G06F21/70 - CPC Classification

Classification description:

Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer

Sub-classes:
Recent Application in this class:
#1
20240256694
2024-08-01

AUTOMATIC FILE ENCRYPTION

#2
20240232439
2024-07-11

TAMPER DETECTION SYSTEMS AND METHODS FOR PROGRAMMABLE LOGIC DEVICES

#3
20240045958
2024-02-08

ANTI-MALWARE ALGORITHM AND HW/FW FOR INTERNAL SSD HEALTH AND STORAGE SPACE PROTECTION AGAINST CYBER-ATTACKS

#4
20240012945
2024-01-11

Authentication of medical device computing systems by using metadata signature

#5
20230409732
2023-12-21

INSTRUCTION EXECUTION THAT BROADCASTS AND MASKS DATA VALUES AT DIFFERENT LEVELS OF GRANULARITY

#6
20230300447
2023-09-21

SYSTEMS AND METHODS FOR CAMERA CONFIGURATION

#7
20230275903
2023-08-31

ELECTRONIC DEVICES HAVING ADAPTIVE SECURITY PROFILES AND METHODS FOR SELECTING THE SAME

#8
20230237202
2023-07-27

SECURE STORAGE UNIT REPLACEMENT AND LOCKING SYSTEM AND METHOD OF USING THE SAME

#9
20230237201
2023-07-27

SELECTIVE COMMUNICATION INTERFACES FOR PROGRAMMABLE PARTS

#10
20230134122
2023-05-04

CONTINUOUS RISK ASSESSMENT FOR ELECTRONIC PROTECTED HEALTH INFORMATION

#11
20230090760
2023-03-23

FPGA chip with protected JTAG interface

#12
20230039894
2023-02-09

DEFERRED RECLAIMING OF SECURE GUEST RESOURCES

#13
20230004680
2023-01-05

APPARATUS AND METHOD FOR VERIFYING INTEGRITY OF HARDWARE BOARD

#14
20230004679
2023-01-05

ROLE-BASED COMPONENT ACCESS CONTROL

#15
20220390517
2022-12-08

Baseboard management controller (BMC) test system and method

#16
20220309169
2022-09-29

SECURITY DEVICE AND METHODS OF OPERATING A SECURITY DEVICE

#17
20220300661
2022-09-22

Secure CPU architecture using encryption of return addresses

#18
20220237328
2022-07-28

INFORMATION PROCESSING APPARATUS AND CONTROL METHOD

#19
20220237327
2022-07-28

Managing and protecting charging stations for drones

#20
20220229898
2022-07-21

Tamper-evident devices equipped with secure re-image file(s)

#21
20220215117
2022-07-07

Instruction execution that broadcasts and masks data values at different levels of granularity

#22
20220215112
2022-07-07

System of enclaves

#23
20220188460
2022-06-16

Generating attack graphs in agile security platforms

#24
20220129590
2022-04-28

Generating attack graphs in agile security platforms

#25
20220035954
2022-02-03

Software management device

#26
20220035953
2022-02-03

System and method of limiting access of processors to hardware resources

#27
20220019654
2022-01-20

Tamper-evident travel devices equipped with secure re-image file (s)

#28
20210374288
2021-12-02

Authentication of medical device computing systems by using metadata signature

#29
20210359854
2021-11-18

Security credential derivation

#30
20210357535
2021-11-18

INTERACTIVE KIOSK WITH MISOPERATION PREVENTION FUNCTION

#31
20210344490
2021-11-04

Apparatus and method for generating identification key

#32
20210336459
2021-10-28

Electronic apparatus and control method

#33
20210326487
2021-10-21

LOCKING METHOD AND RELATED ELECTRONIC DEVICE

#34
20210294893
2021-09-23

Microcontroller program instruction execution fingerprinting and intrusion detection

#35
20210271771
2021-09-02

Automatic file encryption

#36
20210264065
2021-08-26

Secure peripheral interconnect

#37
20210173950
2021-06-10

DATA SHARING BETWEEN TRUSTED EXECUTION ENVIRONMENTS

#38
20210173944
2021-06-10

Multi-device unlocking of a data storage device

#39
20210152341
2021-05-20

Systems and methods for providing IoT security service using hardware security module

#40
20210148977
2021-05-20

Side-channel signature based PCB authentication using JTAG architecture and a challenge-response mechanism

#41
20210099794
2021-04-01

Management of computing device microphones

#42
20210097165
2021-04-01

Print apparatus component authentication

#43
20210081524
2021-03-18

SYSTEMS AND METHODS OF ESTABLISHING SECURE PASSWORDS USING REAL-TIME DYNAMIC FEEDBACK.

#44
20210064786
2021-03-04

Authentication of medical device computing systems by using metadata signature

#45
20210049307
2021-02-18

Apparatus for autonomous security and functional safety of clock and voltages including adjustment of a divider ratio

#46
20210037034
2021-02-04

Method and device for handling an anomaly at a control unit

#47
20210034787
2021-02-04

Management of securable computing resources

#48
20210034786
2021-02-04

Management of securable computing resources

#49
20210034785
2021-02-04

Management of securable computing resources

#50
20210014196
2021-01-14

Secure electric power delivery system protection during cyber threats

#51
20210012034
2021-01-14

Phosphor-loaded waveguide

#52
20210004500
2021-01-07

Inhibiting a penetration attack

#53
20200394335
2020-12-17

Secure CPU architecture using encryption of return addresses

#54
20200372166
2020-11-26

System of enclaves

#55
20200364374
2020-11-19

APPARATUS AND METHOD FOR GENERATING IDENTIFICATION KEY

#56
20200364101
2020-11-19

Executing system calls in isolated address space in operating system kernel

#57
20200356703
2020-11-12

Method and apparatus for trusted display on untrusted computing platforms to secure applications

#58
20200320203
2020-10-08

Continuous risk assessment for electronic protected health information

#59
20200272735
2020-08-27

Device for securing diagnostic commands to a control unit, and corresponding motor vehicle

#60
20200265169
2020-08-20

Secure processor and a program for a secure processor

#61
20200231051
2020-07-23

Multi-functional vehicle charging apparatus and system

#62
20200226293
2020-07-16

Anti-Tampering Switch for Electronic Access Control Readers

#63
20200218808
2020-07-09

Protected system

#64
20200202351
2020-06-25

SERVICE PAYMENT SYSTEM AND METHOD

#65
20200202019
2020-06-25

Input to locked computing device

#66
20200195657
2020-06-18

Electronic devices having adaptive security profiles and methods for selecting the same

#67
20200177619
2020-06-04

Generating attack graphs in agile security platforms

#68
20200175175
2020-06-04

Generating attack graphs in agile security platforms

#69
20200152561
2020-05-14

Integrated circuit (IC) portholes and related techniques

#70
20200151368
2020-05-14

Defensive routing and related techniques

#71
20200151364
2020-05-14

MIGRATION OF TRUSTED SECURITY ATTRIBUTES TO A SECURITY ENGINE CO-PROCESSOR

#72
20200144746
2020-05-07

Vehicle controller having modification prevention device

#73
20200134233
2020-04-30

Tamper detection and response deactivation technique

#74
20200134226
2020-04-30

Instruction execution that broadcasts and masks data values at different levels of granularity

#75
20200134225
2020-04-30

Instruction execution that broadcasts and masks data values at different levels of granularity

#76
20200134224
2020-04-30

Instruction execution that broadcasts and masks data values at different levels of granularity

#77
20200110906
2020-04-09

Encryption circuit for performing virtual encryption operations

#78
20200004990
2020-01-02

Apparatus for autonomous security and functional safety of clock and voltages

#79
20190370040
2019-12-05

Native execution bridge for sandboxed scripting languages

#80
20190362082
2019-11-28

Data processing device and operating method therefor

#81
20190332813
2019-10-31

Modular system for controlling usability of a device

#82
20190332812
2019-10-31

Edge device disablement

#83
20190327244
2019-10-24

Electronic devices having adaptive security profiles and methods for selecting the same

#84
20190303606
2019-10-03

Automatic file encryption

#85
20190297006
2019-09-26

Data processing lock signal transmission

#86
20190236314
2019-08-01

Secure processor and a program for a secure processor

#87
20190235609
2019-08-01

Apparatus, method, and storage medium for controlling a power saving state in a SATA storage system

#88
20190205572
2019-07-04

Terminal verification method, terminal device, and computer readable storage medium

#89
20190205539
2019-07-04

Method and device for verifying upgrade of diagnosis connector of diagnostic equipment, and diagnosis connector

#90
20190188015
2019-06-20

Native execution bridge for sandboxed scripting languages

#91
20190171850
2019-06-06

Apparatus and method for generating identification key

#92
20190108349
2019-04-11

Change-tolerant method of generating an identifier for a collection of assets in a computing environment using a secret sharing scheme

#93
20190095643
2019-03-28

Instruction execution that broadcasts and masks data values at different levels of granularity

#94
20190095167
2019-03-28

Display apparatus, image playing apparatus, and display system

#95
20190073491
2019-03-07

Central and delegate security processors for a computing device

#96
20190073478
2019-03-07

Hardware-enforced firmware security

#97
20190065785
2019-02-28

Computing device to provide access control to a hardware resource

#98
20190065301
2019-02-28

Security enhanced out of process user space handling of hardware events

#99
20190050598
2019-02-14

SECURE DATA STORAGE

#100
20190050232
2019-02-14

Method and apparatus to gather platform configuration profile in a trustworthy manner

#101
20190034168
2019-01-31

Random number generator

#102
20190028274
2019-01-24

Apparatus and method for generating identification key

#103
20190026497
2019-01-24

Techniques for protecting security features of integrated circuits

#104
20190026457
2019-01-24

Privacy-preserving, mutual PUF-based authentication protocol

#105
20190020685
2019-01-17

Apparatus and method for analysis of binary targets to generate security policy

#106
20190012489
2019-01-10

Method and apparatus for trusted display on untrusted computing platforms to secure applications

#107
20190005271
2019-01-03

Secure enablement of platform features without user intervention

#108
20180373648
2018-12-27

Method for writing in a non-volatile memory of an electronic entity, and related electronic entity

#109
20180367318
2018-12-20

Device signature generation

#110
20180365406
2018-12-20

METHODS AND SYSTEMS FOR PROVIDING ADVANCED SECURE BOOT FEATURES TO LIMITED-RESOURCE PERIPHERAL DEVICES BY USING A SECURE PROCESSOR

#111
20180357417
2018-12-13

Apparatus and method for protecting electronic device

#112
20180352147
2018-12-06

Enablement and disablement of cameras

#113
20180323553
2018-11-08

Connected component authentication

#114
20180322293
2018-11-08

Providing intrusion detection, monitoring and protection in a system

#115
20180300733
2018-10-18

Secure delivery system, logging module and access controlled container

#116
20180285285
2018-10-04

Cable lock with confidential data protection

#117
20180268172
2018-09-20

ELECTRONIC DEVICE AUTHENTICATION SYSTEM

#118
20180268126
2018-09-20

Dynamically controlling access to devices

#119
20180232539
2018-08-16

Apparatus and method for chip identification and preventing malicious manipulation of physical addresses by incorporating a physical network with a logical network

#120
20180218150
2018-08-02

Apparatus and methods for transitioning between a secure area and a less-secure area

#121
20180204024
2018-07-19

Firewall to determine access to a portion of memory

#122
20180189522
2018-07-05

Architecture for telemetry and adaptive lifetime control of integrated circuits

#123
20180173898
2018-06-21

Data processing apparatus and access control method

#124
20180166399
2018-06-14

Layout-driven method to assess vulnerability of ICs to microprobing attacks

#125
20180152889
2018-05-31

Communication system and IoT system

#126
20180144105
2018-05-24

Computing apparatus and method with persistent memory

#127
20180137299
2018-05-17

System of enclaves

#128
20180107834
2018-04-19

Automatic file encryption

#129
20180102966
2018-04-12

Data processing lock signal transmission

#130
20180089425
2018-03-29

System, apparatus and method for platform protection against cold boot attacks

#131
20180075258
2018-03-15

SYSTEMS AND METHODS FOR DYNAMICALLY ASSIGNING DOMAIN IDENTIFIERS FOR ACCESS CONTROL

#132
20180067561
2018-03-08

HAPTIC EFFECT HANDSHAKE UNLOCKING

#133
20180046830
2018-02-15

Host/battery with public/private busses, public memory, processor, and private memory

#134
20180032755
2018-02-01

Computer-implemented system and method for storing and retrieving sensitive information

#135
20180025182
2018-01-25

Phosphor-loaded waveguide

#136
20180019925
2018-01-18

Electronic appliance and network of the same

#137
20180019882
2018-01-18

Electronic appliance and network of the same

#138
20180019880
2018-01-18

System and method for verifying integrity of an electronic device

#139
20180017509
2018-01-18

Screen printed phosphors for intrinsic chip identifiers

#140
20180004979
2018-01-04

Migration of trusted security attributes to a security engine co-processor

#141
20170364713
2017-12-21

Computing systems and methods

#142
20170364709
2017-12-21

Reliability enhancement methods for physically unclonable function bitstring generation

#143
20170357829
2017-12-14

INTEGRATED CIRCUIT, MOBILE DEVICE HAVING THE SAME, AND HACKING PREVENTING METHOD THEREOF

#144
20170353473
2017-12-07

Electronic devices having adaptive security profiles and methods for selecting the same

#145
20170329995
2017-11-16

ANTI-REPLAY TECHNIQUES USING SECURE EXTERNAL NON-VOLATILE MEMORY

#146
20170316226
2017-11-02

Keyless method to secure physical access to information handling systems in a datacenter

#147
20170308719
2017-10-26

Inhibiting a penetration attack

#148
20170293774
2017-10-12

Detection of the opening of a data-entry device

#149
20170288876
2017-10-05

Tamper resistance of distributed hardware systems

#150
20170286720
2017-10-05

Secure device chamber

#151
20170277912
2017-09-28

Method and system for cryptographically enabling and disabling lockouts for critical operations in a smart grid network

#152
20170262620
2017-09-14

Electronic apparatus and control method thereof

#153
20170257222
2017-09-07

Techniques for protecting security features of integrated circuits

#154
20170249483
2017-08-31

INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND COMPUTER-READABLE MEDIUM

#155
20170199555
2017-07-13

Method for adjusting pull resistors of an electronic module

#156
20170169737
2017-06-15

Steganographic embedding of hidden payload

#157
20170169246
2017-06-15

Instruction execution that broadcasts and masks data values at different levels of granularity

#158
20170161523
2017-06-08

Functional device and control apparatus

#159
20170141930
2017-05-18

Test point-enhanced hardware security

#160
20170124354
2017-05-04

Integrated circuit lifecycle security with redundant and overlapping crosschecks

#161
20170116433
2017-04-27

File backup with selective encryption

#162
20170076115
2017-03-16

Electronic device

#163
20170068290
2017-03-09

Personal cloud case cover with a plurality of modular capabilities

#164
20170061124
2017-03-02

Method for analyzing a logic circuit

#165
20170060637
2017-03-02

Data processing systems

#166
20170046539
2017-02-16

Secure processor and a program for a secure processor

#167
20170046538
2017-02-16

Secure processor and a program for a secure processor

#168
20170032149
2017-02-02

Method and apparatus for destructing compromised devices

#169
20170032110
2017-02-02

User terminal interworking with peripheral device and method for preventing leakage of information using the same

#170
20170026724
2017-01-26

Communication control device

#171
20170011321
2017-01-12

Uplifting of computer resources

#172
20170004320
2017-01-05

Automatic file encryption

#173
20160381134
2016-12-29

Selectively disabling operation of hardware components based on network changes

#174
20160360610
2016-12-08

Stackable security wraps

#175
20160357990
2016-12-08

Verifying motion data for accessing hardware elements

#176
20160350559
2016-12-01

Custom security policies for multiple objects

#177
20160335438
2016-11-17

Mechanisms for locking computing devices

#178
20160260273
2016-09-08

Physical access request authorization

#179
20160259940
2016-09-08

Security-enhanced computer systems and methods

#180
20160225725
2016-08-04

Laser detector using latch and semiconductor device including the same

#181
20160216326
2016-07-28

Semiconductor apparatus and method of operating the same

#182
20160188908
2016-06-30

Information processing system and semiconductor device

#183
20160173460
2016-06-16

Power and cost efficient peripheral input

#184
20160156632
2016-06-02

System on chip and method therefor

#185
20160156590
2016-06-02

Method and system for configuring and securing a device or apparatus, a device or apparatus, and a computer program product

#186
20160156471
2016-06-02

Learning a new peripheral using a security provisioning manifest

#187
20160154979
2016-06-02

Apparatus and method for generating identification key

#188
20160154967
2016-06-02

Methods of data transfer in electronic devices

#189
20160154958
2016-06-02

Authentication with battery and host programmed with shared identity key

#190
20160132698
2016-05-12

Semiconductor device module, license setting method and medium having license setting program recorded therein

#191
20160112441
2016-04-21

File security management apparatus and management method for system protection

#192
20160104001
2016-04-14

Input to locked computing device

#193
20160094349
2016-03-31

Steganographic embedding of executable code

#194
20160065607
2016-03-03

System and method for managed security assessment and mitigation

#195
20160065369
2016-03-03

Information processing apparatus and information processing method for restoring apparatus when encryption key is changed

#196
20160055351
2016-02-25

Method and system for managing processing resources

#197
20160048288
2016-02-18

Mobile terminal setting first and second control commands to user divided first and second areas of a backside touch screen

#198
20160043938
2016-02-11

Data processing lock signal transmission

#199
20160041792
2016-02-11

Recovering from unexpected flash drive removal

#200
20150364433
2015-12-17

Systems and methods for detecting and preventing optical attacks

#201
20150347760
2015-12-03

Perturbation of field programmable gate array code to prevent side channel attack

#202
20150334133
2015-11-19

Hardware implementation methods and system for secure, policy-based access control for computing devices

#203
20150324610
2015-11-12

METHOD FOR MANAGING SOFTWARE FUNCTIONALITIES IN A CONTROL UNIT

#204
20150302207
2015-10-22

Providing intrusion detection, monitoring and protection in a system

#205
20150301570
2015-10-22

Detection of malware through voltage measurements of field programmable gate array

#206
20150286845
2015-10-08

Movement monitoring security devices and systems

#207
20150278552
2015-10-01

INFORMATION HANDLING OF ACCESS SECURITY

#208
20150278551
2015-10-01

Physically unclonable fuse using a NOR type memory array

#209
20150269396
2015-09-24

System and method for security-aware master

#210
20150261609
2015-09-17

Dispersed storage network slice name verification

#211
20150242655
2015-08-27

Apparatus and method for software enabled access to protected hardware resources

#212
20150227413
2015-08-13

Electronic device and method for protecting an electronic device against unauthorized use

#213
20150213290
2015-07-30

Display apparatus and control method thereof

#214
20150213280
2015-07-30

Method, electronic device and computer program product for screen shield

#215
20150185863
2015-07-02

Entry device and paper sheets handling device

#216
20150161414
2015-06-11

Obfuscating in memory encryption keys

#217
20150150118
2015-05-28

Hardware virtualization module for exclusive controlled access to CPU

#218
20150148009
2015-05-28

Secure deployment of terminals in a wireless network

#219
20150143551
2015-05-21

Electronic tamper detection

#220
20150143550
2015-05-21

Chip and method for detecting an attack on a chip

#221
20150128286
2015-05-07

Preventing predetermined type of configuration changes to computing devices in a computing system servicing a critical job

#222
20150082422
2015-03-19

SECURITY SWITCH

#223
20150074433
2015-03-12

Physically unclonable function based on breakdown voltage of metal-insulator-metal device

#224
20150067780
2015-03-05

Mobile terminal detection method and mobile terminal

#225
20150067771
2015-03-05

Access enablement security circuit

#226
20150052622
2015-02-19

Method and apparatus for monitoring performance for secure chip operation

#227
20150046998
2015-02-12

Secure data storage

#228
20150033011
2015-01-29

Method for initializing a memory area that is associated with a smart meter

#229
20150020189
2015-01-15

ELECTRO-MECHANIC USB LOCKING DEVICE

#230
20150013021
2015-01-08

Mobile device peripherals management system and multi-data stream technology (MdS)

#231
20150007354
2015-01-01

Input to locked computing device

#232
20150007342
2015-01-01

Non-retained message system

#233
20150007275
2015-01-01

Method and system for cryptographically enabling and disabling lockouts for critical operations in a smart grid network

#234
20150006804
2015-01-01

Systems and methods for safely moving short term memory devices while preserving, protecting and examining their digital data

#235
20140380009
2014-12-25

Protected memory view for nested page table access by virtual machine guests

#236
20140359753
2014-12-04

Systems and methods for controlling access to peripherals of a computer system by software applications

#237
20140359706
2014-12-04

Restricted transmogrifying driver platform

#238
20140359349
2014-12-04

Dispersed storage re-dispersion method based on a failure

#239
20140337639
2014-11-13

Steganographic embedding of executable code

#240
20140325633
2014-10-30

Computer or microchip with its system bios protected by one or more internal hardware firewalls

#241
20140298490
2014-10-02

Physical access request authorization

#242
20140298485
2014-10-02

Persistent agent supported by processor

#243
20140298026
2014-10-02

Information processing device and computer program product

#244
20140283147
2014-09-18

Methods and systems for preventing hardware trojan insertion

#245
20140283018
2014-09-18

Mechanisms for locking computing devices

#246
20140283011
2014-09-18

Application licensing for a centralized system of medical devices

#247
20140281643
2014-09-18

Apparatus and method for detecting clock tampering

#248
20140281517
2014-09-18

File backup with selective encryption

#249
20140259149
2014-09-11

Programmable direct memory access channels

#250
20140258716
2014-09-11

Total hypervisor encryptor

#251
20140258437
2014-09-11

Computer or microchip with an internal hardware firewall and a master controlling device

#252
20140253221
2014-09-11

On-die programmable fuses

#253
20140250521
2014-09-04

Rule based access for removable storage

#254
20140245387
2014-08-28

Data processing lock signal transmission

#255
20140244876
2014-08-28

Data processing lock signal transmission

#256
20140241523
2014-08-28

Installable secret functions for a peripheral

#257
20140189890
2014-07-03

Device authentication using a physically unclonable functions based key generation system

#258
20140181986
2014-06-26

Unique and unclonable platform identifiers using data-dependent circuit path responses

#259
20140173685
2014-06-19

CONTROLLING MODIFICATION OF ELECTRONIC DEVICE CABLING

#260
20140157362
2014-06-05

Recovering from unexpected flash drive removal

#261
20140157359
2014-06-05

Electronic devices having adaptive security profiles and methods for selecting the same

#262
20140136426
2014-05-15

System and method for capacity licensing

#263
20140129846
2014-05-08

Method and system for protecting a driver

#264
20140122902
2014-05-01

Information processing apparatus

#265
20140108630
2014-04-17

Method and system for managing processing resources

#266
20140101721
2014-04-10

Transmission terminal, transmission system and recording medium

#267
20140089712
2014-03-27

Security enclave processor power control

#268
20140089685
2014-03-27

Key information generation device and key information generation method

#269
20140089681
2014-03-27

Secure processor and a program for a secure processor

#270
20140089680
2014-03-27

Secure processor and a program for a secure processor

#271
20140089676
2014-03-27

Secure processor and a program for a secure processor

#272
20140089674
2014-03-27

Encryption in the cloud with customer controlled keys

#273
20140082746
2014-03-20

Persistent agent supported by operating system in handheld device

#274
20140082371
2014-03-20

Secure processor and a program for a secure processor

#275
20140068792
2014-03-06

Information processing apparatus and control method

#276
20140068248
2014-03-06

Learning a new peripheral using a security provisioning manifest

#277
20140053259
2014-02-20

Security central processing unit monitoring of on-chip conditions

#278
20140049887
2014-02-20

Stackable security wraps

#279
20140049359
2014-02-20

SECURITY DEVICE AND INTEGRATED CIRCUIT INCLUDING THE SAME

#280
20140040631
2014-02-06

MEMORY CONTROLLER, NONVOLATILE MEMORY DEVICE, NONVOLATILE MEMORY SYSTEM, AND ACCESS DEVICE

#281
20140032907
2014-01-30

Protocol for authenticating functionality in a peripheral device

#282
20140020121
2014-01-16

Always-available embedded theft reaction subsystem

#283
20140020115
2014-01-16

Social sharing of multilayered document

#284
20140019846
2014-01-16

Notes aggregation across multiple documents

#285
20140019562
2014-01-16

Sharing user-generated notes

#286
20140013388
2014-01-09

Methods and systems for managing multiple information handling systems with a virtual keyboard-video-mouse interface

#287
20140007252
2014-01-02

Change-tolerant method of generating an identifier for a collection of assets in a computing environment using a secret sharing scheme

#288
20140007248
2014-01-02

Timer for hardware protection of virtual machine monitor runtime integrity watcher

#289
20130340069
2013-12-19

Security switch

#290
20130340068
2013-12-19

Memory device comprising a plurality of memory chips, authentication system and authentication method thereof

#291
20130312123
2013-11-21

Embedded flash memory card and electronic device using the same, and engineering board for embedded flash memory card

#292
20130290565
2013-10-31

Storage medium, information processing device and method

#293
20130276151
2013-10-17

Electronic physical unclonable functions

#294
20130276059
2013-10-17

Electronic physical unclonable functions

#295
20130246865
2013-09-19

Identifying a storage error of a data slice

#296
20130212671
2013-08-15

Security-enhanced computer systems and methods

#297
20130191925
2013-07-25

Integrated secure and non-secure display for a handheld communications device

#298
20130145455
2013-06-06

METHOD FOR ACCESSING A SECURE STORAGE, SECURE STORAGE AND SYSTEM COMPRISING THE SECURE STORAGE

#299
20130145176
2013-06-06

Circuit personalization

#300
20130139272
2013-05-30

Resource-Type Weighting of Use Rights