Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
12/2010
12/16/2010US20100318802 Systems and methods for establishing a secure communication channel using a browser component
12/16/2010US20100318801 Method and system for protecting real estate from fradulent title changes
12/16/2010US20100318798 Message handling at a mobile device
12/16/2010US20100318785 Virtual air gap - vag system
12/16/2010US20100318783 Service activation using algorithmically defined key
12/16/2010US20100318781 Secure boot with optional components method
12/16/2010US20100318677 Content protection continuity through authorized chains of components
12/16/2010US20100318656 Multiple-channel, short-range networking between wireless devices
12/16/2010US20100318636 System and method for providing mobile service
12/16/2010US20100318627 Method for integrating plug-in security panel module with network interface middleware
12/16/2010US20100318581 Information life-cycle management system, information management server apparatus, electronic media control apparatus, and storage medium
12/16/2010US20100318569 Populating a cache system based on privileges
12/16/2010US20100318434 Transaction tracking, managing, assessment, and auditing data processing system and network
12/16/2010US20100317323 System, method, and apparatus for proximity-based authentication for managing personal data
12/16/2010US20100316260 Biometric data encryption
12/16/2010US20100315516 Camera unit incoporating program script scanner
12/16/2010US20100315359 Terminal and control method thereof
12/16/2010US20100315201 Biometrics authentication method and client terminal and authentication server used for biometrics authentication
12/16/2010DE102004063964B4 Computersystem Computer system
12/16/2010CA2761358A1 Secure and private backup storage and processing for trusted computing and data services
12/15/2010EP2262259A1 Method for monitoring execution of data processing program instructions in a security module
12/15/2010EP2262200A2 Data bus communication
12/15/2010EP2262165A1 User generated content registering method, apparatus and system
12/15/2010EP2262164A1 Secure data transfer
12/15/2010EP2261907A1 Content distributing system and recording and reproducing apparatus
12/15/2010EP2261832A1 Information processing device
12/15/2010EP2261831A2 Biometrics authentication method and client terminal and authentication server used for biometrics authentication
12/15/2010EP2261830A1 Authentication method, authentication device, program, and recording medium
12/15/2010EP2261829A2 System for controlling the distribution and use of digital works
12/15/2010EP2261796A2 System for managing program stored in storage block of mobile terminal
12/15/2010EP2261789A2 Security method and system for storage subsystem
12/15/2010EP2260626A2 Image-based man-in-the-middle protection in numeric comparison association models
12/15/2010EP2260433A1 Mehtod and communication device for protecting a user's privacy
12/15/2010EP2260432A1 Receiving input data
12/15/2010EP2260431A1 Method for verifying the certification of a recording apparatus
12/15/2010EP2260430A2 License auditing for distributed applications
12/15/2010EP2260429A2 Sketch-based password authentication
12/15/2010EP2260428A1 Energy supply system with a protected solar module
12/15/2010EP2260427A1 Flexible node identity for telecom nodes
12/15/2010EP2260426A2 Multi-tier security event correlation and mitigation
12/15/2010EP2260425A1 Distribution of storage area network encryption keys across data centers
12/15/2010EP2260424A1 Digital rights management of streaming captured content based on criteria regulating a sequence of elements
12/15/2010EP2260397A1 Disk drive data encryption
12/15/2010EP2260386A1 Binding a cryptographic module to a platform
12/15/2010EP2260384A1 Efficiently correlating nominally incompatible types
12/15/2010EP2260381A1 Low-cost security using well-defined messages
12/15/2010EP2078272B1 Protecting secret information in a programmed electronic device
12/15/2010EP1590917B1 A system and a method for controlling use by applications of proprietary resources within a secure telematics system in a vehicle
12/15/2010EP1430683B1 Calculation of identifier codes
12/15/2010EP1181632B1 Data event logging in computing platform
12/15/2010CN201673509U Core middleware for mobile phone RFID-SIM card and CPU card security authentication system
12/15/2010CN201673508U Double-network physical isolation device
12/15/2010CN1666279B Method and apparatus to reproduce the mark-up document according to a parental level
12/15/2010CN1525373B Reviewing cached user-group information in connection with issuing a digital rights management (DRM) license for content
12/15/2010CN101919202A Information distribution system and program for the same
12/15/2010CN101918985A Contactless biometric authentication system and authentication method
12/15/2010CN101918969A System and method for providing digital content in a device
12/15/2010CN101918962A Information life cycle management system, information management server, electronic medium control device, and program
12/15/2010CN101918954A Method for reading attributes from an ID token
12/15/2010CN101918953A Hierarchization of cryptographic keys in an electronic circuit
12/15/2010CN101918952A Electronic system and method of operating an electronic system
12/15/2010CN101917275A Safe and classified multiple locking method for wireless sensor nodes
12/15/2010CN101917274A System, apparatus, and method for authentication
12/15/2010CN101917269A Signature information processing method and device
12/15/2010CN101916415A On-demand service method for software license in cloud computing platform
12/15/2010CN101916350A Method and system for protecting terminal reading contents
12/15/2010CN101916349A File access control method based on filter driving, system and filer manager
12/15/2010CN101916348A Method and system for safely guiding operating system of user
12/15/2010CN101916347A Power supply manager of computer
12/15/2010CN101916346A Electronic device capable of preventing piracy and anti-piracy method thereof
12/15/2010CN101916345A Data protective device
12/15/2010CN101916344A Method and system for verifying legality of software protection device
12/15/2010CN101916343A Information processing system, information processor, image forming apparatus, and information processing method
12/15/2010CN101916342A Secure mobile storage device and method for realizing secure data exchange by using same
12/15/2010CN101916341A Method and system for safely executing RSS (Really Simple Syndication) service
12/15/2010CN101916340A Static detection method of incredible variables in PHP (Professional Hypertext Preprocessor) language Web application
12/15/2010CN101916339A Method and device for inquiring authority
12/15/2010CN101414304B Method for analyzing Windows system physical internal memory based on K P C R structure
12/15/2010CN101187965B Filtering of access to data object
12/15/2010CN101185080B Playback device for playing digital content from devices in wireless communication
12/15/2010CN101027686B Charging information generating apparatus, charging information generating process program, consideration information generating apparatus, consideration information generating process program
12/14/2010US7854013 Method for electronic data and signature collection, and system
12/14/2010US7854011 Method of managing digital rights
12/14/2010US7854009 Method of securing access to IP LANs
12/14/2010US7854005 System and method for generating fictitious content for a computer
12/14/2010US7854004 Computer immune system and method for detecting unwanted code in a computer system
12/14/2010US7854002 Pattern matching for spyware detection
12/14/2010US7853998 Firewall propagation
12/14/2010US7853994 Computer system and method of updating authentication information of computer system
12/14/2010US7853806 Original, data circulation method, system, apparatus, and computer readable medium
12/14/2010US7853803 System and method for thwarting buffer overflow attacks using encrypted process pointers
12/14/2010US7853798 Program tamper detecting apparatus, method for program tamper detection, and program for program tamper detection
12/14/2010US7853797 Information processing method and information processing apparatus
12/14/2010US7853790 Enhancement to volume license keys
12/14/2010US7853782 Secure intermediation system and method
12/14/2010US7853704 Content acquisition method
12/14/2010US7853613 Access controller using tree-structured data
12/14/2010US7853565 Method and apparatus for efficient propagation of large datasets under failure conditions
12/14/2010US7853532 Information processing apparatus and method, and data communication system and method
12/14/2010US7853531 Method and apparatus for supporting multiple trust zones in a digital rights management system