Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
09/2008
09/25/2008US20080235767 Method of Controlling Access to a Communication Network
09/25/2008US20080235766 Apparatus and method for document certification
09/25/2008US20080235764 Resource authorizations dependent on emulation environment isolation policies
09/25/2008US20080235759 Methods and Systems for Transparent Data Encryption and Decryption
09/25/2008US20080235758 Method for processing securities data
09/25/2008US20080235757 Detecting attempts to change memory
09/25/2008US20080235520 Transportable, Configurable Data Carrier For Exchanging Data Between Electrical Devices, and Method Therefor
09/25/2008US20080235512 Print data communication with data encryption and decryption
09/25/2008US20080235419 Integrated Circuit and Method of Securing Access to an On-Chip Memory
09/25/2008US20080235359 System for managing program applications storable in a mobile terminal
09/25/2008US20080235333 Group access privatization in clustered computer system
09/25/2008US20080235264 method for logging of a remote control session
09/25/2008US20080235221 Previews providing viewable regions for protected electronic documents
09/25/2008US20080235106 Software and Method That Enables Selection of One of A Plurality of Online Service Providers
09/25/2008US20080234999 Implementing performance-dependent transfer or execution decisions from service emulation indications
09/25/2008US20080234843 Projector, projection display system, and corresponding method and recording medium
09/25/2008US20080232785 Apparatus, Method, and Program Product For Recording and Reproducing Contents
09/25/2008US20080232600 Transaction Device with Noise Signal Encryption
09/25/2008US20080232598 System, Method and Apparatus to Obtain a Key for Encryption/Decryption/Data Recovery From an Enterprise Cryptography Key Management System
09/25/2008US20080232594 Symmetric key subscription
09/25/2008US20080232582 Method for Dynamically Authenticating Programmes with an Electronic Portable Object
09/25/2008US20080231893 Method, Software Program Product and Device For Producing Security Documents
09/25/2008US20080230598 Free-space Gesture Recognition for Transaction Security and Command Processing
09/25/2008US20080230355 Anti-Intrusion Device Primarily for an Electronic Payment Terminal
09/25/2008US20080229909 Electronic musical apparatus for reproducing received music content
09/25/2008CA2662558A1 Virtualization for diversified tamper resistance
09/24/2008EP1973297A1 Secure authenticated distance measurement
09/24/2008EP1973054A1 Workflow authorizations evaluation in multi-layered applications
09/24/2008EP1973053A1 Multiple user access to data triples
09/24/2008EP1973052A1 Information processing apparatus, software updating method, and image processing apparatus
09/24/2008EP1973038A1 A method for amti-virus based on a safety chip
09/24/2008EP1972091A1 System and method for user identification and authentication
09/24/2008EP1971950A2 Computer session management device and system
09/24/2008EP1971949A1 Content access management
09/24/2008EP1971948A1 Method for secure transfer of medical data to a mobile unit/terminal
09/24/2008EP1971947A1 Malicious software detection in a computing device
09/24/2008EP1971926A2 A portable, computer-peripheral apparatus including a universal serial bus (usb) connector
09/24/2008EP1971925A2 Methods and systems to restrict usage of a dma channel
09/24/2008EP1529257B1 Accepting a set of data in a computer unit
09/24/2008EP1410556A4 Computer networked system and method of digital file management and authentication
09/24/2008CN101273573A Data descramble apparatus and data descramble method
09/24/2008CN101273386A Apparatus and methods relating to voting systems and the like
09/24/2008CN101273366A Confidential file protection method
09/24/2008CN101273365A 处理模块的水印 Processing watermark module
09/24/2008CN101273364A Method for computing platform data protection
09/24/2008CN101273363A Secure yet flexible system architecture for secure devices with flash mass storage memory
09/24/2008CN101272384A Remote access system and method and intelligent agent therefor
09/24/2008CN101272249A Identity authentication method and software for built-in browser
09/24/2008CN101271507A File hiding method, system and device based on USB equipment
09/24/2008CN101271506A Method for using software protection device in double-machine warm backup surroundings
09/24/2008CN101271505A Method for protecting dictionary software
09/24/2008CN101271504A Method for removing software permission
09/24/2008CN101271503A Method and system for limiting software utility time
09/24/2008CN101271502A Software protection device with considerable file memory function
09/24/2008CN101271501A Encryption and decryption method and device of digital media file
09/24/2008CN101271500A Biological recognition starter and its method
09/24/2008CN101271499A Memory readout system for vehicle control device
09/24/2008CN101271498A Method for implementing reliable computation through threatened linked list and safety linked list in Linux operating system
09/24/2008CN101271497A Electric document anti-disclosure system and its implementing method
09/24/2008CN101271496A Cipher output method and device
09/24/2008CN101271411A Hot-plug protection system and method
09/24/2008CN101271388A Built-in browser client terminal interactive input method and software
09/24/2008CN101271317A Circuit device and corresponding method for controlling a load
09/24/2008CN100421452C Digital image pickup device, display device, rights information server, digital image management system and method using the same
09/24/2008CN100421111C Image processing apparatus and information processing method
09/24/2008CN100421102C Digital rights management structure, portable storage device, and contents management method using the portable storage device
09/24/2008CN100421065C Graphics card for smoothing the playing of video
09/24/2008CN100421058C Electronic device with finger sensor for character entry and associated methods
09/24/2008CN100421046C Method and computing device that securely runs authorized software
09/23/2008US7428756 Access control over dynamic intellectual capital content
09/23/2008US7428751 Secure recovery in a serverless distributed file system
09/23/2008US7428748 Method and system for authentication in a business intelligence system
09/23/2008US7428594 File server system
09/23/2008US7428581 Architecture for providing block-level storage access over a computer network
09/23/2008US7428570 Process of communication between an applet and a local Agent using a Socket communication channel
09/23/2008US7428513 Information-processing apparatus, information-processing method, accounting-processing apparatus, accounting-processing method and recording medium
09/23/2008US7428512 Information distribution system, information distribution device, information receiving device, information distribution method, information distribution program, recording medium recording the information distribution program, information receiving method, information receiving program, and recording medium recording the information receiving program
09/23/2008US7428307 Data reproduction apparatus capable of safely controlling reproduction time of encrypted content data and data reproduction circuit and data recording apparatus used for the same
09/23/2008US7428070 Method for providing a mailing system
09/23/2008CA2355082C A semiconductor memory card access apparatus, a computer-readable recording medium, an initialization method, and a semiconductor memory card
09/23/2008CA2333663C Security model for interactive television applications
09/23/2008CA2253539C A method for providing a secure non-reusable one-time password
09/22/2008CA2582867A1 Method and encryption tool for securing electronic data storage devices
09/20/2008CA2620455A1 Information delivery system, delivery center device, user terminal device and information delivery method
09/18/2008WO2008113085A2 Method for managing a globally accessable operational data warehouse system with improved security and consumer response
09/18/2008WO2008113059A1 Enterprise security assessment sharing
09/18/2008WO2008112954A1 Selectively enabled threat based information system
09/18/2008WO2008112812A2 Human-recognizable cryptographic keys
09/18/2008WO2008112785A1 Secure transfer of digital objects
09/18/2008WO2008112448A1 Secured cross platform networked multiplayer communication and game play
09/18/2008WO2008112048A1 Method and system to authorize and assign digital certificates without loss of privacy
09/18/2008WO2008112010A1 System and method for protecting data based on geographic presence of a restricted device
09/18/2008WO2008111870A1 Method for operating a conditional access system to be used in computer networks and a system for carrying out said method
09/18/2008WO2008111835A1 Method for saving a file
09/18/2008WO2008111774A1 Digital rights management method and apparatus
09/18/2008WO2008111382A1 Information processing device, information processing method, and program
09/18/2008WO2008111359A1 File server system and file management method
09/18/2008WO2008111298A1 Information processor, program, and recording medium
09/18/2008WO2008111141A1 Contents acquiring method, information processing device and information recording device
09/18/2008WO2008110985A1 Encryption and decryption of a dataset in at least two dimensions