Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
01/2013
01/17/2013US20130015900 Countermeasure method and device for protecting data circulating in an electronic microcircuit
01/17/2013US20130015239 Handheld electronic device with dual image sensors and processor for decoding imaged coding pattern
01/17/2013DE102012209249A1 Sicherheitsvorrichtung Safety device
01/17/2013DE102011107104A1 Method for operating security module e.g. trusted platform module in e.g. smart card, involves selectively operating current edge law of signal by adding interference signals to delay current edge detection with pattern recognition
01/17/2013DE102005014462B4 Verfahren zum Starten eines sicheren Kernels in einem System Method for starting a secure kernel in a system
01/17/2013CA2878751A1 An electronic data sharing device and method of use
01/17/2013CA2841529A1 Method and apparatus for using non-volatile storage device
01/17/2013CA2840992A1 Syntactical fingerprinting
01/16/2013EP2546775A1 Recording system, reproduction system, key distribution server, recording device, recording medium device, reproduction device, recording method, and reproduction method
01/16/2013EP2546774A1 Authentication system and method
01/16/2013EP2546773A1 Biometric authentication device, biometric authentication program and method
01/16/2013EP2545677A2 Automated certificate management
01/16/2013EP2545507A2 Method and system for detecting fraudulent internet merchants
01/16/2013EP2545488A1 Data capture tool and method
01/16/2013EP2545487A2 Efficient security-constrained optimal power flow (sc opf) analysis using convexification of continuos variable constraints within a bi-level decomposition scheme
01/16/2013EP2545486A1 Method for authenticating a portable data carrier
01/16/2013EP2545485A1 A secured personal data handling and management system
01/16/2013EP2545484A2 Method and apparatus for software boot revocation
01/16/2013EP2545483A1 Protection against access violation during the execution of an operating sequence in a portable data carrier
01/16/2013EP2545482A1 Secure dynamic authority delegation
01/16/2013EP2545464A2 Method for producing and managing a large-volume long-term archive
01/16/2013EP2545463A1 Data protection
01/16/2013EP2545448A1 Task-based access control in a virtualization environment
01/16/2013EP2466517A9 Simple algebraic and multi-layered passwords
01/16/2013CN202677407U Computer safety information detecting system based on U disk authentication
01/16/2013CN1774061B Digital signal processing apparatus
01/16/2013CN102884535A Protected device management
01/16/2013CN102884534A Methods, devices and computer program supports for password generation and verification
01/16/2013CN102884509A Overlay human interactive proof system and techniques
01/16/2013CN102883047A Method and system for realizing data security of intelligent mobile terminals
01/16/2013CN102882843A Encryption-software based automated detection and maintenance methods
01/16/2013CN102882680A Systems and methods for authenticating electronic message
01/16/2013CN102882677A Digital rights management method
01/16/2013CN102880840A Current type physical unclonable function circuit for defending attack
01/16/2013CN102880839A Solar photo-thermal power generation site system protection device
01/16/2013CN102880838A Method and device for detecting electronic equipment
01/16/2013CN102880837A Method for improving security of mobile terminal and mobile terminal
01/16/2013CN102880836A Security device
01/16/2013CN102880835A Data security for a database in a multi-nodal environment
01/16/2013CN102880834A Method for protecting privacy information by maintaining numerical characteristics of data numerical
01/16/2013CN102880833A Two-dimensional code anti-fake verification method for documents
01/16/2013CN102880832A Method for implementing mass data management system under colony
01/16/2013CN102880831A Method for securely copying confidential paper
01/16/2013CN102880830A Acquisition method and device of original test data
01/16/2013CN102880829A Safety detection system and detection method of information technology equipment
01/16/2013CN102880828A Intrusion detection and recovery system aiming at virtualization support environment
01/16/2013CN102880827A Method and system for managing computer terminals
01/16/2013CN102880826A Dynamic integrity measurement method for security of electronic government cloud platform
01/16/2013CN102880825A Method and system for efficiently calling hardware encryption equipment in UNIX/LINUX environment
01/16/2013CN102880824A Data sharing system with digital key
01/16/2013CN102880823A 信息处理方法及信息处理系统 The information processing method and information processing system
01/16/2013CN102880822A USBKEY safety protection device
01/16/2013CN102880821A Automatic security protection and energy-saving system for computer, and method for system
01/16/2013CN102880820A Method for accessing application program of mobile terminal and mobile terminal
01/16/2013CN102880819A Password setting method and system for users outside system and password setting center
01/16/2013CN102880818A Software protection method
01/16/2013CN102880817A Running protection method for computer software product
01/16/2013CN102880816A Software protection device based on SOC multi-core integration and operating method thereof
01/16/2013CN102880815A Application program temporary storage space-based protection method and system
01/16/2013CN102880814A Shielding system and shielding method
01/16/2013CN102880702A Method and system for detecting database kernel invasion hidden trigger
01/16/2013CN102880701A Method and system for detecting database kernel invasion hidden object
01/16/2013CN102880668A Comprehensive emergency management platform data storage method and platform framework adopting same
01/16/2013CN102880491A Method for loading operating system into computer
01/16/2013CN102880484A Method and system for performing start registration, characteristic extraction and login information binding of software login window on intelligent equipment
01/16/2013CN102880461A Compiling and linking method and device
01/16/2013CN102880398A Mobile phone unlocking method based on random digital arrays and mobile phone
01/16/2013CN102880384A Method and device for unlocking mobile terminal screen and mobile terminal comprising device
01/16/2013CN102880305A Keyboard input encryption method and mobile terminal thereof
01/16/2013CN102880274A Standby state power management chip of electronic product
01/16/2013CN102880095A Protective method for solar photo-thermal power generation on-scene system
01/16/2013CN102243630B Method for establishing database cipher text indexes without partial ordering relation
01/16/2013CN102110206B Method for defending attack and device with attack defending function
01/16/2013CN102081713B Office system for preventing data from being divulged
01/16/2013CN101996291B Data manipulation method and device
01/16/2013CN101996286B Dynamic security measure implementation method, security measurement device and application system
01/16/2013CN101976209B Adapting configuration for incompatible application programs
01/16/2013CN101964036B Leak detection method and device
01/16/2013CN101964033B Method for generating machine identification code of flat panel detector and extended application method
01/16/2013CN101960464B Information processing device
01/16/2013CN101739519B Monitoring apparatus and monitoring method for hardware
01/16/2013CN101727941B Method and system for hiding decryption key in distributed way
01/16/2013CN101667995B Method and system for managing digital copyright, hardware security unit and computer
01/16/2013CN101568803B Navigation apparatus and information distribution system
01/16/2013CN101551838B Identity authentication method and system of memory card
01/16/2013CN101548506B Apparatus and a security node for use in determining security attacks
01/16/2013CN101459668B Contents viewing and listening management apparatus, contents viewing and listening management system and method thereof
01/16/2013CN101166095B Saving and retrieving data based on public key encryption
01/16/2013CN101099207B Portable data support with watermark function
01/15/2013USRE43936 Method and system for providing secure digital music duplication
01/15/2013US8356358 Preventing information leakage between components on a programmable chip in the presence of faults
01/15/2013US8356357 Detecting tainted documents by tracking transformed confidential data
01/15/2013US8356356 Anti-debugger comprising spatially and temporally separate detection and response portions
01/15/2013US8356355 DVD copy protection
01/15/2013US8356353 System and method for simulating computer network attacks
01/15/2013US8356348 Computer system with electronic lock
01/15/2013US8356347 Migrating a virtual TPM instance and preserving uniqueness and completeness of the instance
01/15/2013US8356342 Method and system for issuing a kill sequence for a token
01/15/2013US8356339 Device controller, system, and method for authenticated printing
01/15/2013US8356307 Information processing method, apparatus, and system for controlling computer resources, control method therefor, storage medium, and program