Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
04/2009
04/08/2009CN101405739A Identification apparatus and method
04/08/2009CN101405681A Information processing apparatus, information processing method and program
04/08/2009CN101404709A Image processing apparatus and image processing method
04/08/2009CN101404647A Method and system for multifaceted scanning
04/08/2009CN101404644A Method and apparatus for transmitting contents with limited system permissions
04/08/2009CN101404056A Software protection method, apparatus and equipment
04/08/2009CN101404055A Media contents copyright protection method
04/08/2009CN101404054A Software permission recovery method
04/08/2009CN101404053A Method for preventing repeatedly issuing software permission
04/08/2009CN101404052A Method for remotely activating software
04/08/2009CN101404037A Method for detecting and positioning electronic text contents plagiary
04/08/2009CN101404014A Methods and systems for creating and updating approved-file and trusted-domain databases
04/08/2009CN101403993A Data security safekeeping equipment and method
04/08/2009CN101403985A Software permission backup method for software protection apparatus
04/08/2009CN101403977A Information processing apparatus and method thereof
04/08/2009CN101403973A Application program launching method and system for improving security of embedded Linux kernel
04/08/2009CN100477594C Method of internet clearance security certification
04/08/2009CN100477578C Combined common safety mechanism using network and physical interface
04/08/2009CN100476989C Portable data storage device
04/08/2009CN100476852C Method against refuse E-mail
04/08/2009CN100476851C Protection system for data security transmission between computer and disc
04/08/2009CN100476850C Printing apparatus
04/08/2009CN100476849C Method and system for auditing digital rights in a content management system
04/08/2009CN100476848C Image reading apparatus, authentication method, evaluation system, evaluation method, and computer program product
04/08/2009CN100476847C Method and apparatus for processing information, and computer program product
04/08/2009CN100476846C System for protecting on-line flash game, web server, method for providing webpage
04/08/2009CN100476845C Digital copyright management method
04/08/2009CN100476844C Method for realizing binding function between electronic key and computer
04/08/2009CN100476843C File protection methods and systems
04/08/2009CN100476842C Portable music player system for protecting digital content copyright
04/08/2009CN100476841C Method and system for centrally managing code to hard disk of enterprise
04/08/2009CN100476840C Weight parameter processing method and system capable of influencing data operation
04/08/2009CN100476784C User authentication system and data providing system using the same
04/08/2009CN100476765C Flashmemory safety system and method thereof
04/08/2009CN100476764C Storage device and method for protecting stored data
04/08/2009CN100476761C Device and method of realizing hard disk safety isolation
04/08/2009CN100476751C System, method, and apparatus for securely providing content viewable on a secure device
04/08/2009CN100476740C Device and method for providing transitions between operating modes of a device
04/08/2009CN100476719C Cryptography system and related elliptic curve operation method
04/08/2009CN100476685C Method and system for a security model of a computing device
04/08/2009CN100476684C Method and device for making encoded digital data available
04/08/2009CN100476683C Equipment for processing data, receiver and decoder thereof
04/07/2009US7516497 Information processing apparatus and method, and program storage medium
04/07/2009US7516496 Identifying unauthorized communication systems based on their memory contents
04/07/2009US7516494 Method, apparatus, and system for outputting information and forming image via network, and computer product
04/07/2009US7516493 Content distribution system, content distribution method, information processing apparatus, and program providing medium
04/07/2009US7516490 System, method and software for supplying activation information to a subsystem
04/07/2009US7516489 Anti-virus protection at a network gateway
04/07/2009US7516486 Communication between a private network and a roaming mobile terminal
04/07/2009US7516485 Method and apparatus for securely transmitting encrypted data through a firewall and for monitoring user traffic
04/07/2009US7516483 System and method for accomplishing two-factor user authentication using the internet
04/07/2009US7516479 Data communicating apparatus and method for managing memory of data communicating apparatus
04/07/2009US7516478 Remote management of mobile devices
04/07/2009US7516476 Methods and apparatus for automated creation of security policy
04/07/2009US7516332 Processing multi-key content
04/07/2009US7516331 Tamper-resistant trusted java virtual machine and method of using the same
04/07/2009US7516329 Information processing apparatus
04/07/2009US7516327 Distributing access to a data item
04/07/2009US7516326 Authentication system and method
04/07/2009US7516324 Information processing system, information management apparatus, and information processing apparatus
04/07/2009US7516323 Security management system in parallel processing system by OS for single processors
04/07/2009US7516167 Data synchronization
04/07/2009US7516102 Image output time management method and the record media
04/07/2009US7515718 Secured virtual network in a gaming environment
04/07/2009US7515717 Security containers for document components
04/07/2009US7513421 Transaction terminal device and transaction terminal control method
04/07/2009US7513411 Method of and apparatus for granting electronic signature, and computer program
04/07/2009CA2640804A1 Method and system for integrated securing and managing of virtual machines and virtual appliances
04/03/2009WO2008037048A1 Secure on line accounts (sola) system using cell phones and other wireless devices
04/02/2009WO2009042915A2 Whitelist and blacklist identification data
04/02/2009WO2009042820A2 Data security system with encryption
04/02/2009WO2009042617A1 Providing local storage service to applications that run in an application execution environment
04/02/2009WO2009042482A2 Systems and methods for hardware key encryption
04/02/2009WO2009042039A1 Method and apparatus for secure electronic business card exchange
04/02/2009WO2009041982A1 Dialogue analyzer configured to identify predatory behavior
04/02/2009WO2009041387A1 Authentication apparatus, device authentication system and program
04/02/2009WO2009041319A1 Certificate generating/distributing system, certificate generating/distributing method and certificate generating/distributing program
04/02/2009WO2009040715A1 Method, system, trusted service manager, service provider and memory element for managing access rights for trusted applications
04/02/2009WO2009040685A1 Replacement of keys
04/02/2009WO2009040495A1 Password management
04/02/2009WO2009040273A1 Method for protecting at least parts of product data, which are stored on at least one server and/or in at least one database and associated with a product identified by an rfid tag, from unauthorized access
04/02/2009WO2009040207A1 Method and system for the protection against access to a machine code of a device
04/02/2009WO2009040204A1 Method for generating masks in a communicating object and corresponding communicating object
04/02/2009WO2009040108A1 Smart identity system
04/02/2009WO2009039866A1 Access control for, for example, a web server by means of a telephone communication connection initiated by the user
04/02/2009WO2009039679A1 Architecture and method for centralized system minimization and hardening management
04/02/2009WO2009014402A3 Method of protecting input/output packet of usb device and apparatus thereof
04/02/2009WO2008128875A3 Method and apparatus for protecting simlock information in an electronic device
04/02/2009WO2008110759A3 Shield means for data input apparatus and method of use thereof
04/02/2009WO2006073837A3 Method and apparatus of adaptive network policy management for wireless mobile computers
04/02/2009WO2005082092A3 Methodoligy, system, and coputer readable medium for detecting operating system exploitations
04/02/2009WO2005045556A3 System and method for record retention date in a write once read many storage system
04/02/2009US20090089887 Theft-deterrence method and apparatus for processor based devices
04/02/2009US20090089886 Adjustable Feature Access for a Controlled Environmental System
04/02/2009US20090089884 Method and system for indentifying a device implementing a digital rights management protocol
04/02/2009US20090089882 Methods and Apparatus for Restricting End-User Access to Content
04/02/2009US20090089881 Methods of licensing software programs and protecting them from unauthorized use
04/02/2009US20090089879 Securing anti-virus software with virtualization
04/02/2009US20090089877 Dynamic email directory harvest attack detection and mitigation
04/02/2009US20090089873 Server message block (smb) security signatures seamless session switch