Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
02/2005
02/17/2005US20050036666 USB drive mass storage device with optical fingerprint identification system
02/17/2005US20050036665 Fingerprint apparatus and method
02/17/2005US20050036652 Watermark-based goods authentication
02/17/2005US20050036620 Encryption of radio frequency identification tags
02/17/2005US20050036618 Calculating unit and method for performing an arithmetic operation with encrypted operands
02/17/2005US20050036616 Secure routing protocol for an ad hoc network using one-way/one-time hash functions
02/17/2005US20050036611 Method and system for secure authentication
02/17/2005US20050036001 Actuator for a micro-electromechanical valve assembly
02/17/2005US20050035848 Network directed embedded transceiver lock system and method
02/17/2005US20050035659 Electronic key for an electrical apparatus and electrical apparatus with receiver for an enabling signal
02/17/2005US20050035202 Snooping countermeasures for system indicators
02/17/2005DE19632308B4 Verfahren zum Verhindern der Eingabe unzulässiger Daten in ein Gerät oder System A method for preventing unauthorized data entry in a device or system
02/17/2005DE10392320T5 Verfahren und Vorrichtung zum Laden eines vertrauenswürdigen Betriebssystems Method and apparatus for loading a trusted operating system
02/17/2005DE10335017A1 Elektronischer Schlüssel für ein Elektrogerät Electronic key for an electrical appliance
02/17/2005DE10332850A1 Verfahren und Vorrichtung zum Drucken von sensitiven Daten Method and apparatus for printing of sensitive data
02/17/2005DE10331933A1 Remote control system for using Internet services, whereby a stationary dongle is used as an electronic key for radio-based authentication management via a mobile operating component
02/17/2005DE10327291A1 System for ensuring the confidentiality of electronic data, especially patient data, in a network by use of pseudonyms, whereby a pseudonym generator uses a policy database for pseudonym generating rules with supplied patient data
02/17/2005DE10297662T5 Eingebauter Prozessor mit direkter Verbindung von Sicherheitsvorrichtungen für verbesserte Sicherheit Built-in processor with direct connection of safety devices for enhanced security
02/17/2005CA2534369A1 Methods and apparatus for performing context management in a networked environment
02/16/2005EP1507431A1 Biometrical authentication in a communication system
02/16/2005EP1507402A2 Access control decision system, access control enforcing system, and security policy
02/16/2005EP1507382A1 Detecting and blocking drive sharing worms
02/16/2005EP1507381A2 Information processing apparatus, an authentication apparatus, and an external apparatus
02/16/2005EP1507261A2 Copyright protection system, recording device and reproduction device
02/16/2005EP1507230A1 Information providing system and authentication medium access control method and computer program
02/16/2005EP1507214A1 Service providing system and method
02/16/2005EP1507211A1 Communication device
02/16/2005EP1507186A2 Recording medium, storage unit, information processing apparatus, information processing method, information processing program and computer readable medium
02/16/2005EP1507185A1 Method and device for protecting against unauthorized access to a secure routine
02/16/2005EP1506661A2 Method for data distribution with access control
02/16/2005EP1506484A1 Information processing apparatus, information processing system, information processing method, storage medium, and program
02/16/2005EP1506483A2 System and method for authentication
02/16/2005EP1506480A2 Method of controlling access to cryptographic resources and a computer platform and software module which can be used to perform said method
02/16/2005EP1506479A2 Method of performing cryptographic functions in a computer application and an application adapted to said method
02/16/2005EP1506470A1 Secure content sharing in digital rights management
02/16/2005EP1506469A2 System and apparatus for authenticating to a system or network
02/16/2005EP1506468A2 Method and system for protecting electronic media
02/16/2005EP1506467A2 System and method for digital watermarking of data repository
02/16/2005EP1442555A4 Multi-factor authentication system
02/16/2005CN1582558A Calculation of identifier codes
02/16/2005CN1582477A Apparatus for and method of preventing illicit copying of digital content
02/16/2005CN1582476A Method of and apparatus for preventing illicit copying of digital content
02/16/2005CN1582437A Method and system of facilitating automatic login to a web site using an internet browser
02/16/2005CN1582430A Method, system, and program product for permission to access software
02/16/2005CN1582423A Information processor and storage device
02/16/2005CN1582422A Method to protect software against unauthorized use
02/16/2005CN1582421A Computer implemented method and system for controlling use of digitally encoded products
02/16/2005CN1582420A System and method for protecting a peripheral device against hot plug attacks
02/16/2005CN1581914A Method for realizing official telephone of SDH device using IP telephone
02/16/2005CN1581867A Method and system for realizing tracked interface message
02/16/2005CN1581779A Method, a server system, a client system, a communication network and computer software products for distributing software packages or updates
02/16/2005CN1581777A Network system, indoor apparatus control server and intermediate server
02/16/2005CN1581774A Access control for digital content
02/16/2005CN1581771A Authentication system, server, and authentication method and program
02/16/2005CN1581289A Method of embedding permanent identification code into musical apparatus and said musical apparatus
02/16/2005CN1581118A Secure device, information processing terminal, integrated circuit, application apparatus and method
02/16/2005CN1581110A Safety storage application
02/16/2005CN1581083A Method for securing computer programs against unauthorised multiple usage
02/16/2005CN1581073A Projection of trustworthiness from a trusted environment to an untrusted environment
02/16/2005CN1581051A Function limiting program, mounting program generation program and program storage medium
02/16/2005CN1581012A Method for protecting computer system
02/16/2005CN1581011A Control of programming electronic devices
02/16/2005CN1581010A Access control for digital content
02/16/2005CN1190080C TV appaaratus of storage broadcasting information display, distributing device, and information distribution method
02/16/2005CN1190033C Enciphering apparatus and method, deciphering apparatus and method as well as information processing apparatus and method
02/16/2005CN1189886C Copyright protection, revealing method and device, recording method and device
02/16/2005CN1189832C Method for managing content data and processing device and method thereof
02/16/2005CN1189827C Information processing apparatus and method
02/16/2005CN1189823C Data processing device, data processing method, terminal, transmission method for data processing device
02/16/2005CN1189819C Interference-free microprocessor
02/16/2005CN1189815C Data processing device, data processing method, data recording medium and recording medium
02/15/2005US6857078 Method for securing software to increase license compliance
02/15/2005US6857077 Management of data in a receiver/decoder
02/15/2005US6857076 Data security for digital data storage
02/15/2005US6857073 System and method for authentication of network users
02/15/2005US6857071 System and method for distributing digital works, apparatus and method for reproducing digital works, and computer program product
02/15/2005US6857070 Data processing method and apparatus, and storage medium capable of being read by a computer
02/15/2005US6857068 System and method for data processing by executing a security program routine initially stored in a protected part of irreversibly blocked memory upon start-up
02/15/2005US6857067 System and method for preventing unauthorized access to electronic data
02/15/2005US6856976 Secured commercial transaction
02/15/2005US6856317 System and method for storing public and secure font data in a font file
02/15/2005US6855264 Method of manufacture of an ink jet printer having a thermal actuator comprising an external coil spring
02/15/2005CA2308772C Method and system for facilitating distributed software development in a distribution unaware manner
02/15/2005CA2201910C Computer system for data management and method for operating said system
02/10/2005WO2005013272A1 Record carrier comprising encryption indication information
02/10/2005WO2005013219A1 Secure housing containing a keyboard for inserting confidential data
02/10/2005WO2005013160A1 A system and method for managing resources and rights
02/10/2005WO2005013128A2 Systems and methods for managing and presenting multimedia and content rich data on a removable memory apparatus
02/10/2005WO2005013127A1 Copy-protected application for digital broadcasting system
02/10/2005WO2005013126A1 Copy-protecting applications in a digital broadcasting system
02/10/2005WO2004104747A3 Document modification detection and prevention
02/10/2005WO2004084075A9 Information access control method, access control program, and external recording medium
02/10/2005WO2004070538A3 Distribution and rights management of digital content
02/10/2005WO2004015740A3 Integrated circuit for digital rights management
02/10/2005WO2003038574A3 An apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment
02/10/2005US20050034150 Server, content providing apparatus, content receiving apparatus, content providing method, content receiving method, and program
02/10/2005US20050034116 Control of programming electronic devices
02/10/2005US20050034114 Method, a server system, a client system, a communication network and computer software products for distributing software packages or updates
02/10/2005US20050034078 Mediating conflicts in computer user's context data
02/10/2005US20050034069 Copy protecting documents