Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
07/2009
07/21/2009US7565325 Multi-site software license balancing
07/21/2009US7565324 Shared authorization data authentication method for transaction delegation in service-based computing environments
07/21/2009US7564993 Personal authentication method and device
07/16/2009WO2009089471A2 System and method for financial transaction validation
07/16/2009WO2009089212A2 Electronic verification service systems and methods
07/16/2009WO2009089054A1 Limited functionality mode for secure, remote, decoupled computer ownership
07/16/2009WO2009088709A2 Storage device having direct user access
07/16/2009WO2009088649A2 Detecting rootkits over a storage area network
07/16/2009WO2009088638A1 Systems and methods for delegating access to online accounts
07/16/2009WO2009088579A1 Personal guard
07/16/2009WO2009088577A1 Management engine secured input
07/16/2009WO2009088362A1 Limiting access to file and folder on a storage device
07/16/2009WO2009088279A2 Authenticated erasable storage device
07/16/2009WO2009087970A1 Memory monitoring method
07/16/2009WO2009087801A1 File sharing system, access right management method and terminal device
07/16/2009WO2009087702A1 Virtual machine execution program, user authentication program and information processor
07/16/2009WO2009087619A2 Stateless attestation system
07/16/2009WO2009087511A1 A method and a system for identifying elementary content portions from an edited content
07/16/2009WO2009087311A1 Contactless biometric authentication system and authentication method
07/16/2009WO2009086896A1 Software identification
07/16/2009WO2009086777A1 Software copyright protecting method and system based on encryption lock and encryption lock
07/16/2009WO2009086661A1 User identification method and apparatus for multimedia priority service
07/16/2009WO2009066271A3 Virtual security access module
07/16/2009WO2009062092A3 Systems, methods, and apparatuses for erasing memory on wireless devices
07/16/2009WO2009052228A3 Automatic determination of item replication and associated replication processes
07/16/2009WO2009051471A3 Trusted computer platform method and system without trust credential
07/16/2009WO2009048893A3 Multi-factor content protection
07/16/2009US20090183266 Method and a system for recovering a lost or stolen electronic device
07/16/2009US20090183265 Identification of potential unauthorized distribution of copyrighted information
07/16/2009US20090183263 Simultaneous tamper-proofing and anti-piracy protection of software
07/16/2009US20090183262 Information processing apparatus, disc, information processing method, and program
07/16/2009US20090183261 Malware detection with taint tracking
07/16/2009US20090183260 Detecting network evasion and misinformation
07/16/2009US20090183259 Integrated Protection Service System Defining Risk Profiles for Minors
07/16/2009US20090183257 Preventing secure data from leaving the network perimeter
07/16/2009US20090183254 Computer Session Management Device and System
07/16/2009US20090183253 Virus-resistant computer with data interface for filtering data
07/16/2009US20090183250 Apparatus, system, and method for transferring authority
07/16/2009US20090183249 Trusted storage and display
07/16/2009US20090183248 Two-way error correction for physical tokens
07/16/2009US20090183246 Universal multi-factor authentication
07/16/2009US20090183241 Device Ownership Transfer From A Network
07/16/2009US20090183240 Authorizing an Endpoint Node for a Communication Service
07/16/2009US20090183239 Embedded management system for a physical device having virtual elements
07/16/2009US20090183238 Method and devices for handling access privileges
07/16/2009US20090183236 Accelerated reevaluation of authorization rules
07/16/2009US20090183235 Form-file based information system and associated methods
07/16/2009US20090183234 Computer grid access management system
07/16/2009US20090183233 System and Method for Restricting Access to an Enterprise Network
07/16/2009US20090183232 Data processing network and method for operating a data processing network
07/16/2009US20090183229 License Authentication Device and License Authentication Method
07/16/2009US20090183228 Method for managing usage authorizations in a data processing network and a data processing network
07/16/2009US20090183227 Secure Runtime Execution of Web Script Content on a Client
07/16/2009US20090183225 Pluggable modules for terminal services
07/16/2009US20090183146 Specification, Abstraction, and Enforcement in a Data Center Operating System
07/16/2009US20090183092 Customizable application system
07/16/2009US20090183091 Method and system for archiving and retrieving items based on episodic memory of groups of people
07/16/2009US20090183005 Distributing Access to a Data Item
07/16/2009US20090182997 System and method for detecting
07/16/2009US20090182873 Method and system for monitoring online computer network behavior and creating online behavior profiles
07/16/2009US20090182867 Method and apparatus for identifying a packet
07/16/2009US20090182780 Method and apparatus for data integration and management
07/16/2009US20090182701 Method and system for data classification in the presence of a temporal non-stationarity
07/16/2009US20090182700 Method and system for a grass roots intelligence program
07/16/2009US20090182662 Federated Entertainment Access Service
07/16/2009US20090182652 System and method for detecting fraudulent transactions
07/16/2009US20090182640 Fiscal Data Recorder
07/16/2009US20090182603 Information collection program, information collection apparatus, and information collection method
07/16/2009US20090179743 Pseudo-random authentification code altering scheme for a transponder and a base station
07/16/2009DE102008003364A1 Method for detecting of manipulations in multimedia data e.g. video, involves determining whether data to be checked is result of manipulation in comparison to another data not to be manipulated
07/16/2009CA2702013A1 Contactless biometric authentication system and authentication method
07/15/2009EP2079221A1 Group admission system and server and client therefor
07/15/2009EP2079034A1 Method for securing a microprocessor, corresponding device and computer program
07/15/2009EP2079033A1 Method and system for secure peer-to-peer communication
07/15/2009EP2079028A1 Apparatus, method, and system for providing DRM protected content with content permanence
07/15/2009EP2079023A2 Electronic appliance service system
07/15/2009EP2078548A2 Secure digital data format and code enforced policy
07/15/2009EP2078411A2 System and method for data acquisition and processing
07/15/2009EP2078283A2 Secure access of resources at shared appliances
07/15/2009EP2078275A2 Security for physically unsecured software elements
07/15/2009EP2078274A1 Privacy-aware content protection system
07/15/2009EP2078273A1 A method, system and computer program for metering usage of software products with a dynamically optimised license use
07/15/2009EP2078272A1 Protecting secret information in a programmed electronic device
07/15/2009EP2078256A1 Security authorization queries
07/15/2009EP2078248A2 Software development and sales life-cycle services
07/15/2009EP2006787A9 Method, system, subscriber equipment and multi-media server for digital copyright protection
07/15/2009EP1908207A4 Biometric authentication system
07/15/2009EP1728376B1 Method, apparatuses and computer program product for sharing cryptographic key with an embedded agent on a network endpoint in a network domain
07/15/2009EP1402459B1 A portable device having biometrics-based authentication capabilities
07/15/2009EP1226488B1 Interactive printer with actuator
07/15/2009EP1224518B1 Trusted computing platform with biometric authentication
07/15/2009EP1221120A4 System and method for providing certificate validation and other services
07/15/2009EP1217783B9 Device, program or system for processing secret information
07/15/2009CN201274050Y Network safety system based on USB communication interface technique
07/15/2009CN201274049Y Computer anti-theft apparatus using characteristic of network isolation transformer in computer for anti-theft
07/15/2009CN101485140A Method, apparatus and computer program product for controlling devices
07/15/2009CN101484927A Method for encrypting and decrypting shared encrypted files
07/15/2009CN101484905A Method and system to provide security implementation for storage devices
07/15/2009CN101484904A Content control system and method using versatile control structure
07/15/2009CN101484903A System and method for controlling information supplied from memory device