Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
02/2014
02/26/2014CN103608819A Enabling a software application to be executed on a mobile station
02/26/2014CN103608763A Systems and methods for tracing the source of printed pages
02/26/2014CN103607599A Television user registration system and method based on fingerprint identification
02/26/2014CN103607536A Control method for camera and camera
02/26/2014CN103607450A Storage system access control method
02/26/2014CN103607420A Safe electronic medical system for cloud storage
02/26/2014CN103607419A High-quality user account anti-sharing method and system
02/26/2014CN103607413A Method and device for detecting website backdoor program
02/26/2014CN103607387A A network login authentication cloud service system based on face identification and a method
02/26/2014CN103607378A Access control method
02/26/2014CN103607273A Data file encryption and decryption method based on time limit control
02/26/2014CN103606052A 企业信息管理系统 Enterprise Information Management System
02/26/2014CN103605955A Image capturing apparatus based on single sensor and optical filtering
02/26/2014CN103605938A Novel antitheft iPad
02/26/2014CN103605937A Terminal device and safety display module thereof
02/26/2014CN103605936A Security within integrated circuits
02/26/2014CN103605935A Firming data information security system
02/26/2014CN103605934A Protection method and device for executable files
02/26/2014CN103605933A Key information storing method and device based on standard unit technology
02/26/2014CN103605932A Data security device and anti-disassembling machine network thereof
02/26/2014CN103605931A Special payment router and payment information encryption method thereof
02/26/2014CN103605930A Double file anti-divulging method and system based on HOOK and filtering driving
02/26/2014CN103605929A Multi-user-supportive trusted hardware equipment and application method thereof
02/26/2014CN103605928A Method and system for protecting privacy of images
02/26/2014CN103605927A Encryption and decryption method based on embedded Linux system
02/26/2014CN103605926A Webpage tampering detecting method and device
02/26/2014CN103605925A Webpage tampering detecting method and device
02/26/2014CN103605924A Method and device for preventing malicious program from attacking online payment page
02/26/2014CN103605923A USB (universal serial bus) Key equipment identifier
02/26/2014CN103605922A Download protecting method and device
02/26/2014CN103605921A Kernel extension safety access method and device
02/26/2014CN103605920A Method and system for dynamic application program safety management based on SEAndroid platform
02/26/2014CN103605919A Method and device for generating software authentication files and method and device for authenticating software
02/26/2014CN103605918A Iris recognition PDM rights management method and device
02/26/2014CN103605917A Spreadsheet system based on multi-user environment and implementation method of spreadsheet system
02/26/2014CN103605916A RBAC (Role-Based policies Access Control) accessing control model based on organization
02/26/2014CN103605915A Intelligent terminal protective device
02/26/2014CN103605914A Method for computing piracy predictive indexes of network movie resources
02/26/2014CN103605741A Object encryption storage method, device and system
02/26/2014CN103605674A File system access for WEB applications and native code modules
02/26/2014CN103605597A Configurable computer protection system and method
02/26/2014CN103605474A Control method and control system of electronic equipment with touch screen and fingerprint sensor
02/26/2014CN103605469A Data information interaction method and system
02/26/2014CN102693298B Deep recovery method for database content
02/26/2014CN102332069B Method and system for full life cycle security management of virtual machine
02/26/2014CN102227734B Client computer for protecting confidential file, server computer therefor, method therefor
02/26/2014CN102222185B Method for preventing operating system starting file from being infected
02/26/2014CN102203795B Authentication - circles of trust
02/26/2014CN102171970B Base station and client device
02/25/2014US8661556 Method and apparatus for providing network security using role-based access control
02/25/2014US8661554 Controlling program, image forming apparatus and print controlling method
02/25/2014US8661553 Semiconductor memory card and data reading apparatus, and data reading/reproducing apparatus
02/25/2014US8661552 Provisioning a computing system for digital rights management
02/25/2014US8661549 Method and apparatus for obfuscating program source codes
02/25/2014US8661548 Embedded system administration and method therefor
02/25/2014US8661545 Classifying a message based on fraud indicators
02/25/2014US8661542 Method and system for detecting characteristics of a wireless network
02/25/2014US8661541 Detecting user-mode rootkits
02/25/2014US8661540 Method and apparatus for secure credential entry without physical entry
02/25/2014US8661538 System and method for determining a risk root cause
02/25/2014US8661536 Side channel attack analysis
02/25/2014US8661535 Method for making secure the execution of an intermediate language software code in a portable device
02/25/2014US8661532 Method and apparatus for authenticating password
02/25/2014US8661530 Multi-layer orientation-changing password
02/25/2014US8661529 Information processing device
02/25/2014US8661528 Providing notice of patent and other legal rights
02/25/2014US8661527 Authenticator, authenticatee and authentication method
02/25/2014US8661524 Selective desktop control of virtual private networks (VPN's) in a multiuser environment
02/25/2014US8661516 Biometric authentication device and biometric authentication method
02/25/2014US8661515 Audible authentication for wireless network enrollment
02/25/2014US8661514 Information processing device, information processing method, and program
02/25/2014US8661512 Method for managing access to protected computer resources
02/25/2014US8661509 Solicited authentication of a specific user
02/25/2014US8661508 Parental controls for entertainment content
02/25/2014US8661504 Secure social web orchestration via a security model
02/25/2014US8661503 Flexible document security for procurement agents
02/25/2014US8661430 Device and portable storage device which are capable of transferring rights object, and a method of transferring rights object
02/25/2014US8661348 Methods and systems to process an image
02/25/2014US8661342 Mail merge integration techniques
02/25/2014US8661263 Meta-complete data storage
02/25/2014US8661262 User authentication system, terminal used in the same, authentication verification device, and program
02/25/2014US8661261 Method of controlling access to a contactless interface in an integrated circuit with two communication interfaces with contact and contactless
02/25/2014US8661247 Computer implemented method for performing cloud computing on data being stored pseudonymously in a database
02/25/2014US8661242 Autonomous password update in SNMPv3 computer network
02/25/2014US8661231 Multi-function instruction that determines whether functions are installed on a system
02/25/2014US8661076 Business networking information feed alerts
02/25/2014US8660963 Contents copying management system, copying management device, copying management method, contents copying apparatus and contents copying method
02/25/2014US8660962 Method and apparatus for providing coverage for transmission of data
02/25/2014US8660960 Document digest allowing selective changes to a document
02/25/2014US8660959 Content distribution platform
02/25/2014US8660958 Method and system for the supply of data, transactions and electronic voting
02/25/2014US8660529 Mobile terminal for preventing illegitimate change of identification number by matching authentication information
02/25/2014US8660321 Authentication system, apparatus, authentication method, and storage medium with program stored therein
02/25/2014US8660269 Method and system for securing data utilizing redundant secure key storage
02/25/2014US8660266 Method of delivering direct proof private keys to devices using an on-line service
02/25/2014US8660264 Method and apparatus for minimizing differential power attacks on processors
02/25/2014CA2499688C A method and system for enforcing a security policy via a security virtual machine
02/20/2014WO2014028757A1 Secure data exchange using messaging service
02/20/2014WO2014028663A2 Protection scheme for embedded code
02/20/2014WO2014028516A1 System and method for mobile or web-based payment/credential process