Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
07/2012
07/04/2012CN101894227B Intelligent destruct system for closed electronic device
07/04/2012CN101882191B Information security protecting device
07/04/2012CN101866403B Intrusion detection method based on improved OBS-NMF algorithm
07/04/2012CN101815074B User authentication method and user authentication system
07/04/2012CN101770552B Method for clearing computer password, computer and system for clearing computer password
07/04/2012CN101720471B Device and method for digital rights management
07/04/2012CN101714068B Network interface apparatus, control method, and image forming apparatus
07/04/2012CN101706851B Method and system for controlling process of self-help terminal
07/04/2012CN101697180B Computer data communication isolation management system and data monitoring method
07/04/2012CN101673333B Metering support method of measurement software module of virtual instrument
07/04/2012CN101650765B Cryptographic-key management system, external device, and cryptographic-key management program
07/04/2012CN101622624B File conversion in restricted process
07/04/2012CN101616008B Method and system for protecting network application data
07/04/2012CN101615186B BBS user abnormal behavior auditing method based on Hidden Markov theory
07/04/2012CN101604368B Printing system
07/04/2012CN101599022B Trustworthy computing base cutting method used for virtual machine system
07/04/2012CN101577622B Method for controlling access to shared component of leveled partition
07/04/2012CN101573912B Method used for sink device addressing and content distribution network adopting the same
07/04/2012CN101548272B Device managing device
07/04/2012CN101512959B Information processing apparatus and information management method
07/04/2012CN101454783B Systems and methods for datapath security in a system-on-a-chip device
07/04/2012CN101438274B Claim transformations for trust relationships
07/04/2012CN101405740B Method of maintaining software integrity stored in memory
07/04/2012CN101322136B Document data safety control method and system
07/04/2012CN101286994B Digital literary property management method, server and system for content sharing within multiple devices
07/04/2012CN101261865B Making method, device, playing device and method for media electronic file
07/04/2012CN101208748B reproduction device, information acquirement method, and integrated circuit of reproduction device
07/04/2012CN101131721B Information processing apparatus, information recording medium, information processing method, and computer program
07/04/2012CN101057200B Method and system for transferring of digital rights protected content using usb or memory cards
07/03/2012US8214912 Method and apparatus for temporarily using DRM contents
07/03/2012US8214908 Electronic musical apparatus, control method therefor, and program for implementing the control method
07/03/2012US8214896 Method of securing USB keyboard
07/03/2012US8214891 Using multi-touch gestures to protect sensitive content using a completely automated public turing test to tell computers and humans apart (CAPTCHA)
07/03/2012US8214889 Selective auto-revocation of firewall security settings
07/03/2012US8214884 Computer-based dynamic secure non-cached delivery of security credentials such as digitally signed certificates or keys
07/03/2012US8214881 Security key with instructions
07/03/2012US8214874 Method for the distribution of audio-visual information and a system for the distribution of audio-visual information
07/03/2012US8214653 Secured firmware updates
07/03/2012US8214652 Biometric identification network security
07/03/2012US8214651 Radio frequency identification (RFID) based authentication system and methodology
07/03/2012US8214649 System and method for secure communications between at least one user device and a network entity
07/03/2012US8214644 Method for installing rights object for content in memory card
07/03/2012US8214643 Service verifying system, authentication requesting terminal, service utilizing terminal, and service providing method
07/03/2012US8214639 Application executing device, managing method, and program
07/03/2012US8214632 Method of booting electronic device and method of authenticating boot of electronic device
07/03/2012US8214630 Method and apparatus for controlling enablement of JTAG interface
07/03/2012US8214564 Content transfer system, information processing apparatus, transfer method, and program
07/03/2012US8214558 Systems and methods for managing access to a peripheral device
07/03/2012US8214481 Firewall permitting access to network based on accessing party identity
07/03/2012US8214303 Apparatus for executing interoperable digital rights management using contents device and method of performing operations between contents device and digital rights management tool for interoperable digital rights management
07/03/2012US8214296 Disaggregated secure execution environment
07/03/2012US8214295 Internet system for facilitating human user advisement and licensing of copyrighted works of authorship
07/03/2012US8213901 Subscriber identities
07/03/2012US8213675 Device and method for outputting a private image using a public display
07/03/2012US8213618 Protecting content on client platforms
07/03/2012US8213612 Secure software download
07/03/2012US8213606 Method and apparatus for implementing processor instructions for accelerating public-key cryptography
07/03/2012US8213602 Method and system for encrypting and decrypting a transport stream using multiple algorithms
07/03/2012US8213601 Font level encryption method and apparatus
07/03/2012US8213495 Picture decoding method and picture decoding apparatus
07/03/2012US8213040 Image forming apparatus, program adding method, and a recording medium
07/03/2012US8211538 Microelectronic security coatings
07/03/2012CA2548213C Methods and systems for managing output of content using a hierarchical authorization scheme
07/03/2012CA2405489C Secure digital content licensing system and method
06/2012
06/28/2012WO2012088542A2 Scoped resource authorization policies
06/28/2012WO2012088474A2 Device, method, and graphical user interface for switching between two user interfaces
06/28/2012WO2012088364A2 Satisfying application dependencies
06/28/2012WO2012088363A2 Licensing and metering of virtualized applications
06/28/2012WO2012088296A2 System and method for data collection and exchange with protected memory devices
06/28/2012WO2012088109A2 Providing a security boundary
06/28/2012WO2012088029A2 Secure application attestation using dynamic measurement kernels
06/28/2012WO2012087953A1 System and method for securely moving content
06/28/2012WO2012087853A2 Tamper proof location services
06/28/2012WO2012087844A1 Client hardware authenticated transactions
06/28/2012WO2012087762A1 Allocation of application identifiers
06/28/2012WO2012087751A1 Bulk initial download of mobile databases
06/28/2012WO2012087685A1 Signature-independent, system behavior-based malware detection
06/28/2012WO2012087650A1 Improvements relating to cryptography using polymorphic code
06/28/2012WO2012087582A2 Secure and private location
06/28/2012WO2012087562A2 System and method for implementing a trusted dynamic launch and trusted platform module (tpm) using secure enclaves
06/28/2012WO2012087545A1 Transaction integrity
06/28/2012WO2012087258A1 Usb memory encryption device
06/28/2012WO2012086657A1 Authentication card, authentication system, guidance method, and program
06/28/2012WO2012086209A1 Display system, display device, display control method, and medication management system
06/28/2012WO2012085767A1 Creating an access control policy based on consumer privacy preferences
06/28/2012WO2012085482A1 Protection of applets against hidden-channel analyses
06/28/2012WO2012085378A1 Method for enabling authentication or identification, and related verification system
06/28/2012WO2012085323A1 System for slowing down the transfer rate of a device by the cryptographic method
06/28/2012WO2012084837A1 Virtual machine validation
06/28/2012WO2012084507A1 Detecting a return-oriented programming exploit
06/28/2012WO2012084496A1 Method for updating an encoded file
06/28/2012WO2012084397A1 Network-capable hardware copy protection unit
06/28/2012WO2012084236A1 Communication protocol for medical devices that supports enhanced security
06/28/2012WO2012084029A1 Method for providing a data memory architecture and for transmitting data, and system
06/28/2012WO2012083521A1 Method for standardizing computer system action
06/28/2012WO2012083456A1 Biometric authentication system and method
06/28/2012WO2012058190A3 Inherited product activation for virtual machines
06/28/2012WO2012044996A3 Hardware-based human presence detection
06/28/2012WO2012040231A3 Systems and methods for secure data sharing
06/28/2012WO2011145095A3 Computer motherboard having peripheral security functions