Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
04/2012
04/25/2012CN1869927B Device controller, method for controlling a device, and program therefor
04/25/2012CN1531245B Server, terminal controller and terminal weight determiner
04/25/2012CN102428489A Method and apparatus for managing content obtained by combining works and advertisements with public license
04/25/2012CN102428476A Unauthorized operation detecting system and unauthorized operation detecting method
04/25/2012CN102428475A 管理安全性和/或隐私设置的系统和方法 System and method for managing security and / or privacy settings
04/25/2012CN102428474A Computer system, management system and recording medium
04/25/2012CN102428473A 用于计算机系统中安全对象的支持 Computer systems used to support the safety of objects
04/25/2012CN102428472A Secure execution of native code
04/25/2012CN102428471A 从系统管理模式确定信任级别的系统和方法 System and method for determining the level of trust from the system management mode
04/25/2012CN102428436A Touch screen, related method of operation and system
04/25/2012CN102427710A 电脑辐射消除器 Computer radiation eliminator
04/25/2012CN102426640A 用于产品验证和激活的安全软件产品标识符 Security software products used for product validation and activation of the identifier
04/25/2012CN102426639A 信息安全监测方法和装置 Information security monitoring method and apparatus
04/25/2012CN102426638A 芯片读取方法及加密方法 Chip reading method and encryption method
04/25/2012CN102426637A 一种嵌入式数据库加密存储方法 An embedded database encryption storage method
04/25/2012CN102426636A 可挂载式加密算法引擎系统及其使用方法 Cryptographic algorithms can be mounted engine system and method of use
04/25/2012CN102426635A Display device for file information, display method and system
04/25/2012CN102426634A 源代码后门发现方法 Source code backdoor discovery
04/25/2012CN102426604A 一种基于owl模型的内容安全扫描系统 A content owl security scanning system based on the model
04/25/2012CN102426599A Method for detecting sensitive information based on D-S evidence theory
04/25/2012CN101777105B 一种基于bios的计算机开机防伪验证方法 Based on computer boot bios security verification method
04/25/2012CN101777018B 一种复制与快照结合的Windows系统保护方法 A Windows system protection methods combined with snapshot replication
04/25/2012CN101770553B Mobile terminal and calling method for root certificate in mobile terminal
04/25/2012CN101710380B 电子文件安全防护方法 Electronic document security methods
04/25/2012CN101682740B Content download system, content download method, content supplying apparatus, content supplying method, content receiving apparatus, content receiving method
04/25/2012CN101647025B File server pipeline with denial of service mitigation
04/25/2012CN101635017B 防止显示画面数据遭截取的电子装置及方法 Electronic apparatus and method for preventing the display screen data being intercepted
04/25/2012CN101610333B 图像处理装置和图像形成装置以及图像发送装置 And an image transmitting apparatus of an image processing apparatus and an image forming apparatus
04/25/2012CN101546407B Electronic commerce system and management method thereof based on digital certificate
04/25/2012CN101539810B 防窥键盘装置 Anti-peep keyboard device
04/25/2012CN101523403B 用于在Web服务环境中同步策略控制的方法和系统 The method used in a Web services environment policy control and synchronization system
04/25/2012CN101212634B 用于编辑数字内容的装置和方法 Apparatus and method for editing digital content
04/25/2012CN101010904B Information processing device, information recording medium, information processing method, and computer program
04/24/2012US8166566 Controlling the downloading and recording of digital data
04/24/2012US8166564 Content distribution system, content distribution method, and client terminal
04/24/2012US8166563 Remanufacture of encrypted content using a replicated medium
04/24/2012US8166561 Security device, secure memory system and method using a security device
04/24/2012US8166558 System and method for upgrading the functionality of a controlling device in a secure manner
04/24/2012US8166557 Method and apparatus for dynamically providing privacy-policy information to a user
04/24/2012US8166556 Information processing apparatus, information recording medium, information processing method and computer program
04/24/2012US8166553 Method and apparatus for detecting unauthorized-access, and computer product
04/24/2012US8166552 Adaptive configuration management system
04/24/2012US8166551 Automated security manager
04/24/2012US8166546 Controlling computer program, controlling apparatus, and controlling method for detecting infection by computer virus
04/24/2012US8166542 Information processing apparatus, user information managing method, and computer program product
04/24/2012US8166541 Information processing apparatus and data management system
04/24/2012US8166540 Hardware password alignment system apparatus and methods
04/24/2012US8166539 Authentication of baseboard management controller users in a blade server system
04/24/2012US8166532 Decentralized access control framework
04/24/2012US8166531 Device registration system, device registration server, device registration method, device registration program, storage medium, and terminal device
04/24/2012US8166530 Method and system for supporting portable authenticators on electronic devices
04/24/2012US8166527 Optimized security association database management on home/foreign agent
04/24/2012US8166526 System and method for providing secure access to password-protected resources
04/24/2012US8166524 Method and system for the authentication of a user of a data processing system
04/24/2012US8166523 Authentication processing system, authentication processing method, authentication device, and computer program
04/24/2012US8166487 Application associating based on cryptographic identification
04/24/2012US8166471 Implementing portable content protection to secure secrets
04/24/2012US8166310 Method and apparatus for providing temporary access to a network device
04/24/2012US8166307 Document registration
04/24/2012US8166304 Support for multiple security policies on a unified authentication architecture
04/24/2012US8166303 Method for transmitting data among components of the system electronics of mobile systems, and such components
04/24/2012US8166300 Extending the DRM realm to external devices
04/24/2012US8166291 System for managing program applications storable in a mobile terminal
04/24/2012US8166070 Techniques for sharing persistently stored query results between multiple users
04/24/2012US8165453 Method and apparatus for data reproduction
04/24/2012US8165299 Network authentication
04/24/2012US8165289 Method and apparatus for the generation of code from pattern features
04/24/2012US8164923 Device for the protection of an electronic component
04/24/2012US8164912 Security protection box
04/24/2012US8164771 Image processing apparatus for treating recording medium provided with RFID chip
04/24/2012US8163035 Interference management for an electronic device security and tracking system and method
04/24/2012CA2490226C Systems and methods for secure biometric authentication
04/24/2012CA2415334C System for persistently encrypting critical software data to control operation of an executable software program
04/24/2012CA2374708C Method and system for distributing documents
04/22/2012CA2758286A1 System and method for facilitating outcome-based health care
04/19/2012WO2012051577A1 Disabling communication in a multiprocessor system
04/19/2012WO2012051452A2 Protecting websites and website users by obscuring urls
04/19/2012WO2012051422A2 System and method for multimedia multi-party peering (m2p2)
04/19/2012WO2012051076A2 A method for securing credentials in a remote repository
04/19/2012WO2012051059A1 Java store television
04/19/2012WO2012051006A1 Methods and systems for providing and controlling cryptographically secure communications across unsecured networks between a secure virtual terminal and a remote system
04/19/2012WO2012050946A2 A method of collaborative computing
04/19/2012WO2012050780A1 Method and apparatus for voice signature authentication
04/19/2012WO2012050717A1 Trustworthy device claims as a service
04/19/2012WO2012050585A1 Authenticate a fingerprint image
04/19/2012WO2012050571A1 A system for generating an incrementally completed 3d security mark
04/19/2012WO2012050546A1 System and method for configuration access via connected devices
04/19/2012WO2012050421A1 Secure external storage system and method thereof
04/19/2012WO2012050419A1 Method of performing secure documents with a security token on a trusted compartment
04/19/2012WO2012050379A2 Method for extracting fingerprint of publication, apparatus for extracting fingerprint of publication, system for identifying publication using fingerprint, and method for identifying publication using fingerprint
04/19/2012WO2012050367A2 Method and apparatus for downloading drm module
04/19/2012WO2012049881A1 Protection method, decryption method, player, storage medium, and encryption apparatus of digital content
04/19/2012WO2012049832A1 Information processing system
04/19/2012WO2012049761A1 Quarantine program, quarantine method, and information processing device
04/19/2012WO2012049757A1 Content data playback device, update management method, and update management program
04/19/2012WO2012049592A2 Electronic signature apparatus and method
04/19/2012WO2012049298A1 Obtaining a control word to reveal a client device identity
04/19/2012WO2012049224A1 Efficient procedure for pairing medical devices for wireless communication with limited user interaction
04/19/2012WO2012048896A1 Compression and decompression techniques for drm license information delivery
04/19/2012WO2012048645A1 Trial method, system and device for java applications