Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
02/2010
02/25/2010CA2771720A1 Api for auxiliary interface
02/25/2010CA2771716A1 Invocation of system services through auxiliary interface
02/25/2010CA2771715A1 Display of information through auxiliary user interface
02/25/2010CA2758332A1 Method and apparatus for transmitting and receiving secure and non-secure data
02/25/2010CA2735247A1 Isolated multi-network computer system and apparatus
02/25/2010CA2734496A1 Data packet generator for generating passcodes
02/24/2010EP2157726A2 Method and device for inserting and authenticating a digital signature in digital data
02/24/2010EP2157578A1 Optical disk and a method for reproducing data from such an optical disk
02/24/2010EP2157576A2 Optical disk and a method for reproducing data from such an optical disk
02/24/2010EP2157574A2 Optical disk and a method for reproducing data from such an optical disk
02/24/2010EP2157529A1 System and method for quality assured analytical testing
02/24/2010EP2157528A1 Security measure situation self-check system
02/24/2010EP2157527A1 The method, device and system for forwarding the license
02/24/2010EP2157526A1 RFID reader with embedded attack detection heuristics
02/24/2010EP2157525A1 Method for recognising malware
02/24/2010EP2157494A1 Information processing unit
02/24/2010EP2156402A1 Integrating security by obscurity with access control lists
02/24/2010EP2156364A1 Encoded data security mechanism
02/24/2010EP2156363A2 Method and system for content level reactive authorization
02/24/2010EP2156360A2 Access control onboard system for communication from open domain to avionics domain
02/24/2010EP2156359A2 Apparatus for controlling processor execution in a secure environment
02/24/2010EP2156358A1 Memory device using the time from a trusted host device and method for use therewith
02/24/2010EP2156357A1 Trusted operating environment for malware detection
02/24/2010EP2156356A1 Trusted operating environment for malware detection
02/24/2010EP2156355A1 Memory device with circuitry for improving accuracy of a time estimate used to authenticate an entity and method for use therewith
02/24/2010EP2156354A1 Method and system for preventing impersonation of a computer system user
02/24/2010EP2156353A1 Memory device with circuitry for improving accuracy of a time estimate used in digital rights management (drm) license validation and method for use therewith
02/24/2010EP2156352A2 Method an apparatus for obtaining content license rights via a document link resolver
02/24/2010EP2156306A1 Pre-authenticated calling for voice applications
02/24/2010EP1490769B1 Method and apparatus for compressing log record information
02/24/2010CN101657823A Content use system and advertisement content use method
02/24/2010CN101657822A Data storage method, client device, storage device, and program
02/24/2010CN101657821A Mobile unit parental control
02/24/2010CN101656955A Information processing apparatus, information processing method, information processing program and information processing system
02/24/2010CN101655895A 内容控制系统 Content control system
02/24/2010CN101655894A Method for improving throughput of grouping algorithm on general serial bus encryption lock
02/24/2010CN101655893A Manufacture method of intelligent blog lock, Blog access control method and system thereof
02/24/2010CN101655892A Mobile terminal and access control method
02/24/2010CN101655891A Information processing device, data processing method, and program
02/24/2010CN101655653A Projector for projecting password and method therof
02/24/2010CN101655652A Projector for projecting password and method therof
02/24/2010CN100592827C System, method and apparatus for federated single sign-on services
02/24/2010CN100592739C Method and apparatus to provide secure communication
02/24/2010CN100592683C Protected return path from digital rights management dongle
02/24/2010CN100592682C Method and device for safely assigning content of program
02/24/2010CN100592320C Method for protecting data from unauthorized access
02/24/2010CN100592319C Method for automatically obtaining authorization of user
02/24/2010CN100592318C Method and system for accomplishing privilege object sharing, and storage equipment
02/24/2010CN100592317C Peripheral apparatus and method for verifying authority thereof
02/24/2010CN100592316C U disk information report method, mobile terminal and communication system
02/24/2010CN100592315C XACML policy rule checking method
02/24/2010CN100592314C An access overtime protection method for mobile storage card
02/24/2010CN100592313C Electric document anti-disclosure system and its implementing method
02/24/2010CN100592312C Digital literary property protection method, system, user equipment and multimedia server
02/24/2010CN100592311C Operating system independent data management
02/23/2010US7669247 Content processing apparatus
02/23/2010US7669243 Method and system for detection and neutralization of buffer overflow attacks
02/23/2010US7669238 Evidence-based application security
02/23/2010US7669237 Enterprise-wide security system for computer devices
02/23/2010US7669236 Determining whether to grant access to a passcode protected system
02/23/2010US7669235 Secure domain join for computing devices
02/23/2010US7669233 Methods and systems for secure transmission of identification information over public networks
02/23/2010US7669228 System and method for changing network behavior based on presence information
02/23/2010US7669227 Information management system
02/23/2010US7669225 Apparatus and method for assuring compliance with distribution and usage policy
02/23/2010US7669199 Installation of software stacks including uncoordinated projects
02/23/2010US7669064 Diagnostic and managing distributed processor system
02/23/2010US7669060 Data processing apparatus
02/23/2010US7669059 Method and apparatus for detection of hostile software
02/23/2010US7669058 Secure remote password validation
02/23/2010US7669057 Secure computer password system and method
02/23/2010US7669055 Key transformation unit for a tamper resistant module
02/23/2010US7669053 System and method for using acoustic digital signature generator as oracle
02/23/2010US7669052 Authentication and encryption utilizing command identifiers
02/23/2010US7668960 Territorial determination of remote computer location in a wide area network for conditional delivery of digitized products
02/23/2010US7668947 Methods and systems for managing assets
02/23/2010US7668861 System and method to determine the validity of an interaction on a network
02/23/2010US7668805 System and method for managing query access to information
02/23/2010US7668783 System and method for providing rental software, and rental software providing server and wireless terminal thereof
02/23/2010US7668666 Method and device for securely storing data
02/23/2010US7668533 Connection authentication in wireless communication network system
02/23/2010US7668316 Method for encrypting and decrypting metadata
02/23/2010US7665834 Print roll with ink reservoir and print media roll sections
02/23/2010CA2467911C Portable device and method for accessing data key actuated devices
02/23/2010CA2371963C Orientation sensing device
02/22/2010CA2639050A1 Methods and apparatus for maintaining permissions for client/server processing in a communication device
02/18/2010WO2010019707A2 Methods and systems for online fraud protection
02/18/2010WO2010019462A2 Method and apparatus for critical infrastructure protection
02/18/2010WO2010019461A2 Method and apparatus for critical infrastructure protection
02/18/2010WO2010019460A2 Method and apparatus for critical infrastructure protection
02/18/2010WO2010019389A1 Trust based digital rights management systems
02/18/2010WO2010019370A2 Protocol for device to station association
02/18/2010WO2010018579A2 Improved data entry system
02/18/2010WO2010018469A1 Method and apparatus for access to telematic services in protected mode by means of a single electronic universal key, and corresponding electronic universal key
02/18/2010WO2010018313A1 Computer checking tool
02/18/2010WO2010018072A1 Method of protecting configuration files for programmable logic circuits from decryption and circuit implementing the method
02/18/2010WO2010018071A1 Method for detecting abnormalities in a cryptographic circuit protected by differential logic, and circuit for implementing said method
02/18/2010WO2010018000A1 Authorization system with a card and a reader
02/18/2010WO2010017957A2 Method for operating a transaction-based flow controller
02/18/2010WO2010017828A1 Secure browser-based access to web services