Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
07/2013
07/03/2013CN103186731A Digital copyright protection method and system of hybrid mode
07/03/2013CN103186730A Method and device for protecting.NET software security
07/03/2013CN103186729A Encryption lock and method for protecting software by utilizing encryption lock
07/03/2013CN103186728A Encryption and decryption devices and methods thereof
07/03/2013CN103186727A Communication terminal software management system and method
07/03/2013CN103186726A Dvd system for distributing protected content
07/03/2013CN103186725A Software authorization method and device
07/03/2013CN103186724A Release method and device, terminal of digital content
07/03/2013CN103186723A Digital content security cooperation method and system
07/03/2013CN103186722A System and method for copyright protection of digital files
07/03/2013CN103186721A Digital copyright service control method, device and system
07/03/2013CN103186720A Digital rights management method, equipment and system
07/03/2013CN103186719A Mobile terminal-oriented digital copyright protection method and system
07/03/2013CN103186480A Non-volatile storage device, recording medium, and storage control method
07/03/2013CN103186479A Double hard disc isolation encryption device, method and computer based on single operating system
07/03/2013CN103186434A Method and system for recovering basic input/output system
07/03/2013CN103186331A Display method and system for intelligent terminal interface
07/03/2013CN102722284B Touch-panel-based handwritten signing recording method
07/03/2013CN102289619B Level-driving security demand analysis method
07/03/2013CN102208004B Method for controlling software behavior based on least privilege principle
07/03/2013CN102096782B Internet banking safety authentication method based on removable medium of virtual machine
07/03/2013CN102087684B Method for encrypting consumable items through radio frequency identification electronic tag
07/03/2013CN102004885B Software protection method
07/03/2013CN101764818B Member registration method and community service system
07/03/2013CN101650659B Device and method for automatically installing and saving Activex control in XPe operating system
07/02/2013US8479306 Method and system for managing a data object so as to comply with predetermined condition for usage
07/02/2013US8479305 Method and system for managing a data object so as to comply with predetermined conditions for usage
07/02/2013US8479302 Access control via organization charts
07/02/2013US8479301 Offline access in a document control system
07/02/2013US8479296 System and method for detecting unknown malware
07/02/2013US8479294 Anti-malware scan management in high-availability virtualization environments
07/02/2013US8479293 Security technique for an open computing platform system
07/02/2013US8479292 Disabling malware that infects boot drivers
07/02/2013US8479281 Authentication management methods and media
07/02/2013US8479280 Image processing device and image data transmission method
07/02/2013US8479274 Personal verification device
07/02/2013US8479268 Securing asynchronous client server transactions
07/02/2013US8479266 Network assignment appeal architecture and process
07/02/2013US8479264 Architecture for virtual security module
07/02/2013US8479259 Secure customer interface for web based data management
07/02/2013US8479258 Garage management system
07/02/2013US8479174 Method, computer program and computer for analyzing an executable computer file
07/02/2013US8479022 Secure mode indicator for smart phone or PDA
07/02/2013US8479017 System and method for N-ary locality in a security co-processor
07/02/2013US8479016 Method and system for obfuscating a cryptographic function
07/02/2013US8479014 Symmetric key based secure microprocessor and its applications
07/02/2013US8479013 Secure portable data transport and storage system
07/02/2013US8479012 Using biometrics as an encryption key
07/02/2013US8479011 Method and apparatus for using cryptographic mechanisms to provide access to a portable device using integrated authentication using another portable device
07/02/2013US8479010 Detecting, capturing and processing valid login credentials
07/02/2013US8479001 Self-authentication communication device and device authentication system
07/02/2013US8479000 Information processing device, authentication system, authentication device, information processing method, information processing program, recording medium, and integrated circuit
07/02/2013US8478998 Authenticated communication using a shared unpredictable secret
07/02/2013US8478992 Methods for secure restoration of personal identity credentials into electronic devices
07/02/2013US8478878 Placement of virtual machines based on server cost and network cost
07/02/2013US8478713 Row-level security in a relational database management system
07/02/2013US8478694 Digital rights management license archiving
07/02/2013US8478693 Framework for specifying access to protected content
07/02/2013US8478106 Recording/reproducing device
07/02/2013US8477936 Management system including display apparatus and data management apparatus for displaying data on the display apparatus, and data acquisition method
07/02/2013US8476921 Method for supporting a tie of a chip to an electronic apparatus
07/02/2013CA2771080C Secure media path methods, systems, and architecture
07/02/2013CA2489303C Managing secure resources in web resources that are accessed by multiple portals
06/2013
06/29/2013CA2799913A1 Communications system providing enhanced trusted service manager (tsm) verification features and related methods
06/27/2013WO2013096758A1 Security policy editor
06/27/2013WO2013096601A1 Familiar dynamic human challenge response test content
06/27/2013WO2013096343A1 System and method for scanning for computer vulnerabilities in a network environment
06/27/2013WO2013096258A1 Method and system for frame buffer protection
06/27/2013WO2013096140A1 Augmenting system restore with malware detection
06/27/2013WO2013095977A1 Using photograph to initiate and perform action
06/27/2013WO2013095835A1 Remote access to a data storage device
06/27/2013WO2013095626A1 Eye movement based knowledge demonstration
06/27/2013WO2013095596A1 Always-available embedded theft reaction subsystem
06/27/2013WO2013095595A1 Always-available embedded theft reaction subsystem
06/27/2013WO2013095594A1 Always-available embedded theft reaction subsystem
06/27/2013WO2013095590A1 Always-available embedded theft reaction subsystem
06/27/2013WO2013095589A1 Always-available embedded theft reaction subsystem
06/27/2013WO2013095587A1 Always-available embedded theft reaction subsystem
06/27/2013WO2013095586A1 Always-available embedded theft reaction subsystem
06/27/2013WO2013095585A1 Always-available embedded theft reaction subsystem
06/27/2013WO2013095584A1 Always-available embedded theft reaction subsystem
06/27/2013WO2013095583A1 Always-available embedded theft reaction subsystem
06/27/2013WO2013095574A1 Method and apparatus to using storage devices to implement digital rights management protection
06/27/2013WO2013095573A1 Activation and monetization of features built into storage subsystems using a trusted connect service back end infrastructure
06/27/2013WO2013095572A1 User controllable platform-level trigger to set policy for protecting platform from malware
06/27/2013WO2013095565A1 Systems and methods for providing anti-malware protection on storage devices
06/27/2013WO2013094110A1 Information processing device, server device, information processing method, server processing method, and program
06/27/2013WO2013094065A1 Determination device, determination method, and determination program
06/27/2013WO2013093736A1 Information processing device having lock function and program for executing lock function
06/27/2013WO2013093606A1 Method of billing an online purchase
06/27/2013WO2013093474A1 Method and apparatus for mediating communications
06/27/2013WO2013093330A1 Method and device for making a computer application secure
06/27/2013WO2013093325A1 Electronic device for storing confidential data
06/27/2013WO2013093209A1 Automated access, key, certificate, and credential management
06/27/2013WO2013093026A1 Method for making authenticated payments
06/27/2013WO2013093011A1 Monitoring user activity on smart mobile devices
06/27/2013WO2013091806A1 Customer error screen capture
06/27/2013WO2013091709A1 Method and apparatus for real-time dynamic transformation of the code of a web document
06/27/2013WO2013091452A1 File packing and unpacking method, and device thereof
06/27/2013WO2013091400A1 Protective device against data theft in electronic circuit