| Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) | 
|---|
| 11/27/2013 | CN103413106A Method and device for protecting chip top-layer covering integrity  | 
| 11/27/2013 | CN103413105A Device for protecting shell of information safety device  | 
| 11/27/2013 | CN103413104A Processing method and device for transaction sensitive information  | 
| 11/27/2013 | CN103413103A System and method for inputting graphical passwords  | 
| 11/27/2013 | CN103413102A Secret data management device and secret data management method as well as mobile terminal  | 
| 11/27/2013 | CN103413101A System and method for preventing electronic data from being tampered  | 
| 11/27/2013 | CN103413100A File security protection system  | 
| 11/27/2013 | CN103413099A Data storage method and device and enciphered data accessing method and device  | 
| 11/27/2013 | CN103413098A Method, system and device for hardware encryption  | 
| 11/27/2013 | CN103413097A Encryption method, encryption device and security chip  | 
| 11/27/2013 | CN103413096A Data transmission method and device and data receiving method and device  | 
| 11/27/2013 | CN103413095A Method and device for managing mobile terminal  | 
| 11/27/2013 | CN103413094A Telemetering encryption system applicable to spacecraft CPU (central processing unit)  | 
| 11/27/2013 | CN103413093A XEN cloud platform virtual machine isolation method based on memory isolation  | 
| 11/27/2013 | CN103413092A Method for forbidding malicious codes from being injected into network terminal  | 
| 11/27/2013 | CN103413091A Method and device for monitoring malicious behaviors  | 
| 11/27/2013 | CN103413090A System and method for detection and treatment of malware on data storage devices  | 
| 11/27/2013 | CN103413089A Mobile terminal and method thereof for achieving dual system  | 
| 11/27/2013 | CN103413088A Computer document operational safety audit system  | 
| 11/27/2013 | CN103413087A Optical module, equipment employing optical module and verification method  | 
| 11/27/2013 | CN103413086A Method and device for achieving security roaming of reliable mobile storage media  | 
| 11/27/2013 | CN103413085A Hotlink protection method in unencrypted master-slave communication mode  | 
| 11/27/2013 | CN103413084A Method and device for controlling display content of code box  | 
| 11/27/2013 | CN103413083A Security defending system for single host  | 
| 11/27/2013 | CN103413082A Application program control method and device and client-side  | 
| 11/27/2013 | CN103413081A After-password-input prompt method, password modifying method and electronic equipment  | 
| 11/27/2013 | CN103413080A Password protection realization method based on gesture  | 
| 11/27/2013 | CN103413079A Method for generating ID (identity card) code on basis of encryption calculation of TID (terminal identification) code and EPC (electronic product code)  | 
| 11/27/2013 | CN103413078A Double-layer online identification system and identification method based on user's mark and handwriting  | 
| 11/27/2013 | CN103413077A Anti-theft system of vehicle-mounted terminal  | 
| 11/27/2013 | CN103413076A Block protection method for Android application programs  | 
| 11/27/2013 | CN103413075A Method and device for protecting JAVA executable program through virtual machine  | 
| 11/27/2013 | CN103413074A Method and device for protecting software through API  | 
| 11/27/2013 | CN103413073A Method and equipment for protecting JAVA executable program  | 
| 11/27/2013 | CN103413072A Application program protection method and device  | 
| 11/27/2013 | CN103413071A Method for protecting data in software  | 
| 11/27/2013 | CN103413070A Method and device for calibrating local clock  | 
| 11/27/2013 | CN103413069A Method for protecting software written by object--oriented language  | 
| 11/27/2013 | CN103412766A User right-based data access method and device  | 
| 11/27/2013 | CN103412735A Electronic access controller and realizing method of interaction of electronic access controller and general electronic equipment  | 
| 11/27/2013 | CN103412730A Intelligent terminal printing system based on cloud computing technology  | 
| 11/27/2013 | CN102497479B Method for smart phone to judge Trojprograms according to application software behaviors  | 
| 11/27/2013 | CN102324007B Abnormal detection method based on data mining  | 
| 11/27/2013 | CN102281540B Method and system for searching and killing mobile phone malicious software  | 
| 11/27/2013 | CN102243699B Malicious code detection method and system  | 
| 11/27/2013 | CN102012989B Threshold and key-based authorization method in software as service (SaaS)  | 
| 11/27/2013 | CN101939724B Data processing device and method for executing obfuscated programs  | 
| 11/26/2013 | US8595856 Apparatus and method for installing software  | 
| 11/26/2013 | US8595854 Processing recordable content in a stream  | 
| 11/26/2013 | US8595853 DRM system  | 
| 11/26/2013 | US8595848 Method for moving rights object and method for managing rights of issuing rights object and system thereof  | 
| 11/26/2013 | US8595841 System and method for bidirectional trust between downloaded applications and mobile devices including a secure charger and malware scanner  | 
| 11/26/2013 | US8595838 Contextual alert of an invasion of a computer system  | 
| 11/26/2013 | US8595837 Security event management apparatus, systems, and methods  | 
| 11/26/2013 | US8595835 System to enable detecting attacks within encrypted traffic  | 
| 11/26/2013 | US8595834 Detecting unauthorized use of computing devices based on behavioral patterns  | 
| 11/26/2013 | US8595825 Image processing apparatus, processing flow control method, image forming system, and storage medium  | 
| 11/26/2013 | US8595824 Task-based access control in a virtualization environment  | 
| 11/26/2013 | US8595819 System and method for distributed multi-processing security gateway  | 
| 11/26/2013 | US8595816 User authentication system and method for the same  | 
| 11/26/2013 | US8595813 IC card for encryption or decryption process and encrypted communication system and encrypted communication method using the same  | 
| 11/26/2013 | US8595809 Reusable authentication experience tool  | 
| 11/26/2013 | US8595807 Method, system, and device for implementing device addition in Wi-Fi device to device network  | 
| 11/26/2013 | US8595804 System and method for device security with a plurality of authentication modes  | 
| 11/26/2013 | US8595803 Protection against malware on web resources utilizing scripts for content scanning  | 
| 11/26/2013 | US8595797 Enforcing web services security through user specific XML schemas  | 
| 11/26/2013 | US8595796 Apparatus and method for authorization for access point name (APN) usage in a specific access  | 
| 11/26/2013 | US8595793 System and method for user login to a multimedia system using a remote control  | 
| 11/26/2013 | US8595512 Data control method of cloud storage  | 
| 11/26/2013 | US8595510 Methods, apparatus and systems to improve security in computer systems  | 
| 11/26/2013 | US8595508 Method of secure encryption  | 
| 11/26/2013 | US8595507 Client-based authentication  | 
| 11/26/2013 | US8595506 Authentication system and method using electronic tags  | 
| 11/26/2013 | US8595503 Method of self-authenticating a document while preserving critical content in authentication data  | 
| 11/26/2013 | US8595500 Information processing apparatus and method  | 
| 11/26/2013 | US8595499 Method for identifying a patient for later access to an electronic patient record for the patient using a communication device belonging to an inquiring person  | 
| 11/26/2013 | US8595498 Method for authenticating access to a secured chip by test device  | 
| 11/26/2013 | US8595494 Method for managing access to protected resources in a computer network, physical entities and computer programs therefor  | 
| 11/26/2013 | US8595488 Apparatus, system and method for securing digital documents in a digital appliance  | 
| 11/26/2013 | US8595485 Security management method and system for WAPI terminal accessing IMS network  | 
| 11/26/2013 | US8595480 Distributed computing network using multiple local virtual machines  | 
| 11/26/2013 | US8595272 File server system and file management method using management policy and setting file to indicate management competence of storage area  | 
| 11/26/2013 | US8595256 Policy generation and conversion system, policy distribution system, and method and program therefor  | 
| 11/26/2013 | US8595170 Stateful reference monitor  | 
| 11/26/2013 | US8595143 Maintaining privacy for transactions performable by a user device having a security module  | 
| 11/26/2013 | US8595142 Maintaining privacy for transactions performable by a user device having a security module  | 
| 11/26/2013 | US8595140 Firmware distributing device, program, and method  | 
| 11/26/2013 | US8595139 Content distribution program, content distribution method, server, content utilization apparatus, and content utilization system  | 
| 11/26/2013 | US8595138 Packaging system for customizing software  | 
| 11/26/2013 | US8594492 Recording apparatus and reproducing apparatus  | 
| 11/26/2013 | US8594333 Secure key access with one-time programmable memory and applications thereof  | 
| 11/26/2013 | US8594325 Enciphering apparatus and method, deciphering apparatus and method as well as information processing apparatus and method  | 
| 11/26/2013 | US8594180 3D video encoding  | 
| 11/26/2013 | US8593696 Document securization method and device printing a distribution of dots on said document  | 
| 11/26/2013 | CA2495759C Method and system of external data storage  | 
| 11/26/2013 | CA2459029C A anti keylog editor of activex base  | 
| 11/21/2013 | WO2013173806A2 Systems and methods for determining a likelihood that an entity is an author of original content  | 
| 11/21/2013 | WO2013173729A1 Methods and systems for providing hardware security functions using flash memories  | 
| 11/21/2013 | WO2013173619A1 System and method for autocompletion and alignment of user gestures  | 
| 11/21/2013 | WO2013173184A1 Computer readable storage media for multi-factor authentication and methods and systems utilizing same  |