Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
09/2014
09/18/2014WO2014142234A1 Electronic system, control device, lock release method, and program
09/18/2014WO2014141659A1 Information receiving device, information receiving system, and information receiving method
09/18/2014WO2014141642A1 Information terminal device
09/18/2014WO2014141595A1 Content distribution method, content distribution system, source device, and sink device
09/18/2014WO2014141518A1 Gateway device, and service providing system
09/18/2014WO2014141363A1 Storage system and storage system control method
09/18/2014WO2014141263A1 Asymmetric otp authentication system
09/18/2014WO2014141206A1 Secure zone on a virtual machine for digital communications
09/18/2014WO2014141202A1 Systems, methods and apparatuses for securely storing and providing payment information
09/18/2014WO2014141159A1 Systems, methods and apparatuses for using a secure non-volatile storage with a computer processor
09/18/2014WO2014141158A1 Methods, apparatuses and systems for providing user authentication
09/18/2014WO2014141074A1 Systems, methods and apparatuses for remote attestation
09/18/2014WO2014141022A1 Systems, methods and apparatuses for device attestation based on speed of computation
09/18/2014WO2014140969A1 Session attribute propagation through secure database server tiers
09/18/2014WO2014140736A1 Automated contact list matching with improved privacy
09/18/2014WO2014140698A1 Improved resistance to cache timing attacks on block cipher encryption
09/18/2014WO2014140559A1 Data security device
09/18/2014WO2014140456A1 Method, device and computer program for optimising the creation of a secure application domain between a computer system and an electronic entity
09/18/2014WO2014140426A1 Multi-factor authentication techniques
09/18/2014WO2014140208A1 Method and device for secure viewing on a screen of an electronic terminal, and corresponding terminal
09/18/2014WO2014140008A1 Secure data processing method, and use in biometry
09/18/2014WO2014139956A1 Method and system for user acceptability
09/18/2014WO2014139556A1 A method, a system, a computer system and a computer program product for certifying a procedure of signature of an electronic file relating to an agreement between at least two parties
09/18/2014WO2014139295A1 Data processing method and terminal
09/18/2014WO2014139162A1 Security co-processor boot performance
09/18/2014WO2014138903A1 Game access system
09/18/2014WO2014138895A1 Systems and methods for partitioning computing applications to optimize deployment resources
09/18/2014WO2014138893A1 Systems and methods for determining trust levels for computing components
09/18/2014WO2014138882A1 Encrypted network storage space
09/18/2014WO2014138877A1 System and method for distributing, monitoring and controlling information based on user specified classes
09/18/2014US20140283148 Flying wirebonds for creating a secure cage for integrated circuits and pathways
09/18/2014US20140283147 Methods And Systems For Preventing Hardware Trojan Insertion
09/18/2014US20140283146 Tamper sensor
09/18/2014US20140283145 System, method, and computer program product for preventing access to data with respect to a data access attempt associated with a remote data sharing session
09/18/2014US20140283143 Software application for managing product manuals
09/18/2014US20140283142 Analyzing Applications for Different Access Modes
09/18/2014US20140283141 Switching a Mobile Device from Operating in a Primary Access Mode to a Secondary Access Mode
09/18/2014US20140283140 Digital media content management apparatus and method
09/18/2014US20140283139 Systems and methods for parsing user-generated content to prevent attacks
09/18/2014US20140283138 Secure Data Sharing With Publicly Accessible Computing Nodes
09/18/2014US20140283137 Media service delivery system providing conditional access to media content from various client devices
09/18/2014US20140283136 Systems and methods for securing and locating computing devices
09/18/2014US20140283135 Mobile Computing Device with Multiple Access Modes
09/18/2014US20140283134 Device and Method for Asset Protection Scheme
09/18/2014US20140283133 Code-enabled remote activation of software for industrial automation systems
09/18/2014US20140283132 Computing application security and data settings overrides
09/18/2014US20140283131 Assignment of Security Contexts to Define Access Permissions for File System Objects
09/18/2014US20140283130 Media management system
09/18/2014US20140283129 Method, system, and device for providing a market for digital goods
09/18/2014US20140283128 Specifying Applications to Share in a Shared Access Mode
09/18/2014US20140283127 Masking sensitive data in HTML while allowing data updates without modifying client and server
09/18/2014US20140283126 Managing Privacy For User-Generated Lists In An Online System
09/18/2014US20140283125 Facial recognition-based information discovery
09/18/2014US20140283124 Method for Managing Access to Documents Protected by Digital Rights Management
09/18/2014US20140283121 Computer Systems and Methods for Capturing Electronic Service Requests and Responses
09/18/2014US20140283120 Methods And Systems For Managing Data Assets
09/18/2014US20140283119 Tiered Access to On Chip Features
09/18/2014US20140283118 OS Security Filter
09/18/2014US20140283117 Protection unit and method for controlling access by plural processes to a storage unit
09/18/2014US20140283116 Method for protected execution of code and protection of executable code and data against modifications
09/18/2014US20140283115 Method and system for monitoring access attempts of shared memory of databases
09/18/2014US20140283114 Rights management for content aggregators
09/18/2014US20140283113 Efficient prevention of fraud
09/18/2014US20140283112 Operating a Computer with a Touchscreen
09/18/2014US20140283111 Spatial security for stored data
09/18/2014US20140283110 Using a file whitelist
09/18/2014US20140283109 Using a uri whitelist
09/18/2014US20140283108 Providing content items from alternate sources
09/18/2014US20140283107 Secure data management
09/18/2014US20140283106 Domain protected marks list based techniques for managing domain name registrations
09/18/2014US20140283105 Method and service for user transparent certificate verifications for web mashups and other composite applications
09/18/2014US20140283104 Object Rendering Systems and Methods
09/18/2014US20140283102 Method for receiving entered data and information processing device
09/18/2014US20140283101 Computing system with privacy mechanism and method of operation thereof
09/18/2014US20140283100 Display privacy with dynamic configuration
09/18/2014US20140283099 Privacy aware dhcp service
09/18/2014US20140283098 Mutually assured data sharing between distrusting parties in a network environment
09/18/2014US20140283097 Anonymizing Sensitive Identifying Information Based on Relational Context Across a Group
09/18/2014US20140283096 Validating normalized code representations
09/18/2014US20140283095 Collaborative publishing within a social network
09/18/2014US20140283094 System and method for systematic detection of fraud rings
09/18/2014US20140283093 Method, apparatus, system, and computer readable medium to provide secure operation
09/18/2014US20140283092 Controlled Application Distribution
09/18/2014US20140283091 Differentially private linear queries on histograms
09/18/2014US20140283090 Licensing using a node locked virtual machine
09/18/2014US20140283089 Sensitive personal information data protection
09/18/2014US20140283088 Preventing stack buffer overflow attacks
09/18/2014US20140283087 Selective content sharing on computing devices
09/18/2014US20140283086 System and Method for Performing Sensitive Geo-Spatial Processing in Non-Sensitive Operator Environments
09/18/2014US20140283085 Internet protocol threat prevention
09/18/2014US20140283082 Systems and methods for determining potential impacts of applications on the security of computing systems
09/18/2014US20140283081 Techniques for correlating vulnerabilities across an evolving codebase
09/18/2014US20140283077 Peer-aware self-regulation for virtualized environments
09/18/2014US20140283076 Profiling code execution
09/18/2014US20140283066 Server-assisted anti-malware client
09/18/2014US20140283064 Network attack offensive appliance
09/18/2014US20140283063 System and Method to Manage Sinkholes
09/18/2014US20140283060 Mitigating vulnerabilities associated with return-oriented programming
09/18/2014US20140283059 Continuous Monitoring of Computer User and Computer Activities
09/18/2014US20140283058 Generic unpacking of applications for malware detection
1 ... 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 ... 1193