| Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) | 
|---|
| 10/29/2013 | US8572754 System and method for facilitating unlocking a device connected locally to a client  | 
| 10/29/2013 | US8572751 Method, system, and program product for preventing unauthorized changes to an electronic document  | 
| 10/29/2013 | US8572750 Web application exploit mitigation in an information technology environment  | 
| 10/29/2013 | US8572745 System, method, and computer program product for selecting a wireless network based on security information  | 
| 10/29/2013 | US8572741 Providing security for a virtual machine by selectively triggering a host security scan  | 
| 10/29/2013 | US8572740 Method and system for detection of previously unknown malware  | 
| 10/29/2013 | US8572737 Methods and apparatuses for providing internet-based proxy services  | 
| 10/29/2013 | US8572728 Initiation of storage device scans  | 
| 10/29/2013 | US8572727 System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies  | 
| 10/29/2013 | US8572717 Dynamic access control policy with port restrictions for a network security appliance  | 
| 10/29/2013 | US8572715 Method for use in a network based safety data storage system  | 
| 10/29/2013 | US8572713 Universal authentication token  | 
| 10/29/2013 | US8572705 Method and system for ordering, loading and using admission tickets  | 
| 10/29/2013 | US8572695 Method for applying a physical seal authorization to documents in electronic workflows  | 
| 10/29/2013 | US8572694 Integrated security roles  | 
| 10/29/2013 | US8572693 Reception apparatus  | 
| 10/29/2013 | US8572688 Method and apparatus for session validation to access third party resources  | 
| 10/29/2013 | US8572687 Apparatus and method for performing session validation  | 
| 10/29/2013 | US8572683 Method and apparatus for token-based re-authentication  | 
| 10/29/2013 | US8572682 System and method of accessing data objects in a dynamic language environment  | 
| 10/29/2013 | US8572678 Security policy flow down system  | 
| 10/29/2013 | US8572673 Data processing apparatus and method  | 
| 10/29/2013 | US8572632 Devices as services in a decentralized operating system  | 
| 10/29/2013 | US8572611 Managing conflicts between multiple users accessing a computer system having shared resources assigned to one or more logical partitions and one or more appliance partitions  | 
| 10/29/2013 | US8572576 Executing dynamically assigned functions while providing services  | 
| 10/29/2013 | US8572411 Systems and methods for secure transaction management and electronic rights protection  | 
| 10/29/2013 | US8572410 Virtualized protected storage  | 
| 10/29/2013 | US8572408 Digital rights management of a digital device  | 
| 10/29/2013 | US8572404 Security and safety manager implementation in a multi-core processor  | 
| 10/29/2013 | US8572398 Systems and methods for identifying biometric information as trusted and authenticating persons using trusted biometric information  | 
| 10/29/2013 | US8572397 Biometric authentication and identification  | 
| 10/29/2013 | US8572395 Information processing apparatus, authentication method, and computer program  | 
| 10/29/2013 | US8572394 OTP generation using a camouflaged key  | 
| 10/29/2013 | US8572393 Mobile communication terminal having password notify function and method for notifying password in mobile communication terminal  | 
| 10/29/2013 | US8572392 Access authentication method, information processing unit, and computer product  | 
| 10/29/2013 | US8572391 System and method for risk based authentication  | 
| 10/29/2013 | US8572386 Secure device, information processing terminal, integrated circuit, terminal application generation apparatus, application authentication method  | 
| 10/29/2013 | US8572381 Challenge protected user queries  | 
| 10/29/2013 | US8572380 Streaming system and streaming method  | 
| 10/29/2013 | US8572377 Method for authentication  | 
| 10/29/2013 | US8572374 Continuous isochronous read access and measurement of data stored in non-volatile memory  | 
| 10/29/2013 | US8572372 Method for selectively enabling access to file systems of mobile terminals  | 
| 10/29/2013 | US8572371 Discovery of kernel rootkits with memory scan  | 
| 10/29/2013 | US8572348 Method of establishing hard disk physical partition  | 
| 10/29/2013 | US8572277 Self-policing, rate limiting online forums  | 
| 10/29/2013 | US8572219 Selective tunneling based on a client configuration and request  | 
| 10/29/2013 | US8571994 Method and system for allocating access to digital media content  | 
| 10/29/2013 | US8571993 Reprogrammable security for controlling piracy and enabling interactive content  | 
| 10/29/2013 | US8571221 On-chip storage, creation, and manipulation of an encryption key  | 
| 10/29/2013 | US8571220 Method and apparatus for securing data in a memory device  | 
| 10/29/2013 | US8571216 Eliminating plaintext video from external memory  | 
| 10/29/2013 | US8571212 Image encrypting device, image decrypting device and method  | 
| 10/29/2013 | CA2482243C Securely identifying an executable to a trust-determining entity  | 
| 10/27/2013 | CA2814367A1 Packaged digital rights messaging  | 
| 10/27/2013 | CA2813425A1 Security system and method for controlling interactions between components of a computer system  | 
| 10/27/2013 | CA2813332A1 Software distribution accounting  | 
| 10/24/2013 | WO2013159110A1 Multi-factor mobile transaction authentication  | 
| 10/24/2013 | WO2013159086A1 Secure identification system and method  | 
| 10/24/2013 | WO2013158999A1 Secure lock for mobile device  | 
| 10/24/2013 | WO2013158833A1 Electronic device including finger-operated input device based biometric matching and related methods  | 
| 10/24/2013 | WO2013158831A1 Electronic device including finger-operated input device based biometric enrollment and related methods  | 
| 10/24/2013 | WO2013158789A1 Detection and prevention of installation of malicious mobile applications  | 
| 10/24/2013 | WO2013158064A1 Trusted user interaction  | 
| 10/24/2013 | WO2013158037A1 A method for real-time synchronization between a device and host servers  | 
| 10/24/2013 | WO2013157957A1 Method for secure storing and sharing of a data file via a computer communication network and open cloud services  | 
| 10/24/2013 | WO2013157938A1 Computer network for services retrieval, method for managing such network and a computer system for such network  | 
| 10/24/2013 | WO2013157864A1 Method for authenticating user using icon combined with input pattern, and password input device  | 
| 10/24/2013 | WO2013157124A1 License management system, management server and management method  | 
| 10/24/2013 | WO2013156847A2 Secure zone for secure purchases  | 
| 10/24/2013 | WO2013156764A1 Method and computer device for handling com objects  | 
| 10/24/2013 | WO2013156665A1 Communication equipment for secure communication  | 
| 10/24/2013 | WO2013156531A1 Secure password-based authentication for cloud computing services  | 
| 10/24/2013 | WO2013156448A1 Method and system for user authentication  | 
| 10/24/2013 | WO2013156315A1 Method of secure management of a memory space for microcontroller  | 
| 10/24/2013 | WO2013156314A1 System for managing secure and nonsecure applications on one and the same microcontroller  | 
| 10/24/2013 | WO2013156230A1 Device for digitising documents and method  | 
| 10/24/2013 | WO2013155635A1 System and method for controlling privacy settings of user interface with internet applications  | 
| 10/24/2013 | WO2013155562A1 Nfc card lock  | 
| 10/24/2013 | US20130283402 Apparatus and method for embedding and extracting information in analog signals using distributed signal features and replica modulation  | 
| 10/24/2013 | US20130283401 Information content validation for electronic devices  | 
| 10/24/2013 | US20130283398 Versatile Log System  | 
| 10/24/2013 | US20130283397 Method and apparatus for provisioning a mobile application  | 
| 10/24/2013 | US20130283396 System and method for limiting execution of software to authorized users  | 
| 10/24/2013 | US20130283395 Content protection in a wireless network  | 
| 10/24/2013 | US20130283393 Method for playing digital contents protected with a drm (digital right management) scheme and corresponding system  | 
| 10/24/2013 | US20130283392 Method and apparatus for policy-based content sharing in a peer to peer manner using a hardware based root of trust  | 
| 10/24/2013 | US20130283391 Secure direct memory access  | 
| 10/24/2013 | US20130283390 System, method and apparatus for controlling the dissemination of digital works  | 
| 10/24/2013 | US20130283388 Method and system for information content validation in electronic devices  | 
| 10/24/2013 | US20130283387 Method for data security and electronic device having data security function  | 
| 10/24/2013 | US20130283386 Tamper respondent covering  | 
| 10/24/2013 | US20130283385 Restricting communication over an encrypted network connection to internet domains that share common ip addresses and shared ssl certificates  | 
| 10/24/2013 | US20130283384 Electronic book content protection  | 
| 10/24/2013 | US20130283383 Platform based verification of contents of input-output devices  | 
| 10/24/2013 | US20130283382 System and method for detecting malware in file based on genetic map of file  | 
| 10/24/2013 | US20130283381 Systems and methods for providing anti-malware protection on storage devices  | 
| 10/24/2013 | US20130283380 User controllable platform-level trigger to set policy for protecting platform from malware  | 
| 10/24/2013 | US20130283378 System and method for distinguishing human swipe input sequence behavior and using a confidence value on a score to detect fraudsters  | 
| 10/24/2013 | US20130283377 Detection and prevention of installation of malicious mobile applications  | 
| 10/24/2013 | US20130283375 Browser System and Method for Warning Users of Potentially Fraudulent Websites  |