Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
03/2014
03/26/2014CN103678988A Method and system using colors as verification code
03/26/2014CN103678987A Simple graph counting verification code verifying method and system
03/26/2014CN103678986A Movable encryption device with innate operation system and implement method
03/26/2014CN103678985A Automatic operator tag generating system and automatic operator tag generating method
03/26/2014CN103678984A Method for achieving user authentication by utilizing camera
03/26/2014CN103678983A Smartphone usage permission verification system and method
03/26/2014CN103678982A Method for using fingerprints and wireless technique to achieve encryption and decryption and device of method
03/26/2014CN103678981A Method and device for realizing different interfaces for different users
03/26/2014CN103678980A Safety protection method and device of intelligent terminal
03/26/2014CN103678979A Method and device for intelligently hiding privacy data
03/26/2014CN103678978A Fingerprint identification and verification system and method thereof
03/26/2014CN103678977A Method and electronic device for protecting information security
03/26/2014CN103678976A Method for authenticating identity through handwriting input device and handwriting input device
03/26/2014CN103678975A Identity authentication simulation system based on chaotic system
03/26/2014CN103678974A Remote access client terminal of chemico-mechanical polishing control system
03/26/2014CN103678973A System capable of realizing access control of host and virtual machine simultaneously and working method thereof
03/26/2014CN103678972A System and method for limits of authority
03/26/2014CN103678971A User information extracting method and device
03/26/2014CN103678970A Information processing system, operating device, and operating method
03/26/2014CN103678969A Lock releasing method of electronic device, and apparatus thereof
03/26/2014CN103678968A Gesture- and expression-based authentication
03/26/2014CN103678967A Network system, data processing apparatus, and method
03/26/2014CN103678966A Security module and method of securing payment information
03/26/2014CN103678965A Method and device for protecting safety of mobile equipment
03/26/2014CN103678964A Mobile terminal and password input method and system
03/26/2014CN103678963A User interaction method, device and system based on graph
03/26/2014CN103678962A Personal information management method and device and terminal
03/26/2014CN103678961A Code dynamic generating method
03/26/2014CN103678960A Method and device for adding digital copyright information to data file
03/26/2014CN103678959A Data protecting method based on portable storage device
03/26/2014CN103678958A Digital synthetic picture
03/26/2014CN103678957A Method, device and equipment for generating picture information and obtaining identity coded information
03/26/2014CN103678956A Digital authentication control medium and digital terminal device having network communication function
03/26/2014CN103678955A Dependable chip design method
03/26/2014CN103678841A Monitoring alarm method and device for game
03/26/2014CN103678654A Method for acquiring linkage information in database safety audit
03/26/2014CN103678480A Personalized image retrieval method with privacy controlled in grading mode
03/26/2014CN103678182A Power-down protecting method and system for improving data safety of vehicle terminal system
03/26/2014CN103678176A Hard disk data protection method and system
03/26/2014CN103678174A Data safety method, storage device and data safety system
03/26/2014CN103678126A System and method for enhancement of operational efficiency of hardware acceleration of application emulation
03/26/2014CN103678118A Method and device for compliance detection of Java source code
03/26/2014CN103678042A Backup strategy information generating method based on data analysis
03/26/2014CN103677923A BOOT bootstrap program run protection method
03/26/2014CN103677898A Method for checking loaded extension and/or plug-in on server side and server
03/26/2014CN103677894A Module management apparatus, module management system and module management method
03/26/2014CN103677892A Authorization scheme to enable special privilege mode in secure electronic control unit
03/26/2014CN103677891A Method for selective software rollback
03/26/2014CN103677886A Power-off protection method for system upgrading
03/26/2014CN103677882A Virtual installing device and method for mobile phone programs
03/26/2014CN103677861A System and method for installing software
03/26/2014CN103677770A Instruction recombining method and device
03/26/2014CN103677769A Instruction recombining method and device
03/26/2014CN103677675A Data input method, data input device and data input system
03/26/2014CN103677647A Electronic device power-on password input method and electronic device
03/26/2014CN103677644A Unlocking method and system for smart mobile terminal
03/26/2014CN103677638A Method and device for processing private documents
03/26/2014CN103677631A Information interaction method and information interaction device
03/26/2014CN103677598A Touch screen and method and device for achieving touch unlocking on same
03/26/2014CN102822838B Connection destination limitation system, connection destination limitation method, terminal setting control system, terminal setting control method, and program
03/26/2014CN102651088B Classification method for malicious code based on A_Kohonen neural network
03/26/2014CN102567661B Program recognition method and device based on machine learning
03/26/2014CN102521543B Method for information semantic analysis based on dynamic taint analysis
03/26/2014CN102467623B Method and device for monitoring file execution
03/26/2014CN102324009B Software copyright control method based on cloud computing platform
03/26/2014CN102292931B Method and device for multiple content protection systems in a file
03/26/2014CN102227733B Method and apparatus for providing access to files based on user identity
03/26/2014CN102222195B E-book reading method and system
03/26/2014CN102203793B Storage device and method for dynamic content tracing
03/26/2014CN101957902B Method and equipment for generating an expanded blinded inverted index table and method and equipment for searching united keywords
03/26/2014CN101951365B Network information counterfeiting issuing system, counterfeiting receiving system, and counterfeiting system and method
03/26/2014CN101950331B Information processing apparatus, system management method, and recording medium
03/25/2014US8683609 Mobile phone and IP address correlation service
03/25/2014US8683604 System for protecting personal data
03/25/2014US8683603 Centralized administration-based licensing system
03/25/2014US8683602 System and method for multilevel secure object management
03/25/2014US8683599 Static analysis for verification of software program access to secure resources for computer systems
03/25/2014US8683596 Detection of DOM-based cross-site scripting vulnerabilities
03/25/2014US8683595 Systems and methods for detecting potentially malicious content within near field communication messages
03/25/2014US8683592 Associating network and storage activities for forensic analysis
03/25/2014US8683583 Using virtual table protections to prevent the exploitation of object corruption vulnerabilities
03/25/2014US8683581 Method for authenticating a terminal
03/25/2014US8683580 Image forming apparatus, image forming system, and authentication device
03/25/2014US8683570 Scheduling soft token data transmission
03/25/2014US8683566 Secure access and architecture for virtual private sites
03/25/2014US8683565 Authentication
03/25/2014US8683564 One-time password authentication with infinite nested hash claims
03/25/2014US8683561 Fixed client identification system for positive identification of client to server
03/25/2014US8683557 Delegation as a mechanism to manage business activity by taking on a shared identity
03/25/2014US8683554 System and method for managing third party application program access to user information via a native application program interface (API)
03/25/2014US8683552 Information distribution system and terminal device
03/25/2014US8683550 System and method for validating a user of an account using a wireless device
03/25/2014US8683546 Managing security configuration through machine learning, combinatorial optimization and attack graphs
03/25/2014US8683545 Federating policies from multiple policy providers
03/25/2014US8683233 Motor vehicle control device
03/25/2014US8683230 Saving and retrieving data based on public key encryption
03/25/2014US8683225 Microprocessor that facilitates task switching between encrypted and unencrypted programs
03/25/2014US8683224 Processor-implemented method for ensuring software integrity
03/25/2014US8683223 Selective encryption within documents
03/25/2014US8683220 System and method for securing database activity