Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
05/08/2008 | US20080107264 Cryptographic Methods, Apparatus and Systems for Storage Media Electronic Rights Management in Closed and Connected Appliances |
05/08/2008 | US20080107261 Method for Protecting Confidential Data |
05/08/2008 | US20080107260 Stream cipher encryption application accelerator and methods thereof |
05/08/2008 | US20080106757 Access to printing material container |
05/08/2008 | US20080106605 Secure Sensor Chip |
05/08/2008 | US20080106576 Printhead Micro-Electromechanical Nozzle Arrangement With A Motion-Transmitting Structure. |
05/08/2008 | DE112006001744T5 Manipulationsschutz, um Installation von Betriebssystemen und anderer Software zu beschränken To restrict tamper protection to the installation of operating systems and other software |
05/08/2008 | DE112006001666T5 Verwaltung einer geschützten Uhr auf der Basis einer nicht-vertrauenswürdigen ständigen Zeitquelle Management of a protected clock based on an untrusted persistent time source |
05/08/2008 | DE10247794B4 Verwalten eines Fehlversuchszählers in einem tragbaren Datenträger Managing a failed attempt counter in a portable data carrier |
05/08/2008 | DE102006050638A1 Data e.g. weighing data, transmitting and displaying method for use in automation system, involves generating random number, comparing another random number with generated random number, and stopping transmission of data to display device |
05/08/2008 | CA2703805A1 Powered authenticating cards |
05/07/2008 | EP1919123A1 Two-channel challenge-response authentication method in random partial shared secret recognition system |
05/07/2008 | EP1918894A1 Information storage device, information storage program, verification device and information storage method |
05/07/2008 | EP1918846A1 Techniques for modification of access expiration conditions |
05/07/2008 | EP1918845A2 Multiple security access mechanisms for a single identifier |
05/07/2008 | EP1918844A1 Techniques for variable security access information |
05/07/2008 | EP1918843A2 Method and apparatus for centrally managed encrypted partition |
05/07/2008 | EP1918842A2 Upgrade service system |
05/07/2008 | EP1918841A2 Operating system monitoring setting information generator apparatus and operating system monitoring apparatus |
05/07/2008 | EP1918840A2 Method for enhancing DRM authority, enhanced DRM authority content, and portable terminal using the same |
05/07/2008 | EP1918839A1 Modification of a software version of a control device software for a control device and identification of such a modification |
05/07/2008 | EP1917774A1 Method for controlling the location information for authentication of a mobile station |
05/07/2008 | EP1917634A2 Digital license migration from first platform to second platform |
05/07/2008 | EP1917618A2 Administration of data encryption in enterprise computer systems |
05/07/2008 | EP1917617A2 Software application security method and system |
05/07/2008 | EP1917616A1 Security certificate management |
05/07/2008 | EP1917615A1 Execution of application processes |
05/07/2008 | EP1917608A2 Security in peer to peer synchronization applications |
05/07/2008 | EP1917604A1 System of electronic document repository which guarantees authenticity of the electronic document and issues certificates and method of registering, reading, issuing, transferring, a certificate issuing performed in the system |
05/07/2008 | EP1917579A2 Schema packaging, distribution and availability |
05/07/2008 | EP1844469B1 Apparatus and method for authentication in a content reproduction system |
05/07/2008 | EP1817713B1 Method for identifying a user by means of modified biometric characteristics and a database for carrying out said method |
05/07/2008 | EP1642187B1 Digital self-erasure of key copy-protected storage |
05/07/2008 | EP1634133B1 An arrangement and a method relating to ip network access |
05/07/2008 | EP1573466B1 Enhancing data integrity and security in a processor-based system |
05/07/2008 | EP1371255B1 Method for enabling pki functions in a smart card |
05/07/2008 | EP1358572A4 Support for multiple data stores |
05/07/2008 | EP1256056B1 Methods and circuits for selectively operating a system in a secure environment |
05/07/2008 | EP1141805B1 System for processing a security critical activity |
05/07/2008 | CN101176125A Implementation of an integrity-protected secure storage |
05/07/2008 | CN101176122A Data transfer between modules |
05/07/2008 | CN101176104A Method and apparatus for virtually erasing data from WORM storage devices |
05/07/2008 | CN101176103A Computer security system and method |
05/07/2008 | CN101176102A System and method for managing encrypted content using logical partitions |
05/07/2008 | CN101176101A Secure data communications in web services |
05/07/2008 | CN101176100A Methods and apparatus for generating endorsement credentials for software-based security coprocessors |
05/07/2008 | CN101176096A Virtualized file system |
05/07/2008 | CN101176082A Communication terminal, security device, and integrated circuit |
05/07/2008 | CN101176064A System and method for compensating for resource unavailability in an image processing system |
05/07/2008 | CN101175268A Method and device for controlling operation authority of communication terminal chip |
05/07/2008 | CN101175267A Communication terminal and software detecting method and device |
05/07/2008 | CN101174325A Upgrade service system |
05/07/2008 | CN101174295A Off-line DRM authentication method and system |
05/07/2008 | CN101174294A Software protection method based on version incremental backup |
05/07/2008 | CN101174293A Reference monitor implementing method of high safety grade operating system |
05/07/2008 | CN101174292A System and method for secure operating system boot |
05/07/2008 | CN101174291A System and method for secure operating system boot |
05/07/2008 | CN101174290A Secure processor and a program for a secure processor |
05/07/2008 | CN101174289A Apparatus, system, and method for selectively enabling a power-on password |
05/07/2008 | CN101174288A Method for enhancing DRM authority, enhanced DRM authority content, and portable terminal using the same |
05/07/2008 | CN101174287A Method and apparatus for digital rights management |
05/07/2008 | CN101174286A Method for controlling computer use authority by radio frequency recognizing volume label |
05/07/2008 | CN101174285A Bus line fire wall of embedded system |
05/07/2008 | CN101174232A Protector and protection method used for computer system |
05/07/2008 | CN100386811C Information processing apparatus, information recording medium, information processing method and computer program |
05/07/2008 | CN100386751C USB device automatic initialization method and device |
05/07/2008 | CN100386744C Method and system for secure erasure of information in non-volatile memory in an electronic device |
05/07/2008 | CN100386740C Systems and methods for detecting a security breach in a computer system |
05/07/2008 | CN100386731C Method to delay locking of server files on edit |
05/07/2008 | CN100386707C Generating key hierarchy for use in isolated execution environment |
05/06/2008 | US7370366 Data management system and method |
05/06/2008 | US7370361 System and method for securing computers against computer virus |
05/06/2008 | US7370360 Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine |
05/06/2008 | US7370359 Method and apparatus for verifying the integrity and security of computer networks and implementing counter measures |
05/06/2008 | US7370358 Agent-based intrusion detection system |
05/06/2008 | US7370354 Method of remotely managing a firewall |
05/06/2008 | US7370352 Techniques for storing and retrieving security information corresponding to cryptographic operations to support cryptographic processing for multiple network traffic streams |
05/06/2008 | US7370350 Method and apparatus for re-authenticating computing devices |
05/06/2008 | US7370347 Authentication scheme system and method |
05/06/2008 | US7370344 Computer-implemented data access security system and method |
05/06/2008 | US7370334 Adjustable mobile agent |
05/06/2008 | US7370323 Method and system for managing configuration changes in a data processing system |
05/06/2008 | US7370319 System and method for regulating execution of computer software |
05/06/2008 | US7370268 Systems and methods for managing and presenting multimedia and content rich data on a removable memory apparatus |
05/06/2008 | US7370212 Issuing a publisher use license off-line in a digital rights management (DRM) system |
05/06/2008 | US7370211 Arrangement and method of execution of code |
05/06/2008 | US7370209 Systems and methods for increasing the difficulty of data sniffing |
05/06/2008 | US7370208 Method and apparatus for automatic control of access |
05/06/2008 | US7370205 Content distribution system, content distribution method and terminal device |
05/06/2008 | US7370200 Validation for secure device associations |
05/06/2008 | US7370199 System and method for n-way authentication in a network |
05/06/2008 | US7370198 Total system for preventing information outflow from inside |
05/06/2008 | US7370195 Moving principals across security boundaries without service interruption |
05/06/2008 | US7370192 Method and apparatus for preventing cloning of security elements |
05/06/2008 | US7370188 Input/output scanning |
05/06/2008 | US7370165 Apparatus and method for protecting data recording on a storage medium |
05/06/2008 | US7370112 Communication scheme using outside DTCP bridge for realizing copyright protection |
05/06/2008 | US7370103 System and method for distributed management of shared computers |
05/06/2008 | US7370015 User impersonation by a proxy server |
05/06/2008 | US7369685 Vision-based operating method and system |