Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
06/2009
06/24/2009EP1356626A4 Method and apparatus for verifying the integrity of computer networks and implementation of counter measures
06/24/2009CN201263159Y Internet circuit breaker
06/24/2009CN201262748Y Disclosure-proof device for desk type computer based on mobile hard disk
06/24/2009CN101467157A Method, RFID reader, RFID tag and RFID system for secure communication
06/24/2009CN101467156A Improved access to domain
06/24/2009CN101467137A Method for managing user domain in digital rights management and system thereof
06/24/2009CN101464934A Mutual binding and authenticating method for computer platform and storage device, and computer thereof
06/24/2009CN101464933A BIOS write protection method and system
06/24/2009CN101464932A Cooperation method and system for hardware security units, and its application apparatus
06/24/2009CN101464931A Anti-theft positioning technology for computer
06/24/2009CN100505845C 电视接收机以及电子设备装置 The television receiver apparatus and an electronic device
06/24/2009CN100505737C System and method for preventing automatic research program intrusion for web site
06/24/2009CN100505626C Digital medium exchanging central plat form
06/24/2009CN100504905C Data-base malevolence transaction method and system thereof
06/24/2009CN100504904C Windows concealed malevolence software detection method
06/24/2009CN100504903C Malevolence code automatic recognition method
06/24/2009CN100504902C Information processing apparatus and data management method
06/24/2009CN100504901C Embedded type platform safety guiding mechanism supported by star-shape trust chain
06/24/2009CN100504900C Image formation instruction apparatus, image formation instruction method, image formation server, processing method and image formation control apparatus
06/24/2009CN100504899C Software watchdog system and method
06/24/2009CN100504898C Radio frequency recognizing computer security locking authentication system and method thereof
06/24/2009CN100504897C Method for starting protected partition
06/24/2009CN100504896C Software protecting method and system based on safety chip
06/24/2009CN100504895C System and method for using DRM to control conditional access to broadband digital content
06/24/2009CN100504858C Sharing computer object with association
06/24/2009CN100504853C Synchronous application program data and method for deploying the data to remote server
06/24/2009CN100504819C Access authentication method, information processing unit and detachable recording device
06/24/2009CN100504717C Computing device with a process-based keystore and method for operating a computing device
06/24/2009CN100504715C Data processing apparatus
06/24/2009CN100504714C Implementation and use of a PII data access control facility employing personal identification information labels and purpose serving function sets
06/24/2009CN100504712C Version-programmable circuit module
06/23/2009USRE40791 Method and system for verifying the authenticity of a first communication participants in a communications network
06/23/2009US7552480 Method and system of assessing risk using a one-dimensional risk assessment model
06/23/2009US7552475 Systems and methods for securing ports
06/23/2009US7552473 Detecting and blocking drive sharing worms
06/23/2009US7552471 Providing security for external access to a protected computer network
06/23/2009US7552433 Non-platform-specific unique indentifier generation
06/23/2009US7552419 Sharing trusted hardware across multiple operational environments
06/23/2009US7552391 Methods and arrangements for providing multiple concurrent desktops and workspaces in a shared computing environment having remote nodes
06/23/2009US7552364 Diagnostic and managing distributed processor system
06/23/2009US7552354 Method of protecting a microcomputer system against manipulation of data stored in a memory arrangement
06/23/2009US7552345 Implementation of storing secret information in data storage reader products
06/23/2009US7552343 Conditional access control
06/23/2009US7552342 Method and system for increasing the tamper resistance of a software application
06/23/2009US7552339 Image transmission device, operations management method, and computer-readable medium having operations management program embodied therein
06/23/2009US7552337 Service protection
06/23/2009US7552335 Information processing apparatus, method therefor, computer program, and computer-readable storage medium
06/23/2009US7552334 System and method for presentation integrity
06/23/2009US7552333 Trusted authentication digital signature (tads) system
06/23/2009US7552331 Secure media path methods, systems, and architectures
06/23/2009US7552330 Mutual authentication system between user and system
06/23/2009US7552328 Security attributes of nodes in trusted computing systems
06/23/2009US7552327 Method and apparatus for conducting a confidential search
06/23/2009US7552324 Printer and print system, and data receiving device and data transmitting and receiving system
06/23/2009US7552323 System, apparatuses, methods, and computer-readable media using identification data in packet communications
06/23/2009US7552322 Using a portable security token to facilitate public key certification for devices in a network
06/23/2009US7552214 Systems and methods of information backup
06/23/2009US7552194 Content delivery system and content delivery apparatus
06/23/2009US7552166 Method of queuing requests to access a communications network
06/23/2009US7552092 Program distribution method and system
06/23/2009US7551740 Weighted secret sharing and reconstructing method
06/23/2009US7551738 Separation of copy protection rules
06/23/2009US7551305 Computer system for generating a second mail item in response to a first mail item
06/23/2009US7551202 Digital camera with integrated inkjet printer
06/23/2009US7551201 Image capture and processing device for a print on demand digital camera system
06/23/2009US7549732 Printhead having nozzle arrangements with sealing structures
06/23/2009US7549731 Inkjet printer having a printhead with a bi-layer thermal actuator coil
06/23/2009US7549728 Micro-electromechanical ink ejection mechanism utilizing through-wafer ink ejection
06/23/2009CA2308782C Distributed web application server
06/21/2009CA2646616A1 Method and apparatus for secure management of debugging processes within communication devices
06/20/2009CA2851409A1 Contact-less tag with signature, and applications thereof
06/20/2009CA2647318A1 Method and system for validating a device that uses a dynamic identifier
06/20/2009CA2647312A1 Dynamic identifier for use in identification of a device
06/20/2009CA2645990A1 Contact-less tag with signature, and applications thereof
06/20/2009CA2615559A1 Content searching for portals having secure content
06/18/2009WO2009076555A2 User-created content aggregation and sharing
06/18/2009WO2009075987A2 Document verification using dynamic document identification framework
06/18/2009WO2009075986A2 Identification and verification of an unknown document according to an eigen image process
06/18/2009WO2009075627A1 Login system
06/18/2009WO2009075353A1 Distributed information creating device, restoring device, verifying device, and secret information distributing system
06/18/2009WO2009075181A1 Option management system, option management method, and recording medium for digital equipment
06/18/2009WO2009075180A1 Authentication device, authentication system, authentication method and program
06/18/2009WO2009074994A1 Biometrics based device for converting regular ndc, ddc or proprietary communication protocol based automated teller machines, kiosks, self service terminals or full service terminals with pin (personal identification number) authentication to biometric based authentication
06/18/2009WO2009074956A1 Method and system for managing a software application on a mobile computing device
06/18/2009WO2009074709A1 Authentication arrangement
06/18/2009WO2009074460A1 Method for alteration of integrity protected data in a device, computer program product and device implementing the method
06/18/2009WO2009074436A1 Method and device for detecting whether a vehicle has exceeded a speed limit
06/18/2009WO2009074401A1 Method and system for entering data into a web page
06/18/2009WO2009074173A1 Interaction between secured and unsecured environments
06/18/2009WO2009058740A3 A language framework and infrastructure for safe and composable applications
06/18/2009WO2009053626A3 Data exchange between an electronic payment terminal and a maintenance tool through a usb link
06/18/2009WO2009015616A4 Masking sensitive information while preserving parts of the information
06/18/2009WO2009005925A3 Automated collection of forensic evidence associated with a network security incident
06/18/2009WO2008126126A3 Electronic apparatus for the surveillance of air traffic with high protection for inhibiting non-authorized use of aircraft
06/18/2009WO2008052291A3 System and process for detecting anomalous network traffic
06/18/2009WO2007132474A3 An intelligent system for software license management
06/18/2009WO2004061818A3 Identification apparatus and method
06/18/2009US20090158446 USB stacking devices and applications
06/18/2009US20090158445 Security Circuit for Power Up
06/18/2009US20090158444 System and Method for Controlling Access to Addressable Integrated Circuits