Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
09/2009
09/24/2009US20090241107 License file issuance apparatus, image processing apparatus, license file issuance method, application installation method, and storage medium
09/24/2009US20090241105 Detecting Applications in a Virtualization Environment
09/24/2009US20090240955 Secure media storage device and method of securing media storage devices
09/24/2009US20090240952 Method and system for decryption of file characteristics of .ZIP files
09/24/2009US20090240946 Dynamic identifier for use in identification of a device
09/24/2009US20090240938 Device, System and Method for Service Delivery with Anti-Emulation Mechanism
09/24/2009US20090240521 Remote patient support and care by relatives
09/24/2009US20090239580 Communication system
09/24/2009US20090239518 Managing contextual information for wireless communications
09/24/2009US20090238364 Image scanner
09/24/2009US20090238323 Real time clock
09/24/2009US20090237733 System For Delivering Greeting Using Interactive Form
09/24/2009US20090237462 Nozzle arrangement with sealing structure
09/24/2009US20090237460 Inkjet Printhead With Thermal Actuator Coil
09/24/2009US20090237456 Inkjet Printhead With Paddle For Ejecting Ink From One Of Two Nozzles
09/24/2009US20090237418 Useability features in on-line delivery of applications
09/24/2009US20090236200 Apparatus, System and Method For Coin Exchange
09/24/2009US20090236154 Method of generating interactive substrate from interaction with another interactive substrate.
09/24/2009DE102008014409A1 Einbetter zum Einbetten eines Wasserzeichens in eine Informationsdarstellung, Detektor zum Detektieren eines Wasserzeichens in einer Informationsdarstellung, Verfahren und Computerprogramm Embedder for embedding a watermark in an information presentation detector for detecting a watermark in an information presentation method, and computer program
09/24/2009CA2718594A1 Method and system for protection against information stealing software
09/23/2009EP2104269A1 An electronic control unit (ECU) and a method for verifying data integrity
09/23/2009EP2104102A1 Contents judging device, contents judging method, information reproducing device, information reproducing method and information recording medium
09/23/2009EP2104054A2 Separated storage of data and key necessary to access the data
09/23/2009EP2104053A1 Data storage device and system for protection of data
09/23/2009EP2104052A1 Authentication system and method
09/23/2009EP2104051A2 Data protection system that protects data by encrypting the data
09/23/2009EP2104050A1 On-Disk software image encryption
09/23/2009EP2104049A1 Establishment of security federations
09/23/2009EP2102832A1 Secured housing
09/23/2009EP2102790A2 Biometric security system and method
09/23/2009EP2102783A1 Control device, reproducing device, permission server, method for controlling control device, method for controlling reproducing device, and method for controlling permission server
09/23/2009EP2102782A2 Method and system to provide security implementation for storage devices
09/23/2009EP2102781A2 Highly available cryptographic key storage (hacks)
09/23/2009EP2102780A1 Method making it possible to vary the number of executions of countermeasures in an executed code
09/23/2009EP2102779A1 Method for determining the price of superdistributed recordings
09/23/2009EP2102778A1 Method and arrangement for secure user authentication based on a biometric data detection device
09/23/2009EP2102720A1 Method for receiving a confidential time information
09/23/2009EP2102677A2 A method of processing an rf signal
09/23/2009EP1796020B1 Method for accessing information on object having tag, local server, ons proxy, program, tag creation method, device having tag writer, tag, and program for controlling device having tag writer
09/23/2009EP1454493B1 Method of rights management for streaming media
09/23/2009CN101543099A Use, provision, customization and billing of services for mobile users through distinct electronic apparatuses
09/23/2009CN101542970A Method for determining identification of an electronic device
09/23/2009CN101542498A Information processing device and method, computer-readable recording medium, and external storage medium
09/23/2009CN101542497A Extensible bios interface to a preboot authentication module
09/23/2009CN101542496A Authentication with physical unclonable functions
09/23/2009CN101542495A Method for transferring resource and method for providing information
09/23/2009CN101542494A Protecting interfaces on processor architectures
09/23/2009CN101542452A Method, apparatus and system for authentication of external storage devices
09/23/2009CN101542439A Data processing device, data processing method, data processing program, recording medium, and integrated circuit
09/23/2009CN101541007A An improved method for an authentication of a user subscription identity module
09/23/2009CN101540755A Method, system and device for recovering data
09/23/2009CN101540680A Content transmission apparatus, content reception apparatus and content transmission method
09/23/2009CN101540676A Platform identifying method suitable to identify credible network connecting construction in ternary equal way
09/23/2009CN101540666A Method for protecting network data
09/23/2009CN101540191A Real-time encrypted U disk and high speed encryption-decryption method
09/23/2009CN101539991A Effective image-region detection and segmentation method for iris recognition
09/23/2009CN101539990A Method for selecting and rapidly comparing robust features of iris images
09/23/2009CN101539981A Method, system and sensor node for controlling data security
09/23/2009CN101539980A Method for accessing a data station to an electronic device
09/23/2009CN101539979A Method for controlling and protecting electronic document and device thereof
09/23/2009CN101539978A Software protection method based on space
09/23/2009CN101539977A Method for protecting computer software
09/23/2009CN101539976A Real-time detection system of binary program memory decay attack
09/23/2009CN101539975A System and method using wide area network connection for protecting assets
09/23/2009CN101539974A Detecting, capturing and processing valid login credentials
09/23/2009CN101539973A Method of seamless operation of integrity measurement technology in trusted virtual domain
09/23/2009CN101539972A Method for protecting electronic document information and system thereof
09/23/2009CN101539971A Method for protecting the copyright of Java application files, device and mobile terminal
09/23/2009CN101539970A Password protector
09/23/2009CN101539969A Fingerprint sensing device and switching method for operation mode of same and electronic device
09/23/2009CN101539922A Method for realizing authority of document library system
09/23/2009CN101539890A Data processing system, cryptogram management method and data reading and writing method
09/23/2009CN101539810A Peep-proof keyboard device
09/23/2009CN100543779C Safety access control method
09/23/2009CN100543762C Computer-aided design data encrypted protecting method based on hardware environment
09/23/2009CN100543761C Program conversion device and program execution device
09/23/2009CN100543760C Data safety method preventing encrypted data from being exposed by table-board search tools
09/23/2009CN100543759C Storage and retrieval of data based on public key encryption
09/22/2009US7594277 Method and system for detecting when an outgoing communication contains certain content
09/22/2009US7594276 Bubble-protected system for automatic decryption of file data on a per-use basis and automatic re-encryption
09/22/2009US7594275 Digital rights management system
09/22/2009US7594274 Method of authenticating an application for personal digital assistant using a unique ID based on a personal computer and system using thereof
09/22/2009US7594272 Detecting malicious software through file group behavior
09/22/2009US7594271 Method and system for real-time tamper evidence gathering for software
09/22/2009US7594268 Preventing network discovery of a system services configuration
09/22/2009US7594267 Stateful distributed event processing and adaptive security
09/22/2009US7594266 Data security and intrusion detection
09/22/2009US7594265 System for preventing unauthorized access to sensitive data and a method thereof
09/22/2009US7594262 System and method for secure group communications
09/22/2009US7594257 Data security for digital data storage
09/22/2009US7594256 Remote interface for policy decisions governing access control
09/22/2009US7594224 Distributed enterprise security system
09/22/2009US7594173 Document control apparatus, document control system, document control method and storage medium
09/22/2009US7594124 Cross validation of data using multiple subsystems
09/22/2009US7594122 Method of determining whether a test subject is a specific individual
09/22/2009US7594120 User-defined passwords having associated unique version data to assist user recall of the password
09/22/2009US7594119 System for managing time rights linked to a digital content
09/22/2009US7594115 Contents information output system and contents information output method
09/22/2009US7594113 Identification information protection method in WLAN inter-working
09/22/2009US7594112 Delegated administration for a distributed security system