Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
11/2013
11/27/2013CN103413106A Method and device for protecting chip top-layer covering integrity
11/27/2013CN103413105A Device for protecting shell of information safety device
11/27/2013CN103413104A Processing method and device for transaction sensitive information
11/27/2013CN103413103A System and method for inputting graphical passwords
11/27/2013CN103413102A Secret data management device and secret data management method as well as mobile terminal
11/27/2013CN103413101A System and method for preventing electronic data from being tampered
11/27/2013CN103413100A File security protection system
11/27/2013CN103413099A Data storage method and device and enciphered data accessing method and device
11/27/2013CN103413098A Method, system and device for hardware encryption
11/27/2013CN103413097A Encryption method, encryption device and security chip
11/27/2013CN103413096A Data transmission method and device and data receiving method and device
11/27/2013CN103413095A Method and device for managing mobile terminal
11/27/2013CN103413094A Telemetering encryption system applicable to spacecraft CPU (central processing unit)
11/27/2013CN103413093A XEN cloud platform virtual machine isolation method based on memory isolation
11/27/2013CN103413092A Method for forbidding malicious codes from being injected into network terminal
11/27/2013CN103413091A Method and device for monitoring malicious behaviors
11/27/2013CN103413090A System and method for detection and treatment of malware on data storage devices
11/27/2013CN103413089A Mobile terminal and method thereof for achieving dual system
11/27/2013CN103413088A Computer document operational safety audit system
11/27/2013CN103413087A Optical module, equipment employing optical module and verification method
11/27/2013CN103413086A Method and device for achieving security roaming of reliable mobile storage media
11/27/2013CN103413085A Hotlink protection method in unencrypted master-slave communication mode
11/27/2013CN103413084A Method and device for controlling display content of code box
11/27/2013CN103413083A Security defending system for single host
11/27/2013CN103413082A Application program control method and device and client-side
11/27/2013CN103413081A After-password-input prompt method, password modifying method and electronic equipment
11/27/2013CN103413080A Password protection realization method based on gesture
11/27/2013CN103413079A Method for generating ID (identity card) code on basis of encryption calculation of TID (terminal identification) code and EPC (electronic product code)
11/27/2013CN103413078A Double-layer online identification system and identification method based on user's mark and handwriting
11/27/2013CN103413077A Anti-theft system of vehicle-mounted terminal
11/27/2013CN103413076A Block protection method for Android application programs
11/27/2013CN103413075A Method and device for protecting JAVA executable program through virtual machine
11/27/2013CN103413074A Method and device for protecting software through API
11/27/2013CN103413073A Method and equipment for protecting JAVA executable program
11/27/2013CN103413072A Application program protection method and device
11/27/2013CN103413071A Method for protecting data in software
11/27/2013CN103413070A Method and device for calibrating local clock
11/27/2013CN103413069A Method for protecting software written by object--oriented language
11/27/2013CN103412766A User right-based data access method and device
11/27/2013CN103412735A Electronic access controller and realizing method of interaction of electronic access controller and general electronic equipment
11/27/2013CN103412730A Intelligent terminal printing system based on cloud computing technology
11/27/2013CN102497479B Method for smart phone to judge Trojprograms according to application software behaviors
11/27/2013CN102324007B Abnormal detection method based on data mining
11/27/2013CN102281540B Method and system for searching and killing mobile phone malicious software
11/27/2013CN102243699B Malicious code detection method and system
11/27/2013CN102012989B Threshold and key-based authorization method in software as service (SaaS)
11/27/2013CN101939724B Data processing device and method for executing obfuscated programs
11/26/2013US8595856 Apparatus and method for installing software
11/26/2013US8595854 Processing recordable content in a stream
11/26/2013US8595853 DRM system
11/26/2013US8595848 Method for moving rights object and method for managing rights of issuing rights object and system thereof
11/26/2013US8595841 System and method for bidirectional trust between downloaded applications and mobile devices including a secure charger and malware scanner
11/26/2013US8595838 Contextual alert of an invasion of a computer system
11/26/2013US8595837 Security event management apparatus, systems, and methods
11/26/2013US8595835 System to enable detecting attacks within encrypted traffic
11/26/2013US8595834 Detecting unauthorized use of computing devices based on behavioral patterns
11/26/2013US8595825 Image processing apparatus, processing flow control method, image forming system, and storage medium
11/26/2013US8595824 Task-based access control in a virtualization environment
11/26/2013US8595819 System and method for distributed multi-processing security gateway
11/26/2013US8595816 User authentication system and method for the same
11/26/2013US8595813 IC card for encryption or decryption process and encrypted communication system and encrypted communication method using the same
11/26/2013US8595809 Reusable authentication experience tool
11/26/2013US8595807 Method, system, and device for implementing device addition in Wi-Fi device to device network
11/26/2013US8595804 System and method for device security with a plurality of authentication modes
11/26/2013US8595803 Protection against malware on web resources utilizing scripts for content scanning
11/26/2013US8595797 Enforcing web services security through user specific XML schemas
11/26/2013US8595796 Apparatus and method for authorization for access point name (APN) usage in a specific access
11/26/2013US8595793 System and method for user login to a multimedia system using a remote control
11/26/2013US8595512 Data control method of cloud storage
11/26/2013US8595510 Methods, apparatus and systems to improve security in computer systems
11/26/2013US8595508 Method of secure encryption
11/26/2013US8595507 Client-based authentication
11/26/2013US8595506 Authentication system and method using electronic tags
11/26/2013US8595503 Method of self-authenticating a document while preserving critical content in authentication data
11/26/2013US8595500 Information processing apparatus and method
11/26/2013US8595499 Method for identifying a patient for later access to an electronic patient record for the patient using a communication device belonging to an inquiring person
11/26/2013US8595498 Method for authenticating access to a secured chip by test device
11/26/2013US8595494 Method for managing access to protected resources in a computer network, physical entities and computer programs therefor
11/26/2013US8595488 Apparatus, system and method for securing digital documents in a digital appliance
11/26/2013US8595485 Security management method and system for WAPI terminal accessing IMS network
11/26/2013US8595480 Distributed computing network using multiple local virtual machines
11/26/2013US8595272 File server system and file management method using management policy and setting file to indicate management competence of storage area
11/26/2013US8595256 Policy generation and conversion system, policy distribution system, and method and program therefor
11/26/2013US8595170 Stateful reference monitor
11/26/2013US8595143 Maintaining privacy for transactions performable by a user device having a security module
11/26/2013US8595142 Maintaining privacy for transactions performable by a user device having a security module
11/26/2013US8595140 Firmware distributing device, program, and method
11/26/2013US8595139 Content distribution program, content distribution method, server, content utilization apparatus, and content utilization system
11/26/2013US8595138 Packaging system for customizing software
11/26/2013US8594492 Recording apparatus and reproducing apparatus
11/26/2013US8594333 Secure key access with one-time programmable memory and applications thereof
11/26/2013US8594325 Enciphering apparatus and method, deciphering apparatus and method as well as information processing apparatus and method
11/26/2013US8594180 3D video encoding
11/26/2013US8593696 Document securization method and device printing a distribution of dots on said document
11/26/2013CA2495759C Method and system of external data storage
11/26/2013CA2459029C A anti keylog editor of activex base
11/21/2013WO2013173806A2 Systems and methods for determining a likelihood that an entity is an author of original content
11/21/2013WO2013173729A1 Methods and systems for providing hardware security functions using flash memories
11/21/2013WO2013173619A1 System and method for autocompletion and alignment of user gestures
11/21/2013WO2013173184A1 Computer readable storage media for multi-factor authentication and methods and systems utilizing same