Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
10/04/2012 | US20120253959 License upgrade management |
10/04/2012 | US20120253779 Network stimulation engine |
10/04/2012 | US20120252409 Method and device for setting graph password of communication terminal |
10/04/2012 | US20120252405 Connecting mobile devices, internet-connected hosts, and cloud services |
10/04/2012 | US20120250855 Mix-net system |
10/04/2012 | DE112011100182T5 Transaktionsprüfung für Datensicherheitsvorrichtungen Transaction data for testing safety devices |
10/04/2012 | DE112010003525T5 Verfahren zum Sperren der Ausführung eines Hackprozesses How to disable the execution of a process Hack |
10/04/2012 | DE112009002502T5 Multilayer inhalte-schützender Mikrocontoller Multilayer content Protective micro-controller |
10/04/2012 | DE102012203561A1 Die Personifikation/Bevollmächtigung eines Benutzers in einem Merkmal-basierenden Authentifizierungssystem The personification / authorization of a user in a feature-based authentication system |
10/04/2012 | DE102012203521A1 Architektur mit zwei Vertrauenswürdigkeitsstufen Architecture with two assurance levels |
10/04/2012 | DE102011015967A1 Method for decrypting encrypted digital data e.g. business data stored in notebook in business field, involves decrypting encrypted digital data on mobile terminal by decrypted cryptographical key by processor |
10/04/2012 | DE102011015711A1 Aktualisierung einer Datenträgerapplikation Updating a data carrier application |
10/04/2012 | DE102011015710A1 Verfahren zum Aktualisieren eines Datenträgers A method for updating a data carrier |
10/04/2012 | CA2834853A1 System to identify multiple copyright infringements |
10/04/2012 | CA2831457A1 Enabling a software application to be executed on a hardware device |
10/04/2012 | CA2831369A1 Method of securing non-native code |
10/04/2012 | CA2831367A1 Method and system for protecting execution of cryptographic hash functions |
10/04/2012 | CA2830283A1 Interrogating an authentication device |
10/03/2012 | EP2506519A1 Method for determining integrity in an evolutionary collabroative information system |
10/03/2012 | EP2506259A1 Method and devices for copy protection, copy protected record carrier |
10/03/2012 | EP2506258A1 Method and devices for copy protection, copy protected record carrier |
10/03/2012 | EP2506184A1 Apparatus, method, and program for validating user |
10/03/2012 | EP2506183A1 Systems and methods for gesture lock obfuscation |
10/03/2012 | EP2506182A1 Mobile terminal, memory card socket and method of writing protection for memory card in the mobile terminal |
10/03/2012 | EP2506181A1 A method, a system, a device, a computer program and a computer program product for managing remote devices |
10/03/2012 | EP2506180A1 Automatic analysis of software license usage in a computer network |
10/03/2012 | EP2506179A2 System and method for dynamic generation of anti-virus databases |
10/03/2012 | EP2506178A1 User interface, touch-controlled device and method for authenticating a user of a touch-controlled device |
10/03/2012 | EP2506177A1 Method and device for comparing identification data |
10/03/2012 | EP2506176A1 Establishing unique key during chip manufacturing |
10/03/2012 | EP2506175A1 Enabling a software application to be executed on a mobile station |
10/03/2012 | EP2506174A1 Enabling a software application to be executed on a hardware device |
10/03/2012 | EP2506146A2 System and method for activating, managing and deactivating a plurality of virtual machines on a user device |
10/03/2012 | EP2504967A1 Service access control |
10/03/2012 | EP2504788A1 Method and apparatus for sharing documents |
10/03/2012 | EP2504783A2 Securely sharing design renderings over a network |
10/03/2012 | EP2504780A1 System comprising database and safety device |
10/03/2012 | EP2504772A1 Binding resources in a shared computing environment |
10/03/2012 | CN202472672U Computer started with fingerprint |
10/03/2012 | CN202472671U Screen locking control system of intelligent equipment |
10/03/2012 | CN202472669U Protective isolator of computer system |
10/03/2012 | CN202472668U Network data security isolation equipment |
10/03/2012 | CN202472667U Safety control device |
10/03/2012 | CN202472646U 电子文件管理系统 Electronic Document Management System |
10/03/2012 | CN1985262B Method for providing protected audio/video content |
10/03/2012 | CN102714790A Preservation of user data privacy in a network |
10/03/2012 | CN102714676A An apparatus, method, computer program and user interface |
10/03/2012 | CN102714670A Portable information terminal and image display control method |
10/03/2012 | CN102714669A A method and a system for establishing a communication channel between a predetermined number of selected devices and a device and a server arranged for use in the system |
10/03/2012 | CN102713996A Secret retrieval system, public parameter generation device, encryption device, user secret key generation device, query issue device, retrieval device, computer program, secret retrieval method, public parameter generation method, encryption method, user secret key generation method, query issue method, and retrieval method |
10/03/2012 | CN102713926A Classified information leakage prevention system, classified information leakage prevention method and classified information leakage prevention programme |
10/03/2012 | CN102713925A Sensitive information leakage prevention system, sensitive information leakage prevention method and sensitive information leakage prevention program |
10/03/2012 | CN102713924A Secure time and space shifted audiovisual work |
10/03/2012 | CN102713922A Anytime validation for verification tokens |
10/03/2012 | CN102713921A Determination of pairings on a curve using aggregated inversions |
10/03/2012 | CN102713920A A personalized multifunctional access device possessing an individualized form of authenticating and controlling data exchange |
10/03/2012 | CN102713887A Enhancing biometric security of a system |
10/03/2012 | CN102713839A A system and method for aggressive self-modification in dynamic function call systems |
10/03/2012 | CN102710750A Method and device for achieving user hardware binding between browser/server (B/S) system and Ipad |
10/03/2012 | CN102710626A Convenient one-way file transfer device and method |
10/03/2012 | CN102710588A Method, device, server and system for identifying code in data safety monitoring and controlling |
10/03/2012 | CN102710537A Visual styles for trust categories of messages |
10/03/2012 | CN102708508A Secure wireless electronic-commerce system with wireless network domain |
10/03/2012 | CN102708491A Trusted computing based novel USB (universal serial bus) Key device and safety transaction method thereof |
10/03/2012 | CN102708462A Financial management system |
10/03/2012 | CN102708393A Transponder, method and reader for monitoring access to application data in the transponder |
10/03/2012 | CN102708336A Method and system for electronic document processing based on separation of key data from customized template |
10/03/2012 | CN102708334A Licensing software on a single-user basis |
10/03/2012 | CN102708333A System and method for execution of a secured environment initialization instruction |
10/03/2012 | CN102708332A Method for protecting computer software copyrights by hardware identification codes |
10/03/2012 | CN102708331A Security authentication device and security certification method at BIOS (Basic Input/Output System) grade |
10/03/2012 | CN102708329A Data security management systems and methods |
10/03/2012 | CN102708328A Authenticity code input-type password coding-decoding system |
10/03/2012 | CN102708327A Network community discovery method based on spectrum optimization |
10/03/2012 | CN102708326A Protection method for confidential files |
10/03/2012 | CN102708325A Method and system for killing viruses of virtual desktop environment file |
10/03/2012 | CN102708324A Screen locker unlocking system and method |
10/03/2012 | CN102708323A Method for preventing file object from being reused in safety operation system |
10/03/2012 | CN102708322A Method for protecting JAVA application programs in Android system |
10/03/2012 | CN102708321A Cloud terminal security key |
10/03/2012 | CN102708320A Method and device for recognition of virus APK (android package) |
10/03/2012 | CN102708319A Accessory device authentication |
10/03/2012 | CN102708318A Bank U-shield based fingerprint adapting method, fingerprint adapter and system |
10/03/2012 | CN102708317A Recording auditing method under Windows platform on basis of filter driver |
10/03/2012 | CN102708316A Method for isolating data in multi-tenant architecture |
10/03/2012 | CN102708315A Methods and systems for securely uploading files onto aircraft |
10/03/2012 | CN102708314A Digital rights management provision apparatus, system, and method |
10/03/2012 | CN102708313A Virus detection system and method for large files |
10/03/2012 | CN102708312A Over-the-air delivery of metering certificates and data |
10/03/2012 | CN102708311A Power signature obfuscation |
10/03/2012 | CN102708310A Registration code anti-piracy encryption method for computer software in batch production |
10/03/2012 | CN102708309A Automatic malicious code analysis method and system |
10/03/2012 | CN102708054A Detection method for security flaws in loop write-only memory of binary program |
10/03/2012 | CN102708013A Program-instruction-controlled instruction flow supervision |
10/03/2012 | CN102707890A Browsing method and device for webpages |
10/03/2012 | CN102707826A Information processing apparatus |
10/03/2012 | CN102043916B High-performance extensible public key password coprocessor structure |
10/03/2012 | CN102034046B Data underlay encryption method based on disk drive in cloud computing environment |
10/03/2012 | CN102034042B Novel unwanted code detecting method based on characteristics of function call relationship graph |
10/03/2012 | CN102024108B Single motherboard dual independent safety computer system |