Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
12/25/2013 | CN203368084U 多功能的智能充电装置 Multifunctional intelligent charging device |
12/25/2013 | CN203366339U Notebook computer anti-theft device |
12/25/2013 | CN203366338U Computer network security controller |
12/25/2013 | CN203366337U Special password-entered type case for computer and DVR |
12/25/2013 | CN203366336U Industrial-grade real-time-clone type complex hard disk data protection system |
12/25/2013 | CN203366335U Monitoring self-configurator for survivable system |
12/25/2013 | CN203366334U Multiple-verification internet banking verification device |
12/25/2013 | CN203366333U Microcomputer software and data protection card based on anti-detective technology |
12/25/2013 | CN203366205U Multiple-hard-disk automatic serial-port connection switching device |
12/25/2013 | CN103477367A Key fob with protected biometric sensor |
12/25/2013 | CN103477344A Method for interchanging data in a secure runtime environment |
12/25/2013 | CN103477343A Method for operating a microprocessor unit, in particular in a mobile terminal |
12/25/2013 | CN103477342A Device access using voice authentication |
12/25/2013 | CN103477341A Efficient implementation of hash algorithm on a processor |
12/25/2013 | CN103475672A Method for setting firewall with lowest cost of cloud computing platform |
12/25/2013 | CN103475671A Method for detecting rogue programs |
12/25/2013 | CN103475562A Method and system for achieving virtual local area network data safety |
12/25/2013 | CN103475488A Method and system for identifying identity |
12/25/2013 | CN103475485A Identity authentication supporting platform and authentication method based on digital certificate interconnection and interworking |
12/25/2013 | CN103475484A Usb key authentication method and system |
12/25/2013 | CN103475470A Authenticating users based upon an identity footprint |
12/25/2013 | CN103473678A Transaction system, method and device using human-computer interface |
12/25/2013 | CN103473517A Password-stealing-preventing random-variation numeric keypad |
12/25/2013 | CN103473516A Confidential computer unavailable for network technology |
12/25/2013 | CN103473515A Management method, device and client terminal of private data of browser |
12/25/2013 | CN103473514A Data storage access method and device |
12/25/2013 | CN103473513A Method for encrypting files of digital audio and video library |
12/25/2013 | CN103473512A Mobile storage medium management method and mobile storage medium management device |
12/25/2013 | CN103473511A Media playing method and media playing equipment |
12/25/2013 | CN103473510A Batch destruction device and method for classified document |
12/25/2013 | CN103473509A Android platform malware automatic detecting method |
12/25/2013 | CN103473508A Security verification method during kernel operation of operation system |
12/25/2013 | CN103473507A Android malicious software detection method based on method call graph |
12/25/2013 | CN103473506A Method and device of recognizing malicious APK files |
12/25/2013 | CN103473505A Scanning prompt method and device for software vulnerabilities |
12/25/2013 | CN103473504A Android malicious code detection method based on class analysis |
12/25/2013 | CN103473503A Platform and method for dynamic software license |
12/25/2013 | CN103473502A Method and system for acquiring Root rights of android-based mobile terminal |
12/25/2013 | CN103473501A Malware tracking method based on cloud safety |
12/25/2013 | CN103473500A APK (Android Package) signature verification method in Android system |
12/25/2013 | CN103473499A Acquisition device and data authorization method thereof |
12/25/2013 | CN103473498A Application program security verification method and terminal |
12/25/2013 | CN103473497A Automatic walking equipment, code resetting method thereof and automatic walking system |
12/25/2013 | CN103473496A USB (universal serial bus) key integrating program, certificate and data |
12/25/2013 | CN103473495A Field service terminal permission management system and method thereof |
12/25/2013 | CN103473494A Application running method, device and terminal device |
12/25/2013 | CN103473493A Online handwriting authentication and template expansion method based on character etymons |
12/25/2013 | CN103473492A Method and user terminal for recognizing permission |
12/25/2013 | CN103473491A Writing process based mobile terminal user identification system and method |
12/25/2013 | CN103473490A Directory encryption and access method and device of encrypted directory |
12/25/2013 | CN103473489A Permission validation system and permission validation method for safety production comprehensive supervision |
12/25/2013 | CN103473488A Anti-piracy method and system for android application |
12/25/2013 | CN103473487A Product software network verification encryption method and product software network verification encryption system |
12/25/2013 | CN103473486A Electronic signature tool and software protection method and device based on same |
12/25/2013 | CN103473485A Transfer method for digital license authorization certificate among terminal equipment |
12/25/2013 | CN103473381A Database security assessment method |
12/25/2013 | CN103473353A Web safety-oriented database security protection method and system |
12/25/2013 | CN103473350A File processing method and equipment |
12/25/2013 | CN103473281A Digital audio and video library system |
12/25/2013 | CN103473165A Computer protection method and computer protection device based on CPU (Central Processing Unit) load |
12/25/2013 | CN103473085A Method and equipment for loading target application on mobile terminal |
12/25/2013 | CN103473017A File penetration writing method based on EWF (enhanced write filter) memory protection system |
12/25/2013 | CN103465649A Intelligent anti-counterfeiting seal with information tracing, authority controlling and seal impression authenticity verifying functions |
12/25/2013 | CN102857641B Method and system for preventing anti-theft mode from being broken by third-party desktop |
12/25/2013 | CN102636244B Weighing method of electronic scale |
12/25/2013 | CN102541937B Webpage information detection method and system |
12/25/2013 | CN102339371B Method, device and virtual machine for detecting rogue program |
12/25/2013 | CN102065194B Information processing system, utilization constraint method and recording medium |
12/25/2013 | CN102054136B Computing system and methods thereof |
12/25/2013 | CN102012985B Sensitive data dynamic identification method based on data mining |
12/24/2013 | USRE44671 System and method for verification of personal identity |
12/24/2013 | US8615810 Method and system for preventing copying of information from previews of webpages |
12/24/2013 | US8615804 Complementary character encoding for preventing input injection in web applications |
12/24/2013 | US8615803 Method, computer program element and a system for processing alarms triggered by a monitoring system |
12/24/2013 | US8615797 Selective item access provision in response to active item ascertainment upon device transfer |
12/24/2013 | US8615794 Methods and apparatus for increased security in issuing tokens |
12/24/2013 | US8615791 Multi-domain login and messaging |
12/24/2013 | US8615789 Trust assertion using hierarchical weights |
12/24/2013 | US8615787 Secure internet transaction method and apparatus |
12/24/2013 | US8615784 Group interactive network (GIN) system |
12/24/2013 | US8615667 Processor and processor system |
12/24/2013 | US8615665 Method for providing high assurance integrity of installed software images in a software defined radio |
12/24/2013 | US8615664 Acquisition and particular association of inference data indicative of an inferred mental state of an authoring user and source identity data |
12/24/2013 | US8615662 Password authentication via a one-time keyboard map |
12/24/2013 | US8615652 System and method for providing load balanced secure media content and data delivery in a distributed computing environment |
12/24/2013 | US8615472 Method of providing a virtual product to third parties |
12/24/2013 | US8615470 Authentication and tracking system |
12/24/2013 | US8615079 Cryptography circuit protected against observation attacks, in particular of a high order |
12/24/2013 | US8614813 Relay server for print service and method of controlling same |
12/24/2013 | US8614807 Image forming apparatus, user restriction method and use history generation method |
12/24/2013 | CA2456400C Publishing digital content within a defined universe such as an organization in accordance with a digital rights management (drm) system |
12/19/2013 | WO2013188599A2 Securely communicating between a card reader and a mobile device |
12/19/2013 | WO2013188550A1 Client-side signature repository in a networked storage system |
12/19/2013 | WO2013188455A1 Systems and methods for accessing a virtual desktop |
12/19/2013 | WO2013188284A1 Embedded module system with encrypted token authentication system |
12/19/2013 | WO2013188192A1 Techniques for providing dynamic account and device management |
12/19/2013 | WO2013188146A1 Systems and methods for implementing multi-factor authentication |
12/19/2013 | WO2013187893A1 Data communication |
12/19/2013 | WO2013187789A1 System and method for high security biometric access control |
12/19/2013 | WO2013187097A1 Content transmission device |