| Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
|---|
| 09/14/2011 | CN102184363A Automatic software packer shelling method based on comprehensive processing |
| 09/14/2011 | CN102184362A Combined verifying and authorizing method for fixed license and floating license |
| 09/14/2011 | CN102184361A Information processing device and management method |
| 09/14/2011 | CN102184360A Information flow safety monitoring method applied to embedded processor |
| 09/14/2011 | CN102184359A Method for realizing identity discrimination of operating users through recognizing keyboard/mouse input habits of operating users |
| 09/14/2011 | CN102184358A USB (Universal Serial Bus) embedded trustworthiness private information processing device and system |
| 09/14/2011 | CN102184357A Portable trustworthy private information processing system |
| 09/14/2011 | CN102184356A Method, device and safety browser by utilizing sandbox technology to defend |
| 09/14/2011 | CN102184355A Method for realizing separation of three powers by using kernel technology |
| 09/14/2011 | CN102184354A Method for preventing data from being falsified and hijacked in online payment |
| 09/14/2011 | CN102184353A Method for preventing online payment data from being intercepted |
| 09/14/2011 | CN102184352A Automatic protecting method for computer system based on Bluetooth device authentication |
| 09/14/2011 | CN102184351A Content reading system and content reading method |
| 09/14/2011 | CN102184261A Cloud search service authentication method and cloud search service system with authentication function |
| 09/14/2011 | CN102184244A High-robustness geographical database watermark method suitable for polygon type |
| 09/14/2011 | CN102184243A Text-type attribute-based relational database watermark embedding method |
| 09/14/2011 | CN102184103A Shell characteristic extracting method of software protection shell |
| 09/14/2011 | CN101814119B User model building method with privacy protection |
| 09/14/2011 | CN101571902B Method and computer system using network video camera for protecting digital data |
| 09/14/2011 | CN101568929B Information converting technique |
| 09/14/2011 | CN101458747B Method and apparatus for providing digital copyright list |
| 09/14/2011 | CN101441697B Ciphering method for generating instruction parameter in byte numerical value zero tending process |
| 09/14/2011 | CN101425116B Identification display method for electronic apparatus and the electronic apparatus |
| 09/14/2011 | CN101340653B Copyright protection method and system for downloading data by portable terminal |
| 09/14/2011 | CN101247449B Information processing and conversion equipment with information security system |
| 09/14/2011 | CN101246528B Method, equipment and system for performing field service |
| 09/13/2011 | US8020215 Anti keylog editor of activex base |
| 09/13/2011 | US8020212 Information processing apparatus and method, content management system, information recording medium, and computer program |
| 09/13/2011 | US8020210 System and method for assessing risk to a collection of information resources |
| 09/13/2011 | US8020209 System and method of monitoring and controlling application files |
| 09/13/2011 | US8020208 Intrusion management system and method for providing dynamically scaled confidence level of attack detection |
| 09/13/2011 | US8020204 Method and apparatus for migrating a virtual TPM instance and preserving uniqueness and completeness of the instance |
| 09/13/2011 | US8020194 Analyzing cross-machine privilege elevation pathways in a networked computing environment |
| 09/13/2011 | US8020104 Contextual responses based on automated learning techniques |
| 09/13/2011 | US8020005 Method and apparatus for multi-model hybrid comparison system |
| 09/13/2011 | US8020001 Trusted code groups |
| 09/13/2011 | US8019997 Information processing apparatus and method, recording medium, and program |
| 09/13/2011 | US8019691 Profile and identity authentication service |
| 09/13/2011 | US8019688 Music distribution system and associated antipiracy protections |
| 09/13/2011 | US8019687 Distributed digital rights management node module and methods for use therewith |
| 09/13/2011 | US8019359 Communication system and method, information processing terminal and method, and information processing device and method |
| 09/13/2011 | US8019127 Image based turing test |
| 09/13/2011 | US8018617 Erasing a stored information pattern on a storage medium |
| 09/13/2011 | US8016400 Ink reservoir |
| 09/13/2011 | CA2593218C System and method to provision a mobile device |
| 09/13/2011 | CA2560570C Authentication between device and portable storage |
| 09/13/2011 | CA2458765C Compact hardware identification for binding a software package to a computer system having tolerance for hardware changes |
| 09/13/2011 | CA2432092C Match control method |
| 09/13/2011 | CA2424177C Credit report retrieval system including voice-based interface |
| 09/09/2011 | WO2011109780A2 Code download and firewall for embedded secure application |
| 09/09/2011 | WO2011109518A1 Migration of credentials and/or domains between trusted hardware subscription modules |
| 09/09/2011 | WO2011109499A1 Quarantine tool |
| 09/09/2011 | WO2011109208A1 Method and system for conducting identity matching |
| 09/09/2011 | WO2011108268A1 Controller embedded in recording medium device, recording medium device, recording medium device manufacturing system, and recording medium device manufacturing method |
| 09/09/2011 | WO2011107871A2 Portable electronic device interfaceable with a computer |
| 09/09/2011 | WO2011107451A1 Method to manage revocations in a group of terminals |
| 09/09/2011 | WO2011107319A2 Method for verifying a memory block of a nonvolatile memory |
| 09/09/2011 | WO2011084210A3 Providing integrity verification and attestation in a hidden execution environment |
| 09/09/2011 | WO2011081738A3 Verifiable trust for data through wrapper composition |
| 09/09/2011 | WO2011078855A9 Method and apparatus to provide secure application execution |
| 09/09/2011 | CA2789309A1 Information protection using zones |
| 09/08/2011 | US20110219461 Network based digital rights management system |
| 09/08/2011 | US20110219460 Network based digital rights management system |
| 09/08/2011 | US20110219458 Secure avionics equipment and associated method of making secure |
| 09/08/2011 | US20110219457 System and method for incapacitating a hardware keylogger |
| 09/08/2011 | US20110219456 Weblog for supply chain management |
| 09/08/2011 | US20110219455 Random injection-based deactivation of web-scrapers |
| 09/08/2011 | US20110219453 Security method and apparatus directed at removeable storage devices |
| 09/08/2011 | US20110219452 Method and Apparatus for Network Intrusion Detection |
| 09/08/2011 | US20110219451 System And Method For Host-Level Malware Detection |
| 09/08/2011 | US20110219450 System And Method For Malware Detection |
| 09/08/2011 | US20110219449 Malware detection method, system and computer program product |
| 09/08/2011 | US20110219448 Systems and methods for risk rating and pro-actively detecting malicious online ads |
| 09/08/2011 | US20110219447 Identification of Unauthorized Code Running in an Operating System's Kernel |
| 09/08/2011 | US20110219445 Methods, Systems and Computer Program Products for Identifying Traffic on the Internet Using Communities of Interest |
| 09/08/2011 | US20110219444 Dynamically adaptive network firewalls and method, system and computer program product implementing same |
| 09/08/2011 | US20110219442 Policy-Based Security Certificate Filtering |
| 09/08/2011 | US20110219440 Application-level denial-of-service attack protection |
| 09/08/2011 | US20110219438 Methods and apparatus for security over fibre channel |
| 09/08/2011 | US20110219434 Providing security services within a cloud computing environment |
| 09/08/2011 | US20110219432 System and Method for Controlling Access to an Electronic Message Recipient |
| 09/08/2011 | US20110219431 System and method of quality of service enablement for over the top applications in a telecommunications system |
| 09/08/2011 | US20110219430 Secure networked system for controlling mobile access to encrypted data services |
| 09/08/2011 | US20110219428 Electronic apparatus and terminal |
| 09/08/2011 | US20110219427 Smart Device User Authentication |
| 09/08/2011 | US20110219426 Methods, systems, and computer readable media for enhanced service detection and policy rule determination |
| 09/08/2011 | US20110219425 Access control using roles and multi-dimensional constraints |
| 09/08/2011 | US20110219424 Information protection using zones |
| 09/08/2011 | US20110219423 Method and apparatus for triggering user communications based on privacy information |
| 09/08/2011 | US20110219422 System and method for displaying a density of objects in a social network application |
| 09/08/2011 | US20110219242 Method and system for managing secure code loading in pc-slave devices |
| 09/08/2011 | US20110219239 PC Secure Video Path |
| 09/08/2011 | US20110219237 Document registration |
| 09/08/2011 | US20110219229 Apparatus and methods for rights-managed content and data delivery |
| 09/08/2011 | US20110219086 Electronic message and data tracking system |
| 09/08/2011 | US20110219035 Database security via data flow processing |
| 09/08/2011 | US20110218999 System, method and program for information processing |
| 09/08/2011 | US20110218656 Social media playback |
| 09/08/2011 | US20110217874 Connector including electronic device |
| 09/08/2011 | US20110216744 Interworking of networks with single radio handover |