Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
10/22/2008 | EP1982462A1 Multi-mode credential authentication |
10/22/2008 | EP1982288A2 Systems and methods for multi-factor authentication |
10/22/2008 | EP1982287A2 Method and apparatus for securely booting from an external storage device |
10/22/2008 | EP1982271A1 Method and apparatus for generating rights object by means of delegation of authority |
10/22/2008 | EP1982262A1 Data security system |
10/22/2008 | EP1982256A1 Method and system for installing portable executable applications |
10/22/2008 | EP1982245A1 Security key with instructions |
10/22/2008 | EP1875370A4 Method for restricting content usage in digital rights management |
10/22/2008 | EP1552395A4 Enterprise computer investigation system |
10/22/2008 | EP1410213A4 Mobile application access control list security system |
10/22/2008 | EP1230777B1 Method and apparatus for providing redundant and resilient cryptographic services |
10/22/2008 | CN101292253A Data file recording system and data file recording method |
10/22/2008 | CN101292252A Information processing device, and method therefor |
10/22/2008 | CN101292251A Communication terminal, executable process limiting method and executable process limiting program |
10/22/2008 | CN101292250A System and program for authentication |
10/22/2008 | CN101292249A Semiconductor device and method for preventing attacks on the semiconductor device |
10/22/2008 | CN101292248A Special PC mode entered upon detection of undesired state |
10/22/2008 | CN101292247A 有效的水印检测 Effective watermark detector |
10/22/2008 | CN101292246A Cryptographic control for mobile storage means |
10/22/2008 | CN101291385A Image forming apparatus |
10/22/2008 | CN101291323A Using partly determination finite automatic mode matching for network attack detection |
10/22/2008 | CN101290649A Software protector with time valve protection and its realization method |
10/22/2008 | CN101290648A Method for remotely verifying legal copy of software |
10/22/2008 | CN101290647A Password protection apparatus and method and cipher keyboard |
10/22/2008 | CN101290646A Apparatus and method for protecting system in virtualized environment |
10/22/2008 | CN101290645A Method for enhancing information safety equipment verification safety |
10/22/2008 | CN101290644A Electronic system and digital copyright management method |
10/22/2008 | CN101290643A System for forbidding remote computer boot-strap |
10/22/2008 | CN101290642A Electronic file transmission control method and its system based on area limit |
10/22/2008 | CN101290641A Method for trigger equipment executing operation, equipment and system thereof |
10/22/2008 | CN100428790C Image generating device, image file generating method, image verification device and image verification method |
10/22/2008 | CN100428690C A method for determining access rights to IT resources |
10/22/2008 | CN100428682C System and method for authenticating content user |
10/22/2008 | CN100428272C RFID tag and merchandise management system |
10/22/2008 | CN100428262C A software protection method based on modified one time pad |
10/22/2008 | CN100428261C Authentic authentication system based on CPK |
10/22/2008 | CN100428260C Minimum invading data hidding method of computer network |
10/22/2008 | CN100428259C Method and system of preventing digital watermark losing in content adapting and digital copyright center |
10/22/2008 | CN100428258C Method of and apparatus for encrypting digital map |
10/22/2008 | CN100428257C On-line copyright content use power control method and mobile terminal device |
10/22/2008 | CN100428256C Information processing device, information processing method, and computer program |
10/22/2008 | CN100428212C System and method for downloading and playing music file |
10/22/2008 | CN100428206C Image transmission apparatus |
10/22/2008 | CN100428201C System and method for identifying non-authorized access to some part of data storage facility |
10/22/2008 | CN100428187C Nonvolatile memory apparatus |
10/22/2008 | CN100428157C A computer system and method to check completely |
10/22/2008 | CN100428106C Hardware token self enrollment process |
10/21/2008 | USRE40547 Software reproduction apparatus |
10/21/2008 | US7441276 Content processing limit method, content processing limit program, and content edition device |
10/21/2008 | US7441274 Method and apparatus for minimizing file scanning by anti-virus programs |
10/21/2008 | US7441273 Virus scanner system and method with integrated spyware detection capabilities |
10/21/2008 | US7441269 Method and system for session accounting in wireless networks |
10/21/2008 | US7441265 Method and system for session based authorization and access control for networked application objects |
10/21/2008 | US7441264 Security objects controlling access to resources |
10/21/2008 | US7441181 Automatic information input program |
10/21/2008 | US7441126 Secure wireless LAN device including tamper resistant feature and associated method |
10/21/2008 | US7441125 Portable data carrier provide with access protection by rendering messages unfamiliar |
10/21/2008 | US7441122 Method for providing secure access to a digital resource |
10/21/2008 | US7441117 Group formation/management system, group management device, and member device |
10/21/2008 | US7441116 Secure resource distribution through encrypted pointers |
10/21/2008 | US7441111 Controlled program execution by a portable data carrier |
10/21/2008 | US7441031 System using registration information set by a user to allow other users to access updated portion of contact information of the user |
10/21/2008 | US7440574 Content encryption using programmable hardware |
10/21/2008 | US7440461 Methods and apparatus for detecting patterns in a data stream |
10/21/2008 | CA2444953C Method for controlling access to medical monitoring device service |
10/21/2008 | CA2440546C Cryptographic authentication with ephemeral modules |
10/21/2008 | CA2416530C Using embedded data with file sharing |
10/21/2008 | CA2276036C Method and apparatus for secure storage of data |
10/16/2008 | WO2008124708A2 Identification and authentication using public templates and private patterns |
10/16/2008 | WO2008124201A2 Secure file encryption |
10/16/2008 | WO2008123939A1 Method and apparatus for generating one-time passwords |
10/16/2008 | WO2008123682A1 System and method for device management security of trap management object |
10/16/2008 | WO2008123247A1 Information processing device and its control method |
10/16/2008 | WO2008123015A1 Communication system, reliable communication mechanism, and communication method used for them |
10/16/2008 | WO2008122976A1 System and methods for using firewall protection with usb storage devices |
10/16/2008 | WO2008122839A1 An integrated circuit and method for executing a security task |
10/16/2008 | WO2008122755A1 System and method for providing a secure computing environment |
10/16/2008 | WO2008122688A1 Method, device, server arrangement, system and computer program products for securely storing data in a portable device |
10/16/2008 | WO2008122627A1 Communication terminal device, communication device, electronic card, method for a communication terminal device and method for a communication device for providing a verification |
10/16/2008 | WO2008122236A1 Method, device and system for protecting biometric feature data |
10/16/2008 | WO2008122130A1 Distribution channel loss protection for electronic devices |
10/16/2008 | WO2008106032A3 Transactional visual challenge image for user verification |
10/16/2008 | WO2008102169A3 Authentication device and method |
10/16/2008 | WO2008096220A3 A method and system for communication between a usb device and a usb host |
10/16/2008 | WO2008096078A3 Portable electronic device and method for securing such device |
10/16/2008 | WO2008094839A8 System and method of data encryption and data access of a set of storage devices via a hardware key |
10/16/2008 | WO2008090374A3 Trusted computing entities |
10/16/2008 | WO2008085449A3 Secure booting a computing device |
10/16/2008 | WO2008081150A3 Method and system for authorizing access to a server |
10/16/2008 | WO2008023307A3 Controlling distribution of digital content |
10/16/2008 | WO2008012739A3 Media playback decoder tracing |
10/16/2008 | US20080256648 Secure portable computer and security method |
10/16/2008 | US20080256647 System and Method For Tracing Illegally Copied Contents on the Basis of Fingerprint |
10/16/2008 | US20080256645 Digital rights management method and digital rights management-enabled portable device |
10/16/2008 | US20080256643 Multiple entity authorization model |
10/16/2008 | US20080256640 Playback apparatus and playback method |
10/16/2008 | US20080256639 Verification Method, Information Processing Device, Recording Medium, Verification System, Certification Program, and Verification Program |
10/16/2008 | US20080256638 System and method for providing network penetration testing |
10/16/2008 | US20080256637 Computer System and Security Reinforcing Method Thereof |
10/16/2008 | US20080256634 Target data detection in a streaming environment |