Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
08/21/2013 | EP2628122A1 Obfuscated hardware multi-threading |
08/21/2013 | EP2628121A1 Device and method for protecting a security module from manipulation attempts in a field device |
08/21/2013 | EP2628119A1 Java store television |
08/21/2013 | EP2628118A1 Efficient procedure for pairing medical devices for wireless communication with limited user interaction |
08/21/2013 | EP2628090A1 Disabling communication in a multiprocessor system |
08/21/2013 | EP2476228B1 Technique for determining usage of encrypted media content |
08/21/2013 | EP1977481B1 Chip attack protection |
08/21/2013 | CN203151740U Random code verification system based on mobile terminal |
08/21/2013 | CN203149583U Mouse loss prevention system in computer room |
08/21/2013 | CN203149582U Anti-theft tracking system for laptop computers |
08/21/2013 | CN203149581U USB isolation device |
08/21/2013 | CN203149580U Electronic signature device |
08/21/2013 | CN203149579U Integrated circuit structure used for electronic dynamic passwords |
08/21/2013 | CN203149578U Self-service electronic object taking machine with face recognition function |
08/21/2013 | CN203149458U Novel anti-theft notebook computer |
08/21/2013 | CN1682486B Content distribution for multiple digital rights management |
08/21/2013 | CN103262590A System and method for provisioning over the air of confidential information on mobile communicative devices with non-UICC secure elements |
08/21/2013 | CN103262466A Authentication system, authentication server, service provision server, authentication method, and computer-readable recording medium |
08/21/2013 | CN103262093A Switch to perform non-destructive and secure disablement of IC functionality utilizing MEMS and method thereof |
08/21/2013 | CN103262092A Storage drive based antimalware methods and apparatuses |
08/21/2013 | CN103262091A Portable data storage medium with control error counter |
08/21/2013 | CN103262090A Protecting data integrity with storage leases |
08/21/2013 | CN103262089A Vulnerability-diagnosis device |
08/21/2013 | CN103262088A Formal analysis of the quality and conformance of information flow downgraders |
08/21/2013 | CN103262087A Signature-independent, system behavior-based malware detection |
08/21/2013 | CN103259951A Network system, information processing apparatus, method for controlling the information processing apparatus |
08/21/2013 | CN103259779A Method and system for file invisibility processing |
08/21/2013 | CN103259667A Method and system for eID authentication on mobile terminal |
08/21/2013 | CN103259651A Encryption and decryption method and system of terminal data |
08/21/2013 | CN103258172A Off-chip Nor Flash bus interface hardware encryption device |
08/21/2013 | CN103258171A Method and device for avoiding error touch of mobile terminal touch screen and mobile terminal |
08/21/2013 | CN103258170A Mobile storage medium data safety protective method |
08/21/2013 | CN103258169A Method for protection of chip card from unauthorized use, chip card and chip card terminal |
08/21/2013 | CN103258168A Encryption system and encryption method for programmable logic controller (PLC) |
08/21/2013 | CN103258167A Method for protecting png picture in handheld device |
08/21/2013 | CN103258166A Encryption technique |
08/21/2013 | CN103258165A Processing method and device for leak evaluation |
08/21/2013 | CN103258164A Starting method of embedded trusted system |
08/21/2013 | CN103258163A Script virus identifying method, script virus identifying device and script virus identifying system |
08/21/2013 | CN103258162A Thwarting attacks that involve analyzing hardware sensor output |
08/21/2013 | CN103258161A Altering sampling rate to thwart attacks that involve analyzing hardware sensor output |
08/21/2013 | CN103258160A Method for monitoring cloud security under virtualization environment |
08/21/2013 | CN103258159A Extensible and/or distributed authorization system and/or methods of providing the same |
08/21/2013 | CN103258158A Fingerprint authentication electronic commerce scrambler |
08/21/2013 | CN103258157A On-line handwriting authentication method and system based on finger information |
08/21/2013 | CN103258156A Method for generating secret key on basis of fingerprint characteristics |
08/21/2013 | CN103258155A Method for unlocking lock screen of medical equipment |
08/21/2013 | CN103258154A NFC (negative feedback circuit) terminal based locking and unlocking method |
08/21/2013 | CN103258153A Method for achieving safeguard in digital television terminal and digital television terminal |
08/21/2013 | CN103258152A System, devices and methods for collaborative execution of a software application comprising encrypted instruction |
08/21/2013 | CN103258151A Real-time authorization software License control method |
08/21/2013 | CN103258150A System with local and remote software protection devices capable of working cooperatively |
08/21/2013 | CN103258149A Online reading system and method based on cloud computing |
08/21/2013 | CN103258148A Control system, control device and program execution control method |
08/21/2013 | CN103258006A System and markup language for information extraction from stand-alone devices in webspace |
08/21/2013 | CN103257938A Data protection method, memory controller and memory storage device |
08/21/2013 | CN103257872A Embedded control system for computers and updating method of embedded control system |
08/21/2013 | CN103257866A Mobile terminal and application program management method |
08/21/2013 | CN103257835A Printing system with Bluetooth function and working method of printing system with Bluetooth function |
08/21/2013 | CN103257826A Method and system for mobile terminal to achieve navigation key function based on fingerprint identification |
08/21/2013 | CN102436489B Processing method, device and system of three-dimensional model data |
08/21/2013 | CN102292697B 信息处理装置 The information processing apparatus |
08/21/2013 | CN102034058B Method for controlling safety of application software and terminal |
08/21/2013 | CN102025879B Equipment managing system and equipment management method |
08/21/2013 | CN101994648B Method and apparatus for access control to installation control systems of wind energy installations |
08/21/2013 | CN101859358B Methods and systems for protecting media content |
08/21/2013 | CN101714197B Hardware-based anti-virus scan service |
08/21/2013 | CN101578609B Secure booting a computing device |
08/21/2013 | CN101526796B Unit using operating system and image forming apparatus using the same |
08/20/2013 | US8516608 Method for decoding a probabilistic anti-collusion code |
08/20/2013 | US8516602 Methods, apparatuses, and computer program products for providing distributed access rights management using access rights filters |
08/20/2013 | US8516600 Information processing device, information recording medium, information processing method, and computer program |
08/20/2013 | US8516598 Method and apparatus for editing digital rights management contents in portable terminal |
08/20/2013 | US8516597 Method to calculate a risk score of a folder that has been scanned for confidential information |
08/20/2013 | US8516591 Security monitoring |
08/20/2013 | US8516589 Apparatus and method for preventing virus code execution |
08/20/2013 | US8516585 System and method for detection of domain-flux botnets and the like |
08/20/2013 | US8516583 Aggregating the knowledge base of computer systems to proactively protect a computer from malware |
08/20/2013 | US8516577 Regulating atomic memory operations to prevent denial of service attack |
08/20/2013 | US8516566 Systems and methods for using external authentication service for Kerberos pre-authentication |
08/20/2013 | US8516565 IC chip, information processing apparatus, system, method, and program |
08/20/2013 | US8516561 Methods and apparatus for determining user authorization from motion of a gesture-based control unit |
08/20/2013 | US8516557 User terminal with security function and security-control method |
08/20/2013 | US8516550 Systems and methods for enabling a service provider to obtain and use user information |
08/20/2013 | US8516549 Method, system, and computer program product for facilitating communication in an interoperability network |
08/20/2013 | US8516548 Method, system, and computer program product for facilitating communication in an interoperability network |
08/20/2013 | US8516547 Method, system, and computer program product for facilitating communication in an interoperability network |
08/20/2013 | US8516546 Method, system, and computer program product for facilitating communication in an interoperability network |
08/20/2013 | US8516544 Method, system, and computer program product for facilitating communication in an interoperability network |
08/20/2013 | US8516543 Method, system, and computer program product for facilitating communication in an interoperability network |
08/20/2013 | US8516542 Method, system, and computer program product for facilitating communication in an interoperability network |
08/20/2013 | US8516541 Method, system, and computer program product for network authorization |
08/20/2013 | US8516540 Method, system, and computer program product for facilitating communication in an interoperability network |
08/20/2013 | US8516460 Real-time temperature sensitive machine level code compilation and execution |
08/20/2013 | US8516448 Identifying interpreted programs through class loading sequences |
08/20/2013 | US8516447 Computer-implemented method and system for binding digital rights management executable code to a software application |
08/20/2013 | US8516439 Visualizing object relationships |
08/20/2013 | US8516269 Hardware device to physical structure binding and authentication |
08/20/2013 | US8516265 Authentication method, authentication device, program and recording medium |
08/20/2013 | US8516264 Interlocking plain text passwords to data encryption keys |