Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
09/2012
09/12/2012CN102663299A Hardware resource information security online detecting system facing to terminal computers
09/12/2012CN102663298A Safety online detecting system facing to terminal computers
09/12/2012CN102663297A Font acquiring method, character displaying device, character displaying system and electronic signature tool
09/12/2012CN102663296A Intelligent detection method for Java script malicious code facing to the webpage
09/12/2012CN102663295A General adapter system for E-DRM (enterprise digital rights management)
09/12/2012CN102663294A Automatic analysis of software license usage in a computer network
09/12/2012CN102663293A Protection method and protection device for video devices of computer
09/12/2012CN102663292A Method and system for realizing smart card application and deployment
09/12/2012CN102663291A Information prompting method and information prompting device for e-mails
09/12/2012CN102663290A Method of digital right management based on virtual machine
09/12/2012CN102663289A Method and device for intercepting rogue program of modifying page elements
09/12/2012CN102663288A Virus killing method and device thereof
09/12/2012CN102663287A Attack characteristic extraction method for realizing sequence-based alignment through code conversion
09/12/2012CN102663286A Method and device for identifying virus APK (android package)
09/12/2012CN102663285A Extracting method and extracting device for APK (android package) virus characteristic code
09/12/2012CN102663284A Malicious code identification method based on cloud computing
09/12/2012CN102663283A Method for dynamically isolating computer system
09/12/2012CN102663282A Method and device for data encryption and data decryption
09/12/2012CN102663281A Method and device for detecting malicious software
09/12/2012CN102663280A Identity authentication apparatus and system
09/12/2012CN102663279A Starting up lock method for protecting personal information
09/12/2012CN102663278A Cloud computing mode Internet of Things platform data processing safety protection method
09/12/2012CN102663277A Photos prevention method based on fluctuation refresh rate
09/12/2012CN102663276A System and method providing uniform interface for user space information abstract, encryption and compression in Linux operation system
09/12/2012CN102663275A A hardware screen-locking and screen-unlocking method, apparatus and a computer screen saver device
09/12/2012CN102663274A Method and system for detecting remote computer-invading behavior
09/12/2012CN102663273A Improved management of software licenses in a computer network
09/12/2012CN102663185A Hardware Trojan-resisting circuit design method based on blurring processing
09/12/2012CN102663000A Establishment method for malicious website database, method and device for identifying malicious website
09/12/2012CN102662920A Method and system for transmitting text
09/12/2012CN102662873A Device for realizing insulation blocking of storage carrier data
09/12/2012CN102662872A Trusted cryptography module based method for protection of virtual disk image files
09/12/2012CN102662871A Trusted cryptography module based system and method for protection of virtual disk completeness
09/12/2012CN102662870A Android operation system protection method based on input/output request intercepted by VFS (virtual file system) layer
09/12/2012CN102662840A Automatic detecting system and method for extension behavior of Firefox browser
09/12/2012CN102662830A Code reuse attack detection system based on dynamic binary translation framework
09/12/2012CN102662684A Method for Window XP system to realize memory protection mode
09/12/2012CN102142069B Method for hiding folders
09/12/2012CN101894232B Safe input method applied to identity authentication
09/12/2012CN101414327B Method for file protection
09/12/2012CN101352018B Method and system for network protection
09/11/2012US8266717 Monitoring device for a computing device of a computer system, the computer system, and method for monitoring the computing device of the computer system
09/11/2012US8266716 Digital rights management of streaming captured content based on criteria regulating a sequence of elements
09/11/2012US8266715 Method for executing digital right management and tracking using characteristic of virus and system for executing the method
09/11/2012US8266713 Method, system and controller for transmitting and dispatching data stream
09/11/2012US8266711 Method for controlling information supplied from memory device
09/11/2012US8266710 Methods for preventing software piracy
09/11/2012US8266709 Adjustable resolution media format
09/11/2012US8266707 Tamper resistant method, apparatus and system for secure portability of digital rights management-protected content
09/11/2012US8266705 Information transmission apparatus, data transmission apparatus, information transmission destination designating method, data transmitting designating method, data transmitting method, program and storage medium
09/11/2012US8266702 Analyzing access control configurations
09/11/2012US8266701 Systems and methods for measuring cyber based risks in an enterprise organization
09/11/2012US8266698 Using machine infection characteristics for behavior-based detection of malware
09/11/2012US8266692 Malware automated removal system and method
09/11/2012US8266691 Renewable integrity rooted system
09/11/2012US8266687 Discovery of the use of anonymizing proxies by analysis of HTTP cookies
09/11/2012US8266684 Tokenized resource access
09/11/2012US8266682 System and methods for weak authentication data reinforcement
09/11/2012US8266671 Policy-enabled aggregation of IM user communities
09/11/2012US8266452 System and method for communicating confidential messages
09/11/2012US8266451 Voice activated smart card
09/11/2012US8266449 Security for storage devices
09/11/2012US8266446 Software protection against fault attacks
09/11/2012US8266445 Encrypted communication system, encrypted communication method, encrypting device, and decrypting device
09/11/2012US8266444 Chip integrated protection means
09/11/2012US8266443 Systems and methods for secure and authentic electronic collaboration
09/11/2012US8266442 Remote entry system
09/11/2012US8266440 Information processing apparatus and authentication information migration method
09/11/2012US8266431 Method and apparatus for performing encryption of data at rest at a port of a network device
09/11/2012US8266428 Secure communication system and method of IPv4/IPv6 integrated network system
09/11/2012US8266423 Protection against attacks by generation of errors on jump instructions
09/11/2012US8266421 Private electronic information exchange
09/11/2012US8266176 Storage system and file access determination method of the same
09/11/2012US8266113 Methods, apparatus and articles of manufacture for computer file integrity and baseline maintenance
09/11/2012US8266063 Software distribution method and apparatus
09/11/2012US8266062 Server side reversible hash for telephone-based licensing mechanism
09/11/2012US8266061 Apparatus and method for digital content editing
09/11/2012US8265608 Data processing method for portable communication terminal and portable communication terminal
09/11/2012US8265276 Method for combining transfer functions and predetermined key creation
09/11/2012US8265271 Method and device for managing a transmission of keys
09/11/2012US8265267 Information security device
09/11/2012US8265266 Cryptographic method comprising secure modular exponentiation against hidden-channel attacks, cryptoprocessor for implementing the method and associated chip card
09/11/2012US8265157 Motion vector refinement for MPEG-2 to H.264 video transcoding
09/11/2012US8265135 Method and apparatus for video processing
09/11/2012US8264326 Biometrics sensor
09/11/2012CA2762688A1 Multiple hypothesis tracking
09/11/2012CA2762677A1 Multiple hypothesis tracking
09/11/2012CA2712542C Two-tier deep analysis of html traffic
09/11/2012CA2463775C Digital medium enhanced image-guided procedure system and method
09/11/2012CA2424067C Peer-to-peer name resolution protocol (pnrp) security infrastructure and method
09/07/2012WO2012119101A1 Sharing user id between operating system and application
09/07/2012WO2012119030A2 Methods and systems for determing risk associated with a requirements document
09/07/2012WO2012119021A1 System and method for packet profiling
09/07/2012WO2012119015A1 Providing subscriber consent in an operator exchange
09/07/2012WO2012118984A2 Protecting operating system configuration values
09/07/2012WO2012118517A1 Large interactive device logon systems and methods
09/07/2012WO2012118464A1 Non-authentic disc deactivation method
09/07/2012WO2012118205A1 Policy arbitration method, policy arbitration server, and program
09/07/2012WO2012117536A1 File sharing device, file sharing method, and program
09/07/2012WO2012117311A1 Protection of stored data using optical emitting elements