| Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
|---|
| 12/22/2010 | CN101925920A Server certificate issuing system and person authentication method |
| 12/22/2010 | CN101925913A Method and system for encrypted file access |
| 12/22/2010 | CN101925912A Piracy prevention in digital rights management systems |
| 12/22/2010 | CN101925911A Server, system, and content display control method |
| 12/22/2010 | CN101925910A License authentication system and authentication method |
| 12/22/2010 | CN101925909A Shared secret used between keyboard and application |
| 12/22/2010 | CN101925908A Secure boot with optional components method |
| 12/22/2010 | CN101925907A Dataspace protection utilizing virtual private networks on multi-node computer system |
| 12/22/2010 | CN101925906A Method of masking attainment of end of lifetime of electronic device and device comprising corresponding control module |
| 12/22/2010 | CN101925905A Identification and verification of unknown document according to eigen image process |
| 12/22/2010 | CN101925904A Document verification using dynamic document identification framework |
| 12/22/2010 | CN101925886A Information updating device and integrated circuit thereof, information updating method, and recording device and integrated circuit thereof |
| 12/22/2010 | CN101924794A Internet based method for monitoring total software operation quantity in real time |
| 12/22/2010 | CN101924766A Double-network communication method |
| 12/22/2010 | CN101924761A Method for detecting malicious program according to white list |
| 12/22/2010 | CN101924750A Biometrics authentication method and client terminal and authentication server used for biometrics authentication |
| 12/22/2010 | CN101923678A Data security protection method of enterprise management software |
| 12/22/2010 | CN101923621A Data reading protection method |
| 12/22/2010 | CN101923620A Computer readable medium, method for controlling execution of processing, and information processing apparatus |
| 12/22/2010 | CN101923619A Password key camouflage system and method |
| 12/22/2010 | CN101923618A Hidden Markov model based method for detecting assembler instruction level vulnerability |
| 12/22/2010 | CN101923617A Cloud-based sample database dynamic maintaining method |
| 12/22/2010 | CN101923616A Service provision device in copyright protection, user terminal and copyright protection method |
| 12/22/2010 | CN101923615A Grey fuzzy comprehensive evaluation-based trust quantization method |
| 12/22/2010 | CN101923614A Method for realizing function control on mobile terminal |
| 12/22/2010 | CN101923613A Authentication system |
| 12/22/2010 | CN101923612A Decision-making computer |
| 12/22/2010 | CN101923611A Analysis computer |
| 12/22/2010 | CN101923610A Data protection method and system |
| 12/22/2010 | CN101923609A Computer network security protection method and system |
| 12/22/2010 | CN101923608A Digital content online reading method, device and system and copyright protection method |
| 12/22/2010 | CN101615160B Security system for code dump protection and security method thereof |
| 12/22/2010 | CN101510826B DDoS aggression detection method based on visualization |
| 12/22/2010 | CN101464934B Mutual binding and authenticating method for computer platform and storage device, and computer thereof |
| 12/22/2010 | CN101425117B Method and device for constructing SQL statement |
| 12/22/2010 | CN101414335B Test system for credible PC trust chain based on minimum test collection and test method |
| 12/22/2010 | CN101388055B Program operation characteristic extracting method for detecting vulnerability model |
| 12/22/2010 | CN101281571B Method for defending unknown virus program |
| 12/22/2010 | CN101236535B Hard disk encryption method based on optical disk under Window environment |
| 12/22/2010 | CN101236500B Method for embedding inner core drive program in Window operation system by optical disk start-up |
| 12/22/2010 | CN101194266B Method, device, system and device for protected clock management based upon a non-trusted persistent time source |
| 12/22/2010 | CN101147154B Methods, devices and data structures for trusted data |
| 12/22/2010 | CN101093533B Discovering software code subject to licenses |
| 12/22/2010 | CN101057288B Bonding contents on separate storage media |
| 12/22/2010 | CN101008925B Storage of identification code and production method therefor |
| 12/21/2010 | US7856662 Denying unauthorized access to a private data processing network |
| 12/21/2010 | US7856660 System for efficiently handling cryptographic messages containing nonce values |
| 12/21/2010 | US7856658 Method and system for incorporating trusted metadata in a computing environment |
| 12/21/2010 | US7856652 Access control management method, access control management system and terminal device with access control management function |
| 12/21/2010 | US7856560 Digital information recording apparatus and recording/reproducing apparatus |
| 12/21/2010 | US7856558 Biometric verification and duress detection system and method |
| 12/21/2010 | US7856555 Write accessibility for electronic paper |
| 12/21/2010 | US7856553 System and method for platform activation |
| 12/21/2010 | US7856477 Method and system for image verification to prevent messaging abuse |
| 12/21/2010 | US7856468 Server reservation method, reservation control apparatus and program storage medium |
| 12/21/2010 | US7856453 Method and apparatus for tracking functional states of a web-site and reporting results to web developers |
| 12/21/2010 | US7856418 Network-extensible reconfigurable media appliance |
| 12/21/2010 | US7856404 Playlist burning in rights-management context |
| 12/21/2010 | US7856381 Musical contents storage system having server computer and electronic musical devices |
| 12/21/2010 | US7856227 Data processing system and method, communication system and method, and charging apparatus and method |
| 12/21/2010 | US7856168 Recorder/reproducer and content data protection system for preventing unauthorized use of content |
| 12/21/2010 | US7854504 Digital device incorporating inkjet printhead and platen |
| 12/21/2010 | CA2428665C Web-based method and system for applying a legally enforceable signature on an electronic document |
| 12/18/2010 | CA2708000A1 System, apparatus and method for license key permutation |
| 12/16/2010 | WO2010144879A2 Distribution backbone |
| 12/16/2010 | WO2010144828A2 Controlling access to software component state |
| 12/16/2010 | WO2010144735A2 Secure and private backup storage and processing for trusted computing and data services |
| 12/16/2010 | WO2010144733A2 Content mesh searching |
| 12/16/2010 | WO2010144718A2 Method and apparatus for preventing unauthorized use of computing devices |
| 12/16/2010 | WO2010144373A2 Discovery of secure network enclaves |
| 12/16/2010 | WO2010144207A2 Method and apparatus for processing authentication request message in a social network |
| 12/16/2010 | WO2010143356A1 Key management method |
| 12/16/2010 | WO2010143299A1 Information processing device |
| 12/16/2010 | WO2010143024A1 Protection of secret value using hardware instability |
| 12/16/2010 | WO2010142938A1 System and method for digital forensic triage |
| 12/16/2010 | WO2010142622A1 Method for monitoring execution of data processing program instructions in a security module |
| 12/16/2010 | WO2010142594A1 Anti-virus trusted files database |
| 12/16/2010 | WO2010142545A1 False alarm detection for malware scanning |
| 12/16/2010 | WO2010142194A1 Speaker identification method, apparatus and system |
| 12/16/2010 | WO2010106860A9 Communication system, certificate verifying apparatus, and service providing method |
| 12/16/2010 | WO2010104285A3 Method for managing content containing a combination of personal intellectual property and advertisements using a public license, and apparatus for same |
| 12/16/2010 | US20100319072 Hardware Specific Product License Validation |
| 12/16/2010 | US20100319071 Generic protocol decoder for generic application-level protocol signatures. |
| 12/16/2010 | US20100319070 Transformative rendering of internet resources |
| 12/16/2010 | US20100319068 Method and system for performing delegation of resources |
| 12/16/2010 | US20100319066 Method and apparatus for supporting subscriber identity module features using a dongle |
| 12/16/2010 | US20100319065 Firewall Configuration In A Base Station |
| 12/16/2010 | US20100319064 Digital content acquisition system and techniques |
| 12/16/2010 | US20100319062 Invitation service for multi-device application sessions |
| 12/16/2010 | US20100319059 Sip digest authentication handle credential management |
| 12/16/2010 | US20100319055 Radio communication apparatus and radio communication method |
| 12/16/2010 | US20100319052 Dynamic content preference and behavior sharing between computing devices |
| 12/16/2010 | US20100319050 Controlling Access to Software Component State |
| 12/16/2010 | US20100318907 Automatic interactive recording system |
| 12/16/2010 | US20100318881 Flexible Node Identity for Telecom Nodes |
| 12/16/2010 | US20100318811 Cryptographic processor |
| 12/16/2010 | US20100318809 Method and system for controlling presentation of computer readable media on a media storage device |
| 12/16/2010 | US20100318807 System and method for generating a disguised password based on a real password |
| 12/16/2010 | US20100318806 Multi-factor authentication with recovery mechanisms |
| 12/16/2010 | US20100318803 System and Methods for Assignation and Use of Media Content Subscription Service Privileges |