Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
08/06/2008 | EP1953667A1 Interface monitoring device and method for monitoring an interface connection |
08/06/2008 | EP1953666A2 Method of booting electronic device and method of authenticating boot of electronic device |
08/06/2008 | EP1953665A1 Method for supporting mutual exclusion function and DRM device thereof |
08/06/2008 | EP1953664A2 Apparatus for detecting intrusion code and method using the same |
08/06/2008 | EP1953663A1 Touch entry of password on a mobile device |
08/06/2008 | EP1952585A2 Techniques for distributing network provider digital content to customer premises nodes |
08/06/2008 | EP1952361A1 Identification and computer login of an operator of a vehicle |
08/06/2008 | EP1952321A1 Prepaid or pay-as-you-go software, content and services delivered in a secure manner |
08/06/2008 | EP1952317A1 System and method for managing physical and electronic documents |
08/06/2008 | EP1952300A1 Method, system and computer program product for access control |
08/06/2008 | EP1952298A2 Mobile security system and method |
08/06/2008 | EP1952297A2 Method and device for authentication by a user of a trustworthy interface and related computer programme |
08/06/2008 | EP1952296A1 System for managing access control |
08/06/2008 | EP1952295A2 System for managing proprietary data |
08/06/2008 | EP1952288A1 Location sensitive documents |
08/06/2008 | EP1952253A2 System and method for providing secure data transmission |
08/06/2008 | EP1952248A2 Hard drive eraser |
08/06/2008 | EP1671201B1 Granting access to a computer-based object |
08/06/2008 | EP1440548B1 Method and system for secure communication |
08/06/2008 | EP0981807B1 Integrated circuit card with application history list |
08/06/2008 | CN201097315Y Computer fingerprint keyboard |
08/06/2008 | CN101238705A Mobile information terminal apparatus |
08/06/2008 | CN101238492A Itso fvc2应用监视器 Itso fvc2 Application Monitor |
08/06/2008 | CN101238475A Software application security method and system |
08/06/2008 | CN101238474A Imaging system and authentication method |
08/06/2008 | CN101238473A A secure terminal, a routine and a method of protecting a secret key |
08/06/2008 | CN101238472A Improving the security of a computing device through the use of vendor ids |
08/06/2008 | CN101238471A Exclusive access for secure audio progam |
08/06/2008 | CN101238470A Protected software identifiers for improving security in a computing device |
08/06/2008 | CN101237597A Gold key making method for mobile device |
08/06/2008 | CN101237443A Method and system for user authentication in management protocol |
08/06/2008 | CN101236591A Method, terminal and safe chip for guaranteeing critical data safety |
08/06/2008 | CN101236590A Threshold password system based software division protection accomplishing method |
08/06/2008 | CN101236589A Device and method for protecting computer operating system property right |
08/06/2008 | CN101236588A Computer terminal port use permission control method |
08/06/2008 | CN101236587A Outsourced database enquiry and verification method based on fragile watermark |
08/06/2008 | CN101236586A Image forming system, image forming apparatus, and terminal |
08/06/2008 | CN101236585A Image processing apparatus and document combination method, |
08/06/2008 | CN101236584A Apparatus for detecting intrusion code and method using the same |
08/06/2008 | CN101236583A Method for supporting mutual exclusion function and DRM device thereof |
08/06/2008 | CN101236582A Expansible firmware interface based portable computer anti-theft method |
08/06/2008 | CN101236581A Information safety apparatus and its processing method |
08/06/2008 | CN101236570A Method and system for coordinating access to locally and remotely exported file systems |
08/06/2008 | CN101236535A Hard disk encryption method based on optical disk under Window environment |
08/06/2008 | CN101236534A Hard disk encryption method based on PCI card under Window environment |
08/06/2008 | CN101236532A Hard disk encryption method based on USB equipment under Window environment |
08/06/2008 | CN101236531A Memory and its automatic protection realization method |
08/06/2008 | CN101236502A Method of booting electronic device and method of authenticating boot of electronic device |
08/06/2008 | CN101236500A Method for embedding inner core drive program in Window operation system by optical disk start-up |
08/06/2008 | CN101236499A Method for embedding inner core drive program in Window operation system by USB apparatus start-up |
08/06/2008 | CN101236498A Method for embedding inner core drive program in Window operation system by PCI card start-up |
08/06/2008 | CN101236496A Software consistency detector methods and apparatus |
08/06/2008 | CN100409617C System and method of authenticating validity and dropoff |
08/06/2008 | CN100409610C Content transmitting device, content receiving device and content transmitting method |
08/06/2008 | CN100409352C Information recording medium, and information reproducting device |
08/06/2008 | CN100409341C Copy protection of optical discs comprising chip |
08/06/2008 | CN100409245C Method for implementing PKI application of bank card on computer |
08/06/2008 | CN100409205C Information processing device and method |
08/06/2008 | CN100409204C Information recording medium, information processing apparatus, information processing method |
08/06/2008 | CN100408976C Navigation device |
08/05/2008 | US7409721 Network risk analysis |
08/05/2008 | US7409719 Computer security management, such as in a virtual machine or hardened operating system |
08/05/2008 | US7409718 Method of decrypting and analyzing encrypted malicious scripts |
08/05/2008 | US7409717 Metamorphic computer virus detection |
08/05/2008 | US7409714 Virtual intrusion detection system and method of using same |
08/05/2008 | US7409713 Method of protecting software code |
08/05/2008 | US7409704 System and method for local policy enforcement for internet service providers |
08/05/2008 | US7409600 Self-healing cache system |
08/05/2008 | US7409593 Automated diagnosis for computer networks |
08/05/2008 | US7409563 Method and apparatus for preventing un-authorized attachment of computer peripherals |
08/05/2008 | US7409560 Certification processing hardware, certification processing system and use management hardware |
08/05/2008 | US7409559 System and method of exchanging information via electronic mail |
08/05/2008 | US7409555 Electronic document active content assurance |
08/05/2008 | US7409554 Data processing system, memory device, data processing unit, and data processing method and program |
08/05/2008 | US7409547 Adaptive transparent encryption |
08/05/2008 | US7409487 Virtualization system for computers that use address space indentifiers |
08/05/2008 | US7409424 Electronic mail file access system |
08/05/2008 | US7409406 Uniform search system and method for selectively sharing distributed access-controlled documents |
08/05/2008 | US7409400 Applications of an appliance in a data center |
08/05/2008 | US7409391 Controlling access to a storage device |
08/05/2008 | US7409390 Access control system and methods |
08/05/2008 | US7409370 Secured and selective runtime auditing services using a trusted computing device |
08/05/2008 | US7409142 Receiving apparatus, receiving method, and supplying medium |
08/05/2008 | US7409063 Contents distribution system |
08/05/2008 | US7409062 Method and device for the generation of checkable forgery-proof documents |
08/05/2008 | US7408953 Information converting apparatus |
08/05/2008 | US7408859 Method and apparatus for recording and reproducing information on and from recording disc |
08/05/2008 | US7408850 Method for decoding data received from a data source using hardware configuration data received from the same data source |
08/05/2008 | US7408670 Facsimile delivery method and system using associated identifiers |
08/05/2008 | US7408656 Controlling printer macro usage based on printer identification information |
08/02/2008 | CA2619354A1 Mapping system |
08/02/2008 | CA2592478A1 System and method of enhancing computer security by using dual desktop technologies |
08/01/2008 | CA2619794A1 System, method and apparatus for the detection and capturing of technological crime instances |
07/31/2008 | WO2008092167A2 Protecting secrets in an untrusted recipient |
07/31/2008 | WO2008092166A2 File encryption while maintaining file size |
07/31/2008 | WO2008091477A1 Mechanism for utilizing kerberos features by an ntlm compliant entity |
07/31/2008 | WO2008090928A1 Method, device, and program for converting data in storage medium |
07/31/2008 | WO2008090874A1 Ic card and method for authenticating ic card |
07/31/2008 | WO2008090779A1 Right management method, its system, server device used in the system, and information device terminal |
07/31/2008 | WO2008090708A1 Content distribution system, content distribution method, and program |