Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
11/2012
11/28/2012CN102804750A A method for generating an image file for forgery verification and a method for forgery verification of an image file
11/28/2012CN102804682A Mutual mobile authentication using a key management center
11/28/2012CN102804677A Discovery of secure network enclaves
11/28/2012CN102804199A Access control system
11/28/2012CN102804197A Method and apparatus for controlling content playback in content delivery system
11/28/2012CN102804196A Computing device with graphical authentication interface
11/28/2012CN102804195A Graphical authentication
11/28/2012CN102804194A Method, Apparatus, And Computer Program For Providing Application Security
11/28/2012CN102804193A Rights managed distributable software
11/28/2012CN102802153A Authenticating multiple devices simultaneously using a single wireless subscriber identity module
11/28/2012CN102801759A Digital rights management system and method for protecting digital content
11/28/2012CN102801709A Phishing website identification system and method
11/28/2012CN102801704A Method for providing multimedia data via communication network and playing the multimedia data
11/28/2012CN102801697A Malicious code detection method and system based on plurality of URLs (Uniform Resource Locator)
11/28/2012CN102799837A Line and surface type global information system (GIS) vector data disguise and reduction method based on interpolation prediction
11/28/2012CN102799836A Software promotion method
11/28/2012CN102799835A Pug-in anti-regeneration method and corresponding plug-in anti-regeneration system
11/28/2012CN102799834A System-asset-based software security requirement analysis method
11/28/2012CN102799832A Method and apparatus for securing a programmable device using a kill switch
11/28/2012CN102799831A Information safety protection system of application system based on database and information safety protection method
11/28/2012CN102799830A Improved SQL (Structured Query Language) injection flaw detection method
11/28/2012CN102799829A E-bank second-generation U-shield interface supporting multi-types of mobile devices and connection method thereof
11/28/2012CN102799828A Second-generation U-key supporting mobile terminal
11/28/2012CN102799827A Data effective protection of mobile device
11/28/2012CN102799826A Method and device for detecting application program installation package decompression process and client device
11/28/2012CN102799825A Method, device, terminal and server for pushing safety application programs
11/28/2012CN102799824A Method and system for defending virus file with digital signature information
11/28/2012CN102799823A Virus detection method and system
11/28/2012CN102799822A Software running security measurement and estimation method based on network environment
11/28/2012CN102799821A Method for checking intelligent card and identity of card holder, and face identification identity checking device
11/28/2012CN102799820A Recovery method of user password
11/28/2012CN102799819A Embedded software safety protection system
11/28/2012CN102799818A Method and device for managing digital resources
11/28/2012CN102799817A System and method for malware protection using virtualization
11/28/2012CN102799816A Software safety function component management method based on CC (the Common Criteria for Information Technology Security Evaluation)
11/28/2012CN102799815A Method and device for safely loading program library
11/28/2012CN102799814A Phishing website search system and method
11/28/2012CN102799813A Hardware Trojan horse detection system based on puf
11/28/2012CN102799812A Method and device for processing application program
11/28/2012CN102799811A Scanning method and device
11/28/2012CN102799810A Encryption software-based encrypted file management system
11/28/2012CN102799809A Tamper-resistant system for electronic signature
11/28/2012CN102799808A Monitoring method for safe use of storing process of database
11/28/2012CN102799807A Digital rights management content playing method, user equipment and domain manager
11/28/2012CN102799806A Tree structure-based cryptographic algorithm logical expression identification method
11/28/2012CN102799805A Account managing device and image processing system
11/28/2012CN102799804A Comprehensive identification method and system for security of unknown file
11/28/2012CN102799803A Secure removable media and method for managing the same
11/28/2012CN102799802A Computer security protection method and system based on Bluetooth
11/28/2012CN102799801A Method and system for killing viruses of mobile equipment by utilizing mobile memory
11/28/2012CN102799800A Security encryption coprocessor and wireless sensor network node chip
11/28/2012CN102799799A Password protection carrier generating method and device
11/28/2012CN102799798A Method for not restoring write-ins in overall restoring condition of computer system
11/28/2012CN102799363A Method for implementing picture screen locking and mobile terminal
11/28/2012CN102096781B Fishing detection method based on webpage relevance
11/28/2012CN102073829B Document encrypting method and document decrypting method on basis of voice print
11/28/2012CN102034045B Software bug detection system with low computer system resource expense
11/28/2012CN102024114B Malicious code prevention method based on unified extensible fixed interface
11/28/2012CN101988356B Fixed seat of anti-theft lock
11/28/2012CN101983393B Method for the reliable and targeted suppression of alarms in a monitoring and control centre
11/28/2012CN101930517B Detection method of bot program
11/28/2012CN101877754B Information equipment apparatus
11/28/2012CN101866404B Software system module independent authorization control method and device
11/28/2012CN101853356B Application executing device, managing method, and program
11/28/2012CN101807236B Authentication method, authentication system and corresponding terminal and headend equipment
11/28/2012CN101719246B Method for authenticating and fast outputting soft-dog of text electronic seal
11/28/2012CN101707663B Image forming apparatus and authentication method
11/28/2012CN101620656B Safety JTAG module and method for protecting safety of information inside chip
11/28/2012CN101615250B Generating a challenge response image including a recognizable image
11/28/2012CN101563695B Arrangement and method for providing data
11/28/2012CN101527717B Implementation method of ternary-equally recognizing credible network connecting architecture
11/28/2012CN101432749B Communications device monitoring
11/28/2012CN101425115B High-frequency clock detection circuit
11/28/2012CN101322424B Method for issuer and chip specific diversification
11/28/2012CN101311940B Control content device output method and equipment
11/28/2012CN101286987B Method for transferring authority license of software
11/27/2012US8321954 Informing recipient device of message content properties
11/27/2012US8321953 Secure storage device with offline code entry
11/27/2012US8321952 Method and system for monitoring online computer network behavior and creating online behavior profiles
11/27/2012US8321951 License information management apparatus, method, and program
11/27/2012US8321947 Method and system for dynamically generating a watermarked document during a printing or display operation
11/27/2012US8321946 Method and system for preventing identity theft in electronic communications
11/27/2012US8321942 Selecting malware signatures based on malware diversity
11/27/2012US8321941 Malware modeling detection system and method for mobile platforms
11/27/2012US8321939 Method and an apparatus to perform multiple packet payloads analysis
11/27/2012US8321937 Methods and system for determining performance of filters in a computer intrusion prevention detection system
11/27/2012US8321933 Securing electronic control unit code
11/27/2012US8321932 Program-based authorization
11/27/2012US8321931 Method and apparatus for sequential hypervisor invocation
11/27/2012US8321930 Keyboard input coordinate-based login system
11/27/2012US8321924 Method for protecting software accessible over a network using a key device
11/27/2012US8321923 Secure sharing of resources between applications in independent execution environments in a retrievable token (e.g. smart card)
11/27/2012US8321914 System and method for verifying an attribute in records for procurement application
11/27/2012US8321913 Location based authentication
11/27/2012US8321912 Centralized identity authentication for electronic communication networks
11/27/2012US8321911 Secure game download
11/27/2012US8321866 System and method for data synchronization for a computer architecture for broadband networks
11/27/2012US8321864 Device management
11/27/2012US8321691 EMA protection of a calculation by an electronic circuit
11/27/2012US8321689 Watermarking computer code by equivalent mathematical expressions