Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
06/2010
06/17/2010US20100154060 Method and apparatus for providing mobile device malware defense
06/17/2010US20100154058 Method and systems for collecting addresses for remotely accessible information sources
06/17/2010US20100154056 Context-Aware Real-Time Computer-Protection Systems and Methods
06/17/2010US20100154055 Prefix Domain Matching for Anti-Phishing Pattern Matching
06/17/2010US20100154053 Storage security using cryptographic splitting
06/17/2010US20100154051 Apparatus for controlling a machine
06/17/2010US20100154049 Terminal, security setting method, and program thereof
06/17/2010US20100154047 Methods, systems, and computer readable media for media session policy compliance auditing and enforcement using a media relay and session initiation protocol (sip) signaling
06/17/2010US20100154046 Single sign-on method and system for web browser
06/17/2010US20100154044 Multi-transport mode devices having improved data throughput
06/17/2010US20100154043 User Impersonation and Authentication
06/17/2010US20100154042 Design of virtual machine
06/17/2010US20100154041 Transforming claim based identities to credential based identities
06/17/2010US20100154038 Dynamic File Access To Files Of Unmapped Remote Computers
06/17/2010US20100154036 System and method for encapsulation of application aspects within an application information data format message
06/17/2010US20100154035 Personalized Interaction Using Codes
06/17/2010US20100154034 Creating method, information introducing system, creating apparatus, computer program, and recording medium
06/17/2010US20100154033 Method and nodes for securing a communication network
06/17/2010US20100154028 Migrating a network to tunnel-less encryption
06/17/2010US20100154027 Methods and Systems for Enabling Community-Tested Security Features for Legacy Applications
06/17/2010US20100154024 Methods, appliances, and computer program products for controlling access to a communication network based on policy information
06/17/2010US20100153873 Process for implementing a method for the on-line sale of software product use licenses through a data network, and software component which allows carrying out said process
06/17/2010US20100153862 General Object Graph for Web Users
06/17/2010US20100153854 Presence indication configuration methodology
06/17/2010US20100153853 Networked Touchscreen With Integrated Interfaces
06/17/2010US20100153774 Data storage system, method and data storage and backkup system
06/17/2010US20100153748 Method for reencryption of a database
06/17/2010US20100153746 Memory controller, secure memory card, and secure memory card system
06/17/2010US20100153745 Methods and devices for instruction level software encryption
06/17/2010US20100153743 Electronic device and method to control output thereof
06/17/2010US20100153738 Authorized anonymous authentication
06/17/2010US20100153737 Method of Projecting a Secure USB Key
06/17/2010US20100153736 Method for isolating special functionalities in field devices used in automation technology
06/17/2010US20100153724 System and method for a key block based authentication
06/17/2010US20100153722 Method and system to prove identity of owner of an avatar in virtual world
06/17/2010US20100153721 Portable Electronic Devices, Systems, Methods and Computer Program Products for Accessing Remote Secure Elements
06/17/2010US20100153716 System and method of managing files and mobile terminal device
06/17/2010US20100153708 Server Assisted Portable Device
06/17/2010US20100153697 Methods and systems for embedded user authentication and/or providing computing services using an information handling system configured as a flexible computing node
06/17/2010US20100153695 Data handling preferences and policies within security policy assertion language
06/17/2010US20100153537 Method and apparatus for providing detection of internet protocol address hijacking
06/17/2010US20100153509 Method and Apparatus for Detecting Abusive Email Based on Number of Hops
06/17/2010US20100153316 Systems and methods for rule-based anomaly detection on ip network flow
06/17/2010US20100153270 Authentication of message recipients
06/17/2010US20100153237 Personal content server apparatus and methods
06/17/2010US20100153011 Method and apparatus for evidencing a transaction using location information
06/17/2010US20100152954 Method and device for automating procedures for verifying equipment in an aircraft
06/17/2010US20100150637 Document Binder
06/17/2010US20100150353 Secure method and apparatus to verify personal identity over a network
06/17/2010US20100149593 Network scanner for global document creation transmission and management
06/17/2010DE102008061710A1 Verfahren zum Betreiben einer Sensorvorrichtung und Sensorvorrichtung Method for operating a sensor device and sensor device
06/17/2010DE102008031890B4 Verfahren und Computersystem zur Langzeitarchivierung von qualifiziert signierten Daten Method and computer system for long-term archiving of qualified signed data
06/17/2010DE102004042826B4 Verfahren und Vorrichtung zur Datenverschlüsselung Method and device for data encryption
06/17/2010CA2746434A1 Method and apparatus for installing programs on a computer platform
06/17/2010CA2744547A1 Financial gadgets
06/16/2010EP2197168A1 Verification method and apparatus for use in providing application services to mobile communication devices
06/16/2010EP2196946A2 In-line decryption device for securely printing documents
06/16/2010EP2196940A1 Securing method for the fragmented use of a digital data item
06/16/2010EP2196939A1 Copyright protection system, reproduction device, and reproduction method
06/16/2010EP2196938A1 Methods and devices for instruction level software encryption
06/16/2010EP2196937A1 Methods and devices for instruction level software encryption
06/16/2010EP2196936A1 Secure boot terminal, secure boot method, secure boot program, recording medium, and integrated circuit
06/16/2010EP2196935A1 Method for protecting a secure USB key
06/16/2010EP2196934A1 Method for securing java bytecode
06/16/2010EP2196933A2 Server-to-server integrity checking
06/16/2010EP2196932A2 Secure data transmission bewteen communication devices in a digital network
06/16/2010EP2196911A1 Construction and method for encrypting digital information memory card
06/16/2010EP2196899A1 Job processing system, job processing apparatus and control method thereof
06/16/2010EP2196045A1 System and method for protecting data in wireless devices
06/16/2010EP2195793A1 Method for generating masks in a communicating object and corresponding communicating object
06/16/2010EP2195761A1 Substitution table masking for cryptographic processes
06/16/2010EP2195760A1 Protective arrangement and method for producing a protective arrangement
06/16/2010EP2195759A1 Concept for a key management in a drm system
06/16/2010EP2195749A2 Efficient file hash identifier computation
06/16/2010CN1992036B Data transfer method, data transfer source apparatus and data transfer destination apparatus
06/16/2010CN1988669B Digital marking structure and verifying method in stream medium monitoring and broadcasting
06/16/2010CN1975750B Software operation modeling apparatus and method, software operation monitoring device and method
06/16/2010CN1971740B Information processing apparatus and method, information recording medium, and manufacturing apparatus and method thereof
06/16/2010CN1963720B Method for realizing random controlled dynamic solid electronic subscribing
06/16/2010CN1939042B Platform-independent scanning subsystem API for use in a mobile communication framework
06/16/2010CN1924876B Method of granting DRM license to support plural devices
06/16/2010CN1922683B Recording/reproducing device
06/16/2010CN1868187B Method and device for securing content delivery over a communication network via content keys
06/16/2010CN1728706B Method and system for filtering communication to prevent exploitation of software vulnerability
06/16/2010CN101742479A Method and system for updating and distributing smart card secondary security domain keys and mobile terminal
06/16/2010CN101742273A Method and system digital for processing digital content according to a workflow
06/16/2010CN101742060A Dynamic password control method
06/16/2010CN101742051A Information processing device and information processing method
06/16/2010CN101741563A Method and apparatus for ciphering user data
06/16/2010CN101739767A Method and system for processing abnormal operation of self-service terminal
06/16/2010CN101739720A Method and device for generating three-dimensional dynamic verification code
06/16/2010CN101739650A Management method, system and equipment of personal data bank with private storage space
06/16/2010CN101739533A Circuit arrangement and method for protecting isolated secret data of integrated circuit devices
06/16/2010CN101739532A Method and system for processing digital content according to a workflow
06/16/2010CN101739531A Method and system for enhancing data encryption by using multiply key forms
06/16/2010CN101739530A Encryption method of advanced reduced instruction-set computer (RISC) machine (ARM) system in starting process
06/16/2010CN101739529A Device, computer, system and method for locking computer by data card
06/16/2010CN101739528A Encryption method and electronic device using same
06/16/2010CN101739527A Password authentication method and password authentication device
06/16/2010CN101739526A Service system-oriented and oriented object-based rights management method