US8875244 Method and apparatus for authenticating a user using dynamic client-side storage values
10/28/2014US8875241 Optical media protection driver
10/28/2014US8875240 Tenant data center for establishing a virtual machine in a cloud environment
10/28/2014US8875239 Cognitive pattern recognition for security access in a flow of tasks
10/28/2014US8875229 Quantifying risk based on relationships and applying protections based on business rules
10/28/2014US8875226 High assurance classification level disambiguation for displays
10/28/2014US8875225 Method, apparatus and system for obtaining user information
10/28/2014US8875224 Access control in data processing system
10/28/2014US8875221 Policy management apparatus, policy management system, and method and program used for the same
10/28/2014US8875220 Proxy-based network access protection
10/28/2014US8875219 Apparatus and method for controlled sharing of personal information
10/28/2014US8875218 Deploying policies and allowing off-line policy evaluations
10/28/2014US8875182 Data broadcast processing device, method and program having features that prevent simultaneous execution of imcompatible processes
10/28/2014US8875139 Method and process for tracking documents by monitoring each document's electronic processing status and physical location
10/28/2014US8875112 Implementing portable content protection to secure secrets
10/28/2014US8875090 Method and system for monitoring metadata related to software artifacts
10/28/2014US8874938 Program execution device
10/28/2014US8874937 Fuel dispenser user interface
10/28/2014US8874936 Terminal device, verification device, key distribution device, content playback method, key distribution method, and recording medium
10/28/2014US8874933 Instruction set for SHA1 round processing on 128-bit data paths
10/28/2014US8874932 Method for order invariant correlated encrypting of data and SQL queries for maintaining data privacy and securely resolving customer defects
10/28/2014US8874931 System and method for securing a user interface
10/28/2014US8874930 Graph encryption
10/28/2014US8874928 System and method for obfuscating constants in a computer program
10/28/2014US8874927 Application execution system and method of terminal
10/28/2014US8874926 Increasing security in inter-chip communication
10/28/2014US8874925 Systems and methods to scan memory for a threat
10/28/2014US8874922 Systems and methods for multi-layered authentication/verification of trusted platform updates
10/28/2014US8874920 Verifying cryptographic signature from stored primitives of previously received signature
10/28/2014US8874919 Apparatus and method of a portable terminal authenticating another portable terminal
10/28/2014US8874916 Introduction of discrete roots of trust
10/28/2014US8874912 Systems and methods for securely transferring personal identifiers
10/28/2014US8874911 Terminal device, system, connection management server, and computer readable medium
10/28/2014US8874909 System and method of storing data
10/28/2014US8874908 Process for storing data on a central server
10/28/2014US8874906 Launching a secure kernel in a multiprocessor system
10/28/2014US8874905 Resource restriction systems and methods
10/28/2014US8874902 Methods and systems for distributing cryptographic data to authenticated recipients
10/28/2014US8874901 Authentication of data streaming service
10/28/2014US8874899 Premium services authentication
10/28/2014US8874896 Secure processing systems and methods
10/28/2014US8874892 Assessing BIOS information prior to reversion
10/28/2014US8874891 Systems and methods for activation of applications using client-specific data
10/28/2014US8874823 Systems and methods for managing data input/output operations
10/28/2014US8874791 Automatically reconnecting a client across reliable and persistent communication sessions
10/28/2014US8874768 Methods for providing security over untrusted networks
10/28/2014US8874706 Quarantine tool
10/28/2014US8874625 Method, apparatus and system for accessing remote files
10/28/2014US8874579 Systems and methods for identifying associations between malware samples
10/28/2014US8874487 Software wrapper having use limitation within a geographic boundary
10/28/2014US8874486 Method and system to detect invalid and fraudulent impressions and clicks in web-based advertisement systems
10/28/2014US8874485 Privacy-preserving behavior targeting for digital coupons
10/28/2014US8874484 Method and system for distributing intelligent content
10/28/2014US8874483 Gated unlock codes for videogame features and content
10/28/2014US8873934 CPS unit management in the disc for downloaded data
10/28/2014US8873814 System and method for using fingerprint sequences for secured identity verification
10/28/2014US8873751 Extending data confidentiality into a player application
10/28/2014US8873750 Instruction for performing a pseudorandom number generate operation
10/28/2014US8873747 Key management using security enclave processor
10/28/2014US8873745 Protection of a calculation on an elliptic curve
10/28/2014US8873744 Electronic document processing system
10/28/2014US8873619 Codec encoder and decoder for video information
10/28/2014US8873544 Digital telecommunications system, program product for, and method of managing such a system
10/28/2014US8872835 Prevention of DoS attack by a rogue graphics application
10/28/2014US8872617 Data-processing device and data-processing program with bio-authorization function
10/28/2014US8872047 Anti-prying encrypted keyboard
10/28/2014US8870971 Method and apparatus for protecting data in a portable electronic device
10/23/2014US20140317764 Information communication apparatus
10/23/2014US20140317759 Method and apparatus for processing document in touch-sensitive device
10/23/2014US20140317758 Focused personal identifying information redaction
10/23/2014US20140317757 USB drive with multiple printed circuit board layers for storing data in a memory
10/23/2014US20140317756 Anonymization apparatus, anonymization method, and computer program
10/23/2014US20140317755 Method and apparatus for making system constraint of a specified permission in the digital rights management
10/23/2014US20140317749 Systems and methods for automating blind detection of computational vulnerabilities
1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 ... 1193