Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
05/2013
05/08/2013CN103093147A Method and electronic device for identifying information
05/08/2013CN103093146A Method and device for encrypting and decrypting Windows system partitions by fingerprints
05/08/2013CN103093145A Method and device and system for scanning mobile storage device
05/08/2013CN103093144A Detection method and detection system of crypto module application program interface (API) safety
05/08/2013CN103093143A Tamper detection countermeasures to deter physical attack on a security asic
05/08/2013CN103093142A Java card object access control method
05/08/2013CN103093141A Download method, guidance method and device of safe main control chip Coolcloud system (COS)
05/08/2013CN103093140A Method and system for managing authority
05/08/2013CN103093139A Integrated circuit (IC) card intelligent gas meter information safety management module
05/08/2013CN103093138A Authentication method and system for CAPTCHA Turing test based on static characters
05/08/2013CN103093137A File safe distribution method based on universal series bus (USB) flash disk
05/08/2013CN103093136A Method enabling java application to access to intelligent secret key device
05/08/2013CN103093135A Image processing apparatus, method of controlling the same, and storage medium
05/08/2013CN103093134A Device for aiding smart storage card to implement safe KEY application
05/08/2013CN103093133A Biological identity authentication method facing institute of electrical and electronic engineers (IEEE) 802.15.6
05/08/2013CN103093132A Identification and authentication system based on hand palm back vein
05/08/2013CN103093131A Method for authenticating identities of enterprise employees
05/08/2013CN103093130A Hardware binding information encryption method and network device
05/08/2013CN103093129A Registration code generation method and device used for software licensing
05/08/2013CN103093128A Embedded terminal software anti-copy and anti-plagiarism method
05/08/2013CN103093127A Method and system of dynamic copyright protection based on sudoku and multiple digital watermarks
05/08/2013CN103093126A Software licensing method and software licensing system
05/08/2013CN103093125A Double-layer protection based digital copyright protection method
05/08/2013CN103093124A Method for restricting the usage of electronic equipment and electronic equipment
05/08/2013CN103093053A Data processing method and system of production engineering of transformer
05/08/2013CN103092991A Image information processing method and device and image displaying method and device
05/08/2013CN103092832A Website risk detection processing method and website risk detection processing device
05/08/2013CN103092823A Method and device for text operation
05/08/2013CN103092688A Generating coordinate point method in embedded system
05/08/2013CN103092645A Geographic spatial information application system and implement method thereof based on microkernel technology
05/08/2013CN103092543A Printing control and management method of electronic file and system thereof
05/08/2013CN103092538A Image forming system, image forming device, and non-transitory computer readable medium
05/08/2013CN103092510A Electronic device and protective method of application program thereof when screen sharing is conducted
05/08/2013CN103092503A Unlocking and verification method for mobile terminal and unlocking and verification device
05/08/2013CN103092500A Method for unlocking screen, touch screen and electronic equipment
05/08/2013CN103092489A Touch screen device fingerprint gesture unlocking method
05/08/2013CN103092484A Method and device and terminal for unlocking screen
05/08/2013CN103092468A Mobile terminal unlocking system and mobile terminal unlocking method
05/08/2013CN102222199B Method and system for identifying identification of application program
05/08/2013CN102129538B System and method for detecting buffer overflow vulnerability of source code of sensor network
05/08/2013CN102123145B Method for delivering non-anonymous user metadata using a SOAP operation
05/08/2013CN102012994B Method for interconnecting readers in internet of things and reader
05/08/2013CN101960462B Authentication device, authentication method, and authentication program with the method mounted thereon
05/08/2013CN101945093B Digital right protection method based on virus detection and watermark embedding
05/08/2013CN101808077B Information security input processing system and method and smart card
05/08/2013CN101763397B Device and method for processing expanding information in image file
05/07/2013US8438656 Method and system for preventing unauthorized recording of media content on a macintosh operating system
05/07/2013US8438654 Systems and methods for associating a virtual machine with an access control right
05/07/2013US8438648 Preventing unauthorized font linking
05/07/2013US8438644 Information system security based on threat vectors
05/07/2013US8438643 Information system service-level security risk analysis
05/07/2013US8438634 Communicating security credentials between CICS regions
05/07/2013US8438633 Flexible real-time inbox access
05/07/2013US8438632 Image processing device
05/07/2013US8438629 Packet security method and apparatus
05/07/2013US8438628 Method and apparatus for split-terminating a secure network connection, with client authentication
05/07/2013US8438627 Access gateway
05/07/2013US8438624 Systems and methods of modifying system resources
05/07/2013US8438623 Automated security token administrative services
05/07/2013US8438620 Portable device for clearing access
05/07/2013US8438609 Resource authorizations dependent on emulation environment isolation policies
05/07/2013US8438561 Mediation apparatus, installation system, installation method, and installation program
05/07/2013US8438402 Electronic terminal, control method, computer program and integrated circuit
05/07/2013US8438401 Device and method for securely storing data
05/07/2013US8438398 Information processing apparatus, information processing method, information processing program and information processing system
05/07/2013US8438344 Low overhead and timing improved architecture for performing error checking and correction for memories and buses in system-on-chips, and other circuits, systems and processes
05/07/2013US8438298 Intelligent network streaming and execution system for conventionally coded applications
05/07/2013US8438243 Personal content server apparatus and methods
05/07/2013US8438242 Information-processing apparatus, server, information communication system, information-processing method, information providing method, and computer storage medium
05/07/2013US8438185 File storage apparatus and access control method
05/07/2013US8438114 Trusted license removal in a content protection system or the like
05/07/2013US8438113 Automated digital express gateway for licensing and acquiring rights and permissions for 3rd party copyrighted content
05/07/2013US8438112 Host device, portable storage device, and method for updating meta information regarding right objects stored in portable storage device
05/07/2013US8438111 Retail point of sale (RPOS) digital rights convergence
05/07/2013US8438086 System and method for providing customers with seamless entry to a remote server
05/07/2013US8438065 Point of sale computer system delivering composited two- and three-dimensional images
05/07/2013US8437510 System and method for identifying an individual
05/07/2013US8437021 Printing system and program for processing secure print jobs using a security-unaware printer
05/07/2013CA2622922C Apparatus and method for monitoring and controlling access to data on a computer readable medium
05/07/2013CA2552447C Method for detecting illegal modifications made to manufacturer software
05/07/2013CA2435624C Systems and methods for preventing unauthorized use of digital content
05/06/2013DE202013002454U1 Mechanischer Passwort-Generator Mechanical password generator
05/02/2013WO2013063474A1 Security policy deployment and enforcement system for the detection and control of polymorphic and targeted malware
05/02/2013WO2013063268A1 Obscuring an accelerometer signal
05/02/2013WO2013063122A1 Dead reckoning using proximity sensors
05/02/2013WO2013062918A2 Verification of integrity of peer-received content in a peer-to-peer content distribution system
05/02/2013WO2013062847A1 Policy enforcement of client devices
05/02/2013WO2013062844A1 Safety component in a programmable components chain
05/02/2013WO2013062771A1 Controlling access to a mobile device
05/02/2013WO2013062726A1 System and method for managing industrial processes
05/02/2013WO2013062528A1 Verification record for a replaceable supply
05/02/2013WO2013062453A1 Charging an energy storage unit
05/02/2013WO2013061782A1 External boot device and external boot method
05/02/2013WO2013061498A1 Communication apparatus, communication control card, non-temporary computer-readable medium on which license management program has been stored, and license management method
05/02/2013WO2013061375A1 Storage system and its management method
05/02/2013WO2013060801A1 Method and device for managing a key matrix, corresponding computer program product and storage means
05/02/2013WO2013060789A1 Device for handling paper money and/or coins and method for initializing and operating such a device
05/02/2013WO2013060695A1 Secure distribution of content
05/02/2013WO2013060432A1 Browser device access proxy
05/02/2013WO2013060345A1 Typing profile identification