Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
05/09/2012 | EP2450820A1 User authentication system and plant control system having user authentication system |
05/09/2012 | EP2450819A1 Electronic component with time-limited use |
05/09/2012 | EP2450818A1 Method for setting up an access level for use of a software system, and computer program products and processor devices therefor |
05/09/2012 | EP2450817A1 Electronic component with time-limited use |
05/09/2012 | EP2450816A1 Method for securing the execution of a computer code by dynamic redundancy |
05/09/2012 | EP2449763A1 Audio licensing in distribution of audiovisual assets |
05/09/2012 | EP2449741A1 System for protecting personal data |
05/09/2012 | EP2449722A2 Secure meter access from a mobile reader |
05/09/2012 | EP2449503A2 Method for remotely controlling and monitoring the data produced on desktop on desktop software |
05/09/2012 | EP2449502A1 Method and apparatus for managing access to identity information |
05/09/2012 | EP2449501A1 Method, apparatus and computer program product for providing protected content to one or more devices by reacquiring the content from a service |
05/09/2012 | EP2449500A1 Data security in solid state memory |
05/09/2012 | EP2449499A1 Secure boot method and secure boot apparatus |
05/09/2012 | EP2449498A2 Content provisioning and revenue disbursement |
05/09/2012 | EP2449497A1 Method for detecting an attempted attack, recording medium, and security processor for said method |
05/09/2012 | EP2449496A1 Method for acquisition of software applications |
05/09/2012 | EP2449495A1 Method for remotely validating executable code |
05/09/2012 | EP2449494A1 Devices and methods for establishing and validating a digital certificate |
05/09/2012 | EP2449477A2 Data object store and server for a cloud storage environment |
05/09/2012 | EP2449457A2 A method for controlling unauthorized software application usage |
05/09/2012 | EP1499940B1 Efficient browser-based identity management providing personal control and anonymity |
05/09/2012 | EP1488420B1 Usage management method and usage management apparatus |
05/09/2012 | CN202218262U Safety management system for internal network information |
05/09/2012 | CN202217283U Remote genuine signature system |
05/09/2012 | CN202217282U Safety data memory system based on finger print universal serial bus (USB) flash disk and virtual machine |
05/09/2012 | CN202217281U Hotel style computer |
05/09/2012 | CN1992724B Management server and terminal unit |
05/09/2012 | CN1992080B Semiconductor device |
05/09/2012 | CN1906609B System for data format conversion for use in data centers |
05/09/2012 | CN1652503B Data providing system and data providing apparatus |
05/09/2012 | CN102449976A System and method for accessing private digital content |
05/09/2012 | CN102449916A Apparatus and method for unlocking a locking mode of portable terminal |
05/09/2012 | CN102449696A Method and host device for enforcing a rule associated with a media file |
05/09/2012 | CN102449655A Protected serving of electronic content |
05/09/2012 | CN102449649A Account-recovery technique |
05/09/2012 | CN102449638A Using a custom media library to secure digital media content |
05/09/2012 | CN102449637A Secure copy and/or playback protection |
05/09/2012 | CN102449636A Multimedia content file management system for and method of using genetic information |
05/09/2012 | CN102449635A Cloud computing as a security layer |
05/09/2012 | CN102449634A Secure boot method and secure boot apparatus |
05/09/2012 | CN102449633A Dynamic determination of access rights |
05/09/2012 | CN102449632A A method of efficient secure function evaluation using resettable tamper-resistant hardware tokens |
05/09/2012 | CN102449631A System and method for performing a management operation |
05/09/2012 | CN102449597A JAVA Store |
05/09/2012 | CN102447818A Playing method of video copyright protection and classification watching |
05/09/2012 | CN102447701A Network information interaction method and network security system |
05/09/2012 | CN102447559A Method and system for digital signatures of composite resource documents |
05/09/2012 | CN102446259A 组件访问控制方法及电子设备 Components access control method and electronic equipment |
05/09/2012 | CN102446258A Attachment authority type expansion method and device and system adopting same |
05/09/2012 | CN102446257A Problem-based account generation method and device |
05/09/2012 | CN102446256A 终端和应用程序管理方法 Terminal and application management methods |
05/09/2012 | CN102446255A Method and device for detecting page tamper |
05/09/2012 | CN102446254A Similar loophole inquiry method based on text mining |
05/09/2012 | CN102446253A Webpage trojan detection method and system |
05/09/2012 | CN102446252A Method and device for showing off-limit files |
05/09/2012 | CN102446251A Device activation realizing method and equipment |
05/09/2012 | CN102446250A Methods, apparatuses and methods for protecting and verifying data integrity |
05/09/2012 | CN102446249A Electronic device and method for acquiring illegal user information of same |
05/09/2012 | CN102446248A Device and method for protecting memory data of computing device in enterprise network system |
05/09/2012 | CN102446247A Guidance control method for external guidance equipment of computer and system and equipment adopting same |
05/09/2012 | CN102446106A Installation management method, server and terminal for application program |
05/09/2012 | CN101901316B Data integrity protection method based on Bloom filter |
05/09/2012 | CN101859349B File screening system and file screening method for searching and killing malicious programs |
05/09/2012 | CN101840498B Bar code decoding device and security protection method thereof |
05/09/2012 | CN101789065B Application executing device, managing method, and program |
05/09/2012 | CN101777102B Security audit method and system for kernel |
05/09/2012 | CN101639885B Safe preparation method for cipher chip to resist against bypass attack |
05/09/2012 | CN101622627B System and method for interlocking to protect software-mediated program and device behaviours |
05/09/2012 | CN101593254B Safe input method and system for notebook computer |
05/09/2012 | CN101533452B Method for protecting cipher of USB interface |
05/09/2012 | CN101512536B System and method for authenticating a gaming device |
05/09/2012 | CN101506815B Bi-processor architecture for secure systems |
05/09/2012 | CN101473335B Information processing terminal, safety equipment, method used in the information processing terminal |
05/09/2012 | CN101467156B Method, system and equipment for creating objects |
05/09/2012 | CN101416204B Secure device |
05/09/2012 | CN101409757B Information processing apparatus, information processing system, and information processing method |
05/09/2012 | CN101339593B Software security evaluation system, user capability and confidence level evaluation system and method |
05/09/2012 | CN101246454B Information storage equipment protecting equipment and production method for the same |
05/09/2012 | CN101038653B 验证系统 Verification system |
05/08/2012 | US8176568 Tracing traitor coalitions and preventing piracy of digital content in a broadcast encryption system |
05/08/2012 | US8176565 Information processing apparatus, information processing method, and computer program |
05/08/2012 | US8176564 Special PC mode entered upon detection of undesired state |
05/08/2012 | US8176563 Data security system and method with editor |
05/08/2012 | US8176560 Evaluation of tamper resistant software system implementations |
05/08/2012 | US8176555 Systems and methods for detecting malicious processes by analyzing process names and process characteristics |
05/08/2012 | US8176552 Computer system, computer program product and method for assessing a profile of a computer system |
05/08/2012 | US8176550 Authentication-capable apparatus and security system |
05/08/2012 | US8176549 Unit using OS and image forming apparatus using the same |
05/08/2012 | US8176548 Protection system for display apparatus and method thereof |
05/08/2012 | US8176547 System and method for controlling user access to an electronic device |
05/08/2012 | US8176540 Resource based non-interactive entity application proxy method and system |
05/08/2012 | US8176539 Methods for protecting against cookie-poisoning attacks in networked-communication applications |
05/08/2012 | US8176535 Information processing system, information processing method, and computer readable medium |
05/08/2012 | US8176335 Removable computer with mass storage |
05/08/2012 | US8176334 Document security system that permits external users to gain access to secured files |
05/08/2012 | US8176333 Method and apparatus for protecting external call references |
05/08/2012 | US8176332 Computer security using visual authentication |
05/08/2012 | US8176331 Method to secure data exchange between a multimedia processing unit and a security module |
05/08/2012 | US8176324 Method and system for a secure virtual keyboard |
05/08/2012 | US8176322 Apparatus and method for moving and copying rights objects between device and portable storage device |