Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
08/26/2010 | WO2010095543A1 Information processor, information processing method, program, and recording medium |
08/26/2010 | WO2010095432A1 Information processing device and information processing method |
08/26/2010 | WO2010095226A1 Application development supporting device, program, and recording medium |
08/26/2010 | WO2010094685A1 System and method for efficient trust preservation in data stores |
08/26/2010 | WO2010094330A1 Wireless identity token |
08/26/2010 | WO2010077792A3 Shared repository of malware data |
08/26/2010 | WO2010076660A3 Removable multimedia memory card and method of use |
08/26/2010 | WO2010071138A8 Service server |
08/26/2010 | WO2010059878A3 System renewability message transport |
08/26/2010 | WO2010059843A3 System and method for run-time attack prevention |
08/26/2010 | WO2010059675A3 Methods and systems for image fingerprinting |
08/26/2010 | US20100218262 Integrated circuit device, information processing apparatus, memory management method for information storage device, mobile terminal apparatus, semiconductor integrated circuit device, and communication method using mobile terminal apparatus |
08/26/2010 | US20100218261 Isolating processes using aspects |
08/26/2010 | US20100218260 Provisions for Validating Content Using a Content Registration Authority |
08/26/2010 | US20100218259 Method, apparatus and computer program for supporting determination on degree of confidentiality of document |
08/26/2010 | US20100218257 Program obfuscation apparatus, program obfuscation method and computer readable medium |
08/26/2010 | US20100218256 System and method of integrating and managing information system assessments |
08/26/2010 | US20100218255 Procedure for the 100% infection free installation/re-installation, patching and maintenance of a personal computers operating system |
08/26/2010 | US20100218253 Web security via response injection |
08/26/2010 | US20100218252 Network protection via embedded controls |
08/26/2010 | US20100218248 Redirection of secure data connection requests |
08/26/2010 | US20100218245 Method, system, and computer program product for managing interchange of enterprise data messages |
08/26/2010 | US20100218244 Generalized method for authenticating subscribers of a service via a graphical user interface or telephone using the same user name and password |
08/26/2010 | US20100218243 Methods and systems for secure gate file deployment associated with provisioning |
08/26/2010 | US20100218240 Authentication system and method |
08/26/2010 | US20100218238 Method and system for access control by using an advanced command interface server |
08/26/2010 | US20100218236 Method and apparatus to establish routes based on the trust scores of routers within an ip routing domain |
08/26/2010 | US20100218234 Method and apparatus for limiting operation of digital rights management module |
08/26/2010 | US20100218233 Techniques for credential auditing |
08/26/2010 | US20100218229 Method for delivering non-anonymous user metadata using an soap operation in tv anytime metadata service |
08/26/2010 | US20100218201 Method and an apparatus to implement secure system call wrappers |
08/26/2010 | US20100218182 Software protection using an installation product having an entitlement file |
08/26/2010 | US20100218104 System and method for reactive and deliberative service level management (slm) |
08/26/2010 | US20100218012 Methods and systems for providing a wireless security service and/or a wireless technical support service for personal computers |
08/26/2010 | US20100218007 Information processing apparatus, system and computer readable medium for the same |
08/26/2010 | US20100217999 Method and system for secure authentication |
08/26/2010 | US20100217994 Trusted Infrastructure Support Systems, Methods and Techniques for Secure Electronic Commerce, Electronic Transactions, Commerce Process Control and Automation, Distributed Computing, And Rights Management |
08/26/2010 | US20100217990 Communication method, relay server device, program, and recording medium |
08/26/2010 | US20100217987 Document Security Management System |
08/26/2010 | US20100217983 Archive system, management apparatus, and control method |
08/26/2010 | US20100217980 Communication Control System, Mobile Communication Terminal and Computer Program |
08/26/2010 | US20100217976 Method and apparatus for importing content |
08/26/2010 | US20100217974 Content management apparatus with rights |
08/26/2010 | US20100217970 Encrypting operating system |
08/26/2010 | US20100217871 System and method for using a portable electronic device as a secure virtual mass storage device over a network |
08/26/2010 | US20100217862 Supplying notifications related to supply and consumption of user context data |
08/26/2010 | US20100217850 Systems and methods for extending security platforms to cloud-based networks |
08/26/2010 | US20100217837 Multi-services application gateway and system employing the same |
08/26/2010 | US20100217780 System, Apparatus and Method for Creating Service Accounts and Configuring Devices for Use Therewith |
08/26/2010 | US20100217716 Method and apparatus for restricting access to an electronic product release within an electronic software delivery system |
08/26/2010 | US20100217711 System and method for facilitating a private commodity resource transaction |
08/26/2010 | US20100217708 Superior identification system using numbers |
08/26/2010 | US20100216525 Methods, Systems And Storage Media To Remotely Control A Wireless Unit |
08/26/2010 | US20100215270 System and Methods for Automatically Accessing a Web Site on Behalf of a Client |
08/26/2010 | US20100215181 Method for importing rights object and rights issuer |
08/26/2010 | US20100215180 Replacement of keys |
08/26/2010 | US20100215175 Methods and systems for stripe blind encryption |
08/26/2010 | US20100215173 Data security |
08/26/2010 | US20100214367 Printhead having nozzles with stacked capacitive actuators |
08/26/2010 | US20100214366 Printhead with double omega-shaped heater elements |
08/26/2010 | US20100214217 Theme changeable mouse for automatically matching network communities |
08/26/2010 | US20100213878 Method and apparatus for reducing optical emissions in an integrated circuit |
08/26/2010 | US20100213251 System for Automatic Image Association |
08/26/2010 | DE202009006642U1 Vorrichtung zur Berechtigungsüberprüfung Apparatus for authentication |
08/26/2010 | DE102009010605A1 Verfahren und Lizenzserver zum Erzeugen einer mobilen Benutzungsberechtigung für eine Nutzung einer Anwendung ausserhalb einer lokalen Umgebung Procedures and licensing server for creating a mobile user authorization for use of an application outside a local environment |
08/26/2010 | CA2693710A1 System and method for capturing user inputs in electronic forms |
08/26/2010 | CA2692416A1 Authentication using a wireless mobile communication device |
08/25/2010 | EP2222104A2 Information exchange apparatus, method and managing system applied thereto |
08/25/2010 | EP2222082A1 Methods and devices for digital content protection |
08/25/2010 | EP2222081A1 Methods and devices for digital content protection |
08/25/2010 | EP2222014A1 A trusted network acces control system based ternery equal identification |
08/25/2010 | EP2221742A1 Authenticated communication between security devices |
08/25/2010 | EP2221741A1 License management system, license management computer, license management method, and license management program embodied on computer readable medium |
08/25/2010 | EP2220840A1 Method of authentication of users in data processing systems |
08/25/2010 | EP2220807A1 System and method for controlling features on a device |
08/25/2010 | EP2220679A1 Embedded package security tamper mesh |
08/25/2010 | EP2220634A1 Method and device for detecting whether a vehicle has exceeded a speed limit |
08/25/2010 | EP2220625A1 Method for the reliable and targeted suppression of alarms in a monitoring and control centre |
08/25/2010 | EP2220584A2 On-line authorization in access environment |
08/25/2010 | EP2220583A2 Electronic system and method of operating an electronic system |
08/25/2010 | EP2220582A1 Interaction between secured and unsecured environments |
08/25/2010 | EP2220581A2 Collaborative authoring modes |
08/25/2010 | EP2220563A2 Intelligent controller system and method for smart card memory modules |
08/25/2010 | EP1805571B1 Verifying binding of an initial trusted device to a secured processing system |
08/25/2010 | EP1579236B1 Gps receiver with encrypted data transmission |
08/25/2010 | EP1135729B1 Screening protected material |
08/25/2010 | CN1964359B Method and system for remotely verifying integrity of a system |
08/25/2010 | CN1892680B Data transmission-reception system, contactless IC chip, mobile terminal, information processing method, and program |
08/25/2010 | CN1858738B Method and device for access data bank |
08/25/2010 | CN1523811B System and method for user authentication at the level of the access network during a connection of the user to the internet |
08/25/2010 | CN101816149A Server certificate issuance system |
08/25/2010 | CN101816007A Moving image data checking system, moving image database creating method, and registering system and program for registering moving image data in moving image database |
08/25/2010 | CN101816006A Security policy validation for web services |
08/25/2010 | CN101816005A Security method of keyboard input by directly controling the keyboard controler |
08/25/2010 | CN101816004A Secure policy differentiation by secure kernel design |
08/25/2010 | CN101816003A Memory device using the time from a trusted host device and method for use therewith |
08/25/2010 | CN101815291A Method and system for logging on client automatically |
08/25/2010 | CN101815202A Methods and devices for digital content protection |
08/25/2010 | CN101815074A User authentication method and user authentication system |
08/25/2010 | CN101814124A Java-based method for enhancing software security |