Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
06/2010
06/23/2010CN101753842A Display device and method aiming to protect access to audiovisual documents recorded in storage means
06/23/2010CN101753574A Communication device, communication method and program
06/23/2010CN101753519A Method and equipment for judging expiry of license file based on network clock
06/23/2010CN101753301A Fingerprint dynamic password ID authentication device and the implementation method thereof
06/23/2010CN101753299A Dynamically inputting hashing function DIH
06/23/2010CN101751658A Image visual separate-management method with minimum pixel expansion and optimal contrast
06/23/2010CN101751536A Transparent file encryption method for increasing file header
06/23/2010CN101751535A Data loss protection through application data access classification
06/23/2010CN101751534A Computers having a biometric authentication device
06/23/2010CN101751533A Data card with USB Key function and realization method thereof
06/23/2010CN101751532A Selecting 2 from 3 logic hardware voting method for safety output of safety computer platform
06/23/2010CN101751531A File encryption device with USB electronic key
06/23/2010CN101751530A Method for detecting loophole aggressive behavior and device
06/23/2010CN101751529A Method and apparatus for the secure processing of confidential content within a virtual machine of a processor
06/23/2010CN101751528A Working method and system of cipher machine
06/23/2010CN101751527A Copyright protection method of multimedia file in reproduction and spreading process
06/23/2010CN101751526A E-document protection system and method therefor
06/23/2010CN101751525A Keying behavior recognition system and method
06/23/2010CN101751524A Device, method and computer for management of computer external equipment
06/23/2010CN101751523A Electronic password lock device and method for unlocking electronic password lock
06/23/2010CN101751522A Method, device and system for preventing keys of keyboard from being logged
06/23/2010CN101751521A Method for updating field of desktop management interface
06/23/2010CN101751520A Method for updating field of desktop management interface
06/23/2010CN101751519A Method for improving information security of computer system and relative computer system thereof
06/23/2010CN101751346A Software protection method
06/23/2010CN101751307A Data storage system, method as well as data storage and backup system
06/23/2010CN101751287A Method for executing operation under Windows without limitation of user right
06/23/2010CN101751262A Information processing apparatus and method, and program storage medium
06/23/2010CN101751243A Methods and devices for instruction level software encryption
06/23/2010CN101344906B Sectional type remote updating method
06/23/2010CN101334826B Method for utilizing image selection as verification mechanism and computer system
06/23/2010CN101324914B Method and device for preventing piracy
06/23/2010CN101324912B Credible safety computer
06/23/2010CN101281577B Dependable computing system capable of protecting BIOS and method of use thereof
06/23/2010CN101236585B Image processing apparatus and document combination method
06/23/2010CN101211397B Partial computer control method and system for distributed software license
06/23/2010CN101178757B Right managing method and apparatus
06/23/2010CN101116082B Authentication system, apparatus and method
06/23/2010CN101105832B Relational database water mark embed and extraction method based on (t,n) threshold
06/22/2010US7743427 System for dynamically encrypting information for secure internet commerce and providing embedded fulfillment software
06/22/2010US7743426 Information data and management data processing apparatus and method
06/22/2010US7743423 Security requirement determination
06/22/2010US7743421 Communication network security risk exposure management systems and methods
06/22/2010US7743419 Method and system for detection and prediction of computer virus-related epidemics
06/22/2010US7743412 Computer system identification
06/22/2010US7743409 Methods used in a mass storage device with automated credentials loading
06/22/2010US7743407 Using permissions to allocate device resources to an application
06/22/2010US7743403 Computer program products and systems for transparent data encryption and decryption
06/22/2010US7743316 Method and system for hiding sensitive data in an electronic spreadsheet environment
06/22/2010US7743261 Unauthorized contents detection system
06/22/2010US7743259 System and method for digital rights management using a standard rendering engine
06/22/2010US7743257 Security processor with bus configuration
06/22/2010US7743256 Method for verifying authorized access
06/22/2010US7743150 Apparatus and method for web service message correlation
06/22/2010US7743092 Method for recognizing and distributing music
06/22/2010US7743025 Network-extensible reconfigurable media appliance
06/22/2010US7742992 Delivery of a secure software license for a software product and a toolset for creating the software product
06/22/2010US7742967 Secure and efficient payment processing system
06/22/2010US7742756 System for managing program applications storable in a mobile terminal
06/22/2010US7742696 Digital camera having printhead and magnetic recorder
06/22/2010US7742604 Integrated circuit device, information processing apparatus, memory management method for information storage device, mobile terminal apparatus, semiconductor integrated circuit device, and communication method using mobile terminal apparatus
06/22/2010US7742599 Apparatus and method for an iterative cryptographic block
06/22/2010US7742595 Cryptographic method protected against covert channel type attacks
06/22/2010US7740281 Method and system for producing certified documents and the like
06/22/2010CA2382960C Sensor with digital signature of data relating to sensor
06/18/2010CA2650163A1 System and method for secure provision of key credential information
06/17/2010WO2010068447A2 Financial gadgets
06/17/2010WO2010068377A2 Simultaneous state-based cryptographic splitting in a secure storage appliance
06/17/2010WO2010068057A1 Apparatus for managing identity data and method thereof
06/17/2010WO2010067846A1 Application software protecting method and stream transmitting/receiving system
06/17/2010WO2010067703A1 Data dependence analyzer, information processor, data dependence analysis method, and program
06/17/2010WO2010067535A1 Personal information exchanging system, personal information providing apparatus, data processing method therefor, and computer program therefor
06/17/2010WO2010067266A1 Method and apparatus for installing programs on a computer platform
06/17/2010WO2010067263A2 A system for protection and backup of information in a mobile cell unit
06/17/2010WO2010067211A1 Portable electronic devices, systems, methods and computer program products for accessing remote secure elements
06/17/2010WO2010067171A1 Methods, apparatuses, and computer program products for protecting data
06/17/2010WO2010067070A1 Malware detection
06/17/2010WO2010066800A1 Method for securing java bytecode.
06/17/2010WO2010066580A1 System and method for classification of unwanted or malicious software
06/17/2010WO2010066522A1 System and method for secure communication of components within vending machines
06/17/2010WO2010066478A1 Method for securing the fragmented use of a digital datum
06/17/2010WO2010066304A1 Universal mobile verifier
06/17/2010WO2010066201A1 Data storage system, method and data storage and backup system
06/17/2010WO2010066169A1 Trusted network connection implementing method based on tri-element peer authentication
06/17/2010WO2010066055A1 Speech dialog system for verifying confidential speech information, such as a password
06/17/2010WO2010065991A1 System and method for adapting an internet and intranet filtering system
06/17/2010WO2010039505A3 Browser access control
06/17/2010WO2010036654A3 Redundant array of independent disks-related operations
06/17/2010WO2010030885A3 Methods and systems for protect agents using distributed lightweight fingerprints
06/17/2010WO2010030871A3 Methods and systems to implement fingerprint lookups across remote agents
06/17/2010WO2010025390A3 Copyright status determination system and method
06/17/2010WO2010025301A3 Merchant registration web page interface and method for support of merchant data processing
06/17/2010WO2010020883A3 Invocation of system services through auxiliary interface
06/17/2010WO2009121658A3 Use of a mobile telecommunication device as an electronic health insurance card
06/17/2010US20100154067 Information recording apparatus and copy management program
06/17/2010US20100154065 Media markup for user-activated content alteration
06/17/2010US20100154064 Systems and methods for updating content detection devices and systems
06/17/2010US20100154063 Improvements in resisting the spread of unwanted code and data
06/17/2010US20100154062 Virus Scanning Executed Within a Storage Device to Reduce Demand on Host Resources
06/17/2010US20100154061 System and method for identifying malicious activities through non-logged-in host usage