Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
05/2010
05/18/2010US7721104 System, method and computer program product for downloading pushed content
05/18/2010US7721100 Granting an access to a computer-based object
05/18/2010US7721098 System and method for guaranteeing software integrity via combined hardware and software authentication
05/18/2010US7721095 Apparatus, system, and method for authenticating personal identity, computer readable medium having personal identity authenticating program recorded thereon, method of registering personal identity authenticating information, method of verifying personal identity authenticating information, and recording medium having personal identity authenticating information recorded thereon
05/18/2010US7721094 Systems and methods for determining if applications executing on a computer system are trusted
05/18/2010US7721093 Authenticated exchange of public information using electronic mail
05/18/2010US7721091 Method for protecting against denial of service attacks using trust, quality of service, personalization, and hide port messages
05/18/2010US7721090 Event-driven simulation of IP using third party event-driven simulators
05/18/2010US7721088 Terminal device, server device, and content distribution system
05/18/2010US7721030 Method and device for connecting sensors or actuators to a bus system
05/18/2010US7721011 Method and apparatus for reordering memory accesses to reduce power consumption in computer systems
05/18/2010US7720975 Distributed cache for state transfer operations
05/18/2010US7720962 Peer-to-peer name resolution protocol (PNRP) security infrastructure and method
05/18/2010US7720934 Electronic musical apparatus, music contents distributing site, music contents processing method, music contents distributing method, music contents processing program, and music contents distributing program
05/18/2010US7720894 Internal security system for a relational database system
05/18/2010US7720768 Enhancing copyright revenue generation for a copyright protected frame-based work
05/18/2010US7720766 Digital data selling and buying transaction system, auxiliary digital data selling and buying system, digital data selling and buying transaction method, auxiliary digital data selling and buying method, and digital data selling and buying transaction apparatus
05/18/2010US7720716 System and method for use by various departments to prepare a quotation
05/18/2010US7720262 Method and device for recording fingerprint data
05/18/2010US7720249 Watermark embedder and reader
05/18/2010US7720223 System and method of content copy control
05/18/2010US7720222 Method for storing and transmitting data generated by security module
05/18/2010US7720220 Cipher message assist instruction
05/18/2010US7717543 Printhead including a looped heater element
05/18/2010US7717542 Inkjet chamber with plurality of nozzles and shared actuator
05/18/2010CA2694326A1 A method and system for preventing cross-site request forgery attacks on a server
05/18/2010CA2412986C Method and system for granting customers access to a pre-paid product or service
05/14/2010WO2010054374A1 Filesystem access for web applications and native code modules
05/14/2010WO2010054369A1 Method and system for controling code execution on a computing device using recursive security protocol
05/14/2010WO2010053899A2 Online challenge-response
05/14/2010WO2010053739A2 Method and system for restricting file access in a computer system
05/14/2010WO2010053594A1 Secure key input by rearrangement of keypad layout
05/14/2010WO2010053484A1 Systems and methods for evaluating a sequence of characters
05/14/2010WO2010053423A1 A method of triggering location based events in a user equipment
05/14/2010WO2010053403A1 System and method for the remote identification and verification of a client's identity during the provision of financial services
05/14/2010WO2010052998A1 Maintenance system, maintenance method, and maintenance program
05/14/2010WO2010052767A1 Projector system, projector, and data reception method
05/14/2010WO2010052722A1 Secure storage device
05/14/2010WO2010052406A1 Method for monitoring flows transmitted through a packet communication network
05/14/2010WO2010052332A1 Method and system protecting against identity theft or replication abuse
05/14/2010WO2010052218A1 Method and system for storing and retrieving information
05/14/2010WO2010051860A1 Methods, apparatuses, system and related computer program product for privacy-enhanced identity management
05/14/2010WO2010051716A1 Method, system and mobile terminal for updating and distributing the secondary security domain key of smart card
05/14/2010WO2009098706A9 Electronically implemented method and system for authentication and sharing of documents via a communication network
05/14/2010CA2742963A1 Online challenge-response
05/14/2010CA2742705A1 Method and system protecting against identity theft or replication abuse
05/14/2010CA2741482A1 Method and system for storing and retrieving information
05/13/2010US20100122353 Methods and systems of digital rights management for integrated circuits
05/13/2010US20100122352 Method for Operating an Installation Using Data Protected Against Unauthorized Use
05/13/2010US20100122351 Software Application Framework for Network-Connected Devices
05/13/2010US20100122349 Systems and methods for preventing unauthorized use of digital content
05/13/2010US20100122348 Origin and custody of copies from a stored electronic record verified page by page
05/13/2010US20100122345 Control system and protection method for integrated information security services
05/13/2010US20100122342 Identifying abormal network traffic
05/13/2010US20100122340 Enterprise password reset
05/13/2010US20100122339 Data survey device, integrated with an antitamper system
05/13/2010US20100122338 Network system, dhcp server device, and dhcp client device
05/13/2010US20100122335 System and Method for Filtering Unwanted Internet Protocol Traffic Based on Blacklists
05/13/2010US20100122334 Internet based data, voice and video alert notification communications system
05/13/2010US20100122331 Single use web based passwords
05/13/2010US20100122328 Method, hardware product, and computer program product for optimizing security in the context of credential transformation services
05/13/2010US20100122326 Systems and Methods for State-Less Authentication
05/13/2010US20100122324 Over the air services for mobile devices
05/13/2010US20100122322 Method for admission control of multiple service flows paging in mobile packet domain
05/13/2010US20100122320 Secure and Self Monitoring Slot Gaming Network
05/13/2010US20100122318 Policy-based service managment system
05/13/2010US20100122317 Integrated Network Intrusion Detection
05/13/2010US20100122316 User Controlled Identity Authentication
05/13/2010US20100122314 Active access monitoring for safer computing environments and systems
05/13/2010US20100122313 Method and system for restricting file access in a computer system
05/13/2010US20100122312 Predictive service systems
05/13/2010US20100122095 Hardware-facilitated secure software execution environment
05/13/2010US20100122094 Software ic card system, management server, terminal, service providing server, service providing method, and program
05/13/2010US20100122093 Method, apparatus and system for verifying authenticity of an object
05/13/2010US20100122086 Method for combining data to be processed with a data-specific apparatus, and apparatus and computer program for implementing the method
05/13/2010US20100122085 System and method for providing variable security level in a wireless communication system
05/13/2010US20100122078 Systems and methods for creating a code inspection system
05/13/2010US20100122056 Method and Device for Securely Storing and Securely Reading User Data
05/13/2010US20100121967 System and method for device management security of trap management object
05/13/2010US20100121952 Communication unit, method of controlling communication unit and computer program
05/13/2010US20100121915 Method, system and apparatus for changing avatar in online game
05/13/2010US20100121882 Method and System for Implementing and Managing an Enterprise Identity Management for Distributed Security in a Computer System
05/13/2010US20100121879 Data Integration Portlet
05/13/2010US20100121737 Personal identification number code input method using dot pattern, personal identification number code input method, and internet shopping settlement system
05/13/2010US20100121731 End-to-end digital media entitlement system
05/13/2010US20100121482 Image-based inventory control system
05/13/2010US20100119070 Method and System for Mixed Symmetric and Asymmetric Decryption of .ZIP Files
05/13/2010US20100119066 Method and system for securing data utilizing redundant secure key storage
05/13/2010US20100119065 Method and system for securing data utilizing redundant secure key storage
05/13/2010US20100119062 Device to generate a machine specific identification key
05/13/2010US20100116884 Systems and methods for providing access to wireless gaming devices
05/12/2010EP2184911A1 Method and apparatus for authenticating documents produced by reprographic devices using digital signatures
05/12/2010EP2184888A1 Verifying device and program
05/12/2010EP2184887A1 Method, system and terminal for right control in device management
05/12/2010EP2184706A1 Method and device for operating a system using data protected from unauthorised use
05/12/2010EP2184705A1 Procedure, system and device to process rights
05/12/2010EP2184698A1 Authentication terminal and network terminal
05/12/2010EP2184697A1 Real-time data protection method and data protection device for implementing the same
05/12/2010EP2184696A1 Method and module for protecting a password authorizing a user access to a computer application
05/12/2010EP2184695A1 Method of combining data with a device to be used for processing data, corresponding functionality to execute the individual steps in the procedure and computer program to implement the procedure