Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
03/2010
03/10/2010EP2161665A1 Data processing method for portable communication terminal and portable communication terminal
03/10/2010EP2160864A1 Authentication system and method
03/10/2010EP2160695A2 Activation system architecture
03/10/2010EP1964022B1 Unlocking a device by performing gestures on an unlock image
03/10/2010EP1732443B1 Method of identification of living body and apparatus for identification of living body
03/10/2010EP1509827B1 Validation of inclusion of a platform within a data center
03/10/2010EP1399808B1 Binding by hash
03/10/2010EP1293062B1 Method for secure biometric authentication/identification, biometric data input module and verification module
03/10/2010CN101669148A Data survey device, integrated with a communication system, and related method
03/10/2010CN101669128A Cascading authentication system
03/10/2010CN101669127A Peripheral security device
03/10/2010CN101669126A Method and apparatus for composing a digital rights management license format
03/10/2010CN101669125A Method and system for authenticating a user
03/10/2010CN101669124A Method of storing and accessing header data from memory
03/10/2010CN101668077A Mobile terminal to prevent virus infection and method of controlling operation of the mobile terminal
03/10/2010CN101667239A Protection method permitted by webmaster and device therefor
03/10/2010CN101667238A Virtual instrument measuring support storage device
03/10/2010CN101667237A Method and device for controlling program execution area
03/10/2010CN101667236A Method and device for controlling driver installation
03/10/2010CN101667235A Method and device for protecting user privacy
03/10/2010CN101667234A Locking state conversion method, electronic device and computer program product
03/10/2010CN101667233A Securing a device based on atypical user behavior
03/10/2010CN101667232A Terminal credible security system and method based on credible computing
03/10/2010CN101667231A Electronic system and interactive type input method thereof
03/10/2010CN101667230A Method and device for monitoring script execution
03/10/2010CN100593921C Time stamp service system and checking server for time stamp information and computer software
03/10/2010CN100593789C Technology for providing network game anti external hanging image origin by 3D technology
03/10/2010CN100593788C A method for realizing software protection based on data file encryption
03/10/2010CN100593787C Hashed file auditing and outputting method
03/10/2010CN100593786C Sytem and method for providing access to OMA DRM protected files from JAVA applications
03/09/2010US7676847 Application execution device, application execution method, integrated circuit, and computer-readable program
03/09/2010US7676846 Binding content to an entity
03/09/2010US7676844 Signal reproducing system
03/09/2010US7676842 System and method for detecting malicious code
03/09/2010US7676840 Use of hashing in a secure boot loader
03/09/2010US7676839 Systems and methods for access control
03/09/2010US7676834 System and method for blocking unauthorized network log in using stolen password
03/09/2010US7676801 Scanning of evacuated objects in a generation managed by the train algorithm
03/09/2010US7676749 Login management technique
03/09/2010US7676681 Method, system, and apparatus for identification number authentication
03/09/2010US7676675 Architecture for connecting a remote client to a local client desktop
03/09/2010US7676672 Administrative security systems and methods
03/09/2010US7676668 System and method for monitoring configuration changes in a document processing device
03/09/2010US7676645 Method, system, and article of manufacture for reserving memory
03/09/2010US7676575 Method and device for managing access to network
03/09/2010US7676439 Electronic data vault providing biometrically protected electronic signatures
03/09/2010US7676437 Real-time license enforcement system and method
03/09/2010US7676398 Method for electronic commerce using open cable
03/09/2010US7676042 Terminal apparatus, server apparatus, and digital content distribution system
03/09/2010US7676040 Changing encryption key of encrypted data
03/09/2010US7674082 Wall mountable printer with a glue applicator assembly and a binder assembly
03/09/2010US7673794 Personal information verification program, method and apparatus
03/09/2010CA2363838C Distributed data archive device and system
03/05/2010CA2677491A1 Enhanced distribution of digital content
03/04/2010WO2010025390A2 Copyright status determination system and method
03/04/2010WO2010025301A2 Merchant registration web page interface and method for support of merchant data processing
03/04/2010WO2010025007A2 Protecting a virtual guest machine from attacks by an infected host
03/04/2010WO2010024931A1 Cryptographic accumulators for authenticated hash tables
03/04/2010WO2010024606A2 System and method for providing a normal file database
03/04/2010WO2010024257A1 Relay apparatus, method therefor and authentication system
03/04/2010WO2010024024A1 Network game system and client game device
03/04/2010WO2010023981A1 Display terminal, work object device, and manual read system
03/04/2010WO2010023779A1 Server certificate issuing system and person authentication method
03/04/2010WO2010023713A1 Contents transmission/reception system, contents receiver and contents transmission/reception method
03/04/2010WO2010023557A2 Heuristic method of code analysis
03/04/2010WO2010023508A1 Method, apparatus and computer program product for providing device security
03/04/2010WO2010023477A1 Data leak protection application
03/04/2010WO2010023352A1 Method, apparatus and computer program to generate a unique node identifier
03/04/2010WO2010023279A1 Method for the secured transmission of data in an automation system comprising a plurality of network nodes, computer program and automation system
03/04/2010WO2010023147A1 Method and apparatus for storing and verifying data
03/04/2010WO2009158214A3 Communication authentication
03/04/2010WO2009154842A3 Controlling access to documents using file locks
03/04/2010WO2009154353A3 Method for blocking harmful internet sites in real time using engine for accessing object's properties
03/04/2010WO2009151703A3 Computing input system with secure storage and method of operation thereof
03/04/2010WO2009134930A3 Discarding sensitive data from persistent point-in-time image
03/04/2010WO2009134213A3 Method and system for on-screen authentication using secret visual message
03/04/2010WO2009031140A3 Information protection device
03/04/2010US20100058487 Copyright protection data processing system and reproduction device
03/04/2010US20100058486 Method for secure access to and secure data transfer from a virtual sensitive compartmented information facility (scif)
03/04/2010US20100058483 Method for protecting signatures stored in a database
03/04/2010US20100058482 Image forming apparatus, license determining method, recording medium
03/04/2010US20100058481 Non-displaying method of secret information and information processing device
03/04/2010US20100058480 Information management in devices worn by a user
03/04/2010US20100058479 Method and system for combating malware with keystroke logging functionality
03/04/2010US20100058478 Software anti-piracy protection
03/04/2010US20100058476 Electronic information retention method/system, electronic information split retention method/system, electronic information split restoration processing method/system, and programs for the same
03/04/2010US20100058474 System and method for the detection of malware
03/04/2010US20100058473 Heuristic method of code analysis
03/04/2010US20100058472 Method for protecting computer programs and data from hostile code
03/04/2010US20100058470 Mobile terminal to prevent virus infection and method of controlling operation of the mobile terminal
03/04/2010US20100058469 Anomaly information distribution with threshold
03/04/2010US20100058468 Identifying reputation and trust information for software
03/04/2010US20100058467 Efficiency of active content filtering using cached ruleset metadata
03/04/2010US20100058466 Systems and methods for providing security for software applications
03/04/2010US20100058464 Implementing a Process-Based Protection System in a User-Based Protection Environment in a Computing Device
03/04/2010US20100058463 Method of exchanging data between two electronic entities
03/04/2010US20100058462 Multiple user accounts for managing stored information in an implantable medical device system
03/04/2010US20100058461 Embedded system with authentication, and associated authentication method
03/04/2010US20100058460 System and method for authenticating an end user
03/04/2010US20100058458 System and method for providing a secure connection between networked computers