| Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) | 
|---|
| 10/08/2013 | US8553767 Video decoding method and apparatus  | 
| 10/08/2013 | US8551186 Audible alert for stolen user devices  | 
| 10/08/2013 | CA2686801C Authetication using stored biometric data  | 
| 10/08/2013 | CA2639050C Methods and apparatus for maintaining permissions for client/server processing in a communication device  | 
| 10/08/2013 | CA2516741C Additional hash functions in content-based addressing  | 
| 10/08/2013 | CA2494299C Methods for secure enrollment and backup of personal identity credentials into electronic devices  | 
| 10/06/2013 | CA2825457A1 Secure reset of personal and service provider information on mobile devices  | 
| 10/03/2013 | WO2013149178A2 Systems and methods for automated malware artifact retrieval and analysis  | 
| 10/03/2013 | WO2013149158A1 Data network device discovery optimization to reduce data transfer volume  | 
| 10/03/2013 | WO2013149048A2 User authentication and authorization using personas  | 
| 10/03/2013 | WO2013149046A2 Password protect feature for application in mobile device during a remote session  | 
| 10/03/2013 | WO2013149043A2 Access control list for applications on mobile devices during a remote control session  | 
| 10/03/2013 | WO2013148552A1 Biometric registration and verification system and method  | 
| 10/03/2013 | WO2013148223A1 Persistent and resilient worker processes  | 
| 10/03/2013 | WO2013148143A1 Systems, methods, and computer program products for scheduling processing to achieve space savings  | 
| 10/03/2013 | WO2013148052A1 Systems and methods for secure third-party data storage  | 
| 10/03/2013 | WO2013148050A1 Systems and methods for using property tables to perform non-iterative malware scans  | 
| 10/03/2013 | WO2013147891A1 Client security scoring  | 
| 10/03/2013 | WO2013147873A1 Protecting context-sensitive data  | 
| 10/03/2013 | WO2013147859A1 Reporting malicious activity to an operating system  | 
| 10/03/2013 | WO2013147858A1 Collecting data from processor-based devices  | 
| 10/03/2013 | WO2013147838A1 Authorization cache  | 
| 10/03/2013 | WO2013147769A1 Prevention of user input capture  | 
| 10/03/2013 | WO2013147760A1 Securing thermal management parameters in firmware from cyber attack  | 
| 10/03/2013 | WO2013147732A1 Programmable logic controller having embedded dynamic generation of encryption keys  | 
| 10/03/2013 | WO2013147450A1 Devices and methods for unlocking a lock mode  | 
| 10/03/2013 | WO2013147120A1 Operation limiting device, operation limiting method, and computer program  | 
| 10/03/2013 | WO2013147111A1 Operation permission determination device, operation permission determination method and computer program  | 
| 10/03/2013 | WO2013146810A1 Product sales system  | 
| 10/03/2013 | WO2013145874A1 Information processing device, information processing method and program  | 
| 10/03/2013 | WO2013145856A1 Composite media administration system, information administration server device, composite use limit creation device, and program  | 
| 10/03/2013 | WO2013145627A1 Encrypted database system, client terminal, database server, data linking method, and program  | 
| 10/03/2013 | WO2013145517A1 Information processing device, information processing system, information processing method, and program  | 
| 10/03/2013 | WO2013145490A1 Electronic conference system  | 
| 10/03/2013 | WO2013144966A1 System and method for privacy protection for a host user device  | 
| 10/03/2013 | WO2013144719A1 Field revisions for a personal security device  | 
| 10/03/2013 | WO2013144436A1 Method and apparatus for policy adaption based on application policy compliance analysis  | 
| 10/03/2013 | WO2013144425A1 Download control  | 
| 10/03/2013 | WO2013144416A1 Wireless memory device authentication  | 
| 10/03/2013 | WO2013144335A1 Method, device and system for accessing a service  | 
| 10/03/2013 | WO2013144051A1 Display authentication  | 
| 10/03/2013 | WO2013143911A2 Method for encrypting data on a storage medium  | 
| 10/03/2013 | WO2013143717A1 Programming method, battery with an arrangement for carrying out the programming method and a motor vehicle comprising said type of battery  | 
| 10/03/2013 | WO2013143714A1 Controlling anti-virus software updates  | 
| 10/03/2013 | WO2013143353A1 Using different secure erase algorithms to erase chunks from file associated with different security levels  | 
| 10/03/2013 | WO2013142983A1 Securing accessible systems using cross-linking  | 
| 10/03/2013 | WO2013142981A1 Securing accessible systems using base function encoding  | 
| 10/03/2013 | WO2013142980A1 Securing accessible systems using variable dependent coding  | 
| 10/03/2013 | WO2013142979A1 Securing accessible systems using dynamic data mangling  | 
| 10/03/2013 | WO2013142948A1 Method and system for preventing and detecting security threats  | 
| 10/03/2013 | WO2013142947A1 Secured execution of a web application  | 
| 10/03/2013 | WO2013142943A1 Method for protecting data  | 
| 10/03/2013 | WO2013116916A8 System and method for generating and protecting cryptographic keys  | 
| 10/03/2013 | WO2013114125A3 A method and database system for secure storage and communication of information  | 
| 10/03/2013 | US20130263291 Apparatus and method for supporting theft protection  | 
| 10/03/2013 | US20130263290 Electronic device and hardware component protection method thereof  | 
| 10/03/2013 | US20130263289 Information management of data associated with multiple cloud services  | 
| 10/03/2013 | US20130263288 Password protect feature for application in mobile device during a remote session  | 
| 10/03/2013 | US20130263287 Access control list for applications on mobile devices during a remote control session  | 
| 10/03/2013 | US20130263286 A method of authenticating a user of a terminal with a service provider  | 
| 10/03/2013 | US20130263284 Mobile communication system  | 
| 10/03/2013 | US20130263283 System and method for rules-based control of custody of electronic signature transactions  | 
| 10/03/2013 | US20130263282 Biometric authentication device, biometric authentication system, biometric authentication method, and recording medium  | 
| 10/03/2013 | US20130263280 Secure Dynamic Page Content and Layouts Apparatuses, Methods and Systems  | 
| 10/03/2013 | US20130263279 Information processing apparatus, storage medium, and control method therefor  | 
| 10/03/2013 | US20130263278 Method and apparatus for controlling operations performed by a mobile co  | 
| 10/03/2013 | US20130263277 Secure computing system  | 
| 10/03/2013 | US20130263276 Information processing apparatus, information processing method, information processing system, and program  | 
| 10/03/2013 | US20130263275 Method and apparatus for requesting access to files  | 
| 10/03/2013 | US20130263274 Crowd Validated Internet Document Witnessing System  | 
| 10/03/2013 | US20130263270 Systems and methods for detecting malicious code  | 
| 10/03/2013 | US20130263269 Controlling Anti-Virus Software Updates  | 
| 10/03/2013 | US20130263268 Method for blocking a denial-of-service attack  | 
| 10/03/2013 | US20130263267 Methods, computer program products and data structures for intrusion detection, intrusion response and vulnerability remediation across target computer systems  | 
| 10/03/2013 | US20130263266 Systems and methods for automated malware artifact retrieval and analysis  | 
| 10/03/2013 | US20130263265 Systems and methods for using property tables to perform non-iterative malware scans  | 
| 10/03/2013 | US20130263264 Detection of phishing attempts  | 
| 10/03/2013 | US20130263262 Verifying firmware integrity of a device  | 
| 10/03/2013 | US20130263260 System and method for assessing an application to be installed on a mobile communication device  | 
| 10/03/2013 | US20130263258 Information Security Management  | 
| 10/03/2013 | US20130263257 System and method for providing services  | 
| 10/03/2013 | US20130263256 Techniques for protecting against denial of service attacks near the source  | 
| 10/03/2013 | US20130263255 System and method enabling parallel processing of hash functions using authentication checkpoint hashes  | 
| 10/03/2013 | US20130263254 Devices and methods for unlocking a lock mode  | 
| 10/03/2013 | US20130263253 Systems and methods for controlling access to media content by detecting one or more user fingerprints  | 
| 10/03/2013 | US20130263252 Button depress wakeup and wakeup strategy  | 
| 10/03/2013 | US20130263251 Device, Method, and Graphical User Interface for Integrating Recognition of Handwriting Gestures with a Screen Reader  | 
| 10/03/2013 | US20130263250 Automated password management  | 
| 10/03/2013 | US20130263242 Tenant driven security in a storage cloud  | 
| 10/03/2013 | US20130263240 Method for authentication and verification of user identity  | 
| 10/03/2013 | US20130263237 User authentication and authorization using personas  | 
| 10/03/2013 | US20130263235 Data packet generator for generating passcodes  | 
| 10/03/2013 | US20130263226 False Banking, Credit Card, and Ecommerce System  | 
| 10/03/2013 | US20130263224 System And Method For Checking The Authenticity Of The Identity Of A Person Accessing Data Over A Computer Network  | 
| 10/03/2013 | US20130263222 Computer system and security management method  | 
| 10/03/2013 | US20130263221 Method and apparatus for enterprise-level filtered search  | 
| 10/03/2013 | US20130263219 Authentication system, electronic apparatus and authentication method  | 
| 10/03/2013 | US20130263217 System, method, and device for controlled access to a network  | 
| 10/03/2013 | US20130263216 Participant authentication and authorization for joining a private conference event via a conference event environment system  | 
| 10/03/2013 | US20130263215 Display Authentication  |