Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
10/31/2013 | US20130290662 Information security techniques including detection, interdiction and/or mitigation of memory injection attacks |
10/31/2013 | US20130290565 Storage medium, information processing device and method |
10/31/2013 | US20130290396 Method for access to an operating system, removable memory medium and use of a removable memory medium |
10/31/2013 | US20130290330 Method for extracting fingerprint of publication, apparatus for extracting fingerprint of publication, system for identifying publication using fingerprint, and method for identifying publication using fingerprint |
10/31/2013 | US20130290273 Method for updating an encoded file |
10/31/2013 | US20130290229 Gripping-feature learning authentication system and gripping-feature learning authentication method |
10/31/2013 | US20130290175 Communication device, communication method, and communication system |
10/31/2013 | US20130290115 Performing a user related operation |
10/31/2013 | US20130290078 Dual Device System for Secure Transactions |
10/31/2013 | US20130287208 Systems and methods for controlling file execution for industrial control systems |
10/31/2013 | DE112012000526T5 Malware - Erkennung Malware - recognition |
10/31/2013 | DE112011104824T5 Ständig verfügbares eingebettetes Subsystem zur Diebstahlreaktion Always available embedded subsystem theft reaction |
10/31/2013 | DE102013104053A1 Sicherheitssystem und -verfahren zur Kontrolle und zur Steuerung der Interaktionen zwischen Komponenten eines Computersystems Security system and method for monitoring and control of the interactions between components of a computer system |
10/30/2013 | EP2658217A1 Method and device for storing, managing and using rights to use a resource |
10/30/2013 | EP2657880A1 Systems and methods for combined physical and cyber data security |
10/30/2013 | EP2657879A2 Security controlled multi-processor system |
10/30/2013 | EP2657878A2 Connecting a device to a wireless access point |
10/30/2013 | EP2657877A2 Methods and systems for conducting smart card transactions |
10/30/2013 | EP2657876A2 Real and virtual identity verification circuit, system thereof and electronic transaction method |
10/30/2013 | EP2657874A2 Scalable and secure application resource management and access control for multicore operating systems |
10/30/2013 | EP2657873A2 Electronic Book Content Protection |
10/30/2013 | EP2657872A1 Method for standardizing computer system action |
10/30/2013 | EP2657871A2 Secure configuration of mobile application |
10/30/2013 | EP2657870A2 Method, apparatus and system for changing to which remote device a local device is in communication via a communication medium through use of interruption of the communication medium |
10/30/2013 | EP2656321A1 Method for enabling authentication or identification, and related verification system |
10/30/2013 | EP2656274A1 Creating an access control policy based on consumer privacy preferences |
10/30/2013 | EP2656273A2 Scoped resource authorization policies |
10/30/2013 | EP2656270A2 Tamper proof location services |
10/30/2013 | EP2656268A1 Protection of applets against hidden-channel analyses |
10/30/2013 | EP2656267A1 System and method for securely moving content |
10/30/2013 | EP2656266A1 Improvements relating to cryptography using polymorphic code |
10/30/2013 | EP2656264A1 Method for updating an encoded file |
10/30/2013 | EP2656253A1 Communication protocol for medical devices that supports enhanced security |
10/30/2013 | EP2656240A1 Contextual role awareness |
10/30/2013 | CN203261366U Fingerprint identification protective device |
10/30/2013 | CN203261350U Intelligent cipher key suitable for a plurality of mobile device network transaction |
10/30/2013 | CN203260036U Computer data stealing prevention device |
10/30/2013 | CN203260035U Bluetooth USB-KEY |
10/30/2013 | CN203260034U Fingerprint KEY device |
10/30/2013 | CN103380589A Terminal device, server device, content recording control system, recording method, and recording permission/non-permission control method |
10/30/2013 | CN103380431A Gripping characteristics learning authentication system and gripping characteristics learning authentication method |
10/30/2013 | CN103380430A Identity verification systems and methods |
10/30/2013 | CN103380429A Method and device for controlling distribution of licenses |
10/30/2013 | CN103379105A Access method and system for enterprise information system in application platform |
10/30/2013 | CN103377672A Real-time information hierarchical control broadcast system and method |
10/30/2013 | CN103377567A Method and device for reading digital electronic book |
10/30/2013 | CN103377441A Network multimedia copyright trading and management system |
10/30/2013 | CN103377355A Mobile terminal and peeping proof method and device thereof |
10/30/2013 | CN103377354A Display apparatus and method for providing user interface thereof |
10/30/2013 | CN103377353A Electronic device and touch screen protection method and protection system thereof |
10/30/2013 | CN103377352A Sliding password unlocking method |
10/30/2013 | CN103377351A Semiconductor device, confidential data control system, confidential data control method |
10/30/2013 | CN103377350A Method and device for protecting codes of embedded software by hardware encryption module |
10/30/2013 | CN103377349A Security controlled multi-processor system |
10/30/2013 | CN103377348A Semiconductor device, confidential data control system, confidential data control method |
10/30/2013 | CN103377347A File encryption and decryption method and device |
10/30/2013 | CN103377346A Attachment management method and system |
10/30/2013 | CN103377345A Image processing device and image processing method |
10/30/2013 | CN103377344A Information processing device, information processing method, and program |
10/30/2013 | CN103377343A System and method for information confidentiality |
10/30/2013 | CN103377342A Method and system for verifying sensitive operations |
10/30/2013 | CN103377341A Method and system for security detection |
10/30/2013 | CN103377340A 总线电路和半导体装置 Bus circuit and a semiconductor device |
10/30/2013 | CN103377339A Message processing method and user equipment |
10/30/2013 | CN103377338A Computer software installation file management method |
10/30/2013 | CN103377337A Security system and method for controlling interactions between components of a computer system |
10/30/2013 | CN103377336A Method and system for controlling computer system user rights |
10/30/2013 | CN103377335A Pass-pattern authentication for computer-based security |
10/30/2013 | CN103377334A Unlocking method and equipment |
10/30/2013 | CN103377333A Real and virtual identity verification circuit, system thereof and electronic transaction method |
10/30/2013 | CN103377332A Application program accessing method and device |
10/30/2013 | CN103377331A Identity identification system and method |
10/30/2013 | CN103377330A Virtual resource distribution method and virtual resource distribution system |
10/30/2013 | CN103377329A Method for protecting CAD (computer-aided design) data on basis of watermark encryption identities |
10/30/2013 | CN103377328A Systems and methods for controlling file execution for industrial control systems |
10/30/2013 | CN103377327A PHP program protection method and system |
10/30/2013 | CN103377326A Confusion encrypting method and device for dynamic webpage program codes |
10/30/2013 | CN103377325A 电子书内容保护 EBook content protection |
10/30/2013 | CN103377324A Secure digital card, and secure digital card operating system and operating method |
10/30/2013 | CN103377323A Digital rights management (DRM) protecting device and DRM license using method |
10/30/2013 | CN103377322A Digital rights management (DRM) protecting device and DRM license using method |
10/30/2013 | CN103377321A DRM (digital rights management) file processing method, terminal device and cloud |
10/30/2013 | CN103377320A Method for selective certification of vector geographic data semi-fragile watermarking |
10/30/2013 | CN103377319A System and method used for detecting users of piracy |
10/30/2013 | CN103377173A Method and system for multiparty cooperation checking of controllable document |
10/30/2013 | CN103377055A Method and device for program running in mobile terminal |
10/30/2013 | CN103376855A Electronic device with overheating protection system and application method of electronic device |
10/30/2013 | CN102378974B Providing access to data item using access graphs |
10/30/2013 | CN102236764B Method and monitoring system for Android system to defend against desktop information attack |
10/30/2013 | CN102196433B Method for cloning prevention of mobile communication device and mobile communication device |
10/30/2013 | CN102148826B Method for dynamically setting password by setting graphic per se in grid digital array |
10/30/2013 | CN101989998B Information processing apparatus, information providing server and login information providing server |
10/30/2013 | CN101978339B Method and apparatus for hardware reset protection |
10/30/2013 | CN101939965B Method and apparatuses for authorising provision of indirected content associated with presentity of presence service |
10/30/2013 | CN101848080B Method and system for security in electronically fused encryption keys |
10/30/2013 | CN101836187B Progressive boot for wireless device |
10/30/2013 | CN101681492B Integrating security by obscurity with access control lists |
10/30/2013 | CN101655895B 内容控制系统 Content control system |
10/29/2013 | US8572760 Systems and methods for secure agent information |
10/29/2013 | US8572759 Communication management system and communication management method |