Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
08/2014
08/21/2014US20140237226 Option read-only memory use
08/21/2014US20140237206 Managing Personal Information on a Network
08/21/2014US20140237203 Semiconductor memory card access apparatus, a computer-readable recording medium, an initialization method, and a semiconductor memory card
08/21/2014US20140236998 Managing global cache coherency in a distributed shared caching for clustered file systems
08/21/2014US20140236997 Controller, information processing apparatus, and recording medium
08/21/2014US20140236848 Dispute resolution in a geo-spatial environment
08/21/2014US20140236747 Information processing system, information processing apparatus, method and program
08/21/2014US20140236732 Pet management and pet groups in a geo-spatial environment
08/21/2014US20140236624 Management system for personal health record
08/21/2014US20140234848 Cryptographic Methods Using Nucleic Acid Codes
08/21/2014US20140232753 Social and retail hotspots
08/21/2014US20140232526 Biometric authentication system and biometric sensor configured for single user authentication
08/21/2014DE112012004250T5 Unkenntlichmachen eines Beschleunigungssensorsignals Obliteration of an acceleration sensor signal
08/21/2014DE102014203050A1 Mobil-Bezahlfernsehen-DRM-Architektur Mobile pay-TV-DRM architecture
08/21/2014DE10046437B4 Identifizierungsverfahren in einem Rechnernetzwerk Identification method in a computer network
08/20/2014EP2767923A2 Robust malware detector
08/20/2014EP2767922A1 Password audit system
08/20/2014EP2767921A1 Lock releasing method of electronic device, and apparatus thereof
08/20/2014EP2767097A1 Communication system for a motor vehicle
08/20/2014EP2766848A1 Id authentication
08/20/2014EP2766847A1 System and method for critical address space protection in a hypervisor environment
08/20/2014EP2766846A1 System and method for profile based filtering of outgoing information in a mobile environment
08/20/2014EP2766845A1 Managing policies
08/20/2014EP2766844A1 System and method for kernel rootkit protection in a hypervisor environment
08/20/2014EP2766843A1 System and method for kernel rootkit protection in a hypervisor environment
08/20/2014EP2766842A1 Systems and methods for controlling access to content distributed over a network
08/20/2014EP2766841A1 System and method for providing threshold levels on privileged resource usage in a mobile network environment
08/20/2014EP2766840A1 Detect and prevent illegal consumption of content on the internet
08/20/2014EP2766839A1 System and method for creating secure applications
08/20/2014EP2766820A1 System and method for a distributed virtual desktop infrastructure
08/19/2014US8813260 Self-contained device security
08/19/2014US8813259 Dynamic licensing
08/19/2014US8813258 Selectively exposing base class libraries based on application execution context
08/19/2014US8813255 Security classification applying social norming
08/19/2014US8813251 Method for controlling content and digital device using the same
08/19/2014US8813250 Access control program, system, and method
08/19/2014US8813249 Mapping identities to documents to enable multiple user logins
08/19/2014US8813248 System and method for authenticating a user
08/19/2014US8813246 Method for playing digital contents protected with a DRM (digital right management) scheme and corresponding system
08/19/2014US8813245 Securing content using pipelines
08/19/2014US8813241 Content distribution system, content distribution method, and client terminal
08/19/2014US8813240 Defensive techniques to increase computer security
08/19/2014US8813238 Digital rights management with irregular network access
08/19/2014US8813237 Thwarting cross-site request forgery (CSRF) and clickjacking attacks
08/19/2014US8813235 Expert system for detecting software security threats
08/19/2014US8813234 Graph-based approach to deterring persistent security threats
08/19/2014US8813233 Machine image inspection
08/19/2014US8813232 Systems and methods for risk rating and pro-actively detecting malicious online ads
08/19/2014US8813231 Secure system for allowing the execution of authorized computer program code
08/19/2014US8813230 Selective authorization of the loading of dependent code modules by running processes
08/19/2014US8813229 Apparatus, system, and method for preventing infection by malicious code
08/19/2014US8813228 Collective threat intelligence gathering system
08/19/2014US8813226 Defense method and device against intelligent bots using masqueraded virtual machine information
08/19/2014US8813224 Remote DOM access
08/19/2014US8813222 Collaborative malware scanning
08/19/2014US8813220 Methods and systems for internet protocol (IP) packet header collection and storage
08/19/2014US8813219 Method for producing dynamic data structures for authentication and/or password identification
08/19/2014US8813218 Security-enhanced computer systems and methods
08/19/2014US8813209 Automating network reconfiguration during migrations
08/19/2014US8813206 Anonymous personal content access with content bridge
08/19/2014US8813205 Consolidating disparate cloud service data and behavior based on trust relationships between cloud services
08/19/2014US8813200 Online password management
08/19/2014US8813196 Web-based conference collaboration tool with dynamic content and roles
08/19/2014US8813194 Enabling access to a secured wireless local network without user input of a network password
08/19/2014US8813193 Mobile terminal and information security setting method thereof
08/19/2014US8813191 Method and apparatus for controlling the number of devices installed in an authorized domain
08/19/2014US8813190 Resource upload
08/19/2014US8813189 System and method for capturing network traffic
08/19/2014US8813184 Authentication using mobile devices
08/19/2014US8813183 Method and system for processor or web logon
08/19/2014US8813182 Near field communication activation and authorization
08/19/2014US8813177 Background application management
08/19/2014US8813175 Multimodal computing device
08/19/2014US8813172 Protection of data in a mixed use device
08/19/2014US8813081 Image processing apparatus using a license, license management system, and control method therefor
08/19/2014US8813076 Virtual machine updates
08/19/2014US8813071 Storage reclamation systems and methods
08/19/2014US8813050 Electronic crime detection and tracking
08/19/2014US8812877 Database encryption system, method, and program
08/19/2014US8812876 Enforcing restrictions related to a virtualized computer environment
08/19/2014US8812875 Virtual self-destruction of stored information
08/19/2014US8812874 Content deduplication in enterprise rights management
08/19/2014US8812873 Secure execution of a computer program using binary translators
08/19/2014US8812872 Memory managment method
08/19/2014US8812871 Method and apparatus for trusted execution in infrastructure as a service cloud environments
08/19/2014US8812869 Programmable logic device with improved security
08/19/2014US8812868 Secure execution of unsecured apps on a device
08/19/2014US8812867 Method for performing searchable symmetric encryption
08/19/2014US8812864 Simplified multi-factor authentication
08/19/2014US8812863 Personal biometric system and method for wireless device control
08/19/2014US8812862 User authentication method and user authentication system
08/19/2014US8812861 Graphical image authentication and security system
08/19/2014US8812860 Systems and methods for protecting data stored on removable storage devices by requiring external user authentication
08/19/2014US8812857 Smart card renewal
08/19/2014US8812855 Software protection
08/19/2014US8812852 Method and system for marking digital content
08/19/2014US8812851 Method for reading an attribute from an ID token
08/19/2014US8812850 Secure multimedia transfer system
08/19/2014US8812844 Luhn validation and data security across multiple active domains
08/19/2014US8812838 Configuring a valid duration period for a digital certificate
1 ... 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 ... 1193