| Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) | 
|---|
| 11/28/2013 | WO2013174437A1 Enhanced secure virtual machine provisioning | 
| 11/28/2013 | WO2013174397A1 Theft- prevention device for mobile phone | 
| 11/28/2013 | WO2013174395A1 Remote key safe laptop anti theft | 
| 11/28/2013 | WO2013174321A1 Command execution method and device, smart card and mobile terminal | 
| 11/28/2013 | WO2013139692A3 Method for configuring a wind energy installation, and wind energy installation | 
| 11/28/2013 | US20130318639 Security device for functional display, security, and charging of handheld electronic devices | 
| 11/28/2013 | US20130318638 Method for Programming a Mobile End Device Chip | 
| 11/28/2013 | US20130318637 Location-based recovery device and risk management system for portable computing devices and data | 
| 11/28/2013 | US20130318636 Computer chassis with protection against insects | 
| 11/28/2013 | US20130318634 Image forming apparatus, launching method of program in the apparatus, image forming system, and program and storage medium therefor | 
| 11/28/2013 | US20130318633 Data exchange between applications of an electronic device | 
| 11/28/2013 | US20130318632 Secure access to personal health records in emergency situations | 
| 11/28/2013 | US20130318631 Fraud Prevention in Online Systems | 
| 11/28/2013 | US20130318630 Systems and methods for validated secure data access | 
| 11/28/2013 | US20130318628 Systems and Methods for Providing Access to Computer Programs Based on Physical Activity Level of a User | 
| 11/28/2013 | US20130318627 Secure Handling of Information Related to a User | 
| 11/28/2013 | US20130318626 Securing access to distributed data in an unsecure data network | 
| 11/28/2013 | US20130318625 Method for protecting data stored in device and device thereof | 
| 11/28/2013 | US20130318624 Method and device for controlling distribution of licenses | 
| 11/28/2013 | US20130318623 Risk-management device | 
| 11/28/2013 | US20130318622 Private information sharing system | 
| 11/28/2013 | US20130318621 System and Method for Providing Information Access on a Portable Device | 
| 11/28/2013 | US20130318620 Location-based recovery device and risk management system for portable computing devices and data | 
| 11/28/2013 | US20130318619 Encapsulated security tokens for electronic transactions | 
| 11/28/2013 | US20130318618 Systems and methods for securing information by hiding identity on a computing device | 
| 11/28/2013 | US20130318616 Predicting attacks based on probabilistic game-theory | 
| 11/28/2013 | US20130318615 Predicting attacks based on probabilistic game-theory | 
| 11/28/2013 | US20130318614 Mobile application security assessment | 
| 11/28/2013 | US20130318613 Mobile application security score calculation | 
| 11/28/2013 | US20130318612 Rootkit monitoring agent built into an operating system kernel | 
| 11/28/2013 | US20130318610 System and Method for Detection and Treatment of Malware on Data Storage Devices | 
| 11/28/2013 | US20130318607 Using Power Fingerprinting (PFP) to Monitor the Integrity and Enhance Security of Computer Based Systems | 
| 11/28/2013 | US20130318606 Systems and Methods for Correlating and Distributing Intrusion Alert Information Among Collaborating Computer Systems | 
| 11/28/2013 | US20130318605 System for detecting rogue network protocol service providers | 
| 11/28/2013 | US20130318601 Method and system for real time classification of events in computer integrity system | 
| 11/28/2013 | US20130318600 Reporting and Management of Computer Systems and Data Sources | 
| 11/28/2013 | US20130318599 Protecting virtual machine console from misuse, hijacking or eavesdropping in cloud environments | 
| 11/28/2013 | US20130318598 Alternative Unlocking Patterns | 
| 11/28/2013 | US20130318597 Computer implemented security method and system | 
| 11/28/2013 | US20130318596 Password management system and method for electronic device | 
| 11/28/2013 | US20130318595 Authenticate a Hypervisor with Encoded Information | 
| 11/28/2013 | US20130318588 Identity verification systems and methods | 
| 11/28/2013 | US20130318584 Learning information on usage by a user, of one or more device(s), for cumulative inference of user's situation | 
| 11/28/2013 | US20130318583 System and method to enable external processing device running a cloud application to control a mail processing machine | 
| 11/28/2013 | US20130318582 Inboxes for documents, music, videos, and photos | 
| 11/28/2013 | US20130318581 Multi-factor authentication using a unique identification header (uidh) | 
| 11/28/2013 | US20130318580 Security based on usage activity associated with user device | 
| 11/28/2013 | US20130318578 Password management and smart honey pot system | 
| 11/28/2013 | US20130318575 Method and apparatus for dynamic authentication | 
| 11/28/2013 | US20130318573 Method and apparatus for guest access sharing | 
| 11/28/2013 | US20130318572 Wireless gateway supporting public and private networks | 
| 11/28/2013 | US20130318571 Managing distributed operating system physical resources | 
| 11/28/2013 | US20130318569 Propagating Delegated Authorized Credentials Through Legacy Systems | 
| 11/28/2013 | US20130318567 Reporting and Management of Computer Systems and Data Sources | 
| 11/28/2013 | US20130318361 Encrypting and storing biometric information on a storage device | 
| 11/28/2013 | US20130318360 Proxy computing system, computing apparatus, capability providing apparatus, proxy computing method, capability providing method, program, and recording medium | 
| 11/28/2013 | US20130318359 Systems and methods for verifying uniqueness in anonymous authentication | 
| 11/28/2013 | US20130318358 Apparatus for generating secure key using device and user authentication information | 
| 11/28/2013 | US20130318357 System and Method for Secure Software Update | 
| 11/28/2013 | US20130318356 Distribution of digital content protected by watermark-generating password | 
| 11/28/2013 | US20130318354 Method for generating a certificate | 
| 11/28/2013 | US20130318345 Multi-tunnel virtual private network | 
| 11/28/2013 | US20130318339 Systems and Methods for Protecting Communications Between Nodes | 
| 11/28/2013 | US20130318338 Selective Management Controller Authenticated Access Control to Host Mapped Resources | 
| 11/28/2013 | US20130315394 Data encryption method, data verification method and electronic apparatus | 
| 11/28/2013 | US20130315392 Method for displaying readable contents on a mobile reading device in a location-restricted manner | 
| 11/28/2013 | US20130315387 Encryption method characterized by three dimensional computation, feedback control, and dynamic transition box | 
| 11/28/2013 | DE102012010102A1 Verfahren und Vorrichtung zur Datenverarbeitung Method and device for data processing | 
| 11/27/2013 | EP2667579A1 Mobile information terminal and gripping characteristics authentication method | 
| 11/27/2013 | EP2667337A2 Transparent control of access invoking real-time analysis of the query history | 
| 11/27/2013 | EP2667329A1 Authorized party authentication template learning system and authorized party authentication template learning method | 
| 11/27/2013 | EP2667322A2 Microprocessor having a secure execution mode with provisions for monitoring, indicating, and managing security levels | 
| 11/27/2013 | EP2667321A1 Method for requesting digital content, for providing digital content, and for producing a personal profile of a user | 
| 11/27/2013 | EP2667320A1 Security verification device and security verification method | 
| 11/27/2013 | EP2667319A2 Computer implemented security system and method | 
| 11/27/2013 | EP2667318A1 Information processing apparatus, control method thereof, program, and image processing apparatus | 
| 11/27/2013 | EP2667317A1 Image processing apparatus, method for controlling image processing apparatus, and program | 
| 11/27/2013 | EP2667316A1 Electronic memory device | 
| 11/27/2013 | EP2667315A1 Encrypted digital content player | 
| 11/27/2013 | EP2667314A1 System and method for detection and treatment of malware on data storage devices | 
| 11/27/2013 | EP2667303A2 Methods, architectures and security mechanisms for a third-party application to access content in a cloud-based platform | 
| 11/27/2013 | EP2666117A1 Method for testing tamper protection of a field device and field device having tamper protection | 
| 11/27/2013 | EP2666116A1 System and method for supporting jit in a secure system with randomly allocated memory ranges | 
| 11/27/2013 | CN203311464U Dual-function security terminal for intelligent device | 
| 11/27/2013 | CN203311424U Electronic lock of electronic notebook | 
| 11/27/2013 | CN203311423U Display device and display system | 
| 11/27/2013 | CN203311422U Local area network computer external-connection-prevention warning device | 
| 11/27/2013 | CN203311421U Remote control equipment for encrypting or decrypting computer files | 
| 11/27/2013 | CN203311420U Intelligent control USB key | 
| 11/27/2013 | CN203311419U Novel computer information security device | 
| 11/27/2013 | CN203311418U Mobile terminal with encrypted radio frequency | 
| 11/27/2013 | CN203311417U Fingerprint password enter device | 
| 11/27/2013 | CN103415856A Device and method for online storage, transmission device and method, and receiving device and method | 
| 11/27/2013 | CN103415855A Mass storage device memory encryption methods, systems, and apparatus | 
| 11/27/2013 | CN103414723A Pet-based socialization platform registration system | 
| 11/27/2013 | CN103414570A Method for remotely controlling password | 
| 11/27/2013 | CN103414564A Secrete key card, secrete key device and method for protecting private key | 
| 11/27/2013 | CN103414555A Array key management method based on IO block encryption | 
| 11/27/2013 | CN103413267A Digital watermark smooth transition embedded method and device | 
| 11/27/2013 | CN103413202A Automatic authorization relation collection method applied to operation and maintenance auditing system |