Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
06/02/2010 | CN101488176B TOCTOU attack response method aiming at TPM trusted computation |
06/02/2010 | CN101414342B Software dog and method for implementing software protection |
06/02/2010 | CN101388059B Screen key entry system for preventing trojan program and method thereof |
06/02/2010 | CN101388056B Method, system and apparatus for preventing worm |
06/02/2010 | CN101373501B Method for capturing dynamic behavior aiming at computer virus |
06/02/2010 | CN101320354B File encryption/decryption method and file encryption affirmation method |
06/02/2010 | CN101308532B Content download system, content supply device, content receiving device and method thereof |
06/02/2010 | CN101304321B Method for defending equity network virus based on trust |
06/02/2010 | CN101303715B Method for maintaining system safety |
06/02/2010 | CN101271499B Memory readout system for vehicle control device |
06/02/2010 | CN101246537B Method for implementing reliable computation based on reliable multi-task operating system |
06/02/2010 | CN101236587B Outsourced database enquiry and verification method based on fragile watermark |
06/02/2010 | CN101183413B Architecture of trusted platform module and method for providing service thereof |
06/02/2010 | CN101178756B Electronic data management system, electronic data management apparatus, and electronic data management method |
06/02/2010 | CN101174290B 安全处理器 Security Processor |
06/02/2010 | CN101169814B Systems and methods for management and auto-generation of encryption keys |
06/02/2010 | CN101169813B Computer system and control method thereof, and remote control system |
06/02/2010 | CN101162490B Method and system for encrypting information |
06/02/2010 | CN101141814B System and method for mobile terminal to download DRM file to movable storage medium |
06/02/2010 | CN101131723B System and method deleting internal memory document in notebook computer by mobile phone |
06/02/2010 | CN101089870B Device and method for selecting optimal object of multiple copyright object in DRM system |
06/02/2010 | CN101086880B Unauthorized contents detection system |
06/02/2010 | CN101030847B Method and system for discriminating cheat by unified code |
06/01/2010 | US7730542 Protecting software from unauthorized use by converting source code modules to byte codes |
06/01/2010 | US7730539 Authenticating third party products via a secure extensibility model |
06/01/2010 | US7730538 Combining virus checking and replication filtration |
06/01/2010 | US7730537 Method of operating an intrusion detection system |
06/01/2010 | US7730536 Security perimeters |
06/01/2010 | US7730530 System and method for gathering exhibited behaviors on a .NET executable module in a secure manner |
06/01/2010 | US7730529 Method of operating a computer system and computer system |
06/01/2010 | US7730526 Management of physical security credentials at a multi-function device |
06/01/2010 | US7730520 Automated adaptive method for identity verification with performance guarantees |
06/01/2010 | US7730518 Method and apparatus for graph-based partition of cryptographic functionality |
06/01/2010 | US7730481 Method, apparatus and system of anti-virus software implementation |
06/01/2010 | US7730416 Communication apparatus and display method |
06/01/2010 | US7730345 Contents furnishing system |
06/01/2010 | US7730329 Digital rights management (DRM) encryption and data-protection for content on device without interactive authentication |
06/01/2010 | US7730324 Method for controlling database copyrights |
06/01/2010 | US7730322 System and method of foiling buffer-overflow and alien-code attacks |
06/01/2010 | US7730321 System and method for authentication of users and communications received from computer systems |
06/01/2010 | US7730318 Integration of high-assurance features into an application through application factoring |
06/01/2010 | US7730316 Method for document fingerprinting |
06/01/2010 | US7730313 Tracing content usage |
06/01/2010 | US7730312 Tamper resistant module certification authority |
06/01/2010 | US7730311 Key transformation unit for a tamper resistant module |
06/01/2010 | US7730310 Key transformation unit for a tamper resistant module |
06/01/2010 | US7730306 Information processing apparatus with use-restricted functions, and system and method for canceling use restriction |
06/01/2010 | US7730304 Device authentication information installation system |
06/01/2010 | US7730299 System and method for providing secure internetwork services via an assured pipeline |
06/01/2010 | US7730271 Data security in an automated data storage library |
06/01/2010 | US7730094 Scoped access control metadata element |
06/01/2010 | US7730093 Method for controlling access to the resources of a data processing system, data processing system, and computer program |
06/01/2010 | US7730092 System and method for managing user profiles |
06/01/2010 | US7730033 Mechanism for exposing shadow copies in a networked environment |
06/01/2010 | US7729995 Managing secured files in designated locations |
06/01/2010 | US7729992 Monitoring of computer-related resources and associated methods and systems for disbursing compensation |
06/01/2010 | US7729991 Method and system for electronic voter registration and electronic voting over a network |
06/01/2010 | US7729520 Biometric acoustic writing system and method for identifying individuals and recognizing handwriting by using biometric data |
06/01/2010 | US7729495 System and method for detecting unauthorized copying of encrypted data |
06/01/2010 | US7729283 Method and apparatus for configuring and establishing a secure credential-based network link between a client and a service over a data-packet-network |
06/01/2010 | US7728996 Image processing apparatus |
06/01/2010 | US7728838 Method and system for animating graphical user interface elements via a manufacturing/process control portal server |
06/01/2010 | US7726771 Printer with movable capping member and fixed printhead and platen |
06/01/2010 | CA2686801A1 Authetication using stored biometric data |
06/01/2010 | CA2686799A1 System and method of multiple smart card driver support |
06/01/2010 | CA2686704A1 Method, system and mobile device employing enhanced fingerprint authentication |
06/01/2010 | CA2686696A1 Simplified biometric character sequence entry |
06/01/2010 | CA2686689A1 System and method of providing biometric quick launch |
06/01/2010 | CA2402351C Encryption in a secure computerized gaming system |
05/27/2010 | WO2010059955A2 Domain based authentication scheme |
05/27/2010 | WO2010059878A2 System renewability message transport |
05/27/2010 | WO2010059843A2 System and method for run-time attack prevention |
05/27/2010 | WO2010059747A2 Methods and systems for exact data match filtering |
05/27/2010 | WO2010059675A2 Methods and systems for image fingerprinting |
05/27/2010 | WO2010059584A1 System and method for managing confidential information |
05/27/2010 | WO2010059341A2 Method to construct a high-assurance ipsec gateway using an unmodified commercial implementation |
05/27/2010 | WO2010059266A1 System and method for protecting circuit boards |
05/27/2010 | WO2010059196A2 Encrypted communication between printing system components |
05/27/2010 | WO2010058683A1 Electronic data read device and electronic data read method |
05/27/2010 | WO2010058540A1 Content delivering system |
05/27/2010 | WO2010058317A1 Method and device for managing digital content |
05/27/2010 | WO2010058061A1 Method, apparatus, and computer program product for determining media item privacy settings |
05/27/2010 | WO2010057828A1 Method and device for diagnosing the first reception of an identifier, detection method, storage medium and computer software for said method |
05/27/2010 | WO2010057692A1 Projected and secured virtual keyboard |
05/27/2010 | WO2010057683A1 Face recognition based privacy filter for mobile devices |
05/27/2010 | WO2010057546A1 Apparatus for verifying and for generating an encrypted token and methods for same |
05/27/2010 | WO2010057312A1 System and method for hardware based security |
05/27/2010 | WO2010016667A3 Method and apparatus for protecting digital content using hardware identification information |
05/27/2010 | WO2010011399A3 Methods and circuits for thwarting semi-invasive and non-invasive integrated circuit security attacks |
05/27/2010 | WO2010008223A3 Apparatus and method for providing a security service in a user interface |
05/27/2010 | WO2009101445A9 Real time clock |
05/27/2010 | WO2009096999A9 Apparatus, and an associated methodology, for facilitating authentication using a digital music authentication token |
05/27/2010 | US20100132053 Information processing device, information processing method and program |
05/27/2010 | US20100132052 Information processing system, information processing method, and computer readable medium |
05/27/2010 | US20100132051 Protecting live content in a network |
05/27/2010 | US20100132050 Apparatus, system, and method for enforcing policy requirements associated with a service |
05/27/2010 | US20100132049 Leveraging a social graph from a social network for social context in other systems |
05/27/2010 | US20100132048 Protecting Isolated Secret Data of Integrated Circuit Devices |
05/27/2010 | US20100132046 Electronic Circuit for Securing Data Interchanges Between a Computer Station and a Network |
05/27/2010 | US20100132045 Apparatus and method for right management of digital contents |