Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
03/20/2014 | US20140082376 System, Method and Apparatus for Securely Saving/Retrieving Data on a Data Storage |
03/20/2014 | US20140082375 Data security for digital data storage |
03/20/2014 | US20140082371 Secure processor and a program for a secure processor |
03/20/2014 | US20140082370 Methods, apparatus and systems to improve security in computer systems |
03/20/2014 | US20140082369 Method and System For Object Access and Usage Control Using Location and Access Boundary Shape Information |
03/20/2014 | US20140082368 Biometric authentication method and computer system |
03/20/2014 | US20140082367 Verifying passwords on a mobile device |
03/20/2014 | US20140082356 Protection of interpreted source code in virtual appliances |
03/20/2014 | US20140082355 Secure system for allowing the execution of authorized computer program code |
03/20/2014 | US20140082354 System and method for obtaining keys to access protected information |
03/20/2014 | US20140082353 Scalable groups of authenticated entities |
03/20/2014 | US20140082351 Authority-Neutral Certification for Multiple-Authority PKI Environments |
03/20/2014 | US20140082349 Security credential deployment in cloud environment |
03/20/2014 | US20140082344 Case secure computer architecture |
03/20/2014 | US20140081850 System and Method for Providing Access to Streaming Multimedia Content to Devices From Servers |
03/20/2014 | US20140079590 Perfusion system with rfid feature activation |
03/20/2014 | US20140079373 Information processing apparatus and method, and program storage medium |
03/20/2014 | DE112012002579T5 Erfassen und Bearbeiten von Inhalten unter Verwendung biometrischer Daten Capturing and editing content using biometric data |
03/20/2014 | DE102012108866A1 Verfahren zum sicheren Bedienen eines Feldgerätes Method for the safe operation of a field device |
03/20/2014 | CA2824109A1 Systems and methods for data privacy and destruction in multi-system landscapes |
03/19/2014 | EP2709335A1 Information processing apparatus, information providing server, program, communication system, and login information providing server |
03/19/2014 | EP2709333A1 Method and devices for data leak protection |
03/19/2014 | EP2709306A1 Method and system to perform secure boolean search over encrypted documents |
03/19/2014 | EP2709035A2 System, method and computer program product for detecting tampering in a product |
03/19/2014 | EP2709034A1 Systems and methods for code protection in non-volatile memory systems |
03/19/2014 | EP2709033A1 System and method for detecting data extrusion in software applications |
03/19/2014 | EP2709032A2 Image forming apparatus, driving method thereof, and computer-readable recording medium |
03/19/2014 | EP2709031A1 Gesture- and expression-based authentication |
03/19/2014 | EP2709029A1 Fraud detection system, fraud detection device, fraud detection method, and non-volatile medium |
03/19/2014 | EP2707842A1 Method and device for starting limited-time licenses for telecommunication systems in a controlled manner |
03/19/2014 | EP2707831A1 Apparatus and method for hardware-based secure data processing using buffer memory address range rules |
03/19/2014 | EP2707830A1 System and method for authenticating a photograph |
03/19/2014 | EP2707735A1 Systems and methods of implementing content validation of microcomputer based circuits |
03/19/2014 | CN203490702U Encryption anti-theft host of computer |
03/19/2014 | CN203490701U Intelligent safety control equipment |
03/19/2014 | CN203490700U Computer security boot-up protection system |
03/19/2014 | CN203490699U Vehicle terminal antitheft system |
03/19/2014 | CN103650528A Method and apparatus for providing content to an earpiece in accordance with a privacy filter and content selection rule |
03/19/2014 | CN103650459A Information presentation method and equipment |
03/19/2014 | CN103650412A System for providing sets of content and applications and control method therefor, terminal and control method therefor, authentication device and control method therefor, program, and information storage medium |
03/19/2014 | CN103650005A Identification technique |
03/19/2014 | CN103649966A Content name-based network device and method for protecting content |
03/19/2014 | CN103649965A System, method and apparatus for facilitating resource security |
03/19/2014 | CN103649964A Secure hosted execution architecture |
03/19/2014 | CN103649963A Trust level activation |
03/19/2014 | CN103649962A System and method for protecting digital contents with digital rights management (DRM) |
03/19/2014 | CN103647890A Information processing system, utilization constraint method and recording medium |
03/19/2014 | CN103647786A Television and method and remote storage device log-in method and device thereof |
03/19/2014 | CN103647784A Public and private isolation method and device |
03/19/2014 | CN103647769A Human ear information coding encryption and application method |
03/19/2014 | CN103647651A Security chip based power distribution terminal management method |
03/19/2014 | CN103647587A Method and system for unlocking mobile terminal, mobile terminal and wearable electronic device |
03/19/2014 | CN103646346A Mirror image real name ticket booking system |
03/19/2014 | CN103646244A Methods and devices for face characteristic extraction and authentication |
03/19/2014 | CN103646219A Power consumption compensation and attack resisting circuit based on neural network power consumption predication and control method |
03/19/2014 | CN103646218A Device and method for defining data access right and behavior right |
03/19/2014 | CN103646217A Method and device for protecting security of data in terminal and terminal |
03/19/2014 | CN103646216A Method and device for monitoring folder of terminal |
03/19/2014 | CN103646215A Application installation control method, related system and related device |
03/19/2014 | CN103646214A Method for establishing trusted environment in power distribution terminal |
03/19/2014 | CN103646213A Method and device for classifying malicious software |
03/19/2014 | CN103646212A Information fraud network defense platform |
03/19/2014 | CN103646211A Method and device for loading payment webpage in browser |
03/19/2014 | CN103646210A Method and device for calling system function |
03/19/2014 | CN103646209A Cloud-security-based bundled software blocking method and device |
03/19/2014 | CN103646208A Monitoring method and device of eMMC |
03/19/2014 | CN103646207A Method and device for managing security attribute of application program |
03/19/2014 | CN103646206A Access method compatible with different cipher devices |
03/19/2014 | CN103646205A Method for controlling operation of encryption lock |
03/19/2014 | CN103646204A Safety device for mobile information safety protection |
03/19/2014 | CN103646203A Computer safety system with human body biological characteristic recognition |
03/19/2014 | CN103646202A Fingerprint information coding encryption and application method |
03/19/2014 | CN103646201A Verification method achieved by combining human faces with identities |
03/19/2014 | CN103646200A Encoding encryption application method for human face information |
03/19/2014 | CN103646199A Sudoku password and facial image-based authentication method |
03/19/2014 | CN103646198A Method, system and device for locking working region of mobile terminal |
03/19/2014 | CN103646197A User credibility authentication system and method based on user behaviors |
03/19/2014 | CN103646196A Method for inputting graph keys through mouse touchpad |
03/19/2014 | CN103646195A Copyright protection oriented database watermarking method |
03/19/2014 | CN103646194A Credible sorting method of synchronous data flow procedures based on formal verification |
03/19/2014 | CN103646163A Cloud platform based human health detection system and method |
03/19/2014 | CN103646068A Encryption method, decryption method, method for group messaging and corresponding devices thereof |
03/19/2014 | CN103646062A Scanning method and device for downloaded file |
03/19/2014 | CN103646057A Junk file analysis method and device and junk file cleaning method |
03/19/2014 | CN103645949A Virtual machine dynamic migration security framework |
03/19/2014 | CN103645885A Microprocessor, related operation method, encryption and decryption methods |
03/19/2014 | CN103645838A Mobile terminal and unlocking method thereof |
03/19/2014 | CN103645791A Single-power multi-mainboard power supply management system |
03/19/2014 | CN102750477B Method and system for controlling closing of terminal |
03/19/2014 | CN102693388B Data safety protection processing system, method and storage medium |
03/19/2014 | CN102360410B User operation discovery method of file system and synchronous system utilizing the same |
03/19/2014 | CN102339369B MCU (Micro-programmed Control Unit) information protection method |
03/19/2014 | CN102213924B Unit using OS and image forming apparatus using the same |
03/19/2014 | CN102184357B Portable trustworthy private information processing system |
03/19/2014 | CN102176227B Signing testifying method and auxiliary signing testifying system |
03/19/2014 | CN102117214B Embedded equipment and data file downloading method thereof |
03/19/2014 | CN102034034B Biological authentication device |
03/19/2014 | CN101996294B Method for providing user customized certificate and signature |
03/18/2014 | US8677510 System, method, and device for communicating and storing and delivering data |
03/18/2014 | US8677509 Method and system for preventing copying of information from previews of webpages |