Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
12/2009
12/08/2009US7631358 Copy protection method for digital data stored on a medium
12/08/2009US7631356 System and method for foreign code detection
12/08/2009US7631353 Blocking replication of e-mail worms
12/08/2009US7631344 Distributed authentication framework stack
12/08/2009US7631342 Data security verification for data transfers between security levels in trusted operating system
12/08/2009US7631341 Extensible security architecture for an interpretive environment
12/08/2009US7631318 Secure server plug-in architecture for digital rights management systems
12/08/2009US7631292 Code individualism and execution protection
12/08/2009US7631196 Method and apparatus for loading a trustable operating system
12/08/2009US7631195 System and method for providing security to a portable storage device
12/08/2009US7631192 Network apparatus for accessing services over a network
12/08/2009US7631191 System and method for authenticating a web page
12/08/2009US7631187 Method for the initialisation of mobile data supports
12/08/2009US7631185 File editing system and shared file editing system with file content secrecy, file version management, and asynchronous editing
12/08/2009US7631184 System and method for imposing security on copies of secured items
12/08/2009US7631160 Method and apparatus for securing portions of memory
12/08/2009US7631060 Identity system for use in a computing environment
12/08/2009US7631000 Media validation system
12/08/2009US7630941 Performing horological functions in commercial transactions using time cells
12/08/2009US7630922 Content distribution management system and content distribution management method
12/08/2009US7630920 Electronic bidding method for receiving a bidding form from a bidder for a supplied item via a virtual server secured until a bidding due date
12/08/2009US7630524 Biometric identification and authentication method
12/08/2009US7630510 Image verification apparatus and image verification method
12/08/2009US7630498 Engine, register and methods for the same
12/08/2009US7630497 System and method for assigning sequence keys to a media player to enable hybrid traitor tracing
12/08/2009US7630478 Method and system for multimodal presence detection
12/08/2009US7629999 Printer CPU with VLIW processor
12/08/2009US7628471 Inkjet heater with heater element supported by sloped sides with less resistance
12/08/2009US7628468 Nozzle with reciprocating plunger
12/08/2009CA2464449C User authentication using rhythmic passwords
12/08/2009CA2375251C Printer cartridge including machine readable ink
12/06/2009CA2668547A1 Protecting software programs
12/03/2009WO2009146401A1 Content encryption using at least one content pre-key
12/03/2009WO2009146375A1 Method and system for distributing browser-based computer games and files
12/03/2009WO2009146315A1 Split template biometric verification system
12/03/2009WO2009146012A2 Ratings using machine-readable representation
12/03/2009WO2009145990A2 Multi-tier security event correlation and mitigation
12/03/2009WO2009145791A1 Secured document transmission
12/03/2009WO2009145540A2 Apparatus and method for inputting password using game
12/03/2009WO2009145379A1 Access level network securing device and securing system thereof
12/03/2009WO2009144796A1 Electronic document processing system, method, and program
12/03/2009WO2009144612A1 Method and trusted service manager for providing fast and secure access to applications on an ic card
12/03/2009WO2009144606A1 A method for adapting and executing a computer program and computer architecture therefore
12/03/2009WO2009144602A1 Protection and security provisioning using on-the-fly virtualization
12/03/2009WO2009144247A1 Method for authentication
12/03/2009WO2009143742A1 Analysis method and system for suspicious file
12/03/2009WO2009143631A1 Authenticated database connectivity for unattended applications
12/03/2009WO2009126471A3 Peripheral device locking mechanism
12/03/2009WO2009115339A3 Method for the temporary personalization of a communication device
12/03/2009WO2009111047A3 Method and apparatus for image recognition services
12/03/2009WO2009100399A9 Media security through hardware-resident proprietary key generation
12/03/2009WO2009098470A3 Personal communications systems
12/03/2009US20090300775 Method for sharing rights object in digital rights management and device thereof
12/03/2009US20090300774 Error and exception message handling framework
12/03/2009US20090300773 Systems, methods and apparatus for reducing unauthorized use in a television distribution system
12/03/2009US20090300772 Methods for preventing software piracy
12/03/2009US20090300771 Electronic Device With Protection From Unauthorized Utilization
12/03/2009US20090300770 Mechanism to search information content for preselected data
12/03/2009US20090300768 Method and apparatus for identifying phishing websites in network traffic using generated regular expressions
12/03/2009US20090300767 Method for out of band license acquisition associated with content redistributed using link protection
12/03/2009US20090300766 Blocking and bounding wrapper for thread-safe data collections
12/03/2009US20090300765 Unknown malcode detection using classifiers with optimal training sets
12/03/2009US20090300763 Method and system for detecting characteristics of a wireless network
12/03/2009US20090300762 Methods And Systems For Managing A Potential Security Threat To A Network
12/03/2009US20090300761 Intelligent Hashes for Centralized Malware Detection
12/03/2009US20090300760 Grid Security Intrusion Detection Configuration Mechanism
12/03/2009US20090300754 Protecting a Program Interpreted by a Virtual Machine
12/03/2009US20090300752 Utilizing virtual private networks to provide object level security on a multi-node computer system
12/03/2009US20090300751 Unique packet identifiers for preventing leakage of sensitive information
12/03/2009US20090300748 Rule combination in a firewall
12/03/2009US20090300747 User-portable device and method of use in a user-centric identity management system
12/03/2009US20090300746 System integrating an identity selector and user-portable device and method of use in a user-centric identity management system
12/03/2009US20090300743 Methods and systems for user authentication
12/03/2009US20090300740 Proactive credential caching
12/03/2009US20090300736 Remote access method
12/03/2009US20090300735 Method for controlling access to content on data carrier
12/03/2009US20090300732 Method and apparatus of otp based on challenge/response
12/03/2009US20090300730 Security message processing
12/03/2009US20090300729 Purchasing peripheral support in a media exchange network
12/03/2009US20090300728 Electronic mail terminal apparatus, mail server, check code registering method, and mail reception permitting method
12/03/2009US20090300725 Enabling synchronous and asynchronous collaboration for software applications
12/03/2009US20090300724 Method for managing domain using multi domain manager and domain system
12/03/2009US20090300723 Sharing private data publicly and anonymously
12/03/2009US20090300721 Reverse VPN over SSH
12/03/2009US20090300720 Centralized account reputation
12/03/2009US20090300719 Systems and methods for management of secure data in cloud-based network
12/03/2009US20090300718 System and method for lost data destruction of electronic data stored on a portable electronic device which communicates with servers that are inside of and outside of a firewall
12/03/2009US20090300717 Hardware access and monitoring control
12/03/2009US20090300715 User-directed privacy control in a user-centric identity management system
12/03/2009US20090300713 Access control system, access control method, electronic device and control program
12/03/2009US20090300712 System and method for dynamically enforcing security policies on electronic files
12/03/2009US20090300711 Access control policy compliance check process
12/03/2009US20090300710 Universal serial bus (usb) storage device and access control method thereof
12/03/2009US20090300707 Method of Optimizing Policy Conformance Check for a Device with a Large Set of Posture Attribute Combinations
12/03/2009US20090300704 Presentity Rules for Location Authorization in a Communication System
12/03/2009US20090300599 Systems and methods of utilizing virtual machines to protect computer systems
12/03/2009US20090300544 Enhanced user interface and data handling in business intelligence software
12/03/2009US20090300475 Web-based system for collaborative generation of interactive videos
12/03/2009US20090300415 Computer System and Method for Performing Integrity Detection on the Same
12/03/2009US20090300369 Security unit and protection system comprising such security unit as well as method for protecting data