Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
06/2014
06/19/2014WO2014093889A1 System and method for wireless content delivery and transaction management
06/19/2014WO2014093878A1 Automatic selection of on-chip clock in synchronous digital systems
06/19/2014WO2014093260A1 System and method of capacity management
06/19/2014WO2014093131A1 Controlling accounts of online transaction platform
06/19/2014WO2014092890A1 Encryption-based data access management
06/19/2014WO2014092665A1 Integrated user authentication system in self-service machines
06/19/2014WO2014092511A1 Method and apparatus for protecting an application program
06/19/2014WO2014092183A1 Bit string matching system, method, and program
06/19/2014WO2014092180A1 Intermediate server, database query processing method and program
06/19/2014WO2014091944A1 Information terminal device, information terminal control method, and program
06/19/2014WO2014091728A1 Content sharing system, content sharing method, and information communication device
06/19/2014WO2014091576A1 Relay device, relay method, and program
06/19/2014WO2014091535A1 Computer system and encryption method of recording unit
06/19/2014WO2014091344A1 Boot mechanisms for 'bring your own' management
06/19/2014WO2014091342A1 User trusted device to attest trustworthiness of initialization firmware
06/19/2014WO2014091252A1 Improvements relating to identifier authentication
06/19/2014WO2014091168A2 Method for securing a request for executing a first application, by a second application
06/19/2014WO2014091082A1 Cloud centric application trust validation
06/19/2014WO2014091058A1 Method and apparatus for connection management
06/19/2014WO2014090829A1 Method of protecting an electronic terminal, computer program, and electronic terminal corresponding thereto
06/19/2014WO2014090594A1 Method of allowing establishment of a secure session between a device and a server
06/19/2014WO2014090411A1 Method of secure access to confidential medical data, and storage medium for said method
06/19/2014WO2014090274A1 Method and data processing device for protection against the running of unauthorised application programs
06/19/2014WO2014090093A1 Modify and execute next sequential instruction facility and instructions therefore
06/19/2014WO2014090072A1 Method and apparatus enabling browsers to perform security scan of devices
06/19/2014WO2014090028A1 Disaster recover internet protocol address failover
06/19/2014WO2014089744A1 Method and apparatus for detecting malicious code
06/19/2014WO2014059159A3 Systems and methods for testing and managing defensive network devices
06/19/2014WO2014059156A9 Efficient virtual machine deployment methodology
06/19/2014WO2014055241A3 Secure identification of computing device and secure identification methods
06/19/2014WO2014031494A3 System and method for providing a secure computational environment
06/19/2014US20140173762 System, method, and computer-readable recording medium for supporting license acquirement
06/19/2014US20140173761 Method and apparatus for protecting an application program
06/19/2014US20140173760 Managing licenses of media files on playback devices
06/19/2014US20140173759 Rights-managed code
06/19/2014US20140173756 Platform-hardened digital rights management key provisioning
06/19/2014US20140173755 Orchestrated interaction in access control evaluation
06/19/2014US20140173752 Handling repeated requests for the same user data
06/19/2014US20140173751 System and method for chatting with machines
06/19/2014US20140173750 Provisioning a Computing System for Digital Rights Management
06/19/2014US20140173749 Method and apparatus for providing a specific user interface in a system for managing content
06/19/2014US20140173747 Disabling access to applications and content in a privacy mode
06/19/2014US20140173746 Application repository
06/19/2014US20140173745 Automated human interface device operation procedure
06/19/2014US20140173744 System and methods for scalably identifying and characterizing structural differences between document object models
06/19/2014US20140173743 System and method for dynamic analysis tracking object associations for application dataflow
06/19/2014US20140173742 System and method for dynamic analysis wrapper objects for application dataflow
06/19/2014US20140173741 System and method for dynamic analysis tracking objects for application dataflow
06/19/2014US20140173739 Automated asset criticality assessment
06/19/2014US20140173738 User device security profile
06/19/2014US20140173737 Device and method for remediating vulnerabilities
06/19/2014US20140173730 Security Method and Apparatus
06/19/2014US20140173728 System, method, and computer program product for mounting an image of a computer system in a pre-boot environment for validating the computer system
06/19/2014US20140173727 Tuning of Data Loss Prevention Signature Effectiveness
06/19/2014US20140173724 Tuning of Data Loss Prevention Signature Effectiveness
06/19/2014US20140173723 Reputation of network address
06/19/2014US20140173721 Manipulating screen layers in multi-layer applications
06/19/2014US20140173720 System and method for controlling the on and off state of features at runtime
06/19/2014US20140173719 Industrial manipulating system with multiple computers and industrial manipulating method
06/19/2014US20140173718 Microcomputer, middleware, and operating method for the same
06/19/2014US20140173717 System and method of secure data entry
06/19/2014US20140173716 Method and apparatus for managing and accessing personal data
06/19/2014US20140173715 Information processing system, information processing method, device, and authentication apparatus
06/19/2014US20140173714 Information processing apparatus, and lock execution method
06/19/2014US20140173713 Verification Code Generation and Verification Method and Apparatus
06/19/2014US20140173704 System, device, and method for authentication of a user accessing an on-line resource
06/19/2014US20140173703 Method and Apparatus for Providing Network Security Using Role-Based Access Control
06/19/2014US20140173695 Token based account access
06/19/2014US20140173694 Multi-tenancy governance in a cloud computing environment
06/19/2014US20140173689 Providing a real-time indication of platform trust
06/19/2014US20140173687 Distributed computing system
06/19/2014US20140173685 Controlling modification of electronic device cabling
06/19/2014US20140173683 Metadata driven real-time analytics framework
06/19/2014US20140173598 Virtual machine migration
06/19/2014US20140173412 Presenting visualizations of business intelligence data
06/19/2014US20140173295 Method and apparatus for securing transfer of secure content to a destination
06/19/2014US20140173293 Hardware Based Return Pointer Encryption
06/19/2014US20140173292 Enhancing useability of mobile devices that securely store data
06/19/2014US20140173290 Return address tracking mechanism
06/19/2014US20140173289 Mobile identity provider with two factor authentication
06/19/2014US20140173274 Credential validation
06/19/2014US20140173272 Cloud storage system, data encryption processing device and data encryption method in cloud storage system
06/19/2014US20140173266 Information processing apparatus and information processing method
06/19/2014US20140173265 Protecting Memory Contents During Boot Process
06/19/2014US20140173016 Method and apparatus for implementing secure and selectively deniable file storage
06/19/2014US20140172918 Role Based Access Management for Business Object Data Structures
06/19/2014US20140172917 Privacy and permission system for a social network
06/19/2014US20140172872 Relationship collaboration system
06/19/2014US20140172720 Method and system for securely incorporating electronic information into an online purchasing application
06/19/2014US20140172617 User authentication in an auction system
06/19/2014US20140172595 System and method for binding drm licenses to a customer domain
06/19/2014US20140169641 Mobile device having face recognition function using additional component and method for controlling the mobile device
06/19/2014US20140169559 Electronic device and audio processing method
06/18/2014EP2743860A1 Method of protecting data stored in an electronic database
06/18/2014EP2743859A1 Information management system and information management method
06/18/2014EP2743858A1 Using a honeypot workflow for software review
06/18/2014EP2743857A1 Methof for allowing establishment of a secure session between a device and a server
06/18/2014EP2743856A1 Method and apparatus for protecting application program
06/18/2014EP2743855A1 Secure configuration of mobile application
06/18/2014EP2743854A1 Clustering processing method and device for virus files
1 ... 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 ... 1193