KR102178048B1
|
|
Data monitoring method by detecting personal information downloaded
|
KR102178049B1
|
|
Data monitoring method based on oersonal information asset and grasp the current use state
|
KR102013678B1
|
|
Secure file system and management method having realtime encrypting data
|
KR101975385B1
|
|
Visualization monitoring system and monitoring method for network security-situation
|
KR101979915B1
|
|
Mixing method and mixing system of policy control for access control based on role/rule
|
KR101980843B1
|
|
System and method for checking session via proxy
|
KR101843161B1
|
|
Security method and system for server using the identification of a remote server work
|
KR101764678B1
|
|
System and method for security gateway automatic changeover of ap server by tracking processing
|
KR101516751B1
|
|
Decryption protecting method and system editable the cryptogram
|
KR101497629B1
|
|
Access control system and method for file on linux kernel
|
KR101410445B1
|
|
Discrmination system and method for server operation by script
|
KR101395830B1
|
|
Session checking system via proxy and checkhing method thereof
|
KR101448711B1
|
|
security system and security method through communication encryption
|
KR101214613B1
|
|
Security method and security system based on proxy for identifying connector credibly
|
KR101160219B1
|
|
Tracking system and method of connecting route for the network security
|
KR101069367B1
|
|
Security system and method of important information by query change
|
KR101083425B1
|
|
Database detecting system and detecting method using the same
|
KR101134091B1
|
|
Database secure system preventing the access to the database by detour
|
KR101027725B1
|
|
Security system
|
KR100897930B1
|
|
Communication system guaranteeing to maintain network on in the communications hit
|