Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
10/2013
10/31/2013US20130290662 Information security techniques including detection, interdiction and/or mitigation of memory injection attacks
10/31/2013US20130290565 Storage medium, information processing device and method
10/31/2013US20130290396 Method for access to an operating system, removable memory medium and use of a removable memory medium
10/31/2013US20130290330 Method for extracting fingerprint of publication, apparatus for extracting fingerprint of publication, system for identifying publication using fingerprint, and method for identifying publication using fingerprint
10/31/2013US20130290273 Method for updating an encoded file
10/31/2013US20130290229 Gripping-feature learning authentication system and gripping-feature learning authentication method
10/31/2013US20130290175 Communication device, communication method, and communication system
10/31/2013US20130290115 Performing a user related operation
10/31/2013US20130290078 Dual Device System for Secure Transactions
10/31/2013US20130287208 Systems and methods for controlling file execution for industrial control systems
10/31/2013DE112012000526T5 Malware - Erkennung Malware - recognition
10/31/2013DE112011104824T5 Ständig verfügbares eingebettetes Subsystem zur Diebstahlreaktion Always available embedded subsystem theft reaction
10/31/2013DE102013104053A1 Sicherheitssystem und -verfahren zur Kontrolle und zur Steuerung der Interaktionen zwischen Komponenten eines Computersystems Security system and method for monitoring and control of the interactions between components of a computer system
10/30/2013EP2658217A1 Method and device for storing, managing and using rights to use a resource
10/30/2013EP2657880A1 Systems and methods for combined physical and cyber data security
10/30/2013EP2657879A2 Security controlled multi-processor system
10/30/2013EP2657878A2 Connecting a device to a wireless access point
10/30/2013EP2657877A2 Methods and systems for conducting smart card transactions
10/30/2013EP2657876A2 Real and virtual identity verification circuit, system thereof and electronic transaction method
10/30/2013EP2657874A2 Scalable and secure application resource management and access control for multicore operating systems
10/30/2013EP2657873A2 Electronic Book Content Protection
10/30/2013EP2657872A1 Method for standardizing computer system action
10/30/2013EP2657871A2 Secure configuration of mobile application
10/30/2013EP2657870A2 Method, apparatus and system for changing to which remote device a local device is in communication via a communication medium through use of interruption of the communication medium
10/30/2013EP2656321A1 Method for enabling authentication or identification, and related verification system
10/30/2013EP2656274A1 Creating an access control policy based on consumer privacy preferences
10/30/2013EP2656273A2 Scoped resource authorization policies
10/30/2013EP2656270A2 Tamper proof location services
10/30/2013EP2656268A1 Protection of applets against hidden-channel analyses
10/30/2013EP2656267A1 System and method for securely moving content
10/30/2013EP2656266A1 Improvements relating to cryptography using polymorphic code
10/30/2013EP2656264A1 Method for updating an encoded file
10/30/2013EP2656253A1 Communication protocol for medical devices that supports enhanced security
10/30/2013EP2656240A1 Contextual role awareness
10/30/2013CN203261366U Fingerprint identification protective device
10/30/2013CN203261350U Intelligent cipher key suitable for a plurality of mobile device network transaction
10/30/2013CN203260036U Computer data stealing prevention device
10/30/2013CN203260035U Bluetooth USB-KEY
10/30/2013CN203260034U Fingerprint KEY device
10/30/2013CN103380589A Terminal device, server device, content recording control system, recording method, and recording permission/non-permission control method
10/30/2013CN103380431A Gripping characteristics learning authentication system and gripping characteristics learning authentication method
10/30/2013CN103380430A Identity verification systems and methods
10/30/2013CN103380429A Method and device for controlling distribution of licenses
10/30/2013CN103379105A Access method and system for enterprise information system in application platform
10/30/2013CN103377672A Real-time information hierarchical control broadcast system and method
10/30/2013CN103377567A Method and device for reading digital electronic book
10/30/2013CN103377441A Network multimedia copyright trading and management system
10/30/2013CN103377355A Mobile terminal and peeping proof method and device thereof
10/30/2013CN103377354A Display apparatus and method for providing user interface thereof
10/30/2013CN103377353A Electronic device and touch screen protection method and protection system thereof
10/30/2013CN103377352A Sliding password unlocking method
10/30/2013CN103377351A Semiconductor device, confidential data control system, confidential data control method
10/30/2013CN103377350A Method and device for protecting codes of embedded software by hardware encryption module
10/30/2013CN103377349A Security controlled multi-processor system
10/30/2013CN103377348A Semiconductor device, confidential data control system, confidential data control method
10/30/2013CN103377347A File encryption and decryption method and device
10/30/2013CN103377346A Attachment management method and system
10/30/2013CN103377345A Image processing device and image processing method
10/30/2013CN103377344A Information processing device, information processing method, and program
10/30/2013CN103377343A System and method for information confidentiality
10/30/2013CN103377342A Method and system for verifying sensitive operations
10/30/2013CN103377341A Method and system for security detection
10/30/2013CN103377340A 总线电路和半导体装置 Bus circuit and a semiconductor device
10/30/2013CN103377339A Message processing method and user equipment
10/30/2013CN103377338A Computer software installation file management method
10/30/2013CN103377337A Security system and method for controlling interactions between components of a computer system
10/30/2013CN103377336A Method and system for controlling computer system user rights
10/30/2013CN103377335A Pass-pattern authentication for computer-based security
10/30/2013CN103377334A Unlocking method and equipment
10/30/2013CN103377333A Real and virtual identity verification circuit, system thereof and electronic transaction method
10/30/2013CN103377332A Application program accessing method and device
10/30/2013CN103377331A Identity identification system and method
10/30/2013CN103377330A Virtual resource distribution method and virtual resource distribution system
10/30/2013CN103377329A Method for protecting CAD (computer-aided design) data on basis of watermark encryption identities
10/30/2013CN103377328A Systems and methods for controlling file execution for industrial control systems
10/30/2013CN103377327A PHP program protection method and system
10/30/2013CN103377326A Confusion encrypting method and device for dynamic webpage program codes
10/30/2013CN103377325A 电子书内容保护 EBook content protection
10/30/2013CN103377324A Secure digital card, and secure digital card operating system and operating method
10/30/2013CN103377323A Digital rights management (DRM) protecting device and DRM license using method
10/30/2013CN103377322A Digital rights management (DRM) protecting device and DRM license using method
10/30/2013CN103377321A DRM (digital rights management) file processing method, terminal device and cloud
10/30/2013CN103377320A Method for selective certification of vector geographic data semi-fragile watermarking
10/30/2013CN103377319A System and method used for detecting users of piracy
10/30/2013CN103377173A Method and system for multiparty cooperation checking of controllable document
10/30/2013CN103377055A Method and device for program running in mobile terminal
10/30/2013CN103376855A Electronic device with overheating protection system and application method of electronic device
10/30/2013CN102378974B Providing access to data item using access graphs
10/30/2013CN102236764B Method and monitoring system for Android system to defend against desktop information attack
10/30/2013CN102196433B Method for cloning prevention of mobile communication device and mobile communication device
10/30/2013CN102148826B Method for dynamically setting password by setting graphic per se in grid digital array
10/30/2013CN101989998B Information processing apparatus, information providing server and login information providing server
10/30/2013CN101978339B Method and apparatus for hardware reset protection
10/30/2013CN101939965B Method and apparatuses for authorising provision of indirected content associated with presentity of presence service
10/30/2013CN101848080B Method and system for security in electronically fused encryption keys
10/30/2013CN101836187B Progressive boot for wireless device
10/30/2013CN101681492B Integrating security by obscurity with access control lists
10/30/2013CN101655895B 内容控制系统 Content control system
10/29/2013US8572760 Systems and methods for secure agent information
10/29/2013US8572759 Communication management system and communication management method