Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
12/30/2010 | US20100332759 Method of program obfuscation and processing device for executing obfuscated programs |
12/30/2010 | US20100332723 Memory Device and Method for Embedding Host-Identification Information into Content |
12/30/2010 | US20100332653 Image forming apparatus and image forming method |
12/30/2010 | US20100332641 Passive detection of rebooting hosts in a network |
12/30/2010 | US20100332530 Islands of data |
12/30/2010 | US20100332456 Data object store and server for a cloud storage environment, including data deduplication and data management across multiple cloud storage sites |
12/30/2010 | US20100332397 Method and system for the supply of data, transactions and electronic voting |
12/30/2010 | US20100332392 Portable Terminal Device and Method of Determining Communication Permission Thereof |
12/30/2010 | US20100332391 Secure authentication between multiple parties |
12/30/2010 | US20100332340 Method and system to facilitate on-line trading |
12/30/2010 | US20100332332 Method and apparatus for freely distributing digital content with advertisement |
12/30/2010 | US20100332320 Systems and Methods for Providing Conditional Authorization to Operate Licensed Software |
12/30/2010 | US20100332306 Acquisition Option in Auction Configuration |
12/30/2010 | US20100332298 Synchronizing multiple playback device timing utilizing drm encoding |
12/30/2010 | US20100332018 Method for defining a uniform injection molding interface and an injection molding system using the same |
12/30/2010 | US20100331649 Interactive analysis method for biosignals |
12/30/2010 | US20100330978 Method, server and mobile communication device for managing unique memory device identifications |
12/30/2010 | US20100330958 Mobile communication device and method for disabling applications |
12/30/2010 | US20100329464 Systems and methods for implementing supply chain visibility policies |
12/30/2010 | US20100329463 Group key management for mobile ad-hoc networks |
12/30/2010 | US20100329460 Method and apparatus for assuring enhanced security |
12/30/2010 | US20100329456 Semiconductor device including encryption section, semiconductor device including external interface, and content reproduction method |
12/30/2010 | US20100327055 Code Based Access Systems |
12/30/2010 | DE112004002470B4 Zertifikat-Basiertes Digitales Rechte-Management Certificate-based Digital Rights Management |
12/30/2010 | DE102009030585A1 Waage Libra |
12/30/2010 | DE102009030242A1 Gerät und Verfahren zur Erstellung eines sicheren Zugangs zu einem webbasierten zugangsbeschränkten Dienst Apparatus and method for creating a secure access to a Web-based access-restricted service |
12/30/2010 | DE102009030019B3 System und Verfahren zur zuverlässigen Authentisierung eines Gerätes System and method for reliable authentication of a device |
12/30/2010 | DE102009027086A1 Vorrichtung und Verfahren zur Bildung einer Signatur Apparatus and method for forming a signature |
12/30/2010 | DE102009025414A1 Verfahren zum Schützen von mit einer elektronischen Nachricht versendeten vertraulichen Daten A method for protecting an electronic message sent with confidential data |
12/30/2010 | DE102007052734B4 Vorrichtung und Verfahren zur abhör- und manipulationssicheren Verschlüsselung für Online-Accounts Apparatus and method for tap- and tamper-proof encryption for online accounts |
12/29/2010 | WO2010151860A1 Providing security in virtualized mobile devices |
12/29/2010 | WO2010151630A2 Systems and methods for distributed electronic signature documents |
12/29/2010 | WO2010151444A1 Memory device and method for embedding host-identification information into content |
12/29/2010 | WO2010151322A1 Support for secure objects in a computer system |
12/29/2010 | WO2010151273A1 Secure custom application cloud computing architecture |
12/29/2010 | WO2010151246A1 Two-way authentication |
12/29/2010 | WO2010151102A1 Remote destroy mechanism using trusted platform module |
12/29/2010 | WO2010150817A1 Authentication system |
12/29/2010 | WO2010150441A1 Authentication method of a terminal device, authentication system of a terminal device, terminal device, and service provider device |
12/29/2010 | WO2010150413A1 Computer system |
12/29/2010 | WO2010150194A2 Personal identity verification method |
12/29/2010 | WO2010150047A1 Method and apparatus for device rehabilitation management |
12/29/2010 | WO2010150019A1 Authentication method and system |
12/29/2010 | WO2010150008A2 Method and system for provision of cryptographic services |
12/29/2010 | WO2010149986A2 A method, a computer program and apparatus for analysing symbols in a computer |
12/29/2010 | WO2010149407A1 Method of managing a one-time password in a portable electronic device |
12/29/2010 | WO2010149400A1 System and method for reliably authenticating an appliance |
12/29/2010 | WO2010149333A1 Data verification method |
12/29/2010 | WO2010149223A1 Identity management |
12/29/2010 | WO2010148954A1 Implementing method and device for releasing screen lock state of touch screen apparatus |
12/29/2010 | WO2010148730A1 Method and device for protecting integrity of drm file |
12/29/2010 | WO2010119427A3 Method and system for deployment of software applications to mobile computing devices |
12/29/2010 | EP2267974A1 System and method for local policy enforcement for internet service providers |
12/29/2010 | EP2267631A1 Requesting-side distribution id management device, providing-side distribution id management device, distribution id management system, and providing-side distribution id management method |
12/29/2010 | EP2267630A1 Authentication server and line server |
12/29/2010 | EP2267629A2 Identification of embedded system devices |
12/29/2010 | EP2267628A2 Token passing technique for media playback devices |
12/29/2010 | EP2267627A1 System and method for media distribution on social networks |
12/29/2010 | EP2267626A2 Digital rights management system and method |
12/29/2010 | EP2267625A2 On-line centralized and local authorization of executable files |
12/29/2010 | EP2267624A2 A generic framework for runtime interception and execution control of interpreted languages |
12/29/2010 | EP2266289A2 Defence communication mode for an apparatus able to communicate by means of various communication services |
12/29/2010 | EP2266252A2 Systems and methods for implementing and tracking identification tests |
12/29/2010 | EP2266071A2 System for mitigating the unauthorized use of a device |
12/29/2010 | EP2266070A2 System for mitigating the unauthorized use of a device |
12/29/2010 | EP2038807B1 Method, rfid reader, rfid tag and rfid system for secure communication |
12/29/2010 | EP1711887B1 Protection against power analysis attacks |
12/29/2010 | EP1245008B1 Method and system for secure authenticated payment on a computer network |
12/29/2010 | CN201689430U Information safety device based on a clock |
12/29/2010 | CN201689429U Anti-theft device of computer |
12/29/2010 | CN201689428U Offline fingerprint password manager |
12/29/2010 | CN201689380U Computer power supply with lock |
12/29/2010 | CN1953417B A method to distribute use data from user site to external site |
12/29/2010 | CN1818966B Electronic seal realization |
12/29/2010 | CN101933051A Systems and methods for accessing a tamperproof storage device in a wireless communication device using biometric data |
12/29/2010 | CN101933026A Public information transmission method, public information transmission system, central processing unit, and program |
12/29/2010 | CN101933025A Copy-protected software cartridge |
12/29/2010 | CN101933024A Option management system, option management method, and recording medium for digital equipment |
12/29/2010 | CN101933023A User access control system and method |
12/29/2010 | CN101931537A Digital certificate generation method for limiting signature contents |
12/29/2010 | CN101930536A Living body information generating device and method, loving body identification device and method |
12/29/2010 | CN101930524A Document information creation device, document registration system and document information creation method |
12/29/2010 | CN101930523A File protection system and method |
12/29/2010 | CN101930522A Digital data protecting method and device thereof |
12/29/2010 | CN101930521A File protecting method and device thereof |
12/29/2010 | CN101930520A Notebook computer antitheft method and system |
12/29/2010 | CN101930519A USB secret key device |
12/29/2010 | CN101930518A Password input device and system |
12/29/2010 | CN101930517A Detection method of bot program |
12/29/2010 | CN101930516A Method for using license of embedded equipment |
12/29/2010 | CN101930515A System and method for safely decompressing compressed file |
12/29/2010 | CN101930514A Method and device for capturing malicious code of mobile terminal |
12/29/2010 | CN101930513A Registering apparatus, authentication system, and registering method |
12/29/2010 | CN101930512A Password protection method |
12/29/2010 | CN101930511A Password protection method |
12/29/2010 | CN101930510A Password protection method |
12/29/2010 | CN101930509A Password protection method |
12/29/2010 | CN101930508A Safety treatment system |
12/29/2010 | CN101930507A Two-way authentication system of computer and method thereof |
12/29/2010 | CN101930506A Electronic seal system, electronic seal and electronic signature method |