Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
10/2014
10/23/2014US20140317748 Partitioning of Program Analyses into Sub-Analyses Using Dynamic Hints
10/23/2014US20140317747 Partitioning of Program Analyses into Sub-Analyses Using Dynamic Hints
10/23/2014US20140317746 System and Method for the Protection of Computers and Computer Networks Against Cyber Threats
10/23/2014US20140317745 Methods and systems for malware detection based on environment-dependent behavior
10/23/2014US20140317742 Hypervisor-based buffer overflow detection and prevention
10/23/2014US20140317734 Adaptive Observation of Behavioral Features on a Mobile Device
10/23/2014US20140317731 Executable Component Injection Utilizing Hotpatch Mechanisms
10/23/2014US20140317729 Data communication authentication system for vehicle gateway apparatus for vehicle data communication system for vehicle and data communication apparatus for vehicle
10/23/2014US20140317728 Cloud key device for data transmission via audio interface
10/23/2014US20140317727 Extensible deployment system
10/23/2014US20140317726 Device, system, and method of detecting user identity based on inter-page and intra-page navigation patterns
10/23/2014US20140317725 Image data transmission system, process and program, image data output device and image display device
10/23/2014US20140317724 Color pattern unlocking techniques for touch sensitive devices
10/23/2014US20140317723 Image pattern unlocking techniques for touch sensitive devices
10/23/2014US20140317722 Grip force sensor array for one-handed and multimodal interaction on handheld devices and methods
10/23/2014US20140317721 Secure element for a telecommunications terminal
10/23/2014US20140317715 Bluetooth enabled credit card with a large data storage volume
10/23/2014US20140317711 System and methods for weak authentication data reinforcement
10/23/2014US20140317705 Apparatus and method for managing passwords
10/23/2014US20140317698 Intelligent task assignment and authorization systems & methods
10/23/2014US20140317694 Digital content retrieval utilizing dispersed storage
10/23/2014US20140317692 Information processing unit, client terminal device, information processing system, and authentication processing method
10/23/2014US20140317686 System with a trusted execution environment component executed on a secure element
10/23/2014US20140317679 System and method for creating secure applications
10/23/2014US20140317614 Multiple System Images for Over-The-Air Updates
10/23/2014US20140317421 Data storage system and method by shredding and deshredding
10/23/2014US20140317417 Generation of working security key based on security parameters
10/23/2014US20140317416 Method for inputting accounts and passwords to computer or telecom device via an audio interface
10/23/2014US20140317415 Multi-touch methods and devices
10/23/2014US20140317406 Communication between network nodes that are not directly connected
10/23/2014US20140317396 System and method for relicensing content
10/23/2014US20140317145 Multi-identity for secure file sharing
10/23/2014US20140317144 Contextual information
10/23/2014US20140317143 Information processing apparatus, information processing method and program
10/21/2014US8869309 Dynamically reconfigurable 2D topology communication and verification scheme
10/21/2014US8869308 Computer motherboard having peripheral security functions
10/21/2014US8869307 Mobile posture-based policy, remediation and access control for enterprise resources
10/21/2014US8869305 Systems and methods for implementing password-protection policies based on physical locations of mobile devices
10/21/2014US8869301 Methods, data processing systems, and computer program products for assigning privacy levels to data elements
10/21/2014US8869300 Redirection of information from secure virtual machines to unsecure virtual machines
10/21/2014US8869299 Method and system for generating trusted security labels for electronic documents
10/21/2014US8869296 Access to user information
10/21/2014US8869295 Automated privacy enforcement
10/21/2014US8869294 Mitigating branch prediction and other timing based side channel attacks
10/21/2014US8869293 Method and apparatus for hierarchical assignment of rights to documents and documents having such rights
10/21/2014US8869292 Method and device for 3D object protection by transformation of its points
10/21/2014US8869291 Generating and storing document data
10/21/2014US8869290 Method and system for secure content distribution by a broadband gateway
10/21/2014US8869289 Software application verification
10/21/2014US8869288 Method for using time from a trusted host device
10/21/2014US8869287 Hybrid analysis of vulnerable information flows
10/21/2014US8869286 Systems and methods for analyzing client-side storage security for internet applications
10/21/2014US8869285 File server, file server log management system and file server log management method
10/21/2014US8869284 Systems and methods for evaluating application trustworthiness
10/21/2014US8869283 Resisting the spread of unwanted code and data
10/21/2014US8869281 Protecting against the introduction of alien content
10/21/2014US8869277 Realtime multiple engine selection and combining
10/21/2014US8869274 Identifying whether an application is malicious
10/21/2014US8869273 Apparatus and method for enhancing security of data on a host computing device and a peripheral device
10/21/2014US8869271 System and method for risk rating and detecting redirection activities
10/21/2014US8869270 System and method for implementing content and network security inside a chip
10/21/2014US8869269 Method and apparatus for identifying domain name abuse
10/21/2014US8869267 Analysis for network intrusion detection
10/21/2014US8869265 System and method for enforcing security policies in a virtual environment
10/21/2014US8869264 Attesting a component of a system during a boot process
10/21/2014US8869263 Wireless communications system providing mobile device authentication bypass based upon user-wearable security device and related methods
10/21/2014US8869261 Securing access to touch-screen devices
10/21/2014US8869260 Computer or microchip with a master controller connected by a secure control bus to networked microprocessors or cores
10/21/2014US8869257 Identity selector for use with a user-portable device and method of use in a user-centric identity management system
10/21/2014US8869255 Method and system for abstracted and randomized one-time use passwords for transactional authentication
10/21/2014US8869254 User verification using voice based password
10/21/2014US8869253 Electronic system for securing electronic services
10/21/2014US8869252 Methods, apparatuses, and computer program products for bootstrapping device and user authentication
10/21/2014US8869251 Remote provision of consistent one-time password functionality for disparate on-line resources
10/21/2014US8869250 Providing secure dynamic role selection and managing privileged user access from a client device
10/21/2014US8869249 Protecting information on a computer system using multiple authentication methods
10/21/2014US8869246 Mask based challenge response test
10/21/2014US8869245 Device reputation
10/21/2014US8869244 Techniques for providing role-based access control using dynamic shared accounts
10/21/2014US8869243 Authenticating user sessions based on reputation of user locations
10/21/2014US8869242 Authentication in heterogeneous IP networks
10/21/2014US8869241 Network acquired behavioral fingerprint for authentication
10/21/2014US8869239 Method and system for rendering composite view of an application
10/21/2014US8869237 Method and system for propagating network policy
10/21/2014US8869236 Automatic configuration of a network device
10/21/2014US8869235 Secure mobile browser for protecting enterprise data
10/21/2014US8869233 Policy management within a network management system
10/21/2014US8869144 Managing forwarding of input events in a virtualization environment to prevent keylogging attacks
10/21/2014US8869142 Secure content publishing and distribution
10/21/2014US8869040 Application sharing security
10/21/2014US8869024 Monitoring a background process in a web browser and providing status of same
10/21/2014US8868973 Automating diagnoses of computer-related incidents
10/21/2014US8868933 Persistent servicing agent
10/21/2014US8868932 Apparatus for selecting and displaying a file associated with a current geographic location
10/21/2014US8868931 System and method of security function activation for a mobile electronic device
10/21/2014US8868929 Method of mass storage memory management for large capacity universal integrated circuit cards
10/21/2014US8868928 System and method that uses cryptographic certificates to define groups of entities
10/21/2014US8868925 Method and apparatus for the secure processing of confidential content within a virtual machine of a processor
10/21/2014US8868923 Multi-factor authentication
10/21/2014US8868922 Wireless authorization mechanism for mobile devices and data thereon
1 ... 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 ... 1193