Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
12/2009
12/30/2009EP2138946A1 Secure memory management system
12/30/2009EP2137724A1 Digital method and arrangement for authenticating a person
12/30/2009EP2137705A1 Method for transmitting data regarding an individual to a control device
12/30/2009EP2137666A1 Selectively enabled threat based information system
12/30/2009EP2137665A1 Authentication method and token using screen light for both communication and powering
12/30/2009EP2137664A2 Method for producing acknowledged transaction data and corresponding device
12/30/2009EP2137663A1 Method of protecting digital documents against unauthorized uses
12/30/2009EP2137662A1 Encryption and decryption of a dataset in at least two dimensions
12/30/2009EP2137661A1 Media package, system comprising a media package and method of executing program code
12/30/2009EP2137651A1 Binary verification service
12/30/2009EP2137609A1 Trusted component update system and method
12/30/2009EP1428099B1 A texturing system
12/30/2009CN201374068Y Personal computer with handwriting identification function
12/30/2009CN101617324A Copyright protection data processing system and reproduction device
12/30/2009CN101617323A Right information moving method, content player, and semiconductor device
12/30/2009CN101617322A Information processing device, information processing method, and program
12/30/2009CN101617321A Terminal device and program
12/30/2009CN101617320A Terminal device and program
12/30/2009CN101617319A Semiconductor device with backside tamper protection
12/30/2009CN101617318A Methods and apparatuses for linking content with license
12/30/2009CN101616416A Method and equipment for authenticating smart card of communication terminal
12/30/2009CN101615238A Binary-based system for detecting memory modifying attack and positioning bug
12/30/2009CN101615237A Verifiable embedded type system and verification method thereof
12/30/2009CN101615236A Constructing method for trusted application environment based on mandatory access control technology
12/30/2009CN101615235A Self-destruction system for memory data
12/30/2009CN101615234A Automatic defensive module and method for combining electronic device with same
12/30/2009CN101615233A Methods and apparatus for secure data processing and transmission
12/30/2009CN101615232A Sending a log of accessed data prior to executing disable command in lost computer
12/30/2009CN101615231A Recording medium, license management apparatus, and recording and playback apparatus
12/30/2009CN101615230A Method of credible execution and credible protection of file
12/30/2009CN101615229A Information processing device and indication control method
12/30/2009CN100576911C Mpeg-21 digital content protection system
12/30/2009CN100576792C File enciphered share method
12/30/2009CN100576267C Mobile terminal and authentication method
12/30/2009CN100576227C Software encrypting registration piracy-preventing method
12/30/2009CN100576226C Database encryption method based on Chinese remainder theorem
12/30/2009CN100576225C External memory management apparatus and external memory management method
12/30/2009CN100576222C Methods and apparatus for detecting patterns in a data stream
12/30/2009CN100576206C Security structure of database, and method of use
12/30/2009CN100576137C Method and system for the user-specific initialization of identification devices in the field
12/30/2009CN100576136C Method for operating a data transmission network using license data and associated device network
12/30/2009CA2728445A1 Secure memory management system and method
12/30/2009CA2726063A1 System, method and apparatus for security management of an electronic device
12/30/2009CA2724853A1 Protected mode scheduling of operations
12/30/2009CA2724679A1 Structured coauthoring
12/29/2009US7640597 Image display device
12/29/2009US7640596 Mobile device for preventing illegal distribution of digital data contents and operating method thereof
12/29/2009US7640595 Computing system with decryption functions and secure data product
12/29/2009US7640592 Installation setup
12/29/2009US7640584 System and method for enhancing computer security
12/29/2009US7640573 Generic security claim processing model
12/29/2009US7640543 Memory isolation and virtualization among virtual machines
12/29/2009US7640540 Mechanism for providing extended functionality to command line instructions
12/29/2009US7640487 Method of filtering a bitstream according to user specifications
12/29/2009US7640435 System, method, and apparatus for securely providing content viewable on a secure device
12/29/2009US7640434 Identification of undesirable content in responses sent in reply to a user request for content
12/29/2009US7640429 Cryptographically enforced, multiple-role, policy-enabled object dissemination control mechanism
12/29/2009US7640334 Network resource location detection probe apparatus and method
12/29/2009US7640186 Systems and methods for reselling electronic merchandise
12/29/2009US7639925 File management system of image data
12/29/2009US7639846 Authentication system and program
12/29/2009US7639834 Software anti-piracy systems and methods utilizing certificates with digital content
12/29/2009US7639818 Structured document signature device, structured document adaptation device and structured document verification device
12/29/2009US7639806 Fingerprinting digital devices using electromagnetic characteristics of their communications
12/29/2009US7639794 Service use device
12/29/2009US7639714 Apparatus method and medium for detecting payload anomaly using n-gram distribution of normal data
12/24/2009US20090320145 Apparatus, method, and computer program for controlling use of a content
12/24/2009US20090320143 Sensor interface
12/24/2009US20090320142 Data processor
12/24/2009US20090320141 Document data security management method and system therefor
12/24/2009US20090320140 Piracy Prevention Using Unique Module Translation
12/24/2009US20090320139 Transponder incorporated into an electronic device
12/24/2009US20090320136 Identifying exploitation of vulnerabilities using error report
12/24/2009US20090320134 Detecting Secondary Infections in Virus Scanning
12/24/2009US20090320133 Streaming malware definition updates
12/24/2009US20090320132 Systems and methods for distributed network protection
12/24/2009US20090320131 Method and System for Preventing Malicious Communication
12/24/2009US20090320130 Traitor detection for multilevel assignment
12/24/2009US20090320128 System management interrupt (smi) security
12/24/2009US20090320126 Information processing apparatus and method
12/24/2009US20090320125 Systems, methods, and computer readable media for computer security
12/24/2009US20090320122 Congestion management of session negotiations in network devices
12/24/2009US20090320121 System and methods for secure service oriented architectures
12/24/2009US20090320120 Replicating message queues between clustered email gateway systems
12/24/2009US20090320118 Security Token and Method for Authentication of a User with the Security Token
12/24/2009US20090320116 Federated realm discovery
12/24/2009US20090320113 Home networking web-based service portal
12/24/2009US20090320112 Method of Gaining Access to a Device
12/24/2009US20090320110 Secure boot with optional components method
12/24/2009US20090320108 Generating And Changing Credentials Of A Service Account
12/24/2009US20090320104 Communications Network with Smart Card
12/24/2009US20090320103 Extensible mechanism for securing objects using claims
12/24/2009US20090320100 Handling of integrity check failure in a wireless communication system
12/24/2009US20090320097 Method for carrying out a distributed search
12/24/2009US20090320096 Managing access to a health-record
12/24/2009US20090320095 Obtaining digital identities or tokens through independent endpoint resolution
12/24/2009US20090320094 System and Method for Implementing a Publication
12/24/2009US20090320092 User interface for managing access to a health-record
12/24/2009US20090320090 Deploying privacy policy in a network environment
12/24/2009US20090320089 Policy-based user brokered authorization