Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
12/29/2010 | CN101930505A Soft-decision decoding method of concatenated fingerprint codes |
12/29/2010 | CN101930389A Automatic test system of computer and test method thereof |
12/29/2010 | CN101930375A Self-adaptive program data updating method of memory space in single user optical network unit |
12/29/2010 | CN101582108B Sensitive data protection system |
12/29/2010 | CN101504704B Star trust chain supporting embedded platform application program integrality verification method |
12/29/2010 | CN101447876B Identity authentication test method of security operating system |
12/29/2010 | CN101371258B Unlocking a device by performing gestures on an unlock image |
12/29/2010 | CN101359354B Method and system for implementing power-on protection |
12/29/2010 | CN101183384B Data processing method and device |
12/29/2010 | CN101064760B Scanned document management system |
12/29/2010 | CN101009555B An intelligent secret key device and the method for information interaction with the host |
12/29/2010 | CA2766745A1 Systems and methods for distributed electronic signature documents |
12/29/2010 | CA2766695A1 Authentication method and system |
12/28/2010 | USRE42019 Distribution system, semiconductor memory card, receiving apparatus, computer-readable recording medium and receiving method |
12/28/2010 | US7861314 Interactive key control system and method of managing access to secured locations |
12/28/2010 | US7861313 Information managing apparatus and method, recording medium, and program |
12/28/2010 | US7861312 MP3 player with digital rights management |
12/28/2010 | US7861311 Apparatus and method of managing hidden area |
12/28/2010 | US7861306 Method and system for limiting the use of user-specific software features |
12/28/2010 | US7861303 Malware scanning wireless service agent system and method |
12/28/2010 | US7861300 Method and apparatus for determination of the non-replicative behavior of a malicious program |
12/28/2010 | US7861298 System and method for protecting against denial of service attacks |
12/28/2010 | US7861297 Reducing security threats from untrusted code |
12/28/2010 | US7861295 Risk detection |
12/28/2010 | US7861294 Presence-based access control |
12/28/2010 | US7861293 Mobile terminal and authentication method |
12/28/2010 | US7861287 System and method for utilizing audit information for challenge/response during a password reset process |
12/28/2010 | US7861286 System and method for network-based fraud and authentication services |
12/28/2010 | US7861104 Methods and apparatus for collapsing interrupts |
12/28/2010 | US7861097 Secure implementation and utilization of device-specific security data |
12/28/2010 | US7861092 Personal communication apparatus capable of recording transactions secured with biometric data |
12/28/2010 | US7861091 Smart card enabled secure computing environment system |
12/28/2010 | US7861090 Electric conference system and control method thereof |
12/28/2010 | US7861089 Communication device, communication method, program, and recording medium |
12/28/2010 | US7861087 Systems and methods for state signing of internet resources |
12/28/2010 | US7861084 Authentication of data transmitted in a digital transmission system |
12/28/2010 | US7861081 Security system and method |
12/28/2010 | US7861079 Method for securely creating an endorsement certificate in an insecure environment |
12/28/2010 | US7861077 Secure authentication and transaction system and method |
12/28/2010 | US7860970 Secure initialization of intrusion detection system |
12/28/2010 | US7860947 Storage medium and downloading method |
12/28/2010 | US7860888 Authorization data model |
12/28/2010 | US7860875 Method for modifying a query by use of an external system for managing assignment of user and data classifications |
12/28/2010 | US7860850 Scanning files using direct file system access |
12/28/2010 | US7860809 Methods and devices for digital media distribution |
12/28/2010 | US7860802 Flexible licensing architecture in content rights management systems |
12/28/2010 | US7860801 Tools for accessing digital works |
12/28/2010 | US7860800 Policy control and billing support for call transfer in a session initiation protocol (SIP) network |
12/28/2010 | US7860797 Method for documenting property or possession and transfer of property or possession of a merchandise |
12/28/2010 | US7860756 Optical disc apparatus |
12/28/2010 | US7860252 Circuit security |
12/28/2010 | US7860248 Enciphering apparatus and method, deciphering apparatus and method as well as information processing apparatus and method |
12/28/2010 | US7859725 System and method for monitoring unauthorized dissemination of documents and portable media |
12/28/2010 | US7859600 Arrangement for and method of projecting a level image |
12/28/2010 | US7857211 Information processing system |
12/25/2010 | CA2708059A1 System and method for dynamic, multi-attribute authentication |
12/25/2010 | CA2690788A1 System and method for optimizing the de-identification of datasets |
12/24/2010 | CA2708040A1 Method of generating and providing a password to a handheld electronic device |
12/23/2010 | WO2010148243A1 Methods and apparatus to maintain validity of shared information |
12/23/2010 | WO2010148202A1 Finger sensor having remote web based notifications |
12/23/2010 | WO2010148059A2 Remote access control of storage devices |
12/23/2010 | WO2010148018A2 Automated test to tell computers and humans apart |
12/23/2010 | WO2010147410A2 Method and device for upgrading rights object that was stored in memory card |
12/23/2010 | WO2010147221A1 Content managing device and content managing method |
12/23/2010 | WO2010147215A1 Secret information distribution system, secret information distribution method and program |
12/23/2010 | WO2010147077A1 Information processing system, terminal device, and server device |
12/23/2010 | WO2010146991A1 Information display device and information management system |
12/23/2010 | WO2010146353A1 Graphical authentication |
12/23/2010 | WO2010146352A1 Computing device with graphical authentication interface |
12/23/2010 | WO2010146242A1 Metering unit for undeniable service management and a related method |
12/23/2010 | WO2010145886A1 Rights managed distributable software |
12/23/2010 | WO2010145811A1 Method for protecting confidential data sent out with an electronic message |
12/23/2010 | WO2010120055A3 System and method for the security of keyboard input data |
12/23/2010 | WO2009097073A8 Coexistence tools for synchronizing properties between on-premises customer locations and remote hosting services |
12/23/2010 | US20100325741 System and Method of Owner Control of Electronic Devices |
12/23/2010 | US20100325740 Managing electronic devices using an electronic device as a root of trust |
12/23/2010 | US20100325739 Data transmission apparatus and method, data receiving apparatus and method, and data transmission and reception system and method |
12/23/2010 | US20100325738 Dynamic dual permissions-based data capturing and logging |
12/23/2010 | US20100325737 Rights-based advertisement management in protected media |
12/23/2010 | US20100325735 System and Method for Software Activation |
12/23/2010 | US20100325734 Modular Software Protection |
12/23/2010 | US20100325733 Information processing device, information processing method and program |
12/23/2010 | US20100325732 Managing Keys for Encrypted Shared Documents |
12/23/2010 | US20100325731 Assessing threat to at least one computer network |
12/23/2010 | US20100325730 System and Method for Remotely Securing a Network from Unauthorized Access |
12/23/2010 | US20100325729 Determination by circuitry of presence of authorized and/or malicious data |
12/23/2010 | US20100325728 System for policing junk e-mail messages |
12/23/2010 | US20100325726 Unauthorized operation monitoring program, unauthorized operation monitoring method, and unauthorized operation monitoring system |
12/23/2010 | US20100325725 Computer readable medium, method for controlling execution of processing, and information processing apparatus |
12/23/2010 | US20100325724 Scope model for role-based access control administration |
12/23/2010 | US20100325722 Information processing apparatus including locking function, locking (unlocking) method for information processing apparatus and program thereof |
12/23/2010 | US20100325721 Image-based unlock functionality on a computing device |
12/23/2010 | US20100325720 System and Method for Monitoring Attempted Network Intrusions |
12/23/2010 | US20100325719 System and Method for Redundancy in a Communication Network |
12/23/2010 | US20100325718 Automatic Firewall Configuration |
12/23/2010 | US20100325717 System and Method for Managing Access to a Plurality of Servers in an Organization |
12/23/2010 | US20100325716 Managing Access To A Document-Processing Device Using An Identification Token |
12/23/2010 | US20100325714 System and method for providing mobility in a network environment |
12/23/2010 | US20100325713 Mobile terminal, data communication method, and computer program |
12/23/2010 | US20100325712 Information processing apparatus, security method, and storage medium storing security program |