G06F21/54 - CPC Classification

Classification description:

Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity; Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs

Recent Application in this class:
#1
20240303378
2024-09-12

SECURITY FOR BINARY SOFTWARE DISTRIBUTIONS

#2
20240297882
2024-09-05

CERTIFICATE BASED PROFILE CONFIRMATION

#3
20240296220
2024-09-05

METHOD AND SYSTEM FOR FREEDOM FROM INTERFERENCE (FFI)

#4
20240296219
2024-09-05

ADVERSE OR MALICIOUS INPUT MITIGATION FOR LARGE LANGUAGE MODELS

#5
20240289475
2024-08-29

FINGERPRINTING TECHNIQUES TO SUPPORT FILE HASH GENERATION

#6
20240289460
2024-08-29

MULTI-DIMENSIONAL MALWARE ANALYSIS

#7
20240289457
2024-08-29

SYSTEM AND METHOD FOR IDENTIFYING INFORMATION SECURITY THREATS

#8
20240289451
2024-08-29

CIRCUIT AND METHOD FOR PROTECTING AN APPLICATION AGAINST A SIDE CHANNEL ATTACK

#9
20240289440
2024-08-29

METHOD FOR HANDLING THE EXECUTION OF AN APPLET FUNCTION, AND CORRESPONDING LOADING METHOD

#10
20240289439
2024-08-29

ELECTRONIC CONTROL DEVICE

#11
20240281726
2024-08-22

Complex Application Attack Quantification, Testing, Detection and Prevention

#12
20240281541
2024-08-22

FUNCTION ALLOCATION CONTROL APPARATUS, FUNCTION ALLOCATION CONTROL METHOD AND PROGRAM

#13
20240281521
2024-08-22

MANAGEMENT APPARATUS, CONTROL METHOD OF MANAGEMENT APPARATUS, AND STORAGE MEDIUM

#14
20240281520
2024-08-22

CONTAINER-BASED TASK EXECUTION METHOD AND APPARATUS

#15
20240281330
2024-08-22

APPLICATION PROGRAMMING INTERFACE FOR AUTOMATED OPERATIONS MANAGEMENT

#16
20240273201
2024-08-15

METHOD AND APPARATUS FOR DETECTING MALWARE VIA ANALYSIS OF A SCREEN CAPTURE

#17
20240273192
2024-08-15

DYNAMIC CLOUD CONFIGURATION CHANGES BASED ON ADVANCED PERSISTENT THREAT DETECTION

#18
20240273183
2024-08-15

DETECTING STACK PIVOTS USING STACK ARTIFACT VERIFICATION

#19
20240265145
2024-08-08

UNLOCKABLE CONTENT CREATION PORTAL

#20
20240265108
2024-08-08

SECURE INITIAL PROGRAM LOAD (IPL) CODE LOADING ATTRIBUTES FACILITY

#21
20240265096
2024-08-08

SYSTEMS AND METHODS FOR EVENT-BASED APPLICATION CONTROL

#22
20240265094
2024-08-08

ENABLING RUNTIME OBSERVABILITY FOR APPLICATIONS HOSTED IN A SECURE WORKSPACE

#23
20240259395
2024-08-01

AUTOMATED SECURITY POLICY GENERATION FOR CONTROLLERS

#24
20240256668
2024-08-01

Detecting and Preventing Installation and Execution of Malicious Browser Extensions

#25
20240256661
2024-08-01

DETECTING RANSOMWARE IN MONITORED DATA

#26
20240256651
2024-08-01

INTERNET ACCESS SYSTEMS AND METHODS INVOLVING INTEGRATED SECURITY FEATURES

#27
20240249010
2024-07-25

SYSTEMS AND METHODS FOR SUBORDINATE WORKSPACES

#28
20240241956
2024-07-18

CLASSIFYING CYBERSECURITY THREATS USING MACHINE LEARNING ON NON-EUCLIDEAN DATA

#29
20240241951
2024-07-18

MITIGATING POINTER AUTHENTICATION CODE (PAC) ATTACKS IN PROCESSOR-BASED DEVICES

#30
20240241944
2024-07-18

SECURITY INTENTS AND TRUST COORDINATION FOR CLOUD NATIVE WORKLOADS

#31
20240241943
2024-07-18

NESTED ISOLATION HOST VIRTUAL MACHINE

#32
20240241769
2024-07-18

SYSTEM FOR SECURE AND RELIABLE NODE LIFECYCLE IN ELASTIC WORKLOADS

#33
20240233055
2024-07-11

DIAGNOSTIC ONLINE RESULT ASSESSMENT (DORA) IN A CLOUD ENVIRONMENT

#34
20240232334
2024-07-11

ELECTRONIC SYSTEM AND SECURITY AUTHORITY DELEGATION METHOD THEREOF

#35
20240232333
2024-07-11

SYSTEMS AND METHODS FOR CONTEXTUAL ALERT ENRICHMENT IN COMPUTING INFRASTRUCTURE AND REMEDIATION THEREOF

#36
20240231825
2024-07-11

METHOD FOR CONTROL FLOW ISOLATION WITH PROTECTION KEYS AND INDIRECT BRANCH TRACKING

#37
20240220640
2024-07-04

COMBINED PROTECTION OF SYMMETRIC-KEY PRIMITIVES AGAINST SIDE-CHANNEL AND FAULT ATTACKS

#38
20240220606
2024-07-04

FAULT-ATTACK ANALYSIS DEVICE AND METHOD

#39
20240220605
2024-07-04

SECURITY DETECTING METHOD AND APPARATUS, AND DEVICE

#40
20240211602
2024-06-27

BMC BASED HROT IMPLEMENTATION ESTABLISHING CHAIN OF TRUST IN A SECURED SERVER SYSTEM

#41
20240211600
2024-06-27

METHOD FOR REPROGRAM WITH ENHANCED SECURITY

#42
20240211590
2024-06-27

Automatic Generation of Production Security Controls from a Testing Collaboration Platform

#43
20240202338
2024-06-20

METHOD AND A SYSTEM FOR DETECTING MALWARE ACTIVITY IN A .NET PLATFORM

#44
20240202321
2024-06-20

AUTOMATED COLLECTION OF FORENSIC DATA FROM AN EXPLOIT WITHOUT THE USE OF A HONEY TRAP

#45
20240202320
2024-06-20

SYSTEM AND METHOD FOR AUTO REPAIRING VULNERABLE CODE PROGRAM FRAGMENTS OF A SOFTWARE

#46
20240202319
2024-06-20

SHIM BASED SECURE MODULE ACCESS

#47
20240202318
2024-06-20

PROGRAM FILE MEASUREMENTS FOR CONTEXT-SPECIFIC VALIDATION

#48
20240193278
2024-06-13

VULNERABILITY ANALYSIS OF A COMPUTER DRIVER

#49
20240193263
2024-06-13

DYNAMIC HARDWARE INTEGRITY AND/OR REPLAY PROTECTION

#50
20240184897
2024-06-06

SYSTEM AND METHOD OF HIDING SECURITY SENSITIVE FEATURES IN UNTRUSTED ENVIRONMENTS

#51
20240184884
2024-06-06

SYSTEMS AND METHODS FOR EXECUTABLE CODE DETECTION, AUTOMATIC FEATURE EXTRACTION AND POSITION INDEPENDENT CODE DETECTION

#52
20240184880
2024-06-06

Security Against Physical Keystroke Simulation

#53
20240176915
2024-05-30

THREAT DETECTION USING A MEASURED STORAGE DEVICE

#54
20240176914
2024-05-30

Data Processing Method and Related Apparatus

#55
20240176876
2024-05-30

KERNEL-BASED PROTECTION OF COMPUTER PROCESSES

#56
20240176875
2024-05-30

SELECTIVE IMPORT/EXPORT ADDRESS TABLE FILTERING

#57
20240176874
2024-05-30

PRESERVING DLL HOOKS

#58
20240176873
2024-05-30

Control Device, Unauthorized Command Detection Method, and Program

#59
20240169071
2024-05-23

DEVICE RISK-BASED TRUSTED DEVICE VERIFICATION AND REMOTE ACCESS PROCESSING SYSTEM

#60
20240169060
2024-05-23

METHOD AND SYSTEM FOR VERIFYING QUICK RESPONSE CODES

#61
20240169056
2024-05-23

MANAGING AND CLASSIFYING COMPUTER PROCESSES

#62
20240160725
2024-05-16

APPARATUS AND METHOD FOR INJECTING CONTROL FLOW INTEGRITY SECURITY CODE BASED ON LOCATION

#63
20240160724
2024-05-16

SYSTEM AND METHOD FOR AUTOMATED SECURITY TOOL INTEGRATION

#64
20240152602
2024-05-09

METHOD AND MODULE FOR INSTALLING A MITIGATION PROGRAM IN THE KERNEL OF A COMPUTING DEVICE

#65
20240143780
2024-05-02

SUPPORTING SECURE WORKSPACES IN HETEROGENOUS ENVIRONMENTS

#66
20240143779
2024-05-02

SECURE PEER-TO-PEER FILE DISTRIBUTION IN AN ENTERPRISE ENVIRONMENT

#67
20240143777
2024-05-02

INSTRUMENTING OBSERVABILITY CONTROLS

#68
20240143763
2024-05-02

ENDPOINT INCIDENT RESPONSE FROM A SECURE ENCLAVE THROUGH DYNAMIC INSERTION OF AN INTERRUPT

#69
20240143744
2024-05-02

SYSTEM AND METHOD FOR COLLABORATIVE SMART EVIDENCE GATHERING AND INVESTIGATION FOR INCIDENT RESPONSE, ATTACK SURFACE MANAGEMENT, AND FORENSICS IN A COMPUTING ENVIRONMENT

#70
20240143739
2024-05-02

INTELLIGENT OBFUSCATION OF MOBILE APPLICATIONS

#71
20240143738
2024-05-02

END-TO-END DISTRIBUTED RECOVERY OF A USER COMPUTING DEVICE ON WHICH SECURE WORKSPACES ARE DEPLOYED

#72
20240143737
2024-05-02

AUTOMATED GENERATION OF LABELED TRAINING DATA

#73
20240135477
2024-04-25

DIAGNOSTIC ONLINE RESULT ASSESSMENT (DORA) IN A CLOUD ENVIRONMENT

#74
20240134969
2024-04-25

STEALTHY PROCESS ATTACK DETECTION FOR AUTOMATED MANUFACTURING

#75
20240134968
2024-04-25

ELECTRONIC SYSTEM AND SECURITY AUTHORITY DELEGATION METHOD THEREOF

#76
20240134967
2024-04-25

SYSTEMS AND METHODS FOR CONTEXTUAL ALERT ENRICHMENT IN COMPUTING INFRASTRUCTURE AND REMEDIATION THEREOF

#77
20240134728
2024-04-25

SYSTEMS AND METHODS FOR PREDICTING WHICH SOFTWARE VULNERABILITIES WILL BE EXPLOITED BY MALICIOUS HACKERS TO PRIORITIZE FOR PATCHING

#78
20240126918
2024-04-18

TECHNIQUES FOR DATA CLASSIFICATION AND FOR PROTECTING CLOUD ENVIRONMENTS FROM CYBERSECURITY THREATS USING DATA CLASSIFICATION

#79
20240126908
2024-04-18

SYSTEMS AND METHODS FOR HARD DELETION OF DATA ACROSS SYSTEMS

#80
20240126884
2024-04-18

FIRMWARE GUARD EXTENSION WITH CONVERGED DEFENSE ENGINE

#81
20240126878
2024-04-18

SCANNING OF PARTIAL DOWNLOADS

#82
20240126874
2024-04-18

SECURITY PROCESSING DEVICE, METHOD AND ELECTRONIC DEVICE FOR HANDLING ATTACKS

#83
20240126869
2024-04-18

HUMAN INTERFACE DEVICE FIREWALL

#84
20240119138
2024-04-11

DEPLOYING ENCLAVES ON DIFFERENT TEE BACKENDS USING A UNIVERSAL ENCLAVE BINARY

#85
20240111870
2024-04-04

Systems and Methods For Protecting Against Malware Attacks

#86
20240104198
2024-03-28

METHOD AND APPARATUS FOR ATTESTATION

#87
20240104197
2024-03-28

SYSTEMS, METHODS, AND MEDIA FOR PROTECTING APPLICATION PROGRAMMING INTERFACES

#88
20240095375
2024-03-21

Mechanism To Secure An Execution Environment In Processor Cores

#89
20240095371
2024-03-21

INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM

#90
20240095344
2024-03-21

COMPUTER IMPLEMENTED METHOD

#91
20240095343
2024-03-21

SOFTWARE INTEGRITY CHECKING SYSTEMS AND METHODS

#92
20240095342
2024-03-21

DISABLING FUNCTIONALITY OF AN AUTO-CHECKOUT CLIENT APPLICATION BASED ON ANOMALOUS USER BEHAVIOR

#93
20240095341
2024-03-21

MAYA: A HARDWARE-BASED CYBER-DECEPTION FRAMEWORK TO COMBAT MALWARE

#94
20240086526
2024-03-14

MITIGATING POINTER AUTHENTICATION CODE (PAC) ATTACKS IN PROCESSOR-BASED DEVICES

#95
20240078330
2024-03-07

A METHOD AND SYSTEM FOR LOSSY COMPRESSION OF LOG FILES OF DATA

#96
20240078311
2024-03-07

ATTACK DETECTION METHOD, ATTACK RESPONSE METHOD, AND STORAGE DEVICE

#97
20240078307
2024-03-07

APPARATUS FOR REINFORCING SECURITY OF MOBILE TRUSTED EXECUTION ENVIRONMENT

#98
20240070297
2024-02-29

Secure firewall configurations

#99
20240070288
2024-02-29

MULTI-LAYERED GRAPH MODELING FOR SECURITY RISK ASSESSMENT

#100
20240070272
2024-02-29

DETECTING A CURRENT ATTACK BASED ON SIGNATURE GENERATION TECHNIQUE IN A COMPUTERIZED ENVIRONMENT

#101
20240070266
2024-02-29

SECURING A NEURAL NETWORK RUNTIME ENGINE

#102
20240070265
2024-02-29

BACKUP PROTECTION SYSTEM AND METHOD

#103
20240070264
2024-02-29

DATA STORAGE DEVICE PERFORMING DATA PROTECTION AND HOST DEVICE SUPPORTING A DATA PROTECTION FUNCTION USING A PROGRAM CONTEXT

#104
20240070263
2024-02-29

SECURITY DEFENDING METHOD AND ELECTRONIC APPARATUS

#105
20240069920
2024-02-29

SECURING REGISTERS ACROSS SECURITY ZONES

#106
20240061933
2024-02-22

Systems and methods for causing nonpredictable environment states for exploit prevention and malicious code neutralization for javascript-enabled applications

#107
20240061928
2024-02-22

APPARATUS AND METHOD FOR POWER VIRUS PROTECTION IN A PROCESSOR

#108
20240056508
2024-02-15

CRYPTOGRAPHIC HASH CHAIN FOR VEHICLE CONFIGURATION VERIFICATION

#109
20240054234
2024-02-15

METHODS AND SYSTEMS FOR HARDWARE AND FIRMWARE SECURITY MONITORING

#110
20240054233
2024-02-15

Device, System, and Method for Protecting Machine Learning (ML) Units, Artificial Intelligence (AI) Units, Large Language Model (LLM) Units, and Deep Learning (DL) Units

#111
20240054215
2024-02-15

CYBER THREAT INFORMATION PROCESSING APPARATUS, CYBER THREAT INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM STORING CYBER THREAT INFORMATION PROCESSING PROGRAM

#112
20240054210
2024-02-15

CYBER THREAT INFORMATION PROCESSING APPARATUS, CYBER THREAT INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM STORING CYBER THREAT INFORMATION PROCESSING PROGRAM

#113
20240048573
2024-02-08

Security Monitoring at Operating System Kernel Level

#114
20240045975
2024-02-08

PROCESSOR AND MULTI-CORE PROCESSOR

#115
20240045969
2024-02-08

SYSTEM ON CHIP AND OPERATION METHOD THEREOF

#116
20240045965
2024-02-08

DISARMING MALWARE IN PROTECTED CONTENT

#117
20240045961
2024-02-08

Methods and Systems for Analyzing Environment-Sensitive Malware with Coverage-Guided Fuzzing

#118
20240045947
2024-02-08

FUNCTION POINTER PROTECTION

#119
20240045932
2024-02-08

SYSTEMS AND METHODS FOR POLICY LINKING AND/OR LOADING FOR SECURE INITIALIZATION

#120
20240045875
2024-02-08

SYSTEMS AND METHODS FOR MANAGEMENT OF DATA ANALYTICS PLATFORMS USING METADATA

#121
20240045764
2024-02-08

WORKFLOWS FOR AUTOMATED OPERATIONS MANAGEMENT

#122
20240045679
2024-02-08

Method for control flow isolation with protection keys and indirect branch tracking

#123
20240039941
2024-02-01

SYSTEMS, METHODS, AND MEDIA FOR DEFENDING COMPUTING SYSTEMS FROM ATTACK

#124
20240037285
2024-02-01

Flash Programming Randomization

#125
20240037249
2024-02-01

BOOLEAN FUNCTION CONTROL GATES FOR SECURELY EXECUTING ON A PUBLIC COMPUTER CODE THAT OPERATES ON ENCRYPTED DATA

#126
20240037235
2024-02-01

Systems, Methods and Devices for Memory Analysis and Visualization

#127
20240037222
2024-02-01

SECURITY-ADAPTIVE CODE EXECUTION

#128
20240037221
2024-02-01

PROCESSOR AND ATTACK DETECTION METHOD THEREOF

#129
20240037220
2024-02-01

SECURELY BROKERING ACCESS TOKENS TO PARTIALLY TRUSTED CODE

#130
20240028739
2024-01-25

PRE-OPERATING SYSTEM EMBEDDED CONTROLLER HARDENING BASED ON OPERATING SYSTEM SECURITY AWARENESS

#131
20240028712
2024-01-25

CONTROL FLOW INTEGRITY ENFORCEMENT FOR APPLICATIONS RUNNING ON PLATFORMS

#132
20240028711
2024-01-25

HIGHLY SCALABLE PERMISSIONED BLOCK CHAINS

#133
20240028710
2024-01-25

METHOD AND APPARATUS FOR DETERMINING WHETHER A PROCESSING UNIT IS COMPLIANT WITH A SECURITY POLICY

#134
20240028709
2024-01-25

INLINE CONTROL FLOW MONITOR WITH ENFORCEMENT

#135
20240028708
2024-01-25

CONTROL FLOW DIRECTED GRAPH FOR USE WITH PROGRAM DISASSEMBLER

#136
20240020364
2024-01-18

Secured communication protocol layer for authenticated hardware data access

#137
20240005035
2024-01-04

METHOD FOR EVALUATING THE RISK OF RE-IDENTIFICATION OF ANONYMISED DATA

#138
20240004992
2024-01-04

RESOURCE PROTECTION

#139
20240004991
2024-01-04

EXECUTION PROTECTION USING DATA COLOURING

#140
20230421380
2023-12-28

Computer System And Method For Distributed Privacy-Preserving Shared Execution Of One Or More Processes

#141
20230418950
2023-12-28

Methods, Devices, and Systems for Control Flow Integrity

#142
20230418940
2023-12-28

ANTIVIRUS SCANNING ARCHITECTURE FOR UPLOADED FILES

#143
20230418937
2023-12-28

Privileged Firmware Mode Protection

#144
20230418934
2023-12-28

CONTROL FLOW INTEGRITY TO PREVENT POTENTIAL LEAKAGE OF SENSITIVE DATA TO ADVERSARIES

#145
20230418933
2023-12-28

SYSTEMS AND METHODS FOR FOLDER AND FILE SEQUESTRATION

#146
20230418637
2023-12-28

CLOUD NATIVE VIRTUAL MACHINE RUNTIME PROTECTION

#147
20230409700
2023-12-21

SYSTEMS AND METHODS FOR MANAGING STATE

#148
20230401319
2023-12-14

SYSTEM AND METHOD FOR PERFORMING HIERARCHICAL AND INCREMENTAL WORKLOAD SCANNING

#149
20230401316
2023-12-14

Pre-authorized virtualization engine for dynamic firmware measurement

#150
20230401313
2023-12-14

Processor with In-Band Fault-Injection Detection in the Presence of Exceptions

#151
20230394157
2023-12-07

UNIFIED LOGGING FOR OPERATING SYSTEMS AND CONNECTED EMBEDDED SYSTEMS

#152
20230393941
2023-12-07

Workflows for automated operations management

#153
20230393822
2023-12-07

TAMPER DETECTION FEATURE EMBEDDING DEVICE, TAMPER DETECTION FEATURE EMBEDDING METHOD, AND COMPUTER READABLE MEDIUM

#154
20230388290
2023-11-30

SECURE FEATURE AND KEY MANAGEMENT IN INTEGRATED CIRCUITS

#155
20230385454
2023-11-30

CRYPTOGRAPHICALLY SECURE DYNAMIC THIRD PARTY RESOURCES

#156
20230385410
2023-11-30

SYSTEMS AND METHODS FOR FLUSH PLUS RELOAD CACHE SIDE-CHANNEL ATTACK MITIGATION

#157
20230385403
2023-11-30

DYNAMIC RUNTIME MICRO-SEGMENTATION OF INTERPRETED LANGUAGES

#158
20230376610
2023-11-23

Non-Intrusive Method of Detecting Security Flaws of a Computer Program

#159
20230376587
2023-11-23

Online command injection attacks identification

#160
20230368206
2023-11-16

System, Device, and Method of Transaction Verification Based on Auxiliary Signals and Modulations

#161
20230359728
2023-11-09

DATA SECUREMENT LEVERAGING SECURE QR CODE SCANNER

#162
20230351388
2023-11-02

System, Device, and Method of User Authentication and Transaction Verification

#163
20230351019
2023-11-02

SECURE SMART NETWORK INTERFACE CONTROLLER FIRMWARE UPDATE

#164
20230351014
2023-11-02

METHOD TO PREVENT ROOT LEVEL ACCESS ATTACK AND MEASURABLE SLA SECURITY AND COMPLIANCE PLATFORM

#165
20230350984
2023-11-02

SYSTEM AND METHOD FOR CLIENT-SIDE REWRITING OF CODE INCLUDED IN A WEB PAGE

#166
20230334181
2023-10-19

SYSTEM AND METHOD FOR INTERACTION OBJECT MANAGEMENT IN A BLOCKCHAIN ENVIRONMENT

#167
20230334156
2023-10-19

SECURE BOOT UP OF COMPUTING DEVICES

#168
20230334150
2023-10-19

RESTRICTED EXECUTION MODE FOR NETWORK-ACCESSIBLE DEVICES

#169
20230334149
2023-10-19

PROGRAM PROCESSING DEVICE AND PROGRAM PROCESSING METHOD

#170
20230334148
2023-10-19

Secure distributed execution of jobs

#171
20230334147
2023-10-19

MONITORING AND AUDITING SECURE SOFTWARE BUILDS

#172
20230334144
2023-10-19

PROVISIONING A SECURITY COMPONENT FROM A CLOUD HOST TO A GUEST VIRTUAL RESOURCE UNIT

#173
20230325539
2023-10-12

Mitigating against a persistent consistent threat in a network device based on reducing temporal surface area

#174
20230325502
2023-10-12

SYSTEMS AND METHODS FOR REMOTE DETECTION OF SOFTWARE THROUGH BROWSER WEBINJECTS

#175
20230325496
2023-10-12

SYSTEM AND METHOD FOR TRANSITIONAL ISOLATION OF APPLICATIONS USING A WORKSPACE ENVIRONMENT

#176
20230325493
2023-10-12

STATEFUL MICROSERVICE-AWARE INTRUSION DETECTION

#177
20230315843
2023-10-05

SYSTEMS AND METHODS FOR CYBERSECURITY ALERT DEDUPLICATION, GROUPING, AND PRIORITIZATION

#178
20230315838
2023-10-05

MICROPROCESSOR THAT PREVENTS STORE-TO-LOAD FORWARDING BETWEEN DIFFERENT TRANSLATION CONTEXTS

#179
20230315837
2023-10-05

INLINE FRAME CONTENT DATA MANAGEMENT SYSTEM

#180
20230306106
2023-09-28

Computer Security Systems and Methods Using Self-Supervised Consensus-Building Machine Learning

#181
20230291584
2023-09-14

Systems and methods for storing and sharing transactional data using distributed computer systems

#182
20230289412
2023-09-14

Computer-based systems configured for automated computer script analysis and malware detection and methods thereof

#183
20230274000
2023-08-31

COMPUTER-IMPLEMENTED AUTOMATIC SECURITY METHODS AND SYSTEMS

#184
20230273990
2023-08-31

Code modification for detecting abnormal activity

#185
20230267201
2023-08-24

Method to prevent root level access attack and measurable SLA security and compliance platform

#186
20230267197
2023-08-24

Ransomware Countermeasures

#187
20230259613
2023-08-17

SYSTEM FOR ELECTRONIC DATA OBFUSCATION AND PROTECTION USING INDEPENDENT DESTRUCTIBLE DATA OBJECTS

#188
20230259355
2023-08-17

Updating software elements with different trust levels

#189
20230252145
2023-08-10

CYBER THREAT INFORMATION PROCESSING APPARATUS, CYBER THREAT INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM STORING CYBER THREAT INFORMATION PROCESSING PROGRAM

#190
20230252131
2023-08-10

Selective import/export address table filtering

#191
20230252130
2023-08-10

Process privilege escalation protection in a computing environment

#192
20230246821
2023-08-03

Network bound encryption for recovery of trusted execution environments

#193
20230244788
2023-08-03

SYSTEMS AND METHODS FOR SAFEGUARDING UPDATES TO A BASIC INPUT/OUTPUT SYSTEM OF AN INFORMATION HANDLING SYSTEM

#194
20230244782
2023-08-03

Methods and systems for controlling access to at least one computer program

#195
20230239285
2023-07-27

Secure inter-application communication with unmanaged applications using certificate enrollment

#196
20230237199
2023-07-27

REMOTE COMMAND EXECUTION OVER AN AIR-GAP SECURED SYSTEM

#197
20230237157
2023-07-27

COMPUTE SYSTEMS INCLUDING A SECURITY PROCESSOR

#198
20230237156
2023-07-27

SYSTEM AND METHOD FOR STORING SYSTEM STATE DATA IN A HARDWARE REGISTER

#199
20230237152
2023-07-27

ROW HAMMER INTERRUPTS TO THE OPERATING SYSTEM

#200
20230237149
2023-07-27

Systems and methods for event-based application control

#201
20230237148
2023-07-27

Systems and methods for proactive and reactive data security

#202
20230229782
2023-07-20

Automatically performing varied security scans on distributed files using machine learning techniques

#203
20230229761
2023-07-20

PREVENTION AND REMEDIATION OF MALWARE BASED ON SELECTIVE PRESENTATION OF FILES TO PROCESSES

#204
20230229760
2023-07-20

MOBILE DEVICE WITH SECURE PRIVATE MEMORY

#205
20230229759
2023-07-20

Method for detecting a fault injection in a data processing system

#206
20230229758
2023-07-20

AUTOMATED PERSISTENT CONTEXT-AWARE DEVICE PROVISIONING

#207
20230229474
2023-07-20

PLUG-IN MANAGEMENT IN VIRTUALIZED COMPUTING ENVIRONMENT

#208
20230222230
2023-07-13

KEY DISTRIBUTION SYSTEM IN A SECURE ENCLAVE

#209
20230222226
2023-07-13

MEMORY SCAN-BASED PROCESS MONITORING

#210
20230222222
2023-07-13

RUNTIME FILTERING OF COMPUTER SYSTEM VULNERABILITIES

#211
20230222213
2023-07-13

STACK PROTECTION

#212
20230222212
2023-07-13

UTILIZING MACHINE-LEARNING MODELS TO DETERMINE TAKE-OVER SCORES AND INTELLIGENTLY SECURE DIGITAL ACCOUNT FEATURES

#213
20230222211
2023-07-13

Unified workload runtime protection

#214
20230214481
2023-07-06

Secure Display of Sensitive Content

#215
20230208927
2023-06-29

SYSTEMS AND METHODS FOR VEHICLE CONFIGURATION VERIFICATION WITH FAILSAFE CODE

#216
20230205886
2023-06-29

ITERATIVE BOOT QUEUE

#217
20230205871
2023-06-29

SPAMMY APP DETECTION SYSTEMS AND METHODS

#218
20230205870
2023-06-29

CONTROL INSTRUCTION PROCESSING METHOD, APPARATUS AND DEVICE, AND COMPUTER STORAGE MEDIUM

#219
20230195890
2023-06-22

ENDPOINT ISOLATION AND INCIDENT RESPONSE FROM A SECURE ENCLAVE

#220
20230195886
2023-06-22

METHOD AND APPARATUS FOR SECURING INDIRECT FUNCTION CALL

#221
20230195881
2023-06-22

Virtual machines to install untrusted executable codes

#222
20230195863
2023-06-22

APPLICATION IDENTITY ACCOUNT COMPROMISE DETECTION

#223
20230185915
2023-06-15

DETECTING MICROSOFT WINDOWS INSTALLER MALWARE USING TEXT CLASSIFICATION MODELS

#224
20230185904
2023-06-15

Method and system for freedom from interference (FFI)

#225
20230185903
2023-06-15

PROTECTION OF CALL STACK

#226
20230177176
2023-06-08

MULTI-PROCESSOR DEVICE WITH SECURE PROCESSOR-CONTROLLED ACCESS TO MEMORY

#227
20230177148
2023-06-08

Liveness guarantees in secure enclaves using health tickets

#228
20230177147
2023-06-08

Systems and methods for application integrated malicious behavior mitigation

#229
20230177146
2023-06-08

Adaptive acceleration of transport layer security

#230
20230171267
2023-06-01

SELECTIVE SECURITY SCAN TO REDUCE SIGNATURE CANDIDATES

#231
20230169178
2023-06-01

Vulnerability analysis of a computer driver

#232
20230169171
2023-06-01

OS-MANAGED BIOS MODULES

#233
20230169163
2023-06-01

SOFTWARE ISOLATION USING EVENT DRIVEN MULTI-THREADING

#234
20230164151
2023-05-25

Distributed digital security system

#235
20230161872
2023-05-25

METHOD FOR APPLICATION SECURITY AND ELECTRONIC DEVICE FOR PERFORMING THE SAME

#236
20230153426
2023-05-18

HARDWARE-BASED PROTECTION OF APPLICATION PROGRAMMING INTERFACE (API) KEYS

#237
20230153420
2023-05-18

SQL PROXY ANALYZER TO DETECT AND PREVENT UNAUTHORIZED SQL QUERIES

#238
20230146847
2023-05-11

Systems and methods for executable code detection, automatic feature extraction and position independent code detection

#239
20230145856
2023-05-11

SECURELY EXPOSING AN ACCELERATOR TO PRIVILEGED SYSTEM COMPONENTS

#240
20230144928
2023-05-11

METHOD FOR PROVIDING A CLIENT COMPUTER DEVICE WITH ACCESS TO A DATABASE MANAGEMENT SYSTEM

#241
20230143321
2023-05-11

SECURE BASE ACTIVATION IMAGE FOR EDGE DAY ZERO SECURE INFRASTRUCTURE PROVISIONING

#242
20230142345
2023-05-11

DETECTING SOFTWARE VULNERABILITIES IN A BINARY CODE

#243
20230140975
2023-05-11

MEMORY SYSTEM VERIFICATION

#244
20230138906
2023-05-04

TRIM CONFIGURATION OF ANALOG MODULES

#245
20230130985
2023-04-27

SECURE EXECUTION OF SCRIPTS

#246
20230130274
2023-04-27

High-throughput BPF map manipulations with uprobes

#247
20230128720
2023-04-27

Securely redirecting system service routines

#248
20230127971
2023-04-27

TRANSACTION PROCESS BETWEEN AN APPLICATION AND A DEVICE

#249
20230126908
2023-04-27

PROTECTION AGAINST EXECUTING INJECTED MALICIOUS CODE

#250
20230125567
2023-04-27

APPLICATION SECURITY THROUGH GLOBAL LOCKOUT AND CAPTURE

#251
20230118222
2023-04-20

Automated operations management for computer systems

#252
20230117924
2023-04-20

AUTOMATIC OBSCURATION OF A PORTION OF A SCREEN-SHARE VIEW

#253
20230117901
2023-04-20

Forensic data collection and analysis utilizing function call stacks

#254
20230114084
2023-04-13

SECURED EXECUTION CONTEXT DATA

#255
20230106400
2023-04-06

Software integrity checking systems and methods

#256
20230103992
2023-04-06

REFLECTION RUNTIME PROTECTION AND AUDITING SYSTEM

#257
20230103518
2023-04-06

SECURE EXECUTION FOR MULTIPLE PROCESSOR DEVICES USING TRUSTED EXECUTING ENVIRONMENTS

#258
20230099241
2023-03-30

SYSTEMS AND METHODS FOR IDENTIFYING MALICIOUS EVENTS USING DEVIATIONS IN USER ACTIVITY FOR ENHANCED NETWORK AND DATA SECURITY

#259
20230098288
2023-03-30

APPARATUS AND METHOD FOR ROLE-BASED REGISTER PROTECTION FOR TDX-IO

#260
20230097604
2023-03-30

MEMORY LAYOUT RANDOMIZATION SYSTEMS AND METHODS FOR DEFEATING TRANSLATION LOOKASIDE BUFFER (TLB) POISONING ATTACKS

#261
20230096895
2023-03-30

Command classification using active learning

#262
20230096677
2023-03-30

Obfuscated And Secured Computer-Executable Source Code

#263
20230096182
2023-03-30

SYSTEMS AND METHODS FOR PREDICTING AND IDENTIFYING MALICIOUS EVENTS USING EVENT SEQUENCES FOR ENHANCED NETWORK AND DATA SECURITY

#264
20230095080
2023-03-30

OBJECT INSPECTION VIA OPERATING SYSTEM SHARE FUNCTION

#265
20230093137
2023-03-23

Systems and methods for causing nonpredictable environment states for exploit prevention and malicious code neutralization for JavaScript-enabled applications

#266
20230092190
2023-03-23

TWO-LAYER SIDE-CHANNEL ATTACKS DETECTION METHOD AND DEVICES

#267
20230090586
2023-03-23

MONITORING CODE PROVENANCE

#268
20230090187
2023-03-23

Providing audio visual privacy controls

#269
20230089863
2023-03-23

EXECUTABLE PASSING USING MAILBOX REGISTERS

#270
20230085994
2023-03-23

LOGICAL RESOURCE PARTITIONING VIA REALM ISOLATION

#271
20230084682
2023-03-16

Logging from user-defined functions

#272
20230083979
2023-03-16

METHOD AND SYSTEM FOR SECURE BOOT AND RMA INTERVENTION

#273
20230083463
2023-03-16

Systems and methods for exploit prevention and malicious code neutralization using non-predictable results for JavaScript-enabled applications

#274
20230082183
2023-03-16

CODE MONITORING AND RESTRICTING OF EGRESS OPERATIONS

#275
20230078058
2023-03-16

COMPUTING SYSTEMS EMPLOYING A SECURE BOOT PROCESSING SYSTEM THAT DISALLOWS INBOUND ACCESS WHEN PERFORMING IMMUTABLE BOOT-UP TASKS FOR ENHANCED SECURITY, AND RELATED METHODS

#276
20230075736
2023-03-09

Systems and Methods for Self-Adapting Neutralization Against Cyber-Faults

#277
20230074580
2023-03-09

RUNTIME-TAILORED SECURITY POLICIES FOR APPLICATIONS

#278
20230073909
2023-03-09

Workflows for automated operations management

#279
20230073884
2023-03-09

METHOD AND SYSTEM TO PERFORM A SECURE BOOT PROCEDURE USING A MULTI-STAGE SECURITY VERIFICATION IN A MICROCONTROLLER OF A VEHICLE

#280
20230066210
2023-03-02

METHOD AND SYSTEM FOR PREVENTING AND DETECTING SECURITY THREATS

#281
20230059025
2023-02-23

AUTOMATED SECURITY POLICY GENERATION FOR CONTROLLERS

#282
20230056936
2023-02-23

Multi-dimensional malware analysis

#283
20230056770
2023-02-23

Security scanning of image for virtual machine creation

#284
20230056552
2023-02-23

ANALYSIS SYSTEM, METHOD, AND PROGRAM

#285
20230051461
2023-02-16

Obtaining information for security configuration

#286
20230049789
2023-02-16

Systems and methods for preventing zero-day attacks

#287
20230049144
2023-02-16

PROACTIVELY PROTECTED PROCESSING SYSTEM AND METHOED FOR CYBERSECURITY

#288
20230048589
2023-02-16

Method to implement traceability and provability in software development

#289
20230046532
2023-02-16

Computer-based systems configured for automated computer script analysis and malware detection and methods thereof

#290
20230042661
2023-02-09

First Detection of Potential Harmful Activities

#291
20230041274
2023-02-09

Method and apparatus for detecting malware via analysis of a screen capture

#292
20230037596
2023-02-09

Systems, methods, and media for defending computing systems from attack

#293
20230036868
2023-02-02

Systems and methods for detecting and recovering BIOS configuration deviations

#294
20230033253
2023-02-02

NETWORK SECURITY DEFENSE METHOD AND RELATED DEVICE APPLIED TO NETWORK SECURITY DEFENSE SYSTEM

#295
20230032678
2023-02-02

Abnormality detection in log entry collection

#296
20230027329
2023-01-26

CRYPTOGRAPHIC COMPUTING IN MULTITENANT ENVIRONMENTS

#297
20230022096
2023-01-26

COHERENCE-BASED ATTACK DETECTION

#298
20230019987
2023-01-19

METHOD FOR SECURE EXECUTING OF A SECURITY RELATED PROCESS

#299
20230019150
2023-01-19

METHOD FOR SECURING AN ELECTRONIC DEVICE

#300
20230016571
2023-01-19

Apparatus and method for preventing security threat to virtual machine