Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
12/2010
12/29/2010CN101930505A Soft-decision decoding method of concatenated fingerprint codes
12/29/2010CN101930389A Automatic test system of computer and test method thereof
12/29/2010CN101930375A Self-adaptive program data updating method of memory space in single user optical network unit
12/29/2010CN101582108B Sensitive data protection system
12/29/2010CN101504704B Star trust chain supporting embedded platform application program integrality verification method
12/29/2010CN101447876B Identity authentication test method of security operating system
12/29/2010CN101371258B Unlocking a device by performing gestures on an unlock image
12/29/2010CN101359354B Method and system for implementing power-on protection
12/29/2010CN101183384B Data processing method and device
12/29/2010CN101064760B Scanned document management system
12/29/2010CN101009555B An intelligent secret key device and the method for information interaction with the host
12/29/2010CA2766745A1 Systems and methods for distributed electronic signature documents
12/29/2010CA2766695A1 Authentication method and system
12/28/2010USRE42019 Distribution system, semiconductor memory card, receiving apparatus, computer-readable recording medium and receiving method
12/28/2010US7861314 Interactive key control system and method of managing access to secured locations
12/28/2010US7861313 Information managing apparatus and method, recording medium, and program
12/28/2010US7861312 MP3 player with digital rights management
12/28/2010US7861311 Apparatus and method of managing hidden area
12/28/2010US7861306 Method and system for limiting the use of user-specific software features
12/28/2010US7861303 Malware scanning wireless service agent system and method
12/28/2010US7861300 Method and apparatus for determination of the non-replicative behavior of a malicious program
12/28/2010US7861298 System and method for protecting against denial of service attacks
12/28/2010US7861297 Reducing security threats from untrusted code
12/28/2010US7861295 Risk detection
12/28/2010US7861294 Presence-based access control
12/28/2010US7861293 Mobile terminal and authentication method
12/28/2010US7861287 System and method for utilizing audit information for challenge/response during a password reset process
12/28/2010US7861286 System and method for network-based fraud and authentication services
12/28/2010US7861104 Methods and apparatus for collapsing interrupts
12/28/2010US7861097 Secure implementation and utilization of device-specific security data
12/28/2010US7861092 Personal communication apparatus capable of recording transactions secured with biometric data
12/28/2010US7861091 Smart card enabled secure computing environment system
12/28/2010US7861090 Electric conference system and control method thereof
12/28/2010US7861089 Communication device, communication method, program, and recording medium
12/28/2010US7861087 Systems and methods for state signing of internet resources
12/28/2010US7861084 Authentication of data transmitted in a digital transmission system
12/28/2010US7861081 Security system and method
12/28/2010US7861079 Method for securely creating an endorsement certificate in an insecure environment
12/28/2010US7861077 Secure authentication and transaction system and method
12/28/2010US7860970 Secure initialization of intrusion detection system
12/28/2010US7860947 Storage medium and downloading method
12/28/2010US7860888 Authorization data model
12/28/2010US7860875 Method for modifying a query by use of an external system for managing assignment of user and data classifications
12/28/2010US7860850 Scanning files using direct file system access
12/28/2010US7860809 Methods and devices for digital media distribution
12/28/2010US7860802 Flexible licensing architecture in content rights management systems
12/28/2010US7860801 Tools for accessing digital works
12/28/2010US7860800 Policy control and billing support for call transfer in a session initiation protocol (SIP) network
12/28/2010US7860797 Method for documenting property or possession and transfer of property or possession of a merchandise
12/28/2010US7860756 Optical disc apparatus
12/28/2010US7860252 Circuit security
12/28/2010US7860248 Enciphering apparatus and method, deciphering apparatus and method as well as information processing apparatus and method
12/28/2010US7859725 System and method for monitoring unauthorized dissemination of documents and portable media
12/28/2010US7859600 Arrangement for and method of projecting a level image
12/28/2010US7857211 Information processing system
12/25/2010CA2708059A1 System and method for dynamic, multi-attribute authentication
12/25/2010CA2690788A1 System and method for optimizing the de-identification of datasets
12/24/2010CA2708040A1 Method of generating and providing a password to a handheld electronic device
12/23/2010WO2010148243A1 Methods and apparatus to maintain validity of shared information
12/23/2010WO2010148202A1 Finger sensor having remote web based notifications
12/23/2010WO2010148059A2 Remote access control of storage devices
12/23/2010WO2010148018A2 Automated test to tell computers and humans apart
12/23/2010WO2010147410A2 Method and device for upgrading rights object that was stored in memory card
12/23/2010WO2010147221A1 Content managing device and content managing method
12/23/2010WO2010147215A1 Secret information distribution system, secret information distribution method and program
12/23/2010WO2010147077A1 Information processing system, terminal device, and server device
12/23/2010WO2010146991A1 Information display device and information management system
12/23/2010WO2010146353A1 Graphical authentication
12/23/2010WO2010146352A1 Computing device with graphical authentication interface
12/23/2010WO2010146242A1 Metering unit for undeniable service management and a related method
12/23/2010WO2010145886A1 Rights managed distributable software
12/23/2010WO2010145811A1 Method for protecting confidential data sent out with an electronic message
12/23/2010WO2010120055A3 System and method for the security of keyboard input data
12/23/2010WO2009097073A8 Coexistence tools for synchronizing properties between on-premises customer locations and remote hosting services
12/23/2010US20100325741 System and Method of Owner Control of Electronic Devices
12/23/2010US20100325740 Managing electronic devices using an electronic device as a root of trust
12/23/2010US20100325739 Data transmission apparatus and method, data receiving apparatus and method, and data transmission and reception system and method
12/23/2010US20100325738 Dynamic dual permissions-based data capturing and logging
12/23/2010US20100325737 Rights-based advertisement management in protected media
12/23/2010US20100325735 System and Method for Software Activation
12/23/2010US20100325734 Modular Software Protection
12/23/2010US20100325733 Information processing device, information processing method and program
12/23/2010US20100325732 Managing Keys for Encrypted Shared Documents
12/23/2010US20100325731 Assessing threat to at least one computer network
12/23/2010US20100325730 System and Method for Remotely Securing a Network from Unauthorized Access
12/23/2010US20100325729 Determination by circuitry of presence of authorized and/or malicious data
12/23/2010US20100325728 System for policing junk e-mail messages
12/23/2010US20100325726 Unauthorized operation monitoring program, unauthorized operation monitoring method, and unauthorized operation monitoring system
12/23/2010US20100325725 Computer readable medium, method for controlling execution of processing, and information processing apparatus
12/23/2010US20100325724 Scope model for role-based access control administration
12/23/2010US20100325722 Information processing apparatus including locking function, locking (unlocking) method for information processing apparatus and program thereof
12/23/2010US20100325721 Image-based unlock functionality on a computing device
12/23/2010US20100325720 System and Method for Monitoring Attempted Network Intrusions
12/23/2010US20100325719 System and Method for Redundancy in a Communication Network
12/23/2010US20100325718 Automatic Firewall Configuration
12/23/2010US20100325717 System and Method for Managing Access to a Plurality of Servers in an Organization
12/23/2010US20100325716 Managing Access To A Document-Processing Device Using An Identification Token
12/23/2010US20100325714 System and method for providing mobility in a network environment
12/23/2010US20100325713 Mobile terminal, data communication method, and computer program
12/23/2010US20100325712 Information processing apparatus, security method, and storage medium storing security program