Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
05/2009
05/20/2009CN101436247A Biological personal identification method and system based on UEFI
05/20/2009CN101436242A Method and system for managing interaction between game system and other game systems
05/20/2009CN101436241A Computer network security control system
05/20/2009CN101436240A Method and system for forecasting software loophole publish quantities
05/20/2009CN101436239A Personal computer with handwriting recognition identification affirmation function and implementing method thereof
05/20/2009CN101436238A Digital publishing rights backup and restoring method and system
05/20/2009CN101436237A Method and system for whitelisting software components
05/20/2009CN101436236A Local verification of trusted display based on remote server verification
05/20/2009CN101436235A Apparatus for protecting computer system
05/20/2009CN101436234A System and method for ensuring operation environment safety
05/20/2009CN101436233A Hard disk multi-user partition switch control method, system and computer terminal
05/20/2009CN101436162A Method and system for implementing memory multiuser management
05/20/2009CN101436141A Firmware upgrading and encapsulating method and device based on digital signing
05/20/2009CN100490529C Method for recording an elapsed time period in a security module
05/20/2009CN100490520C Control device and system of control using digital data in medium
05/20/2009CN100490487C Communication terminal device and communication method
05/20/2009CN100490439C Conditional access system
05/20/2009CN100490376C Data recording and/ or copying method and device, and recording medium
05/20/2009CN100490067C Substrate processing apparatus, use state ascertaining method, and false use preventing method
05/20/2009CN100489986C Method and apparatus for content protection across an interface
05/20/2009CN100489901C Personal identification system based on face authentication, automatic transaction device, facial authentication server
05/20/2009CN100489882C Method, device and system for biometric identification
05/20/2009CN100489880C Apparatus and method for implementing digital rights management systems in low-efficiency storage device
05/20/2009CN100489879C Method, system and server for checking page data
05/20/2009CN100489878C System and method for controlling access to database
05/20/2009CN100489877C Process and device for preventing fraudulent use of terminal software
05/20/2009CN100489876C Method and system for distributing software products
05/20/2009CN100489875C Digital content releasing control method and system
05/20/2009CN100489845C Common point authoring system for tracking and authenticating objects in a distribution chain
05/20/2009CN100489818C Processor and secure processing system
05/20/2009CN100489805C Autonomous memory checker for runtime security assurance and method therefore
05/20/2009CN100489767C Communicating device
05/20/2009CN100489728C Method for establishing trustable operational environment in a computer
05/19/2009US7536727 Content management method, recording and/or reproducing apparatus, and recording medium
05/19/2009US7536724 Risk profiling for optimizing deployment of security measures
05/19/2009US7536717 Fast searching of list for IP filtering
05/19/2009US7536712 Flexible electronic message security mechanism
05/19/2009US7536609 Reasonable clock adjustment for storage system
05/19/2009US7536564 Method for encrypting a calculation using a modular function
05/19/2009US7536562 System and method of security function activation for a mobile electronic device
05/19/2009US7536558 Flash memory distribution of digital content
05/19/2009US7536556 Method and device for entering a computer database password
05/19/2009US7536550 Image forming apparatus and control method for same
05/19/2009US7536549 Methods for generating a partially encrypted and compressed database and decrypting and decompressing the database
05/19/2009US7536548 System and methodology providing multi-tier-security for network data exchange with industrial control components
05/19/2009US7536547 Secure data transmission in a network system of image processing devices
05/19/2009US7536544 Trust information delivery scheme for certificate validation
05/19/2009US7536525 Virtual machine hot cloning including freezing and unfreezing memory in a distributed network
05/19/2009US7536442 Method, system, and storage medium for providing autonomic identification of an important message
05/19/2009US7536355 Content security system for screening applications
05/19/2009US7536352 Tokenless biometric electronic financial transactions via a third party identicator
05/19/2009US7536172 Test enabled application execution
05/19/2009US7535744 Semiconductor integrated circuit and IC card system having internal information protection
05/19/2009US7535586 Information processing device, printing device, print data transmission method, printing method, print data transmitting program, and recording medium
05/19/2009US7535488 Image data verification system
05/19/2009US7533828 Electronic credit card—ECC
05/19/2009US7533735 Digital authentication over acoustic channel
05/19/2009CA2426322C Recording medium for protecting copyrighted data
05/19/2009CA2390450C Method and system for controlling transmission of information
05/14/2009WO2009062165A1 File accessing and retrieval using soft digital rights management technology
05/14/2009WO2009062092A2 Systems, methods, and apparatuses for erasing memory on wireless devices
05/14/2009WO2009062023A2 Network rating
05/14/2009WO2009061855A2 Dynamic access control in response to flexible rules
05/14/2009WO2009061753A1 Wlan access integration with physical access control system
05/14/2009WO2009061743A1 System and method for authenticated payment terminal display prompt control
05/14/2009WO2009061741A2 Computer enabled method and apparatus to inhibit content and other copying
05/14/2009WO2009061588A1 Cross-site scripting filter
05/14/2009WO2009061320A2 Method and system for protecting a computer against malicious software
05/14/2009WO2009061171A2 Secure software licensing control mechanism
05/14/2009WO2009060328A1 Method and device for digital rights protection
05/14/2009WO2009060004A1 Authentication method and arrangement for performing such an authentication method and corresponding computer program and corresponding computer-readable storage medium
05/14/2009WO2009059935A1 Data processing device and method for operating a data processing device
05/14/2009WO2009059763A1 Method of unlocking an engine control computer
05/14/2009WO2009059569A2 Method for securing authorized data entry and the device to perform this method
05/14/2009WO2009042915A3 Whitelist and blacklist identification data
05/14/2009WO2009042820A3 Data security system with encryption
05/14/2009WO2009042482A3 Systems and methods for hardware key encryption
05/14/2009WO2009040273A4 Method for protecting at least parts of product data, which are stored on at least one server and/or in at least one database and associated with a product identified by an rfid tag, from unauthorized access
05/14/2009WO2009035902A3 Malware prevention system monitoring kernel events
05/14/2009US20090126030 Tamper detection line circuitry for use in authenticating an integrated circuit
05/14/2009US20090126029 Permanent Data Hardware Integrity
05/14/2009US20090126028 Securing electronic control unit code
05/14/2009US20090126024 Method and system for managing software licenses and storage apparatus
05/14/2009US20090126023 Apparatus and method for forecasting security threat level of network
05/14/2009US20090126022 Method and System for Generating Data for Security Assessment
05/14/2009US20090126021 Secure initialization of intrusion detection system
05/14/2009US20090126020 Engine for rule based content filtering
05/14/2009US20090126019 Network-based infection detection using host slowdown
05/14/2009US20090126018 Password expiration based on vulnerability detection
05/14/2009US20090126016 System and method for detecting multi-component malware
05/14/2009US20090126015 System and method for detecting multi-component malware
05/14/2009US20090126014 Methods and systems for analyzing security events
05/14/2009US20090126013 Systems and methods for detecting child identity theft
05/14/2009US20090126012 Risk Scoring System For The Prevention of Malware
05/14/2009US20090126011 Application security model
05/14/2009US20090126010 Using object based security for controlling object specific actions on a surface based computing device
05/14/2009US20090126006 Securing cpu affinity in multiprocessor architectures
05/14/2009US20090126005 Method, apparatus and system for managing malicious-code spreading sites using firewall
05/14/2009US20090126003 System And Method For Providing Network And Computer Firewall Protection With Dynamic Address Isolation To A Device
05/14/2009US20090126001 Techniques to manage security certificates