Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
08/2014
08/19/2014US8812832 Method and system of using a non-native operating system for scanning and modifying system configuration data of a native operating system
08/19/2014US8812829 Information processing apparatus and start-up method
08/19/2014US8812828 Methods and apparatuses for recovering usage of trusted platform module
08/19/2014US8812827 Wi-Fi router with integrated touch-screen and enhanced security features
08/19/2014US8812804 Methods, apparatus, and systems for secure demand paging and other paging operations for processor devices
08/19/2014US8812766 File mapping and converting for dynamic disk personalization for multiple platforms
08/19/2014US8812756 Method of dispatching and transmitting data streams, memory controller and storage apparatus
08/19/2014US8812702 System and method for globally and securely accessing unified information in a computer network
08/19/2014US8812697 Method of controlling a browser window
08/19/2014US8812669 Device for generating a virtual network user
08/19/2014US8812668 Enhanced human interactive proof (HIP) for accessing on-line resources
08/19/2014US8812638 Method, apparatus and computer program product for controlling devices
08/19/2014US8812563 System for permanent file deletion
08/19/2014US8812550 Systems, methods and apparatus for assessing compliance and federating databases
08/19/2014US8812524 Method and system for preserving privacy of a dataset
08/19/2014US8812439 Folder structure and authorization mirroring from enterprise resource planning systems to document management systems
08/19/2014US8812423 Object qualifiers for multi-dimensional object model
08/19/2014US8812400 Managing a memory segment using a memory virtual appliance
08/19/2014US8811971 Mobile communication device and method for disabling applications
08/19/2014US8811620 Secure sharing of item level data in the cloud
08/19/2014US8811619 Encryption key management system and methods thereof
08/19/2014US8811609 Information protection system and method
08/19/2014US8811606 Asymmetric cryptography using shadow numbers
08/19/2014US8810831 Print control apparatus, image forming apparatus and computer readable medium storing program
08/19/2014US8810362 Recognition system and recognition method
08/19/2014US8807426 Mobile computing device authentication using scannable images
08/19/2014DE202014102648U1 System und Computerprogrammprodukt zur Isolierung von Ressourcen unter Verwendung eines Ressourcenmanagers System and computer program product for the isolation of resources using a resource manager
08/19/2014CA2625235C System and method for maintaining in the field an activation secure module
08/15/2014CA2842741A1 Password audit system
08/14/2014WO2014124467A1 Resilient portals through sandboxing
08/14/2014WO2014124276A1 Identifying and preventing leaks of sensitive information
08/14/2014WO2014124175A1 Privacy against interference attack against mismatched prior
08/14/2014WO2014123893A1 Privacy against interference attack for large data
08/14/2014WO2014123779A1 Method for protecting the integrity of a fixed-length data structure
08/14/2014WO2014123723A1 A domain-specific hardwired symbolic machine
08/14/2014WO2014123663A1 Barcode authentication for resource requests
08/14/2014WO2014123581A1 Privacy protection against curious recommenders
08/14/2014WO2014122662A1 Method and product for providing a predictive security product and evaluating existing security products
08/14/2014WO2014122519A1 Adapting content and monitoring user behavior based on facial recognition
08/14/2014WO2014122501A1 Document authentication
08/14/2014WO2014122063A1 Device and method for detecting unauthorised manipulations of the system state of an open-loop and closed-loop control unit of a nuclear plant
08/14/2014WO2014121397A1 Entertainment apparatus, systems and methods involving pari-mutuel wagering
08/14/2014WO2014078154A4 Generating challenge questions inferred from user history data
08/14/2014WO2014075944A9 Biometric system with body coupled communication interface
08/14/2014WO2013126852A3 Partitioning systems operating in multiple domains
08/14/2014WO2013089607A9 Method for detection of persistent malware on a network node
08/14/2014US20140230079 Response to tamper detection in a memory device
08/14/2014US20140230078 Managing basic input/output system (bios) access
08/14/2014US20140230077 Instruction set architecture with secure clear instructions for protecting processing unit architected state information
08/14/2014US20140230076 Systems and methods for content management in an on-demand environment
08/14/2014US20140230075 Physical and electronic book reconciliation
08/14/2014US20140230074 Method, device, and system for downloading contents on the basis of a rights verification
08/14/2014US20140230073 Virtualized security processor
08/14/2014US20140230071 Device and method for generating and displaying graphic codes specific for medical devices and medical treatment
08/14/2014US20140230070 Auditing of sql queries using select triggers
08/14/2014US20140230068 System and method for packaging and authenticating a software product
08/14/2014US20140230066 Identifying and Preventing Leaks of Sensitive Information
08/14/2014US20140230064 Simulated phishing attack with sequential messages
08/14/2014US20140230063 Method and device for scanning data for signatures prior to storage in a storage device
08/14/2014US20140230062 Detecting network intrusion and anomaly incidents
08/14/2014US20140230057 Always-available embedded theft reaction subsystem
08/14/2014US20140230055 Method for checking an m out of n code
08/14/2014US20140230052 System and method for testing a secured manufactured device
08/14/2014US20140230049 Embedded authentication systems in an electronic device
08/14/2014US20140230048 Method and computer program product of switching locked state of electronic device
08/14/2014US20140230047 Techniques for biometric authentication of user of mobile device
08/14/2014US20140230046 Turing test based user authentication and user presence verification system, device, and method
08/14/2014US20140230045 Graphical object-based user authentication for computerized devices
08/14/2014US20140230039 Barcode authentication for resource requests
08/14/2014US20140230033 Systems and Methods for Identifying Biometric Information as Trusted and Authenticating Persons Using Trusted Biometric Information
08/14/2014US20140230028 Auxiliary password
08/14/2014US20140230025 Notifications in a geo-spatial social network
08/14/2014US20140230019 Authentication to a first device using a second device
08/14/2014US20140230017 Programmable security token
08/14/2014US20140230014 Information processing device and information processing method
08/14/2014US20140230012 Systems, methods, and media for policy-based monitoring and controlling of applications
08/14/2014US20140230011 User Interface for Secure Virtual Document Management System
08/14/2014US20140230010 Trusted and secure techniques for item delivery and execution
08/14/2014US20140230009 Retroactive shared content item links
08/14/2014US20140230007 Policy enforcement with associated data
08/14/2014US20140229942 Isolated guest creation in a virtualized computing system
08/14/2014US20140229929 Accessing a patch file in a system center configuration manager (sccm) environment
08/14/2014US20140229744 Enabling a software application to be executed on a hardware device
08/14/2014US20140229743 Malware and tamper resistant computer architecture
08/14/2014US20140229742 Methods and devices for protecting digital objects through format preserving coding
08/14/2014US20140229741 Dual Composite Field Advanced Encryption Standard Memory Encryption Engine
08/14/2014US20140229739 Delayed data access
08/14/2014US20140229732 Data security service
08/14/2014US20140229731 Systems and methods for a cryptographic file system layer
08/14/2014US20140229717 Binary translator driven program state relocation
08/14/2014US20140229508 System and method for enabling users to select combination of numeric or alpha numeric characters
08/14/2014US20140229507 Method To Delay Locking Of Server Files On Edit
08/14/2014US20140229380 Systems and Methods for Identifying Biometric Information as Trusted and Authenticating Persons Using Trusted Biometric Information
08/14/2014US20140226598 Control channel transmitting method, base station and terminal
08/14/2014DE102013202339A1 Vorrichtung und Verfahren zum Verwalten von Zugangscodes Apparatus and method for managing access codes
08/13/2014EP2765750A1 Controlling application access to mobile device functions
08/13/2014EP2765541A1 Physical and electronic book reconciliation
08/13/2014EP2765530A1 Securing display output data against malicious software attacks
08/13/2014EP2765529A1 A method of authenticating a user of a peripheral apparatus, a peripheral apparatus, and a system for authenticating a user of a peripheral apparatus
08/13/2014EP2764670A1 Method for securely downloading access keys using a mobile device
1 ... 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 ... 1193