Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
04/2014
04/16/2014CN203552652U Multifunctional player
04/16/2014CN203552262U Computer USB (Universal Serial Bus) flash disk protection device
04/16/2014CN203552261U Tablet PC (personal computer) with anti-theft function
04/16/2014CN203552260U Notebook computer keyboard protection cover
04/16/2014CN203552259U Anti-disclosure equipment control device
04/16/2014CN203552258U Encryption control terminal for realizing total data protection
04/16/2014CN103733206A Protecting keystrokes received from a keyboard in a platform containing embedded controllers
04/16/2014CN103733205A Play time dispenser for electronic applications
04/16/2014CN103733204A Transition between states in a processor
04/16/2014CN103733203A Delaying or deterring counterfeiting and/or cloning of a component
04/16/2014CN103733202A Apparatus and method of in-application licensing
04/16/2014CN103733201A Cryptographic data distribution and revocation for handheld medical devices
04/16/2014CN103731494A Service selecting method based on fuzzy theory for cloud computing
04/16/2014CN103731488A Photo sharing method and system
04/16/2014CN103731429A Method and device for web application vulnerability detection
04/16/2014CN103731428A Method and system for permission management of copyright user
04/16/2014CN103731271A On-line face identity authentication method based on homomorphic encrypting and chaotic scrambling
04/16/2014CN103731262A Digital certificate authentication device and digital certificate authentication system
04/16/2014CN103729765A Verification control method and system, terminal, server, terminal equipment
04/16/2014CN103729640A Finger vein feature extraction method and device and terminal
04/16/2014CN103729633A Electronic apparatus and intuitive guidance method applied to therein
04/16/2014CN103729605A Password input method based on touch screen, and touch terminal
04/16/2014CN103729604A User access area method and device
04/16/2014CN103729603A Secure file management system and method capable of achieving read/write splitting
04/16/2014CN103729602A System encipherment protection method using power management controller
04/16/2014CN103729601A Data security interconnected system and data security interconnected system establishing method
04/16/2014CN103729600A Data security interconnected system establishing method and data security interconnected system
04/16/2014CN103729599A Data invoking processing method and device
04/16/2014CN103729598A Data security interconnected system and establishing method thereof
04/16/2014CN103729597A System starting verifying method and device and terminal
04/16/2014CN103729596A Method for implementing safety of computer
04/16/2014CN103729595A Method for offline detecting private data leakage of Android application program
04/16/2014CN103729594A Method and device for generating protection rule
04/16/2014CN103729593A Method and system for recognizing file safety
04/16/2014CN103729592A Electronic device and starting method of function interface of electronic device
04/16/2014CN103729591A Method for sharing address lists of relatives and friends through genetic relationship judgment
04/16/2014CN103729590A Method, device and system for setting equipment access right
04/16/2014CN103729589A Single sign-on method and device
04/16/2014CN103729588A Signature method of signature device
04/16/2014CN103729587A Chip integrating with fingerprint interface, fingerprint algorithm, security algorithms and correlated accelerators
04/16/2014CN103729586A Method and system for authenticating passwords on basis of brain wave signals
04/16/2014CN103729585A Home automation system
04/16/2014CN103729584A Method and device used for unlocking screen
04/16/2014CN103729583A Data protecting method and electronic device
04/16/2014CN103729582A Safety storage management method and system based on checks and balances
04/16/2014CN103729581A Personal password managing system
04/16/2014CN103729580A Method and device for detecting software plagiarism
04/16/2014CN103729579A Function-level software protection method
04/16/2014CN103729470A Secure storage method based on different cloud storage ends
04/16/2014CN103729450A Function authority centralized management method and device
04/16/2014CN103729310A Method for protecting hardware data
04/16/2014CN103729299A Data safety management method for event data storage of multi-path electricity meter
04/16/2014CN103729179A Method for securely executing entrusted management commands
04/16/2014CN103729143A Data safety method for electric energy data storage of multi-path electricity meter
04/16/2014CN103729129A Intelligent device with screen locking and unlocking functions and unlocking method thereof
04/16/2014CN103729116A Computer unit capable locking screen, screen locking method and storage medium
04/16/2014CN103729039A Front panel structure of case
04/16/2014CN102902672B Method and device for cleaning file system
04/16/2014CN102799811B Scanning method and device
04/16/2014CN102750497B Method and device for deciphering private information
04/16/2014CN102592078B Method for identifying self-propagation of malicious software by extracting function call sequence chacteristics
04/16/2014CN102360413B Steganographic method with misguiding function of controllable secret key sequence
04/16/2014CN102349061B Method and system for authenticating a user
04/16/2014CN102117386B Digital data management system and method
04/16/2014CN102089769B Method of providing secure tamper-proof acquired data from process instruments
04/16/2014CN102034052B Operation system architecture based on separation of permissions and implementation method thereof
04/16/2014CN101933349B Data fading to secure data on mobile client devices
04/15/2014US8701210 Adjustable feature access for a controlled environmental system
04/15/2014US8701208 Apparatus, method, and computer-readable recording medium for supporting license acquirement
04/15/2014US8701207 Method, device and system for protecting software
04/15/2014US8701202 Method for granting an access authorization for a computer-based object in an automation system, computer program and automation system
04/15/2014US8701200 Analyzing access control configurations
04/15/2014US8701198 Performing security analysis on a software application
04/15/2014US8701195 Method for antivirus in a mobile device by using a mobile storage and a system thereof
04/15/2014US8701194 System and method of monitoring and controlling application files
04/15/2014US8701193 Malware detection via signature indices
04/15/2014US8701192 Behavior based signatures
04/15/2014US8701189 Method of and system for computer system denial-of-service protection
04/15/2014US8701187 Runtime integrity chain verification
04/15/2014US8701186 Formal analysis of the quality and conformance of information flow downgraders
04/15/2014US8701183 Hardware-based human presence detection
04/15/2014US8701178 Method and system for managing mobility of access terminal using proxy mobile internet protocol in a mobile communication system, and method for allocating home address of access terminal for the same
04/15/2014US8701173 System and method for providing silent sign on across distributed applications
04/15/2014US8701166 Secure authentication
04/15/2014US8701163 Method and system for automatic generation of cache directives for security policy
04/15/2014US8701158 Information processing system, apparatus, method, and program storage medium
04/15/2014US8701013 Conditional window capture
04/15/2014US8700920 System and method for content protection on a computing device
04/15/2014US8700919 Switch key instruction in a microprocessor that fetches and decrypts encrypted instructions
04/15/2014US8700917 Information processing apparatus, information recording medium manufacturing apparatus, and information recording medium
04/15/2014US8700915 Method and system for verifying authenticity of at least part of an execution environment for executing a computer module
04/15/2014US8700914 Method and system for changing safety-relevant data for a control device
04/15/2014US8700912 Identification based on encrypted biometric data
04/15/2014US8700911 Authentication system and method
04/15/2014US8700910 Communication system and authentication card
04/15/2014US8700909 Revocation of a biometric reference template
04/15/2014US8700908 System and method for managing secure information within a hybrid portable computing device
04/15/2014US8700906 Secure computing in multi-tenant data centers
04/15/2014US8700905 Method and device for electronically capturing a handwritten signature using embedding technique
04/15/2014US8700901 Facilitating secure online transactions