Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
04/20/2010 | US7701506 Digital camera having functionally interconnected image processing elements |
04/20/2010 | US7701437 Interactive display and method of displaying a message |
04/20/2010 | US7699440 Inkjet printhead with heater element close to drive circuits |
04/20/2010 | CA2682909A1 Key-card access system for providing selective access to medical equipment |
04/15/2010 | WO2010042859A1 Controlled delivery of content data streams to remote users |
04/15/2010 | WO2010042769A1 Secure system and apparatus for data delivery |
04/15/2010 | WO2010042621A2 Trusted and confidential remote tpm initialization |
04/15/2010 | WO2010042248A1 Method and system for security requiring authorization by multiple users |
04/15/2010 | WO2010042135A2 Control framework generation for improving a security risk of an environment |
04/15/2010 | WO2010041991A1 Digital rights management in user-controlled environment |
04/15/2010 | WO2010041467A2 USING TRANSIENT PCRs TO REALISE TRUST IN APPLICATION SPACE OF A SECURE PROCESSING SYSTEM |
04/15/2010 | WO2010041464A1 Information processing device, authentication system, authentication device, information processing method, information processing program, recording medium, and integrated circuit |
04/15/2010 | WO2010041462A1 Information processing device, information processing method, information processing program, and integrated circuit |
04/15/2010 | WO2010041347A1 Gateway apparatus, authentication server, control method thereof and computer program |
04/15/2010 | WO2010041259A2 Device and method for disjointed computing |
04/15/2010 | WO2010040629A2 Data processing system for providing authorization keys |
04/15/2010 | WO2010040423A1 Performing cryptographic operations |
04/15/2010 | WO2010040415A1 Method for authenticating a product in a container, and associated method for verifying the authenticity of the product and its container |
04/15/2010 | WO2010040407A1 Memory access control |
04/15/2010 | WO2010040393A1 Method for providing access to a service |
04/15/2010 | WO2010040378A1 Service provider access |
04/15/2010 | WO2010040341A2 Data processing device having certifiable encryption |
04/15/2010 | WO2010020877A3 Display of information through auxiliary user interface |
04/15/2010 | WO2010019370A3 Protocol for device to station association |
04/15/2010 | WO2010018000A4 Authorization system with a card and a reader |
04/15/2010 | WO2010011472A3 Public encrypted disclosure |
04/15/2010 | WO2009158220A3 Protected mode scheduling of operations |
04/15/2010 | WO2009155146A3 Digitally signing documents using identity context information |
04/15/2010 | US20100095386 Realest invention |
04/15/2010 | US20100095385 Method And Device For Classifying And Processing Data In Instant Messaging System |
04/15/2010 | US20100095383 Protection of Digital Data Content |
04/15/2010 | US20100095382 Real Invention |
04/15/2010 | US20100095380 Detection of undesired computer files in damaged archives |
04/15/2010 | US20100095378 Classifying a Message Based on Fraud Indicators |
04/15/2010 | US20100095377 Detection of suspicious traffic patterns in electronic communications |
04/15/2010 | US20100095376 Software watermarking |
04/15/2010 | US20100095375 Method for locating fraudulent replicas of web sites |
04/15/2010 | US20100095374 Graph based bot-user detection |
04/15/2010 | US20100095373 System, Method and Program for Controlling Access Rights |
04/15/2010 | US20100095369 Gateway Registry Methods and Systems |
04/15/2010 | US20100095367 Dynamic access control policy with port restrictions for a network security appliance |
04/15/2010 | US20100095366 Enabling Network Communication From Role Based Authentication |
04/15/2010 | US20100095364 Method, apparatus and computer program product for providing smart card security |
04/15/2010 | US20100095362 Method and Arrangement for Handling Client Data |
04/15/2010 | US20100095358 Method and Base Station for Creating an Account in a Network Featuring a VoIP Protocol for DECT Mobile Parts |
04/15/2010 | US20100095353 System and method for content access control |
04/15/2010 | US20100095352 Message Service Indication System and Method |
04/15/2010 | US20100095350 Universally usable human-interaction proof |
04/15/2010 | US20100095201 Electronic book contents recording medium with electronic book contents recorded thereon, electronic book transmission apparatus and electronic book display apparatus |
04/15/2010 | US20100095135 Method and system for processing forward- locked DRM contents, and portable device adapted thereto |
04/15/2010 | US20100095133 Reduction of side-channel information by interacting crypto blocks |
04/15/2010 | US20100095132 Protecting secrets in an untrusted recipient |
04/15/2010 | US20100095131 Method and system for seamless integration of preprocessing and postprocessing functions with an existing application program |
04/15/2010 | US20100095124 Method and system for access authentication |
04/15/2010 | US20100095111 Gateway Registry Methods and Systems |
04/15/2010 | US20100095069 Program Security Through Stack Segregation |
04/15/2010 | US20100095063 Method for providing controlled access to a memory card and memory card |
04/15/2010 | US20100095062 Data exchange between protected memory cards |
04/15/2010 | US20100094779 Information system, server, service providing method and program |
04/15/2010 | US20100094736 Arrangement and Method for Providing Data |
04/15/2010 | US20100094666 System and method for processing and transmitting payroll-related data for insurance transactions |
04/15/2010 | US20100094652 System, method, and a computer program product for networking healthcare professionals |
04/15/2010 | US20100094649 Medical data and medical information system integration and communication |
04/15/2010 | US20100093334 Portable electronic entity and method for personalization of such an electronic entity |
04/15/2010 | US20100091986 Information Management System and Encryption System |
04/15/2010 | US20100091984 Secure logical vector clocks |
04/15/2010 | US20100091982 Differential power analysis - resistant cryptographic processing |
04/15/2010 | US20100091397 Shield means for data input apparatus and method of use thereof |
04/15/2010 | US20100091116 Utilisation of Image Illumination Effects in Photographs |
04/15/2010 | US20100090001 Method and terminal for providing controlled access to a memory card |
04/15/2010 | DE102009041882A1 Sichere Speicherschnittstelle, Verfahren zum sicheren Zugreifen auf ein Speicherelement und elektronisches System Secure memory interface method of securely accessing a memory element and electronic system |
04/15/2010 | DE102008051578A1 Datenkommunikation mit portablem Endgerät Data communication with portable terminal |
04/15/2010 | DE102008050739A1 Datenverarbeitungsgerät mit zertifizierbarer Verschlüsselung A data processing apparatus with certifiable encryption |
04/15/2010 | DE102008028703A1 Ausführen kryptographischer Operationen Performing cryptographic operations |
04/15/2010 | DE102005038866B4 Sicheres elektronisches Auslieferungssiegel für ein informationsverarbeitendes System Secure electronic delivery label for an information processing system |
04/14/2010 | EP2175609A1 User-assisted privacy data management system in a multi-service environment |
04/14/2010 | EP2175589A1 Content control method and device |
04/14/2010 | EP2175455A1 Method for providing controlled access to a memory card and memory card |
04/14/2010 | EP2175454A1 Method and terminal for providing controlled access to a memory card |
04/14/2010 | EP2175426A2 Security system, security method and recording medium storing security program |
04/14/2010 | EP2175393A1 Data exchange between protected memory cards |
04/14/2010 | EP2175392A2 Content transmitting method and apparatus |
04/14/2010 | EP2174481A2 Method, server and mobile communication device for managing unique memory device identifications |
04/14/2010 | EP2174471A2 System and method for securely communicating on- demand content from closed network to dedicated devices, and for compiling content usage data in closed network securely communicating content to dedicated devices |
04/14/2010 | EP2174258A1 Method and system for legally sharing files |
04/14/2010 | EP2174257A1 System and method for auditing software usage |
04/14/2010 | EP2174256A1 Method and apparatus for changing and adding activation keys for functions of digital content without having to change and recompile the digital content |
04/14/2010 | EP2174255A1 Method and device for providing digital security |
04/14/2010 | EP2174254A1 Preventing unauthorized poaching of set top box assets |
04/14/2010 | EP2174253A1 Systems and methods for conditional access and digital rights management |
04/14/2010 | EP2174252A1 Automatically protecting computer systems from attacks that exploit security vulnerabilities |
04/14/2010 | EP2052345B1 Method for the anonymous analysis of authenticating identity codes of a user or an object |
04/14/2010 | EP1749386B1 Pattern discovery in a network security system |
04/14/2010 | EP1590960B1 Method for storing and transmitting data generated by a security module |
04/14/2010 | EP1157575B1 Authentication in a radiotelephone network |
04/14/2010 | CN101695068A Content delivery service providing apparatus and content delivery service terminal unit |
04/14/2010 | CN101694688A Code signing system and method |
04/14/2010 | CN101694687A Code signing system and method |
04/14/2010 | CN101694686A Dynamic measuring method of buffer overflow on the basis of logic isolation |
04/14/2010 | CN101694685A Safety product license management method based on XML encryption and digital certificate |