Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
12/30/2009 | EP2138946A1 Secure memory management system |
12/30/2009 | EP2137724A1 Digital method and arrangement for authenticating a person |
12/30/2009 | EP2137705A1 Method for transmitting data regarding an individual to a control device |
12/30/2009 | EP2137666A1 Selectively enabled threat based information system |
12/30/2009 | EP2137665A1 Authentication method and token using screen light for both communication and powering |
12/30/2009 | EP2137664A2 Method for producing acknowledged transaction data and corresponding device |
12/30/2009 | EP2137663A1 Method of protecting digital documents against unauthorized uses |
12/30/2009 | EP2137662A1 Encryption and decryption of a dataset in at least two dimensions |
12/30/2009 | EP2137661A1 Media package, system comprising a media package and method of executing program code |
12/30/2009 | EP2137651A1 Binary verification service |
12/30/2009 | EP2137609A1 Trusted component update system and method |
12/30/2009 | EP1428099B1 A texturing system |
12/30/2009 | CN201374068Y Personal computer with handwriting identification function |
12/30/2009 | CN101617324A Copyright protection data processing system and reproduction device |
12/30/2009 | CN101617323A Right information moving method, content player, and semiconductor device |
12/30/2009 | CN101617322A Information processing device, information processing method, and program |
12/30/2009 | CN101617321A Terminal device and program |
12/30/2009 | CN101617320A Terminal device and program |
12/30/2009 | CN101617319A Semiconductor device with backside tamper protection |
12/30/2009 | CN101617318A Methods and apparatuses for linking content with license |
12/30/2009 | CN101616416A Method and equipment for authenticating smart card of communication terminal |
12/30/2009 | CN101615238A Binary-based system for detecting memory modifying attack and positioning bug |
12/30/2009 | CN101615237A Verifiable embedded type system and verification method thereof |
12/30/2009 | CN101615236A Constructing method for trusted application environment based on mandatory access control technology |
12/30/2009 | CN101615235A Self-destruction system for memory data |
12/30/2009 | CN101615234A Automatic defensive module and method for combining electronic device with same |
12/30/2009 | CN101615233A Methods and apparatus for secure data processing and transmission |
12/30/2009 | CN101615232A Sending a log of accessed data prior to executing disable command in lost computer |
12/30/2009 | CN101615231A Recording medium, license management apparatus, and recording and playback apparatus |
12/30/2009 | CN101615230A Method of credible execution and credible protection of file |
12/30/2009 | CN101615229A Information processing device and indication control method |
12/30/2009 | CN100576911C Mpeg-21 digital content protection system |
12/30/2009 | CN100576792C File enciphered share method |
12/30/2009 | CN100576267C Mobile terminal and authentication method |
12/30/2009 | CN100576227C Software encrypting registration piracy-preventing method |
12/30/2009 | CN100576226C Database encryption method based on Chinese remainder theorem |
12/30/2009 | CN100576225C External memory management apparatus and external memory management method |
12/30/2009 | CN100576222C Methods and apparatus for detecting patterns in a data stream |
12/30/2009 | CN100576206C Security structure of database, and method of use |
12/30/2009 | CN100576137C Method and system for the user-specific initialization of identification devices in the field |
12/30/2009 | CN100576136C Method for operating a data transmission network using license data and associated device network |
12/30/2009 | CA2728445A1 Secure memory management system and method |
12/30/2009 | CA2726063A1 System, method and apparatus for security management of an electronic device |
12/30/2009 | CA2724853A1 Protected mode scheduling of operations |
12/30/2009 | CA2724679A1 Structured coauthoring |
12/29/2009 | US7640597 Image display device |
12/29/2009 | US7640596 Mobile device for preventing illegal distribution of digital data contents and operating method thereof |
12/29/2009 | US7640595 Computing system with decryption functions and secure data product |
12/29/2009 | US7640592 Installation setup |
12/29/2009 | US7640584 System and method for enhancing computer security |
12/29/2009 | US7640573 Generic security claim processing model |
12/29/2009 | US7640543 Memory isolation and virtualization among virtual machines |
12/29/2009 | US7640540 Mechanism for providing extended functionality to command line instructions |
12/29/2009 | US7640487 Method of filtering a bitstream according to user specifications |
12/29/2009 | US7640435 System, method, and apparatus for securely providing content viewable on a secure device |
12/29/2009 | US7640434 Identification of undesirable content in responses sent in reply to a user request for content |
12/29/2009 | US7640429 Cryptographically enforced, multiple-role, policy-enabled object dissemination control mechanism |
12/29/2009 | US7640334 Network resource location detection probe apparatus and method |
12/29/2009 | US7640186 Systems and methods for reselling electronic merchandise |
12/29/2009 | US7639925 File management system of image data |
12/29/2009 | US7639846 Authentication system and program |
12/29/2009 | US7639834 Software anti-piracy systems and methods utilizing certificates with digital content |
12/29/2009 | US7639818 Structured document signature device, structured document adaptation device and structured document verification device |
12/29/2009 | US7639806 Fingerprinting digital devices using electromagnetic characteristics of their communications |
12/29/2009 | US7639794 Service use device |
12/29/2009 | US7639714 Apparatus method and medium for detecting payload anomaly using n-gram distribution of normal data |
12/24/2009 | US20090320145 Apparatus, method, and computer program for controlling use of a content |
12/24/2009 | US20090320143 Sensor interface |
12/24/2009 | US20090320142 Data processor |
12/24/2009 | US20090320141 Document data security management method and system therefor |
12/24/2009 | US20090320140 Piracy Prevention Using Unique Module Translation |
12/24/2009 | US20090320139 Transponder incorporated into an electronic device |
12/24/2009 | US20090320136 Identifying exploitation of vulnerabilities using error report |
12/24/2009 | US20090320134 Detecting Secondary Infections in Virus Scanning |
12/24/2009 | US20090320133 Streaming malware definition updates |
12/24/2009 | US20090320132 Systems and methods for distributed network protection |
12/24/2009 | US20090320131 Method and System for Preventing Malicious Communication |
12/24/2009 | US20090320130 Traitor detection for multilevel assignment |
12/24/2009 | US20090320128 System management interrupt (smi) security |
12/24/2009 | US20090320126 Information processing apparatus and method |
12/24/2009 | US20090320125 Systems, methods, and computer readable media for computer security |
12/24/2009 | US20090320122 Congestion management of session negotiations in network devices |
12/24/2009 | US20090320121 System and methods for secure service oriented architectures |
12/24/2009 | US20090320120 Replicating message queues between clustered email gateway systems |
12/24/2009 | US20090320118 Security Token and Method for Authentication of a User with the Security Token |
12/24/2009 | US20090320116 Federated realm discovery |
12/24/2009 | US20090320113 Home networking web-based service portal |
12/24/2009 | US20090320112 Method of Gaining Access to a Device |
12/24/2009 | US20090320110 Secure boot with optional components method |
12/24/2009 | US20090320108 Generating And Changing Credentials Of A Service Account |
12/24/2009 | US20090320104 Communications Network with Smart Card |
12/24/2009 | US20090320103 Extensible mechanism for securing objects using claims |
12/24/2009 | US20090320100 Handling of integrity check failure in a wireless communication system |
12/24/2009 | US20090320097 Method for carrying out a distributed search |
12/24/2009 | US20090320096 Managing access to a health-record |
12/24/2009 | US20090320095 Obtaining digital identities or tokens through independent endpoint resolution |
12/24/2009 | US20090320094 System and Method for Implementing a Publication |
12/24/2009 | US20090320092 User interface for managing access to a health-record |
12/24/2009 | US20090320090 Deploying privacy policy in a network environment |
12/24/2009 | US20090320089 Policy-based user brokered authorization |