Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
12/22/2010 | CN101925920A Server certificate issuing system and person authentication method |
12/22/2010 | CN101925913A Method and system for encrypted file access |
12/22/2010 | CN101925912A Piracy prevention in digital rights management systems |
12/22/2010 | CN101925911A Server, system, and content display control method |
12/22/2010 | CN101925910A License authentication system and authentication method |
12/22/2010 | CN101925909A Shared secret used between keyboard and application |
12/22/2010 | CN101925908A Secure boot with optional components method |
12/22/2010 | CN101925907A Dataspace protection utilizing virtual private networks on multi-node computer system |
12/22/2010 | CN101925906A Method of masking attainment of end of lifetime of electronic device and device comprising corresponding control module |
12/22/2010 | CN101925905A Identification and verification of unknown document according to eigen image process |
12/22/2010 | CN101925904A Document verification using dynamic document identification framework |
12/22/2010 | CN101925886A Information updating device and integrated circuit thereof, information updating method, and recording device and integrated circuit thereof |
12/22/2010 | CN101924794A Internet based method for monitoring total software operation quantity in real time |
12/22/2010 | CN101924766A Double-network communication method |
12/22/2010 | CN101924761A Method for detecting malicious program according to white list |
12/22/2010 | CN101924750A Biometrics authentication method and client terminal and authentication server used for biometrics authentication |
12/22/2010 | CN101923678A Data security protection method of enterprise management software |
12/22/2010 | CN101923621A Data reading protection method |
12/22/2010 | CN101923620A Computer readable medium, method for controlling execution of processing, and information processing apparatus |
12/22/2010 | CN101923619A Password key camouflage system and method |
12/22/2010 | CN101923618A Hidden Markov model based method for detecting assembler instruction level vulnerability |
12/22/2010 | CN101923617A Cloud-based sample database dynamic maintaining method |
12/22/2010 | CN101923616A Service provision device in copyright protection, user terminal and copyright protection method |
12/22/2010 | CN101923615A Grey fuzzy comprehensive evaluation-based trust quantization method |
12/22/2010 | CN101923614A Method for realizing function control on mobile terminal |
12/22/2010 | CN101923613A Authentication system |
12/22/2010 | CN101923612A Decision-making computer |
12/22/2010 | CN101923611A Analysis computer |
12/22/2010 | CN101923610A Data protection method and system |
12/22/2010 | CN101923609A Computer network security protection method and system |
12/22/2010 | CN101923608A Digital content online reading method, device and system and copyright protection method |
12/22/2010 | CN101615160B Security system for code dump protection and security method thereof |
12/22/2010 | CN101510826B DDoS aggression detection method based on visualization |
12/22/2010 | CN101464934B Mutual binding and authenticating method for computer platform and storage device, and computer thereof |
12/22/2010 | CN101425117B Method and device for constructing SQL statement |
12/22/2010 | CN101414335B Test system for credible PC trust chain based on minimum test collection and test method |
12/22/2010 | CN101388055B Program operation characteristic extracting method for detecting vulnerability model |
12/22/2010 | CN101281571B Method for defending unknown virus program |
12/22/2010 | CN101236535B Hard disk encryption method based on optical disk under Window environment |
12/22/2010 | CN101236500B Method for embedding inner core drive program in Window operation system by optical disk start-up |
12/22/2010 | CN101194266B Method, device, system and device for protected clock management based upon a non-trusted persistent time source |
12/22/2010 | CN101147154B Methods, devices and data structures for trusted data |
12/22/2010 | CN101093533B Discovering software code subject to licenses |
12/22/2010 | CN101057288B Bonding contents on separate storage media |
12/22/2010 | CN101008925B Storage of identification code and production method therefor |
12/21/2010 | US7856662 Denying unauthorized access to a private data processing network |
12/21/2010 | US7856660 System for efficiently handling cryptographic messages containing nonce values |
12/21/2010 | US7856658 Method and system for incorporating trusted metadata in a computing environment |
12/21/2010 | US7856652 Access control management method, access control management system and terminal device with access control management function |
12/21/2010 | US7856560 Digital information recording apparatus and recording/reproducing apparatus |
12/21/2010 | US7856558 Biometric verification and duress detection system and method |
12/21/2010 | US7856555 Write accessibility for electronic paper |
12/21/2010 | US7856553 System and method for platform activation |
12/21/2010 | US7856477 Method and system for image verification to prevent messaging abuse |
12/21/2010 | US7856468 Server reservation method, reservation control apparatus and program storage medium |
12/21/2010 | US7856453 Method and apparatus for tracking functional states of a web-site and reporting results to web developers |
12/21/2010 | US7856418 Network-extensible reconfigurable media appliance |
12/21/2010 | US7856404 Playlist burning in rights-management context |
12/21/2010 | US7856381 Musical contents storage system having server computer and electronic musical devices |
12/21/2010 | US7856227 Data processing system and method, communication system and method, and charging apparatus and method |
12/21/2010 | US7856168 Recorder/reproducer and content data protection system for preventing unauthorized use of content |
12/21/2010 | US7854504 Digital device incorporating inkjet printhead and platen |
12/21/2010 | CA2428665C Web-based method and system for applying a legally enforceable signature on an electronic document |
12/18/2010 | CA2708000A1 System, apparatus and method for license key permutation |
12/16/2010 | WO2010144879A2 Distribution backbone |
12/16/2010 | WO2010144828A2 Controlling access to software component state |
12/16/2010 | WO2010144735A2 Secure and private backup storage and processing for trusted computing and data services |
12/16/2010 | WO2010144733A2 Content mesh searching |
12/16/2010 | WO2010144718A2 Method and apparatus for preventing unauthorized use of computing devices |
12/16/2010 | WO2010144373A2 Discovery of secure network enclaves |
12/16/2010 | WO2010144207A2 Method and apparatus for processing authentication request message in a social network |
12/16/2010 | WO2010143356A1 Key management method |
12/16/2010 | WO2010143299A1 Information processing device |
12/16/2010 | WO2010143024A1 Protection of secret value using hardware instability |
12/16/2010 | WO2010142938A1 System and method for digital forensic triage |
12/16/2010 | WO2010142622A1 Method for monitoring execution of data processing program instructions in a security module |
12/16/2010 | WO2010142594A1 Anti-virus trusted files database |
12/16/2010 | WO2010142545A1 False alarm detection for malware scanning |
12/16/2010 | WO2010142194A1 Speaker identification method, apparatus and system |
12/16/2010 | WO2010106860A9 Communication system, certificate verifying apparatus, and service providing method |
12/16/2010 | WO2010104285A3 Method for managing content containing a combination of personal intellectual property and advertisements using a public license, and apparatus for same |
12/16/2010 | US20100319072 Hardware Specific Product License Validation |
12/16/2010 | US20100319071 Generic protocol decoder for generic application-level protocol signatures. |
12/16/2010 | US20100319070 Transformative rendering of internet resources |
12/16/2010 | US20100319068 Method and system for performing delegation of resources |
12/16/2010 | US20100319066 Method and apparatus for supporting subscriber identity module features using a dongle |
12/16/2010 | US20100319065 Firewall Configuration In A Base Station |
12/16/2010 | US20100319064 Digital content acquisition system and techniques |
12/16/2010 | US20100319062 Invitation service for multi-device application sessions |
12/16/2010 | US20100319059 Sip digest authentication handle credential management |
12/16/2010 | US20100319055 Radio communication apparatus and radio communication method |
12/16/2010 | US20100319052 Dynamic content preference and behavior sharing between computing devices |
12/16/2010 | US20100319050 Controlling Access to Software Component State |
12/16/2010 | US20100318907 Automatic interactive recording system |
12/16/2010 | US20100318881 Flexible Node Identity for Telecom Nodes |
12/16/2010 | US20100318811 Cryptographic processor |
12/16/2010 | US20100318809 Method and system for controlling presentation of computer readable media on a media storage device |
12/16/2010 | US20100318807 System and method for generating a disguised password based on a real password |
12/16/2010 | US20100318806 Multi-factor authentication with recovery mechanisms |
12/16/2010 | US20100318803 System and Methods for Assignation and Use of Media Content Subscription Service Privileges |