Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
08/2012
08/22/2012CN101645873B Method for realizing network isolation in environments of computer and virtual machine
08/22/2012CN101620651B Method and device for clearing data in computer
08/22/2012CN101610256B License information transfer request, transfer method and assign method and devices therefor
08/22/2012CN101499111B Computer and method for recognizing client operating system in computer
08/22/2012CN101496020B Methods and systems for determining usage rights for digital content based on characterizing information thereof and related devices
08/22/2012CN101464932B Cooperation method and system for hardware security units, and its application apparatus
08/22/2012CN101390104B Methods and apparatus for protected distribution of applications and media content
08/22/2012CN101326529B System for limiting improper communication program and method thereof
08/22/2012CN101281459B 受保护的功能调用 Protected function calls
08/22/2012CN101248436B Hardware protection in form of printed circuit board drawn into semi-case
08/22/2012CN101237443B Method and system for user authentication in management protocol
08/22/2012CN101192260B Electronic device and method for opening same
08/22/2012CN101154256B Methods and arrangements to launch trusted, co-existing environments
08/21/2012USRE43602 Data security method and device for computer modules
08/21/2012USRE43599 Data management system
08/21/2012US8250666 Method and apparatus for improving security in an application level virtual machine environment
08/21/2012US8250665 Digital Broadcasting system and method of processing data in digital broadcasting system
08/21/2012US8250663 Method and system for controlling presentation of media on a media storage device
08/21/2012US8250661 Image processing apparatus, information processing apparatus, and methods thereof
08/21/2012US8250659 Apparatus and method for protecting the integrity of data
08/21/2012US8250658 Syntax-based security analysis using dynamically generated test cases
08/21/2012US8250653 Secure multi-principal web browser
08/21/2012US8250650 Front-end protocol for server protection
08/21/2012US8250649 Securing system and method using a security device
08/21/2012US8250648 Security system and method for computer operating systems
08/21/2012US8250642 System, method and program for managing firewalls
08/21/2012US8250637 Determining the degree of relevance of duplicate alerts in an entity resolution system
08/21/2012US8250636 Instrument access control system
08/21/2012US8250624 Portable device for securing packet traffic in a host platform
08/21/2012US8250387 Computers having a biometric authentication device
08/21/2012US8250379 Secure storage of temporary secrets
08/21/2012US8250378 System and method for enabling encryption
08/21/2012US8250377 Software copyright protection and licensing system using RFID
08/21/2012US8250376 Method and apparatus for cryptographic conversion in a data storage system
08/21/2012US8250374 Method and apparatus for verifying authenticity of initial boot code
08/21/2012US8250373 Authenticating and verifying an authenticable and verifiable module
08/21/2012US8250372 Gaming security system
08/21/2012US8250371 Method and system for managing delayed user authentication
08/21/2012US8250369 Method and apparatus for secure measurement certification
08/21/2012US8250364 Launching a secure kernel in a multiprocessor system
08/21/2012US8250361 Server certificate issuing system and person authentication method
08/21/2012US8250360 Content based routing with high assurance MLS
08/21/2012US8250263 Apparatus and method for securing data of USB devices
08/21/2012US8250098 User preference information structure having multiple hierarchical structure and method for providing multimedia information using the same
08/21/2012US8250045 Non-invasive usage tracking, access control, policy enforcement, audit logging, and user action automation on software applications
08/21/2012US8249992 Digital rights management and audience measurement systems and methods
08/21/2012US8249991 Contents reproduction expiration management system, contents reproduction expiration managing method, terminal apparatus, server apparatus, program, and recording medium for managing permission/non-permission of reproduction of contents
08/21/2012US8249735 Method and system for automatically identifying an existing workflow to manufacture a given product type
08/21/2012US8249557 Mobile phone
08/21/2012US8249428 Content management device and content management method for controlling transfer of content having copy control information
08/21/2012US8249258 Communication method and communication system using decentralized key management scheme
08/21/2012US8249257 Virtual TPM keys rooted in a hardware TPM
08/21/2012US8249253 Semiconductor integrated circuit having encrypter/decrypter function for protecting input/output data transmitted on internal bus
08/21/2012US8249252 Information processing apparatus, information processing method, and program
08/21/2012US8249251 Security system and method
08/21/2012US8249250 Secure similarity verification between homomorphically encrypted signals
08/21/2012DE202012007236U1 Elektronikmodul mit Manipulationsschutz Electronic module with tamper protection
08/21/2012CA2539211C Point-of-sale activation of media device account
08/21/2012CA2450844C A method for securing an electronic device, a security system and an electronic device
08/16/2012WO2012109640A2 System and method for secure software update
08/16/2012WO2012109633A2 Security countermeasure management platform
08/16/2012WO2012109497A1 Access control system and method
08/16/2012WO2012108902A1 Systems for distributing e-content based on selective payment
08/16/2012WO2012108678A2 Apparatus and method for setting disposition with respect to document share
08/16/2012WO2012107955A1 Data storage system and its control method
08/16/2012WO2012107924A2 System and method for managing usage rights of software applications
08/16/2012WO2012107698A1 Secure transaction method from a non-secure terminal
08/16/2012WO2012107557A1 Method and system for improving security threats detection in communication networks
08/16/2012WO2012107409A2 Method and device for controlling distribution of licenses
08/16/2012WO2012107255A1 Detecting a trojan horse
08/16/2012WO2012107200A1 Method for programming a mobile terminal chip
08/16/2012WO2012087562A3 System and method for implementing a trusted dynamic launch and trusted platform module (tpm) using secure enclaves
08/16/2012WO2012082812A3 Security through opcode randomization
08/16/2012WO2012082411A3 Audio content protection
08/16/2012WO2012082410A3 Technique for supporting multiple secure enclaves
08/16/2012WO2012080972A3 Storage media
08/16/2012WO2012078328A3 Pattern matching
08/16/2012WO2012037166A3 Systems and methods for user interaction based on license or other identification information
08/16/2012US20120210448 System and method for accessing private digital content
08/16/2012US20120210447 Secure video download method
08/16/2012US20120210446 Session-controlled-access of client data by support personnel
08/16/2012US20120210445 Systems and Methods for Verifying the Authenticity of a Remote Device
08/16/2012US20120210444 Apparatus and method for restricting the execution of a program
08/16/2012US20120210443 Securing and managing apps on a device
08/16/2012US20120210442 License management system, license management device, and computer-readable recording medium having license management program
08/16/2012US20120210441 Software Protection Using an Installation Product Having an Entitlement File
08/16/2012US20120210440 Information processing device, information record medium manufacturing device, information record medium, method therefore, and computer program
08/16/2012US20120210439 Method and device for excerpt licensing
08/16/2012US20120210438 Secure Three-Dimensional Mask-Programmed Read-Only Memory
08/16/2012US20120210437 Method and system to enhance accuracy of a data leak prevention (DLP) system
08/16/2012US20120210436 System and method for fingerprinting in a cloud-computing environment
08/16/2012US20120210435 Web content ratings
08/16/2012US20120210434 Security countermeasure management platform
08/16/2012US20120210433 Exfiltration testing and extrusion assessment
08/16/2012US20120210431 Detecting a trojan horse
08/16/2012US20120210430 Intrusion detection using a network processor and a parallel pattern detection engine
08/16/2012US20120210429 Adaptive Behavioral Intrusion Detection Systems and Methods
08/16/2012US20120210427 Configurable investigative tool
08/16/2012US20120210426 Analysis system for unknown application layer protocols
08/16/2012US20120210425 Network Surveillance