Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
09/2014
09/30/2014US8850564 Printing system and image forming apparatus
09/30/2014US8850563 Portable computer accounts
09/30/2014US8850562 Authorization logic in memory constrained security device
09/30/2014US8850561 Associating operating system native authorizations with console roles
09/30/2014US8850559 Security method of a portable device
09/30/2014US8850558 Controlling access to a process using a separate hardware device
09/30/2014US8850557 Processor and data processing method with non-hierarchical computer security enhancements for context states
09/30/2014US8850556 Interactive video captcha
09/30/2014US8850554 Method and apparatus for providing an authentication context-based session
09/30/2014US8850551 Information processing system control method, intermediate service device, authentication method, and storage medium
09/30/2014US8850550 Using cached security tokens in an online service
09/30/2014US8850549 Methods and systems for controlling access to resources and privileges per process
09/30/2014US8850548 User-portable device and method of use in a user-centric identity management system
09/30/2014US8850546 Privacy-preserving user attribute release and session management
09/30/2014US8850545 Systems and methods for securing network communications
09/30/2014US8850543 Hardware-based device authentication
09/30/2014US8850541 Visual authentication and authorization for mobile devices
09/30/2014US8850539 Adaptive policies and protections for securing financial transaction data at rest
09/30/2014US8850536 Methods and systems for identity verification in a social network using ratings
09/30/2014US8850535 Methods and systems for identity verification in a social network using ratings
09/30/2014US8850533 Multi-level authentication for medical data access
09/30/2014US8850532 Systems and methods to control access to multimedia content
09/30/2014US8850530 Enterprise-wide security system for computer devices
09/30/2014US8850529 Communication apparatus, communication apparatus system, and method controlling relay apparatus
09/30/2014US8850528 Organizing permission associated with a cloud customer in a virtual computing infrastructure
09/30/2014US8850526 Online protection of information and resources
09/30/2014US8850524 Methods of resetting passwords in network service systems including user redirection and related systems and computer-program products
09/30/2014US8850520 Dual cookie security system with interlocking validation requirements and remedial actions to protect personal data
09/30/2014US8850519 Methods and systems for graphical image authentication
09/30/2014US8850517 Runtime risk detection based on user, application, and system action sequence correlation
09/30/2014US8850515 Method and apparatus for subject recognition session validation
09/30/2014US8850514 Cartridges in a multi-tenant platforms-as-a-service (PaaS) system implemented in a cloud computing environment
09/30/2014US8850513 System for data flow protection and use control of applications and portable devices configured by location
09/30/2014US8850433 Compliance-based adaptations in managed virtual systems
09/30/2014US8850428 User transparent virtualization method for protecting computer programs and data from hostile code
09/30/2014US8850385 System for supporting collaborative activity
09/30/2014US8850232 Method for protecting a cryptographic module and a device having cryptographic module protection capabilities
09/30/2014US8850231 Data encryption using a key and moniker for mobile storage media adapted for library storage
09/30/2014US8850230 Cloud-based movable-component binding
09/30/2014US8850229 Apparatus for generating a decryption key for use to decrypt a block of encrypted instruction data being fetched from an instruction cache in a microprocessor
09/30/2014US8850228 Computing device and method for controlling access to driver programs
09/30/2014US8850227 Cryptographic operations using a key hierarchy
09/30/2014US8850225 Method and system for cryptographic processing core
09/30/2014US8850224 Media-following encryption policy control
09/30/2014US8850223 Method and system for hard disk emulation and cryptographic acceleration on a blade server
09/30/2014US8850221 Protection against side channel attacks with an integrity check
09/30/2014US8850220 Method and apparatus with chipset-based protection for local and remote authentication of booting from peripheral devices
09/30/2014US8850219 Secure communications
09/30/2014US8850218 OTP generation using a camouflaged key
09/30/2014US8850217 Method and apparatus for parental control of wireless broadcast content
09/30/2014US8850216 Client device and media client authentication mechanism
09/30/2014US8850215 Method of access control and corresponding device
09/30/2014US8850212 Extending an integrity measurement
09/30/2014US8850211 Method and apparatus for improving code and data signing
09/30/2014US8850207 Data recording device, and method of processing data recording device
09/30/2014US8850201 System, apparatus, and method for digital distribution
09/30/2014US8850195 Tethered device systems and methods
09/30/2014US8850193 Secure system for allowing the execution of authorized computer program code
09/30/2014US8850192 Apparatus and method for using contents information in digital rights management
09/30/2014US8850191 Scalable groups of authenticated entities
09/30/2014US8850185 Post attack man-in-the-middle detection
09/30/2014US8850184 Transmission management apparatus, program, transmission management system, and transmission management method
09/30/2014US8850183 Interconnect device to enable compliance with rights management restrictions
09/30/2014US8850178 Method and apparatus for establishing safe processor operating points
09/30/2014US8850177 System and method for validating components during a booting process
09/30/2014US8850150 Managing security in solid-state devices
09/30/2014US8850149 Information processing apparatus, control method of the information processing apparatus and program
09/30/2014US8850135 Secure software installation
09/30/2014US8850047 Access control method, access control apparatus, and access control program
09/30/2014US8850044 Obfuscating identity of a source entity affiliated with a communique in accordance with conditional directive provided by a receiving entity
09/30/2014US8850009 System and method employing an agile network protocol for secure communications using secure domain names
09/30/2014US8849968 Secure and stable hosting of third-party extensions to web services
09/30/2014US8849960 Non-invasive method and system for automated administration of diverse security constrained servers
09/30/2014US8849892 Method and system for brokering messages in a distributed system
09/30/2014US8849858 Analyzing activity data of an information management system
09/30/2014US8849857 Techniques for performing data loss prevention
09/30/2014US8849848 Associating security trimmers with documents in an enterprise search system
09/30/2014US8849836 Method for measuring similarity of diverse binary objects comprising bit patterns
09/30/2014US8849831 System and method for efficient indexing of messages in a law enforcement data network
09/30/2014US8849819 System and method for controlling and organizing metadata associated with on-line content
09/30/2014US8849770 Event auditing framework
09/30/2014US8849720 Entertainment event ticket purchase and exchange system
09/30/2014US8849719 Providing content to a portable playback device
09/30/2014US8849718 Medical data encryption for communication over a vulnerable system
09/30/2014US8849717 Methods and systems for upgrade and synchronization of securely installed applications on a computing device
09/30/2014US8849716 System and method for preventing identity theft or misuse by restricting access
09/30/2014US8849698 Exchanging identifiers between wireless communication to determine further information to be exchanged or further services to be provided
09/30/2014US8849519 Method and apparatus for vehicle hardware theft prevention
09/30/2014US8848922 Distributed encryption key management
09/30/2014US8848921 Group key management approach based on linear geometry
09/30/2014US8848918 Method and system for deleting data
09/30/2014US8848917 Verification of the integrity of a ciphering key
09/30/2014US8848914 Spectrum authorization and related communications methods and apparatus
09/30/2014US8848908 Image processing apparatus and control method thereof
09/30/2014US8848237 Wireless scanning device and method for scanning and transmitting scan data
09/30/2014US8848215 Method and system for printing documents from a portable device
09/30/2014US8847985 Protecting screen information
09/30/2014US8847733 Methods, systems, and computer-readable storage media for managing risk using location, mobile, and user participating-based identity verification
09/30/2014US8845424 Hand-held gaming device with configurable touch sensitive panel(s)
09/30/2014US8845422 Remote login for a wagering game machine
1 ... 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 ... 1193