Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
09/2011
09/14/2011CN102184363A Automatic software packer shelling method based on comprehensive processing
09/14/2011CN102184362A Combined verifying and authorizing method for fixed license and floating license
09/14/2011CN102184361A Information processing device and management method
09/14/2011CN102184360A Information flow safety monitoring method applied to embedded processor
09/14/2011CN102184359A Method for realizing identity discrimination of operating users through recognizing keyboard/mouse input habits of operating users
09/14/2011CN102184358A USB (Universal Serial Bus) embedded trustworthiness private information processing device and system
09/14/2011CN102184357A Portable trustworthy private information processing system
09/14/2011CN102184356A Method, device and safety browser by utilizing sandbox technology to defend
09/14/2011CN102184355A Method for realizing separation of three powers by using kernel technology
09/14/2011CN102184354A Method for preventing data from being falsified and hijacked in online payment
09/14/2011CN102184353A Method for preventing online payment data from being intercepted
09/14/2011CN102184352A Automatic protecting method for computer system based on Bluetooth device authentication
09/14/2011CN102184351A Content reading system and content reading method
09/14/2011CN102184261A Cloud search service authentication method and cloud search service system with authentication function
09/14/2011CN102184244A High-robustness geographical database watermark method suitable for polygon type
09/14/2011CN102184243A Text-type attribute-based relational database watermark embedding method
09/14/2011CN102184103A Shell characteristic extracting method of software protection shell
09/14/2011CN101814119B User model building method with privacy protection
09/14/2011CN101571902B Method and computer system using network video camera for protecting digital data
09/14/2011CN101568929B Information converting technique
09/14/2011CN101458747B Method and apparatus for providing digital copyright list
09/14/2011CN101441697B Ciphering method for generating instruction parameter in byte numerical value zero tending process
09/14/2011CN101425116B Identification display method for electronic apparatus and the electronic apparatus
09/14/2011CN101340653B Copyright protection method and system for downloading data by portable terminal
09/14/2011CN101247449B Information processing and conversion equipment with information security system
09/14/2011CN101246528B Method, equipment and system for performing field service
09/13/2011US8020215 Anti keylog editor of activex base
09/13/2011US8020212 Information processing apparatus and method, content management system, information recording medium, and computer program
09/13/2011US8020210 System and method for assessing risk to a collection of information resources
09/13/2011US8020209 System and method of monitoring and controlling application files
09/13/2011US8020208 Intrusion management system and method for providing dynamically scaled confidence level of attack detection
09/13/2011US8020204 Method and apparatus for migrating a virtual TPM instance and preserving uniqueness and completeness of the instance
09/13/2011US8020194 Analyzing cross-machine privilege elevation pathways in a networked computing environment
09/13/2011US8020104 Contextual responses based on automated learning techniques
09/13/2011US8020005 Method and apparatus for multi-model hybrid comparison system
09/13/2011US8020001 Trusted code groups
09/13/2011US8019997 Information processing apparatus and method, recording medium, and program
09/13/2011US8019691 Profile and identity authentication service
09/13/2011US8019688 Music distribution system and associated antipiracy protections
09/13/2011US8019687 Distributed digital rights management node module and methods for use therewith
09/13/2011US8019359 Communication system and method, information processing terminal and method, and information processing device and method
09/13/2011US8019127 Image based turing test
09/13/2011US8018617 Erasing a stored information pattern on a storage medium
09/13/2011US8016400 Ink reservoir
09/13/2011CA2593218C System and method to provision a mobile device
09/13/2011CA2560570C Authentication between device and portable storage
09/13/2011CA2458765C Compact hardware identification for binding a software package to a computer system having tolerance for hardware changes
09/13/2011CA2432092C Match control method
09/13/2011CA2424177C Credit report retrieval system including voice-based interface
09/09/2011WO2011109780A2 Code download and firewall for embedded secure application
09/09/2011WO2011109518A1 Migration of credentials and/or domains between trusted hardware subscription modules
09/09/2011WO2011109499A1 Quarantine tool
09/09/2011WO2011109208A1 Method and system for conducting identity matching
09/09/2011WO2011108268A1 Controller embedded in recording medium device, recording medium device, recording medium device manufacturing system, and recording medium device manufacturing method
09/09/2011WO2011107871A2 Portable electronic device interfaceable with a computer
09/09/2011WO2011107451A1 Method to manage revocations in a group of terminals
09/09/2011WO2011107319A2 Method for verifying a memory block of a nonvolatile memory
09/09/2011WO2011084210A3 Providing integrity verification and attestation in a hidden execution environment
09/09/2011WO2011081738A3 Verifiable trust for data through wrapper composition
09/09/2011WO2011078855A9 Method and apparatus to provide secure application execution
09/09/2011CA2789309A1 Information protection using zones
09/08/2011US20110219461 Network based digital rights management system
09/08/2011US20110219460 Network based digital rights management system
09/08/2011US20110219458 Secure avionics equipment and associated method of making secure
09/08/2011US20110219457 System and method for incapacitating a hardware keylogger
09/08/2011US20110219456 Weblog for supply chain management
09/08/2011US20110219455 Random injection-based deactivation of web-scrapers
09/08/2011US20110219453 Security method and apparatus directed at removeable storage devices
09/08/2011US20110219452 Method and Apparatus for Network Intrusion Detection
09/08/2011US20110219451 System And Method For Host-Level Malware Detection
09/08/2011US20110219450 System And Method For Malware Detection
09/08/2011US20110219449 Malware detection method, system and computer program product
09/08/2011US20110219448 Systems and methods for risk rating and pro-actively detecting malicious online ads
09/08/2011US20110219447 Identification of Unauthorized Code Running in an Operating System's Kernel
09/08/2011US20110219445 Methods, Systems and Computer Program Products for Identifying Traffic on the Internet Using Communities of Interest
09/08/2011US20110219444 Dynamically adaptive network firewalls and method, system and computer program product implementing same
09/08/2011US20110219442 Policy-Based Security Certificate Filtering
09/08/2011US20110219440 Application-level denial-of-service attack protection
09/08/2011US20110219438 Methods and apparatus for security over fibre channel
09/08/2011US20110219434 Providing security services within a cloud computing environment
09/08/2011US20110219432 System and Method for Controlling Access to an Electronic Message Recipient
09/08/2011US20110219431 System and method of quality of service enablement for over the top applications in a telecommunications system
09/08/2011US20110219430 Secure networked system for controlling mobile access to encrypted data services
09/08/2011US20110219428 Electronic apparatus and terminal
09/08/2011US20110219427 Smart Device User Authentication
09/08/2011US20110219426 Methods, systems, and computer readable media for enhanced service detection and policy rule determination
09/08/2011US20110219425 Access control using roles and multi-dimensional constraints
09/08/2011US20110219424 Information protection using zones
09/08/2011US20110219423 Method and apparatus for triggering user communications based on privacy information
09/08/2011US20110219422 System and method for displaying a density of objects in a social network application
09/08/2011US20110219242 Method and system for managing secure code loading in pc-slave devices
09/08/2011US20110219239 PC Secure Video Path
09/08/2011US20110219237 Document registration
09/08/2011US20110219229 Apparatus and methods for rights-managed content and data delivery
09/08/2011US20110219086 Electronic message and data tracking system
09/08/2011US20110219035 Database security via data flow processing
09/08/2011US20110218999 System, method and program for information processing
09/08/2011US20110218656 Social media playback
09/08/2011US20110217874 Connector including electronic device
09/08/2011US20110216744 Interworking of networks with single radio handover