| Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) | 
|---|
| 01/30/2014 | WO2014015970A1 Apparatus and method for detecting an intrusion in electric power networks | 
| 01/30/2014 | WO2014015790A1 Method and system for file scanning | 
| 01/30/2014 | WO2014015413A1 Method of managing role-based digital rights in a computer system | 
| 01/30/2014 | WO2014015386A1 System and method for fraud prevention | 
| 01/30/2014 | US20140033331 Multilayer security wrap | 
| 01/30/2014 | US20140033330 Undiscoverable physical chip identification | 
| 01/30/2014 | US20140033329 Server Geospatially Organized Flat File Data | 
| 01/30/2014 | US20140033327 Siftsort | 
| 01/30/2014 | US20140033325 Non-volatile memory for anti-cloning and authentication method for the same | 
| 01/30/2014 | US20140033323 Secure Time for Mobile Devices | 
| 01/30/2014 | US20140033322 Method and apparatus for mapping | 
| 01/30/2014 | US20140033321 Method and apparatus for securely executing multiple actions using less than a corresponding multiple of privilege elevation prompts | 
| 01/30/2014 | US20140033320 Document origin designator | 
| 01/30/2014 | US20140033319 Collecting Data from Processor-Based Devices | 
| 01/30/2014 | US20140033318 Apparatus and method for managing usim data using mobile trusted module | 
| 01/30/2014 | US20140033316 Trusted security zone access to peripheral devices | 
| 01/30/2014 | US20140033315 Method and system for enforcing a license dependency rule for a software application | 
| 01/30/2014 | US20140033314 Validation of function call parameters | 
| 01/30/2014 | US20140033313 Software suite activation | 
| 01/30/2014 | US20140033312 Methods and systems for distributing right-protected asset | 
| 01/30/2014 | US20140033311 Method and apparatus for determining virus-infected files | 
| 01/30/2014 | US20140033309 Taint tracking mechanism for computer security | 
| 01/30/2014 | US20140033305 Code validation | 
| 01/30/2014 | US20140033304 Method and apparatus for preventing an idt-based security sandbox from causing a kernel panic when using a call gate | 
| 01/30/2014 | US20140033303 Infusion Devices and Methods | 
| 01/30/2014 | US20140033302 Method and apparatus for selectively enabling a microprocessor-based system | 
| 01/30/2014 | US20140033301 Mobile device and pupil recognition method | 
| 01/30/2014 | US20140033300 System and method for verification of user identification based on multimedia content elements | 
| 01/30/2014 | US20140033299 Protecting data on a mobile device | 
| 01/30/2014 | US20140033298 User terminal apparatus and control method thereof | 
| 01/30/2014 | US20140033297 Apparatus for controlling processor execution in a secure environment | 
| 01/30/2014 | US20140033293 Secure telematics | 
| 01/30/2014 | US20140033292 System and Method for Authenticating Suspect Devices | 
| 01/30/2014 | US20140033289 Anti-identity theft and information security system | 
| 01/30/2014 | US20140033280 System and method of mapping and protecting communication services with oauth | 
| 01/30/2014 | US20140033278 System and method of securing sharing of resources which require consent of multiple resource owners using group uri's | 
| 01/30/2014 | US20140033277 Program Service Based on Individual Identification | 
| 01/30/2014 | US20140033273 Automating calls between separate and distinct applications for invoking an identity verification function | 
| 01/30/2014 | US20140033272 Evaluating a security stack in repsonse to a request to access a service | 
| 01/30/2014 | US20140033271 Policy-Based Application Management | 
| 01/30/2014 | US20140033266 Method and apparatus for providing concealed software execution environment based on virtualization | 
| 01/30/2014 | US20140033265 Digital rights management in a collaborative environment | 
| 01/30/2014 | US20140033210 Techniques for Attesting Data Processing Systems | 
| 01/30/2014 | US20140033196 Method and system for determining the eligibility for deploying protected content | 
| 01/30/2014 | US20140033060 Methods and systems for interactive evaluation using dynamically generated, interactive resultant sets of policies | 
| 01/30/2014 | US20140032937 Systems and methods for information security using one-time pad | 
| 01/30/2014 | US20140032936 Information processing apparatus, control method for information processing apparatus, and storage medium | 
| 01/30/2014 | US20140032935 Memory system and encryption method in memory system | 
| 01/30/2014 | US20140032933 Providing access to encrypted data | 
| 01/30/2014 | US20140032932 Method, manufacture, and apparatus for secure debug and crash logging of obfuscated libraries | 
| 01/30/2014 | US20140032931 Cryptographic equipment implementing red/black communication modes | 
| 01/30/2014 | US20140032930 Secure data scanning method and system | 
| 01/30/2014 | US20140032929 Method, device, and system for encrypting and decrypting image | 
| 01/30/2014 | US20140032927 Archiving electronic content having digital signatures | 
| 01/30/2014 | US20140032926 System, method and computer product for fast and secure data searching | 
| 01/30/2014 | US20140032925 System and method for combining deduplication and encryption of data | 
| 01/30/2014 | US20140032924 Media encryption based on biometric data | 
| 01/30/2014 | US20140032923 System and device for authenticating a user | 
| 01/30/2014 | US20140032922 Blind hashing | 
| 01/30/2014 | US20140032921 Protecting data on a mobile device | 
| 01/30/2014 | US20140032910 Storage system in which fictitious information is prevented | 
| 01/30/2014 | US20140032899 Method and system for secure form delivery | 
| 01/30/2014 | US20140032893 Secure virtualization environment bootable from an external media device | 
| 01/30/2014 | US20140032631 Executing dynamically assigned functions while providing services | 
| 01/30/2014 | US20140032171 Method for testing tamper protection of a field device and field device having tamper protection | 
| 01/30/2014 | US20140029747 System and method for transcoding content | 
| 01/30/2014 | US20140029039 Office machine security policy | 
| 01/30/2014 | US20140028823 Mobile terminal and control method thereof | 
| 01/30/2014 | DE112012000744T5 Erkennung eines trojanischen Pferdes Recognition of a Trojan horse | 
| 01/30/2014 | DE102013105042A1 Sicheres Flashprogrammieren eines sekundären Prozessors Secure Flash programming a secondary processor | 
| 01/29/2014 | EP2690838A1 Authentification system preserving secret data confidentiality | 
| 01/29/2014 | EP2690579A1 Method and device for protecting against fault attack(s) an electronic device using a cache memory | 
| 01/29/2014 | EP2690578A1 Electronic storage device and data protection method thereof | 
| 01/29/2014 | EP2690577A1 Electronic storage device and data protection method thereof | 
| 01/29/2014 | EP2690576A2 User terminal apparatus and control method thereof | 
| 01/29/2014 | EP2690575A2 User Authentication System, User Authentication Method and Network Apparatus | 
| 01/29/2014 | EP2690574A1 Method and system for digital content online reading authentication | 
| 01/29/2014 | EP2690511A1 Apparatus and method for detecting an intrusion in electric power networks | 
| 01/29/2014 | EP2689598A1 Interrogating an authentication device | 
| 01/29/2014 | EP2689569A1 Method and device for connecting to a high security network | 
| 01/29/2014 | EP2689377A1 System and method for user access management | 
| 01/29/2014 | EP2689376A1 System and method providing dependency networks throughout applications for attack resistance | 
| 01/29/2014 | EP2689375A1 System and method for securely binding and node-locking program execution to a trusted signature authority | 
| 01/29/2014 | EP2689373A1 Detecting attacks on a portable data carrier | 
| 01/29/2014 | EP2689372A1 User to user delegation service in a federated identity management environment | 
| 01/29/2014 | EP2689371A1 Fast device classification | 
| 01/29/2014 | EP2689370A1 Blood glucose measuring device and method for reading measured blood glucose values | 
| 01/29/2014 | EP2689369A1 Method for masking the end-of-life transition of an electronic device and device comprising a corresponding control module | 
| 01/29/2014 | EP2689368A1 Method for switching between virtualized and non-virtualized system operation | 
| 01/29/2014 | EP2689367A1 Data protection using distributed security key | 
| 01/29/2014 | EP2689366A1 Software licence control | 
| 01/29/2014 | EP2689353A1 System and method for data masking | 
| 01/29/2014 | EP2689304A1 System and method of secure data entry | 
| 01/29/2014 | EP2336908B1 Search device, search method and search program using open search engine | 
| 01/29/2014 | EP2062191B1 System and method for securely restoring a program context from a shared memory | 
| 01/29/2014 | EP2041942B1 Controlled sharing of personal data | 
| 01/29/2014 | EP2024845B1 Apparatus and method of securely moving security data | 
| 01/29/2014 | CN203414952U Computer with information safety device | 
| 01/29/2014 | CN203414951U Position detection device | 
| 01/29/2014 | CN203414950U Safety management device for universal management media and safety management system |