Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
09/26/2012 | CN102693390A Rentable main board and method for controlling main board renting |
09/26/2012 | CN102693389A Method and apparatus for controlling CPU and CPU |
09/26/2012 | CN102693388A Data safety protection processing system, method and storage medium |
09/26/2012 | CN102693387A Data wiping method for NTFS (new technology file system) |
09/26/2012 | CN102693386A Method and system for encryption protection of video files |
09/26/2012 | CN102693385A Embedded terminal based on SD (secure digital) trusted computing module and implementation method thereof |
09/26/2012 | CN102693384A Method and apparatus for safe self adjustment of browsers |
09/26/2012 | CN102693383A Webpage tamper proofing method realized by windows driver layer |
09/26/2012 | CN102693382A Password anti-peeping device and anti-peeping method of password anti-peeping device |
09/26/2012 | CN102693381A Method, device and system for anti-theft of portable computer equipment |
09/26/2012 | CN102693380A Password authentication method |
09/26/2012 | CN102693379A Protecting operating system configuration values |
09/26/2012 | CN102693378A Systems and methods for secure transaction management and electronic rights protection |
09/26/2012 | CN102693377A Content data reproduction system and collection system of use history thereof |
09/26/2012 | CN102693376A Method and apparatus for establishing usage rights for digital content to be created in the future |
09/26/2012 | CN102693375A Information processing apparatus, information processing method, and information processing system |
09/26/2012 | CN102693374A File analysis method, user equipment, server and system for data security monitoring and controlling |
09/26/2012 | CN102693373A Service information protective device |
09/26/2012 | CN102693372A Internal memory storage device, internal memory controller and virus scanning method |
09/26/2012 | CN102693371A Safety information interaction equipment and method |
09/26/2012 | CN102693298A Deep recovery method for database content |
09/26/2012 | CN102693251A Data sharing mechanism |
09/26/2012 | CN102693190A Authenticating ferroelectric random access memory (f-ram) device and method |
09/26/2012 | CN102693086A A mobile terminal, and unlocking and locking method thereof |
09/26/2012 | CN102156833B Role-based access control model constructing system |
09/26/2012 | CN102156831B Method and system for protecting interface access security by combining visual array path with hidden operational character |
09/26/2012 | CN102073817B Dynamic access control improvement method on basis of RBAC (Role-Based policies Access Control) model |
09/26/2012 | CN102012988B Automatic binary unwanted code behavior analysis method |
09/26/2012 | CN101996154B General processor supporting reconfigurable safety design |
09/26/2012 | CN101976313B Frequent subgraph mining based abnormal intrusion detection method |
09/26/2012 | CN101976312B Method for enhancing security of Biohashing system |
09/26/2012 | CN101968840B Voltage detection and frequency detection-based chip anti-attack method |
09/26/2012 | CN101925920B Server certificate issuing system and person authentication method |
09/26/2012 | CN101908113B Authentication method and authentication system |
09/26/2012 | CN101887498B Virus checking method based on immune algorithm in mixed peer-to-peer network |
09/26/2012 | CN101617319B Semiconductor device with backside tamper protection |
09/26/2012 | CN101506854B System and method for implementing additional game to players of a lottery game |
09/26/2012 | CN101120355B System for creating control structure for versatile content control |
09/25/2012 | US8276206 Systems and methods for partial matching searches of encrypted retained data |
09/25/2012 | US8276203 System and method for mitigating a denial of service attack in a subscriber network |
09/25/2012 | US8276201 Integrity protection in data processing systems |
09/25/2012 | US8276199 Method and device for secure test port authentication |
09/25/2012 | US8276194 Methods and systems for user authentication |
09/25/2012 | US8276185 Enhanced security memory access method and architecture |
09/25/2012 | US8276184 User-centric resource architecture |
09/25/2012 | US8276138 Segmented virtual machine transport mechanism |
09/25/2012 | US8275998 Encryption device, key distribution device and key distribution system |
09/25/2012 | US8275997 Method of encrypting and transmitting data and system for transmitting encrypted data |
09/25/2012 | US8275996 Incremental encryption of stored information |
09/25/2012 | US8275995 Identity authentication and secured access systems, components, and methods |
09/25/2012 | US8275994 Information storage apparatus and password collation method |
09/25/2012 | US8275993 Author signatures for legal purposes |
09/25/2012 | US8275992 Information processing apparatus for receiving biometric information from an external apparatus |
09/25/2012 | US8275950 Fiber channel connection storage controller |
09/25/2012 | US8275850 Multi-source longitudinal patient-level data encryption process |
09/25/2012 | US8275791 Process for executing a downloadable service receiving restrictive access rights to at least one profile file |
09/25/2012 | US8275745 Secure incremental updates to hierarchicaly structured information |
09/25/2012 | US8275717 Source- and venue-specific inventory data processing and identification system |
09/25/2012 | US8275716 Method and system for subscription digital rights management |
09/25/2012 | US8275133 Method and system for mobile communications |
09/25/2012 | US8274666 Projector/printer for displaying or printing of documents |
09/25/2012 | US8274665 Image sensing and printing device |
09/25/2012 | CA2584525C Secure data parser method and system |
09/25/2012 | CA2458662C Method and system for secure communication |
09/25/2012 | CA2365644C Portable electronic charge and authorization devices and methods therefor |
09/25/2012 | CA2293650C Obfuscation techniques for enhancing software security |
09/21/2012 | CA2769898A1 Login method based on direction of gaze |
09/20/2012 | WO2012125747A2 Techniques for securing a checked-out virtual machine in a virtual desktop infrastructure |
09/20/2012 | WO2012125744A1 Systems and methods for looking up anti-malware metadata |
09/20/2012 | WO2012125640A2 Distributed license management for a data limited application |
09/20/2012 | WO2012125466A1 Efficient indexing and searching of access control listed documents |
09/20/2012 | WO2012124898A2 Method for inputting a password into an electronic terminal |
09/20/2012 | WO2012124849A1 Hard disk security system using cipher system |
09/20/2012 | WO2012124458A1 Authorized party authentication template learning system and authorized party authentication template learning method |
09/20/2012 | WO2012124383A1 Mobile information terminal and gripping characteristics authentication method |
09/20/2012 | WO2012124270A1 Tamper monitoring system, administration device, protection control module, and sensor module |
09/20/2012 | WO2012124257A1 Electronic apparatus, method for controlling electronic apparatus, and program |
09/20/2012 | WO2012124196A1 Programmable controller system, tool device, tool program and recording medium, and programmable controller |
09/20/2012 | WO2012124115A1 Biological information acquisition device, biological information comparison device, and program |
09/20/2012 | WO2012123970A2 A method of optimizing asset risk controls |
09/20/2012 | WO2012123859A1 Transaction security method and device |
09/20/2012 | WO2012123683A1 Method for entering a code using a portable device, and associated portable device |
09/20/2012 | WO2012123400A1 Tamper-protected hardware and methods for using same |
09/20/2012 | WO2012123394A1 Off-line transfer of electronic tokens between peer-devices |
09/20/2012 | WO2012122994A1 Off-line transfer of electronic tokens between peer-devices |
09/20/2012 | WO2012122621A1 Change-tolerant method of generating an identifier for a collection of assets in a computing environment using a secret sharing scheme |
09/20/2012 | WO2012106496A3 Secure social web orchestration via a security model |
09/20/2012 | WO2012096791A8 Methods and systems for distributing cryptographic data to authenticated recipients |
09/20/2012 | WO2012088029A3 Secure application attestation using dynamic measurement kernels |
09/20/2012 | WO2012040231A9 Systems and methods for secure data sharing |
09/20/2012 | US20120240244 Certificates to create product mappings |
09/20/2012 | US20120240243 System, method, and computer program product for creation, transmission, and tracking of electronic document |
09/20/2012 | US20120240242 Resource expression for access control |
09/20/2012 | US20120240241 Method for identity self-validation, suitable for use in computer environments or in real life |
09/20/2012 | US20120240240 Monitoring of digital content |
09/20/2012 | US20120240239 Wireless ad hoc network security |
09/20/2012 | US20120240237 System and method for in-private browsing |
09/20/2012 | US20120240236 Crawling multiple markets and correlating |
09/20/2012 | US20120240235 Methods and systems for providing a framework to test the security of computing system over a network |
09/20/2012 | US20120240234 Usb firewall apparatus and method |