Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
09/2012
09/19/2012CN102682245A Systems and methods for detecting fraud associated with systems application processing
09/19/2012CN102682244A Information processing apparatus, program execution method, and computer program
09/19/2012CN102682242A Security enforcement in virtualized systems
09/19/2012CN102682241A Electronic equipment and method and system for protecting data of same
09/19/2012CN102682240A Method for controlling resources in large browser/server (BS) structured system
09/19/2012CN102682239A Digital watermark technology based copyright protection method orienting to remote sensing tile data
09/19/2012CN102682238A Method and device for executing enciphered data communication
09/19/2012CN102682237A Virus judging method and system aiming at network downloading file
09/19/2012CN102682236A Method and device for excerpt licensing
09/19/2012CN102682235A Reputation checking of executable programs
09/19/2012CN102682234A Method and apparatus for hierarchical assignment of rights to documents and documents having such rights
09/19/2012CN102682233A Methods and systems for scalable distribution of protected content
09/19/2012CN102682232A High-performance superscalar elliptic curve cryptographic processor chip
09/19/2012CN102682231A Computer network guard system
09/19/2012CN102682230A Method and device aiming at safety protection for Internet remote control
09/19/2012CN102682229A Malicious code behavior detection method based on virtualization technology
09/19/2012CN102682228A Method and system for searching and killing viruses of mobile equipment by using SIM (subscriber identity module) card
09/19/2012CN102682227A Method and system for enhancing TCM (Trusted Cryptography Module) application as well as trusted computing processing method
09/19/2012CN102681838A Method, computer program and device for providing security for intermediate programming code for its execution by a virtual machine
09/19/2012CN102681652A Security input achieving method and terminal
09/19/2012CN102073813B Method and device for controlling application on mobile device to run
09/19/2012CN101853354B Application executing device and method
09/19/2012CN101795272B Illegal website filtering method and device
09/19/2012CN101714931B Early warning method, device and system of unknown malicious code
09/19/2012CN101513008B System for implementing safety of telecommunication terminal
09/19/2012CN101361076B Mobile memory system for secure storage and delivery of media content
09/19/2012CN101025977B Information processing apparatus and method, information recording medium manufacturing apparatus and method
09/18/2012US8272067 Protecting commercials within encoded video content
09/18/2012US8272065 Secure client-side aggregation of web applications
09/18/2012US8272063 DRM scheme extension
09/18/2012US8272060 Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses
09/18/2012US8272053 Physical security management system
09/18/2012US8272050 Data managing device equipped with various authentication functions
09/18/2012US8272049 Multi-domain computer password management
09/18/2012US8272047 Information processing apparatus, information processing system, recording medium and information processing method
09/18/2012US8272042 System and method for automation of information or data classification for implementation of controls
09/18/2012US8272035 Projector projecting password
09/18/2012US8272027 Applying digital rights to newly created electronic
09/18/2012US8271805 Methods and apparatus for providing a secure buffer
09/18/2012US8271803 Anti-debugging protection of binaries with proxy code execution
09/18/2012US8271800 System and method for processing and protecting content
09/18/2012US8271799 System and method for generating a disguised password based on a real password
09/18/2012US8271798 Limiting access to publicly exposed object-oriented interfaces via password arguments
09/18/2012US8271797 Service use method and management method
09/18/2012US8271796 Apparatus for secure computation of string comparators
09/18/2012US8271795 Security based on subliminal and supraliminal channels for data objects
09/18/2012US8271791 Long-term secure digital signatures
09/18/2012US8271785 Synthesized root privileges
09/18/2012US8271783 Subordinate trusted platform module
09/18/2012US8271781 System and method for authentication of a hardware token
09/18/2012US8271776 Mobile printing
09/18/2012US8271642 System, method, and computer program product for isolating a device associated with at least potential data leakage activity, based on user input
09/18/2012US8271606 Network-based storage system capable of allocating storage partitions to hosts
09/18/2012US8271555 Method and application for a reactive defense against illegal distribution of multimedia content in file sharing networks
09/18/2012US8271467 Worldwide web registration information processing system
09/18/2012US8271393 System and method for facilitating transactions between two or more parties
09/18/2012US8271390 Digital rights management (DRM) license manager
09/18/2012US8271388 Image commercial transactions system and method, image transfer system and method, image distribution system and method, display device and method
09/18/2012US8271387 Method and apparatus for providing limited access to data objects or files within an electronic software delivery and management system
09/18/2012US8270707 Learning device, learning method, identification device, identification method, and program
09/18/2012US8270174 Hardware protection system for sensitive electronic-data modules protecting against external manipulations
09/18/2012US8269995 Image forming apparatus and apparatus for personal identity authentication
09/18/2012US8269989 Printing system, printing apparatus, document replacement apparatus, and printer driver
09/18/2012US8269607 Proximity location system and method thereof for locating a communications device
09/18/2012US8267866 Method and apparatus for assessment of bone age using ultrasound
09/13/2012WO2012122175A1 Secure file sharing method and system
09/13/2012WO2012121966A2 Methods and systems for full pattern matching in hardware
09/13/2012WO2012121690A1 System and method for watermarking content for tracking media consumption
09/13/2012WO2012121482A2 Data encryption processing device and method of a cloud storage system
09/13/2012WO2012121481A2 Method and apparatus for managing content to be shared among devices
09/13/2012WO2012121441A1 Portable device for saving personal health records and method for controlling same
09/13/2012WO2012121440A1 System for managing personal health record
09/13/2012WO2012121119A1 Generating log with location and accelerometer history
09/13/2012WO2012121118A1 Generating printable certificates to verify log authenticity
09/13/2012WO2012121025A1 Random value identification device, random value identification system, and random value identification method
09/13/2012WO2012120313A1 A cryptographic system and method
09/13/2012WO2012120257A2 Controlling web page behaviour
09/13/2012WO2012119936A2 Key distribution for unconnected one-time password tokens
09/13/2012WO2012119620A1 A method for providing authorized access to a service application in order to use a protected resource of an end user
09/13/2012WO2012119218A1 Method and system for dynamic platform security in a device operating system
09/13/2012WO2012075385A3 Protecting files that include editable metadata
09/13/2012US20120233712 Method and Device for Accessing Control Data According to Provided Permission Information
09/13/2012US20120233711 Digital works having usage rights and method for creating the same
09/13/2012US20120233710 Digital works having usage rights and method for creating the same
09/13/2012US20120233709 Digital works having usage rights and methodfor creating the same
09/13/2012US20120233708 System and Method for Unlocking Content Associated with Media
09/13/2012US20120233707 Digital works having usage rights and method for creating the same
09/13/2012US20120233706 System and Method for Secure Licensing for an Information Handling System
09/13/2012US20120233705 System and methods for identity attribute validation
09/13/2012US20120233704 Information processing apparatus, key generation apparatus, signature verification apparatus, information processing method, signature generation method, and program
09/13/2012US20120233703 Techniques to pollute electronic profiling
09/13/2012US20120233702 Communication apparatus that communicate in different security levels and computer-readable media for controlling such apparatus
09/13/2012US20120233701 Content license acquisition platform apparatuses, methods and systems
09/13/2012US20120233700 System and method for performing remote security assessment of firewalled computer
09/13/2012US20120233699 K-zero day safety
09/13/2012US20120233697 Method and Apparatus Reducing Malware Detection Induced Delay
09/13/2012US20120233696 Method and system for antivirus by sim card combined with cloud computing
09/13/2012US20120233695 System and method for server-coupled application re-analysis to obtain trust, distribution and ratings assessment
09/13/2012US20120233694 Mobile malicious software mitigation
09/13/2012US20120233692 Apparatus and method for detecting malicious sites