Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
03/26/2014 | CN103678988A Method and system using colors as verification code |
03/26/2014 | CN103678987A Simple graph counting verification code verifying method and system |
03/26/2014 | CN103678986A Movable encryption device with innate operation system and implement method |
03/26/2014 | CN103678985A Automatic operator tag generating system and automatic operator tag generating method |
03/26/2014 | CN103678984A Method for achieving user authentication by utilizing camera |
03/26/2014 | CN103678983A Smartphone usage permission verification system and method |
03/26/2014 | CN103678982A Method for using fingerprints and wireless technique to achieve encryption and decryption and device of method |
03/26/2014 | CN103678981A Method and device for realizing different interfaces for different users |
03/26/2014 | CN103678980A Safety protection method and device of intelligent terminal |
03/26/2014 | CN103678979A Method and device for intelligently hiding privacy data |
03/26/2014 | CN103678978A Fingerprint identification and verification system and method thereof |
03/26/2014 | CN103678977A Method and electronic device for protecting information security |
03/26/2014 | CN103678976A Method for authenticating identity through handwriting input device and handwriting input device |
03/26/2014 | CN103678975A Identity authentication simulation system based on chaotic system |
03/26/2014 | CN103678974A Remote access client terminal of chemico-mechanical polishing control system |
03/26/2014 | CN103678973A System capable of realizing access control of host and virtual machine simultaneously and working method thereof |
03/26/2014 | CN103678972A System and method for limits of authority |
03/26/2014 | CN103678971A User information extracting method and device |
03/26/2014 | CN103678970A Information processing system, operating device, and operating method |
03/26/2014 | CN103678969A Lock releasing method of electronic device, and apparatus thereof |
03/26/2014 | CN103678968A Gesture- and expression-based authentication |
03/26/2014 | CN103678967A Network system, data processing apparatus, and method |
03/26/2014 | CN103678966A Security module and method of securing payment information |
03/26/2014 | CN103678965A Method and device for protecting safety of mobile equipment |
03/26/2014 | CN103678964A Mobile terminal and password input method and system |
03/26/2014 | CN103678963A User interaction method, device and system based on graph |
03/26/2014 | CN103678962A Personal information management method and device and terminal |
03/26/2014 | CN103678961A Code dynamic generating method |
03/26/2014 | CN103678960A Method and device for adding digital copyright information to data file |
03/26/2014 | CN103678959A Data protecting method based on portable storage device |
03/26/2014 | CN103678958A Digital synthetic picture |
03/26/2014 | CN103678957A Method, device and equipment for generating picture information and obtaining identity coded information |
03/26/2014 | CN103678956A Digital authentication control medium and digital terminal device having network communication function |
03/26/2014 | CN103678955A Dependable chip design method |
03/26/2014 | CN103678841A Monitoring alarm method and device for game |
03/26/2014 | CN103678654A Method for acquiring linkage information in database safety audit |
03/26/2014 | CN103678480A Personalized image retrieval method with privacy controlled in grading mode |
03/26/2014 | CN103678182A Power-down protecting method and system for improving data safety of vehicle terminal system |
03/26/2014 | CN103678176A Hard disk data protection method and system |
03/26/2014 | CN103678174A Data safety method, storage device and data safety system |
03/26/2014 | CN103678126A System and method for enhancement of operational efficiency of hardware acceleration of application emulation |
03/26/2014 | CN103678118A Method and device for compliance detection of Java source code |
03/26/2014 | CN103678042A Backup strategy information generating method based on data analysis |
03/26/2014 | CN103677923A BOOT bootstrap program run protection method |
03/26/2014 | CN103677898A Method for checking loaded extension and/or plug-in on server side and server |
03/26/2014 | CN103677894A Module management apparatus, module management system and module management method |
03/26/2014 | CN103677892A Authorization scheme to enable special privilege mode in secure electronic control unit |
03/26/2014 | CN103677891A Method for selective software rollback |
03/26/2014 | CN103677886A Power-off protection method for system upgrading |
03/26/2014 | CN103677882A Virtual installing device and method for mobile phone programs |
03/26/2014 | CN103677861A System and method for installing software |
03/26/2014 | CN103677770A Instruction recombining method and device |
03/26/2014 | CN103677769A Instruction recombining method and device |
03/26/2014 | CN103677675A Data input method, data input device and data input system |
03/26/2014 | CN103677647A Electronic device power-on password input method and electronic device |
03/26/2014 | CN103677644A Unlocking method and system for smart mobile terminal |
03/26/2014 | CN103677638A Method and device for processing private documents |
03/26/2014 | CN103677631A Information interaction method and information interaction device |
03/26/2014 | CN103677598A Touch screen and method and device for achieving touch unlocking on same |
03/26/2014 | CN102822838B Connection destination limitation system, connection destination limitation method, terminal setting control system, terminal setting control method, and program |
03/26/2014 | CN102651088B Classification method for malicious code based on A_Kohonen neural network |
03/26/2014 | CN102567661B Program recognition method and device based on machine learning |
03/26/2014 | CN102521543B Method for information semantic analysis based on dynamic taint analysis |
03/26/2014 | CN102467623B Method and device for monitoring file execution |
03/26/2014 | CN102324009B Software copyright control method based on cloud computing platform |
03/26/2014 | CN102292931B Method and device for multiple content protection systems in a file |
03/26/2014 | CN102227733B Method and apparatus for providing access to files based on user identity |
03/26/2014 | CN102222195B E-book reading method and system |
03/26/2014 | CN102203793B Storage device and method for dynamic content tracing |
03/26/2014 | CN101957902B Method and equipment for generating an expanded blinded inverted index table and method and equipment for searching united keywords |
03/26/2014 | CN101951365B Network information counterfeiting issuing system, counterfeiting receiving system, and counterfeiting system and method |
03/26/2014 | CN101950331B Information processing apparatus, system management method, and recording medium |
03/25/2014 | US8683609 Mobile phone and IP address correlation service |
03/25/2014 | US8683604 System for protecting personal data |
03/25/2014 | US8683603 Centralized administration-based licensing system |
03/25/2014 | US8683602 System and method for multilevel secure object management |
03/25/2014 | US8683599 Static analysis for verification of software program access to secure resources for computer systems |
03/25/2014 | US8683596 Detection of DOM-based cross-site scripting vulnerabilities |
03/25/2014 | US8683595 Systems and methods for detecting potentially malicious content within near field communication messages |
03/25/2014 | US8683592 Associating network and storage activities for forensic analysis |
03/25/2014 | US8683583 Using virtual table protections to prevent the exploitation of object corruption vulnerabilities |
03/25/2014 | US8683581 Method for authenticating a terminal |
03/25/2014 | US8683580 Image forming apparatus, image forming system, and authentication device |
03/25/2014 | US8683570 Scheduling soft token data transmission |
03/25/2014 | US8683566 Secure access and architecture for virtual private sites |
03/25/2014 | US8683565 Authentication |
03/25/2014 | US8683564 One-time password authentication with infinite nested hash claims |
03/25/2014 | US8683561 Fixed client identification system for positive identification of client to server |
03/25/2014 | US8683557 Delegation as a mechanism to manage business activity by taking on a shared identity |
03/25/2014 | US8683554 System and method for managing third party application program access to user information via a native application program interface (API) |
03/25/2014 | US8683552 Information distribution system and terminal device |
03/25/2014 | US8683550 System and method for validating a user of an account using a wireless device |
03/25/2014 | US8683546 Managing security configuration through machine learning, combinatorial optimization and attack graphs |
03/25/2014 | US8683545 Federating policies from multiple policy providers |
03/25/2014 | US8683233 Motor vehicle control device |
03/25/2014 | US8683230 Saving and retrieving data based on public key encryption |
03/25/2014 | US8683225 Microprocessor that facilitates task switching between encrypted and unencrypted programs |
03/25/2014 | US8683224 Processor-implemented method for ensuring software integrity |
03/25/2014 | US8683223 Selective encryption within documents |
03/25/2014 | US8683220 System and method for securing database activity |