Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
08/2014
08/26/2014US8818902 Digital storage media dispensing device
08/26/2014US8818900 Distributed license management
08/26/2014US8818899 Method and apparatus for deploying and licensing wireless communication device computer software infrastructure to manufacturers
08/26/2014US8818897 System and method for validation and enforcement of application security
08/26/2014US8818895 Vehicle device, ad hoc network and method for a road toll system
08/26/2014US8818474 Sensor with signature of data relating to sensor
08/26/2014US8818335 Device security
08/26/2014US8818017 Geographic-based signal detection
08/26/2014US8817990 Kerberized handover keying improvements
08/26/2014US8817989 Method and apparatus for storing and distributing encryption keys
08/26/2014US8817981 Generation of registration codes, keys and passcodes using non-determinism
08/26/2014US8817980 Semiconductor device and IC card
08/26/2014US8817977 Method for generating a digital signature
08/26/2014US8817972 Method of authentication using a decoding of an error correcting code on the basis of a public matrix
08/26/2014US8817291 Image forming apparatus for selectively powering a user authentication device
08/26/2014US8817193 Method and apparatus for hiding caption when displaying video image
08/26/2014US8816818 Biometric authentication device and method, computer-readable recording medium recorded with biometric authentication computer program, and computer system
08/26/2014DE202014102898U1 System und Computerprogrammprodukt zur Sicherstellung der Vertraulichkeit von während Authentifizierungs- und Autorisierungsvorgängen verwendeter Information System and computer program product for ensuring the confidentiality of information during authentication and authorization processes used
08/26/2014CA2671804C Improvements in resisting the spread of unwanted code and data
08/21/2014WO2014127194A2 Computer access control apparatus and method
08/21/2014WO2014127147A1 Systems and methods for a cryptographic file system layer
08/21/2014WO2014127078A1 Managed biometric identity
08/21/2014WO2014126987A1 Authentication to a first device using a second device
08/21/2014WO2014126948A1 Lock screen with socialized applications
08/21/2014WO2014126882A1 Data security service
08/21/2014WO2014126816A1 Delayed data access
08/21/2014WO2014126779A1 On-line behavioral analysis engine in mobile device with multiple analyzer model providers
08/21/2014WO2014126762A1 Binary translator driven program state relocation
08/21/2014WO2014126616A1 Trusted and authenticating using trusted biometric information
08/21/2014WO2014126597A1 Hardware enforced content protection for graphics processing units
08/21/2014WO2014126574A1 Method and apparatus for application awareness in a network
08/21/2014WO2014125161A1 Method and apparatus for accepting third-party use of services based on touch selection
08/21/2014WO2014124806A1 Improved malware detection
08/21/2014WO2014124710A1 Wearable device for storing sensitive data
08/21/2014WO2014124603A1 System and method for a secure display module
08/21/2014WO2014093896A3 System and method for binding drm lincenses to a customer domain
08/21/2014WO2014087425A3 An iris pattern capturing device
08/21/2014WO2014077914A3 System and method for ensuring compliance with organizational policies
08/21/2014US20140237629 Electronic communication
08/21/2014US20140237628 Enhanced content management based on watermark extraction records
08/21/2014US20140237627 Protecting data in a mobile environment
08/21/2014US20140237626 Secure workflow and data management facility
08/21/2014US20140237625 Method for unified end user license management in a drm system
08/21/2014US20140237624 Terminal device, server device, content recording control system, recording method, and recording permission control method
08/21/2014US20140237623 Computing system with protocol protection mechanism and method of operation thereof
08/21/2014US20140237622 System and method for inserting security mechanisms into a software program
08/21/2014US20140237621 Microprocessor system with secured runtime environment
08/21/2014US20140237620 System and method for database privacy protection
08/21/2014US20140237619 Electronic device and security control method
08/21/2014US20140237617 Origin and custody of copies from a stored electronic record verified page by page
08/21/2014US20140237616 Profile and consent accrual
08/21/2014US20140237615 Portable license server
08/21/2014US20140237614 Communication system and method
08/21/2014US20140237613 Distribution apparatus, device, control method for distribution apparatus, and storage medium
08/21/2014US20140237612 Privacy setting implementation in a co-browsing environment
08/21/2014US20140237611 Method for protecting the integrity of a group of memory elements using an aggregate authentication code
08/21/2014US20140237610 Method and system for distributed control of user privacy preferences
08/21/2014US20140237606 System and method for providing automated computer security compromise as a service
08/21/2014US20140237605 Automatic correction of security downgraders
08/21/2014US20140237604 Rule Matching In The Presence Of Languages With No Types Or As An Adjunct To Current Analyses For Security Vulnerability Analysis
08/21/2014US20140237603 Rule matching in the presence of languages with no types or as an adjunct to current analyses for security vulnerability analysis
08/21/2014US20140237601 Operation of a dual instruction pipe virus co-processor
08/21/2014US20140237600 System and method for detecting executable machine instructions in a data stream
08/21/2014US20140237597 Automatic signature generation for malicious pdf files
08/21/2014US20140237596 Robust malware detector
08/21/2014US20140237594 Methods and systems for api-level intrusion detection
08/21/2014US20140237592 Method and system for detecting data modification within computing device
08/21/2014US20140237591 Protecting multi-factor authentication
08/21/2014US20140237590 Simultaneous screening of untrusted digital files
08/21/2014US20140237589 Personalization Data of an Active Application
08/21/2014US20140237588 Method and system for managing and controlling direct access of an administrator to a computer system
08/21/2014US20140237587 Managed Biometric Identity
08/21/2014US20140237586 Apparatus for processing with a secure system manager
08/21/2014US20140237581 Authentication platform and related method of operation
08/21/2014US20140237576 User authentication method and apparatus based on audio and video data
08/21/2014US20140237574 Methods, Systems, and Products for Identity Verification
08/21/2014US20140237570 Authentication based on social graph transaction history data
08/21/2014US20140237566 Password audit system
08/21/2014US20140237560 Security context passing for stateless system management
08/21/2014US20140237558 Device for generating a virtual network user
08/21/2014US20140237554 Unified platform for big data processing
08/21/2014US20140237550 System and method for intelligent workload management
08/21/2014US20140237548 Computing device with environment aware features
08/21/2014US20140237540 Establishing an interactive environment for rendered documents
08/21/2014US20140237537 Method and technique for application and device control in a virtualized environment
08/21/2014US20140237262 System and method for establishing perpetual trust among platform domains
08/21/2014US20140237260 Telecommunications device security
08/21/2014US20140237259 Systems/methods of encryption
08/21/2014US20140237257 Scalable precomputation system for host-opaque processing of encrypted databases
08/21/2014US20140237255 Decryption and Encryption of Application Data
08/21/2014US20140237248 Mobile communication system implementing integration of multiple logins of mobile device applications
08/21/2014US20140237245 Device and authentication method therefor
08/21/2014US20140237244 Device and authentication method therefor
08/21/2014US20140237238 Document authentication data embedding method and apparatus
08/21/2014US20140237235 Information processing device, information storage device, server, information processing system, information processing method, and program
08/21/2014US20140237234 Enhanced system security
08/21/2014US20140237233 Method and apparatus for providing content
08/21/2014US20140237232 Selective shredding in a deduplication system
08/21/2014US20140237231 Computer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method
08/21/2014US20140237230 Computer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method
1 ... 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 ... 1193