Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
11/2010
11/04/2010US20100278334 Method and apparatus for minimizing differential power attacks on processors
11/04/2010US20100277763 Information equipment apparatus
11/04/2010US20100277536 Electronic device having essential hardware authentication
11/04/2010US20100277531 Printer having processor for high volume printing
11/04/2010US20100277349 Safety console
11/04/2010US20100277278 Contactless biometric authentication system and authentication method
11/04/2010US20100276483 Retractable electronic pen for sensing coded data
11/04/2010DE102009018941A1 Verfahren und Anordnung zur Zugriffskontrolle auf ein Speichermedium sowie ein derartiges Speichermedium Method and apparatus for controlling access to a storage medium and a storage medium such
11/04/2010CA2759510A1 Out of band system and method for authentication
11/04/2010CA2757176A1 Cross-channel coauthoring consistency
11/04/2010CA2748521A1 Hardware encrypting storage device with physically separable key storage device
11/03/2010EP2247023A1 Stream data management program, method and system
11/03/2010EP2246801A1 Terminal device, information provision system, file access method, and data structure
11/03/2010EP2246800A1 Process distribution system, authentication server, distribution server, and process distribution method
11/03/2010EP2245854A1 Method for displaying multimedia content with variable interference based on receiver/decoder local legislation
11/03/2010EP2245829A2 Method and apparatus for enabling machine to machine communication
11/03/2010EP2245821A2 Authenticating a web page with embedded javascript
11/03/2010EP2245790A1 Authentication mechanisms for wireless networks
11/03/2010EP2245575A1 Personal license server and methods for use thereof
11/03/2010EP2245574A2 Method and system for protecting a virtual community visitor from unauthorized social interaction
11/03/2010EP2245573A1 Method for reading attributes from an id token
11/03/2010EP2245572A2 Detecting rootkits over a storage area network
11/03/2010EP2064647B1 Method of randomly and dynamically checking configuration integrity of a gaming system
11/03/2010EP1520219B1 Security processor with bus configuration
11/03/2010CN201622593U Usbkey
11/03/2010CN201622571U Computer network controller
11/03/2010CN201622570U Computer security card based on memory
11/03/2010CN1979514B Method and apparatus for implementing secure clock of device without internal power source
11/03/2010CN1951059B Personal communication apparatus capable of recording transactions secured with biometric data
11/03/2010CN1902559B Secure porting of information from one device to another
11/03/2010CN1878055B Separation type mass data encryption/decryption device and implementing method therefor
11/03/2010CN1820447B System and method for controlling rights expressions by stake holders of item
11/03/2010CN1708942B Secure implementation and utilization of device-specific security data
11/03/2010CN1682488B Loading data onto an electronic device
11/03/2010CN101878477A Management server, client terminal, terminal management system, terminal management method, program, and recording medium
11/03/2010CN101877848A Mobile terminal, mobile terminal data protection method and mobile terminal monitoring system
11/03/2010CN101877754A Information equipment apparatus
11/03/2010CN101877700A Communicating confidential information between an application and a database
11/03/2010CN101877639A Information processing apparatus, key update method, and program
11/03/2010CN101877246A U disk encryption method
11/03/2010CN101877117A Digital image copyright protection method based on lifting wavelet and singular value decomposition
11/03/2010CN101877043A Management system of application program of virtual machine and method thereof
11/03/2010CN101877042A Password protection method
11/03/2010CN101877041A Information safety protector
11/03/2010CN101877040A High-reliability computing platform
11/03/2010CN101877039A Fault detection technology of server operating system
11/03/2010CN101876855A Input system and input method for PIN code used for USB Key
11/03/2010CN101599112B Method for protecting encrpytion software
11/03/2010CN101499115B Use case diagram detection method based on attack mode
11/03/2010CN101350052B Method and apparatus for discovering malignancy of computer program
11/03/2010CN101310287B Recording/reproducing device, communication device, program, system LSI
11/03/2010CN101295337B System and method of managing file and mobile terminal device
11/03/2010CN101256612B Program protection method and system based on .Net card
11/03/2010CN101236590B Threshold password system based software division protection accomplishing method
11/03/2010CN101009550B Data transfer system for digital copyright management
11/03/2010CN101005361B Server and software protection method and system
11/03/2010CN101001149B Communication device, communication method
11/02/2010US7827616 Decoding apparatus
11/02/2010US7827614 Automatically hiding sensitive information obtainable from a process table
11/02/2010US7827613 System and method for supporting digital rights management in an enhanced Java™ 2 runtime environment
11/02/2010US7827612 Malicious-process-determining method, data processing apparatus and recording medium
11/02/2010US7827611 Malware scanning user interface for wireless devices
11/02/2010US7827607 Enhanced client compliancy using database of security sensor data
11/02/2010US7827606 Reverse engineering access control
11/02/2010US7827605 System and method for preventing detection of a selected process running on a computer
11/02/2010US7827604 Enterprise access configuration
11/02/2010US7827598 Grouped access control list actions
11/02/2010US7827596 Authenticating computed results in a public distributed computing environment
11/02/2010US7827595 Delegated administration of a hosted resource
11/02/2010US7827415 Image processing apparatus capable of authenticating document
11/02/2010US7827414 Content data transmission system and content data transmission method
11/02/2010US7827413 Extraction of a private datum to authenticate an integrated circuit
11/02/2010US7827412 Content presenting method
11/02/2010US7827411 Method, system, and end user device for identifying a sender in a network
11/02/2010US7827410 System and method for identity validation for a regulated transaction
11/02/2010US7827407 Scoped federations
11/02/2010US7827322 Method and apparatus for protecting data during storage/retrieval
11/02/2010US7827318 User enrollment in an e-community
11/02/2010US7827291 System for providing security for ad hoc networked computerized devices
11/02/2010US7827156 Issuing a digital rights management (DRM) license for content based on cross-forest directory information
11/02/2010US7827140 Network-extensible reconfigurable media appliance
11/02/2010US7827113 Method and system for providing a content subscription service
11/02/2010US7827112 Digital signal processing apparatus, digital signal processing method, information center, and data delivery system
11/02/2010US7827111 Recording medium reproducer, cryptocommunication system and program license system
11/02/2010US7827110 Marketing compositions by using a customized sequence of compositions
11/02/2010US7827109 Digital content management system and apparatus
11/02/2010US7826834 Method for downloading software
11/02/2010US7826610 Method to secure an electronic assembly against attacks by error introduction
11/02/2010US7826088 Digital camera having parallel processing controller
11/02/2010US7826078 Image processing device and image processing method
11/02/2010US7826076 System and method for providing secure value-added document network services
11/02/2010CA2494491C Method and apparatus for electro-biometric identity recognition
10/2010
10/28/2010WO2010124024A2 Dynamic placement of replica data
10/28/2010WO2010123843A2 Observable moment encryption
10/28/2010WO2010123623A2 System and method for developing a risk profile for an internet resource
10/28/2010WO2010123586A2 Enterprise information security management software for prediction modeling with interactive graphs
10/28/2010WO2010123385A1 Identifying and tracking users in network communications
10/28/2010WO2010123359A1 System and method for removing illegal content offered via the internet
10/28/2010WO2010123261A2 Network-based malicious code diagnosis method and diagnosis server
10/28/2010WO2010122895A1 Memory control device, semiconductor memory device, memory system, and memory control method