Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
09/2014
09/11/2014US20140258736 Systems and Methods for Maintaining Integrity and Secrecy in Untrusted Computing Platforms
09/11/2014US20140258734 Data security method and electronic device implementing the same
09/11/2014US20140258733 Roots-of-trust for measurement of virtual machines
09/11/2014US20140258732 Source identification for unauthorized copies of content
09/11/2014US20140258731 Data encryption system and method
09/11/2014US20140258730 Data protection using programmatically generated key pairs from a master key and a descriptor
09/11/2014US20140258729 Stored Authorization Status for Cryptographic Operations
09/11/2014US20140258728 Secure password generation
09/11/2014US20140258727 System and Method of Using a Signed GUID
09/11/2014US20140258720 Systems and methods for transparent per-file encryption and decryption via metadata identification
09/11/2014US20140258719 Distributed encryption and access control scheme in a cloud environment
09/11/2014US20140258717 Cloud application installed in client terminal connected to cloud server
09/11/2014US20140258716 Total hypervisor encryptor
09/11/2014US20140258714 Federated Digital Rights Management Scheme Including Trusted Systems
09/11/2014US20140258700 Dynamically loaded measured environment for secure code launch
09/11/2014US20140258334 Information processing apparatus, information processing system and information processing method
09/11/2014US20140258131 System and method for participating in transactions between computing devices
09/11/2014US20140258130 System and method for participating in transactions between computing devices
09/11/2014US20140253221 On-Die Programmable Fuses
09/11/2014DE112012005074T5 Vorrichtung, Verfahren und Programm zum Management privater Informationen Apparatus, method and program for management of private information
09/11/2014DE112012004661T5 System zum Schutz von eingebettetem Software-Code System for the protection of embedded software code
09/11/2014DE112011105949T5 Techniken zur Hautfarbenaktivierung Techniques for skin color activation
09/11/2014DE102014103016A1 Globales Identifizierungs-(ID-) und Altersverifizierungssystem und -verfahren Global identification (ID) and age verification system and method
09/10/2014EP2775421A1 Trusted terminal platform
09/10/2014EP2775420A1 Semantic search over encrypted data
09/10/2014EP2775419A1 Mobile terminal and control method thereof
09/10/2014EP2775418A1 Multi-tiered static chain of trust
09/10/2014EP2775417A1 Computer implemented multi-factor authentication
09/10/2014EP2775416A2 Apparatus and method for configuring password and for releasing lock
09/10/2014EP2775415A1 Method for anonymously associating measurement device measurements to a source ID
09/10/2014EP2775403A2 Randomization of access to entire memory contents of a fuse array
09/10/2014EP2774401A1 Device for mobile communication
09/10/2014EP2774098A1 Authentication method
09/10/2014EP2774077A1 Method and apparatus for providing identity based encryption in distributed computations
09/10/2014EP2774076A1 Fuzzy whitelisting anti-malware systems and methods
09/10/2014EP2774075A1 Method and system for authenticating a user by an application
09/10/2014EP2774074A1 Document, process for authenticating a user, more particularly for releasing a smart-card function, and computer system
09/10/2014EP2774073A2 Intelligent caching for security trimming
09/10/2014EP2774072A1 System and method for transitioning to a whitelist mode during a malware attack in a network environment
09/10/2014EP2774071A1 System and method for detecting a file embedded in an arbitrary location and determining the reputation of the file
09/10/2014EP2774070A1 System and method for detecting a malicious command and control channel
09/10/2014EP2774069A1 Method and device for managing an array of keys, with protection against an active spy device, computer program product and storage means corresponding thereto
09/10/2014EP2774068A1 Security mechanism for external code
09/10/2014EP2774045A1 Virtual private storage array service for cloud servers
09/10/2014EP2773995A1 Device for viewing a digital image
09/09/2014USRE45131 Network communication service with an improved subscriber model using digital certificates
09/09/2014US8832858 Access to application programming interface systems and methods
09/09/2014US8832856 Authority delegation for business objects
09/09/2014US8832854 System and method for privacy setting differentiation detection
09/09/2014US8832852 Method and apparatus for dynamic protection of static and dynamic content
09/09/2014US8832847 Coordinating data sharing among applications in mobile devices
09/09/2014US8832846 Methods and systems for providing a notification of a compliance level of an application with respect to a privacy profile associated with a user
09/09/2014US8832845 Apparatus, method and program
09/09/2014US8832843 Storage devices with secure debugging capability and methods of operating the same
09/09/2014US8832842 Storage area network external security device
09/09/2014US8832841 Mobile application security assessment
09/09/2014US8832840 Mobile application security and management service
09/09/2014US8832839 Assessing system performance impact of security attacks
09/09/2014US8832838 Computer worm curing system and method and computer readable storage medium for storing computer worm curing method
09/09/2014US8832837 Preventing attacks on devices with multiple CPUs
09/09/2014US8832836 Systems and methods for malware detection and scanning
09/09/2014US8832835 Detecting and remediating malware dropped by files
09/09/2014US8832834 Webshell detection and response system
09/09/2014US8832833 Integrated data traffic monitoring system
09/09/2014US8832832 IP reputation
09/09/2014US8832831 Method and system for detecting and mitigating attacks performed using cryptographic protocols
09/09/2014US8832829 Network-based binary file extraction and analysis for malware detection
09/09/2014US8832828 Dynamic scanning based on compliance metadata
09/09/2014US8832827 System and method for detection and recovery of malfunction in mobile devices
09/09/2014US8832826 Image forming apparatus, method for controlling image forming apparatus, and program
09/09/2014US8832825 Challenge-response methodology for securing vehicle diagnostic services
09/09/2014US8832824 Electronic device and switching method using the same
09/09/2014US8832823 User access control based on handheld device orientation
09/09/2014US8832822 Smart identifiers
09/09/2014US8832819 Load balancing and failover of gateway devices
09/09/2014US8832818 Automated hybrid connections between multiple environments in a data center
09/09/2014US8832817 Application marketplace administrative controls
09/09/2014US8832816 Authentication tokens for use in voice over internet protocol methods
09/09/2014US8832814 System and method for providing access to a software application
09/09/2014US8832813 Voice authentication via trusted device
09/09/2014US8832811 Network access control for trusted platforms
09/09/2014US8832810 Methods, systems, and products for authenticating users
09/09/2014US8832809 Systems and methods for registering a user across multiple websites
09/09/2014US8832807 Method and apparatus for asynchronous dynamic password
09/09/2014US8832804 Password pre-verification in client-server applications
09/09/2014US8832803 Systems and methods for increased security during logging in to web site
09/09/2014US8832798 Transaction authentication management including authentication confidence testing
09/09/2014US8832796 Wireless communication terminal, method for protecting data in wireless communication terminal, program for having wireless communication terminal protect data, and recording medium storing the program
09/09/2014US8832794 Single-point-of-access cyber system
09/09/2014US8832793 Controlling enterprise access by mobile devices
09/09/2014US8832791 User authentication apparatus and method thereof
09/09/2014US8832789 Location-based virtual socializing
09/09/2014US8832788 Automated human assisted authentication
09/09/2014US8832784 Intelligent security control system for virtualized ecosystems
09/09/2014US8832781 Secure key self-generation
09/09/2014US8832779 Generalized identity mediation and propagation
09/09/2014US8832778 Methods and apparatuses for user-verifiable trusted path in the presence of malware
09/09/2014US8832776 Programmable micro-core processors for security processing
09/09/2014US8832775 Techniques for workload spawning
09/09/2014US8832774 Dynamic management of role membership
1 ... 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 ... 1193