Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
05/2010
05/20/2010US20100125893 Techniques for enforcing access rights during directory access
05/20/2010US20100125891 Activity Monitoring And Information Protection
05/20/2010US20100125864 Mobile remote control of a shared media resource
05/20/2010US20100125782 Electronic document for automatically determining a dosage for a treatment
05/20/2010US20100125663 Systems, methods, and devices for detecting security vulnerabilities in ip networks
05/20/2010US20100125635 User authentication using alternative communication channels
05/20/2010US20100125542 System and method to determine the validity of and interaction on a network
05/20/2010US20100125529 Remote Rental of Digital Content Peripheral Storage Entities
05/20/2010US20100125527 Method and system for protecting real estate from fradulent title changes
05/20/2010US20100125511 Sharing media content assets between users of a web-based service
05/20/2010US20100125472 Relating code with intellectual property assets
05/20/2010US20100125353 Systems and methods for distributed conferencing
05/20/2010US20100124228 Remote access to local network
05/20/2010DE102008057887A1 Cryptographic module i.e. postal safety module, for use in franking machine, has access-protection unit consisting of printed circuit boards, where conductor paths of boards are changed from one layer to another layer
05/20/2010DE102008056332A1 Method for safe calculation of calculation result of cryptographic calculation, involves carrying out cryptographic calculation two times in data carrier
05/20/2010CA2743147A1 Device including authentication glyph
05/20/2010CA2743050A1 User authentication in a content delivery network
05/19/2010EP2187334A1 Information providing support device and information providing support method
05/19/2010EP2187333A1 Electronic device, password control method, and program
05/19/2010EP2187332A1 Storage area allocation method and a management server
05/19/2010EP2187331A1 Keyboard and method for secure data transfer
05/19/2010EP2187330A1 Method and apparatus for encrypting user data
05/19/2010EP2187314A1 Download security system
05/19/2010EP2187313A1 Write-in region security system
05/19/2010EP2187285A1 Secure mobile wireless device
05/19/2010EP2187282A1 Method of operating a system using data protected from unauthorised use
05/19/2010EP2186332A2 Secure signing method, secure authentication method and iptv system
05/19/2010EP2186298A1 Method and system for accessing devices in a secure manner
05/19/2010EP2186255A1 Embedded self-contained security commands
05/19/2010EP2186037A1 Microprocessor in a security-sensitive system
05/19/2010EP2186036A1 Tamper respondent system
05/19/2010EP2043377B1 A sector base station
05/19/2010EP1680727B1 Distributed document version control
05/19/2010CN201479145U Enciphering deciphering adapter
05/19/2010CN201477604U Single chip microcomputer programmer
05/19/2010CN201477603U Party and government network secret-associated information remote supervision checking system
05/19/2010CN201477602U Computer anti-theft device and computer adopting thereof
05/19/2010CN201477601U Antitheft device of dynamic random access memory
05/19/2010CN201477600U Tampered detecting circuit for protecting chip
05/19/2010CN201477599U Dependable computing cipher platform
05/19/2010CN201477598U Terminal Trojan monitoring device
05/19/2010CN1984298B Chipset security offload engine
05/19/2010CN1975751B Test enabled application execution
05/19/2010CN1972488B System and method for obscuring hand-held device data traffic information
05/19/2010CN101711397A Financial trading system
05/19/2010CN101711391A Managing digital rights for multiple assets in an envelope
05/19/2010CN101710380A Electronic document safety protection method
05/19/2010CN101710379A Microprocessor and microcode patching method of microprocessor
05/19/2010CN101710378A Software security flaw detection method based on sequential pattern mining
05/19/2010CN101710377A Method for realizing software license service, device and network equipment thereof
05/19/2010CN101710376A Hardware platform of safe computer 2-out-of-3 voting method
05/19/2010CN101710375A Anti-viral device in anti-viral software and anti-viral method thereof
05/19/2010CN101710374A Method and device for automatically extracting features of nonviral file
05/19/2010CN101710373A File operation method of embedded system
05/19/2010CN101710372A Scrambler capable of generating verification code and method thereof for verifying identity
05/19/2010CN101351805B Method and system for providing interoperability between digital rights management systems
05/19/2010CN101331496B System and method for associating security information with information objects in a data processing system
05/19/2010CN101331493B Method and system for executing cooperative non-repudiated message exchange in a network environment
05/19/2010CN101317181B Apparatus and method for secure authentication response in a mobile terminal
05/19/2010CN101310309B Identification and computer login of an operator of a vehicle
05/19/2010CN101278289B System and method for providing an object to support data structures in WORM storage
05/19/2010CN101271411B Hot-plug protection system and method
05/19/2010CN101263502B Detection of faults during a long perturbation
05/19/2010CN101253506B Site determining method
05/19/2010CN101246453B Data security method for non-volatile memory device and the non-volatile memory device
05/19/2010CN101226572B Information safety computer for protecting basic input/output system safety
05/19/2010CN101223599B Reproducing device, recording device, data processing method, data recording method, and integrated circuit
05/19/2010CN101218588B Attachment device and arrangement with authenticable firmware and method for authenticating the firmware
05/19/2010CN101211388B Device and method for producing and using characteristic code for monitoring program
05/19/2010CN101206703B Chip with program contents and external security function, and program download method
05/19/2010CN101206542B Ciphering signature writing pad with press keys and display screen
05/19/2010CN101201882B Operating system protection method
05/19/2010CN101201803B Method for protecting data of hard disk
05/19/2010CN101196966B Method for license interaction and recovery after break-up, and digital copyright management system
05/19/2010CN101176103B Computer security system
05/19/2010CN101176100B Methods and apparatus for generating endorsement credentials for software-based security coprocessors
05/19/2010CN101151616B Method and device for protecting the contents of an information carrier
05/19/2010CN101128832B Processor
05/19/2010CN101110836B Real-time monitoring system authorization management method based on PE document
05/19/2010CN101080720B Network system for distributing protected content
05/19/2010CN101038568B Method and device for encrypting date of external computer hard disk
05/19/2010CN101005517B Method for distributing network station to server in content distribution network
05/18/2010US7721346 Method and apparatus for encrypting data to be secured and inputting/outputting the same
05/18/2010US7721341 Method and system for allowing code to be securely initialized in a computer
05/18/2010US7721339 Method for controlling access to digital content and streaming media
05/18/2010US7721338 Defeat of the copy protection of optical discs
05/18/2010US7721335 Ambient calculus-based modal logics for mobile ambients
05/18/2010US7721334 Detection of code-free files
05/18/2010US7721333 Method and system for detecting a keylogger on a computer
05/18/2010US7721329 Method and apparatus for trust-based, fine-grained rate limiting of network requests
05/18/2010US7721327 Information input-output device, information input-output system, mobile communication terminal, and input-output control unit
05/18/2010US7721116 Security system
05/18/2010US7721114 Method for using shared library in tamper resistant microprocessor
05/18/2010US7721113 Data alteration detecting method, data alteration detecting device and data alteration detecting program
05/18/2010US7721111 Auto-negotiation of content output formats using a secure component model
05/18/2010US7721109 Secure transaction card using biometrical validation
05/18/2010US7721108 Method and system for checking digital signatures and card with microcircuit for using the method
05/18/2010US7721107 Physical token for supporting verification of human presence in an online environment
05/18/2010US7721106 Transitive authentication authorization accounting in the interworking between access networks
05/18/2010US7721105 Repurposing digitally signed information