Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
02/2015
02/19/2015WO2015023723A1 Secure os boot as per reference platform manifest and data sealing
02/19/2015WO2015023502A1 Binary translation and randomization system for application security
02/19/2015WO2015023316A1 Evaluating a questionable network communication
02/19/2015WO2015023144A1 Method and device for monitoring data integrity in shared memory environment
02/19/2015WO2015023109A1 Security system, apparatus and method using additional code
02/19/2015WO2015023093A1 Method for verifying integrity of dynamic code using hash
02/19/2015WO2015023088A1 Processing system for attached file of e-mail and processing method therefor
02/19/2015WO2015023024A1 Device for obfuscating application code and method for same
02/19/2015WO2015023023A1 Device for obfuscating code and method for same
02/19/2015WO2015022696A1 Automating monitoring of computing resource in cloud-based data center
02/19/2015WO2015021763A1 Check code acquisition method and device
02/19/2015WO2015021554A1 Method and system for protecting web applications against web attacks
02/19/2015WO2015021548A1 Secure authentication and switching to encrypted domains
02/19/2015WO2015021547A1 Operating system integrated domain management
02/19/2015US20150052622 Method and apparatus for monitoring performance for secure chip operation
02/19/2015US20150052621 Media content streaming service
02/19/2015US20150052620 Management of user rights to media content
02/19/2015US20150052619 Privacy control-adjustable vehicle monitoring system with a wild card mode
02/19/2015US20150052618 Emergency information access on portable electronic devices
02/19/2015US20150052617 Security pouch for an electronic device
02/19/2015US20150052616 Protected mode for securing computing devices
02/19/2015US20150052615 System and method for field-verifiable record authentication
02/19/2015US20150052614 Virtual machine trust isolation in a cloud environment
02/19/2015US20150052613 Database antivirus system and method
02/19/2015US20150052612 Method and device for identifying virus apk
02/19/2015US20150052611 Method and device for extracting characteristic code of apk virus
02/19/2015US20150052607 Method and system for protecting web applications against web attacks
02/19/2015US20150052605 Malware detection and computer monitoring methods
02/19/2015US20150052604 Method and device for protecting user private data of application program
02/19/2015US20150052602 Electronic Apparatus and Password Input Method of Electronic Apparatus
02/19/2015US20150052587 System and method for graduated security in user authentication
02/19/2015US20150052578 Wireless configuration and management of a security system
02/19/2015US20150052520 Method and apparatus for virtual machine trust isolation in a cloud environment
02/19/2015US20150052370 Cascaded Data Encryption Dependent on Attributes of Physical Memory
02/19/2015US20150052367 Apparatus and method for providing hardware security
02/19/2015US20150052366 Efficient data rehydration
02/19/2015US20150052354 Distributed fragments file system
02/19/2015US20150052353 System and Method For Synchronizing An Encrypted File With A Remote Storage
02/19/2015US20150052350 System and method for authenticating a user
02/19/2015US20150052347 File-based application programming interface providing selectable security features
02/19/2015US20150052346 Privacy-Protective Data Transfer and Storage
02/19/2015US20150052342 Method of identifying security and electronic device thereof
02/19/2015US20150052059 System and Method for Preventing Identity Theft or Misuse by Restricting Access
02/19/2015US20150052022 License plate and vin scan/code catalog and information lookup
02/19/2015US20150051965 Media content management
02/19/2015US20150049912 Image processing to prevent access to private information
02/19/2015US20150049357 Image forming system and information processor
02/19/2015DE112013002634T5 Verwaltungsserver Management server
02/19/2015DE102013108941A1 Verfahren zur Datenzugriffsteuerung Method for data access control
02/18/2015EP2838241A1 Method for detecting suspicious events in a file for collecting information relating to a data stream; associated recording medium and system
02/18/2015EP2836968A1 Apparatuses, methods and systems for computer-based secure transactions
02/18/2015EP2836957A1 Location-based access control for portable electronic device
02/18/2015EP2836956A1 Secure zone for digital communications
02/18/2015EP2836955A1 Method for malicious activity detection in a mobile station
02/18/2015EP2836954A1 Opportunistic system scanning
02/18/2015EP2836953A1 Method and device for generating a code
02/18/2015EP2836952A1 Method for identity generation and verification indicating the uniqueness of a carrier-object pair
02/18/2015EP2836951A1 A system and method for secure proxy-based authentication
02/18/2015EP2836950A1 Unified scan engine
02/17/2015US8959659 Software authorization system and method
02/17/2015US8959657 Secure data management
02/17/2015US8959656 Segmented architecture method and system
02/17/2015US8959654 Minimizing sensitive data exposure during preparation of redacted documents
02/17/2015US8959653 Automatic license key injection
02/17/2015US8959652 Graduated authentication in an identity management system
02/17/2015US8959651 Protecting privacy data in MapReduce system
02/17/2015US8959650 Validating association of client devices with sessions
02/17/2015US8959648 Audio challenge for providing human response verification
02/17/2015US8959646 Automated detection and validation of sanitizers
02/17/2015US8959645 Method for providing control information for a distributed operation in an automation system, computer program and automation system
02/17/2015US8959644 Use of popularity information to reduce risk posed by guessing attacks
02/17/2015US8959643 Detecting malware infestations in large-scale networks
02/17/2015US8959642 Real time lockdown
02/17/2015US8959641 Foiling a document exploit attack
02/17/2015US8959639 Method of detecting and blocking malicious activity
02/17/2015US8959638 System and method for below-operating system trapping and securing of interdriver communication
02/17/2015US8959637 Identifying fraudulent activities and the perpetrators thereof
02/17/2015US8959636 Method to deter softwear tampering using interlinked sub-processes
02/17/2015US8959634 Method and system for protection against information stealing software
02/17/2015US8959633 Detecting anomalous behavior patterns in an electronic environment
02/17/2015US8959632 Safely executing an untrusted native code module on a computing device
02/17/2015US8959629 Preserving web document integrity through web template learning
02/17/2015US8959628 Method and apparatus for preventing unwanted code execution
02/17/2015US8959625 Content screening method, apparatus and system
02/17/2015US8959624 Executable download tracking system
02/17/2015US8959623 Protecting virtual machine console from misuse, hijacking or eavesdropping in cloud environments
02/17/2015US8959622 Enabling access to a subset of data
02/17/2015US8959621 Human verification by contextually iconic visual public turing test
02/17/2015US8959620 System and method for composing an authentication password associated with an electronic device
02/17/2015US8959619 Graphical image password authentication method
02/17/2015US8959618 Managing password expiry
02/17/2015US8959617 Authorization scheme to minimize the use of unauthorized medical device disposables on a medical device instrument
02/17/2015US8959615 Storage system in which fictitious information is prevented
02/17/2015US8959610 Security bridging
02/17/2015US8959604 System and method of verifying a number of a mobile terminal
02/17/2015US8959603 Authentication system
02/17/2015US8959599 Password mismatch warning method and apparatus
02/17/2015US8959593 System for providing mobile data security
02/17/2015US8959592 Method for securing digital data and identities in particular in a process using information and communication technologies
02/17/2015US8959590 Method and arrangement for enabling the use of a consumable unit
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 ... 1193