Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
09/2009
09/30/2009EP2104902A1 System and method of collecting data in an access control system
09/30/2009EP2104901A1 Method and apparatus for detecting computer fraud
09/30/2009EP2104893A2 Secured electronic systems, securing methods and uses of such systems
09/30/2009EP1342149B1 Method for protecting information and privacy
09/30/2009EP1249962B1 Information processing system and method
09/30/2009EP1151579B1 Self-generation of certificates using a secure microprocessor in a device for transferring digital information
09/30/2009EP1068565B1 Acceleration and security enhancements for elliptic curve and rsa coprocessors
09/30/2009CN201319188Y Insertible virus killing device
09/30/2009CN101548284A Conditional policies in software licenses
09/30/2009CN101547205A Method, apparatus and system for remote real-time access of multimedia content
09/30/2009CN101547199A Electronic document security ensuring system and electronic document security ensuring method
09/30/2009CN101547129A Method and system for detecting distributed denial of service attack
09/30/2009CN101547101A Method and device for generating, transmitting, and receiving right object
09/30/2009CN101547094A Method for realizing identity identifying of electronic voice recording equipment
09/30/2009CN101547092A Method and device for data synchronization of multi-application systems for unifying user authentication
09/30/2009CN101546597A System for realizing identity identifying of electronic voice recording equipment
09/30/2009CN101546596A Electronic voice recording equipment capable of identifying identity
09/30/2009CN101546594A System for realizing identification of electronic voice recording equipment
09/30/2009CN101546407A Electronic commerce system and management method thereof based on digital certificate
09/30/2009CN101546368A Method for establishing system licensed internal code
09/30/2009CN101546367A Method for comprehensive detection of network trojans with warning function and functional module architecture device
09/30/2009CN101546366A Digital copyright management system and management method
09/30/2009CN101546365A Hardware security unit logical switching method, system and hardware security unit
09/30/2009CN101546364A Method and system for performing automatic intelligent forensics on storage medium
09/30/2009CN101546363A Safe USB connection method
09/30/2009CN100546244C Key management protocol and authentication system for securecontent delivery over the internet
09/30/2009CN100546240C Information-processing system, apparatus and method
09/30/2009CN100545852C 认证系统以及认证方法 Authentication system and the authentication method
09/30/2009CN100544671C Method of identification of living body and apparatus for identification of living body
09/30/2009CA2654481A1 Business management system
09/29/2009US7596809 System security approaches using multiple processing units
09/29/2009US7596807 Method and system for reducing scope of self-propagating attack code in network
09/29/2009US7596805 Device and method for controlling access to open and non-open network segments
09/29/2009US7596804 Seamless cross-site user authentication status detection and automatic login
09/29/2009US7596703 Hidden data backup and retrieval for a secure device
09/29/2009US7596702 Network storage devices
09/29/2009US7596701 Online data encryption and decryption
09/29/2009US7596698 Semiconductor memory card, playback apparatus, recording apparatus, playback method, recording method, and computer-readable recording medium
09/29/2009US7596695 Application-based data encryption system and method thereof
09/29/2009US7596689 Secure and reliable document delivery using routing lists
09/29/2009US7596606 Message publishing system for publishing messages from identified, authorized senders
09/29/2009US7596531 Method and apparatus for protecting against side channel attacks against personal identification numbers
09/29/2009US7596500 System and method for processing import/export transactions
09/29/2009US7596390 Cellular phone
09/29/2009US7596297 Information processing apparatus and method program, and recording medium
09/29/2009CA2380254C A function updatable device and an options card therefor
09/29/2009CA2336340C Method for proving the pedigree and/or for the identification of animals or of biological material
09/26/2009CA2622565A1 Computer system and process for unifying, simplifying and securing the management of multiple profiles of an individual or body corporate
09/24/2009WO2009117445A2 Method and system for protection against information stealing software
09/24/2009WO2009117386A1 Remote storage access control system
09/24/2009WO2009116726A2 Rootkit detection method and system
09/24/2009WO2009116220A1 Authentication server and line server
09/24/2009WO2009116154A1 Modem device
09/24/2009WO2009116149A1 Recording medium cartridge and takeout management system
09/24/2009WO2009116054A2 Method and system for organizing electronic mails
09/24/2009WO2009115903A1 Method and system to provide fine granular integrity to digital data
09/24/2009WO2009115864A1 A method for protecting a cryptographic module and a device having cryptographic module protection capabilities
09/24/2009WO2009115755A2 Authentication method, authentication system, server terminal, client terminal and computer programs therefor
09/24/2009WO2009115712A2 Method of securing execution of a program
09/24/2009WO2009115367A1 Method and system for detecting the installation and usage of software in an application virtualization environment
09/24/2009WO2009115339A2 Method for the temporary personalization of a communication device
09/24/2009WO2009115029A1 Method, system and apparatus for data remediation
09/24/2009WO2009115003A1 A document base system authority control method and device
09/24/2009WO2009099648A3 Method and apparatus for hardware reset protection
09/24/2009WO2009096936A3 Erasing and restoring factory settings in computer systems
09/24/2009WO2009081338A3 Defining classification thresholds in template protection systems
09/24/2009WO2009081028A3 Platform and device for managing and controlling rights of use associated with a multimedia object
09/24/2009WO2009062023A3 Network rating
09/24/2009WO2009055394A3 Progressive boot for a wireless device
09/24/2009WO2007117292A3 A method to detect counterfeit board-level products using programmable logic devices
09/24/2009WO2001006691A3 Trusted communications between untrusting parties
09/24/2009US20090241199 Systems and methods for creating, manipulating and processing rights and contract expressions using tokenized templates
09/24/2009US20090241198 Inappropriate content determination apparatus, content provision system, inappropriate content determination method, and computer program
09/24/2009US20090241196 Method and system for protection against information stealing software
09/24/2009US20090241195 Device and method for preventing virus infection of hard disk
09/24/2009US20090241194 Virtual machine configuration sharing between host and virtual machines and between virtual machines
09/24/2009US20090241193 Enhanced Computer Intrusion Detection Methods And Systems
09/24/2009US20090241192 Virtual machine configuration sharing between host and virtual machines and between virtual machines
09/24/2009US20090241191 Systems, methods, and media for generating bait information for trap-based defenses
09/24/2009US20090241190 System and method for securing a network from zero-day vulnerability exploits
09/24/2009US20090241187 Method and system for protection against information stealing software
09/24/2009US20090241186 Method for removable element authentication in an embedded system
09/24/2009US20090241185 Secure password entry
09/24/2009US20090241184 Method for generating access data for a medical device
09/24/2009US20090241183 Dynamic document merging method and system
09/24/2009US20090241181 Method for optimizing nsis signaling in mobike-based mobile applications
09/24/2009US20090241180 System and Method for Data Transport
09/24/2009US20090241179 Enabling peripheral communication in a local area network
09/24/2009US20090241178 Cardspace history validator
09/24/2009US20090241177 Security system for a community based managed health kiosk system
09/24/2009US20090241176 Load balancing in server computer systems
09/24/2009US20090241175 Methods and systems for user authentication
09/24/2009US20090241173 Method and system for protection against information stealing software
09/24/2009US20090241172 Remote Disablement of a Communication Device
09/24/2009US20090241171 Wearable computer system and method controlling information/service in wearable computer system
09/24/2009US20090241168 System and methods for protecting confidential information on network sites based on security awareness
09/24/2009US20090241166 Establishment of Security Federations
09/24/2009US20090241165 Compliance policy management systems and methods
09/24/2009US20090241164 System and Method for Protecting Assets Using Wide Area Network Connection
09/24/2009US20090241108 Virtual computing infrastructure