Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
04/2011
04/27/2011CN102034058A Method for controlling safety of application software and terminal
04/27/2011CN102034057A Network connection method of high-safety information network platform
04/27/2011CN102034056A Network service providing platform based on high safety information system
04/27/2011CN102034055A High safety information system-based network system platform
04/27/2011CN102034054A Information authentication system
04/27/2011CN102034053A 电脑用户终端认证方法 Computer user terminal authentication method
04/27/2011CN102034052A Operation system architecture based on separation of permissions and implementation method thereof
04/27/2011CN102034051A Wireless terminal-based password small keyboard processing method
04/27/2011CN102034050A Dynamic malicious software detection method based on virtual machine and sensitive Native application programming interface (API) calling perception
04/27/2011CN102034049A Mass data compression, encryption, storage and retrieval system and using method thereof
04/27/2011CN102034048A Mobile Agent based active detection method for watermark of vector data
04/27/2011CN102034047A Automatic protection method for computer virus
04/27/2011CN102034046A Data underlay encryption method based on disk drive in cloud computing environment
04/27/2011CN102034045A Software bug detection system with low computer system resource expense
04/27/2011CN102034044A Virulence and hazard analysis system for computer viruses
04/27/2011CN102034043A Novel file-static-structure-attribute-based malware detection method
04/27/2011CN102034042A Novel unwanted code detecting method based on characteristics of function call relationship graph
04/27/2011CN102034041A Method, device and system for verifying binding of data card and mobile hosts
04/27/2011CN102034040A Log implementation method in encryption card
04/27/2011CN102034039A Method and apparatus for allowing software access to navigational data in a decrypted media stream while protecting stream payloads
04/27/2011CN102034038A Method for determining setting used for safe print
04/27/2011CN102034037A Authentication system, printing terminal and authenticating terminal
04/27/2011CN102034036A Permission management method and equipment
04/27/2011CN102034035A Log information processing device, image formation apparatis, and log information processing method
04/27/2011CN102034034A Biological authentication device
04/27/2011CN102034033A Content approving apparatus
04/27/2011CN102033966A Apparatus for logging configuration of microprocessor system and method for logging configuration of microprocessor system
04/27/2011CN102033781A Desktop system switching method for virtual machine
04/27/2011CN102033760A Software running method of high-safety information system
04/27/2011CN102033759A Software running method of high-safety information network platform
04/27/2011CN101676925B Computer system and method of setting authentication information in security chip
04/27/2011CN101398879B Software authentication method
04/27/2011CN101369302B Method and system for controlling access authority of information safety equipment
04/27/2011CN101206692B Method and equipment for detecting course
04/27/2011CN101149768B Special processor software encryption and decryption method
04/27/2011CN101004660B Method for realizing USB compound device
04/27/2011CN101002210B Content management system and content management unit
04/26/2011US7934266 Contents reproduction device, contents reproduction control method, program
04/26/2011US7934263 License management in a media network environment
04/26/2011US7934258 System and method for remote authentication security management
04/26/2011US7934254 Method and apparatus for providing network and computer system security
04/26/2011US7934249 Sensitivity-enabled access control model
04/26/2011US7934234 Transmission and reception of television programmes and other data
04/26/2011US7934215 Smart scheduler
04/26/2011US7934105 Data transfer device
04/26/2011US7934104 Systems and methods for verifying a licensed installation at time of update
04/26/2011US7934103 Detecting and countering malicious code in enterprise networks
04/26/2011US7934102 Method and system for efficient exception handling of the production process of personal identification verification (PIV) smartcards
04/26/2011US7934101 Dynamically mitigating a noncompliant password
04/26/2011US7934100 Information processing system, information processing apparatus, information processing method, and storage medium
04/26/2011US7934096 Integrity protected smart card transaction
04/26/2011US7934093 Assigning security levels to a shared component
04/26/2011US7934091 Digital asset usage accountability via event journaling
04/26/2011US7933985 System and method for detecting and preventing denial of service attacks in a communications system
04/26/2011US7933979 Identification information creating method, information processing apparatus, computer program product, recording device monitoring method, terminal apparatus management method, and communication network system
04/26/2011US7933903 System and method to determine the validity of and interaction on a network
04/26/2011US7933838 Apparatus for secure digital content distribution and methods therefor
04/26/2011US7933837 Content information providing system, content information providing server, content reproduction apparatus, content information providing method, content reproduction method and computer program
04/26/2011US7933834 Interactive bill payment center
04/26/2011US7933589 Method and system for facilitation of wireless e-commerce transactions
04/26/2011US7933514 Camera system and digital camera
04/26/2011US7933410 System and method for a variable key ladder
04/26/2011US7933409 Content playback device
04/26/2011US7933408 Asynchronous download
04/26/2011US7933038 System for delivering greeting using interactive form
04/26/2011US7933037 System for sending e-mail message via printed form
04/26/2011US7931200 Image transformation device
04/26/2011CA2517442C Customized execution environment and operating system capable of supporting same
04/26/2011CA2445751C Dynamic packet filter utilizing session tracking
04/21/2011WO2011047296A2 Detecting and responding to malware using link files
04/21/2011WO2011047078A2 Firmware verified boot
04/21/2011WO2011047063A1 Remote administration and delegation rights in a cloud-based computing device
04/21/2011WO2011047061A2 Computing device with developer mode
04/21/2011WO2011046939A1 Authentication using a weak hash of user credentials
04/21/2011WO2011046817A2 Hardware-based key generation and recovery
04/21/2011WO2011046785A1 Electronic display device content caching and transactions
04/21/2011WO2011046731A2 Secure storage of temporary secrets
04/21/2011WO2011046452A2 Maintaining data integrity across execution environments
04/21/2011WO2011046422A1 Method and network infrastructure for establishing dynamic trusted execution environment
04/21/2011WO2011045874A1 Sales system and sales management method
04/21/2011WO2011045516A1 Computer system for accessing confidential data by means of at least one remote unit and remote unit
04/21/2011WO2011045163A1 Controlling location information
04/21/2011WO2011045115A1 Dynamically constructed capability for enforcing object access order
04/21/2011WO2011044949A1 Method to link devices with each other via a network
04/21/2011WO2011044775A1 Data card, method and system for identifying fingerprint by data card
04/21/2011WO2011044710A1 Software license embedded in shell code
04/21/2011WO2011044681A1 Method and system for information technology asset management
04/21/2011WO2011044603A1 Method for executing security-relevant and non-security-relevant software components on a hardware platform
04/21/2011WO2011023456A3 A method and system for establishing and maintaining an improved single sign-on (sso) facility
04/21/2011WO2011011179A3 Communication channel claim dependent security precautions
04/21/2011WO2011007036A3 Mobile device and method for generating secure environments
04/21/2011WO2011005869A3 Method and system for generating and using biometrically secured embedded tokens in documents
04/21/2011WO2011002777A3 Data object store and server for a cloud storage environment
04/21/2011WO2010040629A3 Data processing system for providing authorization keys
04/21/2011WO2009024848A3 A portable database system for independent operation on computing device
04/21/2011US20110093958 Secure Data Storage Apparatus and Method
04/21/2011US20110093957 Method and system for administering a secure data repository
04/21/2011US20110093956 Protecting a Mobile Device Against a Denial of Service Attack
04/21/2011US20110093955 Designing security into software during the development lifecycle
04/21/2011US20110093953 Preventing and responding to disabling of malware protection software