Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
12/16/2010 | US20100318802 Systems and methods for establishing a secure communication channel using a browser component |
12/16/2010 | US20100318801 Method and system for protecting real estate from fradulent title changes |
12/16/2010 | US20100318798 Message handling at a mobile device |
12/16/2010 | US20100318785 Virtual air gap - vag system |
12/16/2010 | US20100318783 Service activation using algorithmically defined key |
12/16/2010 | US20100318781 Secure boot with optional components method |
12/16/2010 | US20100318677 Content protection continuity through authorized chains of components |
12/16/2010 | US20100318656 Multiple-channel, short-range networking between wireless devices |
12/16/2010 | US20100318636 System and method for providing mobile service |
12/16/2010 | US20100318627 Method for integrating plug-in security panel module with network interface middleware |
12/16/2010 | US20100318581 Information life-cycle management system, information management server apparatus, electronic media control apparatus, and storage medium |
12/16/2010 | US20100318569 Populating a cache system based on privileges |
12/16/2010 | US20100318434 Transaction tracking, managing, assessment, and auditing data processing system and network |
12/16/2010 | US20100317323 System, method, and apparatus for proximity-based authentication for managing personal data |
12/16/2010 | US20100316260 Biometric data encryption |
12/16/2010 | US20100315516 Camera unit incoporating program script scanner |
12/16/2010 | US20100315359 Terminal and control method thereof |
12/16/2010 | US20100315201 Biometrics authentication method and client terminal and authentication server used for biometrics authentication |
12/16/2010 | DE102004063964B4 Computersystem Computer system |
12/16/2010 | CA2761358A1 Secure and private backup storage and processing for trusted computing and data services |
12/15/2010 | EP2262259A1 Method for monitoring execution of data processing program instructions in a security module |
12/15/2010 | EP2262200A2 Data bus communication |
12/15/2010 | EP2262165A1 User generated content registering method, apparatus and system |
12/15/2010 | EP2262164A1 Secure data transfer |
12/15/2010 | EP2261907A1 Content distributing system and recording and reproducing apparatus |
12/15/2010 | EP2261832A1 Information processing device |
12/15/2010 | EP2261831A2 Biometrics authentication method and client terminal and authentication server used for biometrics authentication |
12/15/2010 | EP2261830A1 Authentication method, authentication device, program, and recording medium |
12/15/2010 | EP2261829A2 System for controlling the distribution and use of digital works |
12/15/2010 | EP2261796A2 System for managing program stored in storage block of mobile terminal |
12/15/2010 | EP2261789A2 Security method and system for storage subsystem |
12/15/2010 | EP2260626A2 Image-based man-in-the-middle protection in numeric comparison association models |
12/15/2010 | EP2260433A1 Mehtod and communication device for protecting a user's privacy |
12/15/2010 | EP2260432A1 Receiving input data |
12/15/2010 | EP2260431A1 Method for verifying the certification of a recording apparatus |
12/15/2010 | EP2260430A2 License auditing for distributed applications |
12/15/2010 | EP2260429A2 Sketch-based password authentication |
12/15/2010 | EP2260428A1 Energy supply system with a protected solar module |
12/15/2010 | EP2260427A1 Flexible node identity for telecom nodes |
12/15/2010 | EP2260426A2 Multi-tier security event correlation and mitigation |
12/15/2010 | EP2260425A1 Distribution of storage area network encryption keys across data centers |
12/15/2010 | EP2260424A1 Digital rights management of streaming captured content based on criteria regulating a sequence of elements |
12/15/2010 | EP2260397A1 Disk drive data encryption |
12/15/2010 | EP2260386A1 Binding a cryptographic module to a platform |
12/15/2010 | EP2260384A1 Efficiently correlating nominally incompatible types |
12/15/2010 | EP2260381A1 Low-cost security using well-defined messages |
12/15/2010 | EP2078272B1 Protecting secret information in a programmed electronic device |
12/15/2010 | EP1590917B1 A system and a method for controlling use by applications of proprietary resources within a secure telematics system in a vehicle |
12/15/2010 | EP1430683B1 Calculation of identifier codes |
12/15/2010 | EP1181632B1 Data event logging in computing platform |
12/15/2010 | CN201673509U Core middleware for mobile phone RFID-SIM card and CPU card security authentication system |
12/15/2010 | CN201673508U Double-network physical isolation device |
12/15/2010 | CN1666279B Method and apparatus to reproduce the mark-up document according to a parental level |
12/15/2010 | CN1525373B Reviewing cached user-group information in connection with issuing a digital rights management (DRM) license for content |
12/15/2010 | CN101919202A Information distribution system and program for the same |
12/15/2010 | CN101918985A Contactless biometric authentication system and authentication method |
12/15/2010 | CN101918969A System and method for providing digital content in a device |
12/15/2010 | CN101918962A Information life cycle management system, information management server, electronic medium control device, and program |
12/15/2010 | CN101918954A Method for reading attributes from an ID token |
12/15/2010 | CN101918953A Hierarchization of cryptographic keys in an electronic circuit |
12/15/2010 | CN101918952A Electronic system and method of operating an electronic system |
12/15/2010 | CN101917275A Safe and classified multiple locking method for wireless sensor nodes |
12/15/2010 | CN101917274A System, apparatus, and method for authentication |
12/15/2010 | CN101917269A Signature information processing method and device |
12/15/2010 | CN101916415A On-demand service method for software license in cloud computing platform |
12/15/2010 | CN101916350A Method and system for protecting terminal reading contents |
12/15/2010 | CN101916349A File access control method based on filter driving, system and filer manager |
12/15/2010 | CN101916348A Method and system for safely guiding operating system of user |
12/15/2010 | CN101916347A Power supply manager of computer |
12/15/2010 | CN101916346A Electronic device capable of preventing piracy and anti-piracy method thereof |
12/15/2010 | CN101916345A Data protective device |
12/15/2010 | CN101916344A Method and system for verifying legality of software protection device |
12/15/2010 | CN101916343A Information processing system, information processor, image forming apparatus, and information processing method |
12/15/2010 | CN101916342A Secure mobile storage device and method for realizing secure data exchange by using same |
12/15/2010 | CN101916341A Method and system for safely executing RSS (Really Simple Syndication) service |
12/15/2010 | CN101916340A Static detection method of incredible variables in PHP (Professional Hypertext Preprocessor) language Web application |
12/15/2010 | CN101916339A Method and device for inquiring authority |
12/15/2010 | CN101414304B Method for analyzing Windows system physical internal memory based on K P C R structure |
12/15/2010 | CN101187965B Filtering of access to data object |
12/15/2010 | CN101185080B Playback device for playing digital content from devices in wireless communication |
12/15/2010 | CN101027686B Charging information generating apparatus, charging information generating process program, consideration information generating apparatus, consideration information generating process program |
12/14/2010 | US7854013 Method for electronic data and signature collection, and system |
12/14/2010 | US7854011 Method of managing digital rights |
12/14/2010 | US7854009 Method of securing access to IP LANs |
12/14/2010 | US7854005 System and method for generating fictitious content for a computer |
12/14/2010 | US7854004 Computer immune system and method for detecting unwanted code in a computer system |
12/14/2010 | US7854002 Pattern matching for spyware detection |
12/14/2010 | US7853998 Firewall propagation |
12/14/2010 | US7853994 Computer system and method of updating authentication information of computer system |
12/14/2010 | US7853806 Original, data circulation method, system, apparatus, and computer readable medium |
12/14/2010 | US7853803 System and method for thwarting buffer overflow attacks using encrypted process pointers |
12/14/2010 | US7853798 Program tamper detecting apparatus, method for program tamper detection, and program for program tamper detection |
12/14/2010 | US7853797 Information processing method and information processing apparatus |
12/14/2010 | US7853790 Enhancement to volume license keys |
12/14/2010 | US7853782 Secure intermediation system and method |
12/14/2010 | US7853704 Content acquisition method |
12/14/2010 | US7853613 Access controller using tree-structured data |
12/14/2010 | US7853565 Method and apparatus for efficient propagation of large datasets under failure conditions |
12/14/2010 | US7853532 Information processing apparatus and method, and data communication system and method |
12/14/2010 | US7853531 Method and apparatus for supporting multiple trust zones in a digital rights management system |