Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
03/2008
03/19/2008CN101147166A Network settling card, network settling program, authentication server, and shopping system and settling method
03/19/2008CN101147155A Program converting device, secure processing device, computer program, and recording medium
03/19/2008CN101147154A Methods, devices and data structures for trusted data
03/19/2008CN101147153A Network attack detection
03/19/2008CN101147152A Method and system of introducing physical device security for digitally encoded data
03/19/2008CN101147123A Arrangement for and method of protecting a data processing device against e[lectro]m[agnetic]radiation attacks
03/19/2008CN101146261A A realization method for digital protection of electronic media
03/19/2008CN101145919A A method and system for works information output with copyright
03/19/2008CN101145914A Automatic management of security information for a security token access device with multiple connections
03/19/2008CN101145233A Data ciphered-mortgage transaction system, teller identification system, trans-center transaction system and method
03/19/2008CN101145230A Enciphered sign board and composite encryption signing method
03/19/2008CN101145177A Encrypted - program generating method and apparatus
03/19/2008CN101145176A Computer keyboard system adopting mechanical hand for emulating human hand input and related input method
03/19/2008CN101145175A Safety protecting box
03/19/2008CN101145174A Information output apparatus and information output method for outputting content information to knowledge base
03/19/2008CN101145173A System and method for securely saving and restoring a context of a secure program loader
03/19/2008CN101145172A Backup device and mobile memory apparatus bound method and backup device
03/19/2008CN100376108C Apparatus and method for protecting a memory
03/19/2008CN100376091C Receiving device for encrypted message data, and information processing method
03/19/2008CN100376003C Method and apparatus for protecting data during storage/retrieval
03/19/2008CN100375984C Electronic entity secured by a modifiable counter for the uses of classified data
03/19/2008CN100375983C Combined video decoder and watermark creator
03/19/2008CN100375971C Method for hierarchical layout specialization
03/18/2008US7346933 Ultrasonic sensor component signal communication to standalone universal serial bus keyboard emulator for entry/exit computer proximity determination
03/18/2008US7346932 Data processing apparatus, a data processing method, a data recording medium on which data processing program that is readable by a computer are recorded, and a recording medium
03/18/2008US7346931 Accepting a set of data in a computer unit
03/18/2008US7346928 Decentralized appliance virus scanning
03/18/2008US7346927 System and method for storing and accessing secure data
03/18/2008US7346924 Storage area network system using internet protocol, security system, security management program and storage device
03/18/2008US7346921 Definition of low-level security rules in terms of high-level security concepts
03/18/2008US7346908 Changing user identities without closing applications
03/18/2008US7346782 Method for data protection for removable recording medium
03/18/2008US7346781 Initiating execution of a computer program from an encrypted version of a computer program
03/18/2008US7346780 Integrity ordainment and ascertainment of computer-executable instructions
03/18/2008US7346779 System and method for authenticating electronic documents
03/18/2008US7346775 System and method for authentication of users and web sites
03/18/2008US7346689 Computer architecture having a stateless human interface device and methods of use
03/18/2008US7346617 Multi-table access control
03/18/2008US7346584 Contents distribution system for handling secondary products utilizing raw material contents
03/18/2008US7346583 Remote authorization for unlocking electronic data system and method
03/18/2008US7346581 Copyright management apparatus, copyrighted-work distribution apparatus, and copyrighted-work distribution and receiving system
03/18/2008US7346580 Method and system of preventing unauthorized rerecording of multimedia content
03/18/2008US7346547 Method, device, system, and program for transaction of contents through network
03/18/2008US7346367 Electronic apparatus having communicating function and privacy mode
03/18/2008US7346337 Communication terminal for restricting the use of content
03/18/2008US7346195 Biometric identification and authentication method
03/18/2008US7346170 Information processing system and method
03/18/2008US7346169 Information processing device and method
03/18/2008US7346160 Randomization-based encryption apparatus and method
03/18/2008US7345962 Disk drive device
03/18/2008US7345497 Protection circuit for semiconductor device and semiconductor device including the same
03/18/2008CA2432317C Method and apparatus for tracking status of resource in a system for managing use of the resources
03/18/2008CA2307020C Communication procedure between a user station and a network, in particular the internet, including architecture for implementation
03/13/2008WO2008031079A2 Method of automatically defining and monitoring internal connections in a real-time environment to protect private access network connections from public access network connections within a 32/64-bit microsoft pc or server operating system network environment
03/13/2008WO2008031078A2 Method of performing software updates (installations), on networked 32/64-bit microsoft computers in an automated environment without introducing a possible security threat
03/13/2008WO2008031069A2 Method of monitoring network and internet connections in a real-time environment to detect unauthorized network connections and unauthorized network activity within a 32/64-bit microsoft pc or server operating system
03/13/2008WO2008031054A2 Creating and using a specific user unique id for security login authentication
03/13/2008WO2008031043A1 Controlling the delegation of rights
03/13/2008WO2008030993A2 Security and tamper resistance for high stakes online testing
03/13/2008WO2008030991A2 Security methods for preventing access to educational information by third parties
03/13/2008WO2008030688A1 Auto-detecting and downloading licensed computer products
03/13/2008WO2008029998A1 Method and terminal of verifying membership for moving rights object in domain
03/13/2008WO2008029830A1 Article managing system
03/13/2008WO2008029828A1 System for managing identification concerning authentication of electronic device
03/13/2008WO2008029663A1 Wireless communication system
03/13/2008WO2008029461A1 Non-contact ic device
03/13/2008WO2008029406A2 A system and method to preclude message modification in data authentication systems through efficient use of feedback in cryptographic functions
03/13/2008WO2008029393A2 Method for managing simultaneous modification of database objects during development
03/13/2008WO2008029389A1 Device and method for prioritized erasure of flash memory
03/13/2008WO2008029059A2 Securing of code for personal entity
03/13/2008WO2008028989A1 Managing information relating to secure module applications
03/13/2008WO2008028922A1 Method for single sign-on with peer-to-peer applications
03/13/2008WO2008028864A1 Configuring a storage drive to communicate with encryption and key managers
03/13/2008WO2008028824A1 Apparatus and method supporting interoperability of an encrypting storage device with encryption-unaware application programs by means of a device driver communication to a key manager
03/13/2008WO2008028768A1 Storing eedks to tape outside of user data area
03/13/2008WO2008028766A1 Distributed key store
03/13/2008WO2008028508A1 Distributed computing and communications protocol
03/13/2008WO2008028430A1 Apparatus for communication using a cryptic code table
03/13/2008WO2008028401A1 Device and method for closing internal modes/functions of integrated circuit
03/13/2008WO2008013992A3 Security model for application and trading partner integration
03/13/2008WO2008013738A3 Virtual user authentication system and method
03/13/2008WO2008005640A3 Data vault depository and associated methodology providing secured access pursuant to compliance standard conformity
03/13/2008WO2008002456A3 Program instrumentation method and apparatus for constraining the behavior of embedded script in documents
03/13/2008US20080066194 Processing Copyright Notice of Media File
03/13/2008US20080066187 Mobile Wireless Device with Protected File System
03/13/2008US20080066178 System and Method to Proactively Detect Software Tampering
03/13/2008US20080066173 System for verifying a client request
03/13/2008US20080066168 Method and system for managing access to protected computer resources provided via an internet protocol network
03/13/2008US20080066166 Remote authentication caching on a trusted client or gateway system
03/13/2008US20080066151 Locally adaptable central security management in a heterogeneous network environment
03/13/2008US20080066150 Techniques of Transforming Policies to Enforce Control in an Information Management System
03/13/2008US20080066089 Portable terminal, methods, programs and storage media for program startup management
03/13/2008US20080065910 Information integration across autonomous enterprises
03/13/2008US20080065891 Opaque message archives
03/13/2008US20080065887 Secure authentication using hardware token and computer fingerprint
03/13/2008US20080065765 Monitoring events in a computer network
03/13/2008US20080065549 Software distribution system for sewing machine, sewing machine and storage medium
03/13/2008US20080065272 Method for Authorizing External Devices
03/13/2008US20080064503 Gaming system license management
03/13/2008US20080064493 License Management in a Gaming System