Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
02/2014
02/19/2014CN103595756A Method and apparatus for generating and utilizing a cloud service-based content shortcut object
02/19/2014CN103595740A A method and a system for updating a peer-to-peer network copyright content similarity graph
02/19/2014CN103595731A System and method for protecting account security
02/19/2014CN103595719A Authentication method and system based on fingerprints
02/19/2014CN103595698A Management method for digital rights
02/19/2014CN103593859A A method for generating airplane panel pictures in aviation training
02/19/2014CN103593673A On-line handwritten signature authentication method based on dynamic threshold
02/19/2014CN103593629A Board identification and encryption device
02/19/2014CN103593628A Logic combined register system and resistance energy analysis attack method
02/19/2014CN103593627A Double-layer composite register system and method for resisting energy analysis attack
02/19/2014CN103593626A Method for protecting chip test mode and debugging mode
02/19/2014CN103593625A Data storage method and device
02/19/2014CN103593624A Exhibition service platform encryption method
02/19/2014CN103593623A Sub-screen display method and device
02/19/2014CN103593622A FPGA-based design method of safe and trusted computer
02/19/2014CN103593621A Local trusted service manager
02/19/2014CN103593620A Information processing apparatus and information processing method
02/19/2014CN103593619A Method and system applied to data protection
02/19/2014CN103593618A Verification method and system for adoptability of electronic data evidence
02/19/2014CN103593617A Software integrity verifying system and method based on VMM (virtual machine monitor)
02/19/2014CN103593616A System and method for preventing and controlling USB flash disk viruses in enterprise information network
02/19/2014CN103593615A Method and device for detecting webpage tampering
02/19/2014CN103593614A Unknown virus retrieval method
02/19/2014CN103593613A Method, terminal, server and system for computer virus detection
02/19/2014CN103593612A Method and device for processing malicious programs
02/19/2014CN103593611A Method and device for fast recognizing viruses
02/19/2014CN103593610A Spyware self-adaptation induction and detection method based on artificial immunity
02/19/2014CN103593609A Trustworthy behavior recognition method and device
02/19/2014CN103593608A System and method for detecting malicious codes executed by virtual machine
02/19/2014CN103593607A Method and device for file system isolation of host machine and virtual machine
02/19/2014CN103593606A Contextual information managing method and system
02/19/2014CN103593605A Android platform applications dynamic analysis system based on permission use behaviors
02/19/2014CN103593604A A multi-security-CPU system
02/19/2014CN103593603A Protecting secure software in a multi-security-CPU system
02/19/2014CN103593602A User authorization management method and system
02/19/2014CN103593601A Authentication device, method and system
02/19/2014CN103593600A Personal onboard public key synchronizer and personal onboard public key synchronization method
02/19/2014CN103593599A Electronic device and fingerprint authentication method thereof
02/19/2014CN103593598A User online authentication method and system based on living body detection and face recognition
02/19/2014CN103593597A Method for controlling flashlight of smart mobile terminal
02/19/2014CN103593596A USB KEY for collecting external biological characteristics
02/19/2014CN103593595A Face-recognition-based weak current cabinet and safety control method thereof
02/19/2014CN103593594A System and method for providing secure access to an electronic device using facial biometric identification and screen gesture
02/19/2014CN103593593A Computer safety control method
02/19/2014CN103593592A User data encryption and decryption method
02/19/2014CN103593591A User information access control method based on RBAC access control model
02/19/2014CN103593590A Mixing additivity multi-time watermark embedding method and decoding method based on cloud environment
02/19/2014CN103593589A Method for protecting on-chip network intellectual properties through mixed routing algorithm
02/19/2014CN103593588A Regional digital copyright access authentication method and system
02/19/2014CN103593186A Method and device for operating registry
02/19/2014CN103593185A Single-Linux-inner-core-based method for multiple Android systems to share input equipment and display equipment
02/19/2014CN102131557B Network game system and client game device
02/19/2014CN102112991B An apparatus for managing user authentication
02/19/2014CN102110198B Anti-counterfeiting method for web page
02/19/2014CN102025872B Image processing apparatus, remote management system, license update method
02/19/2014CN102004869B 认证设备和认证方法 Certified devices and authentication methods
02/19/2014CN101859361B Safety information transplantation between equipments
02/19/2014CN101841353B Method and equipment for encrypting data through softdog
02/19/2014CN101802836B Systems and methods for partial matching searches of encrypted retained data
02/19/2014CN101739532B Method and system for processing digital content according to a workflow
02/19/2014CN101447005B Method and system for utilizing GPS information to secure digital media
02/18/2014US8656508 Licensed feature enablement manager
02/18/2014US8656504 Method and apparatus for protecting account numbers and passwords
02/18/2014US8656502 Controlling use of a computer program installed on a computer
02/18/2014US8656501 Method and device for selectively protecting one of a plurality of methods of a class of an application written in an object-orientated language
02/18/2014US8656500 Method and device for controlling user dialog on technical equipment
02/18/2014US8656494 System and method for optimization of antivirus processing of disk files
02/18/2014US8656493 Decoy network technology with automatic signature generation for intrusion detection and intrusion prevention systems
02/18/2014US8656489 Method and apparatus for accelerating load-point scanning
02/18/2014US8656487 System and method for filtering write requests to selected output ports
02/18/2014US8656483 System for locking electronic device and method thereof
02/18/2014US8656479 Policy-based content filtering
02/18/2014US8656476 Providing notification of spam avatars
02/18/2014US8656474 Biometric authentication device, biometric authentication method and storage medium
02/18/2014US8656469 Methods and apparatus for dynamic user authentication using customizable context-dependent interaction across multiple verification objects
02/18/2014US8656466 Data processing with a posteriori or a priori authentication
02/18/2014US8656463 Determining a trust level of a user in a social network environment
02/18/2014US8656461 Copy-paste trust system
02/18/2014US8656459 Mobile anti-phishing
02/18/2014US8656385 Data processor, data monitoring method thereof, and recording medium storing data monitoring program thereof
02/18/2014US8656184 Installation of application package packaging plural applications
02/18/2014US8656183 Federated digital rights management scheme including trusted systems
02/18/2014US8656180 Token activation
02/18/2014US8656178 Method, system and program product for modifying content usage conditions during content distribution
02/18/2014US8656166 Storage and authentication of data transactions
02/18/2014US8656161 Information sharing system, information sharing method, group management program and compartment management program
02/18/2014US8656152 Image forming apparatus, host apparatus and encryption method of job object document thereof
02/18/2014US8656147 Methods and apparatus for integrity measurement of virtual machine monitor and operating system via secure launch
02/18/2014US8656146 Computer system comprising a secure boot mechanism
02/18/2014US8656127 Information processing terminal, method, program, and integrated circuit for controlling access to confidential information, and recording medium having the program recorded thereon
02/18/2014US8655844 File version tracking via signature indices
02/18/2014US8655785 Computer data product license installation / update confirmation
02/18/2014US8655784 Method and system for the supply of data, transactions and electronic voting
02/18/2014US8654977 System and method for controlling access between Bluetooth devices
02/18/2014US8654109 Projector, projection display system, and corresponding method and recording medium
02/18/2014CA2626314C Method and system for tracking and managing rights for digital music
02/15/2014CA2823745A1 User authentication device having multiple isolated host interfaces
02/13/2014WO2014026199A1 System for providing multiple levels of authentication before delivering private content to client devices
02/13/2014WO2014025988A1 Secure data protection with improved read-only memory locking during system pre-boot
02/13/2014WO2014025809A1 Computerized method and system for managing secure content sharing in a networked secure collaborative exchange environment