Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
05/2013
05/01/2013EP2586155A1 Authorization control
05/01/2013EP2585969A1 Mask based challenge response test
05/01/2013EP2585968A2 Consigning authentication method
05/01/2013EP2585967A1 Consigning authentication method
05/01/2013EP2585966A1 System and method for sampling forensic data of unauthorized activities using executability states
05/01/2013EP2585965A1 System and method for identifying unauthorized activities on a computer system using a data structure model
05/01/2013EP2585964A1 Interoperability between a plurality of data protection systems
05/01/2013EP2585963A1 Method for generating a certificate
05/01/2013EP2585962A1 Password checking
05/01/2013EP2585961A1 Storage apparatus and management method thereof
05/01/2013EP2585960A1 Storage device, host device, and method for communicating a password between first and second storage devices using a double-encryption scheme
05/01/2013EP2585885A1 Controlling the access to a user interface for atmosphere control with an atmosphere creation system
05/01/2013CN202916837U Multifunctional safety switch device for inside and outside net
05/01/2013CN202916836U Power supply and safe reading device
05/01/2013CN202913807U Universal serial bus (USB) security lock
05/01/2013CN1806411B Interactive zero knowledge probative agreement
05/01/2013CN1557061B Test enabled application execution
05/01/2013CN103081399A 认证设备和系统 Certified equipment and systems
05/01/2013CN103080947A Communication device, communication system
05/01/2013CN103080946A Method, secure device, system and computer program product for securely managing files
05/01/2013CN103080945A Interoperability between a plurality of data protection systems
05/01/2013CN103080944A Virtual hotplug techniques
05/01/2013CN103079000A Method and device for terminal unlocking
05/01/2013CN103078859A Service system authority management method, equipment and system
05/01/2013CN103078840A User management control unit
05/01/2013CN103078737A Verification-code system based on audio frequency
05/01/2013CN103077362A GPIO (general purpose input/output) IP (internet protocol) core with security mechanism
05/01/2013CN103077361A Mobile terminal and anti-spy method thereof
05/01/2013CN103077360A Method and device for protecting mobile terminal
05/01/2013CN103077359A Data decryption method, device and system
05/01/2013CN103077358A Information processing apparatus, and event control method
05/01/2013CN103077357A Method for storing private files
05/01/2013CN103077356A Protecting and tracking method for primary information of mobile terminal based on user behavior pattern
05/01/2013CN103077355A Method and system for protecting data of mobile equipment
05/01/2013CN103077354A Method for controlling Windows file system access permissions
05/01/2013CN103077353A Method and device for actively defending rogue program
05/01/2013CN103077352A Active defense method of program behavior analysis on basis of cloud platform
05/01/2013CN103077351A Anti-detection system of virtual machine system
05/01/2013CN103077350A Searching and killing method and system for malicious code
05/01/2013CN103077349A Method and device for prompting access safety information on browser side
05/01/2013CN103077348A Method and device for vulnerability scanning of Web site
05/01/2013CN103077347A Combined type intrusion detecting method on basis of data fusion of improved core vector machine
05/01/2013CN103077346A Clock frequency detection based chip anti-attack system and method
05/01/2013CN103077345A Software authorization method and system based on virtual machine
05/01/2013CN103077344A Terminal and method for providing risk of application using the same
05/01/2013CN103077343A Test method and test device for safety chip
05/01/2013CN103077342A Method for inputting graphic random passwords
05/01/2013CN103077341A Application program unlocking method and device
05/01/2013CN103077340A Method and equipment for calling data through biological characteristic data
05/01/2013CN103077339A Data protection method and device
05/01/2013CN103077338A Sight line tracking password input method and device
05/01/2013CN103077337A Method and device for verifying user rights
05/01/2013CN103077336A Authorization method and system for comprehensive front-end graphic terminal
05/01/2013CN103077335A Apparatus and method for controlling permissions in mobile terminal
05/01/2013CN103077334A Rich media constructing and exhibiting system with function of copyright protection
05/01/2013CN103077333A Software code protection method under Linux system
05/01/2013CN103077332A Method and device for running packer application with self-checking
05/01/2013CN103077331A Digital resource protection method and related device
05/01/2013CN103077163A Data preprocessing method, device and system
05/01/2013CN103076988A Password input method and device
05/01/2013CN103076916A Personal identification number code input method using dot pattern, personal identification number code input method, and internet shopping settlement system
05/01/2013CN102110214B Method and device for preventing viruses in mobile memory from infecting computer
05/01/2013CN102034049B Mass data compression, encryption, storage and retrieval system and using method thereof
05/01/2013CN101782954B Computer and abnormal progress detection method
05/01/2013CN101714200B Apparatus and method to harden computer system
05/01/2013CN101501697B 数据转送装置 Data transfer means
05/01/2013CN101496024B Net settlement assisting device
05/01/2013CN101473329B User apparatus for performing trusted computing integrity measurement reporting
05/01/2013CN101290646B Apparatus and method for protecting system in virtualized environment
05/01/2013CN101266785B 电子音乐系统 Electronic music system
05/01/2013CA2793441A1 Combined passcode and activity launch modifier
04/2013
04/30/2013US8434156 Method, access node, and system for obtaining data
04/30/2013US8434155 Pre-boot protected memory channel
04/30/2013US8434153 Application display on a locked device
04/30/2013US8434151 Detecting malicious software
04/30/2013US8434146 Access control based on development profiles
04/30/2013US8434144 Method and apparatus for selectively enabling a microprocessor-based system
04/30/2013US8434140 Port hopping and seek you peer to peer traffic control method and system
04/30/2013US8434138 One time password
04/30/2013US8434136 Full spectrum cyber identification determination process
04/30/2013US8434135 Creating and launching a web application with credentials
04/30/2013US8434132 Roaming between networks employing different authentication protocols
04/30/2013US8434127 Access control system, access control method, electronic device and control program
04/30/2013US8434126 Methods and systems for aiding parental control policy decisions
04/30/2013US8434102 Television receiver and digital broadcast system
04/30/2013US8434091 System and method for data synchronization for a computer architecture for broadband networks
04/30/2013US8433956 Instruction sequence verification to protect secured data
04/30/2013US8433925 Cryptographic system for performing secure computations and signal processing directly on encrypted data in untrusted environments
04/30/2013US8433924 Apparatus, system, and method for authentication of a core root of trust measurement chain
04/30/2013US8433923 Information processing device having activation verification function
04/30/2013US8433922 System and method of biometric authentication using multiple kinds of templates
04/30/2013US8433920 Method and system for authenticating reliable biometric data
04/30/2013US8433918 Methods and systems for improving the security of password-based authentication protocols for IEEE 802.11 networks
04/30/2013US8433917 Access control system, access control device, program and recording medium
04/30/2013US8433916 Active hip
04/30/2013US8433915 Selective security masking within recorded speech
04/30/2013US8433902 Computer system with dual operating modes
04/30/2013US8433899 System and method for authenticating data using incompatible digest functions
04/30/2013US8433898 Trust information delivery scheme for certificate validation
04/30/2013US8433780 Systems and methods for automatically configuring a client for remote use of a network-based service