Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
10/2011
10/26/2011CN202018657U Encrypting system for mobile storage equipment
10/26/2011CN1860724B Method for identification
10/26/2011CN1725759B Method of containment of worms and system
10/26/2011CN102227734A Client computer for protecting confidential file, server computer therefor, method therefor, and computer program
10/26/2011CN102227733A Method and apparatus for providing access to files based on user identity
10/26/2011CN102227732A Method, apparatus, and computer program product for managing software versions
10/26/2011CN102226906A Information hiding system specified to htm/html
10/26/2011CN101833629B Software area authorization encryption method and implementing device therefor
10/26/2011CN101458754B Method and apparatus for monitoring application program action
10/26/2011CN101341492B Secure identity management
10/26/2011CN101334824B Portable secured computing environment for performing online confidential transactions in untrusted computers
10/26/2011CN101238473B A secure terminal and a method of protecting a secret key
10/26/2011CN101009888B Secure booting method for a mobile terminal, computer readable recording medium and mobile terminal
10/26/2011CA2738063A1 Method and system for third party client authentication
10/25/2011US8046840 Distributing access to a data item
10/25/2011US8046838 Using a modulation transfer function of a device to create digital content for the device
10/25/2011US8046832 Spam detector with challenges
10/25/2011US8046822 Electronic apparatus, function selection method of electronic apparatus and management system of electronic apparatus
10/25/2011US8046819 Methods and systems for determining security requirements for an information resource
10/25/2011US8046624 Propagation of viruses through an information technology network
10/25/2011US8046592 Method and apparatus for securing the privacy of sensitive information in a data-handling system
10/25/2011US8046591 Method of and apparatus for reproducing information, and security module
10/25/2011US8046590 System and method for protection of creative works
10/25/2011US8046588 Audit trail in a programmable safety instrumented system via biometric signature(s)
10/25/2011US8046587 Method off-line authentication on a limited-resource device
10/25/2011US8046586 Method and system for determining the compliance of encrypted and non-encrypted display outputs
10/25/2011US8046584 Message authentication device
10/25/2011US8046583 Wireless terminal
10/25/2011US8046540 Shared closures on demand
10/25/2011US8046302 Digital rights management method and system for content copyright protection
10/25/2011US8046104 Industrial robot system
10/25/2011US8045712 Stream ciphering of the content of a memory external to a processor
10/25/2011US8045710 Broadcasting method and broadcast receiver
10/25/2011US8045191 Information processing device with attached security settings and security setting-dependent operation modes
10/25/2011US8044947 Method to transmit a coded information and device therefore
10/25/2011US8043161 Game system
10/25/2011CA2579948C Online commercial transaction system and method of operation thereof
10/25/2011CA2576630C Secure device sharing
10/25/2011CA2539660C Securely using a display to exchange information
10/25/2011CA2498605C Computing device with environment aware features
10/25/2011CA2482078C Providing secure input to a system with a high-assurance execution environment
10/25/2011CA2419972C Data protection system that protects data by encrypting the data
10/25/2011CA2417770C Trusted authentication digital signature (tads) system
10/25/2011CA2371575C Method and system for providing a copy of a printed page
10/23/2011CA2737954A1 Restricting user access on shared computer
10/21/2011CA2737314A1 Method of providing security on a portable electronic device having a touch-sensitive display
10/20/2011WO2011130275A1 Controlling access to images stored in electronic documents
10/20/2011WO2011130211A1 Staged control release in boot process
10/20/2011WO2011129977A2 Streaming insertion of tokens into content to protect against csrf
10/20/2011WO2011129815A2 Security systems and methods
10/20/2011WO2011129807A1 Storage device in a locked state
10/20/2011WO2011129577A2 Method for generating physical identifier in storage device and machine-readable storage medium
10/20/2011WO2011129380A1 Attribute information intermediary system, intermediary device, attribute information intermediary method and attribute information intermediary program
10/20/2011WO2011128993A1 Security method for engineering tools and industrial products, and security system
10/20/2011WO2011128955A1 Electronic content processing system, electronic content processing method, package of electronic content, and consent agreement device
10/20/2011WO2011128778A2 Security techniques card payment terminal
10/20/2011WO2011128715A1 Method and apparatus for secure element management
10/20/2011WO2011128210A1 Method and device for confirming an operationally safe state of a critical safety system
10/20/2011WO2011078535A3 Method and apparatus for separating personal information into sequential information and content information and then encrypting and compositing the information, a server and a recording medium
10/20/2011WO2011071850A3 System and method for website performance optimization and internet traffic processing
10/20/2011WO2011028261A3 Portable medical record storage device with wireless communication capability
10/20/2011US20110258709 Method, system and simulation analysis model for data processing
10/20/2011US20110258708 Method, apparatus and computer program product for caching of content from server
10/20/2011US20110258707 E-mail with secure message parts
10/20/2011US20110258706 Licensing rights for media content that follows a subscriber
10/20/2011US20110258705 Methods for watermarking media data
10/20/2011US20110258704 Streaming insertion of tokens into content to protect against csrf
10/20/2011US20110258702 System and method for near-real time network attack detection, and system and method for unified detection via detection routing
10/20/2011US20110258701 Protecting A Virtualization System Against Computer Attacks
10/20/2011US20110258700 Verifying authenticity of instant messaging messages
10/20/2011US20110258699 Method and apparatus for the prevention of a service degradation attack
10/20/2011US20110258697 Image processing apparatus and user authentication method for image processing apparatus
10/20/2011US20110258695 Public network access server having a user-configurable firewall
10/20/2011US20110258694 High performance packet processing using a general purpose processor
10/20/2011US20110258693 Operations and maintenance architecture for multiprotocol distributed system
10/20/2011US20110258691 Method for improving security of computer networks
10/20/2011US20110258690 Secure handling of identification tokens
10/20/2011US20110258688 Resource monitoring using a jmx message bridge
10/20/2011US20110258687 System and Method for Providing a Secure Connection between Networked Computers
10/20/2011US20110258686 Alias Management and Value Transfer Claim Processing
10/20/2011US20110258685 Online secure device provisioning framework
10/20/2011US20110258684 Temporary user account for a virtual world website
10/20/2011US20110258683 Apparatus and method for access validation
10/20/2011US20110258682 Method, apparatus, and system for processing session context
10/20/2011US20110258680 Remote subscriber identification (rsid) system and method
10/20/2011US20110258529 Systems and methods for excluding serving an advertisement campaign to undesired web pages
10/20/2011US20110258516 Method, a device and a computer program support for verification of checksums for self-modified computer code
10/20/2011US20110258462 Method, system and integrated circuit for enabling access to a memory element
10/20/2011US20110258459 Method for protecting the decrypting of the configuration files for programmable logic circuits and circuit implementing the method
10/20/2011US20110258458 Method and apparatus for managing keys used for encrypting data
10/20/2011US20110258457 Method and System for Cryptographic Processing Core
10/20/2011US20110258454 Cross-domain identity management for a whitelist-based online secure device provisioning framework
10/20/2011US20110258446 Systems and methods for server aided processing of a signed receipt
10/20/2011US20110258442 System and method for secured peer-to-peer broadcast of instantaneous testimony in text format
10/20/2011US20110258423 Computer processor and method with increased security policies
10/20/2011US20110258410 Selective Management Controller Authenticated Access Control to Host Mapped Resources
10/20/2011US20110258397 Method of protection of data during the execution of a software code in an electronic device
10/20/2011US20110258392 Method and system for providing digital rights management files using caching
10/20/2011US20110258251 Portable Power Distribution
10/20/2011US20110258120 Method and apparatus for secure access, payment and identification