| Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) | 
|---|
| 03/20/2014 | US20140082376 System, Method and Apparatus for Securely Saving/Retrieving Data on a Data Storage | 
| 03/20/2014 | US20140082375 Data security for digital data storage | 
| 03/20/2014 | US20140082371 Secure processor and a program for a secure processor | 
| 03/20/2014 | US20140082370 Methods, apparatus and systems to improve security in computer systems | 
| 03/20/2014 | US20140082369 Method and System For Object Access and Usage Control Using Location and Access Boundary Shape Information | 
| 03/20/2014 | US20140082368 Biometric authentication method and computer system | 
| 03/20/2014 | US20140082367 Verifying passwords on a mobile device | 
| 03/20/2014 | US20140082356 Protection of interpreted source code in virtual appliances | 
| 03/20/2014 | US20140082355 Secure system for allowing the execution of authorized computer program code | 
| 03/20/2014 | US20140082354 System and method for obtaining keys to access protected information | 
| 03/20/2014 | US20140082353 Scalable groups of authenticated entities | 
| 03/20/2014 | US20140082351 Authority-Neutral Certification for Multiple-Authority PKI Environments | 
| 03/20/2014 | US20140082349 Security credential deployment in cloud environment | 
| 03/20/2014 | US20140082344 Case secure computer architecture | 
| 03/20/2014 | US20140081850 System and Method for Providing Access to Streaming Multimedia Content to Devices From Servers | 
| 03/20/2014 | US20140079590 Perfusion system with rfid feature activation | 
| 03/20/2014 | US20140079373 Information processing apparatus and method, and program storage medium | 
| 03/20/2014 | DE112012002579T5 Erfassen und Bearbeiten von Inhalten unter Verwendung biometrischer Daten Capturing and editing content using biometric data | 
| 03/20/2014 | DE102012108866A1 Verfahren zum sicheren Bedienen eines Feldgerätes Method for the safe operation of a field device | 
| 03/20/2014 | CA2824109A1 Systems and methods for data privacy and destruction in multi-system landscapes | 
| 03/19/2014 | EP2709335A1 Information processing apparatus, information providing server, program, communication system, and login information providing server | 
| 03/19/2014 | EP2709333A1 Method and devices for data leak protection | 
| 03/19/2014 | EP2709306A1 Method and system to perform secure boolean search over encrypted documents | 
| 03/19/2014 | EP2709035A2 System, method and computer program product for detecting tampering in a product | 
| 03/19/2014 | EP2709034A1 Systems and methods for code protection in non-volatile memory systems | 
| 03/19/2014 | EP2709033A1 System and method for detecting data extrusion in software applications | 
| 03/19/2014 | EP2709032A2 Image forming apparatus, driving method thereof, and computer-readable recording medium | 
| 03/19/2014 | EP2709031A1 Gesture- and expression-based authentication | 
| 03/19/2014 | EP2709029A1 Fraud detection system, fraud detection device, fraud detection method, and non-volatile medium | 
| 03/19/2014 | EP2707842A1 Method and device for starting limited-time licenses for telecommunication systems in a controlled manner | 
| 03/19/2014 | EP2707831A1 Apparatus and method for hardware-based secure data processing using buffer memory address range rules | 
| 03/19/2014 | EP2707830A1 System and method for authenticating a photograph | 
| 03/19/2014 | EP2707735A1 Systems and methods of implementing content validation of microcomputer based circuits | 
| 03/19/2014 | CN203490702U Encryption anti-theft host of computer | 
| 03/19/2014 | CN203490701U Intelligent safety control equipment | 
| 03/19/2014 | CN203490700U Computer security boot-up protection system | 
| 03/19/2014 | CN203490699U Vehicle terminal antitheft system | 
| 03/19/2014 | CN103650528A Method and apparatus for providing content to an earpiece in accordance with a privacy filter and content selection rule | 
| 03/19/2014 | CN103650459A Information presentation method and equipment | 
| 03/19/2014 | CN103650412A System for providing sets of content and applications and control method therefor, terminal and control method therefor, authentication device and control method therefor, program, and information storage medium | 
| 03/19/2014 | CN103650005A Identification technique | 
| 03/19/2014 | CN103649966A Content name-based network device and method for protecting content | 
| 03/19/2014 | CN103649965A System, method and apparatus for facilitating resource security | 
| 03/19/2014 | CN103649964A Secure hosted execution architecture | 
| 03/19/2014 | CN103649963A Trust level activation | 
| 03/19/2014 | CN103649962A System and method for protecting digital contents with digital rights management (DRM) | 
| 03/19/2014 | CN103647890A Information processing system, utilization constraint method and recording medium | 
| 03/19/2014 | CN103647786A Television and method and remote storage device log-in method and device thereof | 
| 03/19/2014 | CN103647784A Public and private isolation method and device | 
| 03/19/2014 | CN103647769A Human ear information coding encryption and application method | 
| 03/19/2014 | CN103647651A Security chip based power distribution terminal management method | 
| 03/19/2014 | CN103647587A Method and system for unlocking mobile terminal, mobile terminal and wearable electronic device | 
| 03/19/2014 | CN103646346A Mirror image real name ticket booking system | 
| 03/19/2014 | CN103646244A Methods and devices for face characteristic extraction and authentication | 
| 03/19/2014 | CN103646219A Power consumption compensation and attack resisting circuit based on neural network power consumption predication and control method | 
| 03/19/2014 | CN103646218A Device and method for defining data access right and behavior right | 
| 03/19/2014 | CN103646217A Method and device for protecting security of data in terminal and terminal | 
| 03/19/2014 | CN103646216A Method and device for monitoring folder of terminal | 
| 03/19/2014 | CN103646215A Application installation control method, related system and related device | 
| 03/19/2014 | CN103646214A Method for establishing trusted environment in power distribution terminal | 
| 03/19/2014 | CN103646213A Method and device for classifying malicious software | 
| 03/19/2014 | CN103646212A Information fraud network defense platform | 
| 03/19/2014 | CN103646211A Method and device for loading payment webpage in browser | 
| 03/19/2014 | CN103646210A Method and device for calling system function | 
| 03/19/2014 | CN103646209A Cloud-security-based bundled software blocking method and device | 
| 03/19/2014 | CN103646208A Monitoring method and device of eMMC | 
| 03/19/2014 | CN103646207A Method and device for managing security attribute of application program | 
| 03/19/2014 | CN103646206A Access method compatible with different cipher devices | 
| 03/19/2014 | CN103646205A Method for controlling operation of encryption lock | 
| 03/19/2014 | CN103646204A Safety device for mobile information safety protection | 
| 03/19/2014 | CN103646203A Computer safety system with human body biological characteristic recognition | 
| 03/19/2014 | CN103646202A Fingerprint information coding encryption and application method | 
| 03/19/2014 | CN103646201A Verification method achieved by combining human faces with identities | 
| 03/19/2014 | CN103646200A Encoding encryption application method for human face information | 
| 03/19/2014 | CN103646199A Sudoku password and facial image-based authentication method | 
| 03/19/2014 | CN103646198A Method, system and device for locking working region of mobile terminal | 
| 03/19/2014 | CN103646197A User credibility authentication system and method based on user behaviors | 
| 03/19/2014 | CN103646196A Method for inputting graph keys through mouse touchpad | 
| 03/19/2014 | CN103646195A Copyright protection oriented database watermarking method | 
| 03/19/2014 | CN103646194A Credible sorting method of synchronous data flow procedures based on formal verification | 
| 03/19/2014 | CN103646163A Cloud platform based human health detection system and method | 
| 03/19/2014 | CN103646068A Encryption method, decryption method, method for group messaging and corresponding devices thereof | 
| 03/19/2014 | CN103646062A Scanning method and device for downloaded file | 
| 03/19/2014 | CN103646057A Junk file analysis method and device and junk file cleaning method | 
| 03/19/2014 | CN103645949A Virtual machine dynamic migration security framework | 
| 03/19/2014 | CN103645885A Microprocessor, related operation method, encryption and decryption methods | 
| 03/19/2014 | CN103645838A Mobile terminal and unlocking method thereof | 
| 03/19/2014 | CN103645791A Single-power multi-mainboard power supply management system | 
| 03/19/2014 | CN102750477B Method and system for controlling closing of terminal | 
| 03/19/2014 | CN102693388B Data safety protection processing system, method and storage medium | 
| 03/19/2014 | CN102360410B User operation discovery method of file system and synchronous system utilizing the same | 
| 03/19/2014 | CN102339369B MCU (Micro-programmed Control Unit) information protection method | 
| 03/19/2014 | CN102213924B Unit using OS and image forming apparatus using the same | 
| 03/19/2014 | CN102184357B Portable trustworthy private information processing system | 
| 03/19/2014 | CN102176227B Signing testifying method and auxiliary signing testifying system | 
| 03/19/2014 | CN102117214B Embedded equipment and data file downloading method thereof | 
| 03/19/2014 | CN102034034B Biological authentication device | 
| 03/19/2014 | CN101996294B Method for providing user customized certificate and signature | 
| 03/18/2014 | US8677510 System, method, and device for communicating and storing and delivering data | 
| 03/18/2014 | US8677509 Method and system for preventing copying of information from previews of webpages |