Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
11/2008
11/27/2008US20080295165 Method for Safely Logging Onto a Technical System
11/27/2008US20080295163 Method and Apparatus for Updating Anti-Replay Window in Ipsec
11/27/2008US20080295161 Operation support system
11/27/2008US20080295160 Biometrically controlled personal data management system and device
11/27/2008US20080295159 Method and System for the Authentication of a User of a Data Processing System
11/27/2008US20080295156 System, computer program product and method for scanning and managing documents
11/27/2008US20080295155 Systems, methods, and media for managing electronic asset tags for asset devices
11/27/2008US20080295152 Safety management system
11/27/2008US20080295147 Integrated Security Roles
11/27/2008US20080295144 Network client validation of network management frames
11/27/2008US20080294908 Recording Device, Content Key Processing Device, Recording Medium, and Recording Method
11/27/2008US20080294898 Mobile Terminal for Secure Electronic Transactions and Secure Electronic Transaction System
11/27/2008US20080294890 Method and apparatus for controlling output of content device
11/27/2008US20080294880 Customization of a microprocessor and data protection method
11/27/2008US20080294763 Display output setting method, information processing device, and information processing system
11/27/2008US20080294759 System and Method For Hosted Network Management
11/27/2008US20080294558 Portable electronic appliance, data processor, data communication system, computer program, data processing method
11/27/2008US20080294451 Internet connection service providing method and system
11/27/2008US20080292286 Video Information Recording and Outputting Method, Recording Media and Recording and Playback System
11/27/2008US20080291045 Method and apparatus for a proximity warning system
11/27/2008US20080291018 Method, computer program element and a system for processing alarms triggered by a monitoring system
11/27/2008US20080291016 Anti-Tamper Devices
11/27/2008DE112007000363T5 Verfahren zum Bereitstellen sicherer Firmware A method for providing secure firmware
11/27/2008CA2687851A1 Electronic security device for monitoring computer equipment, associated assemblies and methods
11/27/2008CA2687582A1 Cryptoprocessor with improved data protection
11/26/2008EP1995935A2 Streaming video data to mobile devices
11/26/2008EP1995933A1 Method and system for message delivery management in broadcast networks
11/26/2008EP1995730A1 Method and apparatus for restricting the output of a reproduction device to output ports applying transmission content protection
11/26/2008EP1995682A1 Personalisation of a microprocessor and data protection method
11/26/2008EP1995681A1 Authenticity assurance system for spreadsheet data
11/26/2008EP1994671A2 A method and apparatus for a token
11/26/2008EP1994487A2 Mutual authentication between two parties using two consecutive one-time passwords
11/26/2008EP1994486A1 Method and apparatus for automated testing software
11/26/2008EP1994485A2 Method for linking a digital content to a person
11/26/2008EP1497934A4 Authentication system and method having mobility in public wireless local area network
11/26/2008CN201156255Y Apparatus preventing unauthorized entry into receiver of moveable media
11/26/2008CN201156254Y Encryption equipment based on PXA255 processor
11/26/2008CN201156199Y Tower crane automatic safety monitoring system with user interface and database authority ciphered
11/26/2008CN101313555A Authentication management system and method, authentication management server
11/26/2008CN101313327A Method and apparatus for establishing usage rights for digital content to be created in the future
11/26/2008CN101313314A A method and system for transaction validation
11/26/2008CN101313312A Modular material processing system safety interlock scheme and method of operation
11/26/2008CN101313311A Method for storing and transfer of rights objects between devices and device exploiting the method
11/26/2008CN101313310A Apparatus and method for monitoring and controlling access to data on a computer readable medium
11/26/2008CN101313309A Method, apparatus and system for performing access control and intrusion detection on encrypted data
11/26/2008CN101313261A Plant control system
11/26/2008CN101311957A Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and other information
11/26/2008CN101311956A Method executed by electronic equipment
11/26/2008CN101311942A Software encryption and decryption method and encryption and decryption device
11/26/2008CN101311941A Street fair computer
11/26/2008CN101311940A Control content device output method and equipment
11/26/2008CN101311939A Operating system self-guiding, safe access control storage technology realization method
11/26/2008CN101311938A Method, equipment and system for multiple equipment using same permission
11/26/2008CN100438461C Method and apparatus for authenticating and veritying user and computer over network
11/26/2008CN100438421C Method and system for conducting user verification to sub position of network position
11/26/2008CN100438413C Contents delivery management apparatus and contents delivery management method
11/26/2008CN100437638C Card-type apparatus and identification system
11/26/2008CN100437619C Trusted input for mobile platform transactions
11/26/2008CN100437618C Portable information safety device
11/26/2008CN100437617C Key generating method and key generating apparatus
11/26/2008CN100437616C Software anti-pirate device
11/26/2008CN100437615C Method for protecting dynamic chanining bank interface under windows platform
11/26/2008CN100437614C Method for identifying unknown virus programe and clearing method thereof
11/26/2008CN100437613C User discrimination system, user discrimination method and storage medium storing a program
11/26/2008CN100437612C Method and device for protecting content
11/26/2008CN100437611C Authorization controlled electronic signature method based on elliptical curve
11/26/2008CN100437610C Method for implementation of electronic trade system
11/26/2008CN100437551C Method and apparatus of automatically accessing by using multiple user's equipments
11/26/2008CN100437531C Devices as services in a decentralized operating system
11/26/2008CN100437526C Recorder/reproducer and content data protection system
11/26/2008CN100437508C Method and apparatus for managing digital content usage rights
11/26/2008CN100437420C Computer system and its safety encryption
11/25/2008US7458101 Information viewing/listening system, information player, and information provider
11/25/2008US7458100 Adding copy protection to a computer program
11/25/2008US7458099 Selective detection of malicious computer code
11/25/2008US7458083 Architecture for software for interactively communicate with a machine and remotely maintenance the machine
11/25/2008US7458026 Information providing system and method and storage medium
11/25/2008US7458002 Processor having electronic fuses for storing secret data
11/25/2008US7457968 Method and system for a recursive security protocol for digital copyright control
11/25/2008US7457967 Hidden identification
11/25/2008US7457966 Data file processing apparatus, remote control apparatus for data file processing apparatus and control method for data file processing apparatus
11/25/2008US7457964 Trusted path for transmitting content thereon
11/25/2008US7457963 Endoscopic examination system with security for report preservation or transmission improved
11/25/2008US7457959 Data repository and method for promoting network storage of data
11/25/2008US7457956 Securing arbitrary communication services
11/25/2008US7457953 Method and apparatus to provide secure communication
11/25/2008US7457951 Data integrity monitoring in trusted computing entity
11/25/2008US7457945 System and method for providing a secure firmware update to a device in a computer system
11/25/2008US7457939 Processing system with dedicated local memories and busy identification
11/25/2008US7457867 Reliable non-repudiable Syslog signing and acknowledgement
11/25/2008US7457848 Over-network resource distribution system and mutual authentication system
11/25/2008US7457779 User terminal program designated not to receive contents that cannot achieve users' object
11/25/2008US7457610 Content providing method, a registration method of a user menu information database, a content providing program, a content requesting program, a user registration program, and a charge invoicing program
11/25/2008US7457442 Authentication system by fingerprint
11/25/2008US7457412 System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party
11/25/2008US7456984 Billing control in print system
11/25/2008US7456861 Digital camera that incorporates an authentication arrangement for application to consumable print rolls
11/25/2008CA2412692C Method and apparatus for inhibiting a selected ide command
11/25/2008CA2303297C Cryptographic co-processor
11/20/2008WO2008141100A2 Apparatus for controlling processor execution in a secure environment