Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294) |
---|
06/13/2012 | CN102495991A Method for carrying out secret communication by using word document |
06/13/2012 | CN102495990A Software protection method based on microchip |
06/13/2012 | CN102495989A Subject-label-based access control method and system |
06/13/2012 | CN102495988A Domain-based access control method and system |
06/13/2012 | CN102495987A Method and system for local confidence breach preventing access to electronic information |
06/13/2012 | CN102495986A Calling control method for avoiding embezzlement of enciphered data in computer system |
06/13/2012 | CN102495985A Role access control method based on dynamic description logic |
06/13/2012 | CN102495984A Equipment operation authority distribution method and system |
06/13/2012 | CN102495983A Method for encrypting and decrypting data of intelligent mobile terminal in real time |
06/13/2012 | CN102495982A Process threading-based copy-protection system and copy-protection storage medium |
06/13/2012 | CN102495981A Fingerprint identifying U shield |
06/13/2012 | CN102495980A Credible password module capable of reconstructing dynamically |
06/13/2012 | CN102495979A System for realizing credible counting in digital resource transaction |
06/13/2012 | CN102495978A Computing method for reliability index of task executive and task execution point in open computing environment |
06/13/2012 | CN102495884A Vulnerability information cloud service method based on Internet |
06/13/2012 | CN102495833A Document watermark copyright information protection device based on Opentype vector outline fonts |
06/13/2012 | CN102004888B Anti-piracy filtering system for use in transmission of digital video works |
06/13/2012 | CN102004883B Trace tracking method for electronic files |
06/13/2012 | CN101937498B Data integrity verification method for shared outscored database |
06/13/2012 | CN101833575B Method for sorting network virus reports |
06/13/2012 | CN101790747B Secure inter-module communication method and device |
06/13/2012 | CN101782956B Method and device for protecting data on basis of AES real-time encryption |
06/13/2012 | CN101632094B Authorisation system, access terminal, authorization server and method for authorizing business |
06/13/2012 | CN101601049B Biometric security system and method |
06/13/2012 | CN101556639B Application packaging device and method for controlling the same |
06/13/2012 | CN101479737B Method and system for authenticating an accessory |
06/13/2012 | CN101430745B Digital rights management method and apparatus of mobile terminal |
06/13/2012 | CN101295352B Human face recognition and user interface system for digital camera and video camera |
06/13/2012 | CN101174291B System and method for secure operating system boot |
06/13/2012 | CN101140610B Contents decryption method using DRM card |
06/13/2012 | CN101073057B Mechanism for providing environment to command line instructions |
06/12/2012 | US8201267 Cryptographic device having active clearing of memory regardless of state of external power |
06/12/2012 | US8201266 Security system to prevent tampering with a server blade |
06/12/2012 | US8201264 Federated digital rights management scheme including trusted systems |
06/12/2012 | US8201258 Secure personalization of memory-based electronic devices |
06/12/2012 | US8201257 System and method of managing network security risks |
06/12/2012 | US8201256 Methods and systems for assessing and advising on electronic compliance |
06/12/2012 | US8201251 Software application verification method and system |
06/12/2012 | US8201248 Authenticating a web page with embedded javascript |
06/12/2012 | US8201246 Preventing malicious codes from performing malicious actions in a computer system |
06/12/2012 | US8201243 Backwards researching activity indicative of pestware |
06/12/2012 | US8201239 Extensible pre-boot authentication |
06/12/2012 | US8201230 Method and system for protecting user choices |
06/12/2012 | US8201228 System and method for securing a network |
06/12/2012 | US8201226 Authorizing network access based on completed educational task |
06/12/2012 | US8201223 Systems and methods for computer implemented treatment of behavorial disorders |
06/12/2012 | US8201220 Network user usage profiling |
06/12/2012 | US8201219 Systems and methods for server load balancing using authentication, authorization, and accounting protocols |
06/12/2012 | US8201216 Techniques for database structure and management |
06/12/2012 | US8201213 Controlling access of application programs to an adaptive input device |
06/12/2012 | US8201211 Method for selecting an executable software image |
06/12/2012 | US8200989 External memory access device and method of accessing external memory |
06/12/2012 | US8200988 Firmware security key upgrade algorithm |
06/12/2012 | US8200983 System and method for tamper-proofing executable binary assemblies |
06/12/2012 | US8200982 Semiotic system and method with privacy protection |
06/12/2012 | US8200981 Data transmission device and data transmission system |
06/12/2012 | US8200980 System and method for enrolling in a biometric system |
06/12/2012 | US8200979 Context-sensitive confidentiality within federated environments |
06/12/2012 | US8200966 Secure network access |
06/12/2012 | US8200964 Method and apparatus for accessing an encrypted file system using non-local keys |
06/12/2012 | US8200952 Platform authentication via a transparent second factor |
06/12/2012 | US8200899 Method and system for providing digital rights management files using caching |
06/12/2012 | US8200760 Storage and authentication of data transactions |
06/12/2012 | US8200581 Digital media asset conversion system and method |
06/12/2012 | US8200195 Intelligent remote device |
06/12/2012 | US8200066 Recording medium, reproducing apparatus and method using personal identification number |
06/12/2012 | US8199914 Detection of a change of the data of a dataset |
06/12/2012 | US8199912 Security storage of electronic keys within volatile memories |
06/12/2012 | US8198984 Method, RFID reader, RFID tag and RFID system for secure communication |
06/12/2012 | US8198641 Semiconductor device with backside tamper protection |
06/12/2012 | US8196815 Secure card terminal using keypad scanning sequence determined by card |
06/07/2012 | WO2012075446A2 Attribute-based access-controlled data-storage system |
06/07/2012 | WO2012075385A2 Protecting files that include editable metadata |
06/07/2012 | WO2012074873A2 Biometric terminals |
06/07/2012 | WO2012074848A1 Pre-heated software installation |
06/07/2012 | WO2012074275A2 User authentication apparatus for internet security, user authentication method for internet security, and recorded medium recording same |
06/07/2012 | WO2012073559A1 Authorization information verification device and authorization information verification program, and authorization information verification system and authorization information verification method |
06/07/2012 | WO2012073108A1 Method for displaying readable contents on a mobile reading device in a location-restricted manner |
06/07/2012 | WO2012072430A1 Method for providing a user with an authenticated remote access to a remote secure device |
06/07/2012 | WO2012072429A1 Method for a client device to access to remote secure data on a remote secure device |
06/07/2012 | WO2012072267A1 Device for and method of handling sensitive data |
06/07/2012 | WO2012072171A1 Method for reversibly coding an engine controller for a motor vehicle in manipulation-proof fashion, and engine controller |
06/07/2012 | WO2012071989A1 Method and system for program identification based on machine learning |
06/07/2012 | WO2012071725A1 Method and apparatus for data selective encryption and decryption |
06/07/2012 | WO2012071635A1 Method for automatically filtering spam |
06/07/2012 | WO2012051452A3 Protecting websites and website users by obscuring urls |
06/07/2012 | WO2012050367A3 Method and apparatus for downloading drm module |
06/07/2012 | US20120144503 Method and device for identifying objects or documents |
06/07/2012 | US20120144502 Directory service distributed product activation |
06/07/2012 | US20120144501 Regulating access to protected data resources using upgraded access tokens |
06/07/2012 | US20120144500 Method and apparatus for protecting data using a virtual environment |
06/07/2012 | US20120144499 System to inform about trademarks similar to provided input |
06/07/2012 | US20120144498 System And Method For Mobile Identity Protection of a User of Multiple Computer Applications, Networks or Devices |
06/07/2012 | US20120144497 Electronic copyright license repository |
06/07/2012 | US20120144496 Electronic device with data protection function and method thereof |
06/07/2012 | US20120144494 System and method for network vulnerability detection and reporting |
06/07/2012 | US20120144493 System and method for network vulnerability detection and reporting |
06/07/2012 | US20120144491 Answering Security Queries Statically Based On Dynamically-Determined Information |
06/07/2012 | US20120144490 Malicious code infection cause-and-effect analysis |
06/07/2012 | US20120144489 Antimalware Protection of Virtual Machines |