Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
01/2005
01/27/2005DE10249428B4 Verfahren zum Definieren der Sicherheitsanfälligkeiten eines Computersystems Method for defining the vulnerabilities of a computer system
01/27/2005CA2573143A1 Automatic regeneration of computer files description
01/27/2005CA2531789A1 Method for making secure execution of a computer programme, in particular in a smart card
01/27/2005CA2530793A1 Authenticating media stream recipients
01/26/2005EP1501256A2 System and method for automatic negotiation of a security protocol
01/26/2005EP1501236A1 Error correction for cryptographic keys
01/26/2005EP1501047A2 Fingerprinting segments of data content for version identification
01/26/2005EP1501032A1 Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information
01/26/2005EP1501014A1 Data processing method and data checking method
01/26/2005EP1501002A2 User authentication method and program, and image forming apparatus
01/26/2005EP1500303A2 Audio distribution
01/26/2005EP1500276A1 Testing content in a conditional access system
01/26/2005EP1500273A1 Access allowance based on regions
01/26/2005EP1500225A1 Initializing, maintaining, updating and recovering secure operation within an integrated system employing a data access control function
01/26/2005EP1500104A2 Method of copy detection and protection using non-standard toc entries
01/26/2005EP1500103A2 Apparatus and method for rendering user data
01/26/2005EP1500101A1 Method of copy detection and protection using time jumps
01/26/2005EP1499987A1 Multi-user application program interface
01/26/2005EP1499976A1 Control function based on requesting master id and a data address within an integrated system
01/26/2005EP1499975A2 Control of processes in a processing system
01/26/2005EP1499967A2 Secure transmission and installation of an application
01/26/2005EP1499940A2 Efficient browser-based identity management providing personal control and anonymity
01/26/2005EP1499939A2 A method of transferring information specifying a tool utilized for processing a content protected by ipmp
01/26/2005EP1499937A1 Storing sensitive information
01/26/2005EP1499906A1 Method and apparatus for secure scan testing
01/26/2005EP1446759A4 Transaction card system having security against unauthorized usage
01/26/2005EP1307802B1 Method and apparatus for centralized authentication
01/26/2005EP1119938B1 A system for verifying the integrity and authorization of software before execution in a local platform
01/26/2005CN1572114A Apparatus and method for accessing material using an entity locked secure registry
01/26/2005CN1571999A Secure single drive copy method and apparatus
01/26/2005CN1571971A Informational object authoring and distribution system
01/26/2005CN1571963A System and method for controlling transmission of data packets over an information network
01/26/2005CN1571961A Security hole diagnosis system
01/26/2005CN1571959A Information processing device, information processing method, and computer program
01/26/2005CN1571949A Apparatus for and method of controlling propagation of decryption keys
01/26/2005CN1571948A Method, apparatus and system for securely providing material to a licensee of the material
01/26/2005CN1571947A Virus detection system
01/26/2005CN1571056A Reproducing method and apparatus, recording method and apparatus , recording medium and program
01/26/2005CN1186731C Method and apparatus for protecting copyright data in computer system
01/25/2005US6848052 High security personalized wireless portable biometric device
01/25/2005US6848050 System and method for alternative encryption techniques
01/25/2005US6848049 Method and apparatus for the authentication of integrated circuits
01/25/2005US6848048 Method and apparatus for providing verifiable digital signatures
01/25/2005US6848047 Security managing system, data distribution apparatus and portable terminal apparatus
01/25/2005US6848045 Integrated USB connector for personal token
01/25/2005US6848038 Portable data carrier and method for using the same in a plurality of applications
01/25/2005US6847982 Intelligent data inventory and asset management system method and apparatus
01/25/2005US6847950 Contents managing method and contents managing apparatus
01/25/2005US6847949 Indicator system for screening protected material
01/25/2005US6847948 Method and apparatus for secure distribution of software/data
01/25/2005US6847777 Video player and video playback method of a video player having an audio-visual restriction capability
01/25/2005US6847719 Limiting receiver access to secure read-only communications over a network by preventing access to source-formatted plaintext
01/25/2005US6845908 Storage card with integral file system, access control and cryptographic support
01/25/2005CA2261629C System for secure data storage on cd-rom
01/25/2005CA2218957C Steganography systems
01/22/2005CA2475384A1 System and method for digital content management and controlling copyright protection
01/20/2005WO2005006707A1 Methods, systems and devices for securing supervisory control and data acquisition (scada) communications
01/20/2005WO2005006647A2 Personal identification and contact location and timing
01/20/2005WO2005006612A1 Information processing device, information processing method, and information processing program
01/20/2005WO2005006610A1 Display device, display method, and display control program
01/20/2005WO2005006231A1 Authentication system
01/20/2005WO2005006229A1 Communication device, communicate method for communication device, and communication program for communication device
01/20/2005WO2005006203A1 Service use method and management method
01/20/2005WO2005006202A1 Individual authentication method using a recording medium and individual authentication system using a recording medium
01/20/2005WO2005006197A2 An apparatus and method for memory encryption with reduced decryption latency
01/20/2005WO2005006159A1 Trusted peripheral mechanism
01/20/2005WO2005006158A1 Method of and system for distributing a content item
01/20/2005WO2005006157A1 Anti piracy system in a peer-to-peer network
01/20/2005WO2005006156A2 Integrated circuit comprising an ordinary module and a secured module that are connected via a protected line
01/20/2005WO2005006147A2 Method and apparatus for providing access to personal information
01/20/2005WO2005006109A2 System and method for authenticating software using hidden intermediate keys
01/20/2005WO2004105326A3 Time-triggered communication system and method for the synchronized start of a dual-channel network
01/20/2005WO2004090781A8 Apparatus for authorising access to an electronic device
01/20/2005WO2003102769A3 System, method and computer program product for leakage-proof program partitioning
01/20/2005WO2003098438A8 Data usage management electronic apparatus, method, program, and storage medium
01/20/2005WO2003077083A3 Secure device for preventing unauthorised use of distributed content
01/20/2005WO2003021376A3 Computer security event management system
01/20/2005US20050015760 Automatic detection and patching of vulnerable files
01/20/2005US20050015707 Method of transferring information specifying a tool utilized for processing a content protected by ipmp
01/20/2005US20050015674 Method, apparatus, and program for converting, administering, and maintaining access control lists between differing filesystem types
01/20/2005US20050015667 Automated diagnosis for electronic systems
01/20/2005US20050015629 Portable non-volatile memory device and data security method of same
01/20/2005US20050015628 Method for controlled and audited access to privileged accounts on computer systems
01/20/2005US20050015625 Security management system in parallel processing system by OS for single processors
01/20/2005US20050015624 Event monitoring and management
01/20/2005US20050015614 Method and apparatus for detecting password attacks using modeling techniques
01/20/2005US20050015613 Wireless identification lock
01/20/2005US20050015612 Parent-children interactive intelligent management system
01/20/2005US20050015611 Trusted peripheral mechanism
01/20/2005US20050015608 Method for strongly encrypting .ZIP files
01/20/2005US20050015606 Malware scanning using a boot with a non-installed operating system and download of malware detection files
01/20/2005US20050015605 System and method for ensuring mobile device data and content security
01/20/2005US20050015604 Session authentication using temporary passwords
01/20/2005US20050015603 System and method for on-demand computing for parallel SCSI
01/20/2005US20050015601 Methods, systems, and media to authenticate a user
01/20/2005US20050015600 Electronic document authenticity assurance method and electronic document disclosure system
01/20/2005US20050015596 Method and apparatus for managing confidential information
01/20/2005US20050015594 Method and system for stepping up to certificate-based authentication without breaking an existing SSL session
01/20/2005US20050015592 System and method for application and user-based class of security
01/20/2005US20050015591 Multi-level multi-user web services security system and method