Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
09/2014
09/04/2014US20140250502 Determining human stimuli at computing devices
09/04/2014US20140250501 Secure element comprising separated containers and corresponding method
09/04/2014US20140250495 Contactless Authentication Of Optical Disk Drives
09/04/2014US20140250494 Application execution in a restricted application execution environment
09/04/2014US20140250404 Secure data entry via a virtual keyboard
09/04/2014US20140250306 Decision service manager
09/04/2014US20140250305 Reducing decryption latency for encryption processing
09/04/2014US20140250304 User Authentication System and Method for Encryption and Decryption
09/04/2014US20140250300 Secure storage and accelerated transmission of information over communication networks
09/04/2014US20140250294 Router And A Virtual Trusted Runtime BIOS
09/04/2014US20140250291 Continuation of trust for platform boot firmware
09/04/2014US20140250228 Method and system for securing user identities and creating virtual users to enhance privacy on a communication network
09/04/2014US20140249907 Method to raise accuracy of targeting the segmentation for sample distribution
09/04/2014US20140247989 Monitoring the emotional state of a computer user by analyzing screen capture images
09/04/2014DE112013000440T5 Zonenorientierte Anwesenheitskontrolle durch Lokalisieren von Stimmprofilen Zone-based presence control by locating voice profiles
09/04/2014DE112012005016T5 Zielgerichtete Sicherheitsprüfung Targeted safety inspection
09/04/2014DE102013102068A1 Verfahren zur Unterscheidung von Computern und Menschen bei der Interaktion von Computern A method for distinguishing between computers and humans in the interaction of computers
09/04/2014DE102011117299B4 Verfahren und System zur Betrugserkennung in einem IP-basierten Kommunikationsnetzwerk Method and system for fraud detection in an IP-based communications network
09/03/2014EP2772869A1 Method and system for cryptographic processing using sensitive data
09/03/2014EP2772868A1 Method of updating the operating system of a secure microcircuit
09/03/2014EP2772044A1 Controlling access to a mobile device
09/03/2014EP2772006A1 Charging an energy storage unit
09/03/2014EP2772004A1 Secure distribution of content
09/03/2014EP2771976A1 Method and device for managing a key matrix, corresponding computer program product and storage means
09/03/2014EP2771836A1 Systems and methods of device authentication including features of circuit testing and verification in connection with known board information
09/03/2014EP2771835A1 Policy enforcement of client devices
09/03/2014EP2771834A1 Security systems and methods for encoding and decoding digital content
09/03/2014EP2771833A1 Mobile device-type locking
09/03/2014EP2771832A1 Typing profile identification
09/03/2014EP2771831A1 System and method for managing industrial processes
09/03/2014EP2771821A1 Registry
09/03/2014EP2771776A1 Display apparatus for releasing locked state and method thereof
09/03/2014EP2771761A1 Dead reckoning using proximity sensors
09/02/2014US8826461 Method and system for protecting data, storage device, and storage device controller
09/02/2014US8826460 Data exchange between applications of an electronic device
09/02/2014US8826459 Systems and methods of automatic multimedia transfer and playback
09/02/2014US8826457 System for enterprise digital rights management
09/02/2014US8826456 Benchmark measurement for legitimate duplication validation
09/02/2014US8826455 Method and apparatus for automated assignment of access permissions to users
09/02/2014US8826454 Method for secure transfer of medical data to a mobile unit/terminal
09/02/2014US8826449 Data security in a disconnected environment
09/02/2014US8826447 Intelligent connectors integrating magnetic modular jacks and intelligent physical layer devices
09/02/2014US8826446 System and method for applying privacy settings to a plurality of applications
09/02/2014US8826445 Method and system of deterring unauthorized use of media content by degrading the contents waveform
09/02/2014US8826443 Selective removal of protected content from web requests sent to an interactive website
09/02/2014US8826442 Media playback decoder tracing
09/02/2014US8826441 Event-based security state assessment and display for mobile devices
09/02/2014US8826439 Encoding machine code instructions for static feature based malware clustering
09/02/2014US8826438 Method and system for network-based detecting of malware from behavioral clustering
09/02/2014US8826436 Systems, methods and apparatus to apply permissions to applications
09/02/2014US8826435 Apparatus and methods for protecting removable storage devices from malware infection
09/02/2014US8826431 Using telemetry to reduce malware definition package size
09/02/2014US8826430 Method and system for tracing information leaks in organizations through syntactic and linguistic signatures
09/02/2014US8826424 Run-time additive disinfection of malware functions
09/02/2014US8826422 Methods, systems, and computer program products for detecting and mitigating fraudulent message service message traffic
09/02/2014US8826421 Method and apparatus for security validation of user input
09/02/2014US8826419 Computer device with anti-tamper resource security
09/02/2014US8826417 Providing a user input interface prior to initiation of an operating system
09/02/2014US8826416 Electronic device and method for unlocking electronic device
09/02/2014US8826415 Automated device access
09/02/2014US8826414 System-on-chip malicious code detection apparatus and application-specific integrated circuit for a mobile device
09/02/2014US8826408 Consolidating disparate cloud service data and behavior based on trust relationships between cloud services
09/02/2014US8826407 System and method for access control and identity management
09/02/2014US8826405 Trusting an unverified code image in a computing device
09/02/2014US8826402 Management of an instant message session
09/02/2014US8826401 Method and system using a cyber ID to provide secure transactions
09/02/2014US8826400 System for automated prevention of fraud
09/02/2014US8826399 Systems and methods for fast authentication with a mobile device
09/02/2014US8826398 Password changing
09/02/2014US8826396 Password reset system
09/02/2014US8826395 Method of improving online credentials
09/02/2014US8826394 Methods, devices, and mediums associated with security access requested on an as-needed basis
09/02/2014US8826393 Systems and methods for detection of session tampering and fraud prevention
09/02/2014US8826392 Device and method for authenticating biological information
09/02/2014US8826391 Virtualized trusted descriptors
09/02/2014US8826387 Validation and fast channel change for broadcast system
09/02/2014US8826386 Trust network integrating content popularity
09/02/2014US8826380 Proxy server, control method thereof, content server, and control method thereof
09/02/2014US8826376 Communication of session-specific information to user equipment from an access network
09/02/2014US8826374 Approach for securely processing an electronic document
09/02/2014US8826369 Terminal, communication system, data management method, server and storage medium
09/02/2014US8826368 Platform authentication method suitable for trusted network connect architecture based on tri-element peer authentication
09/02/2014US8826366 Verifying access-control policies with arithmetic quantifier-free form constraints
09/02/2014US8826275 System and method for self-aware virtual machine image deployment enforcement
09/02/2014US8826245 Method, system and program product for optimizing emulation of a suspected malware
09/02/2014US8826142 Document handling in a web application
09/02/2014US8826042 Memory controller, memory control apparatus, memory device, memory information protection system, control method for memory control apparatus, and control method for memory device
09/02/2014US8826041 In-band detection mechanism for detecting intermediate layer in a storage I/O driver stack
09/02/2014US8826040 Product security system
09/02/2014US8826038 FPGA configuration bitstream protection using multiple keys
09/02/2014US8826035 Cumulative integrity check value (ICV) processor based memory content protection
09/02/2014US8826033 Data protection using virtual-machine-specific stable system values
09/02/2014US8826031 Methods for secure enrollment and backup of personal identity credentials into electronic devices
09/02/2014US8826030 Methods and systems for authenticating users
09/02/2014US8826029 Providing time ratio-based password/challenge authentication
09/02/2014US8826028 Cryptography secure input device
09/02/2014US8826027 Method for producing acknowledged transaction data and corresponding device
09/02/2014US8826026 Systems and methods for tracking electronic files in computer networks using electronic signatures
09/02/2014US8826024 Trusted compliance operations inside secure computing boundaries
09/02/2014US8826023 System and method for securing access to hash-based storage systems
1 ... 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 ... 1193