Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
01/2006
01/03/2006US6982665 Signal filtering system and method for a computer system remote controller
01/03/2006US6982642 Security cloth design and assembly
01/03/2006CA2270466C Corporate information communication and delivery system and method including entitlable hypertext links
12/2005
12/30/2005CA2507793A1 System and method for protected operating system boot using state validation
12/29/2005WO2005125161A2 Portable communication device with two cameras
12/29/2005WO2005125096A1 Distributed contact information management
12/29/2005WO2005125092A1 Identity verification system
12/29/2005WO2005125084A1 Method, system and computer program for protecting user credentials against security attacks
12/29/2005WO2005125083A1 Storage medium processing method, storage medium processing device, and program
12/29/2005WO2005125081A2 Securing software
12/29/2005WO2005125072A2 Digital rights management system
12/29/2005WO2005124759A1 Optical implants for preventing replication of original media
12/29/2005WO2005124644A2 Removable data storage medium and associated marketing interface
12/29/2005WO2005124624A1 Biomeric information reader and system
12/29/2005WO2005124606A1 Lending system and method
12/29/2005WO2005124603A2 Method and system for securely distributing content
12/29/2005WO2005124600A2 Method and apparatus for detecting suspicious, deceptive, and dangerous links in electronic messages
12/29/2005WO2005124582A1 Method and apparatus for digital rights management using certificate revocation list
12/29/2005WO2005124573A1 Data processing device
12/29/2005WO2005124572A1 Vulnerability examining system
12/29/2005WO2005124561A1 Method for protecting computer devices against viral codes
12/29/2005WO2005124527A1 Integrated wireless pointing device, terminal equipment with the same, and pointing method using wereless pointing device
12/29/2005WO2005124506A2 Cryptographic architecture with instruction masking and other techniques for thwarting differential power analysis
12/29/2005WO2005124505A1 Enhancing trusted platform module performance
12/29/2005WO2005124503A1 Universal document authentication process
12/29/2005WO2005124502A1 Method for securely updating a program block loaded in a security module
12/29/2005WO2005122715A2 A mandatory access control (mac) method
12/29/2005WO2005122689A2 A method and system for securing a device
12/29/2005WO2005045557A3 The secure attention instruction central processing unit and system architecture
12/29/2005WO2005031547A3 Separation of copy protection rules for digital rights management
12/29/2005WO2005003895A8 Interface for controlling access to computer objects
12/29/2005WO2004111760A3 Application layer security method and system
12/29/2005WO2004068323A8 Confirming user rights in distribution of application programs
12/29/2005US20050289656 Network apparatus
12/29/2005US20050289655 Methods and systems for encrypting, transmitting, and storing electronic information and files
12/29/2005US20050289654 Bios lock encode/decode driver
12/29/2005US20050289650 Network node security analysis method
12/29/2005US20050289649 Malicious access-detecting apparatus, malicious access-detecting method, malicious access-detecting program, and distributed denial-of-service attack-detecting apparatus
12/29/2005US20050289646 Virtual firmware smart card
12/29/2005US20050289645 Image processing device and program
12/29/2005US20050289642 Using web services for online permissions
12/29/2005US20050289641 Terminal device, providing server, electronic-information using method, electronic-information providing method, terminal-device program, providing-server program, mediating program and storage medium
12/29/2005US20050289640 Terminal authentication system, terminal authentication method, and terminal authentication server
12/29/2005US20050289634 Image service system
12/29/2005US20050289533 Method and system for updating a software image
12/29/2005US20050289520 Unidirectional cloaking device for source code
12/29/2005US20050289511 Information security method and system
12/29/2005US20050289470 Identity based user interface
12/29/2005US20050289462 Document processing apparatus, method and program
12/29/2005US20050289432 Read enable generator for a turbo decoder deinterleaved symbol memory
12/29/2005US20050289409 Parallel data bus
12/29/2005US20050289359 Preventing the removal of removable devices
12/29/2005US20050289357 Apparatus and method for securely and conveniently rebooting a computer system
12/29/2005US20050289354 System and method for applying a file system security model to a query system
12/29/2005US20050289353 Non-intrusive trusted user interface
12/29/2005US20050289352 User authentification
12/29/2005US20050289351 Manifest-based trusted agent management in a trusted operating system environment
12/29/2005US20050289350 Method and system for secure synchronization between an enterprise system and a device
12/29/2005US20050289348 System and method for providing security to an application
12/29/2005US20050289346 Print data communication with data encryption and decryption
12/29/2005US20050289343 Systems and methods for binding a hardware component and a platform
12/29/2005US20050289340 Reducing access to sensitive information
12/29/2005US20050289331 Instruction timing control within a data processing system
12/29/2005US20050289311 System and method for secure inter-platform and intra-platform communications
12/29/2005US20050289289 Software to erase a non-volatile storage device
12/29/2005US20050289283 Autonomic computing utilizing a sequestered processing resource on a host CPU
12/29/2005US20050289270 Control of the execution of a program
12/29/2005US20050289246 Interpreting I/O operation requests from pageable guests without host intervention
12/29/2005US20050289234 Expanded membership access control in a collaborative environment
12/29/2005US20050289226 Remote assistance
12/29/2005US20050289187 System and method for investigating a data operation performed on a database
12/29/2005US20050289150 Access controller using tree-structured data
12/29/2005US20050289148 Method and apparatus for detecting suspicious, deceptive, and dangerous links in electronic messages
12/29/2005US20050289144 Techniques for sharing persistently stored query results between multiple users
12/29/2005US20050289139 Information processing apparatus and method, information recording medium, and computer program
12/29/2005US20050289082 Secure electronic transfer without requiring knowledge of secret data
12/29/2005US20050289081 Computing system and method for secure sales transactions on a network
12/29/2005US20050289079 Systems and methods for biometric identification
12/29/2005US20050289076 Digital rights management
12/29/2005US20050289075 Removable media-based unified application installer and license management facility
12/29/2005US20050289074 System for updating a licensing cache memory
12/29/2005US20050289073 System and method for distributing protected information
12/29/2005US20050289072 System for automatic, secure and large scale software license management over any computer network
12/29/2005US20050289069 User terminal program designated not to receive contents that cannot achieve users' object
12/29/2005US20050289068 Method and apparatus for tracking states of digital works
12/29/2005US20050289067 System and method for secure storage of data using a key
12/29/2005US20050289062 Data storage device capable of storing multiple sets of history information on input/output processing of security data without duplication
12/29/2005US20050289058 System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse
12/29/2005US20050289011 Method and system for purchasing copyrighted digital data from independent sales parties
12/29/2005US20050288103 Online game irregularity detection method
12/29/2005US20050287991 Information processing apparatus and method
12/29/2005US20050287990 Authenticating users
12/29/2005US20050287987 Contents data utilization system and method, and mobile communication terminal used for the same
12/29/2005US20050287985 Using a portable security token to facilitate public key certification for devices in a network
12/29/2005US20050286746 Biometric identification data protection
12/29/2005US20050286721 Providing content in a communication system
12/29/2005US20050286489 Authentication system and method having mobility in public wireless local area network
12/29/2005DE102005026448A1 Informationsverarbeitungssystem und -verfahren, Informationsübertragungs-Verarbeitungsvorrichtung und Informationsempfangs-Verarbeitungsvorrichtung Information processing system and method, information transfer processing device and information processing device receiving
12/29/2005DE102005014462A1 Starten eines sicheren Kernels in einem Multiprozessorsystem Start of a secure kernel in a multiprocessor system
12/29/2005DE102004028181A1 Verfahren und Anordnung zum Zugriff auf ein externes Dateisystem Method and apparatus for accessing an external file system