Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
05/2014
05/28/2014CN103824008A 一种基于人脸识别的控制计算机操作的系统 A method of controlling a computer operating system based on face recognition
05/28/2014CN103824007A 一种基于静脉识别的控制计算机操作的系统 The system control operation of the computer based on the identification of the vein
05/28/2014CN103824006A 一种手机应用软件自动生成水印的方法和系统 A method and system for mobile applications automatically generate a watermark
05/28/2014CN103824005A 一种内嵌可配置ip核的防复制系统及防复制方法 A configurable anti-copy system ip cores and embedded anti-copying method
05/28/2014CN103824004A 应用程序的保护方法和装置 Method and apparatus for protecting applications
05/28/2014CN103824003A 应用程序保护方法、装置和终端 Application protection methods, devices and terminals
05/28/2014CN103824002A 一种电子数据与终端设备绑定的方法、装置和系统 A method of electronic data with the bound terminal equipment, apparatus and system
05/28/2014CN103823902A 一种电子文件安全检索的方法 An electronic document retrieval method safe
05/28/2014CN103823873A 一种浏览器设置项的读/写方法、装置和系统 A browser settings read / write method, apparatus and system
05/28/2014CN103823871A 软件查找方法和装置 Software to find a method and apparatus
05/28/2014CN103823830A 用于销毁敏感信息的方法和系统 The method used to destroy sensitive information and systems
05/28/2014CN103823820A 一种基于idea加密算法对数据库传出数据进行加密的系统 Idea based encryption algorithm to encrypt the outgoing data to the database system
05/28/2014CN103823767A 带移动电源的加密移动硬盘盒 Encryption HDD Enclosure with mobile power
05/28/2014CN103823746A 一种基于ocr 识别技术对计算机维护次数进行统计的系统 Ocr recognition technology based on the statistics of the number of computer systems maintenance
05/28/2014CN103823741A 基于ocr识别技术对计算机维护次数进行统计的系统 Ocr recognition technology for computer maintenance times statistics-based systems
05/28/2014CN103823738A 一种基于蓝牙识别技术对计算机维护次数进行统计的系统 Bluetooth identification technology based on the statistics of the number of computer systems maintenance
05/28/2014CN103823736A 基于蓝牙识别技术对计算机维护次数进行统计的系统 Bluetooth frequency identification technology to maintain statistics on the computer-based system
05/28/2014CN103823732A 一种linux操作系统下监控文件完整性的方法 A method of operating system file integrity monitoring method under linux
05/28/2014CN103823702A 一种应用安装方法及电子设备 An installation method and electronic device applications
05/28/2014CN103823692A 一种计算机操作系统启动方法 A computer operating system boot method
05/28/2014CN103823691A 基于网络编码的无线传感器网络安全在线重编程方法 Based on network coding for wireless sensor networks secure online reprogramming method
05/28/2014CN103823606A 信息加密装置和信息加密方法 Information encryption means and the encryption method information
05/28/2014CN102959578B 取证系统、取证方法及取证程序 Forensic system, forensic methods and evidence-gathering procedures
05/28/2014CN102231180B 处理器指令编码可重定义的方法 Processor instruction encoding method redefined
05/28/2014CN101853379B 移动终端和控制该移动终端的方法 Mobile terminal and method of controlling the mobile terminal
05/27/2014US8739308 Source identification for unauthorized copies of content
05/27/2014US8739306 System and method for accessing private digital content
05/27/2014US8739305 Secure access to encrypted information
05/27/2014US8739302 Method and apparatus for transitioning between states of security policies used to secure electronic documents
05/27/2014US8739300 System and method for transmission of files within a secured network
05/27/2014US8739298 Method and system for enforcing a license dependency rule for a software application
05/27/2014US8739295 Secure personal content server
05/27/2014US8739292 Trust exception management
05/27/2014US8739287 Determining a security status of potentially malicious files
05/27/2014US8739285 Differential virus scan
05/27/2014US8739284 Systems and methods for blocking and removing internet-traversing malware
05/27/2014US8739283 Automatic generation of malware clean pattern
05/27/2014US8739280 Context-sensitive taint analysis
05/27/2014US8739278 Techniques for fraud monitoring and detection using application fingerprinting
05/27/2014US8739277 Process for releasing the access to a computer system or to a program
05/27/2014US8739276 Automatic construction of human interaction proof engines
05/27/2014US8739275 Marking one or more items in response to determining device transfer
05/27/2014US8739273 System and method for supporting subnet management packet (SMP) firewall restrictions in a middleware machine environment
05/27/2014US8739269 Method and apparatus for providing security in an intranet network
05/27/2014US8739268 Security gateway system, method thereof, and program
05/27/2014US8739267 Method and system for communication between a secure information storage device and at least one third party, and corresponding entity, device and third party
05/27/2014US8739266 Universal authentication token
05/27/2014US8739265 System and method of sort-order preserving tokenization
05/27/2014US8739264 Managing access to secured data
05/27/2014US8739263 Communication apparatus, wireless communication system, and method of setting association information
05/27/2014US8739261 Dynamically providing algorithm-based password/challenge authentication
05/27/2014US8739257 Managing authentication of virtual clients
05/27/2014US8739256 Method for providing access to a service
05/27/2014US8739254 Methods, systems, and products for identity verification
05/27/2014US8739249 Push notifications for web applications and browser extensions
05/27/2014US8739244 Configuring and authenticating WAN optimization devices for accessing content delivery networks
05/27/2014US8739242 Digital rights management in a collaborative environment
05/27/2014US8738946 Method for an os to disable a graphics adapter and lock inputs when tablet display is detached on a hybrid laptop
05/27/2014US8738934 Method and apparatus for protecting account numbers and passwords
05/27/2014US8738933 Archive system, management apparatus, and control method
05/27/2014US8738932 System and method for processor-based security
05/27/2014US8738931 Method for determining and protecting proprietary source code using mnemonic identifiers
05/27/2014US8738930 Chip integrated protection means
05/27/2014US8738929 Auxiliary functionality for pixel data
05/27/2014US8738923 Framework for notifying a directory service of authentication events processed outside the directory service
05/27/2014US8738922 Method and device for electronically capturing a handwritten signature and safeguarding biometric data
05/27/2014US8738921 System and method for authenticating a person's identity using a trusted entity
05/27/2014US8738920 Information processing apparatus and authentication information migration method
05/27/2014US8738907 Wireless device authentication and security key management
05/27/2014US8738899 System and method for unlocking content associated with media
05/27/2014US8738896 Virtual machine execution program and information processing device
05/27/2014US8738789 Media service delivery system providing conditional access to media content from various client devices
05/27/2014US8738672 Document management system user interfaces
05/27/2014US8738620 Implementing enterprise level business information networking
05/27/2014US8738545 Map based neighborhood search and community contribution
05/27/2014US8738538 Barter for rights
05/27/2014US8738537 System and method for relicensing content
05/27/2014US8738536 Licensing content for use on portable device
05/27/2014US8738533 Real-world items unlocking virtual items online and in video games
05/27/2014US8738159 System and method for accessing PLC data on demand
05/27/2014US8737964 Facilitating and authenticating transactions
05/27/2014US8737622 Method for importing rights object and rights issuer
05/27/2014US8737619 Method of triggering location based events in a user equipment
05/27/2014US8737606 Method and system for high throughput blockwise independent encryption/decryption
05/27/2014US8737604 Processor with architecture implementing the advanced encryption standard
05/27/2014US8737603 Cryptographic processing apparatus, cryptographic processing method, and computer program
05/27/2014US8737341 Control channel transmitting method, base station and terminal
05/27/2014US8734872 Access control to content published by a host
05/27/2014CA2771037C Secure transmission system for a digital trunked radio system
05/23/2014CA2796510A1 Portable device capture
05/22/2014WO2014078755A1 Image sharing system
05/22/2014WO2014078605A1 Client token storage for cross-site request forgery protection
05/22/2014WO2014078603A1 Dynamic selection and loading of anti-malware signatures
05/22/2014WO2014078585A2 Methods, systems and computer readable media for detecting command injection attacks
05/22/2014WO2014078569A1 Systems and methods of global identification
05/22/2014WO2014078441A2 Cross-site request forgery protection
05/22/2014WO2014078250A1 Communication system and method for nodes associated with a vehicle
05/22/2014WO2014078154A2 Automatically generating challenge questions inferred from user history data for user authentication
05/22/2014WO2014078104A1 Method and system for secure access to data files copied onto a second storage device from a first storage device
05/22/2014WO2014077981A1 Protection of user data in hosted application environments