Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity Protecting data
Sub-classes:SMART CARD FOR GENERATING AND PROVIDING VIRTUAL CODE, AND METHOD AND PROGRAM THEREFOR
#2BUILDING DATA PLATFORM WITH DIGITAL TWIN ENRICHMENT
#3EFFICIENT AND SECURE COMMUNICATION USING WIRELESS SERVICE IDENTIFIERS
#4SYSTEMS AND METHODS FOR ELECTRONIC CERTIFICATION OF E-COMMERCE SECURITY BADGES
#5AUTOMATIC FILE ENCRYPTION
#6METHODS, APPARATUSES AND COMPUTER PROGRAM PRODUCTS FOR MANAGING ORGANIZATION CONNECTIONS IN A GROUP-BASED COMMUNICATION SYSTEM
#7MALWARE MITIGATION BASED ON RUNTIME MEMORY ALLOCATION
#8DIGITAL TWIN CHANGE FEED
#9METHOD AND APPARATUS FOR PROTECTING DATA IN A PORTABLE ELECTRONIC DEVICE
#10SYSTEMS AND METHODS FOR CONTROLLING DATA EXPOSURE USING ARTIFICIAL-INTELLIGENCE-BASED MODELING
#11System and Method for Verifying and Protecting Personal Identifiable Information
#12METHODS, SYSTEMS, AND DEVICES TO PROTECT PERSONAL IDENTIFIABLE (PI) DATA WHEN A USER UTILIZES AN AVATAR IN A VIRTUAL ENVIRONMENT
#13APPARATUS AND METHOD FOR VALIDATING DATA
#14DETECTION OF POTENTIAL EXFILTRATION OF AUDIO DATA FROM DIGITAL ASSISTANT APPLICATIONS
#15ASYNCHRONOUS PING MESSAGES FOR DETERMINING CAPABILITY OF SYSTEMS FOR EXECUTING ASYNCHRONOUS PROTOCOLS
#16Surgical instrument with motor disengagement in response to excess torque
#17EVALUATING OPERATIONAL CAPACITY OF A POWER SURGICAL SYSTEM
#18SYSTEM, METHOD, AND COMPUTER-ACCESSIBLE MEDIUM FOR EVALUATING MULTI-DIMENSIONAL SYNTHETIC DATA USING INTEGRATED VARIANTS ANALYSIS
#19PERMISSION BASED MEDIA COMPOSITION
#20DETECTING UNAUTHORIZED ACCESS TO DIGITAL CONTENT USING FORENSIC WATERMARKING
#21MOBILE DEVICE INTERFACE
#22ONLINE IDENTITY REPUTATION
#23DOCUMENT AUTHENTICITY DETECTION IN A COMMUNICATION NETWORK
#24DETECTING UNAUTHORIZED ACCESS TO DIGITAL CONTENT USING DIGITAL CREDENTIAL ACCESS CONTROL
#25BUILDING DATA PLATFORM WITH AN ENRICHMENT LOOP
#26BUILDING DATA PLATFORM WITH GRAPH BASED CAPABILITIES
#27BUILDING DATA PLATFORM WITH GRAPH BASED PERMISSIONS
#28DETECTING UNAUTHORIZED ACCESS TO DIGITAL CONTENT USING NEARBY DEVICE DETECTION
#29DETECTING UNAUTHORIZED ACCESS TO DIGITAL CONTENT USING SONIC SIGNAL CONFIRMATION
#30DETECTING UNAUTHORIZED ACCESS TO DIGITAL CONTENT USING USAGE PATTERN DETECTION
#31SYSTEMS AND METHODS FOR MITIGATING RISKS OF THIRD-PARTY COMPUTING SYSTEM FUNCTIONALITY INTEGRATION INTO A FIRST-PARTY COMPUTING SYSTEM
#32Information Technology Ecosystem Environment for Performing an Information Technology Sustainability Empowerment Operation
#33TOKENIZING SENSITIVE DATA
#34SYSTEMS AND METHODS FOR GENERATING INTERRELATED NOTIONAL DATA
#35SYSTEMS AND METHODS FOR REDACTION OF SENSITIVE INFORMATION FROM VOICE COMMUNICATIONS
#36SYSTEMS AND METHODS FOR ENCRYPTING DIALOGUE BASED DATA IN A DATA STORAGE SYSTEM
#37SYSTEMS AND METHODS TO IDENTIFY NEURAL NETWORK BRITTLENESS BASED ON SAMPLE DATA AND SEED GENERATION
#38SYSTEMS AND METHODS FOR DETECTING RESOURCES RESPONSIBLE FOR EVENTS
#39INCREASING SECURITY OF A COMPUTER PROGRAM USING UNSTRUCTURED TEXT
#40Building data graph including application programming interface calls
#41CONFIDENTIAL ELECTRONIC DATA VERIFICATION SYSTEM
#42ENABLING RELIABLE COMMUNICATIONS BETWEEN COMPUTING INSTANCES
#43PAIRING DEVICES TO PREVENT DIGITAL CONTENT MISUSE
#44DATA PROTECTION METHOD, APPARATUS, MEDIUM AND DEVICE
#45SYSTEM AND METHOD FOR CONTROLLING AND ORGANIZING METADATA ASSOCIATED WITH ON-LINE CONTENT
#46Systems and Methods for Controlling Data Exposure Using Artificial-Intelligence-Based Periodic Modeling
#47INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND DISTRIBUTED COMPONENT
#48Security Systems and Methods for Encoding and Decoding Content
#49SYSTEMS AND METHODS TO CONTROL ACCESS TO COMPONENTS OF VIRTUAL OBJECTS
#50SYSTEMS AND METHODS FOR SYNTHETIC DATA GENERATION FOR TIME-SERIES DATA USING DATA SEGMENTS
#51METHODS OF PROVIDING DATA PRIVACY FOR NEURAL NETWORK BASED INFERENCE
#52Systems and Methods of Document Review, Modification and Permission-Based Control
#53STRONG FULLY HOMOMORPHIC WHITE-BOX AND METHOD FOR USING SAME
#54SECURE ELEMENT ENFORCING A SECURITY POLICY FOR DEVICE PERIPHERALS
#55Efficient and secure communication using wireless service identifiers
#56Systems and methods for electronic certification of e-commerce security badges
#57BLOCK-BASED PROTECTION FROM RANSOMWARE
#58DYNAMIC INFORMATION VIRTUALIZATION
#59STORAGE DATA DELETION MANAGEMENT SYSTEM AND APPARATUS
#60DISTRIBUTED DIGITAL SECURITY SYSTEM
#61Automated access data change detection
#62DATA MODEL GENERATION USING GENERATIVE ADVERSARIAL NETWORKS
#63METHOD AND APPARATUS FOR MANAGING TECHNICAL INFORMATION BASED ON ARTIFICIAL INTELLIGENCE
#64Tracking techniques for generated data
#65Cross-organization continuous update of edge-side event detection models in warehouse environments via federated learning
#66Systems and methods for motion correction in synthetic images
#67HARDWARE APPARATUSES AND METHODS FOR MEMORY CORRUPTION DETECTION
#68REAL-TIME SYNTHETICALLY GENERATED VIDEO FROM STILL FRAMES
#69MACHINE LEARNING MODELS WITH MULTI-BUDGET DIFFERENTIAL PRIVACY
#70BASEBOARD-MANAGEMENT-CONTROLLER STORAGE MODULE
#71CUSTOM DIGITAL STAMP PATTERN DETECTOR FOR COPY SECURITY FUNCTION
#72Secured Numeric and/or AlphaNumeric Method of Entry
#73SYSTEMS AND METHODS FOR REMOTE SECURE ERASURE OF FINGERPRINT DATA FROM INFORMATION HANDLING SYSTEMS
#74DATA POISONING METHOD AND DATA POISONING APPARATUS
#75GOVERNANCE MECHANISMS FOR REUSE OF MACHINE LEARNING MODELS AND FEATURES
#76SYSTEMS AND METHODS FOR REMOVING IDENTIFIABLE INFORMATION
#77ARCHITECTURE SWAPPING FOR WORKSPACES
#78SYSTEMS AND METHODS FOR SYNTHETIC DATA GENERATION
#79Method and system for facilitating identification of electronic data exfiltration
#80Identifying suspicious entries in a document management system
#81Policies and encryption to protect digital information
#82Malware mitigation based on runtime memory allocation
#83COMPLIANCE ADAPTION PLANS AND SOFTWARE COMPONENT MATCHMAKING
#84Building data platform with event queries
#85RELIABLE OBSERVABILITY IN CONTROL TOWERS BASED ON SIDE-CHANNEL QUERIES
#86SYSTEM AND METHOD OF OBTAINING AUTHENTICATION INFORMATION FOR USER INPUT INFORMATION
#87Systems and methods to improve data clustering using a meta-clustering model
#88MEMORY SYSTEM AND CONTROL METHOD
#89Method and apparatus for control of data access
#90ON-DEMAND NETWORK SECURITY SYSTEM
#91PROTECTING DISASTER RECOVERY SITE
#92SECURING DATA STORAGE BY SLICING SWAPPED DATA PORTIONS INTO DATA FRAGMENTS AND APPLYING A SHUFFLE INDEX
#93SECRET CALCULATION SYSTEM, SECRET CALCULATION METHOD, AND PROGRAM
#94Storage node security statement management in a distributed storage cluster
#95DATA INTERCEPTION PROTECTION
#96WIRELESS COMMUNICATION DEVICES FOR CONNECTING TO A COMPUTING DEVICE AND WIRELESSLY RECEVING DATA FOR RENDERING OR OUTPUTTING AT THE COMPUTING DEVICE
#97Systems and methods for controlling data exposure using artificial-intelligence-based modeling
#98DATA OBFUSCATION PLATFORM FOR IMPROVING DATA SECURITY OF PREPROCESSING ANALYSIS BY THIRD PARTIES
#99DATA PROCESSING SYSTEMS FOR VALIDATING AUTHORIZATION FOR PERSONAL DATA COLLECTION, STORAGE, AND PROCESSING
#100INTERACTIVE DIGITAL MEDIA CHALLENGE SYSTEM AND METHOD FOR PLURALITY OF PLATFORMS
#101ARTIFICIAL INTELLIGENCE FOR REAL-TIME E-MAIL SENTIMENT ANALYSIS FOR BRAND PROTECTION
#102PRIVACY-ENHANCED FEDERATED DECISION-MAKING METHOD, APPARATUS, SYSTEM AND STORAGE MEDIUM
#103METHOD FOR CONCEALING SENSITIVE MAIL RETURN ADDRESSES
#104Removing data having a data type from a data set
#105Secure content sharing
#106Method and apparatus for protecting privacy of ophthalmic patient and storage medium
#107EXCHANGING USER INFORMATION WITH OTHER PHYSICALLY PROXIMATE USERS
#108SYSTEMS AND METHODS FOR SYNTHETIC DATABASE QUERY GENERATION
#109Processing data in a network
#110Efficient and secure communication using wireless service identifiers
#111INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
#112Systems and methods for proactively extracting data from complex documents
#113PRIVACY PRESERVATION IN A QUERYABLE DATABASE BUILT FROM UNSTRUCTURED TEXTS
#114DELIVERY VEHICLE
#115QUANTIFIED SOCIAL MEDIA PRIVACY
#116SYSTEMS AND METHODS FOR SYNTHESIZING CROSS DOMAIN COLLECTIVE INTELLIGENCE
#117DATA DISTRIBUTION CONTROL APPARATUS, DATA DISTRIBUTION CONTROL METHOD, AND NON-TRANSITORY COMPUTER-READABLE MEDIUM
#118INDIRECT BRANCH PREDICTOR SECURITY PROTECTION
#119Confidential command, control, and communication center
#120Systems and methods for electronic certification of e-commerce security badges
#121Building data platform with graph based capabilities
#122Building data platform with an enrichment loop
#123Variant inconsistency attack (VIA) as a simple and effective adversarial attack method
#124Building data platform with event subscriptions
#125System and method for data anonymization using optimization techniques
#126Adjusting Error Encoding Parameters for Writing Encoded Data Slices
#127Identifying suspicious entries in a document management system
#128Workflow for evaluating quality of artificial intelligence (AI) services using held-out data
#129DATA PROCESSING SYSTEMS AND METHODS FOR EFFICIENTLY ASSESSING THE RISK OF CAMPAIGNS
#130DATA PROCESSING SYSTEMS AND METHODS FOR EFFICIENTLY ASSESSING THE RISK OF CAMPAIGNS
#131System, method, and computer-accessible medium for evaluating multi-dimensional synthetic data using integrated variants analysis
#132System and method for protection of personal identifiable information
#133Detecting potentially malicious code in data through data profiling with an information analyzer
#134SYSTEMS AND METHODS FOR CENSORING TEXT INLINE
#135DATA PROCESSING AND SCANNING SYSTEMS FOR ASSESSING VENDOR RISK
#136DATA PROCESSING AND SCANNING SYSTEMS FOR ASSESSING VENDOR RISK
#137PRIVACY PRESERVING COOPERATIVE LEARNING IN UNTRUSTED ENVIRONMENTS
#138Building data platform with graph based permissions
#139SYSTEM AND METHOD FOR FACILITIES ACCESS BREACH DETECTION AND INFORMATION PROTECTION
#140Document authenticity detection in a communication network
#141Parallel tokenization of decimal information in a distributed network environment
#142PARALLEL TOKENIZATION OF DATE AND TIME INFORMATION IN A DISTRIBUTED NETWORK ENVIRONMENT
#143Building data platform with event enrichment with contextual information
#144INFORMATION PROCESSING APPARATUS AND CONTROL METHOD
#145CYBER IMMUNITY SYSTEM AS A BIOLOGICAL SELF-RECOGNITION MODEL ON OPERATING SYSTEMS
#146PRIVACY-PROTECTION-BASED DATA PROCESSING MODEL ACQUISITION METHOD AND APPARATUS, TERMINAL DEVICE AND STORAGE MEDIUM
#147METHODS AND SYSTEMS FOR GENERATING HISTORY DATA OF SYSTEM USE AND REPLAY MODE FOR IDENTIFYING SECURITY EVENTS SHOWING DATA AND USER BINDINGS
#148Generating and disseminating mock data for circumventing data security breaches
#149Methods of providing data privacy for neural network based inference
#150Data processing system and method for protecting data in the data processing system
#151PRIVACY ENFORCEMENT VIA LOCALIZED PERSONALIZATION
#152SYSTEM AND METHOD FOR MONITORING, MEASURING, AND MITIGATING CYBER THREATS TO A COMPUTER SYSTEM
#153Permission based media composition
#154SYSTEM FOR PROVIDING OPERATIONAL DATA
#155Method and apparatus for protecting data in a portable electronic device
#156Methods and systems for a heterogeneous multi-chain framework
#157Personal information platforms
#158INTERVAL PRIVACY
#159Storage system and data deletion method
#160DATA PROCESSING SYSTEMS AND METHODS FOR EFFICIENTLY ASSESSING THE RISK OF PRIVACY CAMPAIGNS
#161Providing User Guidance on Erasure Process Selection Based on Accumulated Erasure Reports
#162Data processing and scanning systems for assessing vendor risk
#163Pairing devices to prevent digital content misuse
#164Scanning unexposed web applications for vulnerabilities
#165Securing software routines
#166System and method for controlling and organizing metadata associated with on-line content
#167Systems and methods for document review, display and validation within a collaborative environment
#168AUTOMATICALLY SCALABLE SYSTEM FOR SERVERLESS HYPERPARAMETER TUNING
#169Pairing devices to prevent digital content misuse
#170Data processing systems for validating authorization for personal data collection, storage, and processing
#171Operation method, operation apparatus, and device
#172METHOD AND SYSTEM FOR COLLECTING AND MANAGING VEHICLE GENERATED DATA
#173Methods and system for on-device AI model parameter run-time protection
#174Automated honeypot creation within a network
#175One-time pad encryption for industrial wireless instruments
#176Building data platform with event enrichment with contextual information
#177Data masking system
#178SECURE PORTABLE DATA APPARATUS
#179Dataset connector and crawler to identify data lineage and segment data
#180Automated access data change detection
#181SYSTEMS AND METHODS FOR REPLACING SENSITIVE DATA
#182Scanning web applications for security vulnerabilities
#183LEARNING PRIVACY-PRESERVING OPTICS VIA ADVERSARIAL TRAINING
#184Methods, apparatuses and computer program products for managing organization connections in a group-based communication system
#185Compartments
#186PREVENTION OF INFORMATION EXPOSURE TO A LABORATORY INSTRUMENT
#187Content delivery system and method of delivering
#188Tokenizing sensitive data
#189Distributed logging for securing non-repudiable multi-party transactions
#190Right holder terminal, permission information management method, and permission information management program
#191User terminal, permission information management method, and permission information management program
#192Data processing consent management systems and related methods
#193Method and apparatus for clustering privacy data of plurality of parties
#194Memory system and control method
#195Methods of providing data privacy for neural network based inference
#196Security systems and methods for encoding and decoding content
#197User switching for multi-user devices
#198Automatic remediation of non-compliance events
#199Processing data in a network
#200PRIVACY PRESERVING APPROACH TO PEAK LOAD MANAGEMENT
#201SYSTEMS AND METHODS FOR QUICKLY SEARCHING DATASETS BY INDEXING SYNTHETIC DATA GENERATING MODELS
#202METHOD FOR DUPLEXING DATABASE
#203SENSITIVE DATA DETECTION AND REPLACEMENT
#204Enforcing compliance rules using guest management components
#205Portable operating system and portable user data
#206Fingerprint sensing device and operation method thereof
#207Data processing and scanning systems for assessing vendor risk
#208Private model utility by minimizing expected loss under noise
#209Method, electronic device, and computer storage medium for information processing
#210Efficient and secure communication using wireless service identifiers
#211Secure content sharing
#212Systems and methods for providing data-driven evolution of arbitrary data structures
#213Systems and methods for use in validating artifacts for deployment
#214Distributed digital security system
#215Distributed digital security system
#216Integrated circuit(s) with anti-glitch canary circuit(s)
#217Systems and methods for controlling data exposure using artificial-intelligence-based periodic modeling
#218Memory system, memory device, and control method of memory system for generating information from a threshold voltage
#219Exchanging user information with other physically proximate users
#220Systems and methods involving features of hardware virtualization such as separation kernel hypervisors, hypervisors, hypervisor guest context, hypervisor context, rootkit detection/prevention, and/or other features
#221Information management of data associated with multiple cloud services
#222Training diverse and robust ensembles of artificial intelligence computer models
#223Information processing method, system, and storage medium for presenting a user login interface
#224Detection of potential exfiltration of audio data from digital assistant applications
#225Automatic file encryption
#226USING A WIRELESS TRANSMITTER AND RECEIVER TO PREVENT UNAUTHORIZED ACCESS TO RESTRICTED COMPUTER SYSTEMS
#227Methods, apparatuses and computer program products for managing organization connections in a group-based communication system
#228Cloud-based coordination of remote service appliances
#229Real-time synthetically generated video from still frames
#230Policy-based topic-level encryption for message queues
#231Deploying data-loss-prevention policies to user devices
#232Strong fully homomorphic white-box and method for using same
#233System and method for privacy-aware analysis of video streams
#234Location Aware User Model That Preserves User Privacy Of Sensor Data Collected By A Smartphone
#235COMPUTER-IMPLEMENTED SYSTEMS AND METHODS FOR PROCESSING AN ELECTRONIC DOCUMENT
#236Information processing device, information processing method, and distributed component
#237SYSTEMS AND METHODS FOR MANAGING DATA INCIDENTS HAVING DIMENSIONS
#238Systems and methods for removing identifiable information
#239Device resource management during video streaming and playback
#240Systems and methods to control access to components of virtual objects
#241Building data platform with a tenant entitlement model
#242Confidential information sharing system
#243BUILDING DATA PLATFORM WITH GRAPH BASED POLICIES
#244Building data platform with a graph change feed
#245Building data platform with event based graph queries
#246Systems and methods for motion correction in synthetic images
#247Building data platform with graph based communication actions
#248Building data platform with graph based capabilities
#249Building data platform with external twin synchronization
#250Building data platform with edge based event enrichment
#251Data processing systems for validating authorization for personal data collection, storage, and processing
#252Method and system for user authentication using virtual code for authentication
#253Determining model parameters using secret sharing
#254METHOD, DEVICE AND COMPUTER PROGRAM PRODUCT FOR DATA SIMULATION
#255UNCENSORED TALK BACKS
#256Systems and methods to identify breaking application program interface changes
#257LOCATION-BASED INFORMATION EXCHANGE BETWEEN PHYSICALLY PROXIMATE USERS
#258Data privacy awareness in workload provisioning
#259AUTOMATIC DOCUMENT SOURCE IDENTIFICATION SYSTEMS
#260Content delivery system and method of delivering
#261Datacenter preemptive measures for improving protection using IOT sensors
#262LINEAR TIME ALGORITHMS FOR PRIVACY PRESERVING CONVEX OPTIMIZATION
#263Method, device and system for verifying virtual code based on sphere
#264Blockchain-based transaction privacy
#265Identification of database intrusion by changes in data tables
#266Hardware apparatuses and methods for memory corruption detection
#267Speech recognition
#268Method for accessing a database stored on a server using a relation
#269Detection of data leaks using targeted scanning
#270Privacy control operation modes
#271Subsystem for configuration, security, and management of an adaptive system
#272Protecting information using policies and encryption
#273Method, device, and computer program product for error evaluation
#274Obfuscation of operations in computing devices
#275End effector detention systems for surgical instruments
#276Data processing consent management systems and related methods
#277Data processing and scanning systems for assessing vendor risk
#278Systems and methods for synthetic data generation for time-series data using data segments
#279Removing personal information from text using multiple levels of redaction
#280System for advanced protection of consumable or detachable elements
#281Securing address information in a memory controller
#282Ephemeral peripheral device
#283AI-based blockchain hybrid consensus
#284Cryptographic memory ownership
#285Automated honeypot creation within a network
#286DATA SECURITY SYSTEM AND METHOD
#287Determining model parameters using secret sharing
#288Systems and methods for controlling data exposure using artificial-intelligence-based modeling
#289SYSTEM AND METHOD FOR MISAPPROPRIATION DETECTION AND MITIGATION USING GAME THEORETICAL EVENT SEQUENCE ANALYSIS
#290Universal operating system
#291Management of taint information attached to strings
#292INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM
#293Unified control and validation of privacy-impacting devices
#294Quantification of privacy risk in location trajectories
#295METHODS FOR BUILDING ASSETS BLOCKCHAIN FOR ASSET BACKED DIGITIZATION AND SECURITIZATION OF AUTO LOAN ASSETS
#296Online identity reputation
#297Securing data
#298Information display considering privacy on public display
#299Systems and methods for managing access to application data on computing devices
#300Method of secure memory addressing