Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
09/2014
09/18/2014US20140281561 Registration and authentication of computing devices using a digital skeleton key
09/18/2014US20140281528 Secure End-to-End Permitting System for Device Operations
09/18/2014US20140281521 Method, System, Network Server And Storage Medium For Anonymous Dating
09/18/2014US20140281520 Secure cloud data sharing
09/18/2014US20140281519 Encrypted file backup
09/18/2014US20140281518 Multi-tier file restoration
09/18/2014US20140281517 File backup with selective encryption
09/18/2014US20140281516 Automatic file decryption
09/18/2014US20140281515 Encrypted file presentation
09/18/2014US20140281514 Automatic file encryption
09/18/2014US20140281512 Secure query processing over encrypted data
09/18/2014US20140281511 Secure data processing on sensitive data using trusted hardware
09/18/2014US20140281509 Techniques for secure data extraction in a virtual or cloud environment
09/18/2014US20140281495 Method and apparatus for performing authentication between applications
09/18/2014US20140281479 Environmental measurement display system and method
09/18/2014US20140281467 System and method for execution of a secured environment initialization instruction
09/18/2014US20140281447 Single-Chip Virtualizing and Obfuscating Communications System for Portable Computing Devices
09/18/2014US20140281443 Encrypted Warranty Verification and Diagnostic Tool
09/18/2014US20140281319 System and method for protecting data
09/18/2014US20140280345 Automated and delegated model-based row level security
09/18/2014US20140280331 Filtering of a shared, distributed cube
09/18/2014US20140279582 Dynamic licensing method
09/18/2014US20140278895 System and method for instruction based access to electronic computing devices
09/18/2014US20140278701 Collaboration platform for digital media
09/18/2014US20140270408 Method and apparatus for requesting and providing access to information associated with an image
09/18/2014US20140270339 Graphic data alteration to enhance online privacy
09/18/2014US20140270174 Personal digital identity device responsive to user interaction with user authentication factor captured in mobile device
09/18/2014US20140270171 Method and apparatus for secure distribution of digital content
09/18/2014US20140270157 Internet protocol network mapper
09/18/2014US20140268210 Data transmitting method of image forming apparatus and image forming apparatus for performing data transmitting method
09/18/2014US20140267120 Touch control terminal and method and device for unlocking touch control
09/18/2014US20140266600 Systems, devices, and methods for dynamically assigning functions to an actuator
09/18/2014DE112012005212T5 Identitätsnachweisverfahren, Identitätsnachweissystem und Identitätsnachweisprogramm Identification method, proof of identity and proof of identity system program
09/18/2014DE112012000185T5 Vorrichtung und Verfahren zur Identitätsauthentifizierung Apparatus and method for identity authentication
09/18/2014DE102014204882A1 System für einen biometrischen Zugang zu einem Fahrzeug und Personalisierung System for a biometric access to a vehicle and personalization
09/18/2014DE102014204589A1 Verfahren und vorrichtung zur einwilligungsabwicklung für einen transfer sicherer daten Method and device for giving consent settlement for a secure data transfer
09/18/2014DE102014003687A1 Vorrichtung und verfahren zum schutz von digitalem inhalt Apparatus and method for protection of digital content
09/18/2014DE102014002181A1 Dynamische gemeinsame Nutzung von Ressourcen Dynamic resource sharing
09/18/2014DE102013114091A1 System und Verfahren zum Schutz von Daten System and method for protecting data
09/18/2014DE102013013327A1 Die Idee zur Herstellung eines besonders effektiv gesicherten und individuell zugänglichen chipkartengroßen Datenspeichers. The idea of ​​producing a particularly effective secured and individually accessible chip card-sized data store.
09/18/2014DE102013004254A1 System und Authentifizierungsverfahren zur sicheren Nutzung von Informations- und Telekommunikationstechnik System and method for secure authentication using information and telecommunications technology
09/17/2014EP2779568A1 Access control method and mobile terminal which employs an access control method
09/17/2014EP2779526A1 Electronic signature device and electronic signature method
09/17/2014EP2779522A1 Configurable key-based data shuffling and encryption
09/17/2014EP2779017A1 Method for controlling access to electronic documents by means of a user centric DRM system
09/17/2014EP2779016A1 Automated contact list matching with improved privacy
09/17/2014EP2779015A1 Unauthorized application detection system and method
09/17/2014EP2779014A1 Security box
09/17/2014EP2779013A1 Card sharing countermeasures by profiling secure devices.
09/17/2014EP2779012A1 Pro-Active Identity Verification For Authentication Of Transaction Initiated Via Non-Voice Channel
09/17/2014EP2779011A1 Single system for authenticating entities across different third party platforms
09/17/2014EP2779010A2 Information processing system and information processing method
09/17/2014EP2779009A2 Code-enabled remote activation of software for industrial automation systems
09/17/2014EP2778952A1 Database device, method and program
09/17/2014EP2778951A1 Database encryption system, method and program
09/17/2014EP2778899A2 Secure rendering of display surfaces
09/17/2014EP2776972A1 System and method for bidirectional trust between downloaded applications and mobile devices including a secure charger and malware scanner
09/17/2014EP2776971A2 Methods, devices, and systems for detecting return-oriented programming exploits
09/17/2014EP2776970A1 Encoding labels in values to capture information flows
09/17/2014EP2776969A2 Method for assessing and containing risks from smartphone applications
09/17/2014EP2776968A1 User interface for selection of multiple accounts and connection points
09/17/2014EP2776967A1 Apparatus and methods for obtaining a password hint
09/17/2014EP2776966A1 Presenting metadata from multiple perimeters
09/17/2014EP2776965A1 Systems, methods, and computer program products for managing secure elements
09/17/2014EP2776964A1 Systems, methods, and computer program products for interfacing multiple service provider trusted service managers and secure elements
09/17/2014EP2776963A1 Apparatus, system, and method for protecting electronic devices in a virtual perimeter
09/17/2014EP2776939A1 Techniques to apply and share remote policies on mobile devices
09/16/2014USRE45140 Data security method and device for computer modules
09/16/2014US8839460 Method for securely communicating information about the location of a compromised computing device
09/16/2014US8839459 Product authentication using end-to-end cryptographic scheme
09/16/2014US8839458 Method, apparatus, and computer program for providing application security
09/16/2014US8839456 System and method for data and request filtering
09/16/2014US8839455 Security domain in virtual environment
09/16/2014US8839453 Authenticating a mobile device based on geolocation and user credential
09/16/2014US8839449 Assessing risk of information leakage
09/16/2014US8839448 Generation of a human readable output message in a format that is unreadable by a computer-based device
09/16/2014US8839446 Protecting archive structure with directory verifiers
09/16/2014US8839444 Automatic analysis of software license usage in a computer network
09/16/2014US8839443 Identifying and remedying secondary privacy leakage
09/16/2014US8839442 System and method for enabling remote registry service security audits
09/16/2014US8839441 Method and system for adaptive vulnerability scanning of an application
09/16/2014US8839440 Apparatus and method for forecasting security threat level of network
09/16/2014US8839439 Operation of a dual instruction pipe virus co-processor
09/16/2014US8839438 Interdicting malicious file propagation
09/16/2014US8839437 Multi-network virus immunization
09/16/2014US8839436 Method and system for antivirus by SIM card combined with cloud computing
09/16/2014US8839434 Multi-nodal malware analysis
09/16/2014US8839433 Secure notification on networked devices
09/16/2014US8839432 Method and apparatus for performing a reputation based analysis on a malicious infection to secure a computer
09/16/2014US8839431 Network browser based virus detection
09/16/2014US8839429 Methods, devices, and systems for detecting return-oriented programming exploits
09/16/2014US8839427 WAN defense mitigation service
09/16/2014US8839423 Method and system for sharing mobile security information
09/16/2014US8839422 Virtual browsing environment
09/16/2014US8839421 System and method for controlling applications to mitigate the effects of malicious software
09/16/2014US8839419 Distributive security investigation
09/16/2014US8839417 Device, system and method for defending a computer network
09/16/2014US8839416 System and method for controlling user access to an electronic device
09/16/2014US8839415 Blank smart card device issuance system
09/16/2014US8839413 Input to locked computing device
1 ... 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 ... 1193