Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
07/15/2009 | CN101484902A Device-independent management of cryptographic information |
07/15/2009 | CN101484901A System and method for device registration |
07/15/2009 | CN101484877A Execution of computer instructions with reconfigurable hardware |
07/15/2009 | CN101484864A Security module and method of customising one such module |
07/15/2009 | CN101482909A Enciphering algorithm module accelerating machine and its data high-speed encryption and decryption method |
07/15/2009 | CN101482908A Service returning system and method based on digital copyright technology |
07/15/2009 | CN101482907A Main unit malice code behavior detection system based on expert system |
07/15/2009 | CN101482906A Pirate user detecting apparatus, collusion-secure code generating apparatus, and collusion-secure code generating program |
07/15/2009 | CN101482905A Identification and recording method for self-affirmation access phrase |
07/15/2009 | CN101482903A Hardware security unit |
07/15/2009 | CN101482902A Intelligent computer anti-theft system |
07/15/2009 | CN100514906C 信息处理系统 The information processing system |
07/15/2009 | CN100514471C Method and system of visiting encrypting content on mobile media by device |
07/15/2009 | CN100514347C Data backup system |
07/15/2009 | CN100514346C Peripheral device and information processing method |
07/15/2009 | CN100514345C Information processing unit, device, system |
07/15/2009 | CN100514344C Safety identification method based on safe computer |
07/15/2009 | CN100514343C Data management method and its system |
07/15/2009 | CN100514336C Document use tracking system and method |
07/15/2009 | CN100514333C Data base safety access method and system |
07/15/2009 | CN100514322C Photo site |
07/15/2009 | CN100514252C Device and method for generating encrypted data, for decrypting encrypted data and for generating re-signed data |
07/15/2009 | CA2648626A1 Method and apparatus for preventing operation of keystroke learning during entry of selected input strings |
07/14/2009 | US7562397 Method and system for facilitating search, selection, preview, purchase evaluation, offering for sale, distribution, and/or sale of digital content and enhancing the security thereof |
07/14/2009 | US7562395 System and method for accessing protected content in a rights-management architecture |
07/14/2009 | US7562388 Method and system for implementing security devices in a network |
07/14/2009 | US7562349 Version adaptation interface for integration of different virtual machines |
07/14/2009 | US7562232 System and method for providing manageability to security information for secured items |
07/14/2009 | US7562231 Apparatus and system for recording and reproducing contents |
07/14/2009 | US7562230 Data security |
07/14/2009 | US7562229 Codeword-based auditing of computer systems and methods therefor |
07/14/2009 | US7562228 Forensic for fingerprint detection in multimedia |
07/14/2009 | US7562216 System and method for applying a file system security model to a query system |
07/14/2009 | US7562215 System and method for electronic document security |
07/14/2009 | US7562214 Data processing systems |
07/14/2009 | US7562212 Methods and systems for automated authentication, processing and issuance of digital certificates |
07/14/2009 | US7562201 Recording device and recording and reproducing device |
07/14/2009 | US7562198 Semiconductor device and semiconductor signal processing apparatus |
07/14/2009 | US7562145 Application instance level workload distribution affinities |
07/14/2009 | US7562141 Using an information image to perform a predetermined action |
07/14/2009 | US7562093 Method for creating a stored query |
07/14/2009 | US7562053 System and method for facilitating transactions between two or more parties |
07/14/2009 | US7562019 Automated testing of voice recognition software |
07/14/2009 | US7561985 Maintenance mediation apparatus, maintenance target apparatus maintenance method, and maintenance system |
07/14/2009 | US7561696 Delivering policy updates for protected content |
07/14/2009 | US7561291 Job management system, information processing apparatus, job management method, job management program and storage medium storing the problem |
07/14/2009 | US7559472 User interface for an image transformation device |
07/14/2009 | US7559468 Reader/writer secure module access control method |
07/11/2009 | CA2617775A1 Method, computer program product and apparatus for authenticating electronic documents |
07/09/2009 | WO2009086002A1 Serial advanced technology attachment write protection: mass storage data protection device |
07/09/2009 | WO2009085845A2 Automated forensic document signatures |
07/09/2009 | WO2009085497A1 Delivering secured media using a portable memory device |
07/09/2009 | WO2009085385A2 System and method for protecting content transferred between devices |
07/09/2009 | WO2009085229A2 Method of inserting/overlaying markers, data packets and objects relative to viewable content and enabling live social networking, n-dimensional virtual environments and/or other value derivable from the content |
07/09/2009 | WO2009085217A2 System and method for security agent monitoring and protection |
07/09/2009 | WO2009084899A2 Method and apparatus for updating revocation list and reproducing encrypted content |
07/09/2009 | WO2009084881A2 Card and input and output apparatus for the card |
07/09/2009 | WO2009084715A1 Authentication device and authentication method |
07/09/2009 | WO2009084601A1 Access right managing system, access right managing method, and access right managing program |
07/09/2009 | WO2009084573A1 Information distribution system and program for the same |
07/09/2009 | WO2009084306A1 Authentication device, authentication method and authentication program |
07/09/2009 | WO2009084303A1 Attribute information authentication device, attribute information authentication method and computer program |
07/09/2009 | WO2009084001A2 Method and system for authenticating user information |
07/09/2009 | WO2009083971A2 System and method for contextual and behavioral based data access control |
07/09/2009 | WO2009083970A2 System and method for securely storing information |
07/09/2009 | WO2009083922A1 Information interchange system and apparatus |
07/09/2009 | WO2009083869A1 Device and method for digital right management |
07/09/2009 | WO2009083817A1 Method, apparatus and computer program product for secure software installation |
07/09/2009 | WO2009083734A1 Typed application deployment |
07/09/2009 | WO2009083708A1 Radio frequency identification devices and reader systems |
07/09/2009 | WO2009083528A1 Method and system for generating stable biometric data |
07/09/2009 | WO2009083527A1 Method and system for authenticating individuals on the basis of biometric data |
07/09/2009 | WO2009083518A1 Generation and use of a biometric key |
07/09/2009 | WO2009083478A1 Delegation of access conditions between portable tokens |
07/09/2009 | WO2009083473A1 Selection of access conditions for portable tokens |
07/09/2009 | WO2009083371A1 Method for securing a conditional connection, information carrier, software, secured system, and security processor for said method |
07/09/2009 | WO2009083191A1 System for selectively displaying data, comprising an eyeglasses-type device, especially eyeglasses |
07/09/2009 | WO2009083036A1 Assessing threat to at least one computer network |
07/09/2009 | WO2009082963A1 Removable memory device and its anti-virus system for preventing computer virus |
07/09/2009 | WO2009062965A3 System and method for secure firmware update of a secure token having a flash memory controller and a smart card |
07/09/2009 | WO2009058743A3 Encrypted data installation |
07/09/2009 | WO2004051437A3 System and method for providing an enterprise-based computer security policy |
07/09/2009 | US20090178144 Data Security System and with territorial, geographic and triggering event protocol |
07/09/2009 | US20090178143 Method and System for Embedding Information in Computer Data |
07/09/2009 | US20090178142 End user risk management |
07/09/2009 | US20090178141 Booting a device from a trusted environment responsive to device hibernation |
07/09/2009 | US20090178140 Network intrusion detection system |
07/09/2009 | US20090178139 Systems and Methods of Network Security and Threat Management |
07/09/2009 | US20090178138 Stateless attestation system |
07/09/2009 | US20090178137 Systems and methods for securely processing sensitive streams in a mixed infrastructure |
07/09/2009 | US20090178136 Method and device for entering a computer database password |
07/09/2009 | US20090178135 Language independent login method and system |
07/09/2009 | US20090178134 System and method for blocking internet access and/or applications |
07/09/2009 | US20090178132 Enterprise Security Assessment Sharing For Consumers Using Globally Distributed Infrastructure |
07/09/2009 | US20090178131 Globally distributed infrastructure for secure content management |
07/09/2009 | US20090178130 Verifying that group membership requirements are met by users |
07/09/2009 | US20090178127 Authentication system, authentication server, authenticating method, authenticating program, terminal, authentication requesting method, authentication requesting program, and storage medium |
07/09/2009 | US20090178125 Method and System for Creation and Validation of Anonymous Digital Credentials |
07/09/2009 | US20090178120 Electronic verification service systems and methods |
07/09/2009 | US20090178119 Methods, systems and computer program products for provisioning vlan services in a network |