Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
09/11/2014 | US20140258736 Systems and Methods for Maintaining Integrity and Secrecy in Untrusted Computing Platforms |
09/11/2014 | US20140258734 Data security method and electronic device implementing the same |
09/11/2014 | US20140258733 Roots-of-trust for measurement of virtual machines |
09/11/2014 | US20140258732 Source identification for unauthorized copies of content |
09/11/2014 | US20140258731 Data encryption system and method |
09/11/2014 | US20140258730 Data protection using programmatically generated key pairs from a master key and a descriptor |
09/11/2014 | US20140258729 Stored Authorization Status for Cryptographic Operations |
09/11/2014 | US20140258728 Secure password generation |
09/11/2014 | US20140258727 System and Method of Using a Signed GUID |
09/11/2014 | US20140258720 Systems and methods for transparent per-file encryption and decryption via metadata identification |
09/11/2014 | US20140258719 Distributed encryption and access control scheme in a cloud environment |
09/11/2014 | US20140258717 Cloud application installed in client terminal connected to cloud server |
09/11/2014 | US20140258716 Total hypervisor encryptor |
09/11/2014 | US20140258714 Federated Digital Rights Management Scheme Including Trusted Systems |
09/11/2014 | US20140258700 Dynamically loaded measured environment for secure code launch |
09/11/2014 | US20140258334 Information processing apparatus, information processing system and information processing method |
09/11/2014 | US20140258131 System and method for participating in transactions between computing devices |
09/11/2014 | US20140258130 System and method for participating in transactions between computing devices |
09/11/2014 | US20140253221 On-Die Programmable Fuses |
09/11/2014 | DE112012005074T5 Vorrichtung, Verfahren und Programm zum Management privater Informationen Apparatus, method and program for management of private information |
09/11/2014 | DE112012004661T5 System zum Schutz von eingebettetem Software-Code System for the protection of embedded software code |
09/11/2014 | DE112011105949T5 Techniken zur Hautfarbenaktivierung Techniques for skin color activation |
09/11/2014 | DE102014103016A1 Globales Identifizierungs-(ID-) und Altersverifizierungssystem und -verfahren Global identification (ID) and age verification system and method |
09/10/2014 | EP2775421A1 Trusted terminal platform |
09/10/2014 | EP2775420A1 Semantic search over encrypted data |
09/10/2014 | EP2775419A1 Mobile terminal and control method thereof |
09/10/2014 | EP2775418A1 Multi-tiered static chain of trust |
09/10/2014 | EP2775417A1 Computer implemented multi-factor authentication |
09/10/2014 | EP2775416A2 Apparatus and method for configuring password and for releasing lock |
09/10/2014 | EP2775415A1 Method for anonymously associating measurement device measurements to a source ID |
09/10/2014 | EP2775403A2 Randomization of access to entire memory contents of a fuse array |
09/10/2014 | EP2774401A1 Device for mobile communication |
09/10/2014 | EP2774098A1 Authentication method |
09/10/2014 | EP2774077A1 Method and apparatus for providing identity based encryption in distributed computations |
09/10/2014 | EP2774076A1 Fuzzy whitelisting anti-malware systems and methods |
09/10/2014 | EP2774075A1 Method and system for authenticating a user by an application |
09/10/2014 | EP2774074A1 Document, process for authenticating a user, more particularly for releasing a smart-card function, and computer system |
09/10/2014 | EP2774073A2 Intelligent caching for security trimming |
09/10/2014 | EP2774072A1 System and method for transitioning to a whitelist mode during a malware attack in a network environment |
09/10/2014 | EP2774071A1 System and method for detecting a file embedded in an arbitrary location and determining the reputation of the file |
09/10/2014 | EP2774070A1 System and method for detecting a malicious command and control channel |
09/10/2014 | EP2774069A1 Method and device for managing an array of keys, with protection against an active spy device, computer program product and storage means corresponding thereto |
09/10/2014 | EP2774068A1 Security mechanism for external code |
09/10/2014 | EP2774045A1 Virtual private storage array service for cloud servers |
09/10/2014 | EP2773995A1 Device for viewing a digital image |
09/09/2014 | USRE45131 Network communication service with an improved subscriber model using digital certificates |
09/09/2014 | US8832858 Access to application programming interface systems and methods |
09/09/2014 | US8832856 Authority delegation for business objects |
09/09/2014 | US8832854 System and method for privacy setting differentiation detection |
09/09/2014 | US8832852 Method and apparatus for dynamic protection of static and dynamic content |
09/09/2014 | US8832847 Coordinating data sharing among applications in mobile devices |
09/09/2014 | US8832846 Methods and systems for providing a notification of a compliance level of an application with respect to a privacy profile associated with a user |
09/09/2014 | US8832845 Apparatus, method and program |
09/09/2014 | US8832843 Storage devices with secure debugging capability and methods of operating the same |
09/09/2014 | US8832842 Storage area network external security device |
09/09/2014 | US8832841 Mobile application security assessment |
09/09/2014 | US8832840 Mobile application security and management service |
09/09/2014 | US8832839 Assessing system performance impact of security attacks |
09/09/2014 | US8832838 Computer worm curing system and method and computer readable storage medium for storing computer worm curing method |
09/09/2014 | US8832837 Preventing attacks on devices with multiple CPUs |
09/09/2014 | US8832836 Systems and methods for malware detection and scanning |
09/09/2014 | US8832835 Detecting and remediating malware dropped by files |
09/09/2014 | US8832834 Webshell detection and response system |
09/09/2014 | US8832833 Integrated data traffic monitoring system |
09/09/2014 | US8832832 IP reputation |
09/09/2014 | US8832831 Method and system for detecting and mitigating attacks performed using cryptographic protocols |
09/09/2014 | US8832829 Network-based binary file extraction and analysis for malware detection |
09/09/2014 | US8832828 Dynamic scanning based on compliance metadata |
09/09/2014 | US8832827 System and method for detection and recovery of malfunction in mobile devices |
09/09/2014 | US8832826 Image forming apparatus, method for controlling image forming apparatus, and program |
09/09/2014 | US8832825 Challenge-response methodology for securing vehicle diagnostic services |
09/09/2014 | US8832824 Electronic device and switching method using the same |
09/09/2014 | US8832823 User access control based on handheld device orientation |
09/09/2014 | US8832822 Smart identifiers |
09/09/2014 | US8832819 Load balancing and failover of gateway devices |
09/09/2014 | US8832818 Automated hybrid connections between multiple environments in a data center |
09/09/2014 | US8832817 Application marketplace administrative controls |
09/09/2014 | US8832816 Authentication tokens for use in voice over internet protocol methods |
09/09/2014 | US8832814 System and method for providing access to a software application |
09/09/2014 | US8832813 Voice authentication via trusted device |
09/09/2014 | US8832811 Network access control for trusted platforms |
09/09/2014 | US8832810 Methods, systems, and products for authenticating users |
09/09/2014 | US8832809 Systems and methods for registering a user across multiple websites |
09/09/2014 | US8832807 Method and apparatus for asynchronous dynamic password |
09/09/2014 | US8832804 Password pre-verification in client-server applications |
09/09/2014 | US8832803 Systems and methods for increased security during logging in to web site |
09/09/2014 | US8832798 Transaction authentication management including authentication confidence testing |
09/09/2014 | US8832796 Wireless communication terminal, method for protecting data in wireless communication terminal, program for having wireless communication terminal protect data, and recording medium storing the program |
09/09/2014 | US8832794 Single-point-of-access cyber system |
09/09/2014 | US8832793 Controlling enterprise access by mobile devices |
09/09/2014 | US8832791 User authentication apparatus and method thereof |
09/09/2014 | US8832789 Location-based virtual socializing |
09/09/2014 | US8832788 Automated human assisted authentication |
09/09/2014 | US8832784 Intelligent security control system for virtualized ecosystems |
09/09/2014 | US8832781 Secure key self-generation |
09/09/2014 | US8832779 Generalized identity mediation and propagation |
09/09/2014 | US8832778 Methods and apparatuses for user-verifiable trusted path in the presence of malware |
09/09/2014 | US8832776 Programmable micro-core processors for security processing |
09/09/2014 | US8832775 Techniques for workload spawning |
09/09/2014 | US8832774 Dynamic management of role membership |