Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
08/2013
08/21/2013EP2628122A1 Obfuscated hardware multi-threading
08/21/2013EP2628121A1 Device and method for protecting a security module from manipulation attempts in a field device
08/21/2013EP2628119A1 Java store television
08/21/2013EP2628118A1 Efficient procedure for pairing medical devices for wireless communication with limited user interaction
08/21/2013EP2628090A1 Disabling communication in a multiprocessor system
08/21/2013EP2476228B1 Technique for determining usage of encrypted media content
08/21/2013EP1977481B1 Chip attack protection
08/21/2013CN203151740U Random code verification system based on mobile terminal
08/21/2013CN203149583U Mouse loss prevention system in computer room
08/21/2013CN203149582U Anti-theft tracking system for laptop computers
08/21/2013CN203149581U USB isolation device
08/21/2013CN203149580U Electronic signature device
08/21/2013CN203149579U Integrated circuit structure used for electronic dynamic passwords
08/21/2013CN203149578U Self-service electronic object taking machine with face recognition function
08/21/2013CN203149458U Novel anti-theft notebook computer
08/21/2013CN1682486B Content distribution for multiple digital rights management
08/21/2013CN103262590A System and method for provisioning over the air of confidential information on mobile communicative devices with non-UICC secure elements
08/21/2013CN103262466A Authentication system, authentication server, service provision server, authentication method, and computer-readable recording medium
08/21/2013CN103262093A Switch to perform non-destructive and secure disablement of IC functionality utilizing MEMS and method thereof
08/21/2013CN103262092A Storage drive based antimalware methods and apparatuses
08/21/2013CN103262091A Portable data storage medium with control error counter
08/21/2013CN103262090A Protecting data integrity with storage leases
08/21/2013CN103262089A Vulnerability-diagnosis device
08/21/2013CN103262088A Formal analysis of the quality and conformance of information flow downgraders
08/21/2013CN103262087A Signature-independent, system behavior-based malware detection
08/21/2013CN103259951A Network system, information processing apparatus, method for controlling the information processing apparatus
08/21/2013CN103259779A Method and system for file invisibility processing
08/21/2013CN103259667A Method and system for eID authentication on mobile terminal
08/21/2013CN103259651A Encryption and decryption method and system of terminal data
08/21/2013CN103258172A Off-chip Nor Flash bus interface hardware encryption device
08/21/2013CN103258171A Method and device for avoiding error touch of mobile terminal touch screen and mobile terminal
08/21/2013CN103258170A Mobile storage medium data safety protective method
08/21/2013CN103258169A Method for protection of chip card from unauthorized use, chip card and chip card terminal
08/21/2013CN103258168A Encryption system and encryption method for programmable logic controller (PLC)
08/21/2013CN103258167A Method for protecting png picture in handheld device
08/21/2013CN103258166A Encryption technique
08/21/2013CN103258165A Processing method and device for leak evaluation
08/21/2013CN103258164A Starting method of embedded trusted system
08/21/2013CN103258163A Script virus identifying method, script virus identifying device and script virus identifying system
08/21/2013CN103258162A Thwarting attacks that involve analyzing hardware sensor output
08/21/2013CN103258161A Altering sampling rate to thwart attacks that involve analyzing hardware sensor output
08/21/2013CN103258160A Method for monitoring cloud security under virtualization environment
08/21/2013CN103258159A Extensible and/or distributed authorization system and/or methods of providing the same
08/21/2013CN103258158A Fingerprint authentication electronic commerce scrambler
08/21/2013CN103258157A On-line handwriting authentication method and system based on finger information
08/21/2013CN103258156A Method for generating secret key on basis of fingerprint characteristics
08/21/2013CN103258155A Method for unlocking lock screen of medical equipment
08/21/2013CN103258154A NFC (negative feedback circuit) terminal based locking and unlocking method
08/21/2013CN103258153A Method for achieving safeguard in digital television terminal and digital television terminal
08/21/2013CN103258152A System, devices and methods for collaborative execution of a software application comprising encrypted instruction
08/21/2013CN103258151A Real-time authorization software License control method
08/21/2013CN103258150A System with local and remote software protection devices capable of working cooperatively
08/21/2013CN103258149A Online reading system and method based on cloud computing
08/21/2013CN103258148A Control system, control device and program execution control method
08/21/2013CN103258006A System and markup language for information extraction from stand-alone devices in webspace
08/21/2013CN103257938A Data protection method, memory controller and memory storage device
08/21/2013CN103257872A Embedded control system for computers and updating method of embedded control system
08/21/2013CN103257866A Mobile terminal and application program management method
08/21/2013CN103257835A Printing system with Bluetooth function and working method of printing system with Bluetooth function
08/21/2013CN103257826A Method and system for mobile terminal to achieve navigation key function based on fingerprint identification
08/21/2013CN102436489B Processing method, device and system of three-dimensional model data
08/21/2013CN102292697B 信息处理装置 The information processing apparatus
08/21/2013CN102034058B Method for controlling safety of application software and terminal
08/21/2013CN102025879B Equipment managing system and equipment management method
08/21/2013CN101994648B Method and apparatus for access control to installation control systems of wind energy installations
08/21/2013CN101859358B Methods and systems for protecting media content
08/21/2013CN101714197B Hardware-based anti-virus scan service
08/21/2013CN101578609B Secure booting a computing device
08/21/2013CN101526796B Unit using operating system and image forming apparatus using the same
08/20/2013US8516608 Method for decoding a probabilistic anti-collusion code
08/20/2013US8516602 Methods, apparatuses, and computer program products for providing distributed access rights management using access rights filters
08/20/2013US8516600 Information processing device, information recording medium, information processing method, and computer program
08/20/2013US8516598 Method and apparatus for editing digital rights management contents in portable terminal
08/20/2013US8516597 Method to calculate a risk score of a folder that has been scanned for confidential information
08/20/2013US8516591 Security monitoring
08/20/2013US8516589 Apparatus and method for preventing virus code execution
08/20/2013US8516585 System and method for detection of domain-flux botnets and the like
08/20/2013US8516583 Aggregating the knowledge base of computer systems to proactively protect a computer from malware
08/20/2013US8516577 Regulating atomic memory operations to prevent denial of service attack
08/20/2013US8516566 Systems and methods for using external authentication service for Kerberos pre-authentication
08/20/2013US8516565 IC chip, information processing apparatus, system, method, and program
08/20/2013US8516561 Methods and apparatus for determining user authorization from motion of a gesture-based control unit
08/20/2013US8516557 User terminal with security function and security-control method
08/20/2013US8516550 Systems and methods for enabling a service provider to obtain and use user information
08/20/2013US8516549 Method, system, and computer program product for facilitating communication in an interoperability network
08/20/2013US8516548 Method, system, and computer program product for facilitating communication in an interoperability network
08/20/2013US8516547 Method, system, and computer program product for facilitating communication in an interoperability network
08/20/2013US8516546 Method, system, and computer program product for facilitating communication in an interoperability network
08/20/2013US8516544 Method, system, and computer program product for facilitating communication in an interoperability network
08/20/2013US8516543 Method, system, and computer program product for facilitating communication in an interoperability network
08/20/2013US8516542 Method, system, and computer program product for facilitating communication in an interoperability network
08/20/2013US8516541 Method, system, and computer program product for network authorization
08/20/2013US8516540 Method, system, and computer program product for facilitating communication in an interoperability network
08/20/2013US8516460 Real-time temperature sensitive machine level code compilation and execution
08/20/2013US8516448 Identifying interpreted programs through class loading sequences
08/20/2013US8516447 Computer-implemented method and system for binding digital rights management executable code to a software application
08/20/2013US8516439 Visualizing object relationships
08/20/2013US8516269 Hardware device to physical structure binding and authentication
08/20/2013US8516265 Authentication method, authentication device, program and recording medium
08/20/2013US8516264 Interlocking plain text passwords to data encryption keys