Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
07/2014
07/08/2014US8773260 System and method for monitoring a mobile computing product/arrangement
07/08/2014US8772653 Encryption keyboard
07/08/2014US8769784 Secure and efficient authentication using plug-in hardware compatible with desktops, laptops and/or smart mobile communication devices such as iPhones
07/08/2014CA2839068A1 Touch event processing method and portable device implementing the same
07/08/2014CA2616981C System and method for managing encrypted content using logical partitions
07/08/2014CA2587306C System and method for processing certificates located in a certificate search
07/08/2014CA2564285C System and method of owner application control of electronic devices
07/03/2014WO2014106282A1 Identification of obfuscated computer items using visual algorithms
07/03/2014WO2014106149A1 Techniques for validating cryptographic applications
07/03/2014WO2014105960A1 Timeline wrinkling system and method
07/03/2014WO2014105949A1 System and method for the programmatic runtime de-obfuscation of obfuscated software utilizing virtual machine introspection and manipulation of virtual machine guest memory permissions
07/03/2014WO2014105919A1 Identifying web pages in malware distribution networks
07/03/2014WO2014105918A1 Permitting a user access to password protected data by using a simple password and a normal password
07/03/2014WO2014105856A1 Web application container for client-level runtime control
07/03/2014WO2014105580A1 A privacy-preserving database system
07/03/2014WO2014105549A1 Mobile device security using multiple profiles
07/03/2014WO2014105535A1 Real-time representation of security-relevant system state
07/03/2014WO2014105506A1 Systems and methods for non-destructive testing user profiles
07/03/2014WO2014105505A1 Protocol for biometric device capture and quality analysis
07/03/2014WO2014105418A1 Alarm condition processing in network element
07/03/2014WO2014105356A1 Systems and methods for synchronizing nondestructive testing devices
07/03/2014WO2014105330A1 Systems and methods for licensing non destructive testing content
07/03/2014WO2014105310A1 Device authentication using a physically unclonable functions based key generation system
07/03/2014WO2014105308A1 Herd based scan avoidance system in a network environment
07/03/2014WO2014105167A1 Apparatus and method for page walk extension for enhanced security checks
07/03/2014WO2014105146A1 Secure key derivation and cryptography logic for integrated circuits
07/03/2014WO2014105135A1 Instructions processors, methods, and systems to process secure hash algorithms
07/03/2014WO2014105130A1 Measuring applications loaded in secure enclaves at runtime
07/03/2014WO2014105028A1 System for asset management
07/03/2014WO2014104601A1 P2p-based update device and method of operating p2p-based update device
07/03/2014WO2014104539A1 Method and apparatus for managing passcode
07/03/2014WO2014104511A1 Crum chip and image forming device for authentication and communication, and methods thereof
07/03/2014WO2014104507A1 System and method for secure login, and apparatus for same
07/03/2014WO2014104440A1 System and method for providing cloud service
07/03/2014WO2014103971A1 Payment collection method and payment collection system using verifiable image information
07/03/2014WO2014103663A1 Digital contract system
07/03/2014WO2014103242A1 Specific information play device, automobile whereupon same is mounted, and program thereof
07/03/2014WO2014103115A1 Illicit intrusion sensing device, illicit intrusion sensing method, illicit intrusion sensing program, and recording medium
07/03/2014WO2014102526A1 Processing device and method of operation thereof
07/03/2014WO2014102525A1 Method and device for secure network access
07/03/2014WO2014102303A1 Method, system and computer program product for managing operations of service terminals
07/03/2014WO2014102301A1 Method to provide connectivity capabilities to a computing device
07/03/2014WO2014102277A1 Method for a user to prove the ownership of an anonymous document
07/03/2014WO2014102276A1 Method for controlling a contactless transaction
07/03/2014WO2014102274A1 Method for protecting an electronic device against use by unauthorized persons, and associated server
07/03/2014WO2014102067A1 Device adapted for emulating tactile contacts on a capacitive screen
07/03/2014WO2014102017A1 Method for managing data
07/03/2014WO2014101783A1 Method and server for performing cloud detection for malicious information
07/03/2014WO2014101610A1 Method for java application to access intelligent key apparatus
07/03/2014WO2014101589A1 Method, server and system for rating reputation of web site
07/03/2014WO2014101495A1 Control method of java card object access
07/03/2014WO2014101144A1 Data storage method and device
07/03/2014WO2014078194A3 Information handling resources with external storage resource boot
07/03/2014WO2014078154A3 Generating challenge questions inferred from user history data
07/03/2014WO2014070515A3 Privacy aware camera and device status indicator system
07/03/2014WO2014062853A3 Secure communication architecture
07/03/2014WO2014060964A3 Method and system for detecting intrusion in networks and systems based on business-process specification
07/03/2014US20140189892 Communication device and communication system
07/03/2014US20140189891 Hard disk assembly and electronic device using same
07/03/2014US20140189890 Device authentication using a physically unclonable functions based key generation system
07/03/2014US20140189889 Managing authorization of actions associated with data objects
07/03/2014US20140189885 Permitting a user access to password protected data
07/03/2014US20140189884 Lengthy Hosting Internet System
07/03/2014US20140189883 Distributing content to subscribers of a communications service provider
07/03/2014US20140189882 System and method for the programmatic runtime de-obfuscation of obfuscated software utilizing virtual machine introspection and manipulation of virtual machine guest memory permissions
07/03/2014US20140189881 Enhanced security for accessing virtual memory
07/03/2014US20140189880 System and method for administrating access control rules on a secure element
07/03/2014US20140189879 Method for identifying file type and apparatus for identifying file type
07/03/2014US20140189878 Image forming apparatus
07/03/2014US20140189876 Systems and methods for licensing non-destructive testing content
07/03/2014US20140189875 Hybrid analysis of vulnerable information flows
07/03/2014US20140189874 Hybrid analysis of vulnerable information flows
07/03/2014US20140189873 System and method for vulnerability risk analysis
07/03/2014US20140189872 Method and device for monitoring virus trend abnormality
07/03/2014US20140189871 Identifying Code Signatures Using Metamorphic Code Generation
07/03/2014US20140189870 Visual component and drill down mapping
07/03/2014US20140189869 Method of intrusion detection in terminal device and intrusion detecting apparatus
07/03/2014US20140189866 Identification of obfuscated computer items using visual algorithms
07/03/2014US20140189865 Security management in a networked computing environment
07/03/2014US20140189864 Identifying web pages in malware distribution networks
07/03/2014US20140189862 Virtual machine monitor (vmm) extension for time shared accelerator management and side-channel vulnerability prevention
07/03/2014US20140189860 Control system cyber security
07/03/2014US20140189858 Generation Method and Device for generating anonymous dataset, and method and device for risk evaluation
07/03/2014US20140189857 Method, system, and apparatus for securely operating computer
07/03/2014US20140189856 Method and apparatus for inputting password using game
07/03/2014US20140189855 Gestures for Unlocking a Mobile Device
07/03/2014US20140189854 Techniques for skin tone activation
07/03/2014US20140189853 Content protection key management
07/03/2014US20140189852 Method for executing an application in a restricted operating environment
07/03/2014US20140189851 Systems and methods for non-destructive testing user profiles
07/03/2014US20140189850 Mobile device security using multiple profiles
07/03/2014US20140189849 Inferring Security Decisions From Trusted Users
07/03/2014US20140189848 Inferring security decisions from trusted users
07/03/2014US20140189841 Apparatus for and method of multi-factor authentication among collaborating communication devices
07/03/2014US20140189836 System for controlling access to an account
07/03/2014US20140189835 Systems and methods for efficient authentication of users
07/03/2014US20140189833 Information processing apparatus capable of authentication processing with improved user convenience, control program for information processing apparatus, and recording medium having control program for information processing apparatus recorded thereon
07/03/2014US20140189832 Transcoding Content Based on Verification of Ownership of the Content
07/03/2014US20140189826 Techniques for dynamic generation and management of password dictionaries
07/03/2014US20140189825 Multi Mode Operation Using User Interface Lock
1 ... 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 ... 1193