Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
09/2014
09/25/2014US20140289829 Computer account management system and realizing method thereof
09/25/2014US20140289828 Progressive Pictorial & Motion Based CAPTCHAs
09/25/2014US20140289808 System and method for collecting and utilizing client data for risk assessment during authentication
09/25/2014US20140289807 Resource management in a processor
09/25/2014US20140289803 Cdr filtering for virtual operators
09/25/2014US20140289796 Reconciliation of access rights in a computing system
09/25/2014US20140289789 Cloud based real time app privacy dashboard
09/25/2014US20140289626 Cloud based audio recording system
09/25/2014US20140289539 Methods and systems for storage of large data objects
09/25/2014US20140289538 Semiconductor device
09/25/2014US20140289537 Encryption system and method of encrypting a device
09/25/2014US20140289536 Device, system and method for securing and comparing genomic data
09/25/2014US20140289525 System and method for decentralized management of keys and policies
09/25/2014US20140289523 Systems and methods for authenticating and protecting the integrity of data streams and other data
09/25/2014US20140289518 Method and Apparatus for Privately and Securely Sharing Information Using Public Social or Sharing Network Infrastructure
09/25/2014US20140289517 Methods and apparatuses for securing tethered data
09/25/2014US20140289513 Enabling Comparable Data Access Control for Lightweight Mobile Devices in Clouds
09/25/2014US20140289507 Method and system for secure distribution of selected content to be protected on an appliance-specific basis with definable permitted associated usage rights for the selected content
09/25/2014US20140289271 System, method and computer program product for integrating a multi-tenant database system and a user information management application
09/25/2014US20140289105 Providing configurable pricing for execution of software images
09/25/2014US20140286623 Method for copy protection
09/25/2014US20140286487 Method for generating a one-way function
09/25/2014US20140284382 Random-type multilayer identification, and system using same
09/25/2014US20140284143 System and method to prevent the use of pirate products in an elevator control
09/25/2014DE102013207165B4 Tragbares elektronisches Gerät und Zubehörgerät dafür und Betriebsverfahren für das tragbare elektronische Gerät Portable electronic device and accessory device for and method of operating the portable electronic device
09/25/2014DE102013205166A1 Verfahren zum Erzeugen einer Einwegfunktion A method for producing a one-way function
09/24/2014EP2782376A1 Mobile terminal and method of controlling the mobile terminal
09/24/2014EP2782322A2 Method for implementing the guardianship function
09/24/2014EP2782041A1 Analysis system ensuring that sensitive data are not accessible
09/24/2014EP2782040A1 Malware Discovery Method and System
09/24/2014EP2782039A1 Program analysis/verification service provision system, control method for same, control program, control program for directing computer to function, program analysis/verification device, program analysis/verification tool management device
09/24/2014EP2782038A1 Resource management in a processor for trusted and untrusted applications
09/24/2014EP2782037A2 Method and apparatus for performing authentication between applications
09/24/2014EP2782036A1 Authentication method and system for use thereof
09/24/2014EP2782035A1 Smartcard, smartcard system and method for configuring a smartcard
09/24/2014EP2782034A1 Method and system for authentication and payment by using portable terminal
09/24/2014EP2782007A1 Launching multiple applications in containers on a processor
09/24/2014EP2782006A1 Process and system for verifying computer program on a smart card
09/24/2014EP2781986A1 Deciphering device using a cryptographic key changed at a predetermined timing
09/24/2014EP2781985A1 Deciphering device using a cryptographic key changed at a predetermined timing
09/24/2014EP2781048A1 Method, host apparatus and machine-readable storage medium for authenticating a storage apparatus
09/24/2014EP2780860A1 Method for managing public and private data input at a device
09/24/2014EP2780859A1 Computing device integrity protection
09/24/2014EP2780858A1 Methods and apparatus for anonymising user data by aggregation
09/24/2014EP2780857A1 Method of securing a computing device
09/24/2014EP2780856A1 Method for securely searching, finding, reproducing, recovering, and/or exporting electronic data
09/24/2014EP2780855A1 Method and storage device for protecting content
09/24/2014EP2780854A2 A smart card reader with a secure logging feature
09/23/2014US8844060 Method and system for USB with an integrated crypto ignition key
09/23/2014US8844058 Systems and methods for providing privacy settings for applications associated with a user profile
09/23/2014US8844057 Analyte data retriever
09/23/2014US8844056 Service provision
09/23/2014US8844054 System, method, and device for communicating and storing and delivering data
09/23/2014US8844053 Method and system for creating a protected object namespace for a WSDL resource description
09/23/2014US8844052 Double sand-boxing for flash library
09/23/2014US8844051 Method and apparatus for media relaying and mixing in social networks
09/23/2014US8844049 Method for generating a cryptographic key for a protected digital data object on the basis of current components of a computer
09/23/2014US8844048 Systems and methods for the prevention of unauthorized use and manipulation of digital content
09/23/2014US8844047 Secure programming of vehicle modules
09/23/2014US8844046 Method and apparatus for paralleling and distributing static source code security analysis using loose synchronization
09/23/2014US8844045 Methods and systems for evaluating software for known vulnerabilities
09/23/2014US8844043 Detection of vulnerabilities in computer systems
09/23/2014US8844042 System state based diagnostic scan
09/23/2014US8844038 Malware detection
09/23/2014US8844037 Information processing apparatus and method, and program
09/23/2014US8844036 Method and system for application-based policy monitoring and enforcement on a mobile device
09/23/2014US8844034 Method and apparatus for detecting and defending against CC attack
09/23/2014US8844033 Systems, methods, and media for detecting network anomalies using a trained probabilistic model
09/23/2014US8844032 Method and system for application-based policy monitoring and enforcement on a mobile device
09/23/2014US8844031 Detecting spam events in event management systems
09/23/2014US8844030 Anti-virus protection system and method thereof
09/23/2014US8844029 Risk model correcting system, risk model correcting method, and risk model correcting program
09/23/2014US8844027 Information processing apparatus and method of executing an application in the apparatus
09/23/2014US8844025 Storage device access authentication upon resuming from a standby mode of a computing device
09/23/2014US8844024 Systems and methods for using tiered signing certificates to manage the behavior of executables
09/23/2014US8844023 Password protected built-in test mode for memories
09/23/2014US8844022 Method and system to allow system-on-chip individual I/O control to be disabled and enabled by programmable non-volatile memory
09/23/2014US8844021 Providing a multi-phase lockstep integrity reporting mechanism
09/23/2014US8844016 System and method for monitoring unauthorized transport of digital content
09/23/2014US8844014 Managing access to a document-processing device using an identification token
09/23/2014US8844013 Providing third party authentication in an on-demand service environment
09/23/2014US8844012 Connecting to Wi-Fi network based off approval from another user device
09/23/2014US8844010 Aggregation of emailed product order and shipping information
09/23/2014US8844009 Resilient device authentication system
09/23/2014US8844008 Printing apparatus management system, printing apparatus management method, and printing apparatus management program
09/23/2014US8844006 Authentication of services on a partition
09/23/2014US8844005 Authentication based on user behavior
09/23/2014US8844003 Performing authentication
09/23/2014US8843996 Storage device, and authentication method and authentication device of storage device
09/23/2014US8843994 Method and system for assessing cumulative access entitlements of an entity in a system
09/23/2014US8843915 Signature-based update management
09/23/2014US8843785 Collecting debug data in a secure chip implementation
09/23/2014US8843769 Microcontroller with embedded secure feature
09/23/2014US8843768 Security-enabled storage controller
09/23/2014US8843767 Secure memory transaction unit
09/23/2014US8843766 Method and system for protecting against access to a machine code of a device
09/23/2014US8843765 Key derivation system
09/23/2014US8843763 Integrated circuit and electronic apparatus
09/23/2014US8843762 Cryptographic system for performing secure iterative computations and signal processing directly on encrypted data in untrusted environments
09/23/2014US8843761 Method and apparatus for protection of a program against monitoring flow manipulation and against incorrect program running
1 ... 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 ... 1193