| Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) | 
|---|
| 01/03/2014 | WO2014003516A1 Method and apparatus for providing data sharing | 
| 01/03/2014 | WO2014003497A1 Generation and verification of alternate data having specific format | 
| 01/03/2014 | WO2014002621A1 Teller machine and storage medium storing program | 
| 01/03/2014 | WO2014002343A1 Terminal device, information processing system, information processing method, and program | 
| 01/03/2014 | WO2014002083A1 Secure transaction systems and methodologies | 
| 01/03/2014 | WO2014001875A1 Systems, methods and apparatuses for the application-specific identification of devices | 
| 01/03/2014 | WO2014001803A2 Memory protection | 
| 01/03/2014 | WO2014001695A1 Method for authenticating a device for access to a service | 
| 01/03/2014 | WO2014000927A1 Method for protecting a computer program product, computer program product and computer-readable storage medium | 
| 01/03/2014 | WO2014000819A1 A method of and network server for detecting data patterns in an input data stream | 
| 01/03/2014 | WO2014000696A1 Security detection method and system for android application program | 
| 01/03/2014 | WO2014000616A1 Scanning method and device, and client apparatus | 
| 01/03/2014 | WO2014000601A1 Security information interaction system, device and method | 
| 01/03/2014 | WO2014000554A1 Method for constructing role-based access control system and cloud server | 
| 01/03/2014 | WO2014000537A1 System and method for finding phishing website | 
| 01/03/2014 | WO2014000468A1 Security detection method and security detection apparatus | 
| 01/03/2014 | CA2877205A1 Systems, methods and apparatuses for the application-specific identification of devices | 
| 01/03/2014 | CA2875823A1 System and method for establishing and monetizing trusted identities in cyberspace with personal data service and user console | 
| 01/03/2014 | CA2839078A1 Virtual storage system and methods of copying electronic documents into the virtual storage system | 
| 01/02/2014 | US20140007264 Always-available embedded theft reaction subsystem | 
| 01/02/2014 | US20140007263 Selection of sandbox for initiating application | 
| 01/02/2014 | US20140007262 Method, an Apparatus and a Computer Program Product for Extending an Application in a Client Device | 
| 01/02/2014 | US20140007260 File Reading Protection System and a Protection Method Thereof | 
| 01/02/2014 | US20140007259 Methods for governing the disclosure of restricted data | 
| 01/02/2014 | US20140007258 Systems and methods for governing the disclosure of restricted data | 
| 01/02/2014 | US20140007256 Remotely Defining Security Data for Authorization of Local Application Activity | 
| 01/02/2014 | US20140007254 Selection of sandbox for initiating application | 
| 01/02/2014 | US20140007253 Graduated authentication in an identity management system | 
| 01/02/2014 | US20140007252 Change-Tolerant Method of Generating an Identifier for a Collection of Assets in a Computing Environment Using a Secret Sharing Scheme | 
| 01/02/2014 | US20140007251 Method for interchanging data in a secure runtime environment | 
| 01/02/2014 | US20140007250 Concealing access patterns to electronic data storage for privacy | 
| 01/02/2014 | US20140007249 Privacy Control in a Social Network | 
| 01/02/2014 | US20140007248 Timer for hardware protection of virtual machine monitor runtime integrity watcher | 
| 01/02/2014 | US20140007247 Dynamic Security Question Compromise Checking Based on Incoming Social Network Postings | 
| 01/02/2014 | US20140007245 Enforcing e-meeting attendee guidelines | 
| 01/02/2014 | US20140007244 Systems and methods for generating risk assessments | 
| 01/02/2014 | US20140007243 Static analysis for discovery of timing attack vulnerabilities in a computer software application | 
| 01/02/2014 | US20140007241 System and method for identifying exploitable weak points in a network | 
| 01/02/2014 | US20140007240 Static analysis for discovery of timing attack vulnerabilities in a computer software application | 
| 01/02/2014 | US20140007239 Performing anti-virus checks for a distributed filesystem | 
| 01/02/2014 | US20140007238 Collective Threat Intelligence Gathering System | 
| 01/02/2014 | US20140007236 Systems, methods, and apparatus for improved application security | 
| 01/02/2014 | US20140007235 Identification of Infected Devices in Broadband Environments | 
| 01/02/2014 | US20140007234 PREVENTING ATTACKS ON DEVICES WITH MULTIPLE CPUs | 
| 01/02/2014 | US20140007233 System and method for real time data awareness | 
| 01/02/2014 | US20140007230 Method, system, and device for securely handling virtual function driver communications with a physical function driver | 
| 01/02/2014 | US20140007229 System and method for identifying installed software products | 
| 01/02/2014 | US20140007228 System and method for prevention of malware attacks on data | 
| 01/02/2014 | US20140007227 Mobile information terminal and gripping-feature authentication method | 
| 01/02/2014 | US20140007226 Electric apparatus, authentication device and authentication method | 
| 01/02/2014 | US20140007225 Multi-person gestural authentication and authorization system and method of operation thereof | 
| 01/02/2014 | US20140007224 Real human detection and confirmation in personal credential verification | 
| 01/02/2014 | US20140007223 Biometric Capture for Unauthorized User Identification | 
| 01/02/2014 | US20140007221 Secure image authentication | 
| 01/02/2014 | US20140007206 Notification of Security Question Compromise Level based on Social Network Interactions | 
| 01/02/2014 | US20140007205 No-Click Log-In Access to User's Web Account Using a Mobile Device | 
| 01/02/2014 | US20140007204 Web-Based Security Proxy for Computing System Environment Scanning | 
| 01/02/2014 | US20140007198 Application authorization for video services | 
| 01/02/2014 | US20140007197 Delegation within a computing environment | 
| 01/02/2014 | US20140007196 Subscriber authentication using a user device-generated security code | 
| 01/02/2014 | US20140007195 User Authentication of Applications on Third-Party Devices Via User Devices | 
| 01/02/2014 | US20140007191 Managing Personal Information on a Network | 
| 01/02/2014 | US20140007190 Social Sharing of Security Information in a Group | 
| 01/02/2014 | US20140007188 Systems and methods for secure handling of secure attention sequences | 
| 01/02/2014 | US20140007186 Prevention of information leakage from a document based on dynamic database label based access control (lbac) policies | 
| 01/02/2014 | US20140007184 Method and System for Protecting Data Flow at a Mobile Device | 
| 01/02/2014 | US20140007181 System and method for data loss prevention in a virtualized environment | 
| 01/02/2014 | US20140007180 Prevention of information leakage from a document based on dynamic database label based access control (lbac) policies | 
| 01/02/2014 | US20140007179 Identity risk score generation and implementation | 
| 01/02/2014 | US20140007178 Model for managing hosted resources using logical scopes | 
| 01/02/2014 | US20140007177 Secure authentication using memory cards | 
| 01/02/2014 | US20140007120 Method for operating a microprocessor unit, in particular in a mobile terminal | 
| 01/02/2014 | US20140006806 Effective data protection for mobile devices | 
| 01/02/2014 | US20140006804 Virtualized trusted descriptors | 
| 01/02/2014 | US20140006803 System And Method For Securely Binding And Node-Locking Program Execution To A Trusted Signature Authority | 
| 01/02/2014 | US20140006802 Ordered deletion of content in storage systems | 
| 01/02/2014 | US20140006801 Start Method for Application Cryptographic Keystores | 
| 01/02/2014 | US20140006800 Method and apparatus for providing provably secure user input/output | 
| 01/02/2014 | US20140006796 System and method for identifying software changes | 
| 01/02/2014 | US20140006794 Private/public gesture security system and method of operation thereof | 
| 01/02/2014 | US20140006793 Trusted System Network | 
| 01/02/2014 | US20140006791 Systems and methods using cryptography to protect secure computing environments | 
| 01/02/2014 | US20140006782 Document encryption and decryption | 
| 01/02/2014 | US20140006776 Certification of a virtual trusted platform module | 
| 01/02/2014 | US20140006765 Information processing apparatus and start-up control method | 
| 01/02/2014 | US20140006452 Method and apparatus for constructing and maintaining a user knowledge profile | 
| 01/02/2014 | US20140006347 Secure container for protecting enterprise data on a mobile device | 
| 01/02/2014 | US20140005951 Blood Glucose Measuring Device with Reliable Transmission of Values to an External Device | 
| 01/02/2014 | US20140004935 Game system, and control method and computer readable medium therefor | 
| 01/02/2014 | US20140002849 Image forming apparatus, wireless connection setting method, and storage medium | 
| 01/02/2014 | US20140002240 Expedited Biometric Validation | 
| 01/02/2014 | DE102013210837A1 Startanwendung kryptographischer Schlüsselspeicher Start application of cryptographic key store | 
| 01/02/2014 | DE102012210747A1 Verfahren zum schutz eines computerprogrammprodukts, computerprogrammprodukt und computerlesbares speichermedium A method for protecting a computer program product, computer program product, and computer-readable storage medium | 
| 01/01/2014 | EP2680185A1 Electronic device | 
| 01/01/2014 | EP2680184A1 Integrated circuit protected against intrusions of an attacker | 
| 01/01/2014 | EP2680183A1 Method of managing a memory embedded in an electronic token | 
| 01/01/2014 | EP2680182A1 Mobile device and method to monitor a baseband processor in relation to the actions on an application processor | 
| 01/01/2014 | EP2680181A1 System and method of securely creating and controlling access to a virtualised space | 
| 01/01/2014 | EP2680180A1 System and method for securely allocating a virtualised space | 
| 01/01/2014 | EP2680179A1 Selection of sandbox for initiating application |