Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
06/2010
06/30/2010EP2201491A1 Apparatus for reconfiguration of a technical system based on security analysis and a corresponding technical decision support system and computer program product
06/30/2010CN101765846A Mobile communication device and method for disabling applications
06/30/2010CN101765845A System and method for digital content distribution
06/30/2010CN101764844A Method, system, and computer-readable recording medium for sharing a result related to contents
06/30/2010CN101764838A Method for detecting Email worm
06/30/2010CN101764818A Member registration method, community service system and portable terminal
06/30/2010CN101764803A Efficient and secure authentication of computing systems
06/30/2010CN101763575A License management apparatus, license management method, and computer readable medium
06/30/2010CN101763494A Verification device with self-destruction protection function
06/30/2010CN101763488A File encryption method and device
06/30/2010CN101763487A File active encryption method based on file notification message
06/30/2010CN101763486A File transparent encryption method for adding end-of-file
06/30/2010CN101763485A Data protecting method
06/30/2010CN101763484A High-security information network platform
06/30/2010CN101763483A Method for connecting network for high-security information system
06/30/2010CN101763482A Method of internet computer software lock and service system thereof
06/30/2010CN101763481A Unknown malicious code detecting method based on LZW compression algorithm
06/30/2010CN101763480A Computer online survey evidence-taking and analysis system and method
06/30/2010CN101763479A Adaptive data loss prevention policies
06/30/2010CN101763478A Enhanced audit method for operation of digital certificate
06/30/2010CN101763477A Signature method of intelligent secret key device
06/30/2010CN101763476A Multilevel security policy conversion method
06/30/2010CN101763475A High-security information network interaction platform
06/30/2010CN101763474A File encryption method combined with access deflection
06/30/2010CN101763473A Variable cipher device and method
06/30/2010CN101763472A Method for controlling time for logging in system by user
06/30/2010CN101763471A Decryption and encryption method and computer system using the same
06/30/2010CN101763470A Method for providing a secure operating environment
06/30/2010CN101763469A Digital copyright management system and implementation method thereof
06/30/2010CN101763399A Document module with folder function
06/30/2010CN101763397A Device and method for processing expanding information in image file
06/30/2010CN101763386A Retrieval method, device and user equipment based on retrieval scope authority
06/30/2010CN101763276A Method for energizing and starting high-security information system
06/30/2010CN101196969B Information processing apparatus, information processing method, and print control system
06/30/2010CA2689339A1 Fingerprinting a data object
06/29/2010US7748051 Contents server, contents receiving apparatus and network system for adding information to digital contents
06/29/2010US7748049 Secure storage device for transfer of digital camera data
06/29/2010US7748046 Security claim transformation with intermediate claims
06/29/2010US7748044 System and method for processing DRM-enabled files
06/29/2010US7748043 Method for authenticating, in particular, software components that can be loaded into a control unit of a motor vehicle
06/29/2010US7748041 Tool, method, and program for supporting system security design/evaluation
06/29/2010US7748038 Method and apparatus for managing computer virus outbreaks
06/29/2010US7748037 Validating a memory type modification attempt
06/29/2010US7748031 Mass storage device with automated credentials loading
06/29/2010US7748029 Authentication query strategizer and results compiler
06/29/2010US7748028 Authentication method, terminal device, relay device and authentication server
06/29/2010US7747935 Method and device for securing the reading of a memory
06/29/2010US7747887 Print engine having authentication device for preventing multi-word memory writing upon power drop
06/29/2010US7747877 Tamper-resistant trusted Java virtual machine and method of using the same
06/29/2010US7747873 Method and apparatus for protecting information and privacy
06/29/2010US7747872 Secure portable electronic reference device
06/29/2010US7747871 Information recording apparatus, information reproducing apparatus, and information distribution system
06/29/2010US7747870 Apparatuses and methods for decrypting encrypted data and locating the decrypted data in a memory space used for execution
06/29/2010US7747869 Process for detecting defective component exchanges
06/29/2010US7747868 Method for inputting a password in a mobile communication terminal
06/29/2010US7747864 DVD identification and managed copy authorization
06/29/2010US7747854 Advanced stream format (ASF) data stream header object protection
06/29/2010US7747791 Program access authorization of peripheral devices via a smart card
06/29/2010US7747646 System having secure access between IC entities
06/29/2010US7747538 Memory card
06/29/2010US7747533 Digital application operating according to aggregation of plurality of licenses
06/29/2010US7747532 Content use management system, content playback apparatus, content use management method, content playback method, and computer program including system date/time information validation
06/29/2010US7747531 Method and system for delivery of secure software license information
06/29/2010US7747476 Transaction tracking, managing, assessment, and auditing data processing system and network
06/29/2010US7747468 Contents consignment sale system and method for networking broadcasting
06/29/2010US7747154 Method of capturing and processing sensed images
06/29/2010US7747044 Fusing multimodal biometrics with quality estimates via a bayesian belief network
06/29/2010US7747012 Process of security of an electronic unit with cryptoprocessor
06/29/2010US7746498 Facsimile delivery system using associated identifiers
06/29/2010CA2499986C Enforcing computer security utilizing an adaptive lattice mechanism
06/29/2010CA2420207C Multiport card
06/29/2010CA2408181C Apparatus and method for assuring the integrity of a multi-user personal information database
06/29/2010CA2279382C Web request broker controlling multiple processes
06/24/2010WO2010071904A2 Security measures for credit card
06/24/2010WO2010071843A1 Systems and methods for facilitating relationship management
06/24/2010WO2010071138A1 Service server
06/24/2010WO2010070959A1 Information processing device, program developing device, program verifying method, and program
06/24/2010WO2010070787A1 Biometric authentication system and method therefor
06/24/2010WO2010070756A1 Information processing device, authentication program, and authentication method
06/24/2010WO2010070724A1 Authentication device, authentication method, and authentication program
06/24/2010WO2010070539A1 Enhanced smart card usage
06/24/2010WO2010070280A1 Protection of computer systems
06/24/2010WO2010069968A1 Method of controlling access to a system by a plurality of users, and system affording access to services
06/24/2010WO2010069904A1 Method and apparatus for protecting vulnerable functions
06/24/2010WO2010069682A1 Method and system for impersonating a user
06/24/2010WO2010069587A1 Method and device for supporting penetration testing of a computer system
06/24/2010WO2010069056A1 System, device and method for secure provision of key credential information
06/24/2010WO2010046436A3 Method and apparatus for secure software platform access
06/24/2010WO2010041467A3 USING TRANSIENT PCRs TO REALISE TRUST IN APPLICATION SPACE OF A SECURE PROCESSING SYSTEM
06/24/2010WO2010036054A3 Method for detecting an arp attack, and system using same
06/24/2010WO2010021518A3 Apparatus and method for using contents information in digital rights management
06/24/2010US20100162414 Digital Rights Management for Differing Domain-Size Restrictions
06/24/2010US20100162413 Two Part Code
06/24/2010US20100162412 Member registration method, community service system, portable terminal, and member invitation processing program
06/24/2010US20100162409 Method for moving rights object and method for managing rights of issuing rights object and system thereof
06/24/2010US20100162408 Methods and apparatus for title structure and management
06/24/2010US20100162407 Apparatus, method, and recording medium
06/24/2010US20100162406 Security aspects of soa
06/24/2010US20100162405 Protecting against polymorphic cheat codes in a video game
06/24/2010US20100162404 Identifying spam avatars in a virtual universe (vu) based upon turing tests