Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
05/2011
05/19/2011CA2776340A1 Device and method for verifying connectivity
05/19/2011CA2774728A1 System and method to protect java bytecode code against static and dynamic attacks within hostile execution environments
05/18/2011EP2323366A1 Content-aware digital media storage device and methods of using the same
05/18/2011EP2323306A1 Secured data transmission method and encryption and decryption system enabling such a transmission
05/18/2011EP2323288A2 Game machine system, broadcasting system, data distribution system and method, program executing apparatus and method
05/18/2011EP2323067A1 Secured method for processing content stored within a component and corresponding component
05/18/2011EP2323066A2 Biometric authentication method and computer system
05/18/2011EP2323065A1 Method and device of sharing license between secure removable media
05/18/2011EP2323064A1 Computing system using single operating system to provide normal security services and high security services, and methods thereof
05/18/2011EP2323063A1 Method for simplifying user input of a numerical sequence of large length, corresping device and computer program product
05/18/2011EP2323062A1 Computer and hardware identity tracking using characteristic parameter-derived data
05/18/2011EP2323061A2 Software signature tracking
05/18/2011EP2323060A1 System and method for device authentication with built-in tolerance
05/18/2011EP2321944A2 Isolated multi-network computer system and apparatus
05/18/2011EP2321928A2 Authentication in a network using client health enforcement framework
05/18/2011EP2321926A1 Apparatus, method, and system for digital content and access protection
05/18/2011EP2321809A1 Directional sensing mechanism and communications authentication
05/18/2011EP2321807A1 Wireless device monitoring systems and monitoring devices, and associated methods
05/18/2011EP2321762A1 Authorization for transient storage devices with multiple authentication silos
05/18/2011EP2321761A2 Invocation of system services through auxiliary interface
05/18/2011EP2321760A2 Representing security identities using claims
05/18/2011EP2321759A2 Memory device upgrade
05/18/2011EP2321758A2 Display of information through auxiliary user interface
05/18/2011EP2321757A2 Api for auxiliary interface
05/18/2011EP1163562B1 Method for making secure a sequence of operations performed by an electronic circuit in the execution of an algorithm
05/18/2011EP1110185B1 Access-protected data carrier
05/18/2011CN201838004U Hardware encryption card for computer interface
05/18/2011CN201838003U Mobile storage secure data-exchange intermediate computer
05/18/2011CN201838002U Remote logging human figure authentication device based on human figure biological identification technology
05/18/2011CN1956449B Encipher transmission method and equipment system for preventing copying data resource
05/18/2011CN1940953B Information processing apparatus and method of controlling the same
05/18/2011CN1881219B Method for converting non copy protected data into copy protected data
05/18/2011CN1653460B Method for loading an application in a device, device and smart card therefor
05/18/2011CN102067561A Method and device for securing data transfers
05/18/2011CN102067558A Method and apparatus for parental control of wireless broadcast content
05/18/2011CN102067555A Improved biometric authentication and identification
05/18/2011CN102067509A Distributed data memory unit
05/18/2011CN102067150A Method and system for graphical passcode security
05/18/2011CN102067149A Method and apparatus for identifying a person using the typing behaviour of the latter and taking into account the local distribution of the keys of a keyboard
05/18/2011CN102067148A Methods and systems for determining file classifications
05/18/2011CN102067147A Verification key handling
05/18/2011CN102067146A Secure application streaming
05/18/2011CN102067145A Obtaining digital identities or tokens through independent endpoint resolution
05/18/2011CN102067144A Intrusion protection using stress changes
05/18/2011CN102067143A System, method and apparatus for security management of an electronic device
05/18/2011CN102066678A Electronic key system
05/18/2011CN102065325A Multimedia copyright protection method for supporting preview and tracking unauthorized distribution
05/18/2011CN102065323A Content distribution management device
05/18/2011CN102065194A Information processing system, utilization constraint method and recording medium
05/18/2011CN102065148A Memory system access authorizing method based on communication network
05/18/2011CN102063599A Document encrypting and decrypting methods based on Chinese character handwriting of touch screen
05/18/2011CN102063598A Data encryption and decryption methods and devices
05/18/2011CN102063597A Method for authenticating software by utilizing softdog
05/18/2011CN102063596A Dynamic evaluation system and using method thereof
05/18/2011CN102063595A Method and system for obfuscating data structures by deterministic natural data substitution
05/18/2011CN102063594A Method for detecting existence of virtual machine monitor (VMM) under Windows platform
05/18/2011CN102063593A Credible device with active control function and authentication method thereof
05/18/2011CN102063592A Credible platform and method for controlling hardware equipment by using same
05/18/2011CN102063591A Methods for updating PCR (Platform Configuration Register) reference values based on trusted platform
05/18/2011CN102063590A Copyright protecting method and device for publishing digital film and television by reproducible storage equipment
05/18/2011CN102063589A Electronic signature tool and safety control method thereof
05/18/2011CN102063588A Control method and system for safety protection of computer terminal network
05/18/2011CN102063587A Cloud storage data storage and retrieval method, device and system
05/18/2011CN102063586A Method and device of detecting a fault attack
05/18/2011CN102063585A Xen based secure virtual disk access control method
05/18/2011CN102063584A Chip attack protection
05/18/2011CN102063583A Data exchange method for mobile storage medium and device thereof
05/18/2011CN102063582A Method for encrypting and decrypting random material
05/18/2011CN102063581A Computer device and startup method thereof
05/18/2011CN102063484A Discovery method and device of third-party WEB application program
05/18/2011CN102063479A Method and system for controlling data access right
05/18/2011CN102063431A Information database system and access control method thereof
05/18/2011CN102063359A Method and device for monitoring data for USE mobile storage device
05/18/2011CN102063260A Method and device for displaying screen
05/18/2011CN102063034A Unit using OS and image forming apparatus using the same
05/18/2011CN102063031A Unit using operating system and image forming apparatus
05/18/2011CN101706853B Solid state disk (SSD)-based anti-leakage self-destruction system
05/18/2011CN101694672B Distributed safe retrieval system
05/18/2011CN101667064B Anti-peer and anti-stealing safety keyboard
05/18/2011CN101661542B Unidirectional introducing equipment of movable memory medium
05/18/2011CN101655858B Cryptograph index structure based on blocking organization and management method thereof
05/18/2011CN101587519B System and method for realizing multifunctional information security device
05/18/2011CN101561856B 信息处理系统 The information processing system
05/18/2011CN101561855B Method and system for controlling computer to access USB device
05/18/2011CN101512535B Attestation of computing platforms
05/18/2011CN101504707B Conditional access to digital rights management conversion
05/18/2011CN101479717B Dynamic content play control
05/18/2011CN101477610B Software watermark process for combined embedding of source code and target code
05/18/2011CN101436238B Digital publishing rights backup and restoring method and system
05/18/2011CN101430746B Rights sharing system and method for digital rights management
05/18/2011CN101404037B Method for detecting and positioning electronic text contents plagiary
05/18/2011CN101398871B Systems and methods for secure transaction management and electronic rights protection
05/18/2011CN101390333B Account linking with privacy keys
05/18/2011CN101379507B Role-based access control
05/18/2011CN101359353B File protection method and device
05/18/2011CN101339588B Digital fingerprint system and method for piracy tracking and digital evidence obtaining
05/18/2011CN101330380B Method for providing drm license
05/18/2011CN101303720B Built-in equipment, method and system for protecting encipherment of built-in equipment software
05/18/2011CN101277190B Method of adjusting reference information for biometric authentication and apparatus
05/18/2011CN101261667B A software protection method