| Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) | 
|---|
| 12/17/2013 | US8613042 Access control list conversion system, and method and program threrfor | 
| 12/17/2013 | US8612777 Apparatus and method for writing data to be stored to a predetermined memory area | 
| 12/17/2013 | US8612776 Storage control apparatus to which thin provisioning is applied | 
| 12/17/2013 | US8612775 Computer system for managing storage area state of a storage system | 
| 12/17/2013 | US8612774 Secure OTP using external memory | 
| 12/17/2013 | US8612770 Biometric authentication method and computer system | 
| 12/17/2013 | US8612769 Electronic signature method and device | 
| 12/17/2013 | US8612768 Unique account identification | 
| 12/17/2013 | US8612767 Obscuring an accelerometer signal | 
| 12/17/2013 | US8612766 Secure credential unlock using trusted execution environments | 
| 12/17/2013 | US8612765 Security based on subliminal and supraliminal channels for data objects | 
| 12/17/2013 | US8612760 Decrypting identity key from battery with root key in host | 
| 12/17/2013 | US8612755 Security policy in trusted computing systems | 
| 12/17/2013 | US8612747 System and method for establishing historical usage-based hardware trust | 
| 12/17/2013 | US8612744 Distributed firewall architecture using virtual machines | 
| 12/17/2013 | US8612708 Hardware data protection device | 
| 12/17/2013 | US8612492 Relationship collaboration system | 
| 12/17/2013 | US8612356 Voucher code redemption via SMS | 
| 12/17/2013 | US8612354 Method for controlling digital rights of the “Play N times” type for a digital audio and/or video content and device implementing this method | 
| 12/17/2013 | US8610538 Memory-tag data authentication | 
| 12/17/2013 | US8610454 System and methods for generating unclonable security keys in integrated circuits | 
| 12/17/2013 | CA2587155C System and method for processing messages with encryptable message parts | 
| 12/17/2013 | CA2511531C Protected media path and refusal response enabler | 
| 12/12/2013 | WO2013185099A1 System and methods for determing decomposition graph complexity | 
| 12/12/2013 | WO2013185020A1 Method and apparatus for unlocking an electronic device that allows for profile selection | 
| 12/12/2013 | WO2013184799A1 Evaluating whether to block or allow installation of a software application | 
| 12/12/2013 | WO2013184705A1 Method, apparatus and system of controlling remote login | 
| 12/12/2013 | WO2013184653A1 Method and system for resilient and adaptive detection of malicious websites | 
| 12/12/2013 | WO2013184567A1 Apparatus and method for forming secure computational resources | 
| 12/12/2013 | WO2013184529A2 Malicious message detection and processing | 
| 12/12/2013 | WO2013184523A1 Sql transformation-based optimization techniques for enforcement of data access control | 
| 12/12/2013 | WO2013184501A1 Component analysis of software applications on computing devices | 
| 12/12/2013 | WO2013184365A1 System management using messages | 
| 12/12/2013 | WO2013184281A1 Kernel-level security agent | 
| 12/12/2013 | WO2013184267A1 Enhanced 2chk authentication security with query transactions | 
| 12/12/2013 | WO2013184266A2 Enhanced 2chk authentication security with query transactions | 
| 12/12/2013 | WO2013184265A1 Enterprise triggered 2chk association | 
| 12/12/2013 | WO2013184016A1 Method for carrying out secure communication in computer networks (variants) | 
| 12/12/2013 | WO2013183250A1 Information processing device for anonymization and anonymization method | 
| 12/12/2013 | WO2013183083A1 Storage system and storage system management method | 
| 12/12/2013 | WO2013183039A2 Clickjacking protection | 
| 12/12/2013 | WO2013183012A1 Off-line content delivery | 
| 12/12/2013 | WO2013183010A1 Auxiliary input device for encrypted data entry | 
| 12/12/2013 | WO2013182639A1 Method of anonymization | 
| 12/12/2013 | WO2013182632A1 Random number distribution | 
| 12/12/2013 | WO2013182417A1 Method of managing a memory embedded in an electronic token | 
| 12/12/2013 | WO2013182376A1 Method and system for executing a secure application on an untrusted user equipment | 
| 12/12/2013 | WO2013182286A1 Secure data processing | 
| 12/12/2013 | WO2013182285A1 Secure data processing | 
| 12/12/2013 | WO2013182154A1 Method, system and terminal for encrypting/decrypting application program on communication terminal | 
| 12/12/2013 | WO2013182131A1 Configuration method, configuration apparatus and electronic device | 
| 12/12/2013 | WO2013182119A1 Screen unlocking method, device and terminal | 
| 12/12/2013 | WO2013182073A1 Method and system for identifying file security and storage medium | 
| 12/12/2013 | WO2013182048A1 Malware removal method and system, and computer storage medium | 
| 12/12/2013 | WO2013182008A1 Computer health index display apparatus and method | 
| 12/12/2013 | WO2013182006A1 Method and device for use in intercepting call for service by application | 
| 12/12/2013 | WO2013182005A1 Method and device for use in intercepting call for service by application | 
| 12/12/2013 | WO2013181938A1 Media playing method and device | 
| 12/12/2013 | WO2013181682A1 Method and device for control of a lock mechanism using a mobile terminal | 
| 12/12/2013 | WO2013070773A3 Methods, devices, and systems for detecting return-oriented programming exploits | 
| 12/12/2013 | US20130333056 System and method for changing abilities of a process | 
| 12/12/2013 | US20130333054 Post-download patient data protection in a medical device | 
| 12/12/2013 | US20130333053 Method for protecting firmware being updated | 
| 12/12/2013 | US20130333052 Information processing system, information processing apparatus, and computer-readable storage medium | 
| 12/12/2013 | US20130333051 Random value identification device, random value identification system, and random value identification method | 
| 12/12/2013 | US20130333050 Method for producing a secured data object and system | 
| 12/12/2013 | US20130333049 Data protection method for portable electronic device and computer program product for the same | 
| 12/12/2013 | US20130333046 System and method of automatically detecting outliers in usage patterns | 
| 12/12/2013 | US20130333045 Security level visualization device | 
| 12/12/2013 | US20130333044 Vulnerability-based remediation selection | 
| 12/12/2013 | US20130333043 Mechanism to Calculate Probability of a Cyber Security Incident | 
| 12/12/2013 | US20130333042 Storage system and storage system management method | 
| 12/12/2013 | US20130333041 Method and Apparatus for Automatic Identification of Affected Network Resources After a Computer Intrusion | 
| 12/12/2013 | US20130333040 Kernel-Level Security Agent | 
| 12/12/2013 | US20130333039 Evaluating Whether to Block or Allow Installation of a Software Application | 
| 12/12/2013 | US20130333037 Methods, systems, and media for detecting covert malware | 
| 12/12/2013 | US20130333036 System, method and program for identifying and preventing malicious intrusions | 
| 12/12/2013 | US20130333034 Method and Apparatus for Automatic Identification of Affected Network Resources After a Computer Intrusion | 
| 12/12/2013 | US20130333033 Software protection mechanism | 
| 12/12/2013 | US20130333032 Network based device security and controls | 
| 12/12/2013 | US20130333031 Dynamic code insertion and removal for static analysis based sandboxes | 
| 12/12/2013 | US20130333027 Dynamic rights assignment | 
| 12/12/2013 | US20130333026 Malicious message detection and processing | 
| 12/12/2013 | US20130333025 System and method for role based analysis and access control | 
| 12/12/2013 | US20130333024 Random value identification device, random value identification system, and random value identification method | 
| 12/12/2013 | US20130333023 Electronic paper with mode switch unit | 
| 12/12/2013 | US20130333022 Sharing Content Online | 
| 12/12/2013 | US20130333021 Preventing malicious software from utilizing access rights | 
| 12/12/2013 | US20130333020 Method and Apparatus for Unlocking an Electronic Device that Allows for Profile Selection | 
| 12/12/2013 | US20130333010 Enhancing Password Protection | 
| 12/12/2013 | US20130333009 Dynamic trust connection | 
| 12/12/2013 | US20130333008 Enhanced 2chk authentication security with query transactions | 
| 12/12/2013 | US20130333006 Enterprise triggered 2chk association | 
| 12/12/2013 | US20130333004 Client computer, remote control system, and remote control method | 
| 12/12/2013 | US20130333003 Systems and methods for implementing multi-factor authentication | 
| 12/12/2013 | US20130333002 Dynamic authentication in alternate operating environment | 
| 12/12/2013 | US20130332997 Computerized system and method for deployment of management tunnels | 
| 12/12/2013 | US20130332996 System and process for managing network communications | 
| 12/12/2013 | US20130332995 System and method for using machine readable code to commission device applications | 
| 12/12/2013 | US20130332992 Methods and systems for identifying a trustable workflow based on a comprehensive trust model |