Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
12/05/2012 | EP2529328A1 Systems and methods for sharing the results of computing operations among related computing systems |
12/05/2012 | EP2529321A2 Url filtering based on user browser history |
12/05/2012 | CN202584139U Physical experiment platform for power consumption analysis of cryptographic chip |
12/05/2012 | CN202584138U Security and secrecy computer |
12/05/2012 | CN1554176B Method for processing encrypted message in wireless mobile communication device and device for processing multiple access for encrypted contents |
12/05/2012 | CN102812684A System and method of enforcing a computer policy |
12/05/2012 | CN102812473A Executable Identity Based File Access |
12/05/2012 | CN102812471A A secured personal data handling and management system |
12/05/2012 | CN102812470A Content Binding At First Access |
12/05/2012 | CN102810154A Method and system for biological characteristic acquisition and fusion based on trusted module |
12/05/2012 | CN102810141A Software lease authorization method based on attribute encryption |
12/05/2012 | CN102810139A Secure data operation method and communication terminal |
12/05/2012 | CN102810138A Method and system for restoring files of clients |
12/05/2012 | CN102810137A Establishing method and multiplexing method for multiplex attack mode in software security development |
12/05/2012 | CN102810136A Printing equipment and security printing method |
12/05/2012 | CN102810078A Method for analyzing dynamic execution of Linux kernel |
12/05/2012 | CN102222187B Domain name structural feature-based hang horse web page detection method |
12/05/2012 | CN102063584B Chip attack protection |
12/05/2012 | CN102034043B Malicious software detection method based on file static structure attributes |
12/05/2012 | CN101976317B Virtual machine image safety method in private cloud computing application |
12/05/2012 | CN101751532B Selecting 2 from 3 logic hardware voting method for safety output of safety computer platform |
12/05/2012 | CN101719208B Method and device for automatically extracting characteristics of virus file |
12/05/2012 | CN101681415B Method and apparatus for changing and adding activation keys for functions of digital content |
12/05/2012 | CN101611414B Protection of information contained in an electronic circuit |
12/05/2012 | CN101610251B Information intercepting method and device for predefined keywords |
12/05/2012 | CN101520854B Smart memory card, data safety control system and method thereof |
12/05/2012 | CN101329658B Encryption and decryption method, and PLC system using the same |
12/04/2012 | USRE43845 Lock-and-key consumer billing data protection system having data encryption capability |
12/04/2012 | US8327459 Method and apparatus for authenticating usage of an application |
12/04/2012 | US8327455 Apparatus and method for controlling copying of AV data and computer readable medium therefor |
12/04/2012 | US8327454 Method for allowing multiple users to access preview content |
12/04/2012 | US8327453 Method and apparatus for protecting information and privacy |
12/04/2012 | US8327452 Program obfuscation apparatus, program obfuscation method and computer readable medium |
12/04/2012 | US8327449 Information processing apparatus, information recording medium, information processing method, and computer program |
12/04/2012 | US8327448 Protected clock management based upon a non-trusted persistent time source |
12/04/2012 | US8327446 Antivirus stand-alone network or internet appliance and methods therefor |
12/04/2012 | US8327432 Self-initiated end-to-end monitoring of an authentication gateway |
12/04/2012 | US8327427 System and method for transparent single sign-on |
12/04/2012 | US8327425 Method for establishing an agency relationship to perform delegated computing tasks |
12/04/2012 | US8327417 Remote authorization for operations |
12/04/2012 | US8327415 Enabling byte-code based image isolation |
12/04/2012 | US8327355 Method, computer program product, and hardware product for supporting virtual machine guest migration overcommit |
12/04/2012 | US8327317 Method and apparatus for providing project development environment and project development system |
12/04/2012 | US8327281 Access control apparatus, access control method, and access control program |
12/04/2012 | US8327156 Embedded device having countermeasure function against fault attack |
12/04/2012 | US8327153 Method and system for verifying software platform of vehicle |
12/04/2012 | US8327152 System and methods for assignation and use of media content subscription service privileges |
12/04/2012 | US8327150 System, method and program for managing information |
12/04/2012 | US8327145 Method for generating rights object and device to perform the method, method for transmitting rights object and device to perform the method, and method for receiving rights object and device to perform the method |
12/04/2012 | US8327138 Method and system for securing digital assets using process-driven security policies |
12/04/2012 | US8327136 Inter-entity coupling method, apparatus and system for content protection |
12/04/2012 | US8327132 Automated certificate provisioning for non-domain-joined entities |
12/04/2012 | US8327035 Method for executing an application with the aid of a portable data storage medium |
12/04/2012 | US8326983 Methods and systems for transaction record delivery using thresholds and multi-stage protocol |
12/04/2012 | US8326910 Programmatic validation in an information technology environment |
12/04/2012 | US8326774 Systems and methods to distribute content over a network |
12/04/2012 | US8326763 Method and system to detect invalid and fraudulent impressions and clicks in web-based advertisement systems |
12/04/2012 | US8326762 Control method for a communication relay system |
12/04/2012 | US8326003 Security system and method for security certification thereof, method of generating relative character information, terminal system, and smart card |
12/04/2012 | US8325653 System and method for restricting network access to one or more nodes in a wireless communications network |
12/04/2012 | US8325168 Display device and control method thereof |
12/04/2012 | US8325067 Security keyboard |
12/04/2012 | CA2624758C System and method for creating activation secure module |
12/04/2012 | CA2614561C System and method for wiping and disabling a removed device |
12/04/2012 | CA2585987C System and method for protecting master encryption keys |
12/04/2012 | CA2568739C System, method, and computer program product for providing digital rights management of protected content |
12/04/2012 | CA2498326C Content distribution for multiple digital rights management |
12/04/2012 | CA2462673C Systems and methods for providing digital rights management compatibility |
11/30/2012 | CA2747584A1 System and method for generating and refining cyber threat intelligence data |
11/29/2012 | WO2012162256A1 Automating cloud service reconnections |
11/29/2012 | WO2012162109A1 Certification controls for a structure design, analysis, and implementation system |
11/29/2012 | WO2012162107A1 User certification in a structure design, analysis, and implementation system |
11/29/2012 | WO2012161966A2 Methods and apparatus for blocking usage tracking |
11/29/2012 | WO2012161727A1 Picture gesture authentication |
11/29/2012 | WO2012161713A1 More secure image-based "captcha" technique |
11/29/2012 | WO2012161526A1 Computing apparatus and automatic connection switching method of the computing apparatus |
11/29/2012 | WO2012161505A1 Method and apparatus for authenticating a non-volatile memory device |
11/29/2012 | WO2012161417A1 Method and device for managing the distribution of access rights in a cloud computing environment |
11/29/2012 | WO2012161125A1 Receiver, program and receiving method |
11/29/2012 | WO2012161122A1 Broadcast/communication linking receiver apparatus and resource managing apparatus |
11/29/2012 | WO2012161121A1 Broadcast-communication coordination receiving device and broadcast-communication coordination system |
11/29/2012 | WO2012160814A1 Information processing system, access rights management method, information processing device, and control method and control program therefor |
11/29/2012 | WO2012160760A1 Information processing device and information processing method |
11/29/2012 | WO2012160710A1 Authentication system and method |
11/29/2012 | WO2012160599A1 Computer system and its control method |
11/29/2012 | WO2012160366A1 Supervised data transfer |
11/29/2012 | WO2012159834A1 Content publication control system |
11/29/2012 | WO2012159486A1 Method and device for generating password-protected carrier |
11/29/2012 | WO2012119030A3 Methods and systems for determing risk associated with a requirements document |
11/29/2012 | WO2012088364A3 Satisfying application dependencies |
11/29/2012 | US20120304316 Validating Access to a Group of Related Elements |
11/29/2012 | US20120304315 Method and apparatus for managing digital rights of secure removable media |
11/29/2012 | US20120304314 Methods for administering an autonomous rights component, autonomous rights administration systems and devices carrying out the methods |
11/29/2012 | US20120304313 Facilitating data access control in peer-to-peer overlay networks |
11/29/2012 | US20120304312 Communications device |
11/29/2012 | US20120304311 Tokenized Resource Access |
11/29/2012 | US20120304310 Secure execution of unsecured apps on a device |
11/29/2012 | US20120304309 Conditional Access System and Method |
11/29/2012 | US20120304308 Method and system providing advice and services to consumers |
11/29/2012 | US20120304307 Computer Implemented System for Facilitating Configuration, Data Tracking and Reporting for Data Centric Applications |