Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
04/24/2013 | EP2583212A2 Mass storage device memory encryption methods, systems, and apparatus |
04/24/2013 | EP2583211A2 Virtual computing infrastructure |
04/24/2013 | EP2583210A1 Open and interactive e-learning system and method |
04/24/2013 | EP2583156A2 Method and device for secured entry of personal data |
04/24/2013 | EP2583150A2 Computer cart |
04/24/2013 | CN202904589U System protective device of solar energy solar-thermal generating site |
04/24/2013 | CN202904588U Device using secure digital (SD) card interface for encryption |
04/24/2013 | CN202904587U Internet bank universal serial bus (USB) key capable of supporting multi-operation system platform and mobile payment equipment |
04/24/2013 | CN202904586U Confidentiality package based on second-generation identity card administration |
04/24/2013 | CN202904447U Demount resistance mechanism applied to industrial control computer platform |
04/24/2013 | CN1628284B Method and system for processing security exceptions |
04/24/2013 | CN103069767A Consigning authentication method |
04/24/2013 | CN103069429A Systems and methods for secure agent information |
04/24/2013 | CN103069428A Secure virtual machine bootstrap in untrusted cloud infrastructures |
04/24/2013 | CN103069384A Host device and method for securely booting the host device with operating system code loaded from a storage device |
04/24/2013 | CN103069357A Systems and methods form providing a dynamically modular processing unit |
04/24/2013 | CN103067463A Centralized management system and centralized management method for user root permission |
04/24/2013 | CN103067392A Security access control method based on Android terminal |
04/24/2013 | CN103065105A Apparatus and method for encrypting hard disk |
04/24/2013 | CN103065104A Mobile storage equipment and monitoring system formed by same |
04/24/2013 | CN103065103A Earthquake defense device and earthquake defense method |
04/24/2013 | CN103065102A Data encryption mobile storage management method based on virtual disk |
04/24/2013 | CN103065101A Anti-counterfeiting method for documents |
04/24/2013 | CN103065100A Container-based method of users to protect private data |
04/24/2013 | CN103065099A User privilege management method for line control center of rail transit automatic fare collection system |
04/24/2013 | CN103065098A Access method and electronic device |
04/24/2013 | CN103065097A Double-password |
04/24/2013 | CN103065096A Data protection method, device and system |
04/24/2013 | CN103065095A WEB vulnerability scanning method and vulnerability scanner based on fingerprint recognition technology |
04/24/2013 | CN103065094A System and method for detecting malware targeting the boot process of a computer using boot process emulation |
04/24/2013 | CN103065093A Method for marking malicious software behavior characteristics |
04/24/2013 | CN103065092A Method for intercepting operating of suspicious programs |
04/24/2013 | CN103065091A Extension of system restoration by using malware detection |
04/24/2013 | CN103065090A Method and device for intercepting malicious advertisements of application program |
04/24/2013 | CN103065089A Method and device for detecting webpage Trojan horses |
04/24/2013 | CN103065088A System and method for detecting computer security threat based on decision of computer use |
04/24/2013 | CN103065087A Display method and device of multiengine antivirus program processing schedule |
04/24/2013 | CN103065086A Distributed intrusion detection system and method applied to dynamic virtualization environment |
04/24/2013 | CN103065085A System and method for implementing a secure USB application device |
04/24/2013 | CN103065084A Windows hidden process detection method performed at external machine of virtual machine |
04/24/2013 | CN103065083A Method and system for monitoring application program interface of intelligent mobile terminal |
04/24/2013 | CN103065082A Software security protection method based on Linux system |
04/24/2013 | CN103065081A PaaS (platform as a service) platform and safe operation method thereof |
04/24/2013 | CN103065080A Application program login method and device |
04/24/2013 | CN103065079A Method for preventing fraudulent signing |
04/24/2013 | CN103065078A Method of loading client certificate for Android system by OpenSSL engine |
04/24/2013 | CN103065077A Real user authentication method and real user authentication device |
04/24/2013 | CN103065076A Finger certification recognition device capable of combining temperature heartbeat characteristics |
04/24/2013 | CN103065075A Method for unlocking touch screen mobile terminal |
04/24/2013 | CN103065074A Uniform Resource Locator (URL) authority control method based on fine granularity |
04/24/2013 | CN103065073A Anti-fake method for digital print based on digital watermark technology |
04/24/2013 | CN103065072A Method and device to improve Java software jailbreak difficulty and copyright verification method |
04/24/2013 | CN103065071A Software copyright control method and system |
04/24/2013 | CN103065070A Encryption method for set top box program |
04/24/2013 | CN103065069A Shell technology based software protection method |
04/24/2013 | CN103065068A Method and device for encrypting recorded documents |
04/24/2013 | CN103064870A Web anti-injection method, device and equipment |
04/24/2013 | CN103064798A Electronic device |
04/24/2013 | CN103064706A Starting method and device for virtual machine system |
04/24/2013 | CN103064606A Screen unlocking method for mobile terminal |
04/24/2013 | CN102426599B Method for detecting sensitive information based on D-S evidence theory |
04/24/2013 | CN102279875B Method and device for identifying fishing website |
04/24/2013 | CN102194081B Method for hiding natural language information |
04/24/2013 | CN102184244B High-robustness geographical database watermark method suitable for polygon type |
04/24/2013 | CN102156834B Method for realizing program killing prevention |
04/24/2013 | CN102136049B Terminal application safety management method and system |
04/24/2013 | CN102004872B Fingerprint encryption-based identity authentication system and implementation method thereof |
04/24/2013 | CN101853355B Integrated circuit |
04/24/2013 | CN101783801B Software protection method based on network, client side and server |
04/24/2013 | CN101595489B Method and device to authenticate an accessory |
04/24/2013 | CN101521569B Method, equipment and system for realizing service access |
04/24/2013 | CN101432751B Method and device for protecting diversity for distributing contents to multiple receiving parties |
04/24/2013 | CN101401163B Method and Device for embedding information in data |
04/24/2013 | CN101184086B Systems and methods for distributed digital rights management |
04/24/2013 | CN101017557B Graphics processing unit used for cryptographic processing |
04/23/2013 | US8429759 Theft management system and method |
04/23/2013 | US8429758 System and method for privacy protection using identifiability risk assessment |
04/23/2013 | US8429753 Controlling access to documents using file locks |
04/23/2013 | US8429748 Network traffic analysis using a dynamically updating ontological network description |
04/23/2013 | US8429746 Decoy network technology with automatic signature generation for intrusion detection and intrusion prevention systems |
04/23/2013 | US8429745 Systems and methods for data loss prevention on mobile computing systems |
04/23/2013 | US8429744 Systems and methods for detecting malformed arguments in a function by hooking a generic object |
04/23/2013 | US8429743 Online risk mitigation |
04/23/2013 | US8429734 Method for detecting DNS redirects or fraudulent local certificates for SSL sites in pharming/phishing schemes by remote validation and using a credential manager and recorded certificate attributes |
04/23/2013 | US8429725 System and method for providing a secure connection between networked computers |
04/23/2013 | US8429720 Method and apparatus for camouflaging of data, information and functional transformations |
04/23/2013 | US8429717 Method for activating virtual machine, apparatus for simulating computing device and supervising device |
04/23/2013 | US8429714 Methods and apparatuses for introducing devices with simple user interfaces into a secure network community |
04/23/2013 | US8429712 Centralized user authentication system apparatus and method |
04/23/2013 | US8429711 System and method for executing interactive applications with minimal privileges |
04/23/2013 | US8429708 Method and system for assessing cumulative access entitlements of an entity in a system |
04/23/2013 | US8429660 Systems and methods to allocate application tasks to a pool of processing machines |
04/23/2013 | US8429513 Loading secure code into a memory |
04/23/2013 | US8429426 Secure pipeline manager |
04/23/2013 | US8429425 Electronic backup and restoration of encrypted data |
04/23/2013 | US8429419 Method for securing authorized data entry and the device to perform this method |
04/23/2013 | US8429418 Technique for providing secure firmware |
04/23/2013 | US8429417 Protection against side channel attacks with an integrity check |
04/23/2013 | US8429415 User-selectable signatures |
04/23/2013 | US8429411 Automated selection and inclusion of a message signature |