Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
10/19/2005 | CN1685298A Method for accessing an additional content with parental control |
10/19/2005 | CN1685297A Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment |
10/19/2005 | CN1684467A Control method of plug-in and plug-out end of interface plate and plug-in and plug-out end device of interface plate |
10/19/2005 | CN1684412A Apparatus and method for secure hash algorithm |
10/19/2005 | CN1684410A Method for encryption backup and method for decryption restoration |
10/19/2005 | CN1684183A Information processing apparatus, information recording medium, information processing method and computer program |
10/19/2005 | CN1684063A Control of document disclosure according to affiliation or document type |
10/19/2005 | CN1684050A Semiconductor device and electronic apparatus |
10/19/2005 | CN1684049A Information storage apparatus, information storage method and information storage processing program product |
10/19/2005 | CN1684048A Method and system for secure erasure of information in non-volatile memory in an electronic device |
10/19/2005 | CN1684018A Content reproduction apparatus, program, and content reproduction control method |
10/19/2005 | CN1224214C Long distance output method and system |
10/19/2005 | CN1224213C Method for issuing an electronic identity |
10/19/2005 | CN1223946C Method for safety managing information of data base |
10/19/2005 | CA2504184A1 Rendering protected digital content within a network of computing devices or the like |
10/18/2005 | US6957348 Interoperability of vulnerability and intrusion detection systems |
10/18/2005 | US6957342 Security module, security system and mobile station |
10/18/2005 | US6957341 Method and system for secure computational outsourcing and disguise |
10/18/2005 | US6957340 Encryption key for multi-key encryption in programmable logic device |
10/18/2005 | US6957339 User verification system, and portable electronic device with user verification function utilizing biometric information |
10/18/2005 | US6957338 Individual authentication system performing authentication in multiple steps |
10/18/2005 | US6957337 Method and apparatus for secure authorization and identification using biometrics without privacy invasion |
10/18/2005 | US6957336 Establishing initial PuK-linked account database |
10/18/2005 | US6957335 Initializing, maintaining, updating and recovering secure operation within an integrated system employing a data access control function |
10/18/2005 | US6957334 Method and system for secure guaranteed transactions over a computer network |
10/18/2005 | US6957332 Managing a secure platform using a hierarchical executive architecture in isolated execution mode |
10/18/2005 | US6957330 Method and system for secure information handling |
10/18/2005 | US6957286 System and device for switching operating system |
10/18/2005 | US6957220 System, method and article of manufacture for tracking and supporting the distribution of content electronically |
10/18/2005 | US6957195 Player-centric method and apparatus for creating, distributing, and consuming content |
10/18/2005 | US6957194 Method for printing digital works |
10/18/2005 | US6957193 Repository with security class and method for use thereof |
10/18/2005 | US6956949 Method and apparatus for authenticating an hierarchy of video receiving devices |
10/18/2005 | US6956947 Extraction of multiple single keys from a compressed key |
10/18/2005 | US6956845 Integrated customer web station for web based call management |
10/18/2005 | CA2387608C Method and apparatus for selecting an identification confirmation information |
10/13/2005 | WO2005096650A1 Smart terminal remote lock and format |
10/13/2005 | WO2005096628A1 Security of an access device for packages of encrypted programs |
10/13/2005 | WO2005096541A1 System and method for digital rights management of electronic content |
10/13/2005 | WO2005096308A1 Content reproduction terminal |
10/13/2005 | WO2005096158A1 Use authentication method, use authentication program, information processing device, and recording medium |
10/13/2005 | WO2005096157A1 Secure system, secure device, terminal device, method, and program |
10/13/2005 | WO2005096156A1 Method and system for protecting content in a programmable system |
10/13/2005 | WO2005096122A1 Persistent servicing agent |
10/13/2005 | WO2005096121A1 Execution device |
10/13/2005 | WO2005096120A1 Execution device |
10/13/2005 | WO2005096119A1 Unauthorized contents detection system |
10/13/2005 | WO2005096118A1 Limiting access to personal devices |
10/13/2005 | WO2005096117A1 Trust tokens |
10/13/2005 | WO2005096116A1 Method for safely logging onto a technical system |
10/13/2005 | WO2005094518A2 Hybrid cryptographic accelerator and method of operation thereof |
10/13/2005 | WO2005079079A3 Methods of securing devices such as mobile terminals, and secured assemblies comprising such devices |
10/13/2005 | WO2004086218A9 Information processing device, information processing method, program, recording medium |
10/13/2005 | US20050229259 Device for protecting against unauthorized use of software |
10/13/2005 | US20050229258 Method and system for digital rights management of documents |
10/13/2005 | US20050229257 Information device, information server, information processing system, information processing method, and information processing program |
10/13/2005 | US20050229256 Automated Computer Vulnerability Resolution System |
10/13/2005 | US20050229254 Detecting public network attacks using signatures and fast content analysis |
10/13/2005 | US20050229253 Method and system for distinguishing relevant network security threats using comparison of refined intrusion detection audits and intelligent security analysis |
10/13/2005 | US20050229251 High performance content alteration architecture and techniques |
10/13/2005 | US20050229250 Methodology, system, computer readable medium, and product providing a security software suite for handling operating system exploitations |
10/13/2005 | US20050229249 Systems and methods for securing ports |
10/13/2005 | US20050229247 Method and apparatus for computer lock management, and computer product |
10/13/2005 | US20050229245 Inter-device authentication system, inter-device authentication method, communication device, and computer program |
10/13/2005 | US20050229240 Information processing apparatus, authentication processing program, and authentication storage apparatus |
10/13/2005 | US20050229239 Flow token |
10/13/2005 | US20050229236 Method for delegated adminstration |
10/13/2005 | US20050229234 Method of filtering a bitstream according to user specifications |
10/13/2005 | US20050229171 Distributing upgrades |
10/13/2005 | US20050229164 Method to secure the execution of a program against attacks by radiation or other |
10/13/2005 | US20050229095 System and method for managing transferable records |
10/13/2005 | US20050229011 Reliability platform configuration measurement, authentication, attestation and disclosure |
10/13/2005 | US20050229009 Method and equipment for encrypting/decrypting physical characteristic information, and identification system utilizing the physical characteristic information |
10/13/2005 | US20050229008 Method and device for identifying user-selected equipment |
10/13/2005 | US20050229007 System and method for remote self-enrollment in biometric databases |
10/13/2005 | US20050229006 Digital sealer apparatus |
10/13/2005 | US20050229004 Digital rights management system and method |
10/13/2005 | US20050229001 Security and analysis system |
10/13/2005 | US20050229000 Individual authentication method using input characteristic of input apparatus by network, program thereof, and recording medium containing the program |
10/13/2005 | US20050228994 Method for encryption backup and method for decryption restoration |
10/13/2005 | US20050228993 Method and apparatus for authenticating a user of an electronic system |
10/13/2005 | US20050228990 Software safety execution system |
10/13/2005 | US20050228989 Detection and identification methods for software |
10/13/2005 | US20050228982 Data communication system control method, data communication system, and information processing apparatus |
10/13/2005 | US20050228980 Less-secure processors, integrated circuits, wireless communications apparatus, methods and processes of making |
10/13/2005 | US20050228978 Software download into a receiver |
10/13/2005 | US20050228948 Software management method for a storage system, and storage system |
10/13/2005 | US20050228938 Method and system for secure erasure of information in non-volatile memory in an electronic device |
10/13/2005 | US20050228894 Inter-device authentication system, inter-device authentication method, communication device, and computer program |
10/13/2005 | US20050228886 System and method for enabling authorization of a network device using attribute certificates |
10/13/2005 | US20050228877 System for managing a device |
10/13/2005 | US20050228858 Content utilization management method corresponding to network transfer, program, and content transfer system |
10/13/2005 | US20050228821 Stand-alone system for storing books in electronic memory |
10/13/2005 | US20050228809 Information processing system and method |
10/13/2005 | US20050228795 Method and apparatus for identifying and characterizing errant electronic files |
10/13/2005 | US20050228782 Authenticating a web site with user-provided indicators |
10/13/2005 | US20050228773 Compiling information obtained by combinatorial searching |
10/13/2005 | US20050228770 Computer access control |
10/13/2005 | US20050228753 Method and device for controlling access to a digital document shared in a communication network of the station-to-station type |
10/13/2005 | US20050228752 System and method for managing encrypted multimedia content with an information handling system |