Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
02/2010
02/17/2010CN100590632C Information processing apparatus and authentication method
02/17/2010CN100590631C Method and system for secure binding register name identifier profile
02/17/2010CN100590613C Invalidity monitoring method and invalidity monitoring system
02/17/2010CN100590590C Data exchange system containing portable data processing unit
02/16/2010US7665145 Apparatus and method for moving contents having a restricted number of copies between storage media
02/16/2010US7665144 Apparatus and method for moving contents having a restricted number of copies between storage media
02/16/2010US7665140 Fraudulent message detection
02/16/2010US7665138 Detecting method and architecture thereof for malicious codes
02/16/2010US7665133 System and method for monitoring processing in a document processing peripheral
02/16/2010US7665124 Authentication device
02/16/2010US7665122 Authentication apparatus, method and program
02/16/2010US7665120 Visual summary of a web service policy document
02/16/2010US7665119 Policy-based selection of remediation
02/16/2010US7665118 Server, computer memory, and method to support security policy maintenance and distribution
02/16/2010US7665086 Software project filter
02/16/2010US7664984 Method and system for updating a software image
02/16/2010US7664966 Secure storage on recordable medium in a content protection system
02/16/2010US7664965 Method and system for bootstrapping a trusted server having redundant trusted platform modules
02/16/2010US7664962 Multiple-input, automatic recognition method and apparatus
02/16/2010US7664960 Password enhancing device
02/16/2010US7664956 Method and system for real-time control of document printing
02/16/2010US7664953 Data processing device, method of same, and program of same
02/16/2010US7664952 Service verifying system, authentication requesting terminal, service utilizing terminal, and service providing method
02/16/2010US7664950 Method for dynamically changing intrusion detection rule in kernel level intrusion detection system
02/16/2010US7664916 Global smartcard cache methods and apparatuses
02/16/2010US7664914 Hierarchical control apparatus of hierarchical storage system and method for maintaining and managing duplexed media
02/16/2010US7664822 Systems and methods for authentication of target protocol screen names
02/16/2010US7664754 Method of, and system for, heuristically detecting viruses in executable code
02/16/2010US7664724 Schema-based services for identity-based data access
02/16/2010US7664709 Method and system for securely distributing computer software products
02/16/2010US7664708 System for controlling the distribution and use of digital works using digital tickets
02/16/2010US7664707 System and method for handling peripheral connections to mobile devices
02/16/2010US7664706 Method for granting customers access to a product
02/16/2010US7664702 Method of conducting an EMV payment process using IRFM
02/16/2010US7664679 Method and a system for computer software distribution using networked software dispensing vending machines
02/16/2010US7664332 Pre-processed information embedding system
02/16/2010US7664263 Method for combining transfer functions with predetermined key creation
02/16/2010US7664262 Playback apparatus and playback control method
02/16/2010US7664021 Recording and reproducing apparatus and file transfer method
02/16/2010US7664000 Data erase method for rewritable phase change type recording medium
02/16/2010US7663775 Wireless transmitter pen
02/16/2010US7663602 Removable wireless keyboard with base
02/16/2010US7661793 Inkjet nozzle with individual ink feed channels etched from both sides of wafer
02/16/2010US7661589 Security management software, print control device, and security management method of print control device
02/16/2010CA2358714C Method and apparatus for information processing, and medium for storing information
02/11/2010WO2010017517A1 Secure computing environment using a client heartbeat to address theft and unauthorized access
02/11/2010WO2010017516A1 Secure computing environment to address theft and unauthorized access
02/11/2010WO2010017493A2 Transaction secured in an untrusted environment
02/11/2010WO2010017025A2 Secure resource name resolution
02/11/2010WO2010017023A2 Secure resource name resolution using a cache
02/11/2010WO2010016802A1 A method for creating a verifiable media object, a corresponding system thereof, and a verification package for a media object
02/11/2010WO2010016667A2 Method and apparatus for protecting digital content using hardware identification information
02/11/2010WO2010016654A1 Portable storage medium, control server, authentication system, content providing system and control method thereof
02/11/2010WO2010016382A1 Information processing method, information processing device, and storage medium containing program
02/11/2010WO2010016344A1 Age authentication system
02/11/2010WO2010016332A1 Communication device, communication method, and program
02/11/2010WO2010016163A1 Collective suspension/settlement representation processing server device and program
02/11/2010WO2010016112A1 Storage device, electronic device, storage device adapter and electronic system
02/11/2010WO2010016063A1 System and method for protecting content on a storage device
02/11/2010WO2010015904A2 Backing up digital content that is stored in a secured storage device
02/11/2010WO2010015609A1 An apparatus for managing user authentication
02/11/2010WO2010015160A1 Content control method and device
02/11/2010WO2010015145A1 Method and system for filtering and monitoring program behaviors
02/11/2010WO2009154992A3 Intelligent hashes for centralized malware detection
02/11/2010US20100037327 System for managing hardware resources, computer system, method for managing hardware resources, and program
02/11/2010US20100037326 Radiation curable embossed ink security devices for security documents
02/11/2010US20100037325 Enhanced Packaging for PC Security
02/11/2010US20100037324 Computer file control through file tagging
02/11/2010US20100037323 Receiving policy data from a server to address theft and unauthorized access of a client
02/11/2010US20100037322 Method for securing a transaction performed with a programmable portable device
02/11/2010US20100037321 Systems and Methods for Providing Security Services During Power Management Mode
02/11/2010US20100037320 System and Method for On-Line Exchange and Trade of Information
02/11/2010US20100037318 Network Intrusion Detection
02/11/2010US20100037317 Mehtod and system for security monitoring of the interface between a browser and an external browser module
02/11/2010US20100037314 Method and system for detecting malicious and/or botnet-related domain names
02/11/2010US20100037312 Secure computing environment to address theft and unauthorized access
02/11/2010US20100037311 Secure network architecture
02/11/2010US20100037310 Dynamically adaptive network firewalls and method, system and computer program product implementing same
02/11/2010US20100037309 Method and apparatus for providing security in an intranet network
02/11/2010US20100037307 Computer program code and method for delivering external data to a process running on a virtual machine
02/11/2010US20100037306 Electronic device and access control method thereof
02/11/2010US20100037304 User-centric resource architecture
02/11/2010US20100037300 Method and apparatus for notifying remote user interface client about event of remote user interface server in home network
02/11/2010US20100037298 Method and System for Protecting a Service Access Link
02/11/2010US20100037297 Method and System for Deterring Product Counterfeiting, Diversion and Piracy
02/11/2010US20100037296 Client Authentication And Data Management System
02/11/2010US20100037292 System and Method for Secure Record Management in a Virtual Space
02/11/2010US20100037291 Secure computing environment using a client heartbeat to address theft and unauthorized access
02/11/2010US20100037290 System and method for hierarchical role-based entitlements
02/11/2010US20100037284 Means and method for controlling network access in integrated communications networks
02/11/2010US20100037236 Information processing method, apparatus, and system for controlling computer resources, control method therefor, storage medium, and program
02/11/2010US20100037067 Operating System
02/11/2010US20100037060 File system authentication
02/11/2010US20100037058 Collaborative security and decision making in a service-oriented environment
02/11/2010US20100037052 Network Binding
02/11/2010US20100037051 Method for sharing rights objects between users
02/11/2010US20100037047 Method for Controlling Access to File Systems, Related System, Sim Card and Computer Program Product for Use therein
02/11/2010US20100036985 System architecture for motor vehicles with enable interfaces for the start-up thereof
02/11/2010US20100036955 Creating Rules For Routing Resource Access Requests
02/11/2010US20100036893 Architecture for accessing a data stream by means of a user terminal