Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
06/17/2010 | US20100154060 Method and apparatus for providing mobile device malware defense |
06/17/2010 | US20100154058 Method and systems for collecting addresses for remotely accessible information sources |
06/17/2010 | US20100154056 Context-Aware Real-Time Computer-Protection Systems and Methods |
06/17/2010 | US20100154055 Prefix Domain Matching for Anti-Phishing Pattern Matching |
06/17/2010 | US20100154053 Storage security using cryptographic splitting |
06/17/2010 | US20100154051 Apparatus for controlling a machine |
06/17/2010 | US20100154049 Terminal, security setting method, and program thereof |
06/17/2010 | US20100154047 Methods, systems, and computer readable media for media session policy compliance auditing and enforcement using a media relay and session initiation protocol (sip) signaling |
06/17/2010 | US20100154046 Single sign-on method and system for web browser |
06/17/2010 | US20100154044 Multi-transport mode devices having improved data throughput |
06/17/2010 | US20100154043 User Impersonation and Authentication |
06/17/2010 | US20100154042 Design of virtual machine |
06/17/2010 | US20100154041 Transforming claim based identities to credential based identities |
06/17/2010 | US20100154038 Dynamic File Access To Files Of Unmapped Remote Computers |
06/17/2010 | US20100154036 System and method for encapsulation of application aspects within an application information data format message |
06/17/2010 | US20100154035 Personalized Interaction Using Codes |
06/17/2010 | US20100154034 Creating method, information introducing system, creating apparatus, computer program, and recording medium |
06/17/2010 | US20100154033 Method and nodes for securing a communication network |
06/17/2010 | US20100154028 Migrating a network to tunnel-less encryption |
06/17/2010 | US20100154027 Methods and Systems for Enabling Community-Tested Security Features for Legacy Applications |
06/17/2010 | US20100154024 Methods, appliances, and computer program products for controlling access to a communication network based on policy information |
06/17/2010 | US20100153873 Process for implementing a method for the on-line sale of software product use licenses through a data network, and software component which allows carrying out said process |
06/17/2010 | US20100153862 General Object Graph for Web Users |
06/17/2010 | US20100153854 Presence indication configuration methodology |
06/17/2010 | US20100153853 Networked Touchscreen With Integrated Interfaces |
06/17/2010 | US20100153774 Data storage system, method and data storage and backkup system |
06/17/2010 | US20100153748 Method for reencryption of a database |
06/17/2010 | US20100153746 Memory controller, secure memory card, and secure memory card system |
06/17/2010 | US20100153745 Methods and devices for instruction level software encryption |
06/17/2010 | US20100153743 Electronic device and method to control output thereof |
06/17/2010 | US20100153738 Authorized anonymous authentication |
06/17/2010 | US20100153737 Method of Projecting a Secure USB Key |
06/17/2010 | US20100153736 Method for isolating special functionalities in field devices used in automation technology |
06/17/2010 | US20100153724 System and method for a key block based authentication |
06/17/2010 | US20100153722 Method and system to prove identity of owner of an avatar in virtual world |
06/17/2010 | US20100153721 Portable Electronic Devices, Systems, Methods and Computer Program Products for Accessing Remote Secure Elements |
06/17/2010 | US20100153716 System and method of managing files and mobile terminal device |
06/17/2010 | US20100153708 Server Assisted Portable Device |
06/17/2010 | US20100153697 Methods and systems for embedded user authentication and/or providing computing services using an information handling system configured as a flexible computing node |
06/17/2010 | US20100153695 Data handling preferences and policies within security policy assertion language |
06/17/2010 | US20100153537 Method and apparatus for providing detection of internet protocol address hijacking |
06/17/2010 | US20100153509 Method and Apparatus for Detecting Abusive Email Based on Number of Hops |
06/17/2010 | US20100153316 Systems and methods for rule-based anomaly detection on ip network flow |
06/17/2010 | US20100153270 Authentication of message recipients |
06/17/2010 | US20100153237 Personal content server apparatus and methods |
06/17/2010 | US20100153011 Method and apparatus for evidencing a transaction using location information |
06/17/2010 | US20100152954 Method and device for automating procedures for verifying equipment in an aircraft |
06/17/2010 | US20100150637 Document Binder |
06/17/2010 | US20100150353 Secure method and apparatus to verify personal identity over a network |
06/17/2010 | US20100149593 Network scanner for global document creation transmission and management |
06/17/2010 | DE102008061710A1 Verfahren zum Betreiben einer Sensorvorrichtung und Sensorvorrichtung Method for operating a sensor device and sensor device |
06/17/2010 | DE102008031890B4 Verfahren und Computersystem zur Langzeitarchivierung von qualifiziert signierten Daten Method and computer system for long-term archiving of qualified signed data |
06/17/2010 | DE102004042826B4 Verfahren und Vorrichtung zur Datenverschlüsselung Method and device for data encryption |
06/17/2010 | CA2746434A1 Method and apparatus for installing programs on a computer platform |
06/17/2010 | CA2744547A1 Financial gadgets |
06/16/2010 | EP2197168A1 Verification method and apparatus for use in providing application services to mobile communication devices |
06/16/2010 | EP2196946A2 In-line decryption device for securely printing documents |
06/16/2010 | EP2196940A1 Securing method for the fragmented use of a digital data item |
06/16/2010 | EP2196939A1 Copyright protection system, reproduction device, and reproduction method |
06/16/2010 | EP2196938A1 Methods and devices for instruction level software encryption |
06/16/2010 | EP2196937A1 Methods and devices for instruction level software encryption |
06/16/2010 | EP2196936A1 Secure boot terminal, secure boot method, secure boot program, recording medium, and integrated circuit |
06/16/2010 | EP2196935A1 Method for protecting a secure USB key |
06/16/2010 | EP2196934A1 Method for securing java bytecode |
06/16/2010 | EP2196933A2 Server-to-server integrity checking |
06/16/2010 | EP2196932A2 Secure data transmission bewteen communication devices in a digital network |
06/16/2010 | EP2196911A1 Construction and method for encrypting digital information memory card |
06/16/2010 | EP2196899A1 Job processing system, job processing apparatus and control method thereof |
06/16/2010 | EP2196045A1 System and method for protecting data in wireless devices |
06/16/2010 | EP2195793A1 Method for generating masks in a communicating object and corresponding communicating object |
06/16/2010 | EP2195761A1 Substitution table masking for cryptographic processes |
06/16/2010 | EP2195760A1 Protective arrangement and method for producing a protective arrangement |
06/16/2010 | EP2195759A1 Concept for a key management in a drm system |
06/16/2010 | EP2195749A2 Efficient file hash identifier computation |
06/16/2010 | CN1992036B Data transfer method, data transfer source apparatus and data transfer destination apparatus |
06/16/2010 | CN1988669B Digital marking structure and verifying method in stream medium monitoring and broadcasting |
06/16/2010 | CN1975750B Software operation modeling apparatus and method, software operation monitoring device and method |
06/16/2010 | CN1971740B Information processing apparatus and method, information recording medium, and manufacturing apparatus and method thereof |
06/16/2010 | CN1963720B Method for realizing random controlled dynamic solid electronic subscribing |
06/16/2010 | CN1939042B Platform-independent scanning subsystem API for use in a mobile communication framework |
06/16/2010 | CN1924876B Method of granting DRM license to support plural devices |
06/16/2010 | CN1922683B Recording/reproducing device |
06/16/2010 | CN1868187B Method and device for securing content delivery over a communication network via content keys |
06/16/2010 | CN1728706B Method and system for filtering communication to prevent exploitation of software vulnerability |
06/16/2010 | CN101742479A Method and system for updating and distributing smart card secondary security domain keys and mobile terminal |
06/16/2010 | CN101742273A Method and system digital for processing digital content according to a workflow |
06/16/2010 | CN101742060A Dynamic password control method |
06/16/2010 | CN101742051A Information processing device and information processing method |
06/16/2010 | CN101741563A Method and apparatus for ciphering user data |
06/16/2010 | CN101739767A Method and system for processing abnormal operation of self-service terminal |
06/16/2010 | CN101739720A Method and device for generating three-dimensional dynamic verification code |
06/16/2010 | CN101739650A Management method, system and equipment of personal data bank with private storage space |
06/16/2010 | CN101739533A Circuit arrangement and method for protecting isolated secret data of integrated circuit devices |
06/16/2010 | CN101739532A Method and system for processing digital content according to a workflow |
06/16/2010 | CN101739531A Method and system for enhancing data encryption by using multiply key forms |
06/16/2010 | CN101739530A Encryption method of advanced reduced instruction-set computer (RISC) machine (ARM) system in starting process |
06/16/2010 | CN101739529A Device, computer, system and method for locking computer by data card |
06/16/2010 | CN101739528A Encryption method and electronic device using same |
06/16/2010 | CN101739527A Password authentication method and password authentication device |
06/16/2010 | CN101739526A Service system-oriented and oriented object-based rights management method |