| Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) | 
|---|
| 01/08/2014 | CN103500295A Method preventing copying of source codes by identifying ID dynamically | 
| 01/08/2014 | CN103500294A Document encrypting and decrypting method and device | 
| 01/08/2014 | CN103500202A Security protection method and system for light-weight database | 
| 01/08/2014 | CN103500201A Self-service machine for individual credit report | 
| 01/08/2014 | CN103500114A Method and device for installing application program | 
| 01/08/2014 | CN103500101A Method and device for locking screen and terminal | 
| 01/08/2014 | CN103500008A Thermal imaging interface method and device used for controlling computer program | 
| 01/08/2014 | CN103499996A Novel notebook computer | 
| 01/08/2014 | CN102077545B Personal security manager for ubiquitous patient monitoring | 
| 01/08/2014 | CN101809580B Dynamic media zones systems and methods | 
| 01/08/2014 | CN101751529B Method and apparatus for the secure processing of confidential content within a virtual machine of a processor | 
| 01/07/2014 | USRE44697 Encryption processor with shared memory interconnect | 
| 01/07/2014 | US8627506 Providing privacy settings for applications associated with a user profile | 
| 01/07/2014 | US8627496 Computer-readable medium for providing access to verified personal background data | 
| 01/07/2014 | US8627494 Classification separation router | 
| 01/07/2014 | US8627493 Single sign-on for network applications | 
| 01/07/2014 | US8627489 Distributed document version control | 
| 01/07/2014 | US8627488 Methods and apparatus to anonymize a dataset of spatial data | 
| 01/07/2014 | US8627487 Method and apparatus for providing DRM service | 
| 01/07/2014 | US8627484 Unauthorized location detection and countermeasures | 
| 01/07/2014 | US8627482 Method, apparatus and system for secure distribution of content | 
| 01/07/2014 | US8627479 System and method for network security including detection of attacks through partner websites | 
| 01/07/2014 | US8627473 Peer-to-peer (P2P) botnet tracking at backbone level | 
| 01/07/2014 | US8627465 Automatic inference of whitelist-based validation as part of static analysis for security | 
| 01/07/2014 | US8627458 Detecting malicious computer program activity using external program calls with dynamic rule sets | 
| 01/07/2014 | US8627457 Integrated security system | 
| 01/07/2014 | US8627456 Methods and systems for preventing access to display graphics generated by a trusted virtual machine | 
| 01/07/2014 | US8627455 Manufacturing method of a memory device to be authenticated | 
| 01/07/2014 | US8627452 System and method for providing network security to mobile devices | 
| 01/07/2014 | US8627451 Systems and methods for providing an isolated execution environment for accessing untrusted content | 
| 01/07/2014 | US8627446 Federating data between groups of servers | 
| 01/07/2014 | US8627444 Computers and microchips with a faraday cage, with a side protected by an internal hardware firewall and unprotected side connected to the internet for network operations, and with internal hardware compartments | 
| 01/07/2014 | US8627439 Processing communication events in a communications system | 
| 01/07/2014 | US8627437 Method for reading attributes from an ID token | 
| 01/07/2014 | US8627435 Customizable sign-on service | 
| 01/07/2014 | US8627422 Authentication in secure user plane location (SUPL) systems | 
| 01/07/2014 | US8627420 Apparatus for associating a client device or service with a wireless network | 
| 01/07/2014 | US8627419 Multiple image reverse turing test | 
| 01/07/2014 | US8627415 System and method for secure commercial multimedia rental and distribution over secure connections | 
| 01/07/2014 | US8627406 Device for protection of the data and executable codes of a computer system | 
| 01/07/2014 | US8627405 Policy and compliance management for user provisioning systems | 
| 01/07/2014 | US8627402 Evaluation systems and methods for coordinating software agents | 
| 01/07/2014 | US8627338 Rights object acquisition method of mobile terminal in digital right management system | 
| 01/07/2014 | US8627293 Detecting applications in a virtualization environment | 
| 01/07/2014 | US8627271 Reusable business sub-processes and run-time assembly | 
| 01/07/2014 | US8627131 Hardware countermeasure against cryptographic attack | 
| 01/07/2014 | US8627105 Method and apparatus for securing programming data of a programmable device | 
| 01/07/2014 | US8627103 Identity-based encryption of data items for secure access thereto | 
| 01/07/2014 | US8627100 Separate type mass data encryption/decryption apparatus and implementing method therefor | 
| 01/07/2014 | US8627098 Electronic device and method for verifying firmware of the electronic device | 
| 01/07/2014 | US8627097 System and method enabling parallel processing of hash functions using authentication checkpoint hashes | 
| 01/07/2014 | US8627096 System and method for providing secure access to an electronic device using both a screen gesture and facial biometrics | 
| 01/07/2014 | US8627095 Information processing apparatus, information processing method, and program | 
| 01/07/2014 | US8627086 Secure loading and storing of data in a data processing device | 
| 01/07/2014 | US8627079 Method and system for controlling a device | 
| 01/07/2014 | US8627069 System and method for securing a computer comprising a microkernel | 
| 01/07/2014 | US8627053 Method and apparatus for secure execution using a secure memory partition | 
| 01/07/2014 | US8626915 Routing method | 
| 01/07/2014 | US8626842 Content transaction management server device, content-providing server device, and terminal device and control program | 
| 01/07/2014 | US8626806 Method and system for managing execution of virtual applications | 
| 01/07/2014 | US8626712 Logging and analyzing computer user's context data | 
| 01/07/2014 | US8626669 Secure physical billing system | 
| 01/07/2014 | US8626668 Individualized digital media delivery systems | 
| 01/07/2014 | US8625838 Cardless financial transactions system | 
| 01/07/2014 | US8625806 Data-processing apparatus and method for processing data | 
| 01/07/2014 | US8625797 Releasing a service on an electronic appliance | 
| 01/07/2014 | US8625780 Reduction of side-channel information by interacting crypto blocks | 
| 01/07/2014 | US8624842 Projected and secured virtual keyboard | 
| 01/07/2014 | US8623099 System and method for securing data within a storage system | 
| 01/07/2014 | US8622310 Token comprising improved physical unclonable function | 
| 01/07/2014 | CA2793810C Method and system for securing data utilizing redundant secure key storage | 
| 01/07/2014 | CA2694921C Safety console | 
| 01/06/2014 | CA2820060A1 Method for authenticating a signature | 
| 01/06/2014 | CA2819835A1 User-rotatable three-dimensionally rendered object for unlocking a computing device | 
| 01/06/2014 | CA2819767A1 Methods and systems for improving the accuracy performance of authentication systems | 
| 01/03/2014 | WO2014005148A1 System and method for establishing and monetizing trusted identities in cyberspace with personal data service and user console | 
| 01/03/2014 | WO2014005004A1 Proximity aware security system for portable electronics with multi-factor user authentication and secure device identity verification | 
| 01/03/2014 | WO2014004926A1 Methods and systems for secure in-network insertion of web content and web services | 
| 01/03/2014 | WO2014004862A1 Secure printing in a cloud-based print system | 
| 01/03/2014 | WO2014004821A1 Preventing attacks on devices with multiple cpus | 
| 01/03/2014 | WO2014004631A1 Biometric initiated communication | 
| 01/03/2014 | WO2014004590A2 End-to-end trusted communications infrastructure | 
| 01/03/2014 | WO2014004556A1 Automatic association of authentication credentials with biometrics | 
| 01/03/2014 | WO2014004553A1 Access credential reader connector | 
| 01/03/2014 | WO2014004541A1 Expedited biometric validation | 
| 01/03/2014 | WO2014004533A1 Secure user presence detection and authentication | 
| 01/03/2014 | WO2014004412A1 Identity risk score generation and implementation | 
| 01/03/2014 | WO2014004406A1 Method, system, and device for securely handling virtual function driver communications with a physical function driver | 
| 01/03/2014 | WO2014004404A1 Mobile platform software update with secure authentication | 
| 01/03/2014 | WO2014004399A1 Method and system for data security utilizing user behavior and device identification | 
| 01/03/2014 | WO2014004313A1 System and method for embedding first party widgets in third party applications | 
| 01/03/2014 | WO2014004212A1 Timer for hardware protection of virtual machine monitor runtime integrity watcher | 
| 01/03/2014 | WO2014004135A1 Techniques for user-validated close-range mutual authentication | 
| 01/03/2014 | WO2014004128A1 Devices, systems, and methods for monitoring and asserting trust level using persistent trust log | 
| 01/03/2014 | WO2014004123A1 Methods and apparatus for a secure sleep state | 
| 01/03/2014 | WO2014004093A1 Authenticating a user of a system via an authentication image mechanism | 
| 01/03/2014 | WO2014004038A1 Keyboard as biometric authentication device | 
| 01/03/2014 | WO2014003978A1 Real human detection and confirmation in personal credential verification | 
| 01/03/2014 | WO2014003900A1 Social sharing of security information in a group | 
| 01/03/2014 | WO2014003521A1 Access method for decoding encryption data |