Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
10/06/2011 | US20110247069 System, method and computer program product for determining a risk score for an entity |
10/06/2011 | US20110247067 Display apparatus, authentication method, and program |
10/06/2011 | US20110247066 System, method and computer program product for authenticating and authorizing an external entity |
10/06/2011 | US20110247064 Method and apparatus for protecting information in user terminal |
10/06/2011 | US20110247063 Mutual Mobile Authentication Using a Key Management Center |
10/06/2011 | US20110247062 Electronic transaction security system |
10/06/2011 | US20110247061 Computation to gain access to service |
10/06/2011 | US20110247059 Methods and Apparatus for Role-Based Shared Access Control to a Protected System Using Reusable User Identifiers |
10/06/2011 | US20110247058 On-demand personal identification method |
10/06/2011 | US20110247057 Method, secure device, system and computer program product for digitally signing a document |
10/06/2011 | US20110247054 Methods and apparatuses for selecting privileges for use during a data collaboration session |
10/06/2011 | US20110247053 Server authentication |
10/06/2011 | US20110247052 METHOD AND APPARATUS FOR MANAGING REMOTE ACCESS AUTHORITY IN UPnP REMOTE ACCESS SERVICE |
10/06/2011 | US20110247051 System, method and computer program product for performing one or more actions based on a determined access permissions for a plurality of users |
10/06/2011 | US20110247050 Method of pairing terminals with each other and terminal for the same |
10/06/2011 | US20110247049 Electronic document security system and method |
10/06/2011 | US20110247048 Testing policies in a network |
10/06/2011 | US20110247047 Method for securing data and/or applications in a cloud computing architecture |
10/06/2011 | US20110247046 Access control in data processing systems |
10/06/2011 | US20110247045 Disposable browsers and authentication techniques for a secure online user environment |
10/06/2011 | US20110246789 Integrated circuit protected against horizontal side channel analysis |
10/06/2011 | US20110246788 Data security system for a database |
10/06/2011 | US20110246786 Mechanism for Automatically Encrypting and Decrypting Virtual Disk Content Using a Single User Sign-On |
10/06/2011 | US20110246785 Hardware supported virtualized cryptographic service |
10/06/2011 | US20110246783 Information processing device, management device, illegal module detection system, illegal module detection method, recording medium on which illegal module detection program is recorded, management method, recording medium and integrated circuit on which management method is recorded |
10/06/2011 | US20110246782 Data Protection Systems and Methods |
10/06/2011 | US20110246781 Client terminal, server, server-client system, cooperation processing method, program and recording medium |
10/06/2011 | US20110246773 System and method for unattended computer system access |
10/06/2011 | US20110246757 Unattended secure remote pc client wake, boot and remote login using smart phone |
10/06/2011 | US20110246699 Memory access control |
10/06/2011 | US20110246634 Internet Improvement Platform with Learning Module |
10/06/2011 | US20110246614 Mobile Content Management |
10/06/2011 | US20110246498 Context-based security policy evaluation using weighted search trees |
10/06/2011 | US20110246439 Augmented query search |
10/06/2011 | US20110246296 Background process for providing targeted content within a third-party application |
10/06/2011 | US20110246235 Multi-factor authentication for remote access of patient data |
10/06/2011 | US20110246197 Method, apparatus, and program for certifying a voice profile when transmitting text messages for synthesized speech |
10/06/2011 | DE102010016324A1 System, Verfahren und Anordnungen zum Absichern von Ressourcen System, method and arrangements for securing resources |
10/06/2011 | DE102010003581A1 Elektronisches Gerät, Datenverarbeitungssystem und Verfahren zum Lesen von Daten aus einem elektronischen Gerät An electronic apparatus, data processing system and method for reading data from an electronic device |
10/06/2011 | CA2795206A1 Systems and methods for securing data in motion |
10/06/2011 | CA2795203A1 Systems and methods for securing data in motion |
10/06/2011 | CA2792782A1 A system and method for encapsulating and enabling protection through diverse variations in software libraries |
10/06/2011 | CA2792304A1 Method for linking and loading to protect applications |
10/05/2011 | EP2373118A1 Method and device for converting digital rights management (drm) file |
10/05/2011 | EP2372944A2 Geographic-based watermarking keys |
10/05/2011 | EP2372599A2 Electronic device, data processing system and method for reading data from an electronic device |
10/05/2011 | EP2372597A1 Methods and systems for secure remote wake, boot, and login to a computer from a mobile device |
10/05/2011 | EP2372596A1 Content use control device, recording device, reproduction device, recording medium, and content use control method |
10/05/2011 | EP2372595A1 Device allowing to secure a JTAG Bus |
10/05/2011 | EP2372594A1 Security sensitive data flow analysis |
10/05/2011 | EP2372593A2 Method for protecting a software license, system for same, server, terminal, and computer-readable recording medium |
10/05/2011 | EP2372592A1 integrated circuit and system for installing computer code thereon |
10/05/2011 | EP2372575A1 Information retrieval with security rules |
10/05/2011 | EP2371084A1 System, device and method for secure provision of key credential information |
10/05/2011 | EP2370928A1 Access control |
10/05/2011 | EP2370927A1 Remote safe storing of digital documents with guarantee of privacy |
10/05/2011 | EP2370926A1 Extensible activation exploit scanner |
10/05/2011 | EP2370920A1 Method, apparatus and computer program for enabling access to content |
10/05/2011 | EP2271140A9 Robust and flexible Digital Rights Management (DRM) involving a tamper-resistant identity module |
10/05/2011 | EP2232397B1 Secure data utilization |
10/05/2011 | EP1914961B1 Mobile information terminal apparatus |
10/05/2011 | EP1716468B1 System and method for preventing identity theft using a secure computing device. |
10/05/2011 | EP1323259B1 Secured identity chain |
10/05/2011 | CN202003364U Electric locking device applied to multi-computer switching equipment and equipment |
10/05/2011 | CN202003363U Simple encrypted chip |
10/05/2011 | CN202003362U E-token dynamic password card |
10/05/2011 | CN202003361U Credible computer system |
10/05/2011 | CN202003301U Computer keyboard with lockable mask |
10/05/2011 | CN202000776U Usb interface lock |
10/05/2011 | CN1992586B Electronic document management system and electronic document management method |
10/05/2011 | CN1983245B System and method for configuring information handling system integrated circuits |
10/05/2011 | CN1922817B 信息处理装置 The information processing apparatus |
10/05/2011 | CN1849773B Displaying a security element with a browser window |
10/05/2011 | CN1479921B 计算机程序复制管理系统 Copy Management System computer program |
10/05/2011 | CN102209967A Method and apparatus for allocating of a portable data medium, in particular a chip card, to a terminal |
10/05/2011 | CN102209136A Mobile communications terminal authentication and settlement system and method |
10/05/2011 | CN102208097A Network image copyright real-time distinguishing method |
10/05/2011 | CN102208004A Method for controlling software behavior based on least privilege principle |
10/05/2011 | CN102208003A Software program protection system and method |
10/05/2011 | CN102208002A Novel computer virus scanning and killing device |
10/05/2011 | CN102208001A Hardware supported virtualized cryptographic service |
10/05/2011 | CN102208000A Method and system for providing security mechanisms for virtual machine images |
10/05/2011 | CN102207999A Data protection method based on trusted computing cryptography support platform |
10/05/2011 | CN101877040B High-reliability computing platform |
10/05/2011 | CN101697182B Encryption keyboard |
10/05/2011 | CN101438290B Method and apparatus for secure context switching in a system including a processor and cached virtual memory |
10/05/2011 | CN101364984B Method for guarantee safety of electronic file |
10/05/2011 | CN101339597B Method, system and equipment for upgrading read-write machine firmware |
10/05/2011 | CN101313314B A method and system for transaction validation |
10/05/2011 | CN101257413B Method, apparatus and system for enabling a secure location-aware platform |
10/05/2011 | CN101253505B Method, apparatus, and system for securing data on a removable memory device |
10/05/2011 | CN101217371B A method to realize user account verification |
10/05/2011 | CN101097592B Method and apparatus for operating authority |
10/05/2011 | CN101090389B Method and system for implementing permission protocol between equipment |
10/05/2011 | CN101027676B A personal token and a method for controlled authentication |
10/04/2011 | USRE42814 Password protected modular computer method and device |
10/04/2011 | USRE42810 Recording and reproducing apparatus and terminal apparatus |
10/04/2011 | US8032943 Accessing protected content in a rights-management architecture |
10/04/2011 | US8032940 Method and system for generating and employing a secure integrated development environment |
10/04/2011 | US8032939 Method and system for providing wireless vulnerability management for local area computer networks |