Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
03/2010
03/24/2010CN100595736C Methods and systems for cryptographically protecting secure content
03/24/2010CN100595734C Data managemnet electronic apparatus and method
03/24/2010CN100595721C Method and system for managing access to presence attribute information
03/23/2010US7685647 Information processing apparatus
03/23/2010US7685645 Security containers for document components
03/23/2010US7685644 Managing user access to data
03/23/2010US7685643 System and method for managing multimedia contents in intranet
03/23/2010US7685642 System and method for controlling rights expressions by stakeholders of an item
03/23/2010US7685641 Copy-protected digital audio compact disc, and method and system for producing same
03/23/2010US7685637 System security approaches using sub-expression automata
03/23/2010US7685627 Unified networking diagnostics
03/23/2010US7685626 Information management system
03/23/2010US7685525 Interactive transaction center interface
03/23/2010US7685511 Framework for providing and using schema data for markup languages
03/23/2010US7685436 System and method for a secure I/O interface
03/23/2010US7685435 Program development method, program development supporting system, and program installation method
03/23/2010US7685434 Two parallel engines for high speed transmit IPsec processing
03/23/2010US7685433 Recognition of live object in motion
03/23/2010US7685431 System and method for determining relative strength and crackability of a user's security password in real time
03/23/2010US7685430 Initial password security accentuated by triple encryption and hashed cache table management on the hosted site's server
03/23/2010US7685425 Server computer for guaranteeing files integrity
03/23/2010US7685421 System and method for initializing operation for an information security operation
03/23/2010US7685417 Remote data viewer
03/23/2010US7685416 Enabling content security in a distributed system
03/23/2010US7685415 Exclusive encryption
03/23/2010US7685247 System for publishing and converting messages from identified, authorized senders
03/23/2010US7685174 Automatic regeneration of computer files
03/23/2010US7685173 Security and authorization development tools
03/23/2010US7685125 Proving relationships between data
03/23/2010US7685124 Systems and methods for performing authorization
03/23/2010US7685096 Data repository and method for promoting network storage of data
03/23/2010US7685072 Software distribution system for sewing machine, sewing machine and storage medium
03/23/2010US7685071 Mobile communication terminal
03/23/2010US7685070 Method and system for using entertainment files as ring tones
03/23/2010US7685018 Method and system for providing a payback to a user and distributor based on product use
03/23/2010US7684995 Method of permitting group access to electronically stored images and transaction card used in the method
03/23/2010US7684792 Safe application distribution and execution in a wireless environment
03/23/2010US7684674 Optical reproducing apparatus having protection flags and code number
03/23/2010US7684652 Remote authentication system
03/23/2010US7684073 Copy controller and method thereof
03/23/2010US7684064 Print job authentication
03/23/2010CA2431496C Improvements in and relating to the distribution of content
03/23/2010CA2375586C Reprogrammable secure software in an embedded processor
03/23/2010CA2264819C Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management
03/22/2010CA2679800A1 Re-identification risk in de-identified databases containing personal information
03/18/2010WO2010031069A2 Secure media path system and method
03/18/2010WO2010031000A1 Secure electronic records in smart devices
03/18/2010WO2010030885A2 Methods and systems for protect agents using distributed lightweight fingerprints
03/18/2010WO2010030871A2 Methods and systems to implement fingerprint lookups across remote agents
03/18/2010WO2010030581A1 Method for securely communicating information about the location of a compromised computing device
03/18/2010WO2010030497A2 Leveraging synchronous communication protocols to enable asynchronous application and line-of-business behaviors
03/18/2010WO2010030437A1 Methods and systems for securely managing virtualization platform
03/18/2010WO2010030231A1 A method for secure communication
03/18/2010WO2010030133A2 Security file transmission system and transmission method using api in executable file format
03/18/2010WO2010030130A2 Method for input information security
03/18/2010WO2010029988A1 Ic chip, information processing device, software module control method, information processing system, method, and program
03/18/2010WO2010029987A1 Ic chip, information processing device, software module control method, information processing system, method, and program
03/18/2010WO2010029835A1 Information terminal search server
03/18/2010WO2010029807A1 Service expanding system and cooperating server
03/18/2010WO2010029680A1 Content distribution system
03/18/2010WO2010029674A1 Content distribution system
03/18/2010WO2010029636A1 Storage device mounting frame, storage extending device, and storage device control method
03/18/2010WO2010029362A2 Embedded background lifecycle manager
03/18/2010WO2010029361A2 Method enabling a user to keep permanently their favourite media files
03/18/2010WO2010029346A1 Improvements in or relating to digital forensics
03/18/2010WO2010029111A2 Server system and method for providing at least one service
03/18/2010WO2010029036A1 Malware detection method and apparatus
03/18/2010WO2010028896A1 Method for independent counterattack in response to one or more physical attacks, and related device
03/18/2010WO2010028805A1 Release of transaction data
03/18/2010WO2010028494A1 Management of communications from stolen devices
03/18/2010WO2010010258A3 System and method for securing a user interface
03/18/2010WO2010010062A3 Untamperable anonymous payment system
03/18/2010WO2010001046A3 Method of installing a management application and method of managing data of applications of a memory area contained on a security module associated with a mobile terminal, associated security module, mobile terminal and server
03/18/2010WO2009146781A3 Method for providing a service based on tag information, and corresponding tag and tag reading device
03/18/2010WO2009142834A3 Protocol for verifying integrity of remote data
03/18/2010WO2009142751A3 System and method for discovery of network entities
03/18/2010WO2009137191A3 Role-based operational communications directory
03/18/2010WO2009133554A3 A system, device and method for deleting data from a remote electronic apparatus
03/18/2010WO2009132148A3 Systems and methods for security management based on cursor events
03/18/2010WO2009095263A8 Method of secure pin entry and operation mode setting in a personal portable device
03/18/2010WO2009085338A3 Control of electronic device by using a person's fingerprints
03/18/2010WO2009024913A4 Identification of devices using physically unclonable functions
03/18/2010WO2008107803A3 Systems and methods for identity verification
03/18/2010US20100071077 Apparatus, system, and method for detecting tampering of fiscal printers
03/18/2010US20100071076 Systems, methods, and program applications for selectively restricting the placeshifting of copy protected digital media content
03/18/2010US20100071075 Copying A Web Element With Reassigned Permissions
03/18/2010US20100071074 Apparatus for executing interoperable digital rights management using contents device and method of performing operations between contents device and digital rights management tool for interoperable digital rights management
03/18/2010US20100071072 System and method for controlling access to license protected assets using using rfid technology
03/18/2010US20100071071 Secure media path system and method
03/18/2010US20100071069 Image forming apparatus, license determination method, and computer-readable recording medium thereof
03/18/2010US20100071068 Method and communication system for the computer-aided detection and identification of copyrighted contents
03/18/2010US20100071065 Infiltration of malware communications
03/18/2010US20100071063 System for automatic detection of spyware
03/18/2010US20100071062 MECHANISM FOR IDENTIFYING MALICIOUS CONTENT, DoS ATTACKS, AND ILLEGAL IPTV SERVICES
03/18/2010US20100071061 Method and Apparatus for Whole-Network Anomaly Diagnosis and Method to Detect and Classify Network Anomalies Using Traffic Feature Distributions
03/18/2010US20100071060 Electronic device and method for verifying user identification
03/18/2010US20100071059 Information processing system, input apparatus, and information processing method
03/18/2010US20100071058 Electronic device and controlling method of electronic device
03/18/2010US20100071054 Network security appliance
03/18/2010US20100071053 Presence Status Notification From Digital Endpoint Devices Through A Multi-Services Gateway Device At The User Premises