Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
05/26/2011 | US20110122694 Limitation of the access to a resource of an electronic circuit |
05/26/2011 | US20110122261 Camera Unit Incorporating A Printer Configured To Print Distorted Images |
05/26/2011 | US20110121072 Authorization system with a card and a reader |
05/26/2011 | DE102009054128A1 Verfahren und Vorrichtung zum Zugriff auf Dateien eines sicheren Fileservers Method and apparatus for accessing files in a secure file server |
05/26/2011 | DE102009054114A1 Verfahren und Vorrichtung zum Zugreifen auf Steuerungsdaten gemäß einer bereitgestellten Rechteinformation Method and apparatus for accessing data in accordance with a control provided rights information |
05/26/2011 | DE102009053990A1 Method for configuring common storage area of linear bit-oriented RAM of control unit of coin operated slot machine, involves adding program data with data in free storage area and combined to data file, which is written in memory |
05/26/2011 | DE102009053932A1 Method for protecting e.g. compact disk against misusage during updation of data of navigation device of vehicle, involves locking functions of navigation device after usage period when licensed data carrier is not connected with device |
05/26/2011 | DE102009052457A1 Verfahren und System zum Auslösen eines Namenskonfliktes A method and system for triggering a name conflict |
05/26/2011 | CA2778710A1 Method and apparatus for maintaining high data integrity and for providing a secure audit for fraud prevention and detection |
05/25/2011 | EP2326074A1 Content-aware digital media storage device and methods of using the same |
05/25/2011 | EP2326043A1 Preventing cloning of receivers of encrypted messages |
05/25/2011 | EP2325775A1 Storage device mounting frame, storage extending device, and storage device control method |
05/25/2011 | EP2325774A1 Method and device for imposing usage constraints of digital content |
05/25/2011 | EP2325773A1 System and method for obtaining an authorization key to use a product |
05/25/2011 | EP2325772A2 Method and apparatus for protecting encryption equipment from a potential security incident. |
05/25/2011 | EP2324630A2 Method and apparatus for managing digital rights management module |
05/25/2011 | EP2324443A1 Cross-transport authentication |
05/25/2011 | EP2324442A1 Method for detecting abnormalities in a cryptographic circuit protected by differential logic, and circuit for implementing said method |
05/25/2011 | EP2324439A1 A data communication method |
05/25/2011 | EP1782604B1 Methods for authorizing transmission of content from first to second individual and authentication of an individual based on an individual's social network |
05/25/2011 | CN201845361U Electronic signing device used by using mobile phone for transaction |
05/25/2011 | CN201845340U Safety computer provided with user safety subsystem |
05/25/2011 | CN201845339U USB security storage encrypted circuit |
05/25/2011 | CN201845338U File protection device |
05/25/2011 | CN201845332U Safety device of intelligent flash disk |
05/25/2011 | CN201845299U Sensing device and computer |
05/25/2011 | CN1988534B Credible computing system and method for access TPM service under kernel state |
05/25/2011 | CN1940952B System and device for managing control data |
05/25/2011 | CN1928917B Digital watermark embedding apparatus and method, and digital watermark detection apparatus and method |
05/25/2011 | CN1838549B Information processing system, information processing apparatus, methods, program and recording medium |
05/25/2011 | CN1661970B Network security device and method for protecting a computing device in a networked environment |
05/25/2011 | CN1645288B Ensuring that a software update may be installed or run only on a specific device or class of devices |
05/25/2011 | CN1574728B Distributed authentication in a protocol-based sphere of trust in which a given external connection outside the sphere of trust may carry communications from multiple sources |
05/25/2011 | CN102077545A Personal security manager for ubiquitous patient monitoring |
05/25/2011 | CN102077506A Security architecture for peer-to-peer storage system |
05/25/2011 | CN102077213A Techniques for ensuring authentication and integrity of communications |
05/25/2011 | CN102077212A Information processing system, server device, information device for personal use, and access managing method |
05/25/2011 | CN102077211A Method of managing software license contracts, system and information processing apparatus therefor, and target software for license contracts |
05/25/2011 | CN102077210A Authorization for transient storage devices with multiple authentication silos |
05/25/2011 | CN102077209A Protected mode scheduling of operations |
05/25/2011 | CN102077208A Licensing protected content to application sets |
05/25/2011 | CN102077207A Workflow based authorization for content access |
05/25/2011 | CN102077206A Segmented media content rights management |
05/25/2011 | CN102077205A Device, system and method for verifying the authenticity integrity and/or physical condition of an item |
05/25/2011 | CN102077204A Secure memory management system and method |
05/25/2011 | CN102077198A Structured coauthoring |
05/25/2011 | CN102075542A Cloud computing data security supporting platform |
05/25/2011 | CN102075511A Data matching equipment and method as well as network intrusion detection equipment and method |
05/25/2011 | CN102075356A Network risk assessment method and system |
05/25/2011 | CN102073917A Document approval process method with document authorization management capability |
05/25/2011 | CN102073831A System and method for encrypting and decrypting electronic documents |
05/25/2011 | CN102073830A Method for dynamically extending additional information of transparent encrypted file |
05/25/2011 | CN102073829A Document encrypting method and document decrypting method on basis of voice print |
05/25/2011 | CN102073828A Document authentication using hierarchical barcode stamps to detect alterations of barcode |
05/25/2011 | CN102073827A Method for ensuring security of set-top box application program |
05/25/2011 | CN102073826A System and method for digital copyright management using lightweight digital watermark adding component |
05/25/2011 | CN102073825A Path drive-based executable program security detection method and system |
05/25/2011 | CN102073824A Method for generating and updating unique identifier of encrypted document |
05/25/2011 | CN102073823A Defect analysis based software creditability evaluating method |
05/25/2011 | CN102073822A Method and system for preventing user information from leaking |
05/25/2011 | CN102073821A XEN platform-based virtual safety communication tunnel establishing method |
05/25/2011 | CN102073820A User sharing-based cloud scanning method |
05/25/2011 | CN102073819A Digital rights management methods |
05/25/2011 | CN102073818A Vulnerability detection equipment and method |
05/25/2011 | CN102073817A Dynamic access control improvement method on basis of RBAC (Role-Based policies Access Control) model |
05/25/2011 | CN102073816A Behavior-based software trusted measurement system and method |
05/25/2011 | CN102073815A Vehicle-mounted antivirus system and antivirus method |
05/25/2011 | CN102073814A High-availability service terminal license control mode based on dynamic allocation and behavior analysis |
05/25/2011 | CN102073813A Method and device for controlling application on mobile device to run |
05/25/2011 | CN102073812A System and method for burning sequence code |
05/25/2011 | CN102073811A Method for accelerating quantitative evaluation of power attack resistant protection capability of safety chip |
05/25/2011 | CN102073810A Method for integrating account management function in input method software |
05/25/2011 | CN102073809A Method for generating processing specifications for a stream of data items |
05/25/2011 | CN102073808A Method for encrypting and storing information through SATA interface and encryption card |
05/25/2011 | CN102073807A Information processing apparatus, information processing method, and program |
05/25/2011 | CN102073806A System and method for controlling applications to mitigate the effects of malicious software |
05/25/2011 | CN102073805A Computer system and content management method |
05/25/2011 | CN102073804A Data transmission method and system |
05/25/2011 | CN102073803A Device, method and system for enhancing safety of USBKEY |
05/25/2011 | CN102073802A Security system and method |
05/25/2011 | CN102073801A Method for confirming data in CPU (Central Processing Unit) card |
05/25/2011 | CN102073800A Portable electronic device with storage protection mechanism and data protection method thereof |
05/25/2011 | CN102073597A Full disk encryption method of operating system disk based on user identity authentication |
05/25/2011 | CN102073579A Method for merging and optimizing audit events of Linux file system |
05/25/2011 | CN102073237A Unit using operating system and image forming apparatus using the same |
05/25/2011 | CN102073236A Unit using operating system and image forming apparatus using the same |
05/25/2011 | CN101478407B Method and apparatus for on-line safe login |
05/25/2011 | CN101350054B Method and apparatus for automatically protecting computer noxious program |
05/25/2011 | CN101150440B Method and device for administration of licenses |
05/25/2011 | CN101094073B Two-factor content protection |
05/24/2011 | USRE42398 Memory system |
05/24/2011 | US7950063 Diagnosis system with identification display device |
05/24/2011 | US7950054 Client-side security management for an operations, administration, and maintenance system for wireless clients |
05/24/2011 | US7950051 Password management for a communication network |
05/24/2011 | US7950049 Hybrid meta-directory |
05/24/2011 | US7950048 Methods and arrangements for limiting access to computer controlled functions and devices |
05/24/2011 | US7950000 Architecture that restricts permissions granted to a build process |
05/24/2011 | US7949940 Program and method for restricting data entry |
05/24/2011 | US7949883 Cryptographic CPU architecture with random instruction masking to thwart differential power analysis |
05/24/2011 | US7949882 Storage session management system in storage area network |