Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
09/2012
09/26/2012CN102693390A Rentable main board and method for controlling main board renting
09/26/2012CN102693389A Method and apparatus for controlling CPU and CPU
09/26/2012CN102693388A Data safety protection processing system, method and storage medium
09/26/2012CN102693387A Data wiping method for NTFS (new technology file system)
09/26/2012CN102693386A Method and system for encryption protection of video files
09/26/2012CN102693385A Embedded terminal based on SD (secure digital) trusted computing module and implementation method thereof
09/26/2012CN102693384A Method and apparatus for safe self adjustment of browsers
09/26/2012CN102693383A Webpage tamper proofing method realized by windows driver layer
09/26/2012CN102693382A Password anti-peeping device and anti-peeping method of password anti-peeping device
09/26/2012CN102693381A Method, device and system for anti-theft of portable computer equipment
09/26/2012CN102693380A Password authentication method
09/26/2012CN102693379A Protecting operating system configuration values
09/26/2012CN102693378A Systems and methods for secure transaction management and electronic rights protection
09/26/2012CN102693377A Content data reproduction system and collection system of use history thereof
09/26/2012CN102693376A Method and apparatus for establishing usage rights for digital content to be created in the future
09/26/2012CN102693375A Information processing apparatus, information processing method, and information processing system
09/26/2012CN102693374A File analysis method, user equipment, server and system for data security monitoring and controlling
09/26/2012CN102693373A Service information protective device
09/26/2012CN102693372A Internal memory storage device, internal memory controller and virus scanning method
09/26/2012CN102693371A Safety information interaction equipment and method
09/26/2012CN102693298A Deep recovery method for database content
09/26/2012CN102693251A Data sharing mechanism
09/26/2012CN102693190A Authenticating ferroelectric random access memory (f-ram) device and method
09/26/2012CN102693086A A mobile terminal, and unlocking and locking method thereof
09/26/2012CN102156833B Role-based access control model constructing system
09/26/2012CN102156831B Method and system for protecting interface access security by combining visual array path with hidden operational character
09/26/2012CN102073817B Dynamic access control improvement method on basis of RBAC (Role-Based policies Access Control) model
09/26/2012CN102012988B Automatic binary unwanted code behavior analysis method
09/26/2012CN101996154B General processor supporting reconfigurable safety design
09/26/2012CN101976313B Frequent subgraph mining based abnormal intrusion detection method
09/26/2012CN101976312B Method for enhancing security of Biohashing system
09/26/2012CN101968840B Voltage detection and frequency detection-based chip anti-attack method
09/26/2012CN101925920B Server certificate issuing system and person authentication method
09/26/2012CN101908113B Authentication method and authentication system
09/26/2012CN101887498B Virus checking method based on immune algorithm in mixed peer-to-peer network
09/26/2012CN101617319B Semiconductor device with backside tamper protection
09/26/2012CN101506854B System and method for implementing additional game to players of a lottery game
09/26/2012CN101120355B System for creating control structure for versatile content control
09/25/2012US8276206 Systems and methods for partial matching searches of encrypted retained data
09/25/2012US8276203 System and method for mitigating a denial of service attack in a subscriber network
09/25/2012US8276201 Integrity protection in data processing systems
09/25/2012US8276199 Method and device for secure test port authentication
09/25/2012US8276194 Methods and systems for user authentication
09/25/2012US8276185 Enhanced security memory access method and architecture
09/25/2012US8276184 User-centric resource architecture
09/25/2012US8276138 Segmented virtual machine transport mechanism
09/25/2012US8275998 Encryption device, key distribution device and key distribution system
09/25/2012US8275997 Method of encrypting and transmitting data and system for transmitting encrypted data
09/25/2012US8275996 Incremental encryption of stored information
09/25/2012US8275995 Identity authentication and secured access systems, components, and methods
09/25/2012US8275994 Information storage apparatus and password collation method
09/25/2012US8275993 Author signatures for legal purposes
09/25/2012US8275992 Information processing apparatus for receiving biometric information from an external apparatus
09/25/2012US8275950 Fiber channel connection storage controller
09/25/2012US8275850 Multi-source longitudinal patient-level data encryption process
09/25/2012US8275791 Process for executing a downloadable service receiving restrictive access rights to at least one profile file
09/25/2012US8275745 Secure incremental updates to hierarchicaly structured information
09/25/2012US8275717 Source- and venue-specific inventory data processing and identification system
09/25/2012US8275716 Method and system for subscription digital rights management
09/25/2012US8275133 Method and system for mobile communications
09/25/2012US8274666 Projector/printer for displaying or printing of documents
09/25/2012US8274665 Image sensing and printing device
09/25/2012CA2584525C Secure data parser method and system
09/25/2012CA2458662C Method and system for secure communication
09/25/2012CA2365644C Portable electronic charge and authorization devices and methods therefor
09/25/2012CA2293650C Obfuscation techniques for enhancing software security
09/21/2012CA2769898A1 Login method based on direction of gaze
09/20/2012WO2012125747A2 Techniques for securing a checked-out virtual machine in a virtual desktop infrastructure
09/20/2012WO2012125744A1 Systems and methods for looking up anti-malware metadata
09/20/2012WO2012125640A2 Distributed license management for a data limited application
09/20/2012WO2012125466A1 Efficient indexing and searching of access control listed documents
09/20/2012WO2012124898A2 Method for inputting a password into an electronic terminal
09/20/2012WO2012124849A1 Hard disk security system using cipher system
09/20/2012WO2012124458A1 Authorized party authentication template learning system and authorized party authentication template learning method
09/20/2012WO2012124383A1 Mobile information terminal and gripping characteristics authentication method
09/20/2012WO2012124270A1 Tamper monitoring system, administration device, protection control module, and sensor module
09/20/2012WO2012124257A1 Electronic apparatus, method for controlling electronic apparatus, and program
09/20/2012WO2012124196A1 Programmable controller system, tool device, tool program and recording medium, and programmable controller
09/20/2012WO2012124115A1 Biological information acquisition device, biological information comparison device, and program
09/20/2012WO2012123970A2 A method of optimizing asset risk controls
09/20/2012WO2012123859A1 Transaction security method and device
09/20/2012WO2012123683A1 Method for entering a code using a portable device, and associated portable device
09/20/2012WO2012123400A1 Tamper-protected hardware and methods for using same
09/20/2012WO2012123394A1 Off-line transfer of electronic tokens between peer-devices
09/20/2012WO2012122994A1 Off-line transfer of electronic tokens between peer-devices
09/20/2012WO2012122621A1 Change-tolerant method of generating an identifier for a collection of assets in a computing environment using a secret sharing scheme
09/20/2012WO2012106496A3 Secure social web orchestration via a security model
09/20/2012WO2012096791A8 Methods and systems for distributing cryptographic data to authenticated recipients
09/20/2012WO2012088029A3 Secure application attestation using dynamic measurement kernels
09/20/2012WO2012040231A9 Systems and methods for secure data sharing
09/20/2012US20120240244 Certificates to create product mappings
09/20/2012US20120240243 System, method, and computer program product for creation, transmission, and tracking of electronic document
09/20/2012US20120240242 Resource expression for access control
09/20/2012US20120240241 Method for identity self-validation, suitable for use in computer environments or in real life
09/20/2012US20120240240 Monitoring of digital content
09/20/2012US20120240239 Wireless ad hoc network security
09/20/2012US20120240237 System and method for in-private browsing
09/20/2012US20120240236 Crawling multiple markets and correlating
09/20/2012US20120240235 Methods and systems for providing a framework to test the security of computing system over a network
09/20/2012US20120240234 Usb firewall apparatus and method