| Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) | 
|---|
| 12/31/2013 | US8621634 Malware detection based on a predetermined criterion | 
| 12/31/2013 | US8621633 Mobile terminal to prevent virus infection and method of controlling operation of the mobile terminal | 
| 12/31/2013 | US8621628 Protecting user mode processes from improper tampering or termination | 
| 12/31/2013 | US8621626 Detection of code execution exploits | 
| 12/31/2013 | US8621625 Methods and systems for detecting infected files | 
| 12/31/2013 | US8621624 Apparatus and method for preventing anomaly of application program | 
| 12/31/2013 | US8621620 System and method for protecting and securing storage devices using below-operating system trapping | 
| 12/31/2013 | US8621619 Dynamic code insertion for static analysis based sandboxes | 
| 12/31/2013 | US8621618 System and method for assessing whether a communication contains an attack | 
| 12/31/2013 | US8621617 Method of securing execution of a program | 
| 12/31/2013 | US8621616 Method and system for identifying suspected phishing websites | 
| 12/31/2013 | US8621615 Behavior-based traffic profiling based on access control information | 
| 12/31/2013 | US8621613 Detecting malware in content items | 
| 12/31/2013 | US8621610 Network service for the detection, analysis and quarantine of malicious and unwanted files | 
| 12/31/2013 | US8621608 System, method, and computer program product for dynamically adjusting a level of security applied to a system | 
| 12/31/2013 | US8621607 Computational system including mechanisms for tracking taint | 
| 12/31/2013 | US8621606 Systems and methods for identifying external functions called by untrusted applications | 
| 12/31/2013 | US8621602 One-time authentication system | 
| 12/31/2013 | US8621601 Systems for authentication for access to software development kit for a peripheral device | 
| 12/31/2013 | US8621594 Method and system for secure communication | 
| 12/31/2013 | US8621589 Cross domain single sign on | 
| 12/31/2013 | US8621588 Information processing system, terminal device, and server | 
| 12/31/2013 | US8621586 Using baseline profiles in adaptive authentication | 
| 12/31/2013 | US8621582 Authentication system | 
| 12/31/2013 | US8621579 Communication apparatus, electronic mail transmitting method, and electronic mail transmitting program | 
| 12/31/2013 | US8621578 Methods and systems for protecting website forms from automated access | 
| 12/31/2013 | US8621577 Method for performing multiple pre-shared key based authentication at once and system for executing the method | 
| 12/31/2013 | US8621576 System and method of multimedia access | 
| 12/31/2013 | US8621574 Opaque quarantine and device discovery | 
| 12/31/2013 | US8621571 Online service providing system, method, server and mobile device thereof, and computer program product | 
| 12/31/2013 | US8621568 WAN module based remote wakeup system and terminal thereof | 
| 12/31/2013 | US8621567 Network security and applications to the fabric environment | 
| 12/31/2013 | US8621561 Selective authorization based on authentication input attributes | 
| 12/31/2013 | US8621557 Information processing system judging whether manipulation is possible or not based on access control policy and method of operation thereof | 
| 12/31/2013 | US8621556 Dynamic resolution of fully qualified domain name (FQDN) address objects in policy definitions | 
| 12/31/2013 | US8621553 Model based security for cloud services | 
| 12/31/2013 | US8621552 Method, a system, and a computer program product for managing access change assurance | 
| 12/31/2013 | US8621551 Safety and management of computing environments that may support unsafe components | 
| 12/31/2013 | US8621550 Information technology resource compliance templates | 
| 12/31/2013 | US8621396 Access using image-based manipulation | 
| 12/31/2013 | US8621244 Method and apparatus for matching consumers | 
| 12/31/2013 | US8621243 Saving and retrieving data based on public key encryption | 
| 12/31/2013 | US8621236 Method for activating at least a function on a chipset and chipset for the implementation of the method | 
| 12/31/2013 | US8621233 Malware detection using file names | 
| 12/31/2013 | US8621232 Method for producing, allocating and checking authorization approvals | 
| 12/31/2013 | US8621231 Method and server for accessing an electronic safe via a plurality of entities | 
| 12/31/2013 | US8621228 MAC aggregation resilient to denial-of-service attacks for use in a multi-node data network | 
| 12/31/2013 | US8621225 Method and apparatus for enhancing security of wireless communications | 
| 12/31/2013 | US8621224 Alert options for electronic-paper verification | 
| 12/31/2013 | US8621220 Systems and methods for identity encapsulated cryptography | 
| 12/31/2013 | US8621219 Communication system having plural terminals and method for controlling terminal in communication system | 
| 12/31/2013 | US8621214 Document encryption and decryption | 
| 12/31/2013 | US8621212 Systems and methods for cryptographically enhanced automatic blacklist management and enforcement | 
| 12/31/2013 | US8621206 Authority-neutral certification for multiple-authority PKI environments | 
| 12/31/2013 | US8621200 Key delivery method and apparatus in a communications system | 
| 12/31/2013 | US8621198 Simplified protocol for carrying authentication for network access | 
| 12/31/2013 | US8621189 System and method for hardware strengthened passwords | 
| 12/31/2013 | US8621187 Method of program obfuscation and processing device for executing obfuscated programs | 
| 12/31/2013 | US8621186 Obfuscated hardware multi-threading | 
| 12/31/2013 | US8621136 Virtualizing processor memory protection with “L1 iterate and L2 swizzle” | 
| 12/31/2013 | US8621033 Method for identifying internet users | 
| 12/31/2013 | US8620881 Intelligent data storage and processing using FPGA devices | 
| 12/31/2013 | US8620819 Remote feature activator feature extraction | 
| 12/31/2013 | US8620818 Activation system architecture | 
| 12/31/2013 | US8620817 Method and system for creating license management in software applications | 
| 12/31/2013 | US8620816 Information vault, data format conversion services system and method | 
| 12/31/2013 | US8620815 Systems and methods for document management | 
| 12/31/2013 | US8620814 Three party account authority digital signature (AADS) system | 
| 12/31/2013 | US8620141 Recording apparatus, recording method, image pickup apparatus, reproducing apparatus and video system | 
| 12/31/2013 | US8620027 Augmented reality-based file transfer method and file transfer system thereof | 
| 12/31/2013 | US8619994 System and method for providing digital contents service | 
| 12/31/2013 | US8619979 Physically unclonable function implemented through threshold voltage comparison | 
| 12/31/2013 | US8619978 Multiple account authentication | 
| 12/31/2013 | US8619975 Cipher processing apparatus | 
| 12/31/2013 | US8619973 System and device for data encryption and recovery | 
| 12/31/2013 | US8619972 Method and system for atomicity for elliptic curve cryptosystems | 
| 12/31/2013 | US8618911 Simplified biometric character sequence entry | 
| 12/31/2013 | CA2545812C System and method for container monitoring, real time authentication, anomaly detection, and alerts | 
| 12/31/2013 | CA2498603C Methods and apparatus for dynamic user authentication using customizable context-dependent interaction across multiple verification objects | 
| 12/27/2013 | WO2013192631A1 System and method for secure, high-speed transfer of very large files | 
| 12/27/2013 | WO2013192528A1 System and method for unified billing | 
| 12/27/2013 | WO2013192477A1 Cyber security monitoring system and method for data center components | 
| 12/27/2013 | WO2013192448A1 Managing use of a field programmable gate array with isolated components | 
| 12/27/2013 | WO2013192441A1 Managing use of a field programmable gate array with reprogrammable cryptographic operations | 
| 12/27/2013 | WO2013192271A1 Secure cloud hypervisor monitor | 
| 12/27/2013 | WO2013192228A1 Pass through service login to application login | 
| 12/27/2013 | WO2013192021A1 Dynamic human interactive proof | 
| 12/27/2013 | WO2013192016A1 Network based management of protected data sets | 
| 12/27/2013 | WO2013191945A1 Providing geographic protection to a system | 
| 12/27/2013 | WO2013191857A1 Privacy manager for restricting correlation of meta-content having protected information based on privacy rules | 
| 12/27/2013 | WO2013191855A1 Content rights protection with arbitrary correlation of second content | 
| 12/27/2013 | WO2013191563A1 Protecting connector cover with attaching means | 
| 12/27/2013 | WO2013190873A1 Data processor, communication device, data transmission method | 
| 12/27/2013 | WO2013190810A1 Information processing device and information anonymizing method | 
| 12/27/2013 | WO2013190736A1 Portable terminal, program, and control method | 
| 12/27/2013 | WO2013190598A1 Broadcast receiving device program overwrite method, broadcast receiving device, and program | 
| 12/27/2013 | WO2013190549A1 System and method to access content of encrypted data items in unsupported digital environments | 
| 12/27/2013 | WO2013190372A1 Systems, methods and apparatuses for securing root certificates | 
| 12/27/2013 | WO2013190363A1 Systems, methods and apparatuses for secure time management | 
| 12/27/2013 | WO2013190266A1 Method and system for authenticating messages |