Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
03/2013
03/07/2013US20130060892 Method for providing a dynamic code via a telephone
03/07/2013US20130060758 Graph authorization
03/07/2013US20130060704 Digital rights management dongle
03/07/2013US20130060661 Managing access to digital content items
03/07/2013US20130060616 Managing access to digital content items
03/07/2013US20130060615 Managing access to digital content items
03/07/2013US20130058477 Information processing device, information processing system, information processing method, and program
03/07/2013DE102012215196A1 Schützen von Anwendungsprogrammen vor zerstörerischer Software oder Malware Protect application programs before destructive software or malware
03/07/2013DE102012214324A1 Datenüberprüfung mithilfe eines Prüfsummen-Sidefile Data validation using a checksum Side File
03/07/2013CA2847326A1 Method to control the access of personal data of a user
03/07/2013CA2847099A1 Method and system for authorizing an action at a site
03/07/2013CA2846620A1 Interactive electronic reader with parental control
03/07/2013CA2846575A1 Proxy authentication
03/06/2013EP2566209A1 Image forming apparatus supporting peer-to-peer connection and method of managing security based on signal intensity thereof
03/06/2013EP2566102A1 Security event logging and conversion of security event messages in process control
03/06/2013EP2565815A2 Method of managing memory and image forming apparatus to perform the same
03/06/2013EP2565814A2 Assigning access rights in enterprise digital rights management systems
03/06/2013EP2565813A2 Key pair management method and image forming device
03/06/2013EP2565812A1 Manipulation monitoring system, management device and manipulation management method
03/06/2013EP2565811A2 System and method for authenticating a gaming device
03/06/2013EP2565810A1 Microprocessor protected against memory dump
03/06/2013EP2565809A2 Apparatus and method for managing application in wireless terminal
03/06/2013EP2565808A1 Immunized USB flash drive against computer and accounting viruses
03/06/2013EP2565793A1 Secure data storage and transfer for portable data storage devices
03/06/2013EP2565765A1 Mobile terminal for performing screen unlock based on motion and method thereof
03/06/2013EP2564389A1 Memory module for simultaneously providing at least one secure and at least one insecure memory area
03/06/2013EP2564347A1 Access management system
03/06/2013EP2564346A1 Protecting the information encoded in a bloom filter using encoded bits of data
03/06/2013EP2564345A2 Device, system, and method for registering and authenticating handwritten signatures and archiving handwritten information
03/06/2013EP2564344A1 Method and apparatus for coordinating service information across multiple server nodes
03/06/2013EP2564343A1 Code diversity method and system
03/06/2013EP2564341A1 Behavioral signature generation using clustering
03/06/2013EP2564324A1 System and method for efficient inspection of content
03/06/2013CN202771533U Encryption keyboard and self-service device utilizing the same
03/06/2013CN202771431U Computer case
03/06/2013CN202771430U Fingerprint encryption intelligent device
03/06/2013CN1653463B Method and apparatus for processing usage rights expressions
03/06/2013CN102959896A Device, system, and method for registring and authetnticating handwritten signatures and archiving handwritten information
03/06/2013CN102959589A Method for processing data in one or more control devices of vehicle, particularly of motor vehicle
03/06/2013CN102959578A Forensic system and forensic method, and forensic program
03/06/2013CN102959568A System and method for collaborative information services
03/06/2013CN102959559A Method for generating certificate
03/06/2013CN102959558A System and method for document policy enforcement
03/06/2013CN102959557A Hacker virus security-integrated control device
03/06/2013CN102959556A A processor-implemented method for ensuring software integrity
03/06/2013CN102959555A Virtual computer system, virtual computer control method, virtual computer control program, and semiconductor integrated circuit
03/06/2013CN102959554A Storage device and method for storage state recovery
03/06/2013CN102959553A Control device
03/06/2013CN102957682A Method and equipment for providing picture verification code based on verification security level
03/06/2013CN102957667A Method for intelligently replacing files on basis of cloud computation
03/06/2013CN102955921A Electronic apparatus and method for secure booting
03/06/2013CN102955920A Computer system with protection mode control effect
03/06/2013CN102955919A Encipherment protection method of BIOS (basic input output system) chip
03/06/2013CN102955918A Method and apparatus for vehicle hardware theft prevention
03/06/2013CN102955917A Method, device and equipment for protecting data
03/06/2013CN102955916A Digital content protecting method and digital content storage device
03/06/2013CN102955915A Method and device for controlling safety access to Java applications
03/06/2013CN102955914A Method and device for detecting security flaws of source files
03/06/2013CN102955913A Method and system for detecting hung Trojans of web page
03/06/2013CN102955912A Method and server for identifying application malicious attribute
03/06/2013CN102955911A Trojan scanning method and Trojan scanning system
03/06/2013CN102955910A Method and device for multi-account authority control
03/06/2013CN102955909A Printing safety audit system
03/06/2013CN102955908A Method and device for creating rhythm password and carrying out verification according to rhythm password
03/06/2013CN102955907A Password management method device
03/06/2013CN102955906A Method for distributing secure digital content
03/06/2013CN102955905A Copyright protection method for written works and picture works
03/06/2013CN102955904A Method and system for preventing secret divulgation of mobile communication equipment
03/06/2013CN102955747A Golden key transmission method, memory controller and memory storage device
03/06/2013CN102955745A Mobile storage terminal and data management method thereof
03/06/2013CN102214288B Privacy protection method based on incarnations
03/06/2013CN102063592B Credible platform and method for controlling hardware equipment by using same
03/06/2013CN101937499B Method and device for detecting hidden loophole and Linux operating system
03/06/2013CN101777098B Personal code group manager and management system thereof
03/06/2013CN101604366B Password separate dynamic verification method and system
03/06/2013CN101523401B Secure use of user secrets on a computing platform
03/06/2013CN101256605B 企业权利框架 Enterprise rights framework
03/05/2013US8393008 Hardware-based output protection of multiple video streams
03/05/2013US8393007 System and method for distributing digital content to be rendered in accordance with usage rights information
03/05/2013US8393005 Recording medium, and device and method for recording information on recording medium
03/05/2013US8393004 Systems and methods for protecting information used by mobile devices
03/05/2013US8393003 Obfuscating computer program code
03/05/2013US8393002 Method and system for testing an entity
03/05/2013US8392992 Method and apparatus for preventing sensitive data leakage due to input focus misappropriation
03/05/2013US8392989 Anti-malware scanning in parallel processors of a graphics processing unit
03/05/2013US8392988 Terminal device and method for checking a software program
03/05/2013US8392978 Secure authentication using hardware token and computer fingerprint
03/05/2013US8392974 Information processing system and processing method thereof
03/05/2013US8392967 Image forming system, image forming apparatus, and method for creating, maintaining, and applying authorization information
03/05/2013US8392964 System and method for authenticating a powered device attached to a power sourcing equipment for power provisioning
03/05/2013US8392961 Dynamic access control in a content-based publish/subscribe system with delivery guarantees
03/05/2013US8392941 Contents viewing and listening management apparatus, content viewing and listening management method, program, and contents viewing and listening management system
03/05/2013US8392727 System and method for transparent disk encryption
03/05/2013US8392724 Information terminal, security device, data protection method, and data protection program
03/05/2013US8392723 Information processing apparatus and computer readable medium for preventing unauthorized operation of a program
03/05/2013US8392722 Digital cable system and method for protection of secure micro program
03/05/2013US8392720 Security of data over a network
03/05/2013US8392719 Computer readable storage medium storing software execution control program, software execution control method and software execution control system
03/05/2013US8392718 Programmable controller system and aid device for control program development therefor
03/05/2013US8392714 Secure overlay manager protection