Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
06/30/2010 | EP2201491A1 Apparatus for reconfiguration of a technical system based on security analysis and a corresponding technical decision support system and computer program product |
06/30/2010 | CN101765846A Mobile communication device and method for disabling applications |
06/30/2010 | CN101765845A System and method for digital content distribution |
06/30/2010 | CN101764844A Method, system, and computer-readable recording medium for sharing a result related to contents |
06/30/2010 | CN101764838A Method for detecting Email worm |
06/30/2010 | CN101764818A Member registration method, community service system and portable terminal |
06/30/2010 | CN101764803A Efficient and secure authentication of computing systems |
06/30/2010 | CN101763575A License management apparatus, license management method, and computer readable medium |
06/30/2010 | CN101763494A Verification device with self-destruction protection function |
06/30/2010 | CN101763488A File encryption method and device |
06/30/2010 | CN101763487A File active encryption method based on file notification message |
06/30/2010 | CN101763486A File transparent encryption method for adding end-of-file |
06/30/2010 | CN101763485A Data protecting method |
06/30/2010 | CN101763484A High-security information network platform |
06/30/2010 | CN101763483A Method for connecting network for high-security information system |
06/30/2010 | CN101763482A Method of internet computer software lock and service system thereof |
06/30/2010 | CN101763481A Unknown malicious code detecting method based on LZW compression algorithm |
06/30/2010 | CN101763480A Computer online survey evidence-taking and analysis system and method |
06/30/2010 | CN101763479A Adaptive data loss prevention policies |
06/30/2010 | CN101763478A Enhanced audit method for operation of digital certificate |
06/30/2010 | CN101763477A Signature method of intelligent secret key device |
06/30/2010 | CN101763476A Multilevel security policy conversion method |
06/30/2010 | CN101763475A High-security information network interaction platform |
06/30/2010 | CN101763474A File encryption method combined with access deflection |
06/30/2010 | CN101763473A Variable cipher device and method |
06/30/2010 | CN101763472A Method for controlling time for logging in system by user |
06/30/2010 | CN101763471A Decryption and encryption method and computer system using the same |
06/30/2010 | CN101763470A Method for providing a secure operating environment |
06/30/2010 | CN101763469A Digital copyright management system and implementation method thereof |
06/30/2010 | CN101763399A Document module with folder function |
06/30/2010 | CN101763397A Device and method for processing expanding information in image file |
06/30/2010 | CN101763386A Retrieval method, device and user equipment based on retrieval scope authority |
06/30/2010 | CN101763276A Method for energizing and starting high-security information system |
06/30/2010 | CN101196969B Information processing apparatus, information processing method, and print control system |
06/30/2010 | CA2689339A1 Fingerprinting a data object |
06/29/2010 | US7748051 Contents server, contents receiving apparatus and network system for adding information to digital contents |
06/29/2010 | US7748049 Secure storage device for transfer of digital camera data |
06/29/2010 | US7748046 Security claim transformation with intermediate claims |
06/29/2010 | US7748044 System and method for processing DRM-enabled files |
06/29/2010 | US7748043 Method for authenticating, in particular, software components that can be loaded into a control unit of a motor vehicle |
06/29/2010 | US7748041 Tool, method, and program for supporting system security design/evaluation |
06/29/2010 | US7748038 Method and apparatus for managing computer virus outbreaks |
06/29/2010 | US7748037 Validating a memory type modification attempt |
06/29/2010 | US7748031 Mass storage device with automated credentials loading |
06/29/2010 | US7748029 Authentication query strategizer and results compiler |
06/29/2010 | US7748028 Authentication method, terminal device, relay device and authentication server |
06/29/2010 | US7747935 Method and device for securing the reading of a memory |
06/29/2010 | US7747887 Print engine having authentication device for preventing multi-word memory writing upon power drop |
06/29/2010 | US7747877 Tamper-resistant trusted Java virtual machine and method of using the same |
06/29/2010 | US7747873 Method and apparatus for protecting information and privacy |
06/29/2010 | US7747872 Secure portable electronic reference device |
06/29/2010 | US7747871 Information recording apparatus, information reproducing apparatus, and information distribution system |
06/29/2010 | US7747870 Apparatuses and methods for decrypting encrypted data and locating the decrypted data in a memory space used for execution |
06/29/2010 | US7747869 Process for detecting defective component exchanges |
06/29/2010 | US7747868 Method for inputting a password in a mobile communication terminal |
06/29/2010 | US7747864 DVD identification and managed copy authorization |
06/29/2010 | US7747854 Advanced stream format (ASF) data stream header object protection |
06/29/2010 | US7747791 Program access authorization of peripheral devices via a smart card |
06/29/2010 | US7747646 System having secure access between IC entities |
06/29/2010 | US7747538 Memory card |
06/29/2010 | US7747533 Digital application operating according to aggregation of plurality of licenses |
06/29/2010 | US7747532 Content use management system, content playback apparatus, content use management method, content playback method, and computer program including system date/time information validation |
06/29/2010 | US7747531 Method and system for delivery of secure software license information |
06/29/2010 | US7747476 Transaction tracking, managing, assessment, and auditing data processing system and network |
06/29/2010 | US7747468 Contents consignment sale system and method for networking broadcasting |
06/29/2010 | US7747154 Method of capturing and processing sensed images |
06/29/2010 | US7747044 Fusing multimodal biometrics with quality estimates via a bayesian belief network |
06/29/2010 | US7747012 Process of security of an electronic unit with cryptoprocessor |
06/29/2010 | US7746498 Facsimile delivery system using associated identifiers |
06/29/2010 | CA2499986C Enforcing computer security utilizing an adaptive lattice mechanism |
06/29/2010 | CA2420207C Multiport card |
06/29/2010 | CA2408181C Apparatus and method for assuring the integrity of a multi-user personal information database |
06/29/2010 | CA2279382C Web request broker controlling multiple processes |
06/24/2010 | WO2010071904A2 Security measures for credit card |
06/24/2010 | WO2010071843A1 Systems and methods for facilitating relationship management |
06/24/2010 | WO2010071138A1 Service server |
06/24/2010 | WO2010070959A1 Information processing device, program developing device, program verifying method, and program |
06/24/2010 | WO2010070787A1 Biometric authentication system and method therefor |
06/24/2010 | WO2010070756A1 Information processing device, authentication program, and authentication method |
06/24/2010 | WO2010070724A1 Authentication device, authentication method, and authentication program |
06/24/2010 | WO2010070539A1 Enhanced smart card usage |
06/24/2010 | WO2010070280A1 Protection of computer systems |
06/24/2010 | WO2010069968A1 Method of controlling access to a system by a plurality of users, and system affording access to services |
06/24/2010 | WO2010069904A1 Method and apparatus for protecting vulnerable functions |
06/24/2010 | WO2010069682A1 Method and system for impersonating a user |
06/24/2010 | WO2010069587A1 Method and device for supporting penetration testing of a computer system |
06/24/2010 | WO2010069056A1 System, device and method for secure provision of key credential information |
06/24/2010 | WO2010046436A3 Method and apparatus for secure software platform access |
06/24/2010 | WO2010041467A3 USING TRANSIENT PCRs TO REALISE TRUST IN APPLICATION SPACE OF A SECURE PROCESSING SYSTEM |
06/24/2010 | WO2010036054A3 Method for detecting an arp attack, and system using same |
06/24/2010 | WO2010021518A3 Apparatus and method for using contents information in digital rights management |
06/24/2010 | US20100162414 Digital Rights Management for Differing Domain-Size Restrictions |
06/24/2010 | US20100162413 Two Part Code |
06/24/2010 | US20100162412 Member registration method, community service system, portable terminal, and member invitation processing program |
06/24/2010 | US20100162409 Method for moving rights object and method for managing rights of issuing rights object and system thereof |
06/24/2010 | US20100162408 Methods and apparatus for title structure and management |
06/24/2010 | US20100162407 Apparatus, method, and recording medium |
06/24/2010 | US20100162406 Security aspects of soa |
06/24/2010 | US20100162405 Protecting against polymorphic cheat codes in a video game |
06/24/2010 | US20100162404 Identifying spam avatars in a virtual universe (vu) based upon turing tests |