Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
Sub-classes:AUTOMATIC FILE ENCRYPTION
#2TAMPER DETECTION SYSTEMS AND METHODS FOR PROGRAMMABLE LOGIC DEVICES
#3ANTI-MALWARE ALGORITHM AND HW/FW FOR INTERNAL SSD HEALTH AND STORAGE SPACE PROTECTION AGAINST CYBER-ATTACKS
#4Authentication of medical device computing systems by using metadata signature
#5INSTRUCTION EXECUTION THAT BROADCASTS AND MASKS DATA VALUES AT DIFFERENT LEVELS OF GRANULARITY
#6SYSTEMS AND METHODS FOR CAMERA CONFIGURATION
#7ELECTRONIC DEVICES HAVING ADAPTIVE SECURITY PROFILES AND METHODS FOR SELECTING THE SAME
#8SECURE STORAGE UNIT REPLACEMENT AND LOCKING SYSTEM AND METHOD OF USING THE SAME
#9SELECTIVE COMMUNICATION INTERFACES FOR PROGRAMMABLE PARTS
#10CONTINUOUS RISK ASSESSMENT FOR ELECTRONIC PROTECTED HEALTH INFORMATION
#11FPGA chip with protected JTAG interface
#12DEFERRED RECLAIMING OF SECURE GUEST RESOURCES
#13APPARATUS AND METHOD FOR VERIFYING INTEGRITY OF HARDWARE BOARD
#14ROLE-BASED COMPONENT ACCESS CONTROL
#15Baseboard management controller (BMC) test system and method
#16SECURITY DEVICE AND METHODS OF OPERATING A SECURITY DEVICE
#17Secure CPU architecture using encryption of return addresses
#18INFORMATION PROCESSING APPARATUS AND CONTROL METHOD
#19Managing and protecting charging stations for drones
#20Tamper-evident devices equipped with secure re-image file(s)
#21Instruction execution that broadcasts and masks data values at different levels of granularity
#22System of enclaves
#23Generating attack graphs in agile security platforms
#24Generating attack graphs in agile security platforms
#25Software management device
#26System and method of limiting access of processors to hardware resources
#27Tamper-evident travel devices equipped with secure re-image file (s)
#28Authentication of medical device computing systems by using metadata signature
#29Security credential derivation
#30INTERACTIVE KIOSK WITH MISOPERATION PREVENTION FUNCTION
#31Apparatus and method for generating identification key
#32Electronic apparatus and control method
#33LOCKING METHOD AND RELATED ELECTRONIC DEVICE
#34Microcontroller program instruction execution fingerprinting and intrusion detection
#35Automatic file encryption
#36Secure peripheral interconnect
#37DATA SHARING BETWEEN TRUSTED EXECUTION ENVIRONMENTS
#38Multi-device unlocking of a data storage device
#39Systems and methods for providing IoT security service using hardware security module
#40Side-channel signature based PCB authentication using JTAG architecture and a challenge-response mechanism
#41Management of computing device microphones
#42Print apparatus component authentication
#43SYSTEMS AND METHODS OF ESTABLISHING SECURE PASSWORDS USING REAL-TIME DYNAMIC FEEDBACK.
#44Authentication of medical device computing systems by using metadata signature
#45Apparatus for autonomous security and functional safety of clock and voltages including adjustment of a divider ratio
#46Method and device for handling an anomaly at a control unit
#47Management of securable computing resources
#48Management of securable computing resources
#49Management of securable computing resources
#50Secure electric power delivery system protection during cyber threats
#51Phosphor-loaded waveguide
#52Inhibiting a penetration attack
#53Secure CPU architecture using encryption of return addresses
#54System of enclaves
#55APPARATUS AND METHOD FOR GENERATING IDENTIFICATION KEY
#56Executing system calls in isolated address space in operating system kernel
#57Method and apparatus for trusted display on untrusted computing platforms to secure applications
#58Continuous risk assessment for electronic protected health information
#59Device for securing diagnostic commands to a control unit, and corresponding motor vehicle
#60Secure processor and a program for a secure processor
#61Multi-functional vehicle charging apparatus and system
#62Anti-Tampering Switch for Electronic Access Control Readers
#63Protected system
#64SERVICE PAYMENT SYSTEM AND METHOD
#65Input to locked computing device
#66Electronic devices having adaptive security profiles and methods for selecting the same
#67Generating attack graphs in agile security platforms
#68Generating attack graphs in agile security platforms
#69Integrated circuit (IC) portholes and related techniques
#70Defensive routing and related techniques
#71MIGRATION OF TRUSTED SECURITY ATTRIBUTES TO A SECURITY ENGINE CO-PROCESSOR
#72Vehicle controller having modification prevention device
#73Tamper detection and response deactivation technique
#74Instruction execution that broadcasts and masks data values at different levels of granularity
#75Instruction execution that broadcasts and masks data values at different levels of granularity
#76Instruction execution that broadcasts and masks data values at different levels of granularity
#77Encryption circuit for performing virtual encryption operations
#78Apparatus for autonomous security and functional safety of clock and voltages
#79Native execution bridge for sandboxed scripting languages
#80Data processing device and operating method therefor
#81Modular system for controlling usability of a device
#82Edge device disablement
#83Electronic devices having adaptive security profiles and methods for selecting the same
#84Automatic file encryption
#85Data processing lock signal transmission
#86Secure processor and a program for a secure processor
#87Apparatus, method, and storage medium for controlling a power saving state in a SATA storage system
#88Terminal verification method, terminal device, and computer readable storage medium
#89Method and device for verifying upgrade of diagnosis connector of diagnostic equipment, and diagnosis connector
#90Native execution bridge for sandboxed scripting languages
#91Apparatus and method for generating identification key
#92Change-tolerant method of generating an identifier for a collection of assets in a computing environment using a secret sharing scheme
#93Instruction execution that broadcasts and masks data values at different levels of granularity
#94Display apparatus, image playing apparatus, and display system
#95Central and delegate security processors for a computing device
#96Hardware-enforced firmware security
#97Computing device to provide access control to a hardware resource
#98Security enhanced out of process user space handling of hardware events
#99SECURE DATA STORAGE
#100Method and apparatus to gather platform configuration profile in a trustworthy manner
#101Random number generator
#102Apparatus and method for generating identification key
#103Techniques for protecting security features of integrated circuits
#104Privacy-preserving, mutual PUF-based authentication protocol
#105Apparatus and method for analysis of binary targets to generate security policy
#106Method and apparatus for trusted display on untrusted computing platforms to secure applications
#107Secure enablement of platform features without user intervention
#108Method for writing in a non-volatile memory of an electronic entity, and related electronic entity
#109Device signature generation
#110METHODS AND SYSTEMS FOR PROVIDING ADVANCED SECURE BOOT FEATURES TO LIMITED-RESOURCE PERIPHERAL DEVICES BY USING A SECURE PROCESSOR
#111Apparatus and method for protecting electronic device
#112Enablement and disablement of cameras
#113Connected component authentication
#114Providing intrusion detection, monitoring and protection in a system
#115Secure delivery system, logging module and access controlled container
#116Cable lock with confidential data protection
#117ELECTRONIC DEVICE AUTHENTICATION SYSTEM
#118Dynamically controlling access to devices
#119Apparatus and method for chip identification and preventing malicious manipulation of physical addresses by incorporating a physical network with a logical network
#120Apparatus and methods for transitioning between a secure area and a less-secure area
#121Firewall to determine access to a portion of memory
#122Architecture for telemetry and adaptive lifetime control of integrated circuits
#123Data processing apparatus and access control method
#124Layout-driven method to assess vulnerability of ICs to microprobing attacks
#125Communication system and IoT system
#126Computing apparatus and method with persistent memory
#127System of enclaves
#128Automatic file encryption
#129Data processing lock signal transmission
#130System, apparatus and method for platform protection against cold boot attacks
#131SYSTEMS AND METHODS FOR DYNAMICALLY ASSIGNING DOMAIN IDENTIFIERS FOR ACCESS CONTROL
#132HAPTIC EFFECT HANDSHAKE UNLOCKING
#133Host/battery with public/private busses, public memory, processor, and private memory
#134Computer-implemented system and method for storing and retrieving sensitive information
#135Phosphor-loaded waveguide
#136Electronic appliance and network of the same
#137Electronic appliance and network of the same
#138System and method for verifying integrity of an electronic device
#139Screen printed phosphors for intrinsic chip identifiers
#140Migration of trusted security attributes to a security engine co-processor
#141Computing systems and methods
#142Reliability enhancement methods for physically unclonable function bitstring generation
#143INTEGRATED CIRCUIT, MOBILE DEVICE HAVING THE SAME, AND HACKING PREVENTING METHOD THEREOF
#144Electronic devices having adaptive security profiles and methods for selecting the same
#145ANTI-REPLAY TECHNIQUES USING SECURE EXTERNAL NON-VOLATILE MEMORY
#146Keyless method to secure physical access to information handling systems in a datacenter
#147Inhibiting a penetration attack
#148Detection of the opening of a data-entry device
#149Tamper resistance of distributed hardware systems
#150Secure device chamber
#151Method and system for cryptographically enabling and disabling lockouts for critical operations in a smart grid network
#152Electronic apparatus and control method thereof
#153Techniques for protecting security features of integrated circuits
#154INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND COMPUTER-READABLE MEDIUM
#155Method for adjusting pull resistors of an electronic module
#156Steganographic embedding of hidden payload
#157Instruction execution that broadcasts and masks data values at different levels of granularity
#158Functional device and control apparatus
#159Test point-enhanced hardware security
#160Integrated circuit lifecycle security with redundant and overlapping crosschecks
#161File backup with selective encryption
#162Electronic device
#163Personal cloud case cover with a plurality of modular capabilities
#164Method for analyzing a logic circuit
#165Data processing systems
#166Secure processor and a program for a secure processor
#167Secure processor and a program for a secure processor
#168Method and apparatus for destructing compromised devices
#169User terminal interworking with peripheral device and method for preventing leakage of information using the same
#170Communication control device
#171Uplifting of computer resources
#172Automatic file encryption
#173Selectively disabling operation of hardware components based on network changes
#174Stackable security wraps
#175Verifying motion data for accessing hardware elements
#176Custom security policies for multiple objects
#177Mechanisms for locking computing devices
#178Physical access request authorization
#179Security-enhanced computer systems and methods
#180Laser detector using latch and semiconductor device including the same
#181Semiconductor apparatus and method of operating the same
#182Information processing system and semiconductor device
#183Power and cost efficient peripheral input
#184System on chip and method therefor
#185Method and system for configuring and securing a device or apparatus, a device or apparatus, and a computer program product
#186Learning a new peripheral using a security provisioning manifest
#187Apparatus and method for generating identification key
#188Methods of data transfer in electronic devices
#189Authentication with battery and host programmed with shared identity key
#190Semiconductor device module, license setting method and medium having license setting program recorded therein
#191File security management apparatus and management method for system protection
#192Input to locked computing device
#193Steganographic embedding of executable code
#194System and method for managed security assessment and mitigation
#195Information processing apparatus and information processing method for restoring apparatus when encryption key is changed
#196Method and system for managing processing resources
#197Mobile terminal setting first and second control commands to user divided first and second areas of a backside touch screen
#198Data processing lock signal transmission
#199Recovering from unexpected flash drive removal
#200Systems and methods for detecting and preventing optical attacks
#201Perturbation of field programmable gate array code to prevent side channel attack
#202Hardware implementation methods and system for secure, policy-based access control for computing devices
#203METHOD FOR MANAGING SOFTWARE FUNCTIONALITIES IN A CONTROL UNIT
#204Providing intrusion detection, monitoring and protection in a system
#205Detection of malware through voltage measurements of field programmable gate array
#206Movement monitoring security devices and systems
#207INFORMATION HANDLING OF ACCESS SECURITY
#208Physically unclonable fuse using a NOR type memory array
#209System and method for security-aware master
#210Dispersed storage network slice name verification
#211Apparatus and method for software enabled access to protected hardware resources
#212Electronic device and method for protecting an electronic device against unauthorized use
#213Display apparatus and control method thereof
#214Method, electronic device and computer program product for screen shield
#215Entry device and paper sheets handling device
#216Obfuscating in memory encryption keys
#217Hardware virtualization module for exclusive controlled access to CPU
#218Secure deployment of terminals in a wireless network
#219Electronic tamper detection
#220Chip and method for detecting an attack on a chip
#221Preventing predetermined type of configuration changes to computing devices in a computing system servicing a critical job
#222SECURITY SWITCH
#223Physically unclonable function based on breakdown voltage of metal-insulator-metal device
#224Mobile terminal detection method and mobile terminal
#225Access enablement security circuit
#226Method and apparatus for monitoring performance for secure chip operation
#227Secure data storage
#228Method for initializing a memory area that is associated with a smart meter
#229ELECTRO-MECHANIC USB LOCKING DEVICE
#230Mobile device peripherals management system and multi-data stream technology (MdS)
#231Input to locked computing device
#232Non-retained message system
#233Method and system for cryptographically enabling and disabling lockouts for critical operations in a smart grid network
#234Systems and methods for safely moving short term memory devices while preserving, protecting and examining their digital data
#235Protected memory view for nested page table access by virtual machine guests
#236Systems and methods for controlling access to peripherals of a computer system by software applications
#237Restricted transmogrifying driver platform
#238Dispersed storage re-dispersion method based on a failure
#239Steganographic embedding of executable code
#240Computer or microchip with its system bios protected by one or more internal hardware firewalls
#241Physical access request authorization
#242Persistent agent supported by processor
#243Information processing device and computer program product
#244Methods and systems for preventing hardware trojan insertion
#245Mechanisms for locking computing devices
#246Application licensing for a centralized system of medical devices
#247Apparatus and method for detecting clock tampering
#248File backup with selective encryption
#249Programmable direct memory access channels
#250Total hypervisor encryptor
#251Computer or microchip with an internal hardware firewall and a master controlling device
#252On-die programmable fuses
#253Rule based access for removable storage
#254Data processing lock signal transmission
#255Data processing lock signal transmission
#256Installable secret functions for a peripheral
#257Device authentication using a physically unclonable functions based key generation system
#258Unique and unclonable platform identifiers using data-dependent circuit path responses
#259CONTROLLING MODIFICATION OF ELECTRONIC DEVICE CABLING
#260Recovering from unexpected flash drive removal
#261Electronic devices having adaptive security profiles and methods for selecting the same
#262System and method for capacity licensing
#263Method and system for protecting a driver
#264Information processing apparatus
#265Method and system for managing processing resources
#266Transmission terminal, transmission system and recording medium
#267Security enclave processor power control
#268Key information generation device and key information generation method
#269Secure processor and a program for a secure processor
#270Secure processor and a program for a secure processor
#271Secure processor and a program for a secure processor
#272Encryption in the cloud with customer controlled keys
#273Persistent agent supported by operating system in handheld device
#274Secure processor and a program for a secure processor
#275Information processing apparatus and control method
#276Learning a new peripheral using a security provisioning manifest
#277Security central processing unit monitoring of on-chip conditions
#278Stackable security wraps
#279SECURITY DEVICE AND INTEGRATED CIRCUIT INCLUDING THE SAME
#280MEMORY CONTROLLER, NONVOLATILE MEMORY DEVICE, NONVOLATILE MEMORY SYSTEM, AND ACCESS DEVICE
#281Protocol for authenticating functionality in a peripheral device
#282Always-available embedded theft reaction subsystem
#283Social sharing of multilayered document
#284Notes aggregation across multiple documents
#285Sharing user-generated notes
#286Methods and systems for managing multiple information handling systems with a virtual keyboard-video-mouse interface
#287Change-tolerant method of generating an identifier for a collection of assets in a computing environment using a secret sharing scheme
#288Timer for hardware protection of virtual machine monitor runtime integrity watcher
#289Security switch
#290Memory device comprising a plurality of memory chips, authentication system and authentication method thereof
#291Embedded flash memory card and electronic device using the same, and engineering board for embedded flash memory card
#292Storage medium, information processing device and method
#293Electronic physical unclonable functions
#294Electronic physical unclonable functions
#295Identifying a storage error of a data slice
#296Security-enhanced computer systems and methods
#297Integrated secure and non-secure display for a handheld communications device
#298METHOD FOR ACCESSING A SECURE STORAGE, SECURE STORAGE AND SYSTEM COMPRISING THE SECURE STORAGE
#299Circuit personalization
#300Resource-Type Weighting of Use Rights