Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity; Protecting data by securing the transmission between two devices or processes
Sub-classes:DATA TRANSMISSION BETWEEN DEVICES
#2SYSTEM AND METHOD FOR INTELLIGENT PREDICTION AND IMPLEMENTATION OF DYNAMICALLY CHANGING REQUIREMENTS RELATING TO INCOMING NETWORK REQUESTS
#3ELECTRONIC RECORDS SYSTEM AND RELATED METHODS
#4PROVISIONING OF A SHIPPABLE STORAGE DEVICE AND INGESTING DATA FROM THE SHIPPABLE STORAGE DEVICE
#5MISDIRECTED EMAIL DATA LOSS PREVENTION
#6METHOD FOR REGISTERING DIGITAL KEYS OF A VEHICLE IN A VIRTUAL WALLET, AND ASSOCIATED DEVICES
#7SYSTEM AND METHOD FOR SECURE DATA MESSAGING
#8MESSAGE SENDER SECURITY IN MESSAGING SYSTEM
#9SYSTEMS AND METHODS FOR GENERATING ARTIFICIAL AUTOMATION DATA TO PROTECT ACTUAL AUTOMATION DATA
#10Quantum Cloud Apparatus for Event Evaluation and Authorization
#11SYSTEM AND METHOD FOR PRIVACY POLICY ENFORCEMENT
#12SYSTEM AND METHODS FOR USING CIPHER OBJECTS TO PROTECT DATA
#13SYSTEM AND METHOD FOR SECURE BROWSING
#14REMOTE POOLED MEMORY DEVICE
#15Discovery of Instrument-Related Assets and Two-Way Communication with Those Assets Between Network Environments
#16TRANSACTION SECURITY SYSTEMS AND METHODS
#17Optimizing I/O Operations For Compressed Data
#18SECURITY TECHNIQUES FOR SHARED USE OF ACCELERATORS
#19SYSTEM AND METHODS FOR USING CIPHER OBJECTS TO PROTECT DATA
#20Receiver with Enhanced Transmitter Compatibility and Method Therefore
#21SECURE DATA CAPTURE SYSTEMS AND METHODS
#22FRAUD DETERRENCE FOR SECURE TRANSACTIONS
#23A METHOD, A MONITORING SYSTEM AND A COMPUTER PROGRAM PRODUCT FOR MONITORING AND SECURING A NETWORK CONNECTED CONTROLLER
#24Receiver Preventing Stall Conditions in a Transmitter While Maintaining Compatibility and Method Therefore
#25Secure Start System for an Autonomous Vehicle
#26Wireless Network Service Transaction Protocol
#27FRAUD DETERRENCE FOR SECURE TRANSACTIONS
#28SYSTEMS AND METHODS FOR DYNAMIC FORMJACKING PROTECTION
#29Information Monitoring System and Method
#30MANIPULATING INTER-CHIP COMMUNICATIONS FOR IoT SECURITY
#31EFFICIENT INTERACTION PROCESSING USING SECRET
#32SYSTEMS, DEVICES AND METHODS FOR DETERMINING ITEM AVAILABILITY IN A SHOPPING SPACE
#33Air-Gapped Cryptographic Communication System
#34SECURE SEARCH METHOD, SYSTEM THEREOF, APPARATUS THEREOF, ENCRYPTION APPARATUS, SEARCHER TERMINAL, AND PROGRAM
#35Dynamic Command Protection Method and Dynamic Command Protection System by Using Time-Vary Salt Data
#36MISDIRECTED EMAIL DATA LOSS PREVENTION
#37MULTIUSER UNIFIED ENDPOINT MANAGEMENT
#38CROSS-CHAIN RESOURCE TRANSFER USING RESOURCE TRANSFER CERTIFICATE
#39GRADUATED AUTHENTICATION IN AN IDENTITY MANAGEMENT SYSTEM
#40SYSTEMS AND METHODS FOR USE IN SECURING OPEN SERVICE CONNECTIONS
#41METHOD, COMMUNICATION DEVICES AND A SERVER FOR CONTROLLING CONTENT
#42SYSTEMS AND METHODS FOR SECURE DATA COMMUNICATIONS FOR STREAMLINED ELECTRONIC TRANSACTION PROCESSING
#43PROTECTION OF COMMUNICATIONS BETWEEN TRUSTED EXECUTION ENVIRONMENT AND HARDWARE ACCELERATOR UTILIZING ENHANCED END-TO-END ENCRYPTION AND INTER-CONTEXT SECURITY
#44Vehicle Computing System STS Communications with a Personal Computing Device and Applications Thereof
#45Method and System for Remote Data Access
#46SYSTEM AND METHOD FOR ACCESSING REMOTE TARGET DEVICE AND REMOTE EXTENDER THEREOF
#47SECURE DATA CAPTURE SYSTEMS AND METHODS
#48Access Manager That Limits Access to User Information Using Authentication and Verification
#49Distributed Data Storage System Providing Enhanced Security
#50Fraud deterrence for secure transactions
#51GENERATING A REQUEST FOR REPROCESSING OF A REPLACEABLE SUPPLY COMPONENT
#52MULTI-CHANNEL DEVICE CONNECTION
#53SECURING AUDIO COMMUNICATIONS
#54HIGH SPEED PRIVATE AND SECURE CROSS-ENTITY DATA PROCESSING
#55Decentralized Cybersecure Privacy Network For Cloud Communication, Computing And Global e-Commerce
#56METHODS FOR PROVIDING AN ALERT OR AN ALARM TO A USER OF A MOBILE COMMUNICATIONS DEVICE
#57COMPUTER-BASED SYSTEMS CONFIGURED FOR EFFICIENT AND SECURE MULTI-USER ELECTRONIC ACTIVITIES AND METHODS OF USE THEREOF
#58Systems, Methods and Apparatuses for Securely Storing and Providing Payment Information
#59METHOD OF DATA TRANSFER, A METHOD OF CONTROLLING USE OF DATA AND CRYPTOGRAPHIC DEVICE
#60METHOD FOR PROTECTING DATA BASED ON PRIVATE SET UNION PROTOCOL, AND APPARATUS IMPLEMENTING THE SAME METHOD
#61Secure firewall configurations
#62IMAGE PROCESSING APPARATUS, CONTROL METHOD THEREFOR, AND MEDIUM
#63SYSTEMS AND METHODS FOR DETECTING DOMAIN IMPERSONATION
#64ENTRY MANAGEMENT SYSTEM, ACCESS CONTROL APPARATUS, ACCESS CONTROL METHOD, AND RECORDING MEDIUM
#65USER INTERFACES FOR MANAGING SECURE OPERATIONS
#66Managing version sharing in a data exchange
#67SYSTEMS AND METHODS FOR TRUSTED PATH SECURE COMMUNICATION
#68FRAUD DETERRENCE FOR SECURE TRANSACTIONS
#69FRAUD DETERRENCE FOR SECURE TRANSACTIONS
#70FRAUD DETERRENCE FOR SECURE TRANSACTIONS
#71Secure computing system
#72USING MACHINE-LEARNING MODELS TO DETERMINE GRADUATED LEVELS OF ACCESS TO SECURED DATA FOR REMOTE DEVICES
#73HARDWARE PROTECTION OF INLINE CRYPTOGRAPHIC PROCESSOR
#74System and Method for Decentralized, Controlled, and Managed Consumer Personal Data
#75CUSTOMER SERVICE SYSTEMS AND PORTALS
#76SYSTEM AND METHOD FOR OPTIMIZED GENERATION EVALUATION, SELECTION OF SOLUTIONS USING IMPROVED DISTRIBUTED EVOLUTIONARY COMPUTING
#77SECURE STREAM PROTOCOL FOR SERIAL INTERCONNECT
#78SCALABLE, DATA-DRIVEN DIGITAL MARKETPLACE PROVIDING A STANDARDIZED SECURED DATA SYSTEM FOR INTERLINKING SENSITIVE RISK-RELATED DATA, AND METHOD THEREOF
#79METHODS AND APPARATUS FOR MANAGING TRUSTED DEVICES
#80Display Device Control
#81Methods for providing an alert or an alarm to a user of a mobile communications device
#82PROTECTING CONTENTS AND ACCOUNTS USING SCAN OPERATION
#83System includes server, printing apparatus, information processing apparatus to provide a technique for specifying a physical printer associated with a logical printer, and non-transitory storage medium
#84VIRTUAL CODE-BASED CONTROL SYSTEM, METHOD, AND PROGRAM, CONTROL DEVICE, AND CONTROL SIGNAL GENERATING MEANS
#85DATA TRANSMISSION METHOD AND ELECTRONIC DEVICE
#86TIME SYNCHRONIZATION DEVICE FOR PROVIDING TIMING INFORMATION ACQUIRED FROM NETWORK TIME SOURCES TO ENDPOINT DEVICES
#87Shopping facility assistance systems, devices and methods
#88Dynamic multifactor authentication using low-power and high-power monitoring
#89INHERITANCE CONTAINER SERVICE
#90TRACKING DATA ACQUIRED BY COORDINATE MEASUREMENT DEVICES THROUGH A WORKFLOW
#91PROVIDING DATA FOR TRAINING A MACHINE LEARNING MODEL
#92STRONG FULLY HOMOMORPHIC WHITE-BOX AND METHOD FOR USING SAME
#93Device Disabled Until Claimed
#94RIGHTS CONTROLLED COMMUNICATION
#95Distributed Ledger Network for Data Portability
#96AUTHENTICATION INFORMATION TRANSMISSION DEVICE USING INAUDIBLE SOUND WAVE COMMUNICATION
#97Privacy Data Switch
#98SECURE DATA EXCHANGE
#99Data Transformation Engine
#100Preserving confidentiality of tenants in cloud environment when deploying security services
#101PROCESSOR AND MEMORY SYSTEM
#102CERTIFICATES IN DATA STORAGE DEVICES
#103Secure elements broker (SEB) for application communication channel selector optimization
#104Image processing apparatus, control method therefor, and medium
#105UTILIZING A SWITCHBOARD MANAGEMENT SYSTEM TO EFFICIENTLY AND ACCURATELY MANAGE SENSITIVE DIGITAL DATA ACROSS MULTIPLE COMPUTER APPLICATIONS, SYSTEMS, AND DATA REPOSITORIES
#106SINGLE CAMERA TIME-DELAY TO ENFORCE DATA TRANSMISSION COMPLIANCE IN REAL AND NEAR REAL TIME VIDEO
#107METHODS AND SYSTEMS FOR FACILITATING JOINT SUBMISSIONS
#108PROCESSOR CORE UNIQUE ENCRYPTION
#109METHOD AND SYSTEM FOR SECURELY PROVIDING VEHICLE SERVICES DATA TO A VEHICLE
#110SECURE DATA PARSER METHOD AND SYSTEM
#111Computing device compatible encryption and decryption
#112Managing version sharing in a data exchange
#113METHOD AND SYSTEM FOR OPERATING A SAFETY-CRITICAL DEVICE VIA A NON-SECURE NETWORK AND FOR PROVIDING RELIABLE DISENGAGEMENT OF OPERATIONS OF THE DEVICE
#114Storage device authentication
#115Biometric cybersecurity and workflow management
#116Deploying and Utilizing a Dynamic Data Stenciling System with a Smart Linking Engine
#117SYSTEMS AND METHODS FOR TRANSFER OF WORKSPACE ORCHESTRATION
#118Quantum Entanglement Communication Service
#119DIRECT DATA TRANSFER SYSTEM
#120COMMUNICATION ENCRYPTION AND DECRYPTION ON DEVICES
#121Private data exchange metrics sharing
#122SYSTEMS AND METHODS FOR AUTHENTICATION CODE ENTRY USING MOBILE ELECTRONIC DEVICES
#123TRANSPARENT ENCRYPTION
#124Automated recovery of far edge computing infrastructure in a 5G network
#125Fraud deterrence for secure transactions
#126SECURE SHARING OF PERSONAL DATA IN DISTRIBUTED COMPUTING ZONES
#127Device independent crypto engine
#128Provisioning of a shippable storage device and ingesting data from the shippable storage device
#129Using machine-learning models to determine graduated levels of access to secured data for remote devices
#130SECURE DATA TRANSMISSION
#131Remote virtualized asset delivery and local provisioning
#132NETWORK COMMUNICATION USING PROOF OF PRESENCE
#133MEMORY SYSTEM VERIFICATION
#134Systems and methods for securely pairing a transmitting device with a receiving device
#135Multiple physical request interfaces for security processors
#136Security device to protect active communication ports
#137SECURITY DEVICE TO PROTECT UNUSED COMMUNICATION PORTS
#138Remote secured terminal
#139Methods for providing an alert or an alarm to a user of a mobile communications device
#140Utilization Of Coordinate Systems For Compression And Encryption
#141MULTI-CLUSTER ACCESS
#142TECHNOLOGIES FOR SECURE I/O WITH MEMORY ENCRYPTION ENGINES
#143Selectively obscuring and/or revealing sensitive information in a display of a computing device
#144Method and system for remote data access
#145Trusted system upgrade and secrets transfer in a secure computing environment
#146ELECTRONIC APPARATUS AND CONTROLLING METHOD THEREOF
#147SYSTEM AND ASSOCIATED METHODS FOR REMOTE CONTROL OF VESSELS
#148Proxy authentication for resource-constrained device
#149Writing data to compressed and encrypted volumes
#150Information processing system, information processing apparatus, and non-transitory computer readable medium storing program for saving resource of information processing apparatus
#151Data access control systems and methods
#152MANAGEMENT APPARATUS, NON-TRANSITORY COMPUTER READABLE MEDIUM, AND MANAGEMENT METHOD
#153ELECTRONIC CHIP AND A METHOD FOR PROVISIONING SUCH AN ELECTRONIC CHIP
#154TECHNOLOGIES FOR ESTABLISHING SECURE CHANNEL BETWEEN I/O SUBSYSTEM AND TRUSTED APPLICATION FOR SECURE I/O DATA TRANSFER
#155STEGANOGRAPHY METHOD
#156Methods and systems for configuring communication decision trees based on connected positionable elements on canvas
#157DIRECTED TRAJECTORIES THROUGH COMMUNICATION DECISION TREE USING ITERATIVE ARTIFICIAL INTELLIGENCE
#158CONTACTLESS OPTICAL INTERNET OF THINGS USER IDENTIFICATION DEVICE AND SYSTEM
#159CUSTOMIZED SMART DEVICES AND TOUCHSCREEN DEVICES AND CLEANSPACE MANUFACTURING METHODS TO MAKE THEM
#160SECURITY MONITORING METHOD AND SYSTEM
#161Method for allocating addresses to a plurality of bus subscribers in a bus system that includes a master module and bus system having a master module and a plurality of bus subscribers
#162Image redaction for a display device
#163PROTOCOL TO INITIATE COMMUNICATION BETWEEN QUANTUM DEVICES CONFIGURED TO SEND OR RECEIVE QUANTUM OBJECTS
#164PROCESS FOR DETERMINING A DEGREE OF DATA EXPOSURE
#165SECURE COMPUTING CONTROL METHOD, DATA PACKET PROCESSING METHOD AND DEVICE AND SYSTEM THEREOF
#166System and method for maintaining trusted execution in an untrusted computing environment using a secure communication channel
#167Mobile device security, device management, and policy enforcement in a cloud-based system
#168Protection of communications between trusted execution environment and hardware accelerator utilizing enhanced end-to-end encryption and inter-context security
#169AUTHORIZING APPLICATION ACCESS VIA CUSTOM UWP SID
#170SYSTEM AND METHOD FOR AUTHORIZING DATA TRANSFERS
#171Terminating distributed trusted execution environment via self-isolation
#172OBFUSCATING DATA AT-TRANSIT
#173Terminating distributed trusted execution environment via confirmation messages
#174VIDEO SECURITY SYSTEM WITH IMPROVED NETWORK RESPONSE TIME USING PRE-AUTHENTICATION INFORMATION
#175COMMUNICATION PATH OBFUSCATION SYSTEM AND METHOD
#176Methods and systems for facilitating joint submissions
#177Systems and methods for secure random number generation
#178TRAINING DATA PROTECTION FOR ARTIFICIAL INTELLIGENCE MODEL IN PARTITIONED EXECUTION ENVIRONMENT
#179VERIFICATION INFORMATION PROCESSING METHOD AND APPARATUS, TERMINAL DEVICE AND STORAGE MEDIUM
#180PRIVACY PRESERVING CROSS-DOMAIN MACHINE LEARNING
#181STORING VITAL DOCUMENTS
#182Securing communication between a wireless data communication accessory for a drug delivery device and an external device
#183Misdirected email data loss prevention
#184Misdirected email data loss prevention
#185Device and method for secure communication
#186IDENTITY MANAGEMENT ENDPOINT COLLECTION FOR ZERO TRUST SCORE SYSTEM
#187Encryption in a storage array
#188Operating system agnostic and secure bi-directional data handling
#189Wireless network service transaction protocol
#190Decentralized cybersecure privacy network for cloud communication, computing and global e-commerce
#191Trusted Execution Environment
#192ENCRYPTED GROUP COMMUNICATION METHOD
#193SYSTEMS AND METHODS FOR ENABLING ACCELERATOR-BASED SECURE EXECUTION ZONES
#194MOBILE INDIVIDUAL SECURE COMMUNICATIONS ENVIRONMENT
#195Telematics authentication
#196VIRTUAL MACHINE FORMJACKING PROTECTION
#197VIRTUAL PRIMARY PLATFORM (VPP) IMPLEMENTED ON A SECURE ELEMENT AND AN EXTERNAL ENVIRONMENT
#198Communication method and device capable of ensuring the security of personal information
#199Method and system for remote data access
#200Secure decentralized P2P filesystem
#201Zero-knowledge protection for side channels in data protection to the cloud
#202Endpoint Security using an Action Prediction Model
#203Method and system for service image deployment in a cloud computing system based on distributed ledger technology
#204SYSTEMS, MEDIA, AND METHODS FOR IDENTIFYING, DETERMINING, MEASURING, SCORING, AND/OR PREDICTING ONE OR MORE DATA PRIVACY ISSUES AND/OR REMEDIATING THE ONE OR MORE DATA PRIVACY ISSUES
#205Method for transmitting information
#206Verification device, verification system, verification method, and verification program
#207Method and device for transferring a boot code with improved data security
#208System and method for securely transferring data
#209COMMUNICATIONS SERVER APPARATUS AND METHOD FOR DETERMINATION OF AN ABSTENTION ATTACK
#210Document authenticity detection in a communication network
#211Apparatus, system and method for charging a battery
#212SURVIVOR ASSAULT MATCHING PROCESS
#213Processor and memory system to selectively enable communication
#214Method and control circuit for managing information of electronic device
#215Cryptographic separation of memory on device with use in DMA protection
#216Secure computing method, secure computing system, and secure computing management device
#217ENCRYPTED HUMAN INTERFACE KEYBOARD
#218Secure transfer of data between programs executing on the same end-user device
#219Detection of compromised storage device firmware
#220Message sender security in messaging system
#221Technologies for secure authentication and programming of accelerator devices
#222Control device for a motor vehicle, and motor vehicle
#223Remote Attestation Method and Device for Composite Device
#224Server System to Control Memory Devices over Computer Networks
#225Security method and apparatus for locking of mediators between console peripheral devices and hosts
#226Tamper-evident devices equipped with secure re-image file(s)
#227Method, communication system and system for secure communication between a master and a slave of a bus system
#228CLIENT ISOLATION WITH NATIVE CLOUD FEATURES
#229System and method for securing a network against malicious communications through peer-based cooperation
#230BIOS/OS key provisioning system
#231User interface process flow for posting content on a display device
#232Distributed data storage system providing enhanced security
#233DATA SHARING
#234Tracking data acquired by coordinate measurement devices through a workflow
#235System and method for managing built-in security for content distribution
#236SYSTEMS AND METHODS FOR ENCODED CLINICAL DATA COMMUNICATION
#237Data Control Method and Data Control System Capable of Providing High Data Transmission Security
#238Systems and methods for establishing secure communication via a software defined network in an electric power distribution system
#239Authentication and control of encryption keys
#240Fraud deterrence for secure transactions
#241Efficient launching of trusted execution environments
#242Integrated one-chip security module for smart energy security threat response
#243Graphical User Interface and Operator Console Management System for Distributed Terminal Network
#244HEARING DEVICE SYSTEM, DEVICES AND METHOD OF CREATING A TRUSTED BOND BETWEEN A HEARING DEVICE AND A USER APPLICATION
#245Quantum entanglement communication service
#246METHOD AND CONFIGURABLE HARDWARE MODULE FOR MONITORING A HARDWARE-APPLICATION
#247DATA PROCESSING SYSTEMS FOR IDENTIFYING, ASSESSING, AND REMEDIATING DATA PROCESSING RISKS USING DATA MODELING TECHNIQUES
#248Host computer securitization architecture
#249BEDSIDE USER DEVICE AND ID AND USER PERFORMANCE
#250DATA PROTECTION WITH TRANSLATION
#251FILE ACCESS RIGHT AUTHENTICATION METHOD AND ELECTRONIC DEVICE
#252METHOD AND SYSTEM FOR PERFORMING REMOTE ATTESTATION WITH A GATEWAY IN THE CONTEXT OF A TRUSTED EXECUTION ENVIRONMENT (TEE)
#253System enabling digital signature of a document in an online meeting
#254File processing method and terminal device
#255DISTRIBUTION SYSTEM, DISTRIBUTION METHOD, AND NON-TRANSITORY COMPUTER-READABLE MEDIUM
#256PLATFORM FOR SECURE COMMUNICATIONS WITH MEDICAL DEVICE
#257Securing audio communications
#258Method and system for securely conducting a digital examination
#259Systems, methods and apparatuses for securely storing and providing payment information
#260Virtual code-based control system, method, and program, control device, and control signal generating means
#261SYSTEM AND METHOD FOR ENABLING AND VERIFYING THE TRUSTWORTHINESS OF A HARDWARE SYSTEM
#262SECURITY OF ADVANCED SHORT-RANGE COMMUNICATION ARCHITECTURES
#263CONTROL DEVICE AND METHOD FOR ASSUMING CONTROL
#264SECURE FILE SHARING METHOD AND SYSTEM
#265SECURE ELEMENT AND METHOD
#266Computing device and data transmission method
#267Identifying security vulnerabilities using modeled attribute propagation
#268MODIFICATIONS TO FIRMWARE FUNCTIONALITY
#269Orthogonal access control for groups via multi-hop transform encryption
#270PERSONALLY IDENTIFIABLE INFORMATION SECURE PERSON-TO-PERSON PAYMENT TECHNOLOGY
#271HOST-BASED HARDWARE ENCRYPTION SYSTEM
#272Protected sharing of data saved in a hearing device
#273SYSTEMS, DEVICES AND METHODS FOR DETERMINING ITEM AVAILABILITY IN A SHOPPING SPACE
#274Information processing device, control method, and recording medium storing program
#275Data recovery device, data management server, data management system, data recovery method and program
#276TECHNOLOGIES FOR SECURE DEVICE CONFIGURATION AND MANAGEMENT
#277METHOD FOR CERTIFYING TRANSFER AND CONTENT OF A TRANSFERRED FILE
#278Computing device compatible encryption and decryption
#279Virtual token-based settlement providing system, virtual token generation apparatus, virtual token verification server, virtual token-based settlement providing method, and virtual token-based settlement providing program
#280Network based debug
#281SYSTEMS AND METHODS FOR REAL-TIME ADAPTIVE USER ATTENTION SENSING
#282Inline secret sharing
#283CONTROLLER SYSTEM, CONTROL UNIT, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
#284Secure computing system
#285AUTOMATIC INITIATION OF FOLLOW-ON TRANSACTION FROM A PRIMARY TRANSACTION WITH NESTED APPLICATION DISTRIBUTION
#286Sensor based intelligent system for assisting user with voice-based communication
#287Secure communications amongst connected dice
#288Gaze initiated interaction technique
#289System, device and method for securely transferring information from a hardware to a blockchain
#290SERVICE TRUST STATUS
#291Control subsystem having an integration framework
#292Data processing systems for data transfer risk identification and related methods
#293AUTHENTICASTING AND AUTHORIZING A USER IN AN EMULATED ENVIRONMENT
#294TECHNOLOGIES FOR LOW-LATENCY CRYPTOGRAPHY FOR PROCESSOR-ACCELERATOR COMMUNICATION
#295Key protection for computing platform
#296Location aware cryptography
#297Tamper-evident travel devices equipped with secure re-image file (s)
#298Method for starting vehicle and related device
#299TECHNOLOGIES FOR EXPANDED TRUSTED DOMAINS
#300System and methods for using cipher objects to protect data