Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
01/02/2013 | CN102855130A Client software classification method based on human needs |
01/02/2013 | CN102855119A Executable file processing method and device |
01/02/2013 | CN102184366B External program security access architecture based on system on chip (SoC) and control method |
01/02/2013 | CN102184361B Information processing device and management method |
01/02/2013 | CN102096780B Rapid detection method of digital fingerprints under large-scale user environment |
01/02/2013 | CN102081720B Method and system for detecting process creation during real-time protection |
01/02/2013 | CN101984449B Smart card COS operating system |
01/02/2013 | CN101916350B Method and system for protecting terminal reading contents |
01/02/2013 | CN101901315B Security isolation and monitoring management method of USB mobile storage media |
01/02/2013 | CN101901307B Method and device for detecting whether database is attacked by cross-site script |
01/02/2013 | CN101887500B Program control flow deep confusion method based on labels |
01/02/2013 | CN101809579B Method, system, trusted service manager, service provider and memory element for managing access rights for trusted applications |
01/02/2013 | CN101795261B Information protection system and method based on mobile data safety |
01/02/2013 | CN101755270B User authentication device, user authentication method, and user authentication program |
01/02/2013 | CN101751519B Method for improving information security of computer system and relative computer system thereof |
01/02/2013 | CN101739522B DRM file integrity protection method and device |
01/02/2013 | CN101689233B Standby operation of a resonant power converter |
01/02/2013 | CN101689133B Data processing method for portable communication terminal and portable communication terminal |
01/02/2013 | CN101617322B Information processing device, information processing method, and program |
01/02/2013 | CN101526771B Unit using OS and image forming apparatus using the same |
01/02/2013 | CN101233769B Apparatus and methods for managing firmware verification on a wireless device |
01/02/2013 | CN101179795B Apparatus and method for managing secure data |
01/02/2013 | CN101174292B System and method for secure operating system boot |
01/01/2013 | USRE43906 Method and apparatus for securing digital assets |
01/01/2013 | US8347408 Matching of unknown video content to protected video content |
01/01/2013 | US8347407 Authority management method, system therefor, and server and information equipment terminal used in the system |
01/01/2013 | US8347404 Method, system, and data server for checking revocation of content device and transmitting data |
01/01/2013 | US8347395 Filtering data requiring confidentiality in monitor mirroring |
01/01/2013 | US8347379 Printing system and image forming apparatus |
01/01/2013 | US8347375 System and method for dynamic distribution of intrusion signatures |
01/01/2013 | US8347372 System and method for generating a digital certificate |
01/01/2013 | US8347367 Techniques for entry of less than perfect passwords |
01/01/2013 | US8347363 Contents retrieval system and contents retrieval method |
01/01/2013 | US8347362 Usage control services performed in an end user device |
01/01/2013 | US8347359 Encryption sentinel system and method |
01/01/2013 | US8347115 System and method for transparent disk encryption |
01/01/2013 | US8347111 Data processing apparatus |
01/01/2013 | US8347110 Protecting a program interpreted by a virtual machine |
01/01/2013 | US8347109 Secure serial number generation |
01/01/2013 | US8347106 Method and apparatus for user authentication based on a user eye characteristic |
01/01/2013 | US8347105 Method and system for obtaining a PIN validation signal in a data processing unit |
01/01/2013 | US8347103 System and method for authenticating a user using a graphical password |
01/01/2013 | US8347101 System and method for anonymously indexing electronic record systems |
01/01/2013 | US8347094 Securing wireless body sensor networks using physiological data |
01/01/2013 | US8347091 Authenticator apparatus |
01/01/2013 | US8347080 System and method for multi-certificate and certificate authority strategy |
01/01/2013 | US8347072 Method and apparatus for secure execution using a secure memory partition |
01/01/2013 | US8346997 Use of peripheral component interconnect input/output virtualization devices to create redundant configurations |
01/01/2013 | US8346925 Apparatus for providing security over untrusted networks |
01/01/2013 | US8346805 Filter driver for identifying disk files by analysis of content |
01/01/2013 | US8346724 Generating and supplying user context data |
01/01/2013 | US8346671 System and method for point-to-point encryption with adjunct terminal |
01/01/2013 | US8346669 Method of requesting a customized instance of an object using information contained within an existing instance |
01/01/2013 | US8346580 System and method for managing transfer of ownership rights to access to a venue and allowing access to the venue to patron with the ownership right |
01/01/2013 | US8345879 Securing wireless body sensor networks using physiological data |
01/01/2013 | US8345872 Digital local network, notably digital home network, and method for creating and updating such a network |
12/27/2012 | WO2012178096A1 Develop and deploy software in multiple environments |
12/27/2012 | WO2012178077A1 Fast start of streaming digital media playback with deferred license retrieval |
12/27/2012 | WO2012178019A2 Multi-level, hash-based device integrity checks |
12/27/2012 | WO2012177466A1 Retrieval of data across multiple partitions of a storage device using digital signatures |
12/27/2012 | WO2012177391A2 Display dynamic contents on locked screens |
12/27/2012 | WO2012177319A2 Total computer security |
12/27/2012 | WO2012177287A2 Usage authentication via intercept and challenge for network services |
12/27/2012 | WO2012177249A1 Systems and methods for tracing the source of printed pages |
12/27/2012 | WO2012176978A2 Network access control system and method |
12/27/2012 | WO2012176923A1 Anonymization index determination device and method, and anonymization process execution system and method |
12/27/2012 | WO2012176922A1 Policy updating device, policy management system, policy updating method, and policy management method |
12/27/2012 | WO2012176530A1 Information processing device, method, and program which administer secret information |
12/27/2012 | WO2012176506A1 Single sign-on system, single sign-on method, and authentication server linking program |
12/27/2012 | WO2012176360A1 Communication device, communication system |
12/27/2012 | WO2012175886A1 Method for detecting attacks and for protection |
12/27/2012 | WO2012175174A1 Method for communicating data in a vehicle, and system for operating a mobile device in a vehicle |
12/27/2012 | WO2012174883A1 Usb key |
12/27/2012 | WO2012174787A1 Data forward protection method and device |
12/27/2012 | WO2012174742A1 Method, system and mobile terminal for controlling application to access data |
12/27/2012 | WO2012174664A1 Capturing and manipulating content using biometric data |
12/27/2012 | WO2012174583A1 Method, system and portable digital media for processing an interactive game of chance |
12/27/2012 | WO2012148733A3 Method and apparatus for securing programming data of a programmable device |
12/27/2012 | WO2012135855A3 System to identify multiple copyright infringements |
12/27/2012 | WO2012135418A3 Secure pre-loaded drive management at kiosk |
12/27/2012 | WO2012069043A3 Method and apparatus for preventing unauthorized detection of access data |
12/27/2012 | US20120331572 Method and apparatus for identifying and characterizing errant electronic files |
12/27/2012 | US20120331571 System and method of managing multiple levels of privacy in documents |
12/27/2012 | US20120331570 Rule-based application access management |
12/27/2012 | US20120331569 System and method for rendering digital content in accordance with usage rights information |
12/27/2012 | US20120331568 Group authorization method and software |
12/27/2012 | US20120331567 System and method for controlling communication of private information over a network |
12/27/2012 | US20120331566 Capturing and manipulating content using biometric data |
12/27/2012 | US20120331565 System and method for enforcing utilization of content based on history lists |
12/27/2012 | US20120331564 Information processing apparatus, server, information processing system, information processing method, and program |
12/27/2012 | US20120331563 Retrieval of Data Across Multiple Partitions of a Storage Device Using Digital Signatures |
12/27/2012 | US20120331562 Method, apparatus and computer program for supporting determination on degree of confidentiality of document |
12/27/2012 | US20120331561 Method of and Systems for Privacy Preserving Mobile Demographic Measurement of Individuals, Groups and Locations Over Time and Space |
12/27/2012 | US20120331559 Resource management system and corresponding method |
12/27/2012 | US20120331557 Global identity protector E-commerce payment code certified processing system |
12/27/2012 | US20120331556 System and method for protocol fingerprinting and reputation correlation |
12/27/2012 | US20120331555 Performing A Defensive Procedure In Response To Certain Path Advertisements |
12/27/2012 | US20120331554 Regex Compiler |
12/27/2012 | US20120331553 Dynamic signature creation and enforcement |
12/27/2012 | US20120331552 Malware automated removal system and method |