Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
07/2014
07/29/2014US8793778 System for providing trusted user access of computer systems
07/29/2014US8793777 Verification and authentication systems and methods
07/29/2014US8793776 Location as a second factor for authentication
07/29/2014US8793775 Apparatus and method for managing web based service account
07/29/2014US8793774 Methods and apparatus for accessing a secure network segment
07/29/2014US8793773 System and method for providing reputation reciprocity with anonymous identities
07/29/2014US8793771 Image-display method, projector, image-display system, projector-control method, image-display program, and projector-control program
07/29/2014US8793769 Zero sign-on authentication
07/29/2014US8793768 Relationship-based authorization
07/29/2014US8793767 Network access management via a secondary communication channel
07/29/2014US8793766 Method and apparatus for security-aware elasticity of application and services
07/29/2014US8793761 Cognitive pattern recognition for computer-based security access
07/29/2014US8793760 Authenticating online users with distorted challenges based on transaction histories
07/29/2014US8793759 Authentication collaboration system and ID provider device
07/29/2014US8793724 Image domain compliance
07/29/2014US8793510 Systems and methods for transformation of logical data objects for storage
07/29/2014US8793506 Mechanism for facilitating encryption-free integrity protection of storage data at computing systems
07/29/2014US8793503 Managing sequential access to secure content using an encrypted wrap
07/29/2014US8793502 Method for evaluating user's rights stored in a security module
07/29/2014US8793501 Mobile communication terminal having password notify function and method for notifying password in mobile communication terminal
07/29/2014US8793499 Nested digital signatures with constant file size
07/29/2014US8793497 Puzzle-based authentication between a token and verifiers
07/29/2014US8793495 Method for authenticating a portable data carrier
07/29/2014US8793492 Methods and systems for scalable distribution of protected content
07/29/2014US8793487 Binding a digital certificate to multiple trust domains
07/29/2014US8793484 Electronic device with message encryption function and message encryption method
07/29/2014US8793480 Updating programmable logic devices in a multi-node system configured for symmetric multiprocessing
07/29/2014US8793457 Method and system for policy-based secure destruction of data
07/29/2014US8793401 Method and system to modify function calls from within content published by a trusted web site
07/29/2014US8793340 Controlled sharing of personal data
07/29/2014US8793278 System and method for data preservation and retrieval
07/29/2014US8793193 Digital rights management distribution system
07/29/2014US8793192 Device enrollment system and method
07/29/2014US8793131 Systems, methods, and media for determining fraud patterns and creating fraud behavioral models
07/29/2014US8792645 Authentication and data security for wireless networks
07/29/2014US8792639 Extensible disc player
07/29/2014US8792637 Downloading of data to secure devices
07/29/2014US8792636 Protocol for protecting content protection data
07/29/2014US8792111 Image processing apparatus, information processing method, and storage medium
07/29/2014CA2677689C Method and apparatus for authorizing a communication interface
07/29/2014CA2645990C Contact-less tag with signature, and applications thereof
07/29/2014CA2566900C Remote access system and method and intelligent agent therefor
07/29/2014CA2533076C Flexible licensing architecture for licensing digital application
07/28/2014CA2839081A1 Virtual storage system and file encryption methods
07/24/2014WO2014113597A1 Detection of malicious scripting language code in a network environment
07/24/2014WO2014113586A1 Generating notifications based on user behavior
07/24/2014WO2014113501A1 Systems and methods for identifying and reporting application and file vulnerabilities
07/24/2014WO2014113367A1 System for and a method of cognitive behavior recognition
07/24/2014WO2014113339A1 Systems and methods for building and using hybrid mobile applications
07/24/2014WO2014113302A1 Systems and methods for providing access to data accounts within user profiles via cloud-based storage services
07/24/2014WO2014113281A1 Classifying samples using clustering
07/24/2014WO2014113136A1 Seamless secure private collaboration across trust boundaries
07/24/2014WO2014111952A2 System and method for providing sensitive information access control
07/24/2014WO2014111934A1 Method and apparatus for location-based security and policy enforcement for mobile devices
07/24/2014WO2014111922A1 Method and system for protecting computerized systems from malicious code
07/24/2014WO2014111863A1 Automated forensics of computer systems using behavioral intelligence
07/24/2014WO2014111776A1 Digital rights management
07/24/2014WO2013090091A3 Counter operation in a state machine lattice
07/24/2014US20140208447 Always-available embedded theft reaction subsystem
07/24/2014US20140208446 Reporting information about users who obtain copyrighted media using a network in an unauthorized manner
07/24/2014US20140208442 Systems and Methods of Secure Domain Isolation Involving Separation Kernel Features
07/24/2014US20140208441 Software Authentication
07/24/2014US20140208439 Injustice detecting system, injustice detecting device and injustice detecting method
07/24/2014US20140208438 Download management method and device based on android browser
07/24/2014US20140208437 Anonymization device, anonymization method and recording medium recording program therefor
07/24/2014US20140208436 Alpha ii license management system
07/24/2014US20140208435 Software modification for partial secure memory processing
07/24/2014US20140208434 Data protection for keychain syncing
07/24/2014US20140208433 System and method for the secure unidirectional transfer of software and software updates
07/24/2014US20140208432 Tracing data block operations
07/24/2014US20140208431 Automated tools for building secure software programs
07/24/2014US20140208430 Mitigating Security Risks Via Code Movement
07/24/2014US20140208429 Method for Evaluating System Risk
07/24/2014US20140208428 Mitigating security risks via code movement
07/24/2014US20140208425 Agent Based Application Reputation System for Operating Systems
07/24/2014US20140208424 Imposter account detection and remediation in a social networking system
07/24/2014US20140208422 Passing Hidden Information Using Attack Detectors
07/24/2014US20140208419 User Authentication
07/24/2014US20140208418 Automatic protection of partial document content
07/24/2014US20140208417 Systems and methods for continuous biometric authentication and presence detection of user of an information handling system
07/24/2014US20140208416 Cross transport authentication
07/24/2014US20140208415 Variable Domain Resource Data Security for Data Processing Systems
07/24/2014US20140208414 Use of freeform metadata for access control
07/24/2014US20140208410 Simplified user registration
07/24/2014US20140208407 Single sign-on between device application and browser
07/24/2014US20140208406 Two-factor authentication
07/24/2014US20140208405 Simplified and Safe User Authentication
07/24/2014US20140208390 System and method for enhanced control system security
07/24/2014US20140208382 User Authentication Based on Network Context
07/24/2014US20140208225 Managing sensitive information
07/24/2014US20140208125 Encryption and decryption device for portable storage device and encryption and decryption method thereof
07/24/2014US20140208124 High privacy of file synchronization with sharing functionality
07/24/2014US20140208123 Privileged cryptographic services in a virtualized environment
07/24/2014US20140208122 Secure content distribution
07/24/2014US20140208120 System for controlling the distribution and use of rendered digital works through watermarking
07/24/2014US20140208103 File encryption, decryption and accessvia near field communication
07/24/2014US20140208102 Method of protecting digital information
07/24/2014US20140208101 Confidential computation system, confidential computation method, and confidential computation program
07/24/2014US20140208100 Provisioning an app on a device and implementing a keystore
07/24/2014US20140208090 Systems and methods for command-based entry into basic input/output system setup from operating system
1 ... 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 ... 1193