Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
02/17/2011 | US20110041169 Live action icons for the internet |
02/17/2011 | US20110041167 Techniques for providing secure communications among clients with efficient credentials management |
02/17/2011 | US20110041163 Systems and methods for user interface control |
02/17/2011 | US20110041162 Method and apparatus for providing environment for use of internet-based service |
02/17/2011 | US20110041161 Management of Ancillary Content Delivery and Presentation |
02/17/2011 | US20110041159 Executing commands on devices through presence applications |
02/17/2011 | US20110041125 Program introduction supporting server, program introduction supporting system, program introduction supporting method, and program introduction supporting computer program |
02/17/2011 | US20110041073 Key-Based Storage and Retrieval of Information |
02/17/2011 | US20110041061 Obfuscating identity of a source entity affiliated with a communiqué directed to a receiving user and in accordance with conditional directive provided by the receiving user |
02/17/2011 | US20110041003 METHOD AND APPARATUS FOR H(e)NB INTEGRITY VERIFICATION AND VALIDATION |
02/17/2011 | US20110040986 Method, system, and program for securely providing keys to encode and decode data in a storage cartridge |
02/17/2011 | US20110040984 Method for starting a keyboard of a self-service terminal |
02/17/2011 | US20110040983 System and method for providing identity theft security |
02/17/2011 | US20110040979 Networked secure logon system |
02/17/2011 | US20110040975 System and method for controlled copying and moving of content between devices and domains based on conditional encryption of content key depending on usage state |
02/17/2011 | US20110040971 Portable system and method for remotely accessing data |
02/17/2011 | US20110040970 Method for verifying the certification of a recording apparatus |
02/17/2011 | US20110040967 System and Method for Multilevel Secure Object Management |
02/17/2011 | US20110040965 Enterprise security system |
02/17/2011 | US20110040961 Binding data to a computing platform through use of a cryptographic module |
02/17/2011 | US20110040753 Personalized search engine |
02/17/2011 | US20110040731 Provisioning configuration changes to a content player device |
02/17/2011 | US20110040658 Network-Based Purchase and Distribution of Media |
02/17/2011 | US20110040478 Navigation update system for a vehicle |
02/17/2011 | US20110039237 Method and system for cyber security management of industrial control systems |
02/17/2011 | US20110038552 Graphically encoded data copy and paste |
02/17/2011 | US20110038481 Hierarchization of crytographic keys in an electronic circuit |
02/17/2011 | US20110036489 Hockey Stick |
02/17/2011 | DE102009037353A1 Verteilung von Medieninhalten mit inhärenter nutzerorientierter Berechtigungsüberprüfung Distribution of media content with inherent user-oriented authentication |
02/17/2011 | DE102009037224A1 Verfahren und Vorrichtung zur Zugriffsregelung auf Anlagensteuerungen von Windenergieanlagen Method and apparatus for access control on plant control of wind turbines |
02/17/2011 | DE102009037223A1 Verfahren und Vorrichtung zum Ausführen von Anwendungen in einer sicheren, autonomen Umgebung Method and apparatus for executing applications in a secure and autonomous environment |
02/17/2011 | CA2770446A1 Systems, methods, and program applications for selectively restricting the placeshifting of copy protected digital media content |
02/17/2011 | CA2770329A1 Content rights management |
02/17/2011 | CA2763201A1 Using confidence metrics of client devices in a reputation system |
02/16/2011 | EP2285061A1 System and Method for Providing Distributed Access Control to Secured Items |
02/16/2011 | EP2285042A1 Software security module using the ciphering of a hash from a password concatenated with a seed |
02/16/2011 | EP2284836A1 Output control method, receiver, and receiving method using license acquisition time limit information |
02/16/2011 | EP2284802A1 Process and arrangement for authenticating a user of facilities, a service, a database or a data network |
02/16/2011 | EP2284771A1 Device for insertion in a calculating system and calculating system |
02/16/2011 | EP2284762A2 Method, system and device for authenticating a handheld device to a computer |
02/16/2011 | EP2284761A2 Image forming apparatus, image processing apparatus, and image delivery system |
02/16/2011 | EP2284760A2 Information processing system and control method thereof, and program |
02/16/2011 | EP2284759A2 Cascaded combination structure of flash disks to create security function |
02/16/2011 | EP2284758A2 Versatile content control with partitioning |
02/16/2011 | EP2284757A1 Security vulnerability information aggregation |
02/16/2011 | EP2284756A2 Method for managing digital content, management unit and rendering device |
02/16/2011 | EP2284755A1 Optimized integrity verification procedures |
02/16/2011 | EP2284754A1 Optimized integrity verification procedures |
02/16/2011 | EP2284753A2 Program introduction supporting server, program introduction supporting system, program introduction supporting method, and program introduction supporting computer program |
02/16/2011 | EP2284752A2 Intrusion detection systems and methods |
02/16/2011 | EP2284751A1 Method for traceability and accountability of dynamic exchange in an internet environment |
02/16/2011 | EP2284750A1 System and method for detecting obfuscated malware using code normalization |
02/16/2011 | EP2284749A1 Method, computer program and device for executing actions using data sets |
02/16/2011 | EP2284748A1 Countermeasure for the protection of stored data |
02/16/2011 | EP2284645A1 Connection linked rights protection |
02/16/2011 | EP2284644A1 Software code signing system and method |
02/16/2011 | EP2284643A1 System and method for providing subscribed applications on wireless devices over a wireless network |
02/16/2011 | EP2284642A1 System and method for providing subscribed applications on wireless devices over a wireless network |
02/16/2011 | EP2284491A1 Key of a vehicle and a navigation device |
02/16/2011 | EP2283611A2 Distributed security provisioning |
02/16/2011 | EP2283451A1 Identity-based encryption of data items for secure access thereto |
02/16/2011 | EP2283450A1 Data encryption device |
02/16/2011 | EP2283449A1 Electronic rental service system and method for digital content |
02/16/2011 | EP2283448A1 Communicating media content from a dvr to a portable device |
02/16/2011 | EP2283447A1 Secure application streaming |
02/16/2011 | EP2283446A1 Fraudulent page detection |
02/16/2011 | EP1920380B1 Mass storage device with automated credentials loading |
02/16/2011 | EP1466448B1 Method and apparatus for integration of communication links with a remote direct memory access protocol |
02/16/2011 | CN201749471U Computer screen information protection device |
02/16/2011 | CN1956016B Storage media issuing method |
02/16/2011 | CN1936843B Smart key device of internal memory apparatus and using method |
02/16/2011 | CN101978379A Information processing apparatus cooperating with virus management function device, and anti-virus method |
02/16/2011 | CN101978378A Method for verifying the certification of a recording apparatus |
02/16/2011 | CN101978377A Method and apparatus for controlling system access during protected modes of operation |
02/16/2011 | CN101978376A Method and system for protection against information stealing software |
02/16/2011 | CN101978354A Method and system for detecting the installation and usage of software in an application virtualization environment |
02/16/2011 | CN101978339A Method and apparatus for hardware reset protection |
02/16/2011 | CN101977219A Method and device for protecting widget application |
02/16/2011 | CN101977179A Dual-network dual-system computer communication method |
02/16/2011 | CN101976408A Widget as well as trial implementation method and terminal thereof |
02/16/2011 | CN101976323A Quickly generating method of user copy based on video GOP (Group of Picture) |
02/16/2011 | CN101976322A Safety metadata management method based on integrality checking |
02/16/2011 | CN101976321A Generated encrypting method based on face feature key |
02/16/2011 | CN101976320A Credible computer platform |
02/16/2011 | CN101976319A BIOS firmware Rootkit detection method based on behaviour characteristic |
02/16/2011 | CN101976318A Detection method of code similarity based on digital fingerprints |
02/16/2011 | CN101976317A Virtual machine image safety method in private cloud computing application |
02/16/2011 | CN101976316A Information access authority control method |
02/16/2011 | CN101976315A Storage device having direct user access |
02/16/2011 | CN101976314A Access control method and system |
02/16/2011 | CN101976313A Frequent subgraph mining based abnormal intrusion detection method |
02/16/2011 | CN101976312A Method for enhancing security of Biohashing system |
02/16/2011 | CN101976209A Adapting configuration for incompatible application programs |
02/16/2011 | CN101599115B Light weight method responding to TOCTOU attack |
02/16/2011 | CN101593257B System and method for protecting software based on.Net virtual machine |
02/16/2011 | CN101521574B Method for network authorization of large-sized analytic instrument |
02/16/2011 | CN101308531B Storage management method and storage management system |
02/16/2011 | CN101266550B Malicious code detection method |
02/16/2011 | CN101167301B Confidential information processing host device and confidential information processing method |
02/15/2011 | US7891013 Contents distribution system |