Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
12/2010
12/01/2010EP2255516A2 Method for the temporary personalization of a communication device
12/01/2010EP2255488A2 Authentication method, authentication system, server terminal, client terminal and computer programs therefor
12/01/2010EP2255331A1 Captcha advertising
12/01/2010EP2255318A1 Theft-deterrent system and method
12/01/2010EP2255317A1 Cryptographic system
12/01/2010EP2255316A2 Method and apparatus for enhanced age verification and activity management of internet users
12/01/2010EP2255315A2 Simple non-autonomous peering environment watermarking, authentication and binding
12/01/2010EP2255314A1 Method for authenticating and verifying individuals and units
12/01/2010EP2255294A2 Coexistence tools for synchronizing properties between on-premises customer locations and remote hosting services
12/01/2010EP2255292A2 Trusted field-programmable logic circuitry
12/01/2010EP2255284A1 Method and system for detecting the installation and usage of software in an application virtualization environment
12/01/2010EP1864196B1 Reader with integrated encryption unit
12/01/2010CN201662812U Anti-theft device for notebook computer
12/01/2010CN201662811U Dual-network isolated SSD hard disk
12/01/2010CN201662810U Improved cipher machine with safe operation
12/01/2010CN201662809U Data encryption and decryption conversion device
12/01/2010CN1959831B Transmission/reception system, recording apparatus and method
12/01/2010CN1679102B Key delivery apparatus, terminal apparatus, recording medium and key delivery system
12/01/2010CN1637851B Music apparatus with selective decryption of usable component in loaded composite content
12/01/2010CN101904120A Information exchange device
12/01/2010CN101903891A Defining classification thresholds in template protection systems
12/01/2010CN101903889A Device and method for digital right management
12/01/2010CN101902739A Communication apparatus, mobile terminal, communication system and non-contact communication device
12/01/2010CN101902655A Data transmitting device and method
12/01/2010CN101902481A Real-time monitoring method and device for webpage Trojan horse
12/01/2010CN101902328A Method for verifying user identity by using dynamic passwords
12/01/2010CN101902325A Wireless communication technology-based Key equipment
12/01/2010CN101901447A System and method for providing a digital content service
12/01/2010CN101901325A Copyright protection method
12/01/2010CN101901324A Content consumption method of license center, system and equipment thereof
12/01/2010CN101901323A System filtration method for monitoring loading activity of program module
12/01/2010CN101901322A Systems and methods for detecting obfuscated malware
12/01/2010CN101901321A Method, device and system for defending malicious program for terminal
12/01/2010CN101901320A Data leakage prevention method for electronic book reader
12/01/2010CN101901319A Trusted computing platform and method for verifying trusted chain transfer
12/01/2010CN101901318A Trusted hardware equipment and using method thereof
12/01/2010CN101901317A Growing hierarchical self-organizing maps (GHSOM)-based intrusion detection method for neural network
12/01/2010CN101901316A Data integrity protection method based on Bloom filter
12/01/2010CN101901315A Security isolation and monitoring management method of USB mobile storage media
12/01/2010CN101901314A Detection and minimization of false positives in anti-malware processing
12/01/2010CN101901313A Linux file protection system and method
12/01/2010CN101901312A Password protection method
12/01/2010CN101901311A Management of hardware passwords
12/01/2010CN101901310A Portable multimedia terminal for preventing unauthorized detachment and content access
12/01/2010CN101901309A Safe frame of electronic map
12/01/2010CN101901308A Method for using computer antivirus software
12/01/2010CN101901307A Method and device for detecting whether database is attacked by cross-site script
12/01/2010CN101901306A Network transaction encryption method and dynamic password equipment used by same
12/01/2010CN101901271A Permission management system
12/01/2010CN101901221A Method and device for detecting cross site scripting
12/01/2010CN101901219A Detection method for injection attack of database and system
12/01/2010CN101901160A Packing method and device of version upgrading software package
12/01/2010CN101898463A Anti-tamper device, method of controlling an anti-tamper device, and a fiscal printer using the same
12/01/2010CN101533447B Microprocessor device for providing secure execution environment and method for executing secure code thereof
12/01/2010CN101533444B Device for providing secure execution environment and method for executing secure code thereof
12/01/2010CN101533441B Device for providing secure execution environment and method for executing secure code thereof
12/01/2010CN101520833B Anti-data-leakage system and method based on virtual machine
12/01/2010CN101401104B Digital rights management for retrieving medical data from a server
12/01/2010CN101366040B Management of user access to objects
12/01/2010CN101310284B System and method for managing proprietary data
12/01/2010CN101278296B Improved DRM method and system
12/01/2010CN101238475B Software application security method and system
12/01/2010CN101207485B System and method of unification identification safety authentication for users
12/01/2010CN101124583B Method and apparatus for transferring a data carrier of a first system to a second system
12/01/2010CN101083749B WEB server based TV voting method and system
12/01/2010CN101005557B Image processing apparatus, method of updating color-conversion table, and computer program product
11/2010
11/30/2010USRE41977 Recording and reproducing apparatus and terminal apparatus
11/30/2010US7845014 Method and apparatus for implementing digital rights management
11/30/2010US7845009 Method and apparatus to detect kernel mode rootkit events through virtualization traps
11/30/2010US7845004 Correlating network information and intrusion information to find the entry point of an attack upon a protected computer
11/30/2010US7845003 Techniques for variable security access information
11/30/2010US7845002 Modifying digital rights
11/30/2010US7845000 Method and device for controlling access to a digital document shared in a communication network of the station-to-station type
11/30/2010US7844998 Apparatus and method for autonomic email access control
11/30/2010US7844993 Image processing apparatus, network system, and method of communication
11/30/2010US7844836 Method and apparatus for using an IC to facilitate downloading content
11/30/2010US7844835 Systems and methods for secure transaction management and electronic rights protection
11/30/2010US7844833 Method and system for user protected media pool
11/30/2010US7844832 System and method for data source authentication and protection system using biometrics for openly exchanged computer files
11/30/2010US7844831 Secure memory device for smart cards
11/30/2010US7844828 Method to secure the execution of a program against attacks by radiation or other
11/30/2010US7844827 Method of key generation using biometric features
11/30/2010US7844825 Method of generating a spatial and chromatic password
11/30/2010US7844824 Method of registering sensing device with relay device
11/30/2010US7844823 Interactive security control system with conflict checking
11/30/2010US7844821 System and method for controlled copying and moving of content between devices and domains based on conditional encryption of content key depending on usage state
11/30/2010US7844819 Application authentication system
11/30/2010US7844818 Authentication apparatus and method for home network devices
11/30/2010US7844817 Ensuring quality of service in a communications network
11/30/2010US7844813 Method, system and process for data encryption and transmission
11/30/2010US7844809 Verifying a trusted SMI handler
11/30/2010US7844808 Computer compliance enforcement
11/30/2010US7844792 Game disk layout
11/30/2010US7844718 System and method for automatically configuring remote computer
11/30/2010US7844707 Web service multi-key rate limiting method and system
11/30/2010US7844706 Portable computerized device with network security
11/30/2010US7844625 Managing secured resources in web resources that are accessed by multiple portals
11/30/2010US7844624 Information delivery system, information delivery method, information delivery server, content delivery server and client terminal
11/30/2010US7844572 Remote feature activator feature extraction
11/30/2010US7844549 File sharing methods and systems