Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
04/2014
04/02/2014CN101983379B 盘驱动器数据加密 Disk drive data encryption
04/02/2014CN101939754B Finger sensing apparatus using hybrid matching and associated methods
04/02/2014CN101815202B Methods and devices for digital content protection
04/02/2014CN101790736B Method for supporting post browsing in moving rights object of digital rights management and terminal thereof
04/02/2014CN101677352B Document management system, document producing apparatus, document use managing apparatus, and computer readable medium
04/02/2014CN101652782B Communication terminal device, communication device, electronic card, method for a communication terminal device and method for a communication device for providing a verification
04/02/2014CN101517591B Architecture for virtual security module
04/01/2014US8689357 Tamper detector for secure module
04/01/2014US8689351 Playing control files for personal video recorders
04/01/2014US8689347 Cryptographic control for mobile storage means
04/01/2014US8689346 Authentication method for authenticating a first party to a second party
04/01/2014US8689340 Disk protection system
04/01/2014US8689339 Method, system and apparatus for game data transmission
04/01/2014US8689338 Secure terminal, a routine and a method of protecting a secret key
04/01/2014US8689337 Systems and methods of fingerprinting and identifying video objects
04/01/2014US8689332 Information processing apparatus cooperating with virus management function device, and anti-virus method
04/01/2014US8689331 Malware detection
04/01/2014US8689330 Instant messaging malware protection
04/01/2014US8689328 Maliciouis user agent detection and denial of service (DOS) detection and prevention using fingerprinting
04/01/2014US8689327 Method for characterization of a computer program part
04/01/2014US8689325 System and method of monitoring and controlling application files
04/01/2014US8689324 Techniques to explain authorization origins for protected resource objects in a resource object domain
04/01/2014US8689320 Image forming apparatus with hard disk drive securely formatted
04/01/2014US8689318 Trusted computing entities
04/01/2014US8689314 Method and apparatus of managing entitlement management message for supporting mobility of DCAS host
04/01/2014US8689302 System, method and program for user authentication, and recording medium on which the program is recorded
04/01/2014US8689299 System and method for accessing a software application
04/01/2014US8689297 System, devices and method for secure authentication
04/01/2014US8689294 Systems and methods for managing offline authentication
04/01/2014US8689293 Access control device, access control method, program, storage medium, and integrated circuit
04/01/2014US8689291 Wireless access device and method
04/01/2014US8689289 Global object access auditing
04/01/2014US8689288 Apparatus and method for protecting system in virtualized environment
04/01/2014US8689225 Attributing causality to program execution capacity modifications
04/01/2014US8689212 Information processing device for controlling an application able to access a predetermined device, and control method using an information processing device for controlling an application able to access a predetermined device
04/01/2014US8689109 Facilitating access to functionality via displayed information
04/01/2014US8689014 Data encryption device and control method thereof
04/01/2014US8689011 System and method for content protection
04/01/2014US8689009 Authentication-secured access to a data carrier comprising a mass storage device and chip
04/01/2014US8689007 Integrity protection in data processing systems
04/01/2014US8689005 Method for managing and controlling access to confidential information contained in portable electronic media
04/01/2014US8689003 System and method for secure password-based authentication
04/01/2014US8689002 Peripheral device, network system, communication processing method
04/01/2014US8689000 Use of certified secrets in communication
04/01/2014US8688995 Method and apparatus for detection of a fault attack
04/01/2014US8688990 Method for personalizing an authentication token
04/01/2014US8688988 Transaction auditing for data security devices
04/01/2014US8688985 Data security method and apparatus using a characteristic preserving encryption
04/01/2014US8688976 Method for issuing a digital certificate by a certification authority, arrangement for performing the method, and computer system of a certification authority
04/01/2014US8688973 Securing communications sent by a first user to a second user
04/01/2014US8688971 Remote access method
04/01/2014US8688967 Secure booting a computing device
04/01/2014US8688924 Method for improving accuracy of a time estimate from a memory device
04/01/2014US8688592 System and method for processing transactions
04/01/2014US8688587 Content recording apparatus, method for controlling the content recording apparatus, and recording program for the content recording apparatus
04/01/2014US8688585 Remote container
04/01/2014US8688584 Electronic gaming machine security for software stored in nonvolatile media
04/01/2014US8688583 Digital rights management engine systems and methods
04/01/2014US8688582 Content distribution system and method
04/01/2014US8688549 Methods and apparatus for complementing user entries associated with events of interest through context
04/01/2014US8688168 Communication protocol between mobile client and docking station
04/01/2014US8687801 Method and apparatus for acquiring domain information and domain-related data
04/01/2014US8687799 Data processing circuit and control method therefor
04/01/2014US8685110 System and method for securing a computer system
04/01/2014CA2570385C Method for securely updating a program block loaded in a security module
04/01/2014CA2545292C A method for writing data and applications into identification media
04/01/2014CA2531789C Method for making secure execution of a computer programme, in particular in a smart card
04/01/2014CA2467540C Transaction card system having security against unauthorized usage
03/2014
03/28/2014CA2818341A1 Tablet computer
03/27/2014WO2014047331A1 Content-driven screen polarization with application sessions
03/27/2014WO2014047293A1 Layered certification
03/27/2014WO2014047165A2 Context aware content distribution
03/27/2014WO2014047135A2 Generalized cryptographic framework
03/27/2014WO2014047069A1 Systems, methods, and computer program products for interfacing multiple service provider trusted service managers and secure elements
03/27/2014WO2014046880A1 Mobile multifactor single-sign-on authentication
03/27/2014WO2014046682A1 Authentication system
03/27/2014WO2014046022A1 Replay management device and program used in same
03/27/2014WO2014045860A1 Information device, partner device, communication system, and information device control method and program
03/27/2014WO2014045827A1 Information processing device, information processing method, and program
03/27/2014WO2014045713A1 Dictionary update method, dictionary update system, and dictionary update program
03/27/2014WO2014045699A1 Sensor share control device, method, and computer program
03/27/2014WO2014045623A1 Electronic apparatus and account creation program
03/27/2014WO2014045490A1 License control system, license control method, license application device, and non-transitory computer-readable medium whereupon program is stored
03/27/2014WO2014045173A1 Controlling access to clinical data analyzed by remote computing resources
03/27/2014WO2014044792A2 Operating a programmable logic controller
03/27/2014WO2014044623A1 Storing data in a memory of an electronic device
03/27/2014WO2014044373A1 System control
03/27/2014WO2014044331A2 A system and method for multimedia content protection on cloud infrastructures
03/27/2014WO2014044223A1 Systems and methods for security detection
03/27/2014WO2014044187A2 A method and device for checking and removing computer viruses
03/27/2014WO2014044165A1 Method for safely running third-party code in java virtual machine
03/27/2014WO2014044152A1 Method and apparatus for encryption
03/27/2014WO2014044109A1 Method and apparatus for virus scanning
03/27/2014WO2014043911A1 User login method, and terminal
03/27/2014WO2014022602A3 Using the ability to speak as a human interactive proof
03/27/2014WO2014021919A3 Methods, systems, and computer readable medium for active monitoring, memory protection and integrity verification of target devices
03/27/2014WO2014011633A3 Safeguarding private medical data
03/27/2014WO2014009813A3 Secure storage system and uses thereof
03/27/2014WO2012036683A3 Universal authentication method
03/27/2014WO2012030739A3 Media rights management on multiple devices