Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
08/2014
08/28/2014US20140244511 Online challenge-response
08/28/2014US20140241523 Installable Secret Functions for a Peripheral
08/28/2014US20140240760 Network Scanner for Global Document Creation, Transmission and Management
08/28/2014DE112012005033T5 Systemübergreifende sichere Anmeldung System-wide secure login
08/28/2014DE102014203307A1 Verfahren und Gerät zum Verfolgen einer Vorrichtungsverbindung und Zustandsänderung Method and apparatus for tracking a state change device connection and
08/28/2014DE102013203365A1 Verfahren und Schaltungsanordnung für kontrollierte Zugriffe auf Slave-Einheiten in einem Ein-Chip-System Method and circuit for controlled access to slave units in a single-chip system
08/28/2014DE102013203152A1 Schienenfahrzeug mit mindestens einem Zugsicherungsgerät nach einem nationalen Standard und mit einer ETCS-Fahrzeugeinrichtung sowie Verfahren zum Betreiben des Schienenfahrzeugs Rail vehicle with at least one Zugsicherungsgerät according to one national standard and with a ETCS vehicle device and method of operating the rail vehicle
08/28/2014DE102013102229A1 Verfahren zum Ausführen von Tasks auf einem Produktions-Computersystem sowie Datenverarbeitungssystem A method for executing tasks on a computer system, as well as production data processing system
08/28/2014DE102013005971B3 Schadsoftware-sicheres Datenverarbeitungssystem Malicious software secure data processing system
08/27/2014EP2770769A1 Terminal and server for applying security policy, and method of controlling the same
08/27/2014EP2770720A1 Image forming apparatus capable of executing authentication, method of controlling the same, program for executing the method, and storage medium
08/27/2014EP2770695A1 Method, server and user terminal for providing and acquiring media content
08/27/2014EP2770693A1 Remote device for emulating a local security device
08/27/2014EP2770601A1 Method of protecting a power receiver
08/27/2014EP2770470A1 Method for personalizing a secure element, method for enabling a service, secure element and computer program product
08/27/2014EP2770458A2 Mobile Security Fob
08/27/2014EP2770457A2 Apparatus and method for managing security of terminal
08/27/2014EP2770456A1 Variable code keyboard
08/27/2014EP2770455A1 Method and system to exercise geographic restrictions over the distribution of content via a network
08/27/2014EP2769502A1 Methods, systems and apparatus to facilitate client-based authentication
08/27/2014EP2769332A1 Fuel dispenser user interface system architecture
08/27/2014EP2769331A2 Defensive techniques to increase computer security
08/27/2014EP2769330A2 Method for calling up a client program
08/27/2014EP2769329A1 Method, device and system for entering data
08/27/2014EP2769328A1 Dynamic profile switching based on user identification
08/27/2014EP2769327A1 System and method for whitelisting applications in a mobile network environment
08/27/2014EP2769326A1 User-defined countermeasures
08/27/2014EP2769325A1 User behavioral risk assessment
08/27/2014EP2769324A1 System and method for whitelisting applications in a mobile network environment
08/27/2014EP2769323A1 Integrating security policy and event management
08/27/2014EP2769322A1 Systems and methods for protecting and governing genomic and other information
08/26/2014USRE45098 Encrypted start signal for game with data substitution in original data and means for limiting execution
08/26/2014US8819856 Detecting and preventing noncompliant use of source code
08/26/2014US8819855 System and method for deploying handheld devices to secure an area
08/26/2014US8819854 Information processing apparatus, system management method, and recording medium
08/26/2014US8819853 Digital catalogue raisonné platform
08/26/2014US8819852 Image forming apparatus, access control method, access control program and computer readable information recording medium
08/26/2014US8819846 Making system constraints of a specified permission in digital rights management
08/26/2014US8819842 Implementing conductive microcapsule rupture to generate a tamper event for data theft prevention
08/26/2014US8819840 Method and apparatus for provisioning subscription products
08/26/2014US8819839 Microprocessor having a secure execution mode with provisions for monitoring, indicating, and managing security levels
08/26/2014US8819837 Medical and personal data retrieval system
08/26/2014US8819836 System and method for limiting exploitable of potentially exploitable sub-components in software components
08/26/2014US8819830 Virus co-processor instructions and methods for using such
08/26/2014US8819828 Systems and methods for identifying malware threat vectors
08/26/2014US8819826 Method and system for detection of malware that connect to network destinations through cloud scanning and web reputation
08/26/2014US8819825 Systems, methods, and media for generating bait information for trap-based defenses
08/26/2014US8819822 Security method for detecting intrusions that exploit misinterpretation of supplied data
08/26/2014US8819820 Security capability reference model for goal-based gap analysis
08/26/2014US8819819 Method and system for automatically obtaining webpage content in the presence of javascript
08/26/2014US8819818 Dynamic computer network with variable identity parameters
08/26/2014US8819817 Methods and apparatus for blocking usage tracking
08/26/2014US8819814 Secure access infrastructure
08/26/2014US8819812 Gesture recognition for device input
08/26/2014US8819806 Integrated data access
08/26/2014US8819804 Distributed enforcement of browser rules
08/26/2014US8819801 Secure machine enrollment in multi-tenant subscription environment
08/26/2014US8819799 Image forming apparatus, image forming system, and method for realizing pseudo single sign-on
08/26/2014US8819797 Digital identity management
08/26/2014US8819796 Authentication system and method
08/26/2014US8819795 Presenting managed security credentials to network sites
08/26/2014US8819793 Systems and methods for secure and efficient enrollment into a federation which utilizes a biometric repository
08/26/2014US8819790 Cooperation method and system between send mechanism and IPSec protocol in IPV6 environment
08/26/2014US8819789 Method and system for using social networks to verify entity affiliations and identities
08/26/2014US8819788 Method and system for providing security data to security stations
08/26/2014US8819787 Securing asynchronous client server transactions
08/26/2014US8819785 Managing secure sharing of private medication information across security domains
08/26/2014US8819784 Method for managing access to protected resources and delegating authority in a computer network
08/26/2014US8819780 Information processing system, information processing apparatus, and information processing method
08/26/2014US8819779 Methods and systems for managing multiple information handling systems with a virtual keyboard-video-mouse interface
08/26/2014US8819777 Method and apparatus for preventing and analyzing network intrusion
08/26/2014US8819775 Secure method of accessing an information system of an aircraft
08/26/2014US8819773 Remote security self-assessment framework
08/26/2014US8819766 Domain-based isolation and access control on dynamic objects
08/26/2014US8819762 System and method for auditing a security policy
08/26/2014US8819681 Method and system for implementing primary and secondary zones in a virtualized environment
08/26/2014US8819639 System for selectively blocking execution of applications on a computer system
08/26/2014US8819609 Countermeasure method and device for protecting data circulating in an electronic microcircuit
08/26/2014US8819452 Efficient storage of encrypted data in a dispersed storage network
08/26/2014US8819449 Event counter in a system adapted to the JavaCard language
08/26/2014US8819447 Secure storage of protected data in a wireless communication device
08/26/2014US8819446 Support for secure objects in a computer system
08/26/2014US8819445 Wireless token authentication
08/26/2014US8819444 Methods for single signon (SSO) using decentralized password and credential management
08/26/2014US8819443 Methods and devices for authentication and data encryption
08/26/2014US8819441 Long-term signature server, long-term signature terminal, and long-term signature verification server
08/26/2014US8819432 Method for authentication and signature of a user in an application service, using a mobile telephone as a second factor in addition to and independently of a first factor
08/26/2014US8819430 Communication device, communicaton system, communication method, and program
08/26/2014US8819423 Optical transceiver with vendor authentication
08/26/2014US8819421 File decryption interface
08/26/2014US8819420 Encryption and decryption approach that prevents exposing clear-text in memory
08/26/2014US8819410 Private electronic information exchange
08/26/2014US8819409 Distribution system and method for distributing digital information
08/26/2014US8819399 Predicated control flow and store instructions for native code module security
08/26/2014US8819290 Method and system for transmitting compressed rights
08/26/2014US8819253 Network message generation for automated authentication
08/26/2014US8819005 System for automated computer support
08/26/2014US8818905 System and method for encrypting interactive voice response application information
08/26/2014US8818904 Generation systems and methods for transaction identifiers having biometric keys associated therewith
08/26/2014US8818903 Transaction coordinator for digital certificate validation and other services
1 ... 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 ... 1193