Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
05/2012
05/09/2012EP2450820A1 User authentication system and plant control system having user authentication system
05/09/2012EP2450819A1 Electronic component with time-limited use
05/09/2012EP2450818A1 Method for setting up an access level for use of a software system, and computer program products and processor devices therefor
05/09/2012EP2450817A1 Electronic component with time-limited use
05/09/2012EP2450816A1 Method for securing the execution of a computer code by dynamic redundancy
05/09/2012EP2449763A1 Audio licensing in distribution of audiovisual assets
05/09/2012EP2449741A1 System for protecting personal data
05/09/2012EP2449722A2 Secure meter access from a mobile reader
05/09/2012EP2449503A2 Method for remotely controlling and monitoring the data produced on desktop on desktop software
05/09/2012EP2449502A1 Method and apparatus for managing access to identity information
05/09/2012EP2449501A1 Method, apparatus and computer program product for providing protected content to one or more devices by reacquiring the content from a service
05/09/2012EP2449500A1 Data security in solid state memory
05/09/2012EP2449499A1 Secure boot method and secure boot apparatus
05/09/2012EP2449498A2 Content provisioning and revenue disbursement
05/09/2012EP2449497A1 Method for detecting an attempted attack, recording medium, and security processor for said method
05/09/2012EP2449496A1 Method for acquisition of software applications
05/09/2012EP2449495A1 Method for remotely validating executable code
05/09/2012EP2449494A1 Devices and methods for establishing and validating a digital certificate
05/09/2012EP2449477A2 Data object store and server for a cloud storage environment
05/09/2012EP2449457A2 A method for controlling unauthorized software application usage
05/09/2012EP1499940B1 Efficient browser-based identity management providing personal control and anonymity
05/09/2012EP1488420B1 Usage management method and usage management apparatus
05/09/2012CN202218262U Safety management system for internal network information
05/09/2012CN202217283U Remote genuine signature system
05/09/2012CN202217282U Safety data memory system based on finger print universal serial bus (USB) flash disk and virtual machine
05/09/2012CN202217281U Hotel style computer
05/09/2012CN1992724B Management server and terminal unit
05/09/2012CN1992080B Semiconductor device
05/09/2012CN1906609B System for data format conversion for use in data centers
05/09/2012CN1652503B Data providing system and data providing apparatus
05/09/2012CN102449976A System and method for accessing private digital content
05/09/2012CN102449916A Apparatus and method for unlocking a locking mode of portable terminal
05/09/2012CN102449696A Method and host device for enforcing a rule associated with a media file
05/09/2012CN102449655A Protected serving of electronic content
05/09/2012CN102449649A Account-recovery technique
05/09/2012CN102449638A Using a custom media library to secure digital media content
05/09/2012CN102449637A Secure copy and/or playback protection
05/09/2012CN102449636A Multimedia content file management system for and method of using genetic information
05/09/2012CN102449635A Cloud computing as a security layer
05/09/2012CN102449634A Secure boot method and secure boot apparatus
05/09/2012CN102449633A Dynamic determination of access rights
05/09/2012CN102449632A A method of efficient secure function evaluation using resettable tamper-resistant hardware tokens
05/09/2012CN102449631A System and method for performing a management operation
05/09/2012CN102449597A JAVA Store
05/09/2012CN102447818A Playing method of video copyright protection and classification watching
05/09/2012CN102447701A Network information interaction method and network security system
05/09/2012CN102447559A Method and system for digital signatures of composite resource documents
05/09/2012CN102446259A 组件访问控制方法及电子设备 Components access control method and electronic equipment
05/09/2012CN102446258A Attachment authority type expansion method and device and system adopting same
05/09/2012CN102446257A Problem-based account generation method and device
05/09/2012CN102446256A 终端和应用程序管理方法 Terminal and application management methods
05/09/2012CN102446255A Method and device for detecting page tamper
05/09/2012CN102446254A Similar loophole inquiry method based on text mining
05/09/2012CN102446253A Webpage trojan detection method and system
05/09/2012CN102446252A Method and device for showing off-limit files
05/09/2012CN102446251A Device activation realizing method and equipment
05/09/2012CN102446250A Methods, apparatuses and methods for protecting and verifying data integrity
05/09/2012CN102446249A Electronic device and method for acquiring illegal user information of same
05/09/2012CN102446248A Device and method for protecting memory data of computing device in enterprise network system
05/09/2012CN102446247A Guidance control method for external guidance equipment of computer and system and equipment adopting same
05/09/2012CN102446106A Installation management method, server and terminal for application program
05/09/2012CN101901316B Data integrity protection method based on Bloom filter
05/09/2012CN101859349B File screening system and file screening method for searching and killing malicious programs
05/09/2012CN101840498B Bar code decoding device and security protection method thereof
05/09/2012CN101789065B Application executing device, managing method, and program
05/09/2012CN101777102B Security audit method and system for kernel
05/09/2012CN101639885B Safe preparation method for cipher chip to resist against bypass attack
05/09/2012CN101622627B System and method for interlocking to protect software-mediated program and device behaviours
05/09/2012CN101593254B Safe input method and system for notebook computer
05/09/2012CN101533452B Method for protecting cipher of USB interface
05/09/2012CN101512536B System and method for authenticating a gaming device
05/09/2012CN101506815B Bi-processor architecture for secure systems
05/09/2012CN101473335B Information processing terminal, safety equipment, method used in the information processing terminal
05/09/2012CN101467156B Method, system and equipment for creating objects
05/09/2012CN101416204B Secure device
05/09/2012CN101409757B Information processing apparatus, information processing system, and information processing method
05/09/2012CN101339593B Software security evaluation system, user capability and confidence level evaluation system and method
05/09/2012CN101246454B Information storage equipment protecting equipment and production method for the same
05/09/2012CN101038653B 验证系统 Verification system
05/08/2012US8176568 Tracing traitor coalitions and preventing piracy of digital content in a broadcast encryption system
05/08/2012US8176565 Information processing apparatus, information processing method, and computer program
05/08/2012US8176564 Special PC mode entered upon detection of undesired state
05/08/2012US8176563 Data security system and method with editor
05/08/2012US8176560 Evaluation of tamper resistant software system implementations
05/08/2012US8176555 Systems and methods for detecting malicious processes by analyzing process names and process characteristics
05/08/2012US8176552 Computer system, computer program product and method for assessing a profile of a computer system
05/08/2012US8176550 Authentication-capable apparatus and security system
05/08/2012US8176549 Unit using OS and image forming apparatus using the same
05/08/2012US8176548 Protection system for display apparatus and method thereof
05/08/2012US8176547 System and method for controlling user access to an electronic device
05/08/2012US8176540 Resource based non-interactive entity application proxy method and system
05/08/2012US8176539 Methods for protecting against cookie-poisoning attacks in networked-communication applications
05/08/2012US8176535 Information processing system, information processing method, and computer readable medium
05/08/2012US8176335 Removable computer with mass storage
05/08/2012US8176334 Document security system that permits external users to gain access to secured files
05/08/2012US8176333 Method and apparatus for protecting external call references
05/08/2012US8176332 Computer security using visual authentication
05/08/2012US8176331 Method to secure data exchange between a multimedia processing unit and a security module
05/08/2012US8176324 Method and system for a secure virtual keyboard
05/08/2012US8176322 Apparatus and method for moving and copying rights objects between device and portable storage device