Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
11/28/2012 | CN102804750A A method for generating an image file for forgery verification and a method for forgery verification of an image file |
11/28/2012 | CN102804682A Mutual mobile authentication using a key management center |
11/28/2012 | CN102804677A Discovery of secure network enclaves |
11/28/2012 | CN102804199A Access control system |
11/28/2012 | CN102804197A Method and apparatus for controlling content playback in content delivery system |
11/28/2012 | CN102804196A Computing device with graphical authentication interface |
11/28/2012 | CN102804195A Graphical authentication |
11/28/2012 | CN102804194A Method, Apparatus, And Computer Program For Providing Application Security |
11/28/2012 | CN102804193A Rights managed distributable software |
11/28/2012 | CN102802153A Authenticating multiple devices simultaneously using a single wireless subscriber identity module |
11/28/2012 | CN102801759A Digital rights management system and method for protecting digital content |
11/28/2012 | CN102801709A Phishing website identification system and method |
11/28/2012 | CN102801704A Method for providing multimedia data via communication network and playing the multimedia data |
11/28/2012 | CN102801697A Malicious code detection method and system based on plurality of URLs (Uniform Resource Locator) |
11/28/2012 | CN102799837A Line and surface type global information system (GIS) vector data disguise and reduction method based on interpolation prediction |
11/28/2012 | CN102799836A Software promotion method |
11/28/2012 | CN102799835A Pug-in anti-regeneration method and corresponding plug-in anti-regeneration system |
11/28/2012 | CN102799834A System-asset-based software security requirement analysis method |
11/28/2012 | CN102799832A Method and apparatus for securing a programmable device using a kill switch |
11/28/2012 | CN102799831A Information safety protection system of application system based on database and information safety protection method |
11/28/2012 | CN102799830A Improved SQL (Structured Query Language) injection flaw detection method |
11/28/2012 | CN102799829A E-bank second-generation U-shield interface supporting multi-types of mobile devices and connection method thereof |
11/28/2012 | CN102799828A Second-generation U-key supporting mobile terminal |
11/28/2012 | CN102799827A Data effective protection of mobile device |
11/28/2012 | CN102799826A Method and device for detecting application program installation package decompression process and client device |
11/28/2012 | CN102799825A Method, device, terminal and server for pushing safety application programs |
11/28/2012 | CN102799824A Method and system for defending virus file with digital signature information |
11/28/2012 | CN102799823A Virus detection method and system |
11/28/2012 | CN102799822A Software running security measurement and estimation method based on network environment |
11/28/2012 | CN102799821A Method for checking intelligent card and identity of card holder, and face identification identity checking device |
11/28/2012 | CN102799820A Recovery method of user password |
11/28/2012 | CN102799819A Embedded software safety protection system |
11/28/2012 | CN102799818A Method and device for managing digital resources |
11/28/2012 | CN102799817A System and method for malware protection using virtualization |
11/28/2012 | CN102799816A Software safety function component management method based on CC (the Common Criteria for Information Technology Security Evaluation) |
11/28/2012 | CN102799815A Method and device for safely loading program library |
11/28/2012 | CN102799814A Phishing website search system and method |
11/28/2012 | CN102799813A Hardware Trojan horse detection system based on puf |
11/28/2012 | CN102799812A Method and device for processing application program |
11/28/2012 | CN102799811A Scanning method and device |
11/28/2012 | CN102799810A Encryption software-based encrypted file management system |
11/28/2012 | CN102799809A Tamper-resistant system for electronic signature |
11/28/2012 | CN102799808A Monitoring method for safe use of storing process of database |
11/28/2012 | CN102799807A Digital rights management content playing method, user equipment and domain manager |
11/28/2012 | CN102799806A Tree structure-based cryptographic algorithm logical expression identification method |
11/28/2012 | CN102799805A Account managing device and image processing system |
11/28/2012 | CN102799804A Comprehensive identification method and system for security of unknown file |
11/28/2012 | CN102799803A Secure removable media and method for managing the same |
11/28/2012 | CN102799802A Computer security protection method and system based on Bluetooth |
11/28/2012 | CN102799801A Method and system for killing viruses of mobile equipment by utilizing mobile memory |
11/28/2012 | CN102799800A Security encryption coprocessor and wireless sensor network node chip |
11/28/2012 | CN102799799A Password protection carrier generating method and device |
11/28/2012 | CN102799798A Method for not restoring write-ins in overall restoring condition of computer system |
11/28/2012 | CN102799363A Method for implementing picture screen locking and mobile terminal |
11/28/2012 | CN102096781B Fishing detection method based on webpage relevance |
11/28/2012 | CN102073829B Document encrypting method and document decrypting method on basis of voice print |
11/28/2012 | CN102034045B Software bug detection system with low computer system resource expense |
11/28/2012 | CN102024114B Malicious code prevention method based on unified extensible fixed interface |
11/28/2012 | CN101988356B Fixed seat of anti-theft lock |
11/28/2012 | CN101983393B Method for the reliable and targeted suppression of alarms in a monitoring and control centre |
11/28/2012 | CN101930517B Detection method of bot program |
11/28/2012 | CN101877754B Information equipment apparatus |
11/28/2012 | CN101866404B Software system module independent authorization control method and device |
11/28/2012 | CN101853356B Application executing device, managing method, and program |
11/28/2012 | CN101807236B Authentication method, authentication system and corresponding terminal and headend equipment |
11/28/2012 | CN101719246B Method for authenticating and fast outputting soft-dog of text electronic seal |
11/28/2012 | CN101707663B Image forming apparatus and authentication method |
11/28/2012 | CN101620656B Safety JTAG module and method for protecting safety of information inside chip |
11/28/2012 | CN101615250B Generating a challenge response image including a recognizable image |
11/28/2012 | CN101563695B Arrangement and method for providing data |
11/28/2012 | CN101527717B Implementation method of ternary-equally recognizing credible network connecting architecture |
11/28/2012 | CN101432749B Communications device monitoring |
11/28/2012 | CN101425115B High-frequency clock detection circuit |
11/28/2012 | CN101322424B Method for issuer and chip specific diversification |
11/28/2012 | CN101311940B Control content device output method and equipment |
11/28/2012 | CN101286987B Method for transferring authority license of software |
11/27/2012 | US8321954 Informing recipient device of message content properties |
11/27/2012 | US8321953 Secure storage device with offline code entry |
11/27/2012 | US8321952 Method and system for monitoring online computer network behavior and creating online behavior profiles |
11/27/2012 | US8321951 License information management apparatus, method, and program |
11/27/2012 | US8321947 Method and system for dynamically generating a watermarked document during a printing or display operation |
11/27/2012 | US8321946 Method and system for preventing identity theft in electronic communications |
11/27/2012 | US8321942 Selecting malware signatures based on malware diversity |
11/27/2012 | US8321941 Malware modeling detection system and method for mobile platforms |
11/27/2012 | US8321939 Method and an apparatus to perform multiple packet payloads analysis |
11/27/2012 | US8321937 Methods and system for determining performance of filters in a computer intrusion prevention detection system |
11/27/2012 | US8321933 Securing electronic control unit code |
11/27/2012 | US8321932 Program-based authorization |
11/27/2012 | US8321931 Method and apparatus for sequential hypervisor invocation |
11/27/2012 | US8321930 Keyboard input coordinate-based login system |
11/27/2012 | US8321924 Method for protecting software accessible over a network using a key device |
11/27/2012 | US8321923 Secure sharing of resources between applications in independent execution environments in a retrievable token (e.g. smart card) |
11/27/2012 | US8321914 System and method for verifying an attribute in records for procurement application |
11/27/2012 | US8321913 Location based authentication |
11/27/2012 | US8321912 Centralized identity authentication for electronic communication networks |
11/27/2012 | US8321911 Secure game download |
11/27/2012 | US8321866 System and method for data synchronization for a computer architecture for broadband networks |
11/27/2012 | US8321864 Device management |
11/27/2012 | US8321691 EMA protection of a calculation by an electronic circuit |
11/27/2012 | US8321689 Watermarking computer code by equivalent mathematical expressions |