| Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) | 
|---|
| 04/16/2014 | CN203552652U Multifunctional player | 
| 04/16/2014 | CN203552262U Computer USB (Universal Serial Bus) flash disk protection device | 
| 04/16/2014 | CN203552261U Tablet PC (personal computer) with anti-theft function | 
| 04/16/2014 | CN203552260U Notebook computer keyboard protection cover | 
| 04/16/2014 | CN203552259U Anti-disclosure equipment control device | 
| 04/16/2014 | CN203552258U Encryption control terminal for realizing total data protection | 
| 04/16/2014 | CN103733206A Protecting keystrokes received from a keyboard in a platform containing embedded controllers | 
| 04/16/2014 | CN103733205A Play time dispenser for electronic applications | 
| 04/16/2014 | CN103733204A Transition between states in a processor | 
| 04/16/2014 | CN103733203A Delaying or deterring counterfeiting and/or cloning of a component | 
| 04/16/2014 | CN103733202A Apparatus and method of in-application licensing | 
| 04/16/2014 | CN103733201A Cryptographic data distribution and revocation for handheld medical devices | 
| 04/16/2014 | CN103731494A Service selecting method based on fuzzy theory for cloud computing | 
| 04/16/2014 | CN103731488A Photo sharing method and system | 
| 04/16/2014 | CN103731429A Method and device for web application vulnerability detection | 
| 04/16/2014 | CN103731428A Method and system for permission management of copyright user | 
| 04/16/2014 | CN103731271A On-line face identity authentication method based on homomorphic encrypting and chaotic scrambling | 
| 04/16/2014 | CN103731262A Digital certificate authentication device and digital certificate authentication system | 
| 04/16/2014 | CN103729765A Verification control method and system, terminal, server, terminal equipment | 
| 04/16/2014 | CN103729640A Finger vein feature extraction method and device and terminal | 
| 04/16/2014 | CN103729633A Electronic apparatus and intuitive guidance method applied to therein | 
| 04/16/2014 | CN103729605A Password input method based on touch screen, and touch terminal | 
| 04/16/2014 | CN103729604A User access area method and device | 
| 04/16/2014 | CN103729603A Secure file management system and method capable of achieving read/write splitting | 
| 04/16/2014 | CN103729602A System encipherment protection method using power management controller | 
| 04/16/2014 | CN103729601A Data security interconnected system and data security interconnected system establishing method | 
| 04/16/2014 | CN103729600A Data security interconnected system establishing method and data security interconnected system | 
| 04/16/2014 | CN103729599A Data invoking processing method and device | 
| 04/16/2014 | CN103729598A Data security interconnected system and establishing method thereof | 
| 04/16/2014 | CN103729597A System starting verifying method and device and terminal | 
| 04/16/2014 | CN103729596A Method for implementing safety of computer | 
| 04/16/2014 | CN103729595A Method for offline detecting private data leakage of Android application program | 
| 04/16/2014 | CN103729594A Method and device for generating protection rule | 
| 04/16/2014 | CN103729593A Method and system for recognizing file safety | 
| 04/16/2014 | CN103729592A Electronic device and starting method of function interface of electronic device | 
| 04/16/2014 | CN103729591A Method for sharing address lists of relatives and friends through genetic relationship judgment | 
| 04/16/2014 | CN103729590A Method, device and system for setting equipment access right | 
| 04/16/2014 | CN103729589A Single sign-on method and device | 
| 04/16/2014 | CN103729588A Signature method of signature device | 
| 04/16/2014 | CN103729587A Chip integrating with fingerprint interface, fingerprint algorithm, security algorithms and correlated accelerators | 
| 04/16/2014 | CN103729586A Method and system for authenticating passwords on basis of brain wave signals | 
| 04/16/2014 | CN103729585A Home automation system | 
| 04/16/2014 | CN103729584A Method and device used for unlocking screen | 
| 04/16/2014 | CN103729583A Data protecting method and electronic device | 
| 04/16/2014 | CN103729582A Safety storage management method and system based on checks and balances | 
| 04/16/2014 | CN103729581A Personal password managing system | 
| 04/16/2014 | CN103729580A Method and device for detecting software plagiarism | 
| 04/16/2014 | CN103729579A Function-level software protection method | 
| 04/16/2014 | CN103729470A Secure storage method based on different cloud storage ends | 
| 04/16/2014 | CN103729450A Function authority centralized management method and device | 
| 04/16/2014 | CN103729310A Method for protecting hardware data | 
| 04/16/2014 | CN103729299A Data safety management method for event data storage of multi-path electricity meter | 
| 04/16/2014 | CN103729179A Method for securely executing entrusted management commands | 
| 04/16/2014 | CN103729143A Data safety method for electric energy data storage of multi-path electricity meter | 
| 04/16/2014 | CN103729129A Intelligent device with screen locking and unlocking functions and unlocking method thereof | 
| 04/16/2014 | CN103729116A Computer unit capable locking screen, screen locking method and storage medium | 
| 04/16/2014 | CN103729039A Front panel structure of case | 
| 04/16/2014 | CN102902672B Method and device for cleaning file system | 
| 04/16/2014 | CN102799811B Scanning method and device | 
| 04/16/2014 | CN102750497B Method and device for deciphering private information | 
| 04/16/2014 | CN102592078B Method for identifying self-propagation of malicious software by extracting function call sequence chacteristics | 
| 04/16/2014 | CN102360413B Steganographic method with misguiding function of controllable secret key sequence | 
| 04/16/2014 | CN102349061B Method and system for authenticating a user | 
| 04/16/2014 | CN102117386B Digital data management system and method | 
| 04/16/2014 | CN102089769B Method of providing secure tamper-proof acquired data from process instruments | 
| 04/16/2014 | CN102034052B Operation system architecture based on separation of permissions and implementation method thereof | 
| 04/16/2014 | CN101933349B Data fading to secure data on mobile client devices | 
| 04/15/2014 | US8701210 Adjustable feature access for a controlled environmental system | 
| 04/15/2014 | US8701208 Apparatus, method, and computer-readable recording medium for supporting license acquirement | 
| 04/15/2014 | US8701207 Method, device and system for protecting software | 
| 04/15/2014 | US8701202 Method for granting an access authorization for a computer-based object in an automation system, computer program and automation system | 
| 04/15/2014 | US8701200 Analyzing access control configurations | 
| 04/15/2014 | US8701198 Performing security analysis on a software application | 
| 04/15/2014 | US8701195 Method for antivirus in a mobile device by using a mobile storage and a system thereof | 
| 04/15/2014 | US8701194 System and method of monitoring and controlling application files | 
| 04/15/2014 | US8701193 Malware detection via signature indices | 
| 04/15/2014 | US8701192 Behavior based signatures | 
| 04/15/2014 | US8701189 Method of and system for computer system denial-of-service protection | 
| 04/15/2014 | US8701187 Runtime integrity chain verification | 
| 04/15/2014 | US8701186 Formal analysis of the quality and conformance of information flow downgraders | 
| 04/15/2014 | US8701183 Hardware-based human presence detection | 
| 04/15/2014 | US8701178 Method and system for managing mobility of access terminal using proxy mobile internet protocol in a mobile communication system, and method for allocating home address of access terminal for the same | 
| 04/15/2014 | US8701173 System and method for providing silent sign on across distributed applications | 
| 04/15/2014 | US8701166 Secure authentication | 
| 04/15/2014 | US8701163 Method and system for automatic generation of cache directives for security policy | 
| 04/15/2014 | US8701158 Information processing system, apparatus, method, and program storage medium | 
| 04/15/2014 | US8701013 Conditional window capture | 
| 04/15/2014 | US8700920 System and method for content protection on a computing device | 
| 04/15/2014 | US8700919 Switch key instruction in a microprocessor that fetches and decrypts encrypted instructions | 
| 04/15/2014 | US8700917 Information processing apparatus, information recording medium manufacturing apparatus, and information recording medium | 
| 04/15/2014 | US8700915 Method and system for verifying authenticity of at least part of an execution environment for executing a computer module | 
| 04/15/2014 | US8700914 Method and system for changing safety-relevant data for a control device | 
| 04/15/2014 | US8700912 Identification based on encrypted biometric data | 
| 04/15/2014 | US8700911 Authentication system and method | 
| 04/15/2014 | US8700910 Communication system and authentication card | 
| 04/15/2014 | US8700909 Revocation of a biometric reference template | 
| 04/15/2014 | US8700908 System and method for managing secure information within a hybrid portable computing device | 
| 04/15/2014 | US8700906 Secure computing in multi-tenant data centers | 
| 04/15/2014 | US8700905 Method and device for electronically capturing a handwritten signature using embedding technique | 
| 04/15/2014 | US8700901 Facilitating secure online transactions |