Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity; Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
CERTIFICATE BASED PROFILE CONFIRMATION
#2CODE DEPLOYMENT
#3Method and Apparatus for Operating a Computer
#4APPLICATION PROGRAMMING INTERFACE FOR AUTOMATED OPERATIONS MANAGEMENT
#5SYSTEMS AND METHODS FOR IN-PROCESS URL CONDEMNATION
#6SECURITY POLICIES FOR SOFTWARE CALL STACKS
#7STATIC ANALYSIS CORRELATION SCANNERS
#8SYSTEMS AND METHODS FOR CHECKING SAFETY PROPERTIES
#9SYSTEM AND METHOD FOR MANAGING COMPATIBILITY OF MODULES OF DATA PROCESSING SYSTEMS
#10METHOD AND SYSTEM FOR VERIFYING INTEGRITY OF A DIGITAL ASSET USING A DISTRIBUTED HASH TABLE AND A PEER TO-PEER DISTRIBUTED LEDGER
#11COMPUTER-BASED PLATFORMS AND SYSTEMS CONFIGURED TO ENHANCE A CALL SCREEN WITH USER-CONTROLLED NOTES ASSOCIATED WITH THE CALL AND METHODS OF USE THEREOF
#12MANAGING THE LOADING OF SENSITIVE MODULES
#13TYPOSQUATTING DETECTION VIA METADATA-BASED TRUSTWORTHINESS SCORING AND PACKAGE IDENTIFIER SIMILARITY
#14Virtual Environment Type Validation For Policy Enforcement
#15PROMPTING DATA SESSION
#16SYSTEMS AND METHODS FOR MEDIATING PERMISSIONS
#17Security Against Physical Keystroke Simulation
#18NORMALIZING EXTERNAL APPLICATION DATA
#19VARIABLE TIMEOUTS BETWEEN OPERATING MODES OF A COMPUTER FOR DETECTING MALICIOUS SOFTWARE
#20INFORMATION PROCESSING SYSTEM
#21RESTRICTING ACCESS TO APPLICATION PROGRAMMING INTERFACES (APIs)
#22AUTOMATICALLY GROUPING APPLICATIONS IN A SECURE WORKSPACE ENVIRONMENT
#23METHODS AND SYSTEMS FOR COUNSELING A USER WITH RESPECT TO SUPERVISED CONTENT
#24DIFFERENTIATED CONTAINERIZATION AND EXECUTION OF WEB CONTENT BASED ON TRUST LEVEL AND OTHER ATTRIBUTES
#25IDENTIFYING AND CONSENTING TO PERMISSIONS FOR WORKFLOW AND CODE EXECUTION
#26SYSTEM AND METHOD FOR SECURING A BRAIN-COMPUTER INTERFACE
#27METHOD FOR IDENTIFYING POTENTIAL DATA EXFILTRATION ATTACKS IN AT LEAST ONE SOFTWARE PACKAGE
#28SYSTEMS, METHODS, AND APPARATUS FOR SECURING USER DOCUMENTS
#29AUDITING AND SECURING PROGRAM CALLS
#30SOFTWARE INTEGRITY CHECKING SYSTEMS AND METHODS
#31MITIGATING FPGA RELATED RISKS
#32Secure firewall configurations
#33SECURITY DEFENDING METHOD AND ELECTRONIC APPARATUS
#34SYSTEMS AND METHODS FOR DETECTING DOMAIN IMPERSONATION
#35METHODS AND SYSTEMS IMPLEMENTED IN A NETWORK ARCHITECTURE WITH NODES CAPABLE OF PERFORMING MESSAGE-BASED TRANSACTIONS
#36SECURE AND TRUSTWORTHY COMPUTING ENVIRONMENTS FOR EXCHANGES
#37METHODS AND SYSTEMS IMPLEMENTED IN A NETWORK ARCHITECTURE WITH NODES CAPABLE OF PERFORMING MESSAGE-BASED TRANSACTIONS
#38SYSTEMS AND METHODS FOR POLICY LINKING AND/OR LOADING FOR SECURE INITIALIZATION
#39WORKFLOWS FOR AUTOMATED OPERATIONS MANAGEMENT
#40PROGRAM ANALYSIS DEVICE, PROGRAM ANALYSIS METHOD, AND COMPUTER-READABLE MEDIUM
#41SYSTEM AND METHOD FOR DETECTING MALICIOUS CODE BY AN INTERPRETER IN A COMPUTING DEVICE
#42CONTROL FLOW INTEGRITY MONITORING FOR APPLICATIONS RUNNING ON PLATFORMS
#43Webpage integrity monitoring
#44CUSTOMER SERVICE SYSTEMS AND PORTALS
#45CONSTRAINING APPLICATION WORKLOADS USING DATA COMPLIANCE RULES
#46METHODS AND SYSTEMS FOR DISPLAYING REMOTE BROWSER ISOLATION (RBI) PROTECTED BROWSING
#47Method for Executing a Program on a Data Processing Device
#48COMPUTER DEVICE AND METHOD FOR CONTROLLING PROCESS COMPONENTS
#49Data store with dynamic filtering for increased accessibility and enhanced security
#50CONTROL FLOW INTEGRITY TO PREVENT POTENTIAL LEAKAGE OF SENSITIVE DATA TO ADVERSARIES
#51CLOUD NATIVE VIRTUAL MACHINE RUNTIME PROTECTION
#52SYSTEM AND METHOD FOR DETECTING VULNERABILITIES IN THE OPERATING SYSTEM BASED ON PROCESS AND THREAD DATA
#53Machine Learning Techniques for Detecting Anomalous API Call Behavior
#54Protected QR code scanner using operational system override
#55Workflows for automated operations management
#56Package structure and method of forming the same
#57METHODS AND SYSTEMS FOR VERIFYING APPLICATIONS
#58METHOD FOR OPERATING A CONTROL UNIT ON WHICH MULTIPLE APPLICATIONS ARE EXECUTED
#59PROVIDING SYSTEM SERVICES
#60SYSTEM AND METHOD OF ANOMALY DETECTION IN THE BEHAVIOR OF TRUSTED PROCESS
#61PROVIDING ACCESS TO A HARDWARE RESOURCE BASED ON A CANARY VALUE
#62(BIOS) enforced application blocklist system and method
#63Open source library security rating
#64Secure Runtime Systems And Methods
#65Software discovery within software packaging and deployment systems
#66Application Data Transmission Method, User Equipment, and System
#67Method and apparatus for multi-dimensional attestation for a software application
#68System and method for automatic generation of malware detection traps
#69Authentication device, method and system
#70SOFTWARE UPDATES IN A NETWORK INTERFACE DEVICE
#71INFORMATION PROCESSING APPARATUS, IMAGE FORMATION APPARATUS, AND INFORMATION PROCESSING METHOD
#72MOBILE DEVICE WITH SECURE PRIVATE MEMORY
#73AUTOMATED PERSISTENT CONTEXT-AWARE DEVICE PROVISIONING
#74RAPID LAUNCH OF SECURE EXECUTABLES IN A VIRTUALIZED ENVIRONMENT
#75Computer-based platforms and systems configured to enhance a call screen with user-controlled notes associated with the call and methods of use thereof
#76Methods and apparatus for generic process chain entity mapping
#77UTILIZING MACHINE-LEARNING MODELS TO DETERMINE TAKE-OVER SCORES AND INTELLIGENTLY SECURE DIGITAL ACCOUNT FEATURES
#78METHOD AND SYSTEM FOR DETECTING AND PREVENTING UNAUTHORIZED ACCESS TO A COMPUTER
#79Methods and systems for executing smart contracts in secure environments
#80Methods for managing verification and validation of third-party code and devices thereof
#81INFORMATION PROCESSING APPARATUS, CONTROL METHOD THEREFOR, AND PROGRAM
#82CODE INJECTION DETECTION USING SYNTACTIC DEVIATION
#83Control systems and methods for blood or fluid handling medical devices
#84INFORMATION PROCESSING APPARATUS THAT REGISTERS FUNCTION INFORMATION ALONG WITH USER INFORMATION, WHEN REREGISTERING USER INFORMATION ONCE DELETED
#85METHOD FOR PROVIDING A CLIENT COMPUTER DEVICE WITH ACCESS TO A DATABASE MANAGEMENT SYSTEM
#86Systems and methods for protecting core files in a content management systems
#87DEFENDING AGAINST COMPUTING ATTACKS
#88Automated operations management for computer systems
#89Managing the loading of sensitive modules
#90System Function Invoking Method and Apparatus, and Terminal
#91Software integrity checking systems and methods
#92VERIFYING THE TRUSTWORTHINESS OF WEB APPLICATIONS
#93TECHNIQUES FOR MANAGING SOFTWARE APPLICATIONS
#94Software type and version identification for security operations
#95Method and Intelligent Apparatus for Calling Permission Verification of Protected Intelligent Application
#96WEBPAGE INTEGRITY MONITORING
#97Workflows for automated operations management
#98SYSTEM AND METHOD FOR IMPROVING CYBERSECURITY FOR TELECOMMUNICATION DEVICES
#99System, Method, and Apparatus for Smart Whitelisting/Blacklisting
#100SECURE USER INTERFACE SIDE-CHANNEL ATTACK PROTECTION
#101Mobile device security, device management, and policy enforcement in a cloud-based system
#102Chip booting control method, chip, and display panel
#103Method and System for Executing Applications Using Native Code Modules
#104Unattended deployment of information handling systems
#105Method and system for verifying integrity of a digital asset using a distributed hash table and a peer to-peer distributed ledger
#106Secure execution environment for applications using blockchain
#107Virtual environment type validation for policy enforcement
#108Network Security Using a Malware Defense Profile
#109Techniques for securing network environments by identifying device attributes based on string field conventions
#110SECURE COMPUTATION ENVIRONMENT
#111System and method for detecting and preventing changes in business-critical applications that modify its state to non-secure and/or non- compliant
#112Methods and systems for counseling a user with respect to supervised content
#113METHOD AND SYSTEM FOR VERIFYING OWNERSHIP OF A DIGITAL ASSET USING A DISTRIBUTED HASH TABLE AND A PEER-TO-PEER DISTRIBUTED LEDGER
#114METHOD AND SYSTEM FOR VERIFYING OWNERSHIP OF A DIGITAL ASSET USING A DISTRIBUTED HASH TABLE AND A PEER-TO-PEER DISTRIBUTED LEDGER
#115Adaptive and secure bytecode injection based on comparison with previously stored bytecode
#116Thwarting store-to-load forwarding side channel attacks by pre-forwarding matching of physical address proxies and/or permission checking
#117INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM
#118Repositioning applications from physical devices to the cloud
#119ACCESS MONITORING OF MOBILE DEVICE IN POSSESSION BY UNAUTHORIZED USER
#120Systems and methods for optimizing a machine learning-informed automated decisioning workflow in a machine learning task-oriented digital threat mitigation platform
#121Systems and methods for mediating permissions
#122WEBPAGE INTEGRITY MONITORING
#123Methods for managing verification and validation of third-party code and devices thereof
#124Methods for managing verification and validation of third-party code and devices thereof
#125Detecting potentially malicious code in data through data profiling with an information analyzer
#126System and method for translating mapping policy into code
#127PROVISIONING CONTROL APPARATUS AND METHOD FOR PROVISIONING ELECTRONIC DEVICES
#128Systems and methods for policy linking and/or loading for secure initialization
#129Identifying and consenting to permissions for workflow and code execution
#130SOFTWARE CONTAINER CONFIGURATION
#131ENFORCING POLICIES FOR UNMANAGED APPLICATIONS
#132Integrity manifest certificate
#133System and method for automatically identifying software vulnerabilities using named entity recognition
#134EXECUTION CODE PROVISION METHOD AND SOFTWARE DEVELOPMENT SYSTEM
#135System and method of fileless malware detection and non-transitory computer readable medium
#136Methods and systems for verifying applications
#137MDM-based persistent security monitoring
#138Secured code package for browser plugin
#139KERNEL BASED EXPLOITATION DETECTION AND PREVENTION USING GRAMMATICALLY STRUCTURED RULES
#140Systems and methods for using attribute data for system protection and security awareness training
#141System and methods for automated software analysis and classification
#142System and method for securing a network against malicious communications through peer-based cooperation
#143RESTRICTING ACCESS TO APPLICATION FUNCTIONALITY BASED UPON WORKING STATUS
#144SYSTEMS AND METHODS FOR A.I.-BASED MALWARE ANALYSIS ON OFFLINE ENDPOINTS IN A NETWORK
#145Systems and methods for in-process URL condemnation
#146Secure and trustworthy computing environments for exchanges
#147Correlation between source code repositories and web endpoints
#148Launching applications
#149Computer analysis of software permissions for protecting access to data
#150Real-Time Detection and Blocking of Counterfeit Websites
#151DETERMINING A SECURITY STATE BASED ON COMMUNICATION WITH AN AUTHENTICITY SERVER
#152LABELED SECURITY FOR CONTROL FLOW INSIDE EXECUTABLE PROGRAM CODE
#153Remote attestation for multi-core processor
#154System and method for re-enumerating a secured drive dynamically within an operating system
#155Information processing apparatus, control method of information processing apparatus, and storage medium
#156Detecting and preventing unauthorized command injection
#157EMBEDDING SECURITY REQUIREMENTS IN CONTAINER IMAGES
#158Method and Apparatus for Device Lock Control
#159Secure approval chain for runtime protection
#160Secure debugging
#161REPUTATION MANAGEMENT AND INTENT-BASED SECURITY MECHANISMS
#162Intelligent launch of applications
#163Methods for fast, secure boot from nonvolatile memory device and corresponding systems and devices for the same
#164TASK ENGINE
#165APPLYING SECURITY MITIGATION MEASURES FOR STACK CORRUPTION EXPLOITATION IN INTERMEDIATE CODE FILES
#166Efficient validation of transaction policy compliance in a distributed ledger system
#167Visual classification according to binary memory dump
#168SYSTEMS AND METHODS FOR METADATA CLASSIFICATION
#169Cloud native virtual machine runtime protection
#170System, method, and apparatus for enhanced whitelisting
#171Security policies for software call stacks
#172Temporary removal of software programs to secure mobile device
#173Mobile device with secure private memory
#174System and Method for Supervising Processes Among Embedded Systems
#175METHODS AND SYSTEMS IMPLEMENTED IN A NETWORK ARCHITECTURE WITH NODES CAPABLE OF PERFORMING MESSAGE-BASED TRANSACTIONS
#176System and method for distributed security forensics
#177METHODS AND APPARATUSES FOR ACQUIRING INFORMATION
#178METHODS, APPARATUSES AND SYSTEMS FOR NEGOTIATING DIGITAL STANDARDS AND COMPLIANCE
#179Information processing apparatus, method of activating an application and storage medium
#180Authorization for the loading of an application onto a security element
#181Glitch attack mitigation for in-vehicle networks
#182BLOCKCHAIN WITH NON-TURING COMPLETE SYSTEM GUARDS
#183Out of band management of basic input/output system secure boot variables
#184ELECTRONIC DEVICE FOR PROVIDING SECURITY-REQUIRED SERVICE THROUGH SECURE ELEMENT, AND METHOD FOR CONTROLLING SAME ELECTRONIC DEVICE
#185DISPLAY CONTROL APPARATUS, DISPLAY APPARATUS, DISPLAY CONTROL SYSTEM, AND STORAGE MEDIUM
#186Dynamic application-level compliance enforcement
#187Mobile device security, device management, and policy enforcement in a cloud-based system
#188SYSTEMS AND METHODS FOR INTELLIGENT MONITORING
#189Systems and methods for checking safety properties
#190Secure code jump and execution gating
#191Method for deleting safety service and electronic device
#192Method for managing application permission and electronic device
#193Virus immune computer system and method
#194Ahead of time application launching for cybersecurity threat intelligence of network security events
#195Cryptography module and method for operating same
#196METHODS AND APPARATUS TO IMPROVE DETECTION OF MALWARE IN EXECUTABLE CODE
#197SLEEP STATES DETECTIONS
#198CENTRALIZED CONTROLLER MANAGEMENT AND ANOMALY DETECTION
#199Providing access to a hardware resource based on a canary value
#200Deep application discovery and forensics for automated threat modeling
#201Systems, methods, and apparatus for securing user documents
#202In-memory protection for controller security
#203Phishing Detection Method And System
#204Trusted startup methods and apparatuses of blockchain integrated station
#205Secure firewall configurations
#206Systems and methods for deploying countermeasures against unauthorized scripts interfering with the rendering of content elements on information resources
#207MOBILE DEVICE POLICY ENFORCEMENT
#208CLOUD-BASED DYNAMIC EXECUTABLE VERIFICATION
#209Open source library security rating
#210Systems and methods for mediating permissions
#211Virtual environment system for validating executable data using accelerated time-based process execution
#212Authentication device, method and system
#213Techniques for determining threat intelligence for network infrastructure analysis
#214DYNAMIC APPLICATION DEPLOYMENT IN TRUSTED CODE ENVIRONMENTS
#215Parameter signature for realm security configuration parameters
#216Software rewriting device
#217Secure and accountable execution of robotic process automation
#218Application selection based on cumulative vulnerability risk assessment
#219System and method for automatic generation of malware detection traps
#220Preventing untrusted script execution
#221Systems and methods for security analysis of applications on user mobile devices while maintaining user application privacy
#222Differentiated containerization and execution of web content based on trust level and other attributes
#223Multi-tenant java agent instrumentation system
#224METHODS, SYSTEMS, AND MEDIA FOR DETECTING ALTERATION OF A WEB PAGE
#225Efficiently authenticating an application during I/O request handling
#226Restricting access to application programming interfaces (APIs)
#227Encoding dependencies in call graphs
#228Providing high availability computing service by issuing a certificate
#229Managing the loading of sensitive modules
#230INFORMATION PROCESSING APPARATUS AND METHOD OF UPDATING UPDATE PROGRAM
#231Repositioning applications from physical devices to the cloud
#232Adaptive and secure bitecode injection based on comparison with previously stored bytecode
#233Data Management for an Application with Multiple Operation Modes
#234Managing untyped network traffic flows
#235Determining Authenticity of Binary Images
#236Cryptography module and method for operating same
#237Certificate based profile confirmation
#238Secure device operation using transferred code modules
#239Resource Management Unit for Capturing Operating System Configuration States and Managing Malware
#240Blockchain node service deployment method, apparatus and system and computing device and medium
#241Method for Detecting and Defeating Ransomware
#242Computer device and method for controlling process components
#243System and method for developing third-party application
#244System for securing software containers with embedded agent
#245Multi-factor validation for varying environments
#246Systems employing directional sound recordings in a casino environment
#247Systems and methods for generating an inventory of software applications for optimized analysis
#248VEHICLE INFORMATION COMMUNICATION SYSTEM
#249Distribution package generation device, distribution package communication system, distribution package transmission method, and storage medium
#250Vehicle electronic control system, vehicle master device, method for controlling transmission of data storage bank information and computer program product for controlling transmission of data storage bank information
#251Center device
#252Center device, distribution package generation method and distribution package generation program
#253Vehicle information communication system
#254Center device, specification data generation method and computer program product for generating specification data
#255Verifying firmware binary images using a hardware design and formal assertions
#256Block device signature-based integrity protection for containerized applications
#257Virtual environment type validation for policy enforcement
#258PROCESS AND METHOD FOR LONG-TERM FILE VALIDITY IN DISCONNECTED ENVIRONMENTS
#259APPLICATION PROGRAM INTEGRITY VERIFICATION METHOD AND NETWORK DEVICE
#260Flexible license sourcing at customer sites
#261Method for limiting usage of application, and terminal
#262Firmware validation for encrypted virtual machines
#263Mitigation of deceptive advertisements
#264SECURE BUFFER FOR BOOTLOADER
#265Sandbox environment for document preview and analysis
#266System and method for managing installation of an application package requiring high-risk permission access
#267Anomaly detection for computer systems
#268Software integrity checking systems and methods
#269DYNAMICALLY ANALYZING THIRD-PARTY APPLICATION WEBSITE CERTIFICATES ACROSS USERS TO DETECT MALICIOUS ACTIVITY
#270Service API invoking method and related apparatus
#271Computing device and method for operating same
#272Securing an application framework from shared library sideload vulnerabilities
#273Integrity manifest certificate
#274Providing high availability computing service by issuing a certificate
#275Secure validation pipeline in a third-party cloud environment
#276Local secure rendering of web content
#277Method and device for processing information, equipment, and storage medium
#278Methods and systems for verifying applications
#279Database service token
#280Automated dynamic security testing
#281INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM
#282SYSTEM AND METHOD FOR TRANSLATING MAPPING POLICY INTO CODE
#283System, method, and apparatus for computer security
#284Secure runtime systems and methods
#285Management apparatus, management method, and storage medium
#286Application negotiable resource director technology for efficient platform resource management
#287Method for restricting memory write access in IoT devices
#288Information processing apparatus, information processing method, and storage medium for preventing unauthorized rewriting of a module
#289Selectively installing applications based on manifest files
#290SYSTEM AND METHOD OF EXECUTING, CONFIRMING AND STORING A TRANSACTION IN A SERVERLESS DECENTRALIZED NODE NETWORK
#291Methods and systems for executing smart contracts in secure environments
#292Verifying structured data
#293Method for detecting libraries in program binaries
#294Systems and methods for managing networked commitments of secure entities
#295Webpage integrity monitoring
#296Open source library security rating
#297Mobile device security, device management, and policy enforcement in a cloud-based system
#298Detecting unauthorized access to secure devices
#299Network interface device and method
#300Method for securely configuring an information system