Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
05/2009
05/27/2009EP2063375A1 Authentication system and method using electronic tags
05/27/2009EP2063346A2 Device identification method and apparatus, device information provision method and apparatus, and computer-readable recording mediums having recorded thereon programs for executing the device identification method and the device information provision method
05/27/2009EP2062457A2 Mobile application registration
05/27/2009EP2062210A1 Transaction authorisation system&method
05/27/2009EP2062209A1 Method and computer system for ensuring authenticity of an electronic transaction
05/27/2009EP2062192A1 Anti-intrusion system for protecting electronic components
05/27/2009EP2062191A1 System and method for securely restoring a program context from a shared memory
05/27/2009EP2062190A2 Transferring licensed digital content between users
05/27/2009EP2062189A2 Method and system for secure processing of authentication key material in an ad hoc wireless network
05/27/2009EP2062188A1 Auto-detecting and downloading licensed computer products
05/27/2009EP2062187A1 Information flow enforcement for risc-style assembly code in the presence of timing-related covert channels and multi-threading
05/27/2009EP2062186A1 Method for generating human-readable and machine-readable documents
05/27/2009EP2062185A1 System and method for securely saving a program context to a shared memory
05/27/2009EP2062151A1 Apparatus, system and method for the management of digital rights managed (drm) licenses into a user interface
05/27/2009EP2062150A1 Security language translations with logic resolution
05/27/2009EP2062117A1 Wearable computer system and method controlling information/service in wearable computer system
05/27/2009EP1828952A4 Output system, network device, device using apparatus, output control program and output request program, and output method
05/27/2009EP1599800A4 Customized execution environment and operating system capable of supporting same
05/27/2009EP1490756A4 Production line boot sector lock
05/27/2009EP1082722B1 Key distribution via a memory device
05/27/2009CN201248089Y Novel pick-up head for computer information security protection
05/27/2009CN201247468Y Credible calculating system for protecting BIOS
05/27/2009CN101443779A Information terminal device and character data display method
05/27/2009CN101443778A Communication system, authentication method, information processing device, information processing method, and battery
05/27/2009CN101443777A Network system
05/27/2009CN101443776A Authentication computer and program
05/27/2009CN101443775A Biometric authentication system and method with vulnerability verification
05/27/2009CN101443774A Optimized integrity verification procedures
05/27/2009CN101443773A Pseudo-random authentification code altering scheme for a transponder and a base station
05/27/2009CN101443772A Apparatus and method of managing security data
05/27/2009CN101443760A System and method for record retention date in a write once read much storage system
05/27/2009CN101443737A A system for monitoring/managing information leakage
05/27/2009CN101443713A Method and system for changing safety-relevant data for a control device
05/27/2009CN101442670A Client end proxy system of digital copyright management system
05/27/2009CN101442669A Background system of digital copyright management system
05/27/2009CN101442412A Method for prewarning aggression based on software defect and network aggression relation excavation
05/27/2009CN101441734A Unite identification authentication system
05/27/2009CN101441697A Ciphering method for generating instruction parameter in byte numerical value zero tending process
05/27/2009CN101441696A Method and device for improving safety of tool bar push button describing file
05/27/2009CN101441695A USBKey safe protection method
05/27/2009CN101441694A Secure video card methods and systems
05/27/2009CN101441693A Security protection method for electric document digital signing based on elliptical curve
05/27/2009CN101441692A Method for binding computer hardware and software
05/27/2009CN101441691A Method for releasing locking state of personal digital identification authentication equipment
05/27/2009CN101441690A Method for transferring digital content licenses and device for receiving such licenses
05/27/2009CN101441689A Login protection method
05/27/2009CN101441688A User authority allocation method and user authority control method
05/27/2009CN101441687A Method and apparatus for extracting virus characteristic of virus document
05/27/2009CN101441622A Method and apparatus for controlling operation of document
05/27/2009CN101441603A Storage device, terminal device and method of using a storage device
05/27/2009CN101441601A Ciphering transmission method of hard disk ATA instruction
05/27/2009CN100493262C Mobile communication terminal, information sending system and information receiving method
05/27/2009CN100492962C Apparatus and method for recording and reproducing information
05/27/2009CN100492419C Individual authentication method and individual authentication device
05/27/2009CN100492387C Method and system for software protected development based on Keil C51
05/27/2009CN100492386C Method and system for replicating protected data
05/27/2009CN100492385C Information processing apparatus and control method for the same
05/27/2009CN100492384C A method and system for the total decoupling of licenses from associated license protected configuration
05/27/2009CN100492383C Venting device for tamper-resistant electronic modules and manufacture method of the same
05/27/2009CN100492368C Mobile terminal apparatus electronic file storage and management method
05/27/2009CN100492357C Systems and methods that optimize row level database security
05/27/2009CN100492336C Unauthorized operation judgment system, unauthorized operation judgment method
05/27/2009CN100492335C Terminal authentication apparatus and method
05/27/2009CN100492300C System and method for executing a process on a microprocessor-enabled device
05/27/2009CN100492277C Method and device for using Hashing method in a safe guide loading program
05/27/2009CN100492259C Alphabet digit pad, display system and method
05/27/2009CN100492248C Authentication of control units in vehicle
05/26/2009US7540032 User objects for authenticating the use of electronic data
05/26/2009US7540031 Wireless architecture with malware scanning component manager and associated API
05/26/2009US7540027 Method/system to speed up antivirus scans using a journal file system
05/26/2009US7540023 Information processing apparatus and authentication program storage medium
05/26/2009US7540019 Processing device capable of implementing flexible access control
05/26/2009US7540018 Data security for digital data storage
05/26/2009US7540016 System and method for lost data destruction of electronic data stored on a portable electronic device which communicates with servers that are inside of and outside of a firewall
05/26/2009US7540015 System, method and apparatus for establishing privacy in internet transactions and communications
05/26/2009US7540013 System and methodology for protecting new computers by applying a preconfigured security update policy
05/26/2009US7540008 Secure clock
05/26/2009US7539877 Data management apparatus, data management method and computer program
05/26/2009US7539876 Apparatus and method for generating a cryptographic key schedule in a microprocessor
05/26/2009US7539875 Secure repository with layers of tamper resistance and system and method for providing same
05/26/2009US7539874 Secure password entry
05/26/2009US7539873 Original data circulation method, system, apparatus, and computer readable medium
05/26/2009US7539868 Run-time firmware authentication
05/26/2009US7539865 Data transfer device
05/26/2009US7539856 Distributed authentication in a protocol-based sphere of trust in which a given external connection outside the sphere of trust may carry communications from multiple sources
05/26/2009US7539830 Portable storage device capable of automatically running biometrics application programs and methods of automatically running the application programs
05/26/2009US7539828 Method and system for automatically preserving persistent storage
05/26/2009US7539747 Schema-based context service
05/26/2009US7539737 Utilizing an incentive point system based on disc and user identification
05/26/2009US7539733 Remote assistance
05/26/2009US7539725 Auditor system
05/26/2009US7539700 Method and system for transmitting secured electronic documents
05/26/2009US7539680 Revision control for database of evolved design
05/26/2009US7539649 Integrated circuit card with situation dependent identity authentication
05/26/2009US7539647 Using power state to enforce software metering state
05/26/2009US7539588 Data carrier with detection means for detecting a change made of information stored with storing means
05/26/2009US7539312 Program update method and server
05/26/2009US7539306 Key delivery apparatus, terminal apparatus, recording medium, and key delivery system
05/26/2009US7538674 Sense and respond RFID disk purge for computing devices
05/26/2009US7537301 Wide format print assembly having high speed printhead