| Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) | 
|---|
| 01/15/2014 | CN103514392A Login authentication device and method of computer operation system | 
| 01/15/2014 | CN103514391A Method and device for reminding of expiring of digital certificate | 
| 01/15/2014 | CN103514390A Method and device for data self-destroying and digital device | 
| 01/15/2014 | CN103514389A Equipment authentication method and device | 
| 01/15/2014 | CN103514388A Pattern password trajectory configuration system and method using the same | 
| 01/15/2014 | CN103514387A Method for improving user identification precision of electronic device and electronic device | 
| 01/15/2014 | CN103514386A Permission management method for application, electronic device, and computer readable medium | 
| 01/15/2014 | CN103514385A Embedded system and method for preventing software piracy through embedded system | 
| 01/15/2014 | CN103514384A Extended electronic copyright management method, client-side, server and system | 
| 01/15/2014 | CN103514383A Outward-embedded type chip explosion self-destruction micro device | 
| 01/15/2014 | CN103514156A Method for translating network communication text in transmission process | 
| 01/15/2014 | CN103514027A Method for enhancing usability of software protection | 
| 01/15/2014 | CN103514012A 网络系统和信息处理方法 Network system and information processing method | 
| 01/15/2014 | CN103514010A Automatic application updates | 
| 01/15/2014 | CN102215214B Selective-transparent-encryption/decryption-based file protection method and system | 
| 01/15/2014 | CN102024106B Method for executing user customization code in encryption card and encryption card | 
| 01/15/2014 | CN101911090B Information interchange system and apparatus | 
| 01/15/2014 | CN101911088B Method for secure data transfer | 
| 01/15/2014 | CN101779436B Tracking the origins of data and controlling data transmission | 
| 01/15/2014 | CN101568902B Device management apparatus, job flow processing method, and task cooperative processing system | 
| 01/14/2014 | US8631506 Remote data viewer | 
| 01/14/2014 | US8631505 Method, system, and device for providing a market for digital goods | 
| 01/14/2014 | US8631504 Document security within a business enterprise | 
| 01/14/2014 | US8631502 Method and apparatus for updating revocation list and reproducing encrypted content | 
| 01/14/2014 | US8631501 Reporting function in gaming system environment | 
| 01/14/2014 | US8631500 Generating minimality-attack-resistant data | 
| 01/14/2014 | US8631499 Platform for analyzing the security of communication protocols and channels | 
| 01/14/2014 | US8631495 Systems and methods for message threat management | 
| 01/14/2014 | US8631491 Replay attack protection with small state for use in secure group communication | 
| 01/14/2014 | US8631486 Adaptive identity classification | 
| 01/14/2014 | US8631485 Identification of malicious activities through non-logged-in host usage | 
| 01/14/2014 | US8631476 Data processing system including explicit and generic grants of action authorization | 
| 01/14/2014 | US8631470 System and method for policy based control of NAS storage devices | 
| 01/14/2014 | US8631469 Executing commands on devices through presence applications | 
| 01/14/2014 | US8631464 Method of detecting anomalous behaviour in a computer network | 
| 01/14/2014 | US8631463 Tailored system management interface | 
| 01/14/2014 | US8631459 Policy and compliance management for user provisioning systems | 
| 01/14/2014 | US8631458 Method and apparatus for elastic (re)allocation of enterprise workloads on clouds while minimizing compliance costs | 
| 01/14/2014 | US8631430 Enabling DRM-encrypted broadcast content through gateway into the home | 
| 01/14/2014 | US8631333 Feature set differentiation by tenant and user | 
| 01/14/2014 | US8631319 Document databases managed by first and second authentication methods | 
| 01/14/2014 | US8631250 Method and system for designating and handling confidential memory allocations | 
| 01/14/2014 | US8631249 Operation unit and program | 
| 01/14/2014 | US8631248 Pointguard: method and system for protecting programs against pointer corruption attacks | 
| 01/14/2014 | US8631247 System and method for hardware based security | 
| 01/14/2014 | US8631245 Information processing apparatus, control method and computer-readable medium | 
| 01/14/2014 | US8631243 Biometrics based identification | 
| 01/14/2014 | US8631242 Applicant screening | 
| 01/14/2014 | US8631241 Secure configuration of computing device | 
| 01/14/2014 | US8631236 Auto file locker | 
| 01/14/2014 | US8631165 Communications network with smart card | 
| 01/14/2014 | US8631045 System and method for network administration and local administration of privacy protection criteria | 
| 01/14/2014 | US8631038 Managing digital identity information | 
| 01/14/2014 | US8630955 Financial card system, communications device, authentication terminal, authentication method, and program | 
| 01/14/2014 | US8630882 Implementing an optimal intelligent enterprise architecture via virtualization, information intelligence, social computing and green environmental considerations | 
| 01/14/2014 | US8630419 Apparatus and method for encrypting image data, and decrypting the encrypted image data, and image data distribution system | 
| 01/14/2014 | US8630418 Secure management of keys in a key repository | 
| 01/14/2014 | US8630410 Signal generator based device security | 
| 01/14/2014 | CA2499932C Credential roaming | 
| 01/13/2014 | CA2820981A1 Secure peripheral connecting device | 
| 01/11/2014 | CA2795603A1 Methods and systems for improving the security of secret authentication data during authentication transactions | 
| 01/10/2014 | DE202013011130U1 Chipsystem Chip system | 
| 01/09/2014 | WO2014008452A1 Providing consistent security information | 
| 01/09/2014 | WO2014008403A1 Data protection hub | 
| 01/09/2014 | WO2014008399A1 Continuous multi-factor authentication | 
| 01/09/2014 | WO2014008308A1 System and method for data loss prevention in a virtualized environment | 
| 01/09/2014 | WO2014008228A1 Credential quality assessment engine systems and methods | 
| 01/09/2014 | WO2014008194A1 Determining hotword suitability | 
| 01/09/2014 | WO2014008079A2 Systems and methods for identity authentication using a social network | 
| 01/09/2014 | WO2014007943A2 Method and apparatus for obfuscating user demographics | 
| 01/09/2014 | WO2014007918A1 Methods and systems for use in identifying cyber-security threats in an aviation platform | 
| 01/09/2014 | WO2014007786A1 System for monitoring an operating system startup | 
| 01/09/2014 | WO2014007311A1 Secret sharing system, data distribution device, distributed data conversion device, secret sharing method, and program | 
| 01/09/2014 | WO2014007310A1 Secret sharing system, data distribution device, distributed data conversion device, secret sharing method, and program | 
| 01/09/2014 | WO2014006851A1 Anonymization device, anonymization system, anonymization method, and program recording medium | 
| 01/09/2014 | WO2014006668A1 Content playback device and portable terminal | 
| 01/09/2014 | WO2014006618A1 System and method for authenticating a transaction over a data network | 
| 01/09/2014 | WO2014006274A1 An apparatus, a system, a method and a computer program for erasing data stored on a storage device | 
| 01/09/2014 | WO2014005966A1 Method of water-marking digital books | 
| 01/09/2014 | WO2014005885A1 Method and apparatus for web page content categorization | 
| 01/09/2014 | WO2014005867A1 Voucher authorization for cloud server | 
| 01/09/2014 | WO2014005736A1 Method and system for providing private information to a user | 
| 01/09/2014 | WO2014005547A1 Identify plug-in of emu class internet game | 
| 01/09/2014 | WO2014005501A1 Method and system for user account to maintain login state and storage medium | 
| 01/09/2014 | WO2014005385A1 Information security protection device | 
| 01/09/2014 | WO2014005289A1 Management system and method for smart terminal and digital resources | 
| 01/09/2014 | WO2014005286A1 Digital resources management method and device | 
| 01/09/2014 | WO2014005268A1 Resource access method and device | 
| 01/09/2014 | WO2013172898A9 System for detecting, analyzing, and controlling infiltration of computer and network systems | 
| 01/09/2014 | WO2013148097A3 Converting a digital media item from a rental to a purchase | 
| 01/09/2014 | US20140013455 Always-available embedded theft reaction subsystem | 
| 01/09/2014 | US20140013454 Always-available embedded theft reaction subsystem | 
| 01/09/2014 | US20140013453 Duplication judgment device and duplication management system | 
| 01/09/2014 | US20140013452 Data protection hub | 
| 01/09/2014 | US20140013451 Data obfuscation for open data (odata) communications | 
| 01/09/2014 | US20140013448 Method and System for Allocating Access to Digital Media Content | 
| 01/09/2014 | US20140013447 Method for User Access Control in a Multitenant Data Management System | 
| 01/09/2014 | US20140013446 Method and System for Providing Presence Information | 
| 01/09/2014 | US20140013445 Controlled Resources Based on Good Behavior | 
| 01/09/2014 | US20140013444 Authentication using a digital rights management policy |