Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
03/2005
03/30/2005EP1519376A2 Method for copy protecting a record carrier
03/30/2005EP1519291A1 Information processing method and apparatus for managing sales of software
03/30/2005EP1519286A1 Content providing method, content providing system, content providing apparatus, and content reproduction apparatus
03/30/2005EP1519277A1 Information storage device, memory access control method, and computer program
03/30/2005EP1519276A1 Information storage device, memory access control system and method, and computer program
03/30/2005EP1519275A1 Information storage device, memory access control method, and computer program
03/30/2005EP1519267A1 Computer system having entertainment mode capabilities
03/30/2005EP1519258A1 Authentication method for creating a digital home network using a smartcard
03/30/2005EP1518384A1 Active key for wireless device configuration
03/30/2005EP1518238A2 System for secure storage
03/30/2005EP1518237A2 Method and device for protecting user information against manipulations
03/30/2005EP1518193A2 Views for software atomization
03/30/2005EP1518171A2 Memory device with applications software for releasable connection to a host computer
03/30/2005EP1518158A1 Trusted computer platform
03/30/2005EP1518157A2 Computer program protection
03/30/2005EP1518156A2 System and program for handling digital rights and keys in business-to-business applications
03/30/2005EP1517794A1 Ink jet printhead chip with predetermined micro-electromechanical systems height
03/30/2005EP1364277A4 Apparatus, method and system for effecting information access in a peer environment
03/30/2005EP1358543A4 Apparatus method and system for registration effecting information access
03/30/2005EP1269324A4 Method and system for controlling access to a telecommunication or internet system
03/30/2005EP1212682A4 System and method for quickly authenticating messages using sequence numbers
03/30/2005EP1151380A4 Reducing time for executing instruction streams under run-time security
03/30/2005EP1013030A4 Method and apparatus for secure storage of data
03/30/2005CN1602601A Methods and systems for automated authentication, processing and issuance of digital certificates
03/30/2005CN1602525A Apparatus and methods for detecting illicit content that has been imported into a secure domain
03/30/2005CN1602500A Method of combating the fraudulent reproduction of chip cards and the read terminals for said cards
03/30/2005CN1602499A Data management system, data management method, virtual memory device, virtual memory control method, reader/writer device, I C module access device, and I C module access control method
03/30/2005CN1602496A Digital electronic component which is protected against electrical-type analyses
03/30/2005CN1602464A Providing a user input interface prior to initiation of an operating system
03/30/2005CN1602458A System for enhancing fault tolerance and security of a computing system
03/30/2005CN1602076A Converter and method with hybrid RGB chart and YUV video signal
03/30/2005CN1601972A Two-pass device access management
03/30/2005CN1601954A Moving principals across security boundaries without service interruption
03/30/2005CN1601577A Information processing device, printing device, print data transmission method, printing method, print data transmitting program, and recording medium
03/30/2005CN1601555A Device for transmission of an electronic mail message
03/30/2005CN1601431A Data processing device, data processing method, terminal, transmission method for data processing device
03/30/2005CN1601429A Systems and methods for secure transaction management and electronic rights protection
03/30/2005CN1195280C Method and system for inserting information into files and deteding and preventing extraction of inserted information
03/30/2005CN1195275C Security arrangement
03/30/2005CA2473071A1 Image file container
03/29/2005US6874139 Method and system for seamless integration of preprocessing and postprocessing functions with an existing application program
03/29/2005US6874127 Method and system for controlling presentation of information to a user based on the user's condition
03/29/2005US6874092 Method and apparatus for erasing data after tampering
03/29/2005US6874090 Deterministic user authentication service for communication network
03/29/2005US6874087 Integrity checking an executable module and associated protected service provider module
03/29/2005US6873976 Secured purchasing system
03/29/2005US6873975 Content usage control system, content usage apparatus, computer readable recording medium with program recorded for computer to execute usage method
03/29/2005US6873787 Receiving apparatus, receiving method, and supplying medium
03/29/2005US6873706 Processing apparatus, program, or system of secret information
03/29/2005US6873485 Recording medium and apparatus for protecting copyrighted digital data
03/26/2005CA2442799A1 Generalized credential and protocol management of infrastructure
03/26/2005CA2442795A1 Software license optimization
03/24/2005WO2005027502A1 Content management system
03/24/2005WO2005027468A2 Preventing unauthorized distribution of media content
03/24/2005WO2005027464A1 Method and apparatus for providing network security using role­-based access control
03/24/2005WO2005027403A1 Information processing device
03/24/2005WO2005027402A1 Personal computer internet security system
03/24/2005WO2005026954A1 A computer system employing a trusted execution environment including a memory controller configured to clear memory
03/24/2005WO2005026925A2 Intelligent data storage and processing using fpga devices
03/24/2005WO2005026923A1 Multi-function portable device for electronic processors
03/24/2005WO2005026878A2 Methods and apparatus for content protection in a wireless network
03/24/2005WO2005013128A3 Systems and methods for managing and presenting multimedia and content rich data on a removable memory apparatus
03/24/2005WO2005008417A3 Method and system for protecting against computer viruses
03/24/2005WO2005006647A3 Personal identification and contact location and timing
03/24/2005WO2004114197A8 Method and system for controlling the disclosure time of information
03/24/2005WO2004109496A3 Electronic whiteboard
03/24/2005WO2004109479A8 Method for generating and verifying an originality characteristic of a document
03/24/2005WO2004102395A9 System for preventing unauthorized use of digital content
03/24/2005WO2004092864A3 Client-server authentication using the challenge-response principle
03/24/2005WO2004057446A8 A method for providing of content data to a client
03/24/2005WO2004036411A3 Device for storing a list of elements and method of storing an element in one such device
03/24/2005WO2004015516A3 System and method for secure data entry
03/24/2005WO2003088017A3 System and method for detecting an infective element in a network environment
03/24/2005US20050066324 Method and system for distributing and installing software
03/24/2005US20050066317 Method and apparatus for converting objects between weakly and strongly typed programming frameworks
03/24/2005US20050066282 Requesting computer user's context data
03/24/2005US20050066281 Supplying enhanced computer user's context data
03/24/2005US20050066229 Processor sharing between in-range devices
03/24/2005US20050066219 Personal digital server pds
03/24/2005US20050066202 Methods and arrangements for providing multiple concurrent desktops and workspaces in a shared computing environment
03/24/2005US20050066199 Identification process of application of data storage and identification hardware with IC card
03/24/2005US20050066198 Controlling cooperation between objects in a distributed software environment
03/24/2005US20050066195 Factor analysis of information risk
03/24/2005US20050066191 System and method for delivering versatile security, digital rights management, and privacy services from storage controllers
03/24/2005US20050066188 Publishing network
03/24/2005US20050066187 Encrypting a digital object on a key ID selected therefor
03/24/2005US20050066186 Method and apparatus for an encrypting keyboard
03/24/2005US20050066185 Exclusive encryption
03/24/2005US20050066184 Exclusive encryption
03/24/2005US20050066183 Exclusive encryption
03/24/2005US20050066181 Method for watermarking computer programs
03/24/2005US20050066178 Method and apparatus for controlling access to memory
03/24/2005US20050066173 System and method for presentation integrity
03/24/2005US20050066172 Method and device for confirming the authenticity of a document and a safe for storing data
03/24/2005US20050066169 Method and apparatus for incremental code signing
03/24/2005US20050066168 Authentication chip for authenticating an untrusted chip
03/24/2005US20050066165 Method and system for protecting confidential information
03/24/2005US20050066163 Information processing apparatus, an authentication apparatus, and an external apparatus
03/24/2005US20050066162 Method and system for internet entrance security identification and IC card verification hardware device
03/24/2005US20050066161 Mail sever security login identification system and method with IC card identification hardware device