Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
03/2013
03/20/2013EP2569698A2 Redirection of information from secure virtual machines to unsecure virtual machines
03/20/2013EP2569693A2 Methods and systems for forcing an application to store data in a secure storage location
03/20/2013EP2569692A1 One-time use password systems and methods
03/20/2013CN202815855U Multichannel notebook burglar alarm
03/20/2013CN202815854U Data secure storage interactive device
03/20/2013CN202815853U Second-generation U shield supportive to mobile terminals
03/20/2013CN202815852U Portable computer terminal with safety and secrecy
03/20/2013CN202815851U Self-help optical disk burning full life circle monitoring and auditing system
03/20/2013CN202815850U Excel budgeting system
03/20/2013CN202815730U Multi-functional keyboard for financial affair purpose
03/20/2013CN102986161A Method for the cryptographic protection of an application
03/20/2013CN102985931A Communication control system, server device, and communication control method
03/20/2013CN102985930A 信息处理装置以及信息处理方法 The information processing apparatus and an information processing method
03/20/2013CN102985929A External boot device, external boot program, external boot method and network communication system
03/20/2013CN102985928A Identifying polymorphic malware
03/20/2013CN102984421A Device and system and method for image output
03/20/2013CN102984215A Technique to apply and share remote policies on mobile devices
03/20/2013CN102983970A 便携式媒体设备 Portable media devices
03/20/2013CN102983969A Security login system and security login method for operating system
03/20/2013CN102983966A Content delivery service providing apparatus and content delivery service terminal unit
03/20/2013CN102982309A Biometric authentication unit
03/20/2013CN102982293A Delivering secured media using a portable memory device
03/20/2013CN102982292A Method of obtaining credible file digital signature and device and system thereof
03/20/2013CN102982291A Methods and device of dependable file digital signature acquisition
03/20/2013CN102982290A Storage device and terminal device
03/20/2013CN102982289A Method of data protection and mobile intelligent terminal
03/20/2013CN102982288A An apparatus and a method for performing encryption or decryption of data in a portable terminal
03/20/2013CN102982287A A system and method of providing information stored in a memory
03/20/2013CN102982286A Generation method and system of privacy policy of constants bit rate (CBR) under pervasive computing environment
03/20/2013CN102982285A Dependable computing measurement method and device thereof and dependable computing terminal
03/20/2013CN102982284A Scanning equipment, cloud management equipment and method and system used for malicious program checking and killing
03/20/2013CN102982283A System and method for killing protected malicious computer process
03/20/2013CN102982282A Program bug detection system and method
03/20/2013CN102982281A Program condition detecting method and system
03/20/2013CN102982280A Methods and device of avoiding computer aided design (CAD) virus infection
03/20/2013CN102982279A Computer aided design virus infection prevention system and computer aided design virus infection prevention method
03/20/2013CN102982278A Method and device and system for scanning files
03/20/2013CN102982277A Method and system achieving embedded system software patching
03/20/2013CN102982276A Method and device for application control
03/20/2013CN102982275A Security control method and device for running applications
03/20/2013CN102982274A Management method of intelligent terminal system and intelligent terminal
03/20/2013CN102982273A Information processing system, image forming apparatus, management apparatus, and information processing method
03/20/2013CN102982272A Method and device for keyboard layout
03/20/2013CN102982271A Method and device for signing and authenticating network transaction
03/20/2013CN102982270A Computer fingerprint login system based on BIOS (basic input / output system)
03/20/2013CN102982269A Anti-peeping code authentication method and anti-peeping code authentication system based on biological metering characteristics
03/20/2013CN102982268A Information certificate system taking network account as permission and corresponding information certificate presentation method
03/20/2013CN102982267A Safety protection method and system and terminal
03/20/2013CN102982266A Information input display device and control program thereof
03/20/2013CN102982265A Authentication method for storing basic input and output system (BIOS) setting
03/20/2013CN102982264A Method for protecting embedded type device software
03/20/2013CN102982263A Application program protection method and equipment
03/20/2013CN102982262A Security mechanism for developmental operating systems
03/20/2013CN102982261A System and method for tracking a downloaded digital media file
03/20/2013CN102982260A Linux operation system and verification method for installing serial number thereof
03/20/2013CN102982259A Encrypted content key control unit
03/20/2013CN102982258A System for conducting original-edition check to mobile application program
03/20/2013CN102982257A Digital rights management using trusted processing techniques
03/20/2013CN102982256A Device and method for digital rights management
03/20/2013CN102982255A 内容提供系统及其提供方法 The content providing system and to provide a method
03/20/2013CN102982254A Information processing system, information processing device, information processing method and program
03/20/2013CN102982180A Method and device for storing data
03/20/2013CN102982082A Intelligent caching for security trimming
03/20/2013CN102981980A Method for control access in storage device
03/20/2013CN102981903A Method for process multiplexing in multi-core browser and multi-core browser of process multiplexing
03/20/2013CN102981881A Method and system for preventing mobile terminal from being updated to illegal firmware version
03/20/2013CN102981879A Supply method, acquisition method, equipment and processing system of application software installation package
03/20/2013CN102981846A Method for treating password input box element and browser for treating the password input box element
03/20/2013CN102981596A 终端和屏幕界面显示方法 Terminal and screen interface display method
03/20/2013CN102981428A Microcontroller order protection structure based on security application and encryption and decryption method thereof
03/20/2013CN102222198B License transfer system, license information issue server and method
03/20/2013CN102184371B Detecting method and system for database operation authority of SQL (Structured Query Language)
03/20/2013CN102147844B Laptop
03/20/2013CN102129532B Method and system for digital copyright protection
03/20/2013CN102063431B Information database system and method for controlling systematic access of information database
03/20/2013CN101923617B Cloud-based sample database dynamic maintaining method
03/20/2013CN101853345B Method and apparatus for processing data stored in external storage device
03/20/2013CN101729442B Method and device for realizing content sharing
03/20/2013CN101689237B Activation system architecture
03/20/2013CN101677441B Method, device and system of authorization control
03/20/2013CN101561279B Method and device for starting navigation system
03/20/2013CN101425027B Virtual machine safety protocol method and system based on TPM
03/20/2013CN101263501B Hardware driver integrity check of memory card controller firmware
03/20/2013CN101009005B Method, system and platform for securing safety of payment based on internet
03/19/2013USRE44099 Method for protection of data reproduction according to both medium protection data and apparatus protection data
03/19/2013US8402557 Systems and methods for secure transaction management and electronic rights protection
03/19/2013US8402551 Digital rights management method for terminal
03/19/2013US8402549 Application software protecting method and stream transmitting/receiving system
03/19/2013US8402548 Providing user confidence information to third-party systems
03/19/2013US8402545 Systems and methods for identifying unique malware variants
03/19/2013US8402541 Proactive exploit detection
03/19/2013US8402536 Signature based authentication of the configuration of a configurable logic component
03/19/2013US8402535 Providing greater access to one or more items in response to determining device transfer
03/19/2013US8402534 Management system, program recording medium, and program distribution apparatus
03/19/2013US8402533 Input to locked computing device
03/19/2013US8402522 System and method for managing services and jobs running under production IDs without exposing passwords for the production IDs to humans
03/19/2013US8402518 Secure management of authentication information
03/19/2013US8402358 System and method of dynamically generating index information
03/19/2013US8402287 Protection against side channel attacks
03/19/2013US8402284 Symbiotic storage devices