Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
07/2014
07/01/2014US8769685 Systems and methods for using file paths to identify potentially malicious computer files
07/01/2014US8769684 Methods, systems, and media for masquerade attack detection by monitoring computer user behavior
07/01/2014US8769683 Apparatus and methods for remote classification of unknown malware
07/01/2014US8769680 Alert passwords for detecting password attacks on systems
07/01/2014US8769678 Cloud-based gateway security scanning
07/01/2014US8769675 Clock roll forward detection
07/01/2014US8769673 Identifying potentially offending content using associations
07/01/2014US8769672 Code injection prevention
07/01/2014US8769669 Method and apparatus to authenticate a user to a mobile device using mnemonic based digital signatures
07/01/2014US8769668 Touchscreen password entry
07/01/2014US8769667 Information processing apparatus
07/01/2014US8769666 Image processing device and image processing system
07/01/2014US8769665 IP communication device as firewall between network and computer system
07/01/2014US8769656 Method and trusted service manager for providing fast and secure access to applications on an IC card
07/01/2014US8769654 Counterfeit prevention strategy for pluggable modules
07/01/2014US8769651 Mobile multifactor single-sign-on authentication
07/01/2014US8769650 Establishing and maintaining an improved single sign-on (SSO) facility
07/01/2014US8769649 Full spectrum cyber identification determination process
07/01/2014US8769648 Authenticated home directory
07/01/2014US8769646 System and method for associating a universal user identification and a domain specific user identification
07/01/2014US8769644 Systems and methods for establishing cloud-based instances with independent permissions
07/01/2014US8769636 Systems and methods for authenticating web displays with a user-recognizable indicia
07/01/2014US8769634 System and/or method for distributing media content
07/01/2014US8769633 System and method for policy based control of NAS storage devices
07/01/2014US8769632 Methods and systems for providing a secure electronic mailbox
07/01/2014US8769621 Method and system for providing permission-based access to sensitive information
07/01/2014US8769620 Method, system, and terminal for using subscription service content
07/01/2014US8769616 Authentication of devices in a wireless network
07/01/2014US8769615 Key storage and retrieval in a breakout component at the edge of a mobile data network
07/01/2014US8769613 Data security in a cloud computing environment
07/01/2014US8769609 Protecting file entities
07/01/2014US8769492 Method for updating data in accordance with rights management policy
07/01/2014US8769412 Method and apparatus for risk visualization and remediation
07/01/2014US8769402 Method for optimising the placement of at least two pieces of information
07/01/2014US8769379 Identifying a storage error of a data slice
07/01/2014US8769373 Method of identifying and protecting the integrity of a set of source data
07/01/2014US8769312 Tampering monitoring system, protection control module, and detection module
07/01/2014US8769307 Secure operation indicator
07/01/2014US8769306 Protecting content with initialization vector manipulation
07/01/2014US8769305 Secure execution of unsecured apps on a device
07/01/2014US8769301 Product authentication based upon a hyperelliptic curve equation and a curve pairing function
07/01/2014US8769300 Technique for content management using group rights
07/01/2014US8769296 Software signature tracking
07/01/2014US8769295 Computing system feature activation mechanism
07/01/2014US8769289 Authentication of a user accessing a protected resource using multi-channel protocol
07/01/2014US8769287 Method, system, and device for obtaining keys
07/01/2014US8769281 Method and apparatus for securing communication between a mobile node and a network
07/01/2014US8769277 Content retrieval
07/01/2014US8769273 Method and system for establishing a trusted and decentralized peer-to-peer network
07/01/2014US8769272 Differential encryption utilizing trust modes
07/01/2014US8769270 Systems and methods for secure data sharing
07/01/2014US8769268 System and methods providing secure workspace sessions
07/01/2014US8769265 Method and system for providing persistence in a secure network access
07/01/2014US8769264 Apparatus and method for monitoring certificate acquisition
07/01/2014US8769260 Messaging system with user-friendly encryption and decryption
07/01/2014US8769258 Computer virus protection
07/01/2014US8769254 System and method for downloading electronic information to a video lottery
07/01/2014US8769228 Storage drive based antimalware methods and apparatuses
07/01/2014US8769179 Method for performing distributed administration
07/01/2014US8769172 Secure KVM device ensuring isolation of host computers
07/01/2014US8769126 Expanded membership access control in a collaborative environment
07/01/2014US8769015 Content distribution methods for a ring network and related systems and computer program products
07/01/2014US8768966 Method for managing simultaneous modification of database objects during development
07/01/2014US8768901 Method and apparatus for selectively storing blocks of data on a server
07/01/2014US8768897 Method for producing and managing a large-volume long-term archive
07/01/2014US8768888 Intelligent data storage and processing using FPGA devices
07/01/2014US8768850 Method, system, and device for license-centric content consumption
07/01/2014US8768846 System, method, and apparatus for management of media objects
07/01/2014US8768845 Electronic wallet removal from mobile electronic devices
07/01/2014US8768844 Method and system for content sharing and authentication between multiple devices
07/01/2014US8768843 EGM authentication mechanism using multiple key pairs at the BIOS with PKI
07/01/2014US8768842 Secured and selective runtime auditing services using a trusted computing device
07/01/2014US8768841 Information processing system, information processing apparatus, method and program
07/01/2014US8768709 Apparatus and method for verifying transactions using voice print
07/01/2014US8767964 Secure communications in computer cluster systems
07/01/2014US8767960 System and method for self-decaying digital media files and for validated playback of same
07/01/2014US8767537 Airborne wireless device security
07/01/2014US8767499 Semiconductor memory device
06/2014
06/27/2014CA2838273A1 3d cloud lock
06/26/2014WO2014100785A1 Virtualization detection
06/26/2014WO2014100781A1 Trusted container
06/26/2014WO2014100640A1 Verification of password using a keyboard with a secure password entry mode
06/26/2014WO2014100628A1 File format and platform for storage and verification of credentials
06/26/2014WO2014100556A1 Digital signatures for online advertisement security
06/26/2014WO2014100223A1 Quantifying risk based on relationships and applying protections based on business rules
06/26/2014WO2014100103A1 Automated asset criticality assessment
06/26/2014WO2014099925A1 Rights-managed code
06/26/2014WO2014099826A1 Orchestrated interaction in access control evaluation
06/26/2014WO2014099816A1 Method and apparatus for information verification
06/26/2014WO2014099690A1 Hardware management interface
06/26/2014WO2014099688A1 Hardware-based device authentication
06/26/2014WO2014099687A1 Hardware-based device authentication
06/26/2014WO2014099615A1 Just-in-time, email embedded url reputation determination
06/26/2014WO2014099603A1 Methods and apparatus for authenticating user login
06/26/2014WO2014099485A1 Secure local web application data manager
06/26/2014WO2014099355A1 Privacy enhanced key management for a web service provider using a converged security engine
06/26/2014WO2014099227A1 E-commerce networking with depth and security factors
06/26/2014WO2014099196A1 Hardware management interface
06/26/2014WO2014099195A1 User device security profile
06/26/2014WO2014099194A1 Security broker
1 ... 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 ... 1193