Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
10/2010
10/27/2010CN101872399A Dynamic digital copyright protection method based on dual identity authentication
10/27/2010CN101872398A Anti-collusion digital fingerprinting method based on code division multiple access and diversity technology
10/27/2010CN101872397A Authorization role succession method
10/27/2010CN101872396A Method for multipoint safety certificate libraries and safety authentication for mobile device
10/27/2010CN101872395A Management system and management method
10/27/2010CN101872394A Method and system for preventing virus infection for movable assess device
10/27/2010CN101872393A Tamper-proof response scheme of Java program
10/27/2010CN101872392A Computer dynamic security certification method
10/27/2010CN101872391A Safety protection system based on three-ring system
10/27/2010CN101872297A Microprocessor and method for limiting access
10/27/2010CN101561853B Image copyright certification management system based on digital watermark technique
10/27/2010CN101551839B A method to respond to TOCTOU attacks against TPM trusted computing in the environment of multiple virtual domains
10/27/2010CN101493870B Credible platform module test device
10/27/2010CN101488173B Method for measuring completeness of credible virtual field start-up files supporting non-delaying machine
10/27/2010CN101419654B Boot file credible verify based on mobile TPM
10/27/2010CN101416195B Computer system to control access to a storage device
10/27/2010CN101404053B Method for preventing repeatedly issuing software permission
10/27/2010CN101393591B Method and system for discovering unknown USB virus
10/27/2010CN101331468B Interrupt controller utilising programmable priority values
10/27/2010CN101233523B Verified computing environment for personal internet communicator
10/27/2010CN101176064B System and method for compensating for resource unavailability in an image processing system
10/27/2010CN101163104B Permission implementing method, equipment and system of sharing switch node
10/27/2010CN101137998B Information managing unit and information managing method
10/26/2010USRE41875 Computer-based network printing system and method for providing a unique identifier to be input by a user
10/26/2010US7823213 Recording apparatus, reproduction apparatus, data processing apparatus, recording and reproduction apparatus and data transmission apparatus and corresponding methods
10/26/2010US7823212 Securely aggregating content on a storage device
10/26/2010US7823211 License moving apparatus and program
10/26/2010US7823210 Rights management using recording definition information (RDI)
10/26/2010US7823209 Information recording medium, information recording medium accessing device, and area setting method
10/26/2010US7823208 Method and system for binding enhanced software features to a persona
10/26/2010US7823207 Privacy preserving data-mining protocol
10/26/2010US7823206 Method and apparatus for establishing a security policy, and method and apparatus of supporting establishment of security policy
10/26/2010US7823205 Conserving computing resources while providing security
10/26/2010US7823204 Method and apparatus for detecting intrusions on a computer system
10/26/2010US7823203 Method and device for detecting computer network intrusions
10/26/2010US7823194 System and methods for identification and tracking of user and/or source initiating communication in a computer network
10/26/2010US7823193 Method and system for ordering, loading and using admission tickets
10/26/2010US7823189 System and method for dynamic role association
10/26/2010US7823187 Communication processing method and system relating to authentication information
10/26/2010US7823135 Software self-defense systems and methods
10/26/2010US7822991 Digital combined apparatus, control method therefor, and digital combined apparatus system
10/26/2010US7822990 Online data encryption and decryption
10/26/2010US7822989 Controlling access to an area
10/26/2010US7822988 Method and system for identity recognition
10/26/2010US7822986 Cryptographic authentication with ephemeral modules
10/26/2010US7822983 Physical device bonding
10/26/2010US7822979 Method and apparatus for secure execution using a secure memory partition
10/26/2010US7822975 Authentication of data transmitted in a digital transmission system
10/26/2010US7822966 Extended trusted computing base
10/26/2010US7822953 Protection of a program against a trap
10/26/2010US7822809 Creating an interactive gaming environment
10/26/2010US7822804 Method for providing personalization service in ubiquitous environment and intelligent gadget thereof
10/26/2010US7822689 Maintaining privacy for transactions performable by a user device having a security module
10/26/2010US7822687 Jukebox with customizable avatar
10/26/2010US7822686 Processing system for recording media content
10/26/2010US7822685 Method and system for digital rights management brokering and digital asset security transcoding
10/26/2010US7822237 Image matching apparatus, image matching method, and image matching program
10/26/2010US7822232 Data security system
10/26/2010US7822209 Methods and systems for key recovery for a token
10/26/2010US7821541 Remote control apparatus using gesture recognition
10/26/2010US7821538 Camera printer operation method with media pull sensing
10/26/2010US7819616 Printer binding assembly with a glue wheel assembly for a printer
10/26/2010CA2407482C Security link management in dynamic networks
10/21/2010WO2010121150A1 System and method for management of wireless devices aboard an aircraft
10/21/2010WO2010121137A2 Enrollment server
10/21/2010WO2010121026A2 Advanced warning
10/21/2010WO2010120573A2 Type system support for memory isolation permissions
10/21/2010WO2010120547A2 Enhancing copyright revenue generation for a copyright protected frame-based work
10/21/2010WO2010120536A2 Apparatus, method and system for securely handling digital transaction documents
10/21/2010WO2010120460A1 Method and apparatus to vet an executable program using a model
10/21/2010WO2010120443A2 Cloud computing as a security layer
10/21/2010WO2010120432A1 System and method for determining trust for sip messages
10/21/2010WO2010120261A1 Method for secure transfer of multiple small messages
10/21/2010WO2010120205A1 Computer architecture with self-contained modules
10/21/2010WO2010120157A2 Method for providing computer security services using a hook, and apparatus and computer readable recording medium for same
10/21/2010WO2010120055A2 System and method for the security of keyboard input data
10/21/2010WO2010119976A1 Anonymous communication system, anonymous communication method, communication control device, terminal device, and communication control program
10/21/2010WO2010119866A1 System and method for preventing falsification of movement distance
10/21/2010WO2010119802A1 Computer system and processing method for computer system
10/21/2010WO2010119784A1 Memory controller, memory control device, memory device, memory information protection system, control method for memory control device, and control method for memory device
10/21/2010WO2010119656A1 Wireless communication apparatus
10/21/2010WO2010119628A1 System and method for environment information aggregation
10/21/2010WO2010119626A1 Nontemporary computer-readable medium wherein id authentication system, and method and program thereof are stored
10/21/2010WO2010119552A1 Service system
10/21/2010WO2010119549A1 Content data reproduction system and recording device
10/21/2010WO2010119427A2 Method and system for deployment of software applications to mobile computing devices
10/21/2010WO2010075921A3 On-demand personal identification method
10/21/2010WO2010066522A9 System and method for secure communication of components within vending machines
10/21/2010WO2010055159A3 Completely automatic public turing test to tell computers and humans apart (captcha) based on a multiple of different captcha methods
10/21/2010US20100269179 Security Client Translation System and Method
10/21/2010US20100269178 Detecting Surreptitious Spyware
10/21/2010US20100269177 Switching network employing a user challenge mechanism to counter denial of service attacks
10/21/2010US20100269176 Content Playback Apparatus and Content Playback Method
10/21/2010US20100269174 Systems and methods for generating a dns query to improve resistance against a dns attack
10/21/2010US20100269173 Method and apparatus for enforcing logical access security policies using physical access control systems
10/21/2010US20100269172 Firewall interface configuration to enable bi-directional voip traversal communications
10/21/2010US20100269169 Methods and arrangements for security support for universal plug and play system
10/21/2010US20100269167 Virtual machine execution program and information processing device
10/21/2010US20100269166 Method and Apparatus for Secure and Reliable Computing
10/21/2010US20100269165 Interacting with internet servers without keyboard