Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
04/2011
04/20/2011CN102024127A Control platform, user terminal, distribution system and method of application software
04/20/2011CN102024126A Information encryption method and apparatus
04/20/2011CN102024125A Information safety management method applied in computer and computer system configuration
04/20/2011CN102024124A Method, device and system for processing mobile widgets as well as client-side
04/20/2011CN102024123A Method and device for importing mirror image of virtual machine in cloud calculation
04/20/2011CN102024122A Software management apparatus, software distribution server, software distribution system, and software installation method
04/20/2011CN102024121A Platform security apparatus and method thereof
04/20/2011CN102024120A Method for using digital signature to detect falsification possibility of software
04/20/2011CN102024119A Control system, security check method and embedded system
04/20/2011CN102024118A Method and device for protecting programmable device
04/20/2011CN102024117A Method for verifying computer operating windows operating system
04/20/2011CN102024116A Access control method for user data files
04/20/2011CN102024115A Computer with user security subsystem
04/20/2011CN102024114A Malicious code prevention method based on unified extensible fixed interface
04/20/2011CN102024113A Method and system for quickly detecting malicious code
04/20/2011CN102024112A PE (portable executable) file pack detection method based on static characteristics
04/20/2011CN102024111A On-line scanning method for website programs
04/20/2011CN102024110A Method and system for safely isolating desktop
04/20/2011CN102024109A Method for checking security of operating system based on Meta operating system (MetaOS) technology
04/20/2011CN102024108A Single motherboard dual independent safety computer system
04/20/2011CN102024107A Application software control platform, developer terminal as well as application software distribution system and method
04/20/2011CN102024106A Method for executing user customization code in encryption card and encryption card
04/20/2011CN102024105A Security certification method and device
04/20/2011CN102024104A Computer safety inspecting and scoring method
04/20/2011CN102024103A Computer system and method of controlling the same
04/20/2011CN102024102A Offline DRM certificate management and control method in embedded equipment
04/20/2011CN102024101A Method for preventing electronic equipment from being stolen by automatic locking
04/20/2011CN102024100A System and method for local generation of license and activation of digital rights management agent
04/20/2011CN102024099A A personal computer booting identification method and a system for the same
04/20/2011CN102023935A Data storage apparatus having cryption and method thereof
04/20/2011CN102023856A Method for outputting and operating data at server in formatting way according to demands of user
04/20/2011CN102023736A Method and device for storing position of point
04/20/2011CN101667238B Virtual instrument measuring support storage device
04/20/2011CN101561851B Open file encrypting method without distinguishing file types
04/20/2011CN101499039B Information storage apparatus for sharing individual information of user and its sharing method
04/20/2011CN101493875B USB interface hardware storage apparatus with log off function when missed and implementing method
04/20/2011CN101421737B Method and system for securing interface access via visual array paths in combination with hidden operators
04/20/2011CN101404052B Method for remotely activating software
04/20/2011CN101370069B 图像加密/解密系统 Image encryption / decryption system
04/20/2011CN101369897B Method and equipment for detecting network attack
04/20/2011CN101369228B Software hot-plug method for improving software system security
04/20/2011CN101369141B Protection unit for a programmable data processing unit
04/20/2011CN101281574B Technical method preventing software protecting equipment being unlawfully shared
04/20/2011CN101256611B Method for implementing digital copyright management protection in Java application
04/20/2011CN101243453B Controlling embedded memory access
04/20/2011CN101226575B Method for locking application program
04/20/2011CN101201848B Scanned document management system and method
04/20/2011CN101160915B Method for charging precisely in the digital rights management and a device thereof
04/20/2011CN101120332B Method and system for preventing malicious code from being introduced into a protected network
04/20/2011CN101089865B Method, device and system for field grant transfer
04/19/2011US7930765 Control of consumption of media objects
04/19/2011US7930764 Certificate based digital rights management
04/19/2011US7930763 Method of authorising a computing entity
04/19/2011US7930761 Secure detection network system
04/19/2011US7930760 Centralized enforcement of name-based computer system security rules
04/19/2011US7930758 Digital rights management method and digital rights management-enabled mobile device
04/19/2011US7930757 Offline access in a document control system
04/19/2011US7930756 Multi-level cryptographic transformations for securing digital assets
04/19/2011US7930753 Methods and systems for performing security risk assessments of internet merchant entities
04/19/2011US7930749 Accelerated data scanning
04/19/2011US7930742 Multiple-level data processing system
04/19/2011US7930724 Secure distribution of video on-demand
04/19/2011US7930703 System and method for providing access to multimedia content via a serial connection
04/19/2011US7930563 Reliability platform configuration measurement, authentication, attestation and disclosure
04/19/2011US7930562 Method of and apparatus for reproducing information, and security module
04/19/2011US7930561 System and method for regulating the transmission of media data
04/19/2011US7930558 Data recorder restoring original data allowed to exist only uniquely
04/19/2011US7930556 Fingerprint system and method for access control
04/19/2011US7930555 Image recognition
04/19/2011US7930554 Remote authentication and transaction signatures
04/19/2011US7930553 System and method for extending secure authentication using unique session keys derived from entropy generated by authentication method
04/19/2011US7930552 Intelligent encryption key with biometric identification function and operating method for the same
04/19/2011US7930548 Image verification system, image verification apparatus, and image verification method
04/19/2011US7930537 Architecture for encrypted application installation
04/19/2011US7930536 Device-to-device authentication system, device-to-device authentication method, communication apparatus, and computer program
04/19/2011US7930503 Method and apparatus for operating multiple security modules
04/19/2011US7930493 System and method for record retention date in a write once read many storage system
04/19/2011US7930415 Method and system for authentication when certification authority public and private keys expire
04/19/2011US7930345 Method for authenticating a user in an interactive gaming environment
04/19/2011US7930328 Apparatus, system, and method for file system sharing
04/19/2011US7930252 Method and system for sharing anonymous user information
04/19/2011US7930250 Method for managing user domain in digital rights management and system thereof
04/19/2011US7929951 Systems and methods for storage of user information and for verifying user identity
04/19/2011US7929732 Methods of identifier determination and of biometric verification and associated systems
04/19/2011US7929701 Multiple level public key hierarchy for performance and high security
04/19/2011US7929695 Printing system and printer with electronic signature capability and method thereof
04/19/2011US7929692 Firmware encrypting and decrypting method and an apparatus using the same
04/19/2011US7926713 Settlement server, settlement request server and settlement execution terminal
04/19/2011US7926708 Image data recording method, method of recording finished work by image data, image data recording apparatus, and finished work recording system using image data
04/19/2011CA2611549C Method and system for providing a secure login solution using one-time passwords
04/19/2011CA2541639C System and method for application authorization
04/19/2011CA2434328C Methods and systems for cryptographically protecting secure content
04/19/2011CA2400204C Method and apparatus for providing secure control of software or firmware code downloading and secure operation of a computing device receiving downloaded code
04/14/2011WO2011044581A2 Method, system and apparatus for identification
04/14/2011WO2011044399A2 System for remote monitoring and modulation of medical apparatus
04/14/2011WO2011043627A2 Method for curing malicious site, apparatus, and network-based malicious site curing system
04/14/2011WO2011043558A2 System for tracking containers and logistics using a biometric identity card and a csd
04/14/2011WO2011043422A1 Mobile device, and security lock control method and program thereof
04/14/2011WO2011042892A1 Platform security
04/14/2011WO2011042363A1 Method and apparatus for using cryptographic mechanisms to provide access to a portable device using integrated authentication using another portable device.