Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
05/2010
05/26/2010CN1345494B Wireless electronic authentication system and method for operating same
05/26/2010CN101715580A System and method for extending sessions
05/26/2010CN101714931A Early warning method, device and system of unknown malicious code
05/26/2010CN101714303A Access control for interactive learning system
05/26/2010CN101714229A License managing apparatus, license managing method, and license managing system
05/26/2010CN101714227A Personal-information managing apparatus and personal-information handling apparatus
05/26/2010CN101714203A File transparent encryption method for marker file and data file
05/26/2010CN101714202A Digital certificate-based novel digital copyright control method
05/26/2010CN101714201A Software code signing system and method
05/26/2010CN101714200A Apparatus and method to harden computer system
05/26/2010CN101714199A Certification system of internet virtual paper
05/26/2010CN101714198A System based on Bayesian estimation for evaluating credibility of countermeasure information of computer network
05/26/2010CN101714197A Hardware-based anti-virus scan service
05/26/2010CN101714196A Authority entrusting method based on cycle time
05/26/2010CN101714195A Digital certificate-based novel digital copyright protection method and device
05/26/2010CN101714194A User control pre-recorded memory
05/26/2010CN101714118A Detector for binary-code buffer-zone overflow bugs, and detection method thereof
05/26/2010CN101714090A Starting method
05/26/2010CN101714068A Network interface apparatus, control method, program, and image forming apparatus
05/26/2010CN101303833B Liquid crystal display device and anti-theft method thereof
05/26/2010CN101223536B License management device and method
05/26/2010CN101211287B Data backup device, system and its method
05/26/2010CN101154147B Information-embedding apparatus, information-embedding method, information-embedding system, information-reading appartus, information-reading method, and information-reading system
05/26/2010CN101140602B Method and apparatus for generating rights object by reauthorization
05/26/2010CN101127061B Device preventing and treating computer virus capable of pre-estimating schedule and schedule pre-estimation method
05/26/2010CN101099173B Collation method, collation system
05/26/2010CN101043577B Restriction information generation apparatus and method, printing system and printing authentication method
05/26/2010CN101000648B Automatic encipher system and method for file
05/25/2010US7725945 Discouraging unauthorized redistribution of protected content by cryptographically binding the content to individual authorized recipients
05/25/2010US7725944 Matching session records of network users with corresponding transaction data
05/25/2010US7725924 Network system, use permission determining method, network device, and recording medium
05/25/2010US7725917 Method for delivering non-anonymous user metadata using an soap operation in TV anytime metadata service
05/25/2010US7725876 Original contents creation apparatus, derived contents creation apparatus, derived contents using apparatus, original contents creation method, derived contents creation method, and derived contents using method and verification method
05/25/2010US7725788 Method and apparatus for secure scan testing
05/25/2010US7725786 Protecting an integrated circuit test mode
05/25/2010US7725737 System and methodology providing secure workspace environment
05/25/2010US7725736 Message digest instruction
05/25/2010US7725733 Biometrics authentication method and biometrics authentication device
05/25/2010US7725731 System and method for managing access to functions supported by a multi-function port
05/25/2010US7725730 Cryptographic methods and apparatus for secure authentication
05/25/2010US7725729 Electronic device and controlling method of electronic device
05/25/2010US7725723 Data certification method and apparatus
05/25/2010US7725718 Authenticating images identified by a software application
05/25/2010US7725716 Methods and systems for encrypting, transmitting, and storing electronic information and files
05/25/2010US7725713 Launching a secure kernel in a multiprocessor system
05/25/2010US7725703 Systems and methods for securely booting a computer with a trusted processing module
05/25/2010US7725642 Method and program for partitioning a physical computer into logical partitions
05/25/2010US7725611 Method and apparatus for verifying data in a storage system
05/25/2010US7725607 Method and system for enabling personal digital assistants and protecting stored private data
05/25/2010US7725582 Network based proxy control of content
05/25/2010US7725567 Peer-to-peer name resolution protocol (PNRP) security infrastructure and method
05/25/2010US7725558 Distributive access controller
05/25/2010US7725490 Collaborative file access management system
05/25/2010US7725458 Access control system and access control method
05/25/2010US7725401 Method and apparatus for establishing usage rights for digital content to be created in the future
05/25/2010US7725400 Method for managing viewing of a particular content recorded on an information recording medium
05/25/2010US7725399 Content usage device and network system, and license information acquisition method
05/25/2010US7725398 Method and system for selling goods and/or services over a communication network between multiple users
05/25/2010US7725388 Verification of electronic financial transactions
05/25/2010US7725332 Systems and methods for health care records access and notification
05/25/2010US7725128 Integrated instant messaging and web browsing client and related methods
05/25/2010US7725002 Video content recording apparatus and video content transfer method
05/25/2010US7724741 Image forming apparatus connected to network
05/25/2010US7722172 Printing cartridge with radio frequency identification
05/25/2010US7722146 Printing system having controlled multi-length printhead ICS
05/25/2010US7721955 Secure transaction method and transaction terminal for use in implementing such method
05/25/2010US7721948 Method and system for online payments
05/25/2010CA2641215C Cryptographic co-processor
05/20/2010WO2010057194A2 Storage security using cryptographic splitting
05/20/2010WO2010057191A2 Storage security using cryptographic splitting
05/20/2010WO2010057186A1 Data recovery using error strip identifiers
05/20/2010WO2010057181A2 Simultaneous state-based cryptographic splitting in a secure storage appliance
05/20/2010WO2010057065A2 Method and apparatus to provide secure application execution
05/20/2010WO2010056961A2 Device including authentication glyph
05/20/2010WO2010056492A2 User authentication in a content delivery network
05/20/2010WO2010056208A1 Communication system
05/20/2010WO2010055901A1 Information processing system, method, and program
05/20/2010WO2010055385A1 Copy safe storage
05/20/2010WO2010055159A2 Completely automatic public turing test to tell computers and humans apart (captcha) based on a multiple of different captcha methods
05/20/2010WO2010055026A1 Method and apparatus for allocating of a portable data medium, in particular a chip card, to a terminal
05/20/2010WO2010054920A1 Apparatus for controlling a vehicle function and method for updating a control device
05/20/2010WO2010054919A1 Method and system for annotation based secure caching
05/20/2010WO2010054709A1 Method for securely storing data in a memory of a portable data carrier
05/20/2010WO2010036495A3 Integrating enterprise identity authorization in conferences
05/20/2010WO2010033326A3 Collecting and analyzing malware data
05/20/2010WO2010017493A3 Transaction secured in an untrusted environment
05/20/2010WO2009131381A3 Rfid reader, rfid tag, and controlling method thereof
05/20/2010WO2004034184A9 Encrypting operating system
05/20/2010US20100125916 Apparatus and method for controlling content
05/20/2010US20100125915 Secure Computer Architecture
05/20/2010US20100125914 Protected information stream allocation using a virtualized platform
05/20/2010US20100125911 Risk Scoring Based On Endpoint User Activities
05/20/2010US20100125910 Systems and methods for media authentication
05/20/2010US20100125909 Monitor device, monitoring method and computer program product thereof for hardware
05/20/2010US20100125904 Combining a mobile device and computer to create a secure personalized environment
05/20/2010US20100125902 Seamless data networking
05/20/2010US20100125900 Network Intrusion Protection
05/20/2010US20100125899 Remote access to local network via security gateway
05/20/2010US20100125898 Use of authentication information to make routing decisions
05/20/2010US20100125895 Domain based authentication scheme