Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
09/2014
09/23/2014US8843760 Biometric identification method
09/23/2014US8843759 Methods, systems, and computer program products for media-based authentication
09/23/2014US8843758 Migrating authenticated content towards content consumer
09/23/2014US8843757 One time PIN generation
09/23/2014US8843756 Image processing apparatus and image processing method
09/23/2014US8843755 User authentication
09/23/2014US8843754 Continuous user identification and situation analysis with identification of anonymous users through behaviormetrics
09/23/2014US8843753 Machine-to-machine node erase procedure
09/23/2014US8843751 IP address delegation
09/23/2014US8843745 Methods of authorizing a computer license
09/23/2014US8843742 Hypervisor security using SMM
09/23/2014US8843734 Protecting information using policies and encryption
09/23/2014US8843732 Mechanism for detecting a no-processor swap condition and modification of high speed bus calibration during boot
09/23/2014US8843647 Systems and methods for application server self-service console
09/23/2014US8843643 System and method employing an agile network protocol for secure communications using secure domain names
09/23/2014US8843567 Managing electronic messages
09/23/2014US8843552 System, method and computer program for conducting transactions remotely
09/23/2014US8843520 Document management system and method that detects presence of user inaccessible files and folders, and computer-readable medium storing a computer program for implementing the method
09/23/2014US8843516 Internet security
09/23/2014US8843461 Data archiving system
09/23/2014US8843444 Systems and methods to determine security holes of a backup image
09/23/2014US8843422 Cloud anomaly detection using normalization, binning and entropy determination
09/23/2014US8843415 Secure software service systems and methods
09/23/2014US8843414 Techniques for accessing controlled media objects
09/23/2014US8843413 Binding content to a domain
09/23/2014US8843412 Validating system property requirements for use of software applications
09/23/2014US8843141 Computer, internet and telecommunications based network
09/23/2014US8843109 Device with a communication module that performs wireless communication using unique information, method for controlling the device, and computer-readable recording medium having program for controlling the device recorded thereon
09/23/2014US8843065 Method and device for managing information exchange between for example a NFC controller and a set of at least two secure elements
09/23/2014US8843057 Physical presence digital authentication system
09/23/2014US8842887 Method and system for combining a PIN and a biometric sample to provide template encryption and a trusted stand-alone computing device
09/23/2014US8842837 Method and apparatus for providing seamless file system encryption from a pre-boot environment into a firmware interface aware operating system
09/23/2014US8842836 System for and method of cryptographic provisioning
09/23/2014US8842831 Authentication of an RFID tag using an asymmetric cryptography method
09/23/2014US8842825 Data encoding apparatus, data encoding method, data encoding program, and recording medium
09/23/2014US8842823 Technique for determining usage of encrypted media content
09/23/2014US8842326 Image processing device
09/23/2014US8842314 Image processing apparatus capable of wirelessly exchanging data, image processing method capable of wirelessly exchanging data, and image processing program capable of wirelessly exchanging data
09/23/2014US8842311 Electronic apparatus, image forming apparatus, and security level management method
09/23/2014US8842310 Method and system for establishing secure communications between a multifunction device and a mobile communications device
09/23/2014US8842307 Authentication apparatus, authentication system, authentication method, and recording medium having authentication program recorded thereon
09/23/2014US8842018 Systems and methods for tracking insertion and removal cycles of optical transceiver modules
09/23/2014CA2712694C Method and apparatus for controlling access to a computing device
09/23/2014CA2611043C System and method for locking and unlocking access to an electronic device
09/22/2014CA2846795A1 Method and system ensuring sensitive data are not accessible
09/20/2014CA2810044A1 Method and apparatus for restricting the operation of usb devices
09/18/2014WO2014145805A1 System and method employing structured intelligence to verify and contain threats at endpoints
09/18/2014WO2014145626A1 Cloud forensics
09/18/2014WO2014145597A2 Systems and methods for identifying electronic equipment among a plurality of electronic equipment in an environment
09/18/2014WO2014145186A1 Methods and apparatus for securing user input in a mobile device
09/18/2014WO2014145039A1 Intra-computer protected communications between applications
09/18/2014WO2014144961A1 Establishing trust between applications on a computer
09/18/2014WO2014144939A1 Security services management for computer applications by modifying their object code
09/18/2014WO2014144857A2 Systems, methods, and apparatus to enhance the integrity assessment when using power fingerprinting systems for computer-based systems
09/18/2014WO2014144808A1 System and method for secure application communication between networked processors
09/18/2014WO2014144700A1 Systems and methods for identifying a secure application when connecting to a network
09/18/2014WO2014144602A1 Reducing authentication confidence over time based on user history
09/18/2014WO2014144483A1 Managing policy and permissions profiles
09/18/2014WO2014144246A1 Cyber security
09/18/2014WO2014144159A1 Waterproof mobile device case
09/18/2014WO2014144114A1 Systems, methods and apparatus for monitoring online activity and storing and displaying information concerning the online activity
09/18/2014WO2014143912A2 Method and system providing mutli-level security to gate level information flow
09/18/2014WO2014143904A1 Method and system for integrated color storage management
09/18/2014WO2014143859A1 Accessing a cloud-based service using a communication device linked to another communication device storing the required password
09/18/2014WO2014143756A1 Online transaction verification
09/18/2014WO2014143671A1 Method, apparatus, system, and computer readable medium to provide secure operation
09/18/2014WO2014143645A1 Generation of one time use login pairs via a secure mobile communication device for login on an unsecure communication device
09/18/2014WO2014143588A1 Dynamically loaded measured environment for secure code launch
09/18/2014WO2014143514A1 System and method for database searching
09/18/2014WO2014143356A1 Specifying applications to share in a shared access mode
09/18/2014WO2014143355A1 Switching a mobile device from operating in a primary access mode to a secondary access mode
09/18/2014WO2014143354A1 Mobile computing device with multiple access modes
09/18/2014WO2014143134A1 Parental control method and apparatus for media service system
09/18/2014WO2014143070A1 Efficient prevention of fraud
09/18/2014WO2014143047A1 Computing device security
09/18/2014WO2014143029A1 Generic privilege escalation prevention
09/18/2014WO2014143012A1 Remote malware remediation
09/18/2014WO2014143009A1 Key revocation in system on chip devices
09/18/2014WO2014143005A1 Hypervisor-based buffer overflow detection and prevention
09/18/2014WO2014143000A1 Server-assisted anti-malware
09/18/2014WO2014142986A1 Server-assisted anti-malware client
09/18/2014WO2014142960A1 Mechanisms for locking computing devices
09/18/2014WO2014142951A1 Display privacy with dynamic configuration
09/18/2014WO2014142941A1 Technologies for secure storage and use of biometric authentication information
09/18/2014WO2014142919A1 Managing data in a cloud computing environment using management metadata
09/18/2014WO2014142904A1 Context based switching to a secure operating system environment
09/18/2014WO2014142838A1 Method and apparatus for hardware-assisted secure real time clock management
09/18/2014WO2014142835A1 User authentication via image manipulation
09/18/2014WO2014142817A1 Managing device driver cross ring accesses
09/18/2014WO2014142810A1 Preventing malicious instruction execution
09/18/2014WO2014142791A1 Event correlation based on confidence factor
09/18/2014WO2014142779A1 Secure user authentication with improved one-time-passcode verification
09/18/2014WO2014142742A2 Policy based data protection
09/18/2014WO2014142659A1 Data storage device and computer system comprising such data storage device
09/18/2014WO2014142545A1 Digital note service method, recording medium that records program carrying out same, server and mobile device carrying out same
09/18/2014WO2014142537A1 Computing system with identification mechanism and method of operation thereof
09/18/2014WO2014142532A1 Information delivery system with advertising mechanism and method of operation thereof
09/18/2014WO2014142528A1 Digital copyright-applied epub file generating apparatus and method
09/18/2014WO2014142496A1 Computing system with privacy mechanism and method of operation thereof
09/18/2014WO2014142430A1 Dex file binary obfuscation method in android system
1 ... 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 ... 1193