| Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) | 
|---|
| 01/08/2014 | CN103500295A Method preventing copying of source codes by identifying ID dynamically  | 
| 01/08/2014 | CN103500294A Document encrypting and decrypting method and device  | 
| 01/08/2014 | CN103500202A Security protection method and system for light-weight database  | 
| 01/08/2014 | CN103500201A Self-service machine for individual credit report  | 
| 01/08/2014 | CN103500114A Method and device for installing application program  | 
| 01/08/2014 | CN103500101A Method and device for locking screen and terminal  | 
| 01/08/2014 | CN103500008A Thermal imaging interface method and device used for controlling computer program  | 
| 01/08/2014 | CN103499996A Novel notebook computer  | 
| 01/08/2014 | CN102077545B Personal security manager for ubiquitous patient monitoring  | 
| 01/08/2014 | CN101809580B Dynamic media zones systems and methods  | 
| 01/08/2014 | CN101751529B Method and apparatus for the secure processing of confidential content within a virtual machine of a processor  | 
| 01/07/2014 | USRE44697 Encryption processor with shared memory interconnect  | 
| 01/07/2014 | US8627506 Providing privacy settings for applications associated with a user profile  | 
| 01/07/2014 | US8627496 Computer-readable medium for providing access to verified personal background data  | 
| 01/07/2014 | US8627494 Classification separation router  | 
| 01/07/2014 | US8627493 Single sign-on for network applications  | 
| 01/07/2014 | US8627489 Distributed document version control  | 
| 01/07/2014 | US8627488 Methods and apparatus to anonymize a dataset of spatial data  | 
| 01/07/2014 | US8627487 Method and apparatus for providing DRM service  | 
| 01/07/2014 | US8627484 Unauthorized location detection and countermeasures  | 
| 01/07/2014 | US8627482 Method, apparatus and system for secure distribution of content  | 
| 01/07/2014 | US8627479 System and method for network security including detection of attacks through partner websites  | 
| 01/07/2014 | US8627473 Peer-to-peer (P2P) botnet tracking at backbone level  | 
| 01/07/2014 | US8627465 Automatic inference of whitelist-based validation as part of static analysis for security  | 
| 01/07/2014 | US8627458 Detecting malicious computer program activity using external program calls with dynamic rule sets  | 
| 01/07/2014 | US8627457 Integrated security system  | 
| 01/07/2014 | US8627456 Methods and systems for preventing access to display graphics generated by a trusted virtual machine  | 
| 01/07/2014 | US8627455 Manufacturing method of a memory device to be authenticated  | 
| 01/07/2014 | US8627452 System and method for providing network security to mobile devices  | 
| 01/07/2014 | US8627451 Systems and methods for providing an isolated execution environment for accessing untrusted content  | 
| 01/07/2014 | US8627446 Federating data between groups of servers  | 
| 01/07/2014 | US8627444 Computers and microchips with a faraday cage, with a side protected by an internal hardware firewall and unprotected side connected to the internet for network operations, and with internal hardware compartments  | 
| 01/07/2014 | US8627439 Processing communication events in a communications system  | 
| 01/07/2014 | US8627437 Method for reading attributes from an ID token  | 
| 01/07/2014 | US8627435 Customizable sign-on service  | 
| 01/07/2014 | US8627422 Authentication in secure user plane location (SUPL) systems  | 
| 01/07/2014 | US8627420 Apparatus for associating a client device or service with a wireless network  | 
| 01/07/2014 | US8627419 Multiple image reverse turing test  | 
| 01/07/2014 | US8627415 System and method for secure commercial multimedia rental and distribution over secure connections  | 
| 01/07/2014 | US8627406 Device for protection of the data and executable codes of a computer system  | 
| 01/07/2014 | US8627405 Policy and compliance management for user provisioning systems  | 
| 01/07/2014 | US8627402 Evaluation systems and methods for coordinating software agents  | 
| 01/07/2014 | US8627338 Rights object acquisition method of mobile terminal in digital right management system  | 
| 01/07/2014 | US8627293 Detecting applications in a virtualization environment  | 
| 01/07/2014 | US8627271 Reusable business sub-processes and run-time assembly  | 
| 01/07/2014 | US8627131 Hardware countermeasure against cryptographic attack  | 
| 01/07/2014 | US8627105 Method and apparatus for securing programming data of a programmable device  | 
| 01/07/2014 | US8627103 Identity-based encryption of data items for secure access thereto  | 
| 01/07/2014 | US8627100 Separate type mass data encryption/decryption apparatus and implementing method therefor  | 
| 01/07/2014 | US8627098 Electronic device and method for verifying firmware of the electronic device  | 
| 01/07/2014 | US8627097 System and method enabling parallel processing of hash functions using authentication checkpoint hashes  | 
| 01/07/2014 | US8627096 System and method for providing secure access to an electronic device using both a screen gesture and facial biometrics  | 
| 01/07/2014 | US8627095 Information processing apparatus, information processing method, and program  | 
| 01/07/2014 | US8627086 Secure loading and storing of data in a data processing device  | 
| 01/07/2014 | US8627079 Method and system for controlling a device  | 
| 01/07/2014 | US8627069 System and method for securing a computer comprising a microkernel  | 
| 01/07/2014 | US8627053 Method and apparatus for secure execution using a secure memory partition  | 
| 01/07/2014 | US8626915 Routing method  | 
| 01/07/2014 | US8626842 Content transaction management server device, content-providing server device, and terminal device and control program  | 
| 01/07/2014 | US8626806 Method and system for managing execution of virtual applications  | 
| 01/07/2014 | US8626712 Logging and analyzing computer user's context data  | 
| 01/07/2014 | US8626669 Secure physical billing system  | 
| 01/07/2014 | US8626668 Individualized digital media delivery systems  | 
| 01/07/2014 | US8625838 Cardless financial transactions system  | 
| 01/07/2014 | US8625806 Data-processing apparatus and method for processing data  | 
| 01/07/2014 | US8625797 Releasing a service on an electronic appliance  | 
| 01/07/2014 | US8625780 Reduction of side-channel information by interacting crypto blocks  | 
| 01/07/2014 | US8624842 Projected and secured virtual keyboard  | 
| 01/07/2014 | US8623099 System and method for securing data within a storage system  | 
| 01/07/2014 | US8622310 Token comprising improved physical unclonable function  | 
| 01/07/2014 | CA2793810C Method and system for securing data utilizing redundant secure key storage  | 
| 01/07/2014 | CA2694921C Safety console  | 
| 01/06/2014 | CA2820060A1 Method for authenticating a signature  | 
| 01/06/2014 | CA2819835A1 User-rotatable three-dimensionally rendered object for unlocking a computing device  | 
| 01/06/2014 | CA2819767A1 Methods and systems for improving the accuracy performance of authentication systems  | 
| 01/03/2014 | WO2014005148A1 System and method for establishing and monetizing trusted identities in cyberspace with personal data service and user console  | 
| 01/03/2014 | WO2014005004A1 Proximity aware security system for portable electronics with multi-factor user authentication and secure device identity verification  | 
| 01/03/2014 | WO2014004926A1 Methods and systems for secure in-network insertion of web content and web services  | 
| 01/03/2014 | WO2014004862A1 Secure printing in a cloud-based print system  | 
| 01/03/2014 | WO2014004821A1 Preventing attacks on devices with multiple cpus  | 
| 01/03/2014 | WO2014004631A1 Biometric initiated communication  | 
| 01/03/2014 | WO2014004590A2 End-to-end trusted communications infrastructure  | 
| 01/03/2014 | WO2014004556A1 Automatic association of authentication credentials with biometrics  | 
| 01/03/2014 | WO2014004553A1 Access credential reader connector  | 
| 01/03/2014 | WO2014004541A1 Expedited biometric validation  | 
| 01/03/2014 | WO2014004533A1 Secure user presence detection and authentication  | 
| 01/03/2014 | WO2014004412A1 Identity risk score generation and implementation  | 
| 01/03/2014 | WO2014004406A1 Method, system, and device for securely handling virtual function driver communications with a physical function driver  | 
| 01/03/2014 | WO2014004404A1 Mobile platform software update with secure authentication  | 
| 01/03/2014 | WO2014004399A1 Method and system for data security utilizing user behavior and device identification  | 
| 01/03/2014 | WO2014004313A1 System and method for embedding first party widgets in third party applications  | 
| 01/03/2014 | WO2014004212A1 Timer for hardware protection of virtual machine monitor runtime integrity watcher  | 
| 01/03/2014 | WO2014004135A1 Techniques for user-validated close-range mutual authentication  | 
| 01/03/2014 | WO2014004128A1 Devices, systems, and methods for monitoring and asserting trust level using persistent trust log  | 
| 01/03/2014 | WO2014004123A1 Methods and apparatus for a secure sleep state  | 
| 01/03/2014 | WO2014004093A1 Authenticating a user of a system via an authentication image mechanism  | 
| 01/03/2014 | WO2014004038A1 Keyboard as biometric authentication device  | 
| 01/03/2014 | WO2014003978A1 Real human detection and confirmation in personal credential verification  | 
| 01/03/2014 | WO2014003900A1 Social sharing of security information in a group  | 
| 01/03/2014 | WO2014003521A1 Access method for decoding encryption data  |