Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures; Providing a specific technical effect Security improvement
SYSTEMS AND METHODS FOR CACHING SPDM-BASED CERTIFICATES
#2Key Version Management in Storage Devices
#3SYSTEMS AND METHODS FOR ADAPTIVELY DETECTING AND MITIGATING ROWHAMMER ATTACKS AGAINST COMPUTER MEMORIES
#4MULTI-RING SHARED, TRAVERSABLE, AND DYNAMIC ADVANCED DATABASE
#5MEMORY SYSTEM AND STORAGE SYSTEM
#6SYSTEM AND METHOD FOR MULTIPARTY SECURE COMPUTING PLATFORM
#7BLOCK OR PAGE LOCK FEATURES IN SERIAL INTERFACE MEMORY
#8SEGMENTED NON-CONTIGUOUS REVERSE MAP TABLE
#9MEMORY CONTROLLER FOR RPMB-INCLUSIVE MEMORY DEVICE, OPERATING METHOD THEREOF AND ELECTRONIC DEVICE INCLUDING THE SAME
#10TECHNOLOGIES FOR DYNAMIC ACCELERATOR SELECTION
#11STRUCTURE AND METHOD FOR DIGITAL DATA MEMORY CARD ENCRYPTION
#12SYSTEM AND METHOD FOR SECURE ELECTRONIC TRANSACTION PLATFORM
#13Downgrading a Permission Associated with Data Stored in a Cache
#14PROCESSORS, METHODS, SYSTEMS, AND INSTRUCTIONS TO SUPPORT LIVE MIGRATION OF PROTECTED CONTAINERS
#15SYSTEMS, METHODS, AND APPARATUS FOR MEMORY PROTECTION FOR COMPUTATIONAL STORAGE DEVICES
#16EXTENDED UTILIZATION AREA FOR A MEMORY DEVICE
#17Proof of Cache Using Argon2d Cryptographic Hashing in Payment Processing
#18SHARING MEMORY AND I/O SERVICES BETWEEN NODES
#19INTEGRATED KEY REVOCATION WITH A FIELD LOADING PROCESS AND/OR RELATED SAFETY CHECKS RELATED TO AN ASSET SYSTEM
#20DYNAMIC MEMORY MANAGEMENT APPARATUS AND METHOD FOR ALLOCATING/DEALLOCATING DYNAMIC MEMORY USING THE SAME
#21SYSTEM AND METHOD FOR MANAGING SECURE MEMORIES IN INTEGRATED CIRCUITS
#22PROTECTED REGIONS MANAGEMENT OF MEMORY
#23METHOD AND SYSTEM FOR BACKING UP AND MAINTAINING ELECTRONIC MEDICAL RECORDS FOR PERIODS OF TEMPORARY LOSS OF CONNECTIVITY TO AN ELECTRONIC STORAGE FACILITY
#24IDENTIFYING AND CONSENTING TO PERMISSIONS FOR WORKFLOW AND CODE EXECUTION
#25DIRECT MEMORY ACCESS CONTROLLER
#26Trusted local memory management in a virtualized GPU
#27MEMORY POOLING BETWEEN SELECTED MEMORY RESOURCES
#28Key Management in Computer Processors
#29MEMORY DEDUPLICATION FOR ENCRYPTED VIRTUAL MACHINES
#30DATA INTEGRITY PROTECTION FOR RELOCATING DATA IN A MEMORY SYSTEM
#31SYSTEMS AND METHODS OF SUPPORTING DEDUPLICATION AND COMPRESSION OF ENCRYPTED STORAGE VOLUMES
#32DATA PROCESSING APPARATUS, DATA PROCESSING METHOD, AND PROGRAM
#33Secure firewall configurations
#34MEASUREMENT COMMAND FOR MEMORY SYSTEMS
#35POINTER BASED DATA ENCRYPTION
#36LOCALLY-STORED REMOTE BLOCK DATA INTEGRITY
#37HARDWARE MECHANISM TO EXTEND MKTME PROTECTIONS TO SGX DATA OUTSIDE EPC
#38LOW COST AND LOW LATENCY LOGICAL UNIT ERASE
#39METHOD AND SYSTEM FOR SECURE BACKUP MANAGEMENT OF REMOTE COMPUTING MACHINES USING QUANTUM KEY DISTRIBUTION AND ENCRYPTED RAM
#40APPARATUSES AND METHODS FOR SECURING AN ACCESS PROTECTION SCHEME
#41End-to-end efficient encryption with security chaining
#42Transitioning Between Thread-Confined Memory Segment Views And Shared Memory Segment Views
#43SECURE ELEMENT AND ELECTRONIC DEVICE INCLUDING THE SAME
#44PROTECTION OF BINARY EXECUTABLES USING DYNAMIC ENCRYPTION TECHNIQUES
#45SENSITIVE DATA READING METHOD AND APPARATUS, ELECTRONIC DEVICE, AND STORAGE MEDIUM
#46VECTOR PROCESSOR STORAGE
#47DATA SECURITY WHEN TIERING VOLATILE AND NON-VOLATILE BYTE-ADDRESSABLE MEMORY
#48PROCESSOR EXTENSIONS TO PROTECT STACKS DURING RING TRANSITIONS
#49Secure processor for detecting and preventing exploits of software vulnerability
#50METHODS AND APPARATUS TO ESTIMATE CONSUMED MEMORY BANDWIDTH
#51End-To-End Encryption For Storage Systems Using Data Properties
#52NAND page buffer based security operations
#53Non-volatile memory write access control
#54Hardware revocation engine for temporal memory safety
#55DETECTING AND MITIGATING MEMORY ATTACKS
#56Internal storage in cloud disk to support encrypted hard drive and other stateful features
#57SYSTEM AND METHOD FOR INCREMENTAL ENCRYPTION
#58MEMORY ADDRESS PROTECTION CIRCUIT AND METHOD OF OPERATING SAME
#59PROCESSORS, METHODS, SYSTEMS, AND INSTRUCTIONS TO PROTECT SHADOW STACKS
#60BACKUPS FOR CLOUD-BASED 5G NETWORKS
#61DATA TRANSMISSION SYSTEM, VEHICLE COMPRISING THE DATA TRANSMISSION SYSTEM, DATA TRANSMISSION METHOD AND COMPUTER PROGRAM
#62DEVICE, METHOD AND SYSTEM TO SUPPLEMENT A CACHE WITH A RANDOMIZED VICTIM CACHE
#63TECHNIQUES TO MITIGATE CACHE-BASED SIDE-CHANNEL ATTACKS
#64TRANSLATION TABLE ADDRESS STORAGE CIRCUITRY
#65Method for performing access management in a memory device, associated memory device and controller thereof, and associated electronic device
#66IDENTIFYING A MOST RECENTLY PROGRAMMED PAGE DURING MEMORY DEVICE INITIALIZATION
#67MEMORY DEVICES HAVING SPECIAL MODE ACCESS
#68Memory protection with hidden inline metadata
#69MEMORY ENCRYPTION
#70SELF-CONSISTENT STRUCTURES FOR SECURE TRANSMISSION AND TEMPORARY STORAGE OF SENSITIVE DATA
#71MEMORY PROTECTION FOR VECTOR OPERATIONS
#72Program execution device
#73USING TRAP CACHE SEGMENTS TO DETECT MALICIOUS PROCESSES
#74MEMORY PROTECTION FOR GATHER-SCATTER OPERATIONS
#75SYSTEMS AND METHODS FOR SENDING A COMMAND TO A STORAGE DEVICE
#76SEMICONDUCTOR DEVICE WITH SECURE ACCESS KEY AND ASSOCIATED METHODS AND SYSTEMS
#77System and method for efficiently obtaining information stored in an address space
#78METHODS AND SYSTEMS FOR SESSION-BASED AND SECURE ACCESS CONTROL TO A DATA STORAGE SYSTEM
#79PREVENTING UNAUTHORIZED MEMORY ACCESS USING A PHYSICAL ADDRESS ACCESS PERMISSIONS TABLE
#80Data Management Method, Apparatus, and System, and Storage Medium
#81FIREWALL FOR ON-CHIP SIGNALING
#82TAG CHECKING APPARATUS AND METHOD
#83Managing Correlated Outages in a Dispersed Storage Network
#84Storage device authentication
#85INFORMATION PROCESSING SYSTEM
#86Storage encryption for a trusted execution environment
#87Address validation using signatures
#88Validating and securing non-volatile memory
#89MICRO-CONTROLLER CHIP AND ACCESS METHOD THEREOF
#90Assessing protection for storage resources
#91NAMESPACE ENCRYPTION IN NON-VOLATILE MEMORY DEVICES
#92METHOD AND APPARATUS TO SET GUEST PHYSICAL ADDRESS MAPPING ATTRIBUTES FOR TRUSTED DOMAIN
#93Toke Based Communication
#94NUCLEIC ACID BASED DATA STORAGE
#95METHOD AND SYSTEM FOR MANAGING A CACHE MEMORY
#96RECORDING A CACHE COHERENCY PROTOCOL TRACE FOR USE WITH A SEPARATE MEMORY VALUE TRACE
#97ON-DIE COMPUTER APPARATUS
#98DATA PROCESSING METHOD AND DEVICE AND STORAGE MEDIUM
#99Memory device data security based on content-addressable memory architecture
#100Storage system and method for performing and authenticating write-protection thereof
#101PROCESSOR, COMPUTER SYSTEM, AND METHOD FOR FLUSHING HIERARCHICAL CACHE STRUCTURE BASED ON A DESIGNATED KEY IDENTIFICATION CODE AND A DESIGNATED ADDRESS
#102Extended utilization area for a memory device
#103Unchangeable physical unclonable function in non-volatile memory
#104MEMORY SYSTEM AND CONTROL METHOD
#105VIRTUALIZED SYSTEM AND METHOD OF CONTROLLING ACCESS TO NONVOLATILE MEMORY DEVICE IN VIRTUALIZATION ENVIRONMENT
#106METHOD FOR LOCKING A REWRITABLE NON-VOLATILE MEMORY AND ELECTRONIC DEVICE IMPLEMENTING SAID METHOD
#107Prevention of RAM access pattern attacks via selective data movement
#108Multi-ring shared, traversable, and dynamic advanced database
#109Method of operating storage device and method of operating storage system using the same
#110MEMORY TRACKING FOR MALWARE DETECTION
#111Memory controller for RPMB-inclusive memory device, operating method thereof and electronic device including the same
#112Trusted local memory management in a virtualized GPU
#113Enforcing memory operand types using protection keys
#114ACCELERATOR FOR CONCURRENT INSERT AND LOOKUP OPERATIONS IN CUCKOO HASHING
#115Secure document storage system
#116Method for performing access management in a memory device, associated memory device and controller thereof, and associated electronic device
#117Semiconductor device with secure access key and associated methods and systems
#118FILE JOURNAL INTERFACE FOR SYNCHRONIZING CONTENT
#119PROCESS-BASED MULTI-KEY TOTAL MEMORY ENCRYPTION
#120Memory access during memory calibration
#121COMPUTING DEVICES FOR ENCRYPTION AND DECRYPTION OF DATA
#122System, Apparatus And Method For Direct Peripheral Access Of Secure Storage
#123TRANSLATION LOOKASIDE BUFFER (TLB) POISONING ATTACKS ON SECURE ENCRYPTED VIRTUALIZATION
#124System and method for logical deletion of stored data objects
#125COMPROMISE FREE CLOUD DATA ENCRYPTION AND SECURITY
#126LESS-SECURE PROCESSORS, INTEGRATED CIRCUITS, WIRELESS COMMUNICATIONS APPARATUS, METHODS FOR OPERATION THEREOF, AND METHODS FOR MANUFACTURING THEREOF
#127Hardware support for memory safety with an overflow table
#128TRANSPORT LIMITATION FOR DATA READS
#129Systems and method for flexible write- and read-access of a regulated system
#130Preventing unauthorized translated access using address signing
#131Extended utilization area for a memory device
#132SELECTIVE CACHE LINE MEMORY ENCRYPTION
#133Nucleic acid based data storage
#134Technologies for dynamic accelerator selection
#135MULTI-LEVEL INDEPENDENT SECURITY ARCHITECTURE
#136INTEGRATED CIRCUIT DEVICE, SYSTEM AND METHOD
#137Supporting secure memory intent
#138Securing data direct I/O for a secure accelerator interface
#139VIRTUALIZATION-BASED PLATFORM PROTECTION TECHNOLOGY
#140Data security classification for storage systems using security level descriptors
#141REDUCING LATENCY OF HARDWARE TRUSTED EXECUTION ENVIRONMENTS
#142Mapping container user and group IDs to host
#143Memory pooling between selected memory resources
#144Memory system having controller connectable to network via interface and storage system having memory systems having controllers connectable to network via respective interface
#145Encrypted data processing design including local buffers
#146SECURE DIRECT PEER-TO-PEER MEMORY ACCESS REQUESTS BETWEEN DEVICES
#147SYSTEM ON CHIP INCLUDING SECURE PROCESSOR AND SEMICONDUCTOR SYSTEM INCLUDING THE SAME
#148Structure and method for digital data memory card encryption
#149Secure memory system programming
#150CONTINUOUS DATA PROTECTION IN CLOUD USING STREAMS
#151METHODS FOR ENROLLING DATA IN ORDER TO VERIFY THE AUTHENTICITY OF A SECURITY DATUM OR FOR VERIFYING THE AUTHENTICITY OF A SECURITY DATUM
#152Confidential computing mechanism
#153CRYPTOGRAPHIC COMPUTING USING ENCRYPTED BASE ADDRESSES AND USED IN MULTI-TENANT ENVIRONMENTS
#154RE-DUPLICATION OF DE-DUPLICATED ENCRYPTED MEMORY
#155On-demand programmable atomic kernel loading
#156Variable write threshold storage replication sites in a distributed storage network
#157Distributed Storage System Data Management And Security
#158Shared keys for no PCBA cartridges
#159SAFE EXECUTION OF PROGRAMS THAT MAKE OUT-OF-BOUNDS REFERENCES
#160MICROCONTROLLER, COMPUTER PROGRAM PRODUCT, AND METHOD FOR ADDING AN ADDITIONAL FUNCTION TO A COMPUTER PROGRAM
#161Side-channel protection
#162Secure storage of datasets in a thread network device
#163Memory address protection circuit and method of operating same
#164ASLR bypass
#165Storing decrypted body of message and key used to encrypt and decrypt body of message
#166Secure address translation services using a permission table
#167Cryptographic isolation of memory compartments in a computing environment
#168System, a server and a method for securely storing and processing raw data from a plurality of different data sources
#169Identifying and consenting to permissions for workflow and code execution
#170Granular access control for secure memory
#171Systems and methods for managing digital rights
#172Low cost and low latency logical unit erase
#173System and method for secure movement of trusted memory regions across NUMA nodes
#174Secure document storage system
#175Circuit and method for overcoming memory bottleneck of ASIC-resistant cryptographic algorithms
#176Storage system and method for performing and authenticating write-protection thereof
#177Transitioning between thread-confined memory segment views and shared memory segment views
#178PERSISTENT STORAGE DEVICE MANAGEMENT
#179SYSTEMS AND METHODS FOR PROCESSOR VIRTUALIZATION
#180DATA STORAGE SYSTEM WITH DECENTRALIZED POLICY ANALYSIS
#181Systems and methods for malware detection
#182ANTI-COUNTERFEITING APPLICATIONS FOR ADVANCED MEMORIES
#183Providing a secure communication channel between kernel and user mode components
#184CONTENT SEARCH EXTENSION ARCHITECTURE FOR PROGRAMMABLE INTELLIGENT SEARCH MEMORY
#185Integrated circuit with asymmetric access privileges
#186Integrated circuit with asymmetric access privileges
#187ENCRYPTION INTERFACE
#188Memory protection with hidden inline metadata
#189Providing end-to-end encryption for data stored in a storage system
#190Quantum key distribution-based key exchange orchestration service
#191Host-resident translation layer validity check techniques
#192METHOD AND APPARATUS FOR RUN-TIME MEMORY ISOLATION ACROSS DIFFERENT EXECUTION REALMS
#193Device, method and system to supplement a skewed cache with a victim cache
#194Secure transient buffer management
#195INTERFACE CONTROLLER FOR COMMODITY DEVICES
#196Systems and methods for providing secure logic device authentication, update, and recovery
#197Method and apparatus for protecting a memory from a write attack
#198SYSTEM, METHOD AND APPARATUS FOR TOTAL STORAGE ENCRYPTION
#199Systems and methods for self-protecting and self-refreshing workspaces
#200System memory information protection with a controller
#201Using a trusted execution environment for a cryptographic key wrapping scheme that verifies remote device capabilities
#202Electronic apparatus for time series data management, and method and storage medium
#203Peripheral component interconnect express protection controller
#204Block or page lock features in serial interface memory
#205Host-resident translation layer validity check
#206ELECTRONIC DEVICE
#207Vector processor storage
#208Nucleic acid based data storage
#209MICROPROCESSOR PIPELINE CIRCUITRY TO SUPPORT CRYPTOGRAPHIC COMPUTING
#210BLOCK DEVICE INTERFACE USING NON-VOLATILE PINNED MEMORY
#211Secure erasure of a drive array using drive-defined, trusted computing group bands
#212Address validation using signatures
#213Dynamically managing protection groups
#214Semiconductor device with secure access key and associated methods and systems
#215On-demand programmable atomic kernel loading
#216Prioritized security
#217System and method for multiparty secure computing platform
#218LOOKUP CIRCUITRY FOR SECURE AND NON-SECURE STORAGE
#219SYSTEMS AND METHODS FOR ENCRYPTED BROWSER CACHE
#220Memory management apparatus and method for managing different page tables for different privilege levels
#221SYSTEMS, METHODS AND APPARATUS FOR LOW LATENCY MEMORY INTEGRITY MAC FOR TRUST DOMAIN EXTENSIONS
#222Secure transient buffer management
#223TRANSITION TO AN ORGANIZATION DIRECTORY
#224Systems and method for flexible write- and read-access of a regulated system
#225Method for deactivating a motor vehicle, deactivation system for a motor vehicle, and motor vehicle
#226CABLE-LOCK UNIT PRESENCE IN COMPUTING SYSTEMS
#227Prevention of RAM access pattern attacks via selective data movement
#228Virtual splitting of memories
#229Hacking-Resistant Computer Design
#230System, apparatus and method for page granular, software controlled multiple key memory encryption
#231Techniques for metadata processing
#232METHOD AND SYSTEM FOR IMPROVING EFFICIENCY OF PROTECTING MULTI-CONTENT PROCESS
#233SYSTEM FOR ADDRESS MAPPING AND TRANSLATION PROTECTION
#234Accelerating method of snapshot investigation for rollback from ransomware
#235SHARING MEMORY AND I/O SERVICES BETWEEN NODES
#236Diversifying a base symmetric key based on a public key
#237Apparatuses, methods, and systems for instructions to compartmentalize code
#238Data storage apparatus and method, and readable storage medium
#239Method and apparatus for securing memory modules
#240Protected regions management of memory
#241PUF METHOD AND STRUCTURE
#242SYSTEM AND METHOD FOR MULTIPARTY SECURE COMPUTING PLATFORM
#243Fast and versatile multicore SoC secure boot method
#244Processors, methods, systems, and instructions to support live migration of protected containers
#245Memory pooling between selected memory resources
#246Systems and methods for policy execution processing
#247Memory system and control method
#248Secure document storage system
#249Modifying encryption in a storage system
#250Expansion Joint Seal with Positioned Load Transfer Member
#251Processor extensions to protect stacks during ring transitions
#252SECURING A MEMORY DEVICE
#253Managing user authorizations for blockchain-based custom clearance services
#254Extended utilization area for a memory device
#255Cryptography module and method for operating same
#256Enhanced protection of processors from a buffer overflow attack
#257Systems and methods for random fill caching and prefetching for secure cache memories
#258Method of encrypting data in nonvolatile memory device, nonvolatile memory device and user device
#259Systems and methods for use in segregating data blocks to distributed storage
#260Method and device for managing storage system
#261Data protection in computer processors
#262Memory scanning methods and apparatus
#263Systems and methods for protecting cache and main-memory from flush-based attacks
#264Secure firewall configurations
#265Asynchronous management of unencrypted memory page list of a virtual machine
#266Methods and apparatus for encrypting camera media
#267System and method of migrating one or more storage class memories from a first information handling system to a second information handling system
#268Systems and methods for preventing side-channel attacks
#269Ethernet-attached SSD for automotive applications
#270Memory access control
#271Account access recovery system, method and apparatus
#272Controlling memory accesses using a tag-guarded memory access operation
#273Secure asset management system
#274PLATFORM DATA AGING FOR ADAPTIVE MEMORY SCALING
#275Storage system communication
#276Ransomware detection and prevention
#277Memory protection unit using memory protection table stored in memory system
#278Technologies for managing a flexible host interface of a network interface controller
#279Memory data security
#280Parameter signature for realm security configuration parameters
#281SHARING MEMORY AND I/O SERVICES BETWEEN NODES
#282Key management in computer processors
#283Technologies for providing streamlined provisioning of accelerated functions in a disaggregated architecture
#284Semiconductor device with secure access key and associated methods and systems
#285Apparatuses and methods for securing an access protection scheme
#286Systems and methods for securing protected items in memory
#287NVDIMM security with physically unclonable functions
#288Data transmission method and apparatus in tee systems
#289Providing a secure communication channel between kernel and user mode components
#290Host side caching security for flash memory
#291Memory devices having special mode access
#292Method for determining data tampering and electronic device for supporting the same
#293Single input graphical user interface control element and method
#294SAFE OPERATION METHOD AND SYSTEM FOR STORAGE DATA
#295Multi-ring shared, traversable, and dynamic advanced database
#296GPU VIRTUALISATION
#297Sharing of data among containers running on virtualized operating systems
#298Device, system, and method of determining memory requirements and tracking memory usage
#299Supporting secure memory intent
#300Electronic device for protecting application from abnormal environment and operating method thereof