Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
05/18/2010 | US7721104 System, method and computer program product for downloading pushed content |
05/18/2010 | US7721100 Granting an access to a computer-based object |
05/18/2010 | US7721098 System and method for guaranteeing software integrity via combined hardware and software authentication |
05/18/2010 | US7721095 Apparatus, system, and method for authenticating personal identity, computer readable medium having personal identity authenticating program recorded thereon, method of registering personal identity authenticating information, method of verifying personal identity authenticating information, and recording medium having personal identity authenticating information recorded thereon |
05/18/2010 | US7721094 Systems and methods for determining if applications executing on a computer system are trusted |
05/18/2010 | US7721093 Authenticated exchange of public information using electronic mail |
05/18/2010 | US7721091 Method for protecting against denial of service attacks using trust, quality of service, personalization, and hide port messages |
05/18/2010 | US7721090 Event-driven simulation of IP using third party event-driven simulators |
05/18/2010 | US7721088 Terminal device, server device, and content distribution system |
05/18/2010 | US7721030 Method and device for connecting sensors or actuators to a bus system |
05/18/2010 | US7721011 Method and apparatus for reordering memory accesses to reduce power consumption in computer systems |
05/18/2010 | US7720975 Distributed cache for state transfer operations |
05/18/2010 | US7720962 Peer-to-peer name resolution protocol (PNRP) security infrastructure and method |
05/18/2010 | US7720934 Electronic musical apparatus, music contents distributing site, music contents processing method, music contents distributing method, music contents processing program, and music contents distributing program |
05/18/2010 | US7720894 Internal security system for a relational database system |
05/18/2010 | US7720768 Enhancing copyright revenue generation for a copyright protected frame-based work |
05/18/2010 | US7720766 Digital data selling and buying transaction system, auxiliary digital data selling and buying system, digital data selling and buying transaction method, auxiliary digital data selling and buying method, and digital data selling and buying transaction apparatus |
05/18/2010 | US7720716 System and method for use by various departments to prepare a quotation |
05/18/2010 | US7720262 Method and device for recording fingerprint data |
05/18/2010 | US7720249 Watermark embedder and reader |
05/18/2010 | US7720223 System and method of content copy control |
05/18/2010 | US7720222 Method for storing and transmitting data generated by security module |
05/18/2010 | US7720220 Cipher message assist instruction |
05/18/2010 | US7717543 Printhead including a looped heater element |
05/18/2010 | US7717542 Inkjet chamber with plurality of nozzles and shared actuator |
05/18/2010 | CA2694326A1 A method and system for preventing cross-site request forgery attacks on a server |
05/18/2010 | CA2412986C Method and system for granting customers access to a pre-paid product or service |
05/14/2010 | WO2010054374A1 Filesystem access for web applications and native code modules |
05/14/2010 | WO2010054369A1 Method and system for controling code execution on a computing device using recursive security protocol |
05/14/2010 | WO2010053899A2 Online challenge-response |
05/14/2010 | WO2010053739A2 Method and system for restricting file access in a computer system |
05/14/2010 | WO2010053594A1 Secure key input by rearrangement of keypad layout |
05/14/2010 | WO2010053484A1 Systems and methods for evaluating a sequence of characters |
05/14/2010 | WO2010053423A1 A method of triggering location based events in a user equipment |
05/14/2010 | WO2010053403A1 System and method for the remote identification and verification of a client's identity during the provision of financial services |
05/14/2010 | WO2010052998A1 Maintenance system, maintenance method, and maintenance program |
05/14/2010 | WO2010052767A1 Projector system, projector, and data reception method |
05/14/2010 | WO2010052722A1 Secure storage device |
05/14/2010 | WO2010052406A1 Method for monitoring flows transmitted through a packet communication network |
05/14/2010 | WO2010052332A1 Method and system protecting against identity theft or replication abuse |
05/14/2010 | WO2010052218A1 Method and system for storing and retrieving information |
05/14/2010 | WO2010051860A1 Methods, apparatuses, system and related computer program product for privacy-enhanced identity management |
05/14/2010 | WO2010051716A1 Method, system and mobile terminal for updating and distributing the secondary security domain key of smart card |
05/14/2010 | WO2009098706A9 Electronically implemented method and system for authentication and sharing of documents via a communication network |
05/14/2010 | CA2742963A1 Online challenge-response |
05/14/2010 | CA2742705A1 Method and system protecting against identity theft or replication abuse |
05/14/2010 | CA2741482A1 Method and system for storing and retrieving information |
05/13/2010 | US20100122353 Methods and systems of digital rights management for integrated circuits |
05/13/2010 | US20100122352 Method for Operating an Installation Using Data Protected Against Unauthorized Use |
05/13/2010 | US20100122351 Software Application Framework for Network-Connected Devices |
05/13/2010 | US20100122349 Systems and methods for preventing unauthorized use of digital content |
05/13/2010 | US20100122348 Origin and custody of copies from a stored electronic record verified page by page |
05/13/2010 | US20100122345 Control system and protection method for integrated information security services |
05/13/2010 | US20100122342 Identifying abormal network traffic |
05/13/2010 | US20100122340 Enterprise password reset |
05/13/2010 | US20100122339 Data survey device, integrated with an antitamper system |
05/13/2010 | US20100122338 Network system, dhcp server device, and dhcp client device |
05/13/2010 | US20100122335 System and Method for Filtering Unwanted Internet Protocol Traffic Based on Blacklists |
05/13/2010 | US20100122334 Internet based data, voice and video alert notification communications system |
05/13/2010 | US20100122331 Single use web based passwords |
05/13/2010 | US20100122328 Method, hardware product, and computer program product for optimizing security in the context of credential transformation services |
05/13/2010 | US20100122326 Systems and Methods for State-Less Authentication |
05/13/2010 | US20100122324 Over the air services for mobile devices |
05/13/2010 | US20100122322 Method for admission control of multiple service flows paging in mobile packet domain |
05/13/2010 | US20100122320 Secure and Self Monitoring Slot Gaming Network |
05/13/2010 | US20100122318 Policy-based service managment system |
05/13/2010 | US20100122317 Integrated Network Intrusion Detection |
05/13/2010 | US20100122316 User Controlled Identity Authentication |
05/13/2010 | US20100122314 Active access monitoring for safer computing environments and systems |
05/13/2010 | US20100122313 Method and system for restricting file access in a computer system |
05/13/2010 | US20100122312 Predictive service systems |
05/13/2010 | US20100122095 Hardware-facilitated secure software execution environment |
05/13/2010 | US20100122094 Software ic card system, management server, terminal, service providing server, service providing method, and program |
05/13/2010 | US20100122093 Method, apparatus and system for verifying authenticity of an object |
05/13/2010 | US20100122086 Method for combining data to be processed with a data-specific apparatus, and apparatus and computer program for implementing the method |
05/13/2010 | US20100122085 System and method for providing variable security level in a wireless communication system |
05/13/2010 | US20100122078 Systems and methods for creating a code inspection system |
05/13/2010 | US20100122056 Method and Device for Securely Storing and Securely Reading User Data |
05/13/2010 | US20100121967 System and method for device management security of trap management object |
05/13/2010 | US20100121952 Communication unit, method of controlling communication unit and computer program |
05/13/2010 | US20100121915 Method, system and apparatus for changing avatar in online game |
05/13/2010 | US20100121882 Method and System for Implementing and Managing an Enterprise Identity Management for Distributed Security in a Computer System |
05/13/2010 | US20100121879 Data Integration Portlet |
05/13/2010 | US20100121737 Personal identification number code input method using dot pattern, personal identification number code input method, and internet shopping settlement system |
05/13/2010 | US20100121731 End-to-end digital media entitlement system |
05/13/2010 | US20100121482 Image-based inventory control system |
05/13/2010 | US20100119070 Method and System for Mixed Symmetric and Asymmetric Decryption of .ZIP Files |
05/13/2010 | US20100119066 Method and system for securing data utilizing redundant secure key storage |
05/13/2010 | US20100119065 Method and system for securing data utilizing redundant secure key storage |
05/13/2010 | US20100119062 Device to generate a machine specific identification key |
05/13/2010 | US20100116884 Systems and methods for providing access to wireless gaming devices |
05/12/2010 | EP2184911A1 Method and apparatus for authenticating documents produced by reprographic devices using digital signatures |
05/12/2010 | EP2184888A1 Verifying device and program |
05/12/2010 | EP2184887A1 Method, system and terminal for right control in device management |
05/12/2010 | EP2184706A1 Method and device for operating a system using data protected from unauthorised use |
05/12/2010 | EP2184705A1 Procedure, system and device to process rights |
05/12/2010 | EP2184698A1 Authentication terminal and network terminal |
05/12/2010 | EP2184697A1 Real-time data protection method and data protection device for implementing the same |
05/12/2010 | EP2184696A1 Method and module for protecting a password authorizing a user access to a computer application |
05/12/2010 | EP2184695A1 Method of combining data with a device to be used for processing data, corresponding functionality to execute the individual steps in the procedure and computer program to implement the procedure |