Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
03/18/2010 | US20100071050 Optimizing state sharing between firewalls on multi-homed networks |
03/18/2010 | US20100071049 A method for identifying a task authorization |
03/18/2010 | US20100071048 Service binding |
03/18/2010 | US20100071046 Method and System for Enabling Access to a Web Service Provider Through Login Based Badges Embedded in a Third Party Site |
03/18/2010 | US20100071044 Method for tracking location of patients and doctors in a medical office or hospital practice |
03/18/2010 | US20100071043 Uninterrupted virtual private network (vpn) connection service with dynamic policy enforcement |
03/18/2010 | US20100071042 Selection and application of roles and systems based on username and layout id |
03/18/2010 | US20100071039 Image sharing server, system, method, and recording medium |
03/18/2010 | US20100071038 Network-agnostic content management |
03/18/2010 | US20100071037 System for restricting content access and storage |
03/18/2010 | US20100071034 System for preventing unauthorized acquisition of information and method thereof |
03/18/2010 | US20100071031 Multiple biometric smart card authentication |
03/18/2010 | US20100071029 Method for Granting an Access Authorization for a Computer-Based Object in an Automation System, Computer Program and Automation System |
03/18/2010 | US20100071026 Widget host container component for a rapid application development tool |
03/18/2010 | US20100071025 Securing live migration of a virtual machine within a service landscape |
03/18/2010 | US20100071024 Hierarchical application of security services within a computer network |
03/18/2010 | US20100071020 Systems and methods for distributing software for a host device in a cable system |
03/18/2010 | US20100070791 Power supply monitoring method and system |
03/18/2010 | US20100070781 Method and system for bootstrapping a trusted server having redundant trusted platform modules |
03/18/2010 | US20100070778 Secure file encryption |
03/18/2010 | US20100070776 Logging system events |
03/18/2010 | US20100070772 Navigation apparatus and information distribution system |
03/18/2010 | US20100070769 Log acquisition system, log collection terminal, log acquisition terminal, and log acquisition method and program using the same system and terminals |
03/18/2010 | US20100070760 Ticket-based spectrum authorization and access control |
03/18/2010 | US20100070756 Device and method for digital processing management of content so as to enable an imposed work flow |
03/18/2010 | US20100070634 Protocol exchange and policy enforcement for a terminal server session |
03/18/2010 | US20100070582 Device Management Across Firewall Architecture |
03/18/2010 | US20100070522 Systems and methods for generating and displaying an intellectual property rights profile for a media presentation |
03/18/2010 | US20100070518 Method for protecting private information and computer-readable recording medium storing program for executing the same |
03/18/2010 | US20100070508 Information correlation system, user information correlating method, and program |
03/18/2010 | US20100070479 Proactive Information Monitoring Systems and Methods |
03/18/2010 | US20100070381 Licensing media consumption using digital currency |
03/18/2010 | US20100067706 Image encrypting device, image decrypting device and method |
03/18/2010 | US20100066834 Imaging apparatus |
03/18/2010 | US20100066507 Automated Control System for Multi-Level Authority to Operate Electronic and Electrical Devices |
03/18/2010 | CA2736659A1 Method enabling a user to keep permanently their favourite media files |
03/18/2010 | CA2733222A1 Management of communications from stolen devices |
03/17/2010 | EP2164226A1 Secure composition of web services |
03/17/2010 | EP2164053A1 Standalone counterattack method in response to one or several physical aggressions, and associated device |
03/17/2010 | EP2164022A1 Method for assigning access authorisation to a computer-based object in an automation system, computer program and automation system |
03/17/2010 | EP2164021A1 Method for recognising unwanted access and network server device |
03/17/2010 | EP2164020A2 Apparatus for controlling processor execution in a secure environment |
03/17/2010 | EP2164019A1 Biometric processing using random projection transforms |
03/17/2010 | EP2164018A1 Data processing method and associated device |
03/17/2010 | EP2164017A2 Automatic hardware-based recovery of a compromised computer |
03/17/2010 | EP2164016A1 Agentless enforcement of application management through virtualized block i/o redirection |
03/17/2010 | EP2164015A1 Information transmission method with semantic acknowledgement of receipt |
03/17/2010 | EP2164014A1 System, method and security device for authorizing use of a software tool |
03/17/2010 | EP2163986A2 Safe application distribution and execution in a wireless environment |
03/17/2010 | EP2163963A2 Information processing apparatus for installing an encrypted program in a key implemented system |
03/17/2010 | EP2163962A2 Fiber channel connection storage controller |
03/17/2010 | EP2163961A1 Method for assigning access authorisation to a computer-based object in an automation system, computer program and automation system |
03/17/2010 | EP2163114A2 Application logging interface for a mobile device |
03/17/2010 | EP2163063A2 Method and system for simulating a hacking attack on a network |
03/17/2010 | EP2163031A1 Method and system for secure hardware provisioning |
03/17/2010 | EP2163030A2 Access management method |
03/17/2010 | EP2163028A1 System and method of creating and sending broadcast and multicast data |
03/17/2010 | EP2163027A1 System and method for simulating computer network attacks |
03/17/2010 | EP2162913A1 Method for fabricating a security-protected electronic system, corresponding integrated circuit security protection device and corresponding electronic system |
03/17/2010 | EP2162846A2 Cryptoprocessor with improved data protection |
03/17/2010 | EP2162845A1 Portable mass storage device with hooking process |
03/17/2010 | EP1966684B1 Processor lock |
03/17/2010 | EP1135890B1 Data processing system and method for remotely disabling network activity in a client computer system |
03/17/2010 | CN201425755Y Resident identity number verification and health information query control system |
03/17/2010 | CN201425746Y Electronic password key USB Key |
03/17/2010 | CN101675440A Information processor having lock function, lock (unlock) method for information processor, and program thereof |
03/17/2010 | CN101675439A Protecting live content in a network |
03/17/2010 | CN101674302A Method and device for conducting security identification on information system |
03/17/2010 | CN101673334A Information embedding and extracting method with a type of PDF text as shelter |
03/17/2010 | CN101673333A Metering support method of measurement software module of virtual instrument |
03/17/2010 | CN101673332A Kernel code protection method based on Harvard architecture |
03/17/2010 | CN101673331A Theft-protective notebook computer |
03/17/2010 | CN101673330A BIOS-based computer security protection method and system |
03/17/2010 | CN101673329A Establishment method of biometric data, electronic device and computer program product thereof |
03/17/2010 | CN101673328A Certification method for digital film making system |
03/17/2010 | CN101673327A 电子装置 Electronic devices |
03/17/2010 | CN101673326A Method for detecting web page Trojan horse based on program execution characteristics |
03/17/2010 | CN101673325A Startup method |
03/17/2010 | CN101673324A Method for starting computer system |
03/17/2010 | CN101673323A Method for recording images |
03/17/2010 | CN101673302A Method for improving scanning speed of antivirus engine |
03/17/2010 | CN101673249A Data privacy system and method |
03/17/2010 | CN101673215A Computer and user management method in virtual environment |
03/17/2010 | CN101673197A Software trust ensuring method based on system structure evolution |
03/17/2010 | CN100594692C Information processing apparatus, a server apparatus, a method of an information processing apparatus, a method of a server apparatus |
03/17/2010 | CN100594547C Read-only recording medium containing sample data and reproducing method |
03/17/2010 | CN100594509C Software protection method |
03/17/2010 | CN100594508C Network system based control apparatus and control method thereof |
03/17/2010 | CN100594507C Data transmission device |
03/17/2010 | CN100594506C Data uploading transmission extension card apparatus embeded in computer |
03/17/2010 | CN100594505C Multi-computer switcher and related resource sharing device and file managing method |
03/17/2010 | CN100594504C Mobile medium divulgence-proof method based on concealed encrypted partition and PKI technology |
03/17/2010 | CN100594503C Virtual machine system and safety input method thereof |
03/17/2010 | CN100594502C Tech for registering a device with a rights issuer system |
03/16/2010 | US7681247 Anti-theft system and method for semiconductor devices and other electronic components |
03/16/2010 | US7681245 Remote feature activator feature extraction |
03/16/2010 | US7681243 Method and apparatus for processing digital rights management contents containing advertising contents |
03/16/2010 | US7681241 Apparatus and method for managing digital rights with arbitration |
03/16/2010 | US7681236 Unauthorized access prevention system |
03/16/2010 | US7681235 Dynamic network protection |