Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
09/2009
09/16/2009CN101534311A An information security method and procedure
09/16/2009CN101534197A Method, device and system for treating user relogin in single-point login system
09/16/2009CN101533454A 编译方法以及编译器 Compilation methods and compiler
09/16/2009CN101533453A Remote updating method for software authentication
09/16/2009CN101533452A Method for protecting cipher of USB interface
09/16/2009CN101533451A Microprocessor device for providing secure execution environment and method for executing secure code thereof
09/16/2009CN101533450A Microprocessor device for providing secure execution environment and method for executing secure code thereof
09/16/2009CN101533449A Microprocessor device for providing secure execution environment and method for executing secure code thereof
09/16/2009CN101533448A Microprocessor device for providing secure execution environment and method for executing secure code thereof
09/16/2009CN101533447A Microprocessor device for providing secure execution environment and method for executing secure code thereof
09/16/2009CN101533446A Microprocessor device for providing secure execution environment and method for executing secure code thereof
09/16/2009CN101533445A Microprocessor device for providing secure execution environment and method for executing secure code thereof
09/16/2009CN101533444A Device for providing secure execution environment and method for executing secure code thereof
09/16/2009CN101533443A Microprocessor device for providing secure execution environment and method for executing secure code thereof
09/16/2009CN101533442A Device for providing secure execution environment and method for executing secure code thereof
09/16/2009CN101533441A Device for providing secure execution environment and method for executing secure code thereof
09/16/2009CN101533440A Device for providing secure execution environment and method for executing secure code thereof
09/16/2009CN101533439A Device for providing secure execution environment and method for executing secure code thereof
09/16/2009CN101533438A Microprocessor device for providing secure execution environment and method for executing secure code thereof
09/16/2009CN101533437A System and method thereof for carrying out security control to computer hardware equipment
09/16/2009CN101533436A Method for cutting off wireless invasive of notebook computer
09/16/2009CN101533435A Methods for generating and verifying serial numbers
09/16/2009CN101533434A Leakage-proof credible virtual machine remote certification method facing sensitive data
09/16/2009CN101533433A Password warehouse management system based on password characteristic
09/16/2009CN101533432A System and method for password protection
09/16/2009CN101533431A Device for improving the usage safety of notebook computer and notebook computer thereof
09/16/2009CN101533389A Works copyright protection method
09/16/2009CN101533373A Data accessing system
09/16/2009CN101533372A Data accessing system
09/16/2009CN100542166C Secured and access controlled peer-to-peer resource sharing method and apparatus
09/16/2009CN100542085C System and method for securing executable code
09/16/2009CN100541510C Wireless tag system, wireless tag access control device, wireless tag access control method and wireless tag
09/16/2009CN100541509C Method for scanning and killing computer virus
09/16/2009CN100541508C Apparatus, information processing apparatus, management method and information processing method
09/16/2009CN100541507C Printing system and printing control method
09/16/2009CN100541471C Individual authentication method using input characteristic of input apparatus based on network,and network system
09/16/2009CN100541443C Data processing method and system
09/16/2009CN100541384C System and method for providing anti-virus program using wireless communication terminal
09/15/2009US7591020 Location based security modification system and method
09/15/2009US7591017 Apparatus, and method for implementing remote client integrity verification
09/15/2009US7591015 Secure kernel transactions
09/15/2009US7591007 Computer network and methods for granting and revoking access privileges for an information source
09/15/2009US7591004 Using trusted communication channel to combat user name/password theft
09/15/2009US7591003 Security policies in trusted operating system
09/15/2009US7591001 System, apparatuses, methods and computer-readable media for determining the security status of a computer before establishing a network connection
09/15/2009US7590870 Physical presence determination in a trusted platform
09/15/2009US7590869 On-chip multi-core type tamper resistant microprocessor
09/15/2009US7590867 Method and apparatus for providing secure virtualization of a trusted platform module
09/15/2009US7590864 Trusted patching of trusted code
09/15/2009US7590863 Methods of providing java tamperproofing
09/15/2009US7590862 Method of detecting illicit modifications of manufacturer software
09/15/2009US7590861 Methods for secure enrollment and backup of personal identity credentials into electronic devices
09/15/2009US7590860 Secure data processing apparatus
09/15/2009US7590859 System and method for accomplishing two-factor user authentication using the internet
09/15/2009US7590858 Authentication apparatus, user authentication method, user authentication card and storage medium
09/15/2009US7590857 Secure data processing for image forming apparatus
09/15/2009US7590856 System for managing license for protecting content, server for issuing license for protecting content, and terminal for using content protected by license
09/15/2009US7590854 Hierarchical identity-based encryption and signature schemes
09/15/2009US7590853 Systems and methods using cryptography to protect secure computing environments
09/15/2009US7590852 Method for remote electronic verification and authentication and screening of potential signatories for remote electronic notary transactions via remote PC encrypted platform to a broadband digitally wireless cellular/PDA device or portable PC device
09/15/2009US7590851 Confirmation method of software and apparatus for executing software
09/15/2009US7590848 System and method for authentication and fail-safe transmission of safety messages
09/15/2009US7590845 Key cache management through multiple localities
09/15/2009US7590842 Service providing system and authentication system, as well as signature generating apparatus, service utilizing apparatus and verification apparatus
09/15/2009US7590837 Electronic device security and tracking system and method
09/15/2009US7590807 System and method for record retention date in a write once read many storage system
09/15/2009US7590630 Managing electronic information
09/15/2009US7590561 Method and system for online purchasing using processing sensor
09/15/2009US7590347 Photographic prints having magnetically recordable media
09/15/2009US7590289 Method, apparatus, and program for image processing capable of preventing and detecting tampering, and a medium storing the program
09/15/2009US7590026 Access to printing material container
09/15/2009US7589856 System for enabling user interaction with computer software
09/15/2009US7589854 Method of generating a second mail item in response to a first mail item
09/15/2009US7589850 Licensing method for use with an imaging device
09/15/2009US7588329 Print roll unit provided with pinch rollers and a drive roller
09/15/2009US7588316 Wide format print assembly having high resolution printhead
09/15/2009CA2565876C An information management system
09/15/2009CA2360785C Multiple level public key hierarchy for performance and high security
09/11/2009WO2009111801A2 Apparatus and method for dynamic licensing access to wireless network information
09/11/2009WO2009111763A2 Image-based man-in-the-middle protection in numeric comparison association models
09/11/2009WO2009111411A2 System and method of authorizing execution of software code in a device based on entitlements granted to a carrier
09/11/2009WO2009111409A1 System and method of authorizing execution of software code based on accessible entitlements
09/11/2009WO2009111408A1 System and method of authorizing execution of software code based on at least one installed profile
09/11/2009WO2009111405A1 System and method of authorizing execution of software code based on a trusted cache
09/11/2009WO2009111401A1 Managing code entitlements for software developers in secure operating environments
09/11/2009WO2009111313A2 Method and apparatus for enhanced age verification and activity management of internet users
09/11/2009WO2009111195A2 Secure browser-based applications
09/11/2009WO2009110994A2 System and markup language for information extraction from stand-alone devices in webspace
09/11/2009WO2009110693A1 Unit using os and image forming apparatus using the same
09/11/2009WO2009110692A1 Unit using os and image forming apparatus using the same
09/11/2009WO2009110691A1 Unit using operating system and image forming apparatus using the same
09/11/2009WO2009110687A1 Unit using os and image forming apparatus using the same
09/11/2009WO2009110457A1 Authentication information generation system, authentication information generation method, and authentication information generation program utilizing a client device and said method
09/11/2009WO2009110363A1 Authentication method and input device
09/11/2009WO2009110277A1 Personal information distribution management system, and personal information using device and method
09/11/2009WO2009110275A1 Classified information leakage prevention system and classified information leakage prevention method
09/11/2009WO2009110267A1 Access control system
09/11/2009WO2009110156A1 Content distribution system and content distribution method
09/11/2009WO2009110140A1 Information processing apparatus, storage drive and firmware update method
09/11/2009WO2009110107A1 Information system for detecting and preventing invalid use of shared information