| Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) | 
|---|
| 05/08/2014 | WO2014069998A1 Method and system for protected exchange of data | 
| 05/08/2014 | WO2014069787A1 Security through metadata orchestrators | 
| 05/08/2014 | WO2014069777A1 Transit control for data | 
| 05/08/2014 | WO2014069226A1 Transaction device, transaction method and transaction system | 
| 05/08/2014 | WO2014068968A1 Information processing device | 
| 05/08/2014 | WO2014068862A1 Information processing apparatus, information processing system, information processing method and computer program | 
| 05/08/2014 | WO2014068792A1 Access control method and access control system | 
| 05/08/2014 | WO2014068632A1 Facility management device, facility management system and program | 
| 05/08/2014 | WO2014068618A1 Storage system and license management method | 
| 05/08/2014 | WO2014068576A1 Hierarchical code locking system | 
| 05/08/2014 | WO2014068362A1 Method and system for secure computer file management and storage having high level of usability | 
| 05/08/2014 | WO2014068336A1 Content protection | 
| 05/08/2014 | WO2014068305A1 Device and method for secure memory access | 
| 05/08/2014 | WO2014068173A1 Method and apparatus for providing attribution to the creators of the components in a compound media | 
| 05/08/2014 | WO2014068051A1 Method for the protected deposit of event protocol data of a computer system, computer programme product and computer system | 
| 05/08/2014 | WO2014068049A1 Method for the protected recovery of data, computer programme product and computer system | 
| 05/08/2014 | WO2014067945A1 Method and system for verifying the security of an application with a view to its use on a user apparatus | 
| 05/08/2014 | WO2014067760A1 Device for processing multimedia contents implementing a plurality of virtual machines | 
| 05/08/2014 | WO2014067428A1 Full life-cycle management method for sensitive data file based on fingerprint information implantation | 
| 05/08/2014 | WO2014067410A1 Method for rapidly generating coordinate point in embedded system | 
| 05/08/2014 | WO2014067102A1 Information coding method, system and computer-readable medium | 
| 05/08/2014 | WO2014066986A1 Data distribution methods and systems | 
| 05/08/2014 | WO2014066924A1 Content management system | 
| 05/08/2014 | WO2014041561A3 A system for analyzing applications in order to find security and quality issues | 
| 05/08/2014 | WO2014028226A3 System and method for software allocation based on forecasts and calendars | 
| 05/08/2014 | WO2014012106A3 Retroactively detecting malicious or undesirable software | 
| 05/08/2014 | WO2013188599A4 Securely communicating between a card reader and a mobile device | 
| 05/08/2014 | US20140130189 Transition between states in a processor | 
| 05/08/2014 | US20140130188 Techniques For Secure Storage Hijacking Protection | 
| 05/08/2014 | US20140130187 Protecting Systems from Unauthorized Access to System Resources Using Browser Independent Web Page Technology | 
| 05/08/2014 | US20140130186 Methods and systems for increasing the security of electronic messages | 
| 05/08/2014 | US20140130185 Methods And Systems For Processing Content Rights | 
| 05/08/2014 | US20140130184 System and Method for Providing Access to Verified Personal Background Data | 
| 05/08/2014 | US20140130183 Managing Confidential Information | 
| 05/08/2014 | US20140130182 Controlled Grant Of Access To Media Content | 
| 05/08/2014 | US20140130181 Drm system | 
| 05/08/2014 | US20140130180 Control of access to files | 
| 05/08/2014 | US20140130179 System and method for providing a multimedia degital rights transfer follow me service | 
| 05/08/2014 | US20140130178 Automated Determination of Quasi-Identifiers Using Program Analysis | 
| 05/08/2014 | US20140130177 System and method for creating a certified electronic record | 
| 05/08/2014 | US20140130176 Automatic software audit system and associated method | 
| 05/08/2014 | US20140130175 Data Leakage Detection in a Multi-Tenant Data Architecture | 
| 05/08/2014 | US20140130174 Application and Data Removal System | 
| 05/08/2014 | US20140130173 Expression rewriting for secure computation optimization | 
| 05/08/2014 | US20140130172 Systems and methods for automating blind detection of computational vulnerabilities | 
| 05/08/2014 | US20140130171 Method and system of processing application security | 
| 05/08/2014 | US20140130170 Information security audit method, system and computer readable storage medium for storing thereof | 
| 05/08/2014 | US20140130169 Identification of malicious activities through non-logged-in host usage | 
| 05/08/2014 | US20140130168 Antivirus system and method for removable media devices | 
| 05/08/2014 | US20140130161 System and Method for Cloud-Based Detection of Computer Malware | 
| 05/08/2014 | US20140130159 Methods and systems for detecting an electronic intrusion | 
| 05/08/2014 | US20140130158 Identification of malware detection signature candidate code | 
| 05/08/2014 | US20140130157 Method and system for discrete stateful behavioral analysis | 
| 05/08/2014 | US20140130156 Refinement-based security analysis | 
| 05/08/2014 | US20140130154 Sound and effective data-flow analysis in the presence of aliasing | 
| 05/08/2014 | US20140130152 Defense against dns dos attack | 
| 05/08/2014 | US20140130151 Methods for providing anti-rollback protection of a firmware version in a device which has no internal non-volatile memory | 
| 05/08/2014 | US20140130150 Content-based isolation for computing device security | 
| 05/08/2014 | US20140130149 Refinement-based security analysis | 
| 05/08/2014 | US20140130148 Information processing device, information processing method, and computer program | 
| 05/08/2014 | US20140130147 Enabling access to a subset of data | 
| 05/08/2014 | US20140130145 User device adding secure token to network requests | 
| 05/08/2014 | US20140130143 Mobile terminal and control method thereof | 
| 05/08/2014 | US20140130142 Method and Cloud Security Framework for Implementing Tenant License Verification | 
| 05/08/2014 | US20140130135 Integrated collaboration environment | 
| 05/08/2014 | US20140130134 Managing and Providing Access to Applications in an Application-Store Module | 
| 05/08/2014 | US20140130127 Risk Adjusted, Multifactor Authentication | 
| 05/08/2014 | US20140130123 Method for operating invisible system services on android platform | 
| 05/08/2014 | US20140130121 System and Method for Information Risk Management | 
| 05/08/2014 | US20140130060 User-level re-initialization instruction interception | 
| 05/08/2014 | US20140129954 Tailored System Management Interface | 
| 05/08/2014 | US20140129953 Apparatus and method for single action control of social network profile access | 
| 05/08/2014 | US20140129849 Semiconductor device including encryption section, semiconductor device including external interface, and content reproduction method | 
| 05/08/2014 | US20140129848 Method and Apparatus for Writing and Reading Hard Disk Data | 
| 05/08/2014 | US20140129847 Trusted Storage | 
| 05/08/2014 | US20140129846 Method and System for Protecting a Driver | 
| 05/08/2014 | US20140129845 Attribute based encryption using lattices | 
| 05/08/2014 | US20140129844 Storage security using cryptographic splitting | 
| 05/08/2014 | US20140129843 Methods and Apparatus for Managing Service Access Using a Touch-Display Device Integrated with Fingerprint Imager | 
| 05/08/2014 | US20140129842 Unauthorized contents detection system | 
| 05/08/2014 | US20140129836 Information distribution system and program for the same | 
| 05/08/2014 | US20140129832 Transparent real-time access to encrypted non-relational data | 
| 05/08/2014 | US20140129831 Computer-Implemented System And Method For Individual Message Encryption Using A Unique Key | 
| 05/08/2014 | US20140129817 Device booting with an initial protection component | 
| 05/08/2014 | US20140129656 Internet content marking | 
| 05/08/2014 | US20140129646 Method and apparatus for performing security control by using captured image | 
| 05/08/2014 | US20140129341 Customizable application functionality activity | 
| 05/08/2014 | US20140129282 Automatic License Entitlement Calculation | 
| 05/08/2014 | US20140125455 Systems and algorithms for classification of user based on their personal features | 
| 05/08/2014 | DE102012220268A1 Mobilgerät zum Konfigurieren eines anderen Gerätes, Verfahren zum Konfigurieren eines anderen Gerätes und entsprechende Anordnung mit mindestens einer Nahbereich-Kommunikationsverbindung Mobile device to configure another device, method for configuring another device and corresponding arrangement with at least one short-range communication link | 
| 05/08/2014 | DE102012110510A1 Verfahren zum geschützten Hinterlegen von Ereignisprotokoll-Daten eines Computersystems, Computerprogrammprodukt sowie Computersystem A method for protected Leave event log data of a computer system, computer program product and computer system | 
| 05/08/2014 | DE102012110507A1 Verfahren zum geschützten Wiederherstellen von Daten, Computerprogrammprodukt sowie Computersystem A method for recovering data protected, computer program product and computer system | 
| 05/08/2014 | DE102012023965A1 Verfahren und Vorrichtung zum Ausführen der Sicherheitssteuerung durch verwenden eines erfassten Bilds Method and apparatus for performing the safety controller by use of a captured image | 
| 05/07/2014 | EP2728919A1 Digital communication device and anti-theft method thereof | 
| 05/07/2014 | EP2728891A2 Systems and methods for distributed authentication of video services | 
| 05/07/2014 | EP2728825A1 Terminal apparatus with DRM decoding function and DRM decoding method in terminal apparatus | 
| 05/07/2014 | EP2728509A2 Semiconductor Device and Encryption Key Writing Method | 
| 05/07/2014 | EP2728508A1 Dynamic data masking | 
| 05/07/2014 | EP2728507A1 Method and system for enabling and disabling execution of computer instructions | 
| 05/07/2014 | EP2728506A1 Apparatus & method for facilitating container-based management |