Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
07/2008
07/08/2008US7397920 Information processing device and method, and recording medium
07/08/2008US7397919 Access control method and storage apparatus
07/08/2008US7397916 System and method for protecting computer software from a white box attack
07/08/2008US7397817 Information converting apparatus
07/08/2008US7397476 Projector, projection display system, and corresponding method and recording medium
07/08/2008CA2849573A1 Host intrusion prevention server
07/08/2008CA2607540A1 Host intrusion prevention server
07/08/2008CA2573053A1 Method and system for protecting real estate from fraudulent title changes
07/05/2008CA2607536A1 Dynamic provisioning of protection software in a host intrusion prevention system
07/03/2008WO2008079899A1 Anti-virus signature footprint
07/03/2008WO2008078689A1 Information converting technique
07/03/2008WO2008078564A1 Information processing device, integrated circuit, method, and program
07/03/2008WO2008078376A1 Authentication device, authentication method, and authentication program
07/03/2008WO2008078333A1 Intelligent system to protect confidential information from unauthorized duplication
07/03/2008WO2008078215A2 System and method for remotely tracking an activation of protected software
07/03/2008WO2008077964A1 Secured housing
07/03/2008WO2008077653A2 Method, system and computer program for monitoring components in a service framework
07/03/2008WO2008077564A1 Method for the remote analysis of a cooking appliance, and a cooking application for conducting said method
07/03/2008WO2008077514A1 Authentication of portable data carriers
07/03/2008WO2008077326A1 A character inputting method and system thereof
07/03/2008WO2008059480B1 Systems and methiods for protection of data integrity of updatable data against unauthorized modification
07/03/2008WO2008050097A3 System and method for data acquisition and processing
07/03/2008WO2008042191A3 Architecture for virtual security module
07/03/2008WO2008028804A3 Selective encryption of data stored on removable media in an automated data storage library
07/03/2008WO2008021864A3 Real-time, customized embedding of specific content into local webserver pages
07/03/2008WO2008005536A3 Malware automated removal system and method
07/03/2008WO2007144798A3 Method, rfid reader, rfid tag and rfid system for secure communication
07/03/2008US20080163382 Method and system for protecting sensitive data in a program
07/03/2008US20080163381 Process Execution Apparatus and Phone Number Registration Apparatus
07/03/2008US20080163379 Method of inserting/overlaying markers, data packets and objects relative to viewable content and enabling live social networking, N-dimensional virtual environments and/or other value derivable from the content
07/03/2008US20080163378 Digital rights management method for terminal
07/03/2008US20080163377 Apparatus and method for transferring content rights by multimedia message in a mobile communication system
07/03/2008US20080163376 Hardware security module, commissioning method and electronic payment terminal using this module
07/03/2008US20080163371 Protection of a static datum in an integrated circuit
07/03/2008US20080163368 Data processing apparatus and method for managing access to a display buffer
07/03/2008US20080163367 System and method for controlling web pages access rights
07/03/2008US20080163363 Image processing apparatus and personal information management program
07/03/2008US20080163362 Semiconductor device with high security having jtag ports
07/03/2008US20080163361 Method and apparatus for making a decision on a card
07/03/2008US20080163360 Information processing appartaus
07/03/2008US20080163359 Static And Dynamic Firewalls
07/03/2008US20080163358 Initiator and target firewalls
07/03/2008US20080163348 Moving principals across security boundaries without service interruption
07/03/2008US20080163346 Customized untrusted certificate replication
07/03/2008US20080163343 Data processor
07/03/2008US20080163336 Method and system for backing up and restoring license
07/03/2008US20080163331 Reconfiguring a secure system
07/03/2008US20080163287 Network-extensible reconfigurable media appliance
07/03/2008US20080163247 Device and a Method of Operating a Device
07/03/2008US20080162937 Method for exchanging strong encryption keys between devices using alternate input methods in wireless personal area networks (WPAN)
07/03/2008US20080162930 Apparatus, methods, and system for role-based access in an intelligent electronic device
07/03/2008US20080162929 Communication system of client terminals and relay server and communication method
07/03/2008US20080162926 Authentication protocol
07/03/2008US20080162923 Method and system for using email messages to remotely control a computer resource
07/03/2008US20080162721 Information processing system, apparatus and method for processing information, and program
07/03/2008US20080162646 System and method for secure and/or interactive dissemination of information
07/03/2008US20080162448 Method for tracking syntactic properties of a url
07/03/2008US20080162363 Information communication system, user management apparatus thereof, information providing apparatus thereof and user terminal apparatus thereof
07/03/2008US20080162225 Information Management System
07/03/2008US20080159540 Methods and a device for secure software installation
07/03/2008US20080159529 Identification System Using Mechanical Vibrations on Identifier
07/03/2008US20080159527 Method and system for digital rights management and digital signatures
07/03/2008US20080158306 Nozzle Arrangement With Expandable Actuator
07/03/2008US20080158301 Ink Nozzle Unit Exploiting Magnetic Fields
07/03/2008US20080158155 Methods and devices for indentifying users based on tremor
07/03/2008US20080157920 Calibratable uds security concept for heavy-duty diesel engine
07/03/2008US20080155826 Method of manufacturing mems ics
07/03/2008DE102007057900A1 Authentifikationen von verdächtigen Daten unter Verwendung von Schlüsseltabellen Authentications of suspicious data using key tables
07/03/2008DE102006062244A1 Verfahren zur Fernanalyse eines Gargeräts und Gargerät zum Durchführen eines solchen Verfahrens A method for remote analysis of a cooking appliance and cooking device for performing such a method
07/03/2008DE102006061935A1 Method for protecting microcomputer from manipulation, involves determining multiple access levels for test software and test software is only executed on microcomputer at determined access level
07/03/2008CA2706013A1 Method and system for searching stored data
07/03/2008CA2673512A1 Efficient authentication of a user for conduct of a transaction initiated via mobile telephone
07/03/2008CA2672569A1 Information conversion technology
07/03/2008CA2671368A1 Secure processing of secure information in a non-secure environment
07/02/2008EP1940072A1 Recording/reproducing device of transmitter and recording/reproducing device of receiver
07/02/2008EP1939786A1 Content providing system
07/02/2008EP1939785A2 System and method for the protection of de-identification of health care data
07/02/2008EP1939784A1 Methods and a device for secure software installation
07/02/2008EP1939783A2 Method, device, and system for digital rights management
07/02/2008EP1939782A2 Apparatus, method, and computer program product for editing digital contents
07/02/2008EP1939781A1 Sharing usage rights
07/02/2008EP1939780A2 Device management
07/02/2008EP1939745A1 Method and device for securing the reading of a memory
07/02/2008EP1939707A1 Persistent authorization context based on external authentication
07/02/2008EP1939706A1 Decentralized virus scanning for stored data
07/02/2008EP1938995A2 Image-forming system, image-forming apparatus, computer program, and image-forming method
07/02/2008EP1938504A1 An authorisation system and a method of authorisation
07/02/2008EP1938238A1 A locked element for use in a graphical modeling environment
07/02/2008EP1938237A2 Improved drm system
07/02/2008EP1938236A1 Method and apparatus to authenticate source of a scripted code
07/02/2008EP1938170A1 Battery pack authentication for a mobile device
07/02/2008EP1572463A4 Dead nozzle compensation
07/02/2008EP1444690A4 System and method for controlled copying and moving of content between devices and domains based on conditional encryption of content key depending on usage state
07/02/2008EP1442351B1 Secure content distribution method and system
07/02/2008EP1425180B1 Printing cartridge with two dimensional code identification
07/02/2008CN101213786A Method, apparatus and system for verifying authenticity of an object
07/02/2008CN101213604A Key block based authentication method and system
07/02/2008CN101213561A Method for protecting confidential file of security countermeasure application and confidential file protection device
07/02/2008CN101213560A Verification method, information processing device, recording medium, verification system, certification program, and verification program
07/02/2008CN101213559A 通信装置和通信系统 A communication apparatus and communication system