Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
09/04/2013 | CN103279706A Method and device for intercepting installation of Android application program in mobile terminal |
09/04/2013 | CN103279705A Validation method and validation device of chip with secure booting function |
09/04/2013 | CN103279704A Detecting device and system of chip physical integrity |
09/04/2013 | CN103279703A Method for building desktop cloud virtual trust safety wall |
09/04/2013 | CN103279702A Method for monitoring full-substation model file version during debugging of intelligent substation |
09/04/2013 | CN103279701A Information interaction method based on intelligent mobile terminal shooting |
09/04/2013 | CN103279700A LCD (Liquid Crystal Display) monitor and firmware version verification method thereof |
09/04/2013 | CN103279699A Group message sharing method and system |
09/04/2013 | CN103279698A Electronic record keeping hand-held terminal based on fingerprint identification |
09/04/2013 | CN103279697A Fingerprint detail information hiding and restoring method based on orthogonal matrix and modular arithmetic |
09/04/2013 | CN103279696A License monitoring method and system for EDA (electronic design automation) software |
09/04/2013 | CN103279695A Communication program authorization method of rail transit integrated supervisory control system |
09/04/2013 | CN103279694A Loading method, protecting method, loading device and protecting device for file system |
09/04/2013 | CN103279693A File encryption method |
09/04/2013 | CN103279692A File encrypting and decrypting method and device based on mobile phone |
09/04/2013 | CN103279691A Encryption storage device for copyright protection and method thereof |
09/04/2013 | CN103279653A Electronic handheld terminal system and method for using same |
09/04/2013 | CN103279648A Electronic noting handheld terminal based on voice password |
09/04/2013 | CN103279558A Personnel file management system under guide of efficient low carbon concept |
09/04/2013 | CN103279499A User privacy protection method in personalized information retrieval |
09/04/2013 | CN103279432A Method for switching working modes of intelligent secrete key device and intelligent secrete key device |
09/04/2013 | CN103279431A Access method for kinds of permissions of memorizer |
09/04/2013 | CN103279343A Technical framework system based on distributed large website development |
09/04/2013 | CN103279166A Contact type CPU card easy to expand and with USB interface |
09/04/2013 | CN103276955A Computer intelligent hole-locking device |
09/04/2013 | CN103273950A Anti-theft service vehicle for electronic menu |
09/04/2013 | CN102184359B Method for realizing identity discrimination of operating users through recognizing keyboard/mouse input habits of operating users |
09/04/2013 | CN102034059B Method and device for managing application program and terminal |
09/04/2013 | CN101996081B Method for installing software in client computer |
09/04/2013 | CN101484902B Device-independent management method and device of cryptographic information |
09/04/2013 | CN101458667B Electronic apparatus with electronic security level identification, information exchange flow control system based on electronic security level identification, method and mobile memory |
09/04/2013 | CN101441603B Storage device, terminal device and method of using a storage device |
09/03/2013 | US8528109 Optimizing amount of data passed during software license activation |
09/03/2013 | US8528108 Protecting secret information in a programmed electronic device |
09/03/2013 | US8528106 Process for matching a number N of reception terminals with a number M of conditional access control cards |
09/03/2013 | US8528103 System for managing display and retrieval of image content on a network with image identification and linking to network content |
09/03/2013 | US8528100 Software license reconciliation within a cloud computing infrastructure |
09/03/2013 | US8528099 Policy based management of content rights in enterprise/cross enterprise collaboration |
09/03/2013 | US8528097 Trusted and secure techniques for item delivery and execution |
09/03/2013 | US8528096 Secure universal serial bus (USB) storage device and method |
09/03/2013 | US8528090 Systems and methods for creating customized confidence bands for use in malware detection |
09/03/2013 | US8528087 Methods for combating malicious software |
09/03/2013 | US8528086 System and method of detecting computer worms |
09/03/2013 | US8528084 Systems and methods for detecting potential communications fraud |
09/03/2013 | US8528081 Memory system |
09/03/2013 | US8528073 Storage medium having information processing program stored therein, information processing apparatus, and information processing system |
09/03/2013 | US8528072 Method, apparatus and system for access mode control of a device |
09/03/2013 | US8528063 Cross domain security information conversion |
09/03/2013 | US8528057 Method and apparatus for account virtualization |
09/03/2013 | US8528052 Authentication, authorization and accounting services solution |
09/03/2013 | US8528046 Selective management controller authenticated access control to host mapped resources |
09/03/2013 | US8527957 Software testing to validate tenant operations |
09/03/2013 | US8527835 Method for secure data transfer |
09/03/2013 | US8527781 Secure and scalable solid state disk system |
09/03/2013 | US8527780 Removable drive with data encryption |
09/03/2013 | US8527779 Method and apparatus of performing distributed steganography of a data message |
09/03/2013 | US8527777 Cryptographic proofs in data processing systems |
09/03/2013 | US8527776 Synthesis of anomalous data to create artificial feature sets and use of same in computer network intrusion detection systems |
09/03/2013 | US8527775 Host device and method for communicating a password between first and second storage devices using a double-encryption scheme |
09/03/2013 | US8527773 Identity verification systems and methods |
09/03/2013 | US8527753 Method and device for determining a unique content instance identifier, unique content instance identifier and method and device for managing content licenses |
09/03/2013 | US8527751 Systems and methods for secure and certified electronic messaging |
09/03/2013 | US8527744 Board module for providing alternative board functions which are not called by UEFI compatible programs for driving platform service in silicon components |
09/03/2013 | US8527675 System and method for implementing a secure processor data bus |
09/03/2013 | US8527673 Direct access to a hardware device for virtual machines of a virtualized computer system |
09/03/2013 | US8527632 Secure transfer of data files |
09/03/2013 | US8527615 Apparatus and method for determining a program neighborhood for a client node in a client-server network |
09/03/2013 | US8527541 Method for mapping a flat namespace onto a hierarchical namespace using locality of reference cues |
09/03/2013 | US8527424 Content management program, method and device |
09/03/2013 | US8527423 Method for transmitting an information stream upon request from a receiving site |
09/03/2013 | US8527422 Content protection arrangements |
09/03/2013 | US8527421 Virtual customer database |
09/03/2013 | US8527420 Process and system for data transmission |
09/03/2013 | US8527285 Postage printing system for printing both postal and non-postal documents |
09/03/2013 | US8526915 User equipment, communication equipment, authentication system, authentication method, authentication program and recording medium |
09/03/2013 | US8526620 Method and system for secure data collection and distribution |
09/03/2013 | US8526615 Storage system executing encryption and decryption processing |
09/03/2013 | US8526608 Printing system and printer with electronic signature capability and method thereof |
09/03/2013 | US8526064 Computer readable storage medium storing a program, image processing apparatus and image processing method for creating a tint block image |
09/03/2013 | US8526063 Image forming apparatus, method, and system for encrypting or decrypting portion of image |
09/03/2013 | US8523952 Protection method for use in portable communication device |
09/03/2013 | US8523666 Programming framework for closed systems |
09/03/2013 | CA2512197C Password methods and systems for use on a mobile device |
09/03/2013 | CA2473071C Image file container |
09/03/2013 | CA2471604C Multiple trust modes for handling data |
09/03/2013 | CA2459726C System and method for integrated circuit card data storage |
08/29/2013 | WO2013126852A2 Partitioning systems operating in multiple domains |
08/29/2013 | WO2013126651A1 Validating license servers in virtualized environments |
08/29/2013 | WO2013126615A1 Method and apparatus for limiting access to data by process or computer function with stateless encryption |
08/29/2013 | WO2013126433A1 System for creating an entertainment network conglomerate via a global computer network and methods thereof |
08/29/2013 | WO2013126259A1 Off-device anti-malware protection for mobile devices |
08/29/2013 | WO2013126258A1 Quantifying the risks of applications for mobile devices |
08/29/2013 | WO2013126221A1 Content activation via interaction-based authentication, systems and method |
08/29/2013 | WO2013126101A1 System and method for context specific website optimization |
08/29/2013 | WO2013126052A1 Computer infrastructure security management |
08/29/2013 | WO2013125982A1 Dual factor digital certificate security algorithms |
08/29/2013 | WO2013125937A1 Directed wakeup into a secured system environment |
08/29/2013 | WO2013124088A1 Method for authenticating a user |
08/29/2013 | WO2013093026A8 Method for making authenticated payments |
08/29/2013 | WO2013048773A4 In-band peripheral authentication |