Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
04/2010
04/01/2010WO2010035070A1 Methods, apparatuses, and computer program products for locking a removeable device to a specific host device
04/01/2010WO2010034928A1 Platform for a computer network
04/01/2010WO2010034886A1 Method, apparatus and computer program product for efficient elliptic curve cryptography
04/01/2010WO2010034535A2 Method for securing the input of a secret via a virtual keyboard
04/01/2010WO2010034507A1 Method for supporting secure authentication of a user using a smartcard
04/01/2010WO2010034174A1 Data storing device with alarm unit
04/01/2010WO2010017025A3 Secure resource name resolution
04/01/2010WO2010017023A3 Secure resource name resolution using a cache
04/01/2010WO2010015904A3 Backing up digital content that is stored in a secured storage device
04/01/2010WO2010008955A3 Method and system for executing applications using native code modules
04/01/2010WO2010002858A3 Payment processing system secure healthcare data trafficking
04/01/2010WO2010002237A3 Intrusion detection using parallax information
04/01/2010WO2009155473A3 Information rights management
04/01/2010WO2009137564A3 Method for validating an untrusted native code module
04/01/2010US20100083388 Network projector and projector system
04/01/2010US20100083386 Tokenized Resource Access
04/01/2010US20100083385 Right management method, its system, server device used in the system, and information device terminal
04/01/2010US20100083384 Secure Operation of Programmable Devices
04/01/2010US20100083383 Phishing shield
04/01/2010US20100083382 Method and System for Managing Computer Security Information
04/01/2010US20100083381 Hardware-based anti-virus scan service
04/01/2010US20100083380 Network stream scanning facility
04/01/2010US20100083379 Information processing device, information processing method, and computer readable recording medium
04/01/2010US20100083378 Contextual Alert Of An Invasion Of A Computer System
04/01/2010US20100083377 Method and apparatus to define the scope of a search for information from a tabular data source
04/01/2010US20100083376 Method and apparatus for reducing false positive detection of malware
04/01/2010US20100083375 Detection accuracy tuning for security
04/01/2010US20100083373 Methods and apparatus for determining user authorization from motion of a gesture-based control unit
04/01/2010US20100083371 User Access Control System And Method
04/01/2010US20100083368 Thumb drive guest user
04/01/2010US20100083367 Secure Partitioning of Programmable Devices
04/01/2010US20100083366 Blocking Computer System Ports on Per User Basis
04/01/2010US20100083365 Apparatus and method to harden computer system
04/01/2010US20100083362 Method and system of managing and allocating communication related resources
04/01/2010US20100083361 Managing Web Single Sign-On Applications
04/01/2010US20100083360 Portable authentication device
04/01/2010US20100083358 Secure Data Aggregation While Maintaining Privacy
04/01/2010US20100083357 Remote registration of biometric data into a computer
04/01/2010US20100083352 Remote access system and method and intelligent agent therefor
04/01/2010US20100083351 Access control to content published by a host
04/01/2010US20100083350 Method and system for advertising real estate over the internet
04/01/2010US20100083349 Method for realizing trusted network management
04/01/2010US20100083348 Method and rule-repository for generating security-definitions for heterogeneous systems
04/01/2010US20100083300 License update method and apparatus for right-protected broadcast channel
04/01/2010US20100083137 Mobile terminal and video sharing method thereof
04/01/2010US20100083044 Information processing apparatus with resume function and information processing system
04/01/2010US20100083002 Method and System for Secure Booting Unified Extensible Firmware Interface Executables
04/01/2010US20100083000 Fingerprint Sensor Device and System with Verification Token and Methods of Using
04/01/2010US20100082999 Wireless Communication Device, Method for Wireless Connection, and Computer Usable Medium Therefor
04/01/2010US20100082997 Secure data utilization
04/01/2010US20100082989 Storing Composite Services on Untrusted Hosts
04/01/2010US20100082982 Service control system and service control method
04/01/2010US20100082971 Applying digital rights to newly created electronic documents
04/01/2010US20100082966 Method for computer startup protection and system thereof
04/01/2010US20100082961 Apparatus and method to harden computer system
04/01/2010US20100082680 Methods and systems for providing easy access to information and for sharing services
04/01/2010US20100082513 System and Method for Distributed Denial of Service Identification and Prevention
04/01/2010US20100082490 Systems and methods for secure wireless transactions
04/01/2010US20100082478 Apparatus & methods for digital content distribution
04/01/2010US20100082448 Media gifting devices and methods
04/01/2010US20100081413 System for controlling access to a service, and corresponding method, control device, and computer program
04/01/2010US20100080410 Method and system for preventing use of a photograph in digital systems
04/01/2010US20100079600 Printer CPU With VLIW Processor
04/01/2010US20100079250 Information-Processing Device and System For Restricting Use of the Device
04/01/2010US20100078636 Semiconductor device with backside tamper protection
04/01/2010DE102009042673A1 Die Speicherung zusammengesetzter Dienste auf unzuverlässigen Hosts The storage of composite services on unreliable hosts
04/01/2010CA2738372A1 Home node-b apparatus and security protocols
04/01/2010CA2732415A1 Integrating enterprise identity authorization in conferences
03/2010
03/31/2010EP2169942A1 Image scanner, terminal device, image scanning system, and computer program
03/31/2010EP2169937A1 Image forming apparatus with selective disclosure of operation history items
03/31/2010EP2169908A1 Protected network boot of operating system
03/31/2010EP2169588A1 Method for guaranteeing safety
03/31/2010EP2169587A1 Method and rule-repository for generating security-definitions for heterogeneous systems
03/31/2010EP2169586A1 Key protecting method and a computing apparatus
03/31/2010EP2169585A1 User authentication judging device, user authentication judging system, user authentication judging program and user authentication judging method
03/31/2010EP2169584A2 Hardware-based anti-virus scan service
03/31/2010EP2169583A1 Method and apparatus for reducing false positive detection of malware
03/31/2010EP2169582A1 Method and apparatus for determining software trustworthiness
03/31/2010EP2169581A2 Assembly and method for transferring media data, in particular over the internet and output device for outputting copy-protected media files
03/31/2010EP2169580A2 Graduated enforcement of restrictions according an application's reputation
03/31/2010EP2169579A1 Method and device for accessing a machine readable document
03/31/2010EP2169578A2 System and method for providing a secure content with revocable access
03/31/2010EP2169549A1 Data processing device, data processing method, data processing program, recording medium, and integrated circuit
03/31/2010EP2168303A2 Method of authentication and electronic device for performing the authentication
03/31/2010EP2168072A1 Device and method for providing authentication
03/31/2010EP2168071A1 Licence enforcement
03/31/2010EP2168070A2 Method for the transparent replication of a software component of a software system
03/31/2010EP2168069A2 Domain-specific language abstractions for secure server-side scripting
03/31/2010EP2168040A1 Device management apparatus, job flow processing method, and task cooperative processing system
03/31/2010EP2027553B1 Method, system and computer program for securely storing data
03/31/2010EP1721256B1 Use of public switched telephone network for capturing electronic signatures in on-line transactions
03/31/2010CN201435222Y High-security solid-state hard disc product based on GPS technology
03/31/2010CN201435083Y Privacy device for microprocessor and program thereof
03/31/2010CN101690077A Drm scheme extension
03/31/2010CN101689996A Method for removable element authentication in an embedded system
03/31/2010CN101689995A Verifying device and program
03/31/2010CN101689241A Secure authentication of electronic prescriptions
03/31/2010CN101689240A Information security device and information security system
03/31/2010CN101689239A A security token and system and method for generating and decoding the security token
03/31/2010CN101689238A File management system, device, program, and computer readable recording medium where its program is recorded