Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
09/2014
09/30/2014CA2741250C Biometric assurance device and method
09/30/2014CA2726777C A web-based system for collaborative generation of interactive videos
09/30/2014CA2724292C An in-circuit security system and methods for controlling access to and use of sensitive data
09/30/2014CA2688204C System and method for access control in a portable electronic device
09/30/2014CA2646616C Method and apparatus for secure management of debugging processes within communication devices
09/30/2014CA2509925C Tamper switch actuator arrangement
09/30/2014CA2441244C Method and system for providing advice and services to consumers
09/25/2014WO2014153452A1 Secure electronic lock
09/25/2014WO2014153376A1 Group co-ownership of internet-accessible resources
09/25/2014WO2014153332A1 Key refresh between trusted units
09/25/2014WO2014153295A1 Providing a market for digital goods
09/25/2014WO2014153176A1 System and method for extracting and preserving metadata for analyzing network communications
09/25/2014WO2014153175A1 Secure medium with detectable and authentication elements
09/25/2014WO2014153067A1 System, method and computer-accessible medium for facilitating logic encryption
09/25/2014WO2014152469A1 Unsupervised anomaly-based malware detection using hardware features
09/25/2014WO2014152079A1 Validating normalized code representations
09/25/2014WO2014151946A1 Flavored frozen beverage dispenser
09/25/2014WO2014151929A1 Personal authentication apparatus system and method
09/25/2014WO2014151890A1 Securely transferring authentication information
09/25/2014WO2014151870A1 Pressure wire detection and communication protocol for use with medical measurement systems
09/25/2014WO2014151556A1 Systems and methods for using imaging to authenticate online users
09/25/2014WO2014151539A1 Online privacy management
09/25/2014WO2014151256A1 Certificate based profile confirmation
09/25/2014WO2014151240A1 Application program as key for authorizing access to resources
09/25/2014WO2014151235A1 Secondary device as key for authorizing access to resources
09/25/2014WO2014151227A1 Delegating authorization to applications on a client device in a networked environment
09/25/2014WO2014151205A1 Incremental compliance remediation
09/25/2014WO2014151195A1 Controlled application distribution
09/25/2014WO2014151038A1 Mutually assured data sharing between distrusting parties in a network environment
09/25/2014WO2014151020A1 Wireless data privacy maintained through a social network
09/25/2014WO2014150787A1 Detecting the introduction of alien content
09/25/2014WO2014150535A1 Personal digital identity device
09/25/2014WO2014150517A1 Techniques for predicting and protecting spearphishing targets
09/25/2014WO2014150478A1 System and method for managing and diagnosing a computing device equipped with unified extensible firmware interface (uefi)-compliant firmware
09/25/2014WO2014150271A1 Application licensing for a centralized system of medical devices
09/25/2014WO2014150236A1 Method, apparatus, system, and computer readable medium for providing apparatus security
09/25/2014WO2014150129A1 Method and apparatus to effect re-authentication
09/25/2014WO2014150064A1 Privacy preserving knowledge/factor possession tests for persistent authentication
09/25/2014WO2014150054A1 Method and apparatus for requesting and providing access to information associated with an image
09/25/2014WO2014149799A1 A multi-ring encryption approach to securing a payload using hardware modules
09/25/2014WO2014149644A1 Method and apparatus for embedding secret information in digital certificates
09/25/2014WO2014149627A1 Generic unpacking of applications for malware detection
09/25/2014WO2014149624A1 Linear address mapping protection
09/25/2014WO2014149623A1 Peer-aware self-regulation for virtualized environments
09/25/2014WO2014149563A1 Enhanced security for hardware decoder accelerator
09/25/2014WO2014149490A1 Secure end-to-end permitting system for device operations
09/25/2014WO2014149372A1 Systems and methods for cryptographic security as a service
09/25/2014WO2014149225A1 Operating a computer with a touchscreen
09/25/2014WO2014149082A1 Self-healing video surveillance system
09/25/2014WO2014149034A1 Interconnect assembly
09/25/2014WO2014148959A1 Method, computer program and node for distribution of sensor data
09/25/2014WO2014148935A1 Method for protecting the machine code and immutable data of a program from modification
09/25/2014WO2014148769A1 Method for strengthening service security function
09/25/2014WO2014148593A1 Portable terminal, information management system, information management device, information management method, program, and storage medium
09/25/2014WO2014148575A1 Consumer device, control apparatus, and control method
09/25/2014WO2014147858A1 Three-dimensional unlocking device, three-dimensional unlocking method and program
09/25/2014WO2014147836A1 Maintenance and replacement method for encryption function in storage system, and storage device
09/25/2014WO2014147748A1 Code processing device and program
09/25/2014WO2014147741A1 Program, information processing device, and update method
09/25/2014WO2014147713A1 Electronic device and authentication control method
09/25/2014WO2014147710A1 Terminal device, startup control method, and program
09/25/2014WO2014147618A1 Accelerating a clock system to identify malware
09/25/2014WO2014147602A1 Video player for monetary transactions
09/25/2014WO2014147304A1 Method for inputting a secure password, sheet, set of sheets, input unit, and uses thereof
09/25/2014WO2014147297A1 Transaction authorization method and system
09/25/2014WO2014147077A1 Method and device for generating protected data, method and device for retrieving watermarked source data and computer program corresponding thereto
09/25/2014WO2014146895A1 Updating of a digital device certificate of an automation device
09/25/2014WO2014146684A1 An authentication system and method
09/25/2014WO2014146562A1 Method, device and terminal for scanning virus
09/25/2014WO2014146527A1 Method and device for intercepting embedded information in application program
09/25/2014WO2014146499A1 Method and apparatus for protecting files in real time
09/25/2014WO2014146198A1 Systems and methods for intercepting, processing, and protecting user data through web application pattern detection
09/25/2014US20140289875 Method and system for ensuring sensitive data are not accessible
09/25/2014US20140289874 Integrated circuit (ic) chip and method of verifying data thereof
09/25/2014US20140289873 System and method for automated licensing identification and verification
09/25/2014US20140289872 Data sharing control method and data sharing control terminal
09/25/2014US20140289870 Apparatus and methods for obtaining a password hint
09/25/2014US20140289867 Automatic Learning Multi-Modal Fraud Prevention (LMFP) System
09/25/2014US20140289866 Method and system for mobile operating system takeover
09/25/2014US20140289864 Method and apparatus for securing a computer
09/25/2014US20140289863 Filter for a distributed network
09/25/2014US20140289862 Systems and methods for managing data assets associated with peer-to-peer networks
09/25/2014US20140289861 System and method for provisioning license keys
09/25/2014US20140289860 System and method for terminating copyright infringment by bittorrent users
09/25/2014US20140289859 Mobile application security score calculation
09/25/2014US20140289858 Antivirus scan during a data scrub operation
09/25/2014US20140289857 Computer virus protection
09/25/2014US20140289856 Method and Device for Optimizing and Configuring Detection Rule
09/25/2014US20140289852 Systems and methods for remote monitoring, security, diagnostics, and prognostics
09/25/2014US20140289851 Malware Discovery Method and System
09/25/2014US20140289849 Application selection using current detection intelligence
09/25/2014US20140289848 Method for classifying packing algorithms using entropy analysis
09/25/2014US20140289847 Systems and methods for scalable network monitoring
09/25/2014US20140289846 Facilitating review of access rights in a computing system
09/25/2014US20140289845 Security Token, Data Processing System and Method of Processing Data
09/25/2014US20140289844 Smartcard, Smartcard System and Method for Configuring a Smartcard
09/25/2014US20140289843 Method of unlocking electronic device by displaying unlocking objects at randomized/user-defined locations and related computer readable medium thereof
09/25/2014US20140289842 System and method for user enrollment in a secure biometric verification system
09/25/2014US20140289841 Authentication processing device for performing authentication processing
09/25/2014US20140289835 Devices, Systems and Methods for Security Using Magnetic Field Based Identification
1 ... 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 ... 1193