Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
01/2014
01/23/2014US20140025408 Method and system for ordering, loading and using admission tickets
01/23/2014US20140025399 Method for identifying a patient for later access to an electronic patient record for the patient using a communication device belonging to an inquiring person
01/23/2014DE112012001675T5 Verfahren zum Bereitstellen von verkäuferübergreifenden Unterstützungsdienstleistungen A method for providing multi-vendor support services
01/23/2014DE102013207165A1 Tragbares elektronisches Gerät und Zubehörgerät dafür und Betriebsverfahren für das tragbare elektronische Gerät Portable electronic device and accessory device for and method of operating the portable electronic device
01/23/2014DE102013102086A1 Elektronisches Gerät Electronic Instrument
01/23/2014DE102012220990B3 Verfahren und Anordnung zur sicheren Kommunikation zwischen Netzwerkeinrichtungen in einem Kommunikationsnetzwerk Method and system for secure communication between network devices in a communications network
01/22/2014EP2688090A1 Substrate processing system, method of confirmation of its state of use, and method of prevention of illicit use
01/22/2014EP2688010A1 Update of an operating system for a secure element
01/22/2014EP2688009A1 Verification device, verification program, and verification method
01/22/2014EP2688008A1 Biological information acquisition device, biological information comparison device, and program
01/22/2014EP2688007A1 Method of automatically extracting features from a computer readable file
01/22/2014EP2687003A1 Method for entering a code using a portable device, and associated portable device
01/22/2014EP2686807A1 Prevention of playback attacks using otp memory
01/22/2014EP2686805A1 File lock preservation
01/22/2014EP2686804A2 Techniques for securing a checked-out virtual machine in a virtual desktop infrastructure
01/22/2014EP2686803A1 Systems and methods for looking up anti-malware metadata
01/22/2014CN203405819U Intelligent power supply permission managing device based on radio frequency identification technology
01/22/2014CN203405818U Safe computer with personal identification function
01/22/2014CN103535007A Managed authentication on a distributed network
01/22/2014CN103535004A 匿名信令 Anonymous signaling
01/22/2014CN103534707A Method and device for controlling access to a computer system
01/22/2014CN103534706A Policy arbitration method, policy arbitration server, and program
01/22/2014CN103534705A Private and public applications
01/22/2014CN103534704A Method of treatment failure packets, network device and processor
01/22/2014CN103533172A Method for storing and managing photo information of mobile phone
01/22/2014CN103533026A Cloud platform-based mobile phone contact list information disguising method
01/22/2014CN103532968A Network access identity authentication method and system
01/22/2014CN103532960A Text encryption interaction method, encryption method and device, decryption method and device
01/22/2014CN103532956A Biological information-based authentication method in cloud operation system
01/22/2014CN103532939A Key generation in a communication system
01/22/2014CN103532938A Application data protection method and system
01/22/2014CN103532933A Method of realizing client operation authorization through fingerprint confirmation, and intelligent terminal
01/22/2014CN103532927A Financial cloud safety service platform based on mobile terminal and data protection method
01/22/2014CN103532925A Communication apparatus, communication method, communication system, and computer program
01/22/2014CN103532697A Realizing method and system for wireless information safety equipment
01/22/2014CN103532598A Multifunctional near field communication integrated system and method
01/22/2014CN103530963A Password safety protecting device and method of intelligent touch screen POS (point of sale) machine
01/22/2014CN103530841A Internet lottery secure transaction and expiry system and method based on vein recognition
01/22/2014CN103530767A Method for information security of metered amount charging system
01/22/2014CN103530582A Method and system for unlocking dynamic password of mobile terminal
01/22/2014CN103530581A Hard disk encrypting method and operation system
01/22/2014CN103530580A Terminal SD card security management method, device and terminal
01/22/2014CN103530579A Electronic product security device, magnetic head and card reader
01/22/2014CN103530578A Method for constructing STPM of android system
01/22/2014CN103530577A Computer anti-invading system
01/22/2014CN103530576A Computer infrared induction automatic screen locking device
01/22/2014CN103530575A Protection method for chip testing mode
01/22/2014CN103530574A Method for inserting and extracting hidden information based on English PDF document
01/22/2014CN103530573A Data decryption method
01/22/2014CN103530572A Method for protecting virtual machine files and user terminal
01/22/2014CN103530571A Image encryption method based on sine mapping and Logistic chaos sequence
01/22/2014CN103530570A Electronic document safety management system and method
01/22/2014CN103530569A Method and device for automatic setting of privacy data
01/22/2014CN103530568A Authority control method, device and system
01/22/2014CN103530567A Data safety copying method of on-line programmer
01/22/2014CN103530566A System for detecting safety performance of safety chip under induced error attacks
01/22/2014CN103530565A Method and device for scanning website program bugs based on web
01/22/2014CN103530564A Method and system for testing and verifying SQL injection vulnerability
01/22/2014CN103530563A System and method for updating authorized software
01/22/2014CN103530562A Method and device for identifying malicious websites
01/22/2014CN103530561A Method and device for preventing attacks of Trojan horse programs based on social engineering
01/22/2014CN103530560A Method, device and client side for advertisement blocking
01/22/2014CN103530559A Integrity protection system of Android system
01/22/2014CN103530558A Improvements in resisting the spread of unwanted code and data
01/22/2014CN103530557A Method and system for scanning virus apk based on cloud terminal mass samples
01/22/2014CN103530556A Control system effectively preventing computer from being attacked by hacker and viruses and data stealing
01/22/2014CN103530555A Method and device for preventing program from executing malice operation
01/22/2014CN103530554A Driver package installation method, driver package generation method, payment device and driving server
01/22/2014CN103530553A Mobile terminal with authorization card and authorization method
01/22/2014CN103530552A Method and device for reconstruction of Native API function
01/22/2014CN103530551A Software restriction method and system based on mobile Internet and cloud computing
01/22/2014CN103530550A Method and device for processing document/application program on mobile communication terminal
01/22/2014CN103530549A Method and device for processing document/application program on mobile communication terminal
01/22/2014CN103530548A Embedded terminal dependable starting method based on mobile dependable computing module
01/22/2014CN103530547A Method for logging into third-party application program through integrated authentication function based on Windows operating system
01/22/2014CN103530546A Identity authentication method based on mouse behaviors of user
01/22/2014CN103530545A Computer mouse with fingerprint signal identification
01/22/2014CN103530544A An organism certification system, an organism certification method, and an organism certification program
01/22/2014CN103530543A Behavior characteristic based user recognition method and system
01/22/2014CN103530542A Method for authenticating smartphone user based on multi-image switching
01/22/2014CN103530541A Identifying code generating method and device
01/22/2014CN103530540A User identity attribute detection method based on man-machine interaction behavior characteristics
01/22/2014CN103530539A Electronic device suitable for multiple users and login method
01/22/2014CN103530538A XML safety view querying method based on Schema
01/22/2014CN103530537A Data authorization method and device based on ERP
01/22/2014CN103530536A Method for embedding Java software watermark
01/22/2014CN103530535A Shell adding and removing method for Android platform application program protection
01/22/2014CN103530534A Android program ROOT authorization method based on signature verification
01/22/2014CN103530533A Digital rights management method and re-trading method
01/22/2014CN103530532A File encryption method and system
01/22/2014CN103530490A Simulator-type plug-in identification method and system for networking game
01/22/2014CN103530372A Website management system
01/22/2014CN103530305A Information processing apparatus, information processing method, program, and information processing system
01/22/2014CN103530201A Safety data repetition removing method and system applicable to backup system
01/22/2014CN103530181A Method and device for switching interfaces of electronic signature tool and electronic signature tool
01/22/2014CN103530161A Wireless information security equipment system and security protection method
01/22/2014CN103530106A Method and system of context-dependent transactional management for separation of duties
01/22/2014CN103530053A Mobile terminal, unlocking method for screen of mobile terminal and locking method for screen of mobile terminal
01/22/2014CN102467552B Internet device with copyright protection function and copyright protection method
01/22/2014CN102291241B Encryption and decryption method and device for multi-data security module