Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
08/2009
08/19/2009CN101512536A System and method for authenticating a gaming device
08/19/2009CN101512535A Attestation of computing platforms
08/19/2009CN101510979A Data encoding and decoding device and method, system and method for processing signal
08/19/2009CN101510888A Method, device and system for improving data security for SaaS application
08/19/2009CN101510826A DDoS aggression detection method based on visualization
08/19/2009CN101510283A Protection device, safety equipment and safety payment equipment
08/19/2009CN101510246A Electronic device, content reproduction control method, program, storage medium, and integrated circuit
08/19/2009CN101510245A High speed encryption and decryption USB bridging chip and chip high speed encryption and decryption method
08/19/2009CN101510244A Display module, password generating system with display function and method thereof
08/19/2009CN101510243A Data protection device and safety payment equipment
08/19/2009CN101510242A Electronic product with safety access mechanism
08/19/2009CN101510241A Binary detecting and positioning device for shaping overflow leak
08/19/2009CN101510240A Safety management system for multiple independent operation platforms
08/19/2009CN101510239A Information processing system and information processing method
08/19/2009CN101510238A Document database safety access method and system
08/19/2009CN101510195A Website safety protection and test diagnosis system structure method based on crawler technology
08/19/2009CN101510079A Method for protecting saved operational data of a machine assembly or similar assembly
08/19/2009CN100531326C Method for selecting executable softwave image
08/19/2009CN100531187C Method for data distribution with access control
08/19/2009CN100531185C Method and system for secure handling of electronic business transactions on the internet
08/19/2009CN100531035C Method and system for verifying electronic signatures and microcircuit card for carrying out said method
08/19/2009CN100530275C Information processing device, printing device, print data transmission method, printing method,
08/19/2009CN100530214C Information processing apparatus, information processing method, peripheral apparatus, and authority control system
08/19/2009CN100530213C Method and device for confirming safety level of biology identification systemic
08/19/2009CN100530212C Bus line fire wall of embedded system
08/19/2009CN100530211C Personalized digital copyright protection method
08/19/2009CN100530210C Contents processing unit
08/19/2009CN100530209C System and method for limiting exposure of hardware failure information for a secured execution environment
08/19/2009CN100530208C Network isolation techniques suitable for virus protection
08/19/2009CN100530207C Distributed filesystem network security extension
08/19/2009CN100530149C Data processing device and data processing method
08/19/2009CN100530143C Portable wireless communication terminal for picked-up image editing
08/19/2009CN100530029C Method, system and securing means for data archiving with automatic encryption and decryption by fragmentation of keys
08/19/2009CN100530028C Method and system for controlling the disclosure time of information
08/19/2009CN100530027C System and method for integrated security roles
08/19/2009CN100530026C Mobile terminal, method and system for loading/unloading data into/from a mobile terminal
08/19/2009CN100530025C Method and device for processing data
08/18/2009US7578002 Controlling interaction of deliverable electronic media
08/18/2009US7578000 Rendering device, recording device, copy control method, and program
08/18/2009US7577999 Publishing digital content within a defined universe such as an organization in accordance with a digital rights management (DRM) system
08/18/2009US7577997 Image verification
08/18/2009US7577993 Methods and systems for detecting and preventing the spread of malware on instant messaging (IM) networks by using Bayesian filtering
08/18/2009US7577992 Software security based on control flow integrity
08/18/2009US7577991 Method to enhance platform firmware security for logical partition data processing systems by dynamic restriction of available external interfaces
08/18/2009US7577987 Operation modes for user authentication system based on random partial pattern recognition
08/18/2009US7577986 Security objects controlling access to resources
08/18/2009US7577941 System and method for identifying potential security risks in controls
08/18/2009US7577849 Keyed-build system for controlling the distribution of software
08/18/2009US7577847 Location and user identification for online gaming
08/18/2009US7577846 Mechanism of matching between a receiver and a security module
08/18/2009US7577840 Transferring application secrets in a trusted operating system environment
08/18/2009US7577839 Transferring application secrets in a trusted operating system environment
08/18/2009US7577751 Software streaming system and method
08/18/2009US7577743 Methods and apparatus for performing context management in a networked environment
08/18/2009US7577659 Interoperable credential gathering and access modularity
08/18/2009US7577636 Network-extensible reconfigurable media appliance
08/18/2009US7577621 Cryptographic server with provisions for interoperability between cryptographic systems
08/18/2009US7577609 Method and apparatus using digital credentials and other electronic certificates for electronic transactions
08/18/2009US7577571 Electronic apparatus, time period charging system, time period charging method, and charging management system for electronic apparatus
08/18/2009US7576876 Relay device for relaying data from a sensing device to a computer system
08/18/2009US7575313 Printing cartridge bearing indicia
08/13/2009WO2009100399A1 Media security through hardware-resident proprietary key generation
08/13/2009WO2009099927A1 Consumer abuse detection system and method
08/13/2009WO2009099790A2 System and method for detecting the source of media content with application to business rules
08/13/2009WO2009099735A1 User access control system and method
08/13/2009WO2009099708A1 Activation by trust delegation
08/13/2009WO2009099706A1 User indicator signifying a secure mode
08/13/2009WO2009099648A2 Method and apparatus for hardware reset protection
08/13/2009WO2009099647A1 Method and apparatus for controlling system access during protected modes of operation
08/13/2009WO2009099558A2 Computer system including a main processor and a bound security coprocessor
08/13/2009WO2009099202A1 Information life cycle management system, information management server, electronic medium control device, and program
08/13/2009WO2009098881A1 Unauthorized act prevention method
08/13/2009WO2009098878A1 Video-audio data synchronization method, video output apparatus, audio output apparatus, and video-audio output system
08/13/2009WO2009098706A2 Electronically implemented method and system for authentication and sharing of documents via a communication network
08/13/2009WO2009098695A2 Proximity-based presence notification of social network participants
08/13/2009WO2009098630A1 Data processing device and method for executing obfuscated programs
08/13/2009WO2009098470A2 Personal communications systems
08/13/2009WO2009098364A1 Method and system for managing access to telecommunication services in the context of a customer acquisition and loyalty programme, and dedicated mobile communication equipment
08/13/2009WO2009097902A1 Method and apparatuses for authorising provision of indirected content associated with a presentity of a presence service
08/13/2009WO2009079116A3 Collaborative authoring modes
08/13/2009WO2009075987A3 Document verification using dynamic document identification framework
08/13/2009WO2009069105A3 Service access exception tracking for regulatory compliance of business processes
08/13/2009WO2009067332A3 Secure authoring and execution of user-entered database programming
08/13/2009WO2009023294A3 Combining assessment models and client targeting to identify network security vulnerabilities
08/13/2009WO2009020611A3 Network service for the detection, analysis and quarantine of malicious and unwanted files
08/13/2009WO2003050799A9 Method and system for non-intrusive speaker verification using behavior models
08/13/2009US20090205055 System and method for electronic license distribution for pre-installed software
08/13/2009US20090205054 Process for protecting stored operating data of machinery or similar equipment
08/13/2009US20090205053 Confidential information protection system and method
08/13/2009US20090205052 Coupling of a computer program or of data to a reference system and associated verification
08/13/2009US20090205051 Systems and methods for securing data in electronic communications
08/13/2009US20090205049 Section based security for a sectioned surface-based computing device
08/13/2009US20090205048 Validation of protected intra-system interconnects for digital rights management in electrical computers and digital data processing systems
08/13/2009US20090205047 Method and Apparatus for Security Assessment of a Computing Platform
08/13/2009US20090205046 Method and apparatus for compensating for and reducing security attacks on network entities
08/13/2009US20090205045 Bootstrap OS protection and recovery
08/13/2009US20090205043 Information processing system, information processing method, and computer readable medium
08/13/2009US20090205042 External user interface based measurement association
08/13/2009US20090205041 Emergency Information Access on Portable Electronic Devices
08/13/2009US20090205039 Security management system for monitoring firewall operation