Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
03/10/2010 | EP2161665A1 Data processing method for portable communication terminal and portable communication terminal |
03/10/2010 | EP2160864A1 Authentication system and method |
03/10/2010 | EP2160695A2 Activation system architecture |
03/10/2010 | EP1964022B1 Unlocking a device by performing gestures on an unlock image |
03/10/2010 | EP1732443B1 Method of identification of living body and apparatus for identification of living body |
03/10/2010 | EP1509827B1 Validation of inclusion of a platform within a data center |
03/10/2010 | EP1399808B1 Binding by hash |
03/10/2010 | EP1293062B1 Method for secure biometric authentication/identification, biometric data input module and verification module |
03/10/2010 | CN101669148A Data survey device, integrated with a communication system, and related method |
03/10/2010 | CN101669128A Cascading authentication system |
03/10/2010 | CN101669127A Peripheral security device |
03/10/2010 | CN101669126A Method and apparatus for composing a digital rights management license format |
03/10/2010 | CN101669125A Method and system for authenticating a user |
03/10/2010 | CN101669124A Method of storing and accessing header data from memory |
03/10/2010 | CN101668077A Mobile terminal to prevent virus infection and method of controlling operation of the mobile terminal |
03/10/2010 | CN101667239A Protection method permitted by webmaster and device therefor |
03/10/2010 | CN101667238A Virtual instrument measuring support storage device |
03/10/2010 | CN101667237A Method and device for controlling program execution area |
03/10/2010 | CN101667236A Method and device for controlling driver installation |
03/10/2010 | CN101667235A Method and device for protecting user privacy |
03/10/2010 | CN101667234A Locking state conversion method, electronic device and computer program product |
03/10/2010 | CN101667233A Securing a device based on atypical user behavior |
03/10/2010 | CN101667232A Terminal credible security system and method based on credible computing |
03/10/2010 | CN101667231A Electronic system and interactive type input method thereof |
03/10/2010 | CN101667230A Method and device for monitoring script execution |
03/10/2010 | CN100593921C Time stamp service system and checking server for time stamp information and computer software |
03/10/2010 | CN100593789C Technology for providing network game anti external hanging image origin by 3D technology |
03/10/2010 | CN100593788C A method for realizing software protection based on data file encryption |
03/10/2010 | CN100593787C Hashed file auditing and outputting method |
03/10/2010 | CN100593786C Sytem and method for providing access to OMA DRM protected files from JAVA applications |
03/09/2010 | US7676847 Application execution device, application execution method, integrated circuit, and computer-readable program |
03/09/2010 | US7676846 Binding content to an entity |
03/09/2010 | US7676844 Signal reproducing system |
03/09/2010 | US7676842 System and method for detecting malicious code |
03/09/2010 | US7676840 Use of hashing in a secure boot loader |
03/09/2010 | US7676839 Systems and methods for access control |
03/09/2010 | US7676834 System and method for blocking unauthorized network log in using stolen password |
03/09/2010 | US7676801 Scanning of evacuated objects in a generation managed by the train algorithm |
03/09/2010 | US7676749 Login management technique |
03/09/2010 | US7676681 Method, system, and apparatus for identification number authentication |
03/09/2010 | US7676675 Architecture for connecting a remote client to a local client desktop |
03/09/2010 | US7676672 Administrative security systems and methods |
03/09/2010 | US7676668 System and method for monitoring configuration changes in a document processing device |
03/09/2010 | US7676645 Method, system, and article of manufacture for reserving memory |
03/09/2010 | US7676575 Method and device for managing access to network |
03/09/2010 | US7676439 Electronic data vault providing biometrically protected electronic signatures |
03/09/2010 | US7676437 Real-time license enforcement system and method |
03/09/2010 | US7676398 Method for electronic commerce using open cable |
03/09/2010 | US7676042 Terminal apparatus, server apparatus, and digital content distribution system |
03/09/2010 | US7676040 Changing encryption key of encrypted data |
03/09/2010 | US7674082 Wall mountable printer with a glue applicator assembly and a binder assembly |
03/09/2010 | US7673794 Personal information verification program, method and apparatus |
03/09/2010 | CA2363838C Distributed data archive device and system |
03/05/2010 | CA2677491A1 Enhanced distribution of digital content |
03/04/2010 | WO2010025390A2 Copyright status determination system and method |
03/04/2010 | WO2010025301A2 Merchant registration web page interface and method for support of merchant data processing |
03/04/2010 | WO2010025007A2 Protecting a virtual guest machine from attacks by an infected host |
03/04/2010 | WO2010024931A1 Cryptographic accumulators for authenticated hash tables |
03/04/2010 | WO2010024606A2 System and method for providing a normal file database |
03/04/2010 | WO2010024257A1 Relay apparatus, method therefor and authentication system |
03/04/2010 | WO2010024024A1 Network game system and client game device |
03/04/2010 | WO2010023981A1 Display terminal, work object device, and manual read system |
03/04/2010 | WO2010023779A1 Server certificate issuing system and person authentication method |
03/04/2010 | WO2010023713A1 Contents transmission/reception system, contents receiver and contents transmission/reception method |
03/04/2010 | WO2010023557A2 Heuristic method of code analysis |
03/04/2010 | WO2010023508A1 Method, apparatus and computer program product for providing device security |
03/04/2010 | WO2010023477A1 Data leak protection application |
03/04/2010 | WO2010023352A1 Method, apparatus and computer program to generate a unique node identifier |
03/04/2010 | WO2010023279A1 Method for the secured transmission of data in an automation system comprising a plurality of network nodes, computer program and automation system |
03/04/2010 | WO2010023147A1 Method and apparatus for storing and verifying data |
03/04/2010 | WO2009158214A3 Communication authentication |
03/04/2010 | WO2009154842A3 Controlling access to documents using file locks |
03/04/2010 | WO2009154353A3 Method for blocking harmful internet sites in real time using engine for accessing object's properties |
03/04/2010 | WO2009151703A3 Computing input system with secure storage and method of operation thereof |
03/04/2010 | WO2009134930A3 Discarding sensitive data from persistent point-in-time image |
03/04/2010 | WO2009134213A3 Method and system for on-screen authentication using secret visual message |
03/04/2010 | WO2009031140A3 Information protection device |
03/04/2010 | US20100058487 Copyright protection data processing system and reproduction device |
03/04/2010 | US20100058486 Method for secure access to and secure data transfer from a virtual sensitive compartmented information facility (scif) |
03/04/2010 | US20100058483 Method for protecting signatures stored in a database |
03/04/2010 | US20100058482 Image forming apparatus, license determining method, recording medium |
03/04/2010 | US20100058481 Non-displaying method of secret information and information processing device |
03/04/2010 | US20100058480 Information management in devices worn by a user |
03/04/2010 | US20100058479 Method and system for combating malware with keystroke logging functionality |
03/04/2010 | US20100058478 Software anti-piracy protection |
03/04/2010 | US20100058476 Electronic information retention method/system, electronic information split retention method/system, electronic information split restoration processing method/system, and programs for the same |
03/04/2010 | US20100058474 System and method for the detection of malware |
03/04/2010 | US20100058473 Heuristic method of code analysis |
03/04/2010 | US20100058472 Method for protecting computer programs and data from hostile code |
03/04/2010 | US20100058470 Mobile terminal to prevent virus infection and method of controlling operation of the mobile terminal |
03/04/2010 | US20100058469 Anomaly information distribution with threshold |
03/04/2010 | US20100058468 Identifying reputation and trust information for software |
03/04/2010 | US20100058467 Efficiency of active content filtering using cached ruleset metadata |
03/04/2010 | US20100058466 Systems and methods for providing security for software applications |
03/04/2010 | US20100058464 Implementing a Process-Based Protection System in a User-Based Protection Environment in a Computing Device |
03/04/2010 | US20100058463 Method of exchanging data between two electronic entities |
03/04/2010 | US20100058462 Multiple user accounts for managing stored information in an implantable medical device system |
03/04/2010 | US20100058461 Embedded system with authentication, and associated authentication method |
03/04/2010 | US20100058460 System and method for authenticating an end user |
03/04/2010 | US20100058458 System and method for providing a secure connection between networked computers |