Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
12/2010
12/08/2010CN1981289B Methods for intrusion detection, intrusion response and vulnerability remediation across target computer systems
12/08/2010CN1894887B Authorisation method of a transaction
12/08/2010CN1862493B Method for creating unique identification for copies of executable code and management thereof
12/08/2010CN1812463B Function management system, function expansion method and function deletion method of information processing apparatus
12/08/2010CN1736082B Group entry approval system, server apparatus, and client apparatus
12/08/2010CN1714569B Broadcast system, receiver apparatus, broadcast data protection method, and receiving method
12/08/2010CN1682175B Current source for cryptographic processor
12/08/2010CN1633650B 用户认证方法及用户认证系统 The method of user authentication and user authentication system
12/08/2010CN1610296B Method for identifying executable code securely to authentication entity
12/08/2010CN1578218B Reducing network configuration complexity with transparent virtual private networks
12/08/2010CN1457455B Computer system for authenticating recording medium and its use method
12/08/2010CN101911591A Preventing secure data from leaving a network perimeter
12/08/2010CN101911090A Information interchange system and apparatus
12/08/2010CN101911089A Information processing device, disc, information processing method, and program
12/08/2010CN101911088A Method for secure data transfer
12/08/2010CN101911087A Cloud-based movable-component binding
12/08/2010CN101911086A Personal guard
12/08/2010CN101911085A Management engine secured input
12/08/2010CN101911056A Isolation of content by processes in an application
12/08/2010CN101911046A Multi-client collaboration to access and update structured data elements
12/08/2010CN101911023A Delivering secured media using a portable memory device
12/08/2010CN101909050A Location privacy protection method for preventing location-dependent attack
12/08/2010CN101908359A 信息存储媒体 The information storage medium
12/08/2010CN101908167A Device customizing system, device customizing method and authentication agent
12/08/2010CN101908119A Method and device for processing dynamic link library (DLL) file
12/08/2010CN101908118A Anti-virus portable storage device and anti-virus method thereof
12/08/2010CN101908117A Asset confidentiality, integrity and availability (CIA)-based information security incident ranking management method and device
12/08/2010CN101908116A Computer safeguard system and method
12/08/2010CN101908115A Method for realizing software trusted execution based on trusted platform module
12/08/2010CN101908114A Method and system for processing digital copyright assignment, copyright control system and terminal equipment
12/08/2010CN101908113A Authentication method and authentication system
12/08/2010CN101908112A Test method and system of security chip
12/08/2010CN101908111A Method and system for extracting cipher key by using DPA curve polarity
12/08/2010CN101908110A Portable storage device and protection method
12/08/2010CN101908109A Method for issuing, using and protecting controllable component
12/08/2010CN101908108A Write-protection method of NOVELL mirror image of local DOS (Disk Operating System) disc
12/08/2010CN101908107A Electronic device for realizing information confidentiality and method thereof
12/08/2010CN101908106A Memory system with versatile content control
12/08/2010CN101908105A Anti-virus computer
12/08/2010CN101907975A USBKey and method for controlling same
12/08/2010CN101566972B Safety control method of user multi-partitioned memory space access right in embedded system
12/08/2010CN101436242B Method and system for managing interaction between game system and other game systems
12/08/2010CN101420304B Security protection method for electronic document digital signature based on discrete logarithm
12/08/2010CN101369303B Method and system for controlling concurrency user number
12/08/2010CN101316171B Virus precaution method and device
12/08/2010CN101305378B System and method for preventing unauthorized acquisition of information
12/08/2010CN101290643B System for forbidding remote computer boot-strap
12/08/2010CN101276391B Picture and file virus defense system and method
12/08/2010CN101276385B Computer cabinet and computer
12/08/2010CN101248438B A method and apparatus for protecting private information on a user apparatus
12/08/2010CN101213557B Anti-hack protection to restrict installation of operating systems and other software
12/08/2010CN101154254B Computer automatic protection system, method and computer
12/08/2010CN101146261B A realization method for digital protection of electronic media
12/08/2010CN101072414B Method and device for managing and protecting mobile terminal device information
12/08/2010CN101006447B Method for checking electronic access control information, checking device
12/07/2010US7849514 Transparent encryption and access control for mass-storage devices
12/07/2010US7849513 Method and system for authorizing use of software programs
12/07/2010US7849510 System and method for transparent disk encryption
12/07/2010US7849509 Detection of security vulnerabilities in computer programs
12/07/2010US7849504 Network security devices and methods
12/07/2010US7849500 System and method for wireless local area network monitoring and intrusion detection
12/07/2010US7849498 System and user interface supporting context sharing between concurrently operating applications
12/07/2010US7849458 Technique for installing software by producing an access code and installation key
12/07/2010US7849331 Program update method and server
12/07/2010US7849330 Apparatus and method for secure data disposal
12/07/2010US7849326 Method and system for protecting master secrets using smart key devices
12/07/2010US7849325 Device, method, and computer product for matching biological information
12/07/2010US7849323 Password presentation for multimedia devices
12/07/2010US7849322 Method for exchanging a 3D view between a first and a second user
12/07/2010US7849321 Authentication method of random partial digitized path recognition with a challenge built into the path
12/07/2010US7849320 Method and system for establishing a consistent password policy
12/07/2010US7849315 Method for managing operability of on-chip debug capability
12/07/2010US7849310 Switching between secure and non-secure processing modes
12/07/2010US7849307 System and method for establishing historical usage-based hardware trust
12/07/2010US7849304 System and method for on-line diagnostics
12/07/2010US7849301 Providing a user input interface prior to initiation of an operating system
12/07/2010US7849296 Monitoring control for monitoring at least two domains of multi-domain processors
12/07/2010US7849204 Distributed network identity
12/07/2010US7849103 Relationship collaboration system
12/07/2010US7849099 Document management method and apparatus thereof
12/07/2010US7849019 Method and arrangement for managing licenses
12/07/2010US7849017 Enforced seat-based licensing
12/07/2010US7849016 Internet-based data content rental system and method
12/07/2010US7848521 Transmitting and processing protected content
12/07/2010US7848281 Method for selection of an available transmission channel by sending a negative decision value and an additional positive decision value and corresponding base station, mobile terminal and mobile radio network
12/07/2010US7847958 Image forming apparatus and control method for preventing unlimited copying of an original document including a storage device
12/07/2010US7847836 Image processing method using sensed eye position
12/07/2010US7847791 Method of enabling printed interaction with computer software
12/07/2010US7845869 Computer keyboard with internal printer
12/07/2010US7845764 Inkjet printhead having nozzle arrangements with actuator pivot anchors
12/07/2010CA2320506C User preference information data structure having a multiple hierarchical structure and a method and apparatus for providing multimedia information using the same
12/04/2010CA2706147A1 Downloadable security based on certificate status
12/04/2010CA2674834A1 Secure custom application cloud computing architecture
12/02/2010WO2010138614A2 Secure copy and/or playback protection
12/02/2010WO2010138609A2 Using a custom media library to secure digital media content
12/02/2010WO2010138537A1 Enabling multi-level security in a single-level security computing system
12/02/2010WO2010138473A1 A method of efficient secure function evaluation using resettable tamper-resistant hardware tokens
12/02/2010WO2010138466A1 Systems and methods for efficeint detection of fingerprinted data and information
12/02/2010WO2010138449A2 Java store
12/02/2010WO2010138324A1 Account-recovery technique