| Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) | 
|---|
| 03/05/2014 | CN203465726U Device for protecting software | 
| 03/05/2014 | CN203465725U Electronic signature expansion device | 
| 03/05/2014 | CN203465717U Mobile storage and charging device | 
| 03/05/2014 | CN103620690A Encrypted transport solid-state disk controller | 
| 03/05/2014 | CN103620617A Method and apparatus for memory encryption with integrity check and protection against replay attacks | 
| 03/05/2014 | CN103620616A Access control right management method and device | 
| 03/05/2014 | CN103620615A Access control architecture | 
| 03/05/2014 | CN103620614A Secure handling of interrupted events | 
| 03/05/2014 | CN103620613A System and method for virtual machine monitor based anti-malware security | 
| 03/05/2014 | CN103620612A Computing device including a port and a guest domain | 
| 03/05/2014 | CN103620611A Method and apparatus for dynamic, real-time ad insertion based on meta-data within a hardware based root of trust | 
| 03/05/2014 | CN103620610A License administration device and license administration method | 
| 03/05/2014 | CN103620609A Method for playing digital contents protected with a DRM (digital right management) scheme and corresponding system | 
| 03/05/2014 | CN103619001A Short message processing method, device and mobile terminal | 
| 03/05/2014 | CN103618872A Minimally invasive surgery video system capable of remotely transmitting surgery process video information | 
| 03/05/2014 | CN103618790A Method and system for obtaining API service | 
| 03/05/2014 | CN103618718A Processing method and device aiming at denial of service attack | 
| 03/05/2014 | CN103618611A Identity verification method based on challenge responses and fingerprint identification | 
| 03/05/2014 | CN103618604A Identity authentication method and system | 
| 03/05/2014 | CN103617405A Lost electronic equipment locating method and system | 
| 03/05/2014 | CN103617404A Storing device of safety partitions | 
| 03/05/2014 | CN103617403A PDF file digital signature and verification method and system | 
| 03/05/2014 | CN103617402A Multimedia electronic data forensic report and generating and displaying method and system thereof | 
| 03/05/2014 | CN103617401A Method and device for protecting data files | 
| 03/05/2014 | CN103617400A File safe-case password resetting method | 
| 03/05/2014 | CN103617399A Data file protecting method and device | 
| 03/05/2014 | CN103617398A Protecting method and device for data files | 
| 03/05/2014 | CN103617397A Safety assessment method and system for applications in intelligent terminal | 
| 03/05/2014 | CN103617396A Detection method and system of vulnerability exploitation | 
| 03/05/2014 | CN103617395A Method, device and system for intercepting advertisement programs based on cloud security | 
| 03/05/2014 | CN103617394A SDK providing and invoking method and associated device | 
| 03/05/2014 | CN103617393A Method for mobile internet malicious application software detection based on support vector machines | 
| 03/05/2014 | CN103617392A Method and device for safety scanning external storage device of smart terminal | 
| 03/05/2014 | CN103617391A Method, device and virtual machine for detecting malicious programs | 
| 03/05/2014 | CN103617390A Malicious webpage judgment method, device and system | 
| 03/05/2014 | CN103617389A Terminal rights management method and terminal device | 
| 03/05/2014 | CN103617388A Implementation method for secure operating system with process credibility authentication | 
| 03/05/2014 | CN103617387A Method and device for preventing application program from being installed automatically | 
| 03/05/2014 | CN103617386A Online teaching identification system | 
| 03/05/2014 | CN103617385A Terminal and method for unlocking screen | 
| 03/05/2014 | CN103617384A Method and system for verifying starting permissions of bill sorting machine | 
| 03/05/2014 | CN103617383A Sound unlocking system and method thereof based on mobile terminal | 
| 03/05/2014 | CN103617382A Privacy protection method and device | 
| 03/05/2014 | CN103617381A Permission configuration method and permission configuration system of equipment | 
| 03/05/2014 | CN103617380A Application program authority dynamic control method and system | 
| 03/05/2014 | CN103617379A Multimedia file playing method and player | 
| 03/05/2014 | CN103617378A DRM content protection system and method based on mobile intelligent terminal | 
| 03/05/2014 | CN103617377A Content and right packaging method | 
| 03/05/2014 | CN103617376A USBKEY with PIN verification function and verification method | 
| 03/05/2014 | CN103617139A Airborne high-speed large-capacity data transmission and storage system | 
| 03/05/2014 | CN103617134A Portable data safety storage device and safety storage implementation method by same | 
| 03/05/2014 | CN103617127A Memory device with subareas and memorizer area dividing method | 
| 03/05/2014 | CN103617092A Browser based plug-in running method and device | 
| 03/05/2014 | CN103617082A Communication method and device between applications based on suspension operating panel | 
| 03/05/2014 | CN103617069A Malware detecting method and virtual machine | 
| 03/05/2014 | CN103617005A Access method, device and system for intelligent card | 
| 03/05/2014 | CN103616998A User information acquiring method and user information acquiring device | 
| 03/05/2014 | CN103616868A Configuration method and system for process plant | 
| 03/05/2014 | CN102346830B Gradient histogram-based virus detection method | 
| 03/05/2014 | CN102339368B IP (Internet Protocol) core for measuring BIOS (Basic Input Output System) and measurement method | 
| 03/05/2014 | CN102262716B Real-time protection method and device | 
| 03/05/2014 | CN102138145B Cryptographically controlling access to documents | 
| 03/05/2014 | CN102082780B Method and device for verifying security | 
| 03/05/2014 | CN101779210B Method and apparatus for protection of program against monitoring flow manipulation and against incorrect program running | 
| 03/04/2014 | US8667609 System to inform about trademarks similar to provided input | 
| 03/04/2014 | US8667598 Reproduction rule evaluation device, reproduction rule evaluation method, recording medium and program | 
| 03/04/2014 | US8667594 Securing file trust with file format conversions | 
| 03/04/2014 | US8667586 Backward researching time stamped events to find an origin of pestware | 
| 03/04/2014 | US8667584 Formal analysis of the quality and conformance of information flow downgraders | 
| 03/04/2014 | US8667577 Remote registration of biometric data into a computer | 
| 03/04/2014 | US8667566 Audio based human-interaction proof | 
| 03/04/2014 | US8667563 Systems and methods for displaying personalized content | 
| 03/04/2014 | US8667561 Method, apparatus and server for user verification | 
| 03/04/2014 | US8667558 Application identity design | 
| 03/04/2014 | US8667328 System and method for protecting windows system state | 
| 03/04/2014 | US8667305 Securing a password database | 
| 03/04/2014 | US8667302 Signature generating device and method, signature verifying device and method, and computer product | 
| 03/04/2014 | US8667299 Preventing unauthorized distribution of media content within a global network | 
| 03/04/2014 | US8667298 Module signing for unprivileged users to create and load trustworthy kernel modules | 
| 03/04/2014 | US8667297 Key with integral biometric input device | 
| 03/04/2014 | US8667296 Generating a password from a media item | 
| 03/04/2014 | US8667295 Encoding a validity period in a password | 
| 03/04/2014 | US8667294 Apparatus and method for preventing falsification of client screen | 
| 03/04/2014 | US8667293 Cryptographic data distribution and revocation for handheld medical devices | 
| 03/04/2014 | US8667291 Unauthorized contents detection system | 
| 03/04/2014 | US8667287 Transaction auditing for data security devices | 
| 03/04/2014 | US8667268 Scalable distributed web-based authentication | 
| 03/04/2014 | US8667134 Methods and systems for transaction record delivery using thresholds and multi-stage protocol | 
| 03/04/2014 | US8667036 Bonding contents on separate storage media | 
| 03/04/2014 | US8666903 System and method for leveraging procurement across companies and company groups | 
| 03/04/2014 | US8666899 Information communication system, user management apparatus thereof, information providing apparatus thereof and user terminal apparatus thereof | 
| 03/04/2014 | US8666827 Contents servicing system and method through a network | 
| 03/04/2014 | US8666808 Media content notification via communications network | 
| 03/04/2014 | US8666369 Mobile phone provided with a secured identification system | 
| 03/04/2014 | US8666071 System and method for delivering satellite services at multiple security levels | 
| 03/04/2014 | US8666070 Method and apparatus for minimizing differential power attacks on processors | 
| 03/04/2014 | US8666068 Method for scrambling shaped data | 
| 03/04/2014 | US8666065 Real-time data encryption | 
| 03/04/2014 | US8666063 Method and apparatus for minimizing differential power attacks on processors | 
| 03/04/2014 | US8665944 Image signal processor and method thereof |