Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
04/2013
04/24/2013EP2583212A2 Mass storage device memory encryption methods, systems, and apparatus
04/24/2013EP2583211A2 Virtual computing infrastructure
04/24/2013EP2583210A1 Open and interactive e-learning system and method
04/24/2013EP2583156A2 Method and device for secured entry of personal data
04/24/2013EP2583150A2 Computer cart
04/24/2013CN202904589U System protective device of solar energy solar-thermal generating site
04/24/2013CN202904588U Device using secure digital (SD) card interface for encryption
04/24/2013CN202904587U Internet bank universal serial bus (USB) key capable of supporting multi-operation system platform and mobile payment equipment
04/24/2013CN202904586U Confidentiality package based on second-generation identity card administration
04/24/2013CN202904447U Demount resistance mechanism applied to industrial control computer platform
04/24/2013CN1628284B Method and system for processing security exceptions
04/24/2013CN103069767A Consigning authentication method
04/24/2013CN103069429A Systems and methods for secure agent information
04/24/2013CN103069428A Secure virtual machine bootstrap in untrusted cloud infrastructures
04/24/2013CN103069384A Host device and method for securely booting the host device with operating system code loaded from a storage device
04/24/2013CN103069357A Systems and methods form providing a dynamically modular processing unit
04/24/2013CN103067463A Centralized management system and centralized management method for user root permission
04/24/2013CN103067392A Security access control method based on Android terminal
04/24/2013CN103065105A Apparatus and method for encrypting hard disk
04/24/2013CN103065104A Mobile storage equipment and monitoring system formed by same
04/24/2013CN103065103A Earthquake defense device and earthquake defense method
04/24/2013CN103065102A Data encryption mobile storage management method based on virtual disk
04/24/2013CN103065101A Anti-counterfeiting method for documents
04/24/2013CN103065100A Container-based method of users to protect private data
04/24/2013CN103065099A User privilege management method for line control center of rail transit automatic fare collection system
04/24/2013CN103065098A Access method and electronic device
04/24/2013CN103065097A Double-password
04/24/2013CN103065096A Data protection method, device and system
04/24/2013CN103065095A WEB vulnerability scanning method and vulnerability scanner based on fingerprint recognition technology
04/24/2013CN103065094A System and method for detecting malware targeting the boot process of a computer using boot process emulation
04/24/2013CN103065093A Method for marking malicious software behavior characteristics
04/24/2013CN103065092A Method for intercepting operating of suspicious programs
04/24/2013CN103065091A Extension of system restoration by using malware detection
04/24/2013CN103065090A Method and device for intercepting malicious advertisements of application program
04/24/2013CN103065089A Method and device for detecting webpage Trojan horses
04/24/2013CN103065088A System and method for detecting computer security threat based on decision of computer use
04/24/2013CN103065087A Display method and device of multiengine antivirus program processing schedule
04/24/2013CN103065086A Distributed intrusion detection system and method applied to dynamic virtualization environment
04/24/2013CN103065085A System and method for implementing a secure USB application device
04/24/2013CN103065084A Windows hidden process detection method performed at external machine of virtual machine
04/24/2013CN103065083A Method and system for monitoring application program interface of intelligent mobile terminal
04/24/2013CN103065082A Software security protection method based on Linux system
04/24/2013CN103065081A PaaS (platform as a service) platform and safe operation method thereof
04/24/2013CN103065080A Application program login method and device
04/24/2013CN103065079A Method for preventing fraudulent signing
04/24/2013CN103065078A Method of loading client certificate for Android system by OpenSSL engine
04/24/2013CN103065077A Real user authentication method and real user authentication device
04/24/2013CN103065076A Finger certification recognition device capable of combining temperature heartbeat characteristics
04/24/2013CN103065075A Method for unlocking touch screen mobile terminal
04/24/2013CN103065074A Uniform Resource Locator (URL) authority control method based on fine granularity
04/24/2013CN103065073A Anti-fake method for digital print based on digital watermark technology
04/24/2013CN103065072A Method and device to improve Java software jailbreak difficulty and copyright verification method
04/24/2013CN103065071A Software copyright control method and system
04/24/2013CN103065070A Encryption method for set top box program
04/24/2013CN103065069A Shell technology based software protection method
04/24/2013CN103065068A Method and device for encrypting recorded documents
04/24/2013CN103064870A Web anti-injection method, device and equipment
04/24/2013CN103064798A Electronic device
04/24/2013CN103064706A Starting method and device for virtual machine system
04/24/2013CN103064606A Screen unlocking method for mobile terminal
04/24/2013CN102426599B Method for detecting sensitive information based on D-S evidence theory
04/24/2013CN102279875B Method and device for identifying fishing website
04/24/2013CN102194081B Method for hiding natural language information
04/24/2013CN102184244B High-robustness geographical database watermark method suitable for polygon type
04/24/2013CN102156834B Method for realizing program killing prevention
04/24/2013CN102136049B Terminal application safety management method and system
04/24/2013CN102004872B Fingerprint encryption-based identity authentication system and implementation method thereof
04/24/2013CN101853355B Integrated circuit
04/24/2013CN101783801B Software protection method based on network, client side and server
04/24/2013CN101595489B Method and device to authenticate an accessory
04/24/2013CN101521569B Method, equipment and system for realizing service access
04/24/2013CN101432751B Method and device for protecting diversity for distributing contents to multiple receiving parties
04/24/2013CN101401163B Method and Device for embedding information in data
04/24/2013CN101184086B Systems and methods for distributed digital rights management
04/24/2013CN101017557B Graphics processing unit used for cryptographic processing
04/23/2013US8429759 Theft management system and method
04/23/2013US8429758 System and method for privacy protection using identifiability risk assessment
04/23/2013US8429753 Controlling access to documents using file locks
04/23/2013US8429748 Network traffic analysis using a dynamically updating ontological network description
04/23/2013US8429746 Decoy network technology with automatic signature generation for intrusion detection and intrusion prevention systems
04/23/2013US8429745 Systems and methods for data loss prevention on mobile computing systems
04/23/2013US8429744 Systems and methods for detecting malformed arguments in a function by hooking a generic object
04/23/2013US8429743 Online risk mitigation
04/23/2013US8429734 Method for detecting DNS redirects or fraudulent local certificates for SSL sites in pharming/phishing schemes by remote validation and using a credential manager and recorded certificate attributes
04/23/2013US8429725 System and method for providing a secure connection between networked computers
04/23/2013US8429720 Method and apparatus for camouflaging of data, information and functional transformations
04/23/2013US8429717 Method for activating virtual machine, apparatus for simulating computing device and supervising device
04/23/2013US8429714 Methods and apparatuses for introducing devices with simple user interfaces into a secure network community
04/23/2013US8429712 Centralized user authentication system apparatus and method
04/23/2013US8429711 System and method for executing interactive applications with minimal privileges
04/23/2013US8429708 Method and system for assessing cumulative access entitlements of an entity in a system
04/23/2013US8429660 Systems and methods to allocate application tasks to a pool of processing machines
04/23/2013US8429513 Loading secure code into a memory
04/23/2013US8429426 Secure pipeline manager
04/23/2013US8429425 Electronic backup and restoration of encrypted data
04/23/2013US8429419 Method for securing authorized data entry and the device to perform this method
04/23/2013US8429418 Technique for providing secure firmware
04/23/2013US8429417 Protection against side channel attacks with an integrity check
04/23/2013US8429415 User-selectable signatures
04/23/2013US8429411 Automated selection and inclusion of a message signature