Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity; Indexing scheme relating to and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity Dual mode as a secondary aspect
SYSTEM AND METHOD FOR PROVIDING A TRUSTLESS TRADING ENGINE FOR TRADING PLATFORMS
#2Secure Start System for an Autonomous Vehicle
#3APPLICATION MONITORING PRIORITIZATION
#4SYSTEM AND METHOD OF ASSIGNING REPUTATION SCORES TO HOSTS
#5METHOD, DEVICE AND COMPUTER PROGRAM PRODUCT FOR GENERATING NEURAL NETWORK MODEL
#6Set of Servers for "Machine-to-Machine" Communications Using Public Key Infrastructure
#7System and Method for Remotely Initiating Lost Mode On A Computing Device
#8ROUND TRIP TIME (RTT) MEASUREMENT BASED UPON SEQUENCE NUMBER
#9Secure Authentication
#10SECURE CREDENTIALS CONTROL METHOD
#11METHOD, DEVICE, AND COMPUTER PROGRAM PRODUCT FOR EXECUTING COMPUTER PROGRAMS
#12INFORMATION PROCESSING DEVICE, APPLICATION SOFTWARE START-UP SYSTEM, AND APPLICATION SOFTWARE START-UP METHOD
#13POLICY UTILIZATION ANALYSIS
#14Key Derivation for a Module Using an Embedded Universal Integrated Circuit Card
#15Method and system for preventing unauthorized processor mode switches
#16System and Method for Diagnosing a Computing Device in Safe Mode
#17UNIQUE ID GENERATION FOR SENSORS
#18Advanced gaming and virtual reality control using radar
#19MOBILE DEVICE WITH SECURE PRIVATE MEMORY
#20Systems and methods for “machine-to-machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)
#21DATA PROCESSING METHOD, HOST, AND APPARATUS
#22Technologies for managing compromised sensors in virtualized environments
#23PLACING A DEVICE IN SECURE MODE
#24LESS-SECURE PROCESSORS, INTEGRATED CIRCUITS, WIRELESS COMMUNICATIONS APPARATUS, METHODS FOR OPERATION THEREOF, AND METHODS FOR MANUFACTURING THEREOF
#25Round trip time (RTT) measurement based upon sequence number
#26SYSTEM AND METHOD FOR NETWORK POLICY SIMULATION
#27METHOD AND DEVICE FOR OPERATING A COMPUTING DEVICE
#28Information processing device, application software start-up system, and application software start-up method
#29Application monitoring prioritization
#30System and method of detecting whether a source of a packet flow transmits packets which bypass an operating system stack
#31ACCESS MONITORING OF MOBILE DEVICE IN POSSESSION BY UNAUTHORIZED USER
#32METHOD, SYSTEM AND APPARATUS FOR PRIVACY ENHANCEMENT MODE FOR INTEGRATED CAMERAS
#33Setting and terminating restricted mode operation on electronic devices
#34System of enclaves
#35Methods and systems for managing access of an application
#36IDENTIFYING BOGON ADDRESS SPACES
#37Systems and methods for “machine-to-machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)
#38DATA CENTER TRAFFIC ANALYTICS SYNCHRONIZATION
#39SYSTEM AND METHOD FOR USER OPTIMIZED APPLICATION DEPENDENCY MAPPING
#40Temporary removal of software programs to secure mobile device
#41Mobile device with secure private memory
#42Gesture recognition using multiple antenna
#43Gesture recognition using multiple antenna
#44Fine-motion virtual-reality or augmented-reality control using radar
#45Technologies for annotating process and user information for network flows
#46Gesture recognition using multiple antenna
#47AUTO UPDATE OF SENSOR CONFIGURATION
#48System and method of assigning reputation scores to hosts
#49Key derivation for a module using an embedded universal integrated circuit card
#50User-customizable machine-learning in radar-based gesture detection
#51Mask aware biometric identification system
#52Secure device sharing
#53Step-Up Authentication
#54Method and system for preventing unauthorized processor mode switches
#55Round trip time (RTT) measurement based upon sequence number
#56Set of servers for “machine-to-machine” communications using public key infrastructure
#57MDL-based clustering for dependency mapping
#58Secure credentials control method
#59Technologies for annotating process and user information for network flows
#60Technologies for annotating process and user information for network flows
#61Policy utilization analysis
#62Secure start system for an autonomous vehicle
#63Advanced gaming and virtual reality control using radar
#64Methods, systems, and devices for secure payment and providing multimedia at fuel dispensers
#65Data input method and apparatus and user equipment
#66Step-up authentication
#67Information processing device, application software start-up system, and application software start-up method
#68Gesture recognition using multiple antenna
#69System of enclaves
#70Collecting and processing contextual attributes on a host
#71Unique ID generation for sensors
#72Hierarchichal sharding of flows from sensors to collectors
#73Context-dependent authentication system, method and device
#74Anomaly detection through header field entropy
#75Electric device and control method thereof
#76Synthetic data for determining health of a network security system
#77Key derivation for a module using an embedded universal integrated circuit card
#78Application-based signal processing parameters in radar-based detection
#79Application monitoring prioritization
#80Trusted execution of an executable object on a local device
#81Secure device sharing
#82Operating system integrated domain management
#83System and method of detecting hidden processes by analyzing packet flows
#84Set of servers for “machine-to-machine” communications using public key infrastructure
#85Data center traffic analytics synchronization
#86Computing device with environment aware features
#87Input to locked computing device
#88Secure computing device
#89Identifying bogon address spaces
#90Server-client determination
#91Technologies for managing compromised sensors in virtualized environments
#92Device unit suitable for operation in a protected and/or open operating state and associated method
#93Fine-motion virtual-reality or augmented-reality control using radar
#94Less-secure processors, integrated circuits, wireless communications apparatus, methods for operation thereof, and methods for manufacturing thereof
#95Domain-authenticated control of platform resources
#96System and method of detecting whether a source of a packet flow transmits packets which bypass an operating system stack
#97Methods and apparatus for identifying and removing malicious applications
#98Secure authentication
#99Methods, systems, and devices for secure payment and providing multimedia at fuel dispensers
#100Systems and methods for “Machine-to-Machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)
#101Application with multiple operation modes
#102Countermeasures to frequency alteration attacks on ring oscillator based physical unclonable functions
#103TwinBoards mobile computing system
#104Information processing device, application software start-up system, and application software start-up method
#105Round trip time (RTT) measurement based upon sequence number
#106Radar-enabled sensor fusion
#107MDL-based clustering for dependency mapping
#108Method and system for preventing unauthorized processor mode switches
#109Extended context delivery for context-based authorization
#110Computing device with environment aware features
#111Determining a reputation of a network entity
#112Gesture component with gesture library
#113Advanced authentication techniques and applications
#114Hierarchichal sharding of flows from sensors to collectors
#115Clearance of bare metal resource to trusted state usable in cloud computing
#116Advanced gaming and virtual reality control using radar
#117Technologies for annotating process and user information for network flows
#118Malware inspection apparatus and malware inspection method
#119System and method of assigning reputation scores to hosts
#120Set buffer state instruction
#121Power management and security for wireless modules in “machine-to-machine” communications
#122Electronic apparatus and unlocking method thereof
#123Key derivation for a module using an embedded universal integrated circuit card
#124Secure PKI communications for “machine-to-machine” modules, including key derivation by modules and authenticating public keys
#125Verifying a user's identity based on adaptive identity assurance levels
#126Operating environment partitioning for securing group communication device resources
#127System and method for enabling and disabling of baseboard management controller configuration lockdown
#128Guest operating system physical memory page protection using hypervisor
#129Secure type-enforced actions
#130COMPUTER IMPLEMENTED METHOD
#131Method and system for preventing unauthorized processor mode switches
#132Mobile application management
#133Data input method and apparatus and user equipment
#134HOST FOR CONTROLLING NON-VOLATILE MEMORY CARD, SYSTEM INCLUDING THE SAME, AND METHODS OPERATING THE HOST AND THE SYSTEM
#135Method and system for isolating application data access
#136System and method for diagnosing a computing device in safe mode
#137Secure mode state data access tracking
#138Mobile terminal and operating method therefor
#139Secure credentials control method
#140Information processing apparatus that sets the number of times of password re-entry and prompts user to perform password re-entry at set number of times
#141Systems and methods for “machine-to-machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)
#142TECHNOLOGIES FOR AUTHENTICATING A USER OF A COMPUTING DEVICE BASED ON AUTHENTICATION CONTEXT STATE
#143Robust filters for social networking environments
#144Secure start system for an autonomous vehicle
#145Verification of service access in a communications system
#146Computing device with environment aware features
#147System and method to cause an obfuscated non-functional device to transition to a starting functional state using a specified number of cycles
#148METHOD AND APPAPRATUS FOR CONTROLLING ELECTRONIC DEVICE, AND ELECTRODE DEVICE
#149TEMPORALLY ISOLATING DATA ACCESSED BY A COMPUTING DEVICE
#150Setting and terminating restricted mode operation on electronic devices
#151Intelligent database control systems with automated request assessments
#152Techniques for determining network topologies
#153Secure PKI communications for “machine-to-machine” modules, including key derivation by modules and authenticating public keys
#154Set of servers for “machine-to-machine” communications using public key infrastructure
#155Power management and security for wireless modules in “machine-to-machine” communications
#156Device for operating a camera in a private mode and a non-private mode
#157In-band peripheral authentication
#158Adaptive sleep delay
#159Method and apparatus for protecting digital content using device authentication
#160Method and system for creating adaptive user interfaces using user provided and controlled data
#161Addressing a trusted execution environment using signing key
#162Electronic device and method of controlling same
#163Proximity-based accidental lock screen command prevention for mobile communication terminal
#164Collecting and processing contextual attributes on a host
#165Collecting and storing threat level indicators for service rule processing
#166Collecting and processing contextual attributes on a host
#167Data verification method
#168System of enclaves
#169Mobile application management
#170Methods, systems, and devices for secure payment and providing multimedia at fuel dispensers
#171ON-DEMAND DATABASE SERVICE SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR CONDITIONALLY ALLOWING AN APPLICATION OF AN ENTITY ACCESS TO DATA OF ANOTHER ENTITY
#172Method for entering operating system desktop and mobile intelligent terminal
#173Data processing system capable of securing files
#174User authentication method and system for implementing the same
#175Key derivation for a module using an embedded universal integrated circuit card
#176USB stack isolation for enhanced security
#177Apparatus and method for preventing file access by nodes of a protected system
#178Apparatus, system and method of waking up a computing device based on detected presence of an NFC device
#179Method and device for enhancing the protection of a signal, in particular a multimedia signal, against a malicious attack
#180METHOD AND APPARATUS FOR SELECTIVELY ENABLING A MICROPROCESSOR-BASED SYSTEM
#181Power management and security for wireless modules in “machine-to-machine” communications
#182Operating method for one-time password with updatable seed
#183System on chip to perform a secure boot, an image forming apparatus using the same, and method thereof
#184Methods and apparatus for identifying and removing malicious applications
#185Systems and methods for “machine-to-machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)
#186Content protection via online servers and code execution in a secure operating system
#187Surveillance method for a mobile telecommunications terminal
#188Control mechanisms for data processing devices
#189Context-dependent authentication system, method and device
#190Technique for secure data loading to a system component
#191Systems and Methods for Universal Imaging Components
#192Detecting program evasion of virtual machines or emulators
#193Method and apparatus for accessing secured electronic data off-line
#194Information processing device, application software start-up system, and application software start-up method
#195Dynamic application hiding
#196Data processing system with secure key generation
#197Trusted execution of an executable object on a local device
#198System and method to cause an obfuscated non-functional device to transition to a starting functional state using a specified number of cycles
#199Generate a communication graph using an application dependency mapping (ADM) pipeline
#200Computing device with environment aware features
#201Maintaining secure data isolated from non-secure access when switching between domains
#202Method and system for preventing unauthorized processor mode switches
#203METHOD AND DEVICE FOR PROTECTING A COMPUTING APPARATUS AGAINST MANIPULATION
#204Data storage apparatus, coding unit, systems including the same, method of coding and method of reading data
#205Adapting a mobile application to a partitioned environment
#206Detection of malicious thread suspension
#207Conditional policies
#208Determining a reputation of a network entity
#209Application monitoring prioritization
#210System and method of detecting whether a source of a packet flow transmits packets which bypass an operating system stack
#211Technologies for managing compromised sensors in virtualized environments
#212System and method of assigning reputation scores to hosts
#213Anomaly detection through header field entropy
#214System and method of detecting hidden processes by analyzing packet flows
#215Synthetic data for determining health of a network security system
#216Intra-datacenter attack detection
#217Augmenting flow data for improved network monitoring and management
#218Round trip time (RTT) measurement based upon sequence number
#219Late data detection in data center
#220System and method of spoof detection
#221Hierarchichal sharding of flows from sensors to collectors
#222Optimizations for application dependency mapping
#223High availability of collectors of traffic reported by network sensors
#224Identifying bogon address spaces
#225System and method of detecting packet loss in a distributed sensor-collector architecture
#226MDL-based clustering for application dependency mapping
#227Technologies for determining sensor deployment characteristics
#228Creating classifiers for servers and clients in a network
#229Cluster discovery via multi-domain fusion for application dependency mapping
#230System and method for network information mapping and displaying
#231System and method for user optimized application dependency mapping
#232Policy utilization analysis
#233Auto update of sensor configuration
#234Unique ID generation for sensors
#235Techniques for determining network anomalies in data center networks
#236Limited-access functionality accessible at login screen
#237System and method of determining malicious processes
#238Methods for configuring security restrictions of a data processing system
#239Technologies for annotating process and user information for network flows
#240Systems and methods for exporting diagnostic data and securing privileges in a service operating system
#241Protecting anti-malware processes
#242Information processing device and assignment method for input device
#243Protection of registers against unilateral disturbances
#244Host, system, and methods for transmitting commands to non-volatile memory card
#245Volatile memory access mode in an electronic terminal for protecting application files from file operations
#246Image-based unlock functionality on a computing device
#247Method and device for controlling usability of a communication device
#248Power management and security for wireless modules in “machine-to-machine” communications
#249Method for realizing bluetooth-binding between smart key device and mobile device
#250Key derivation for a module using an embedded universal integrated circuit card
#251System, method and database proxy server for separating operations of read and write
#252Setting and terminating restricted mode operation on electronic devices
#253Mechanism for enforcing user-specific and device-specific security constraints in an isolated execution environment on a device
#254Set buffer state instruction
#255Methods, apparatus, and systems for secure demand paging and other paging operations for processor devices
#256System for efficient recovery of node-B buffered data following MAC layer reset
#257On-demand database service system, method and computer program product for conditionally allowing an application of an entity access to data of another entity
#258Operating system integrated domain management
#259Technologies for authenticating a user of a computing device based on authentication context state
#260Technologies for authenticating a user of a computing device based on authentication context state
#261Option read-only memory use
#262Application with multiple operation modes
#263Secure PKI communications for “machine-to-machine” modules, including key derivation by modules and authenticating public keys
#264Methods and systems for protecting data in USB systems
#265Method for communicating medical data
#266Systems and methods for “machine-to-machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)
#267Stateful services on stateless clustered edge
#268Verifying a user's identity based on adaptive identity assurance levels
#269In-band peripheral authentication
#270Policy application for multi-identity apps
#271Systems and methods for providing trusted service management services
#272Allowing varied device access based on different levels of unlocking mechanisms
#273Mobile station comprising security resources with different security levels
#274Data processing apparatus and method for protecting secure data and program code from non-secure access when switching between secure and less secure domains
#275Temporally isolating data accessed by a computing device
#276Mutually assured data sharing between distrusting parties in a network environment
#277Recovering from unexpected flash drive removal
#278Protection of memory areas
#279Less-secure processors, integrated circuits, wireless communications apparatus, methods and processes of making
#280Propagating authentication between terminals
#281Apparatus and method for managing application in wireless terminal
#282Method and apparatus for protecting digital content using device authentication
#283Secure application development and execution
#284Secure reservation mode for logical unit numbers and persistent reservations
#285Method and apparatus for differentiated access control
#286Method for operating a control unit
#287Interpreting I/O operation requests from pageable guests without host intervention
#288System and device for verifying the integrity of a system from its subcomponents
#289Apparatus and method for displaying computer health index
#290Robust filters for social networking environments
#291Set of servers for “machine-to-machine” communications using public key infrastructure
#292Method and apparatus for inputting data
#293System and method of data cognition incorporating autonomous security protection
#294Biometric authentication
#295Directional touch unlocking for electronic devices
#296Method for processing URL and associated server and non-transitory computer readable storage medium
#297Physical key secure peripheral interconnection
#298Dividing a data processing device into separate security domains
#299Method and device for altering a unified extensible firmware interface (UEFI) secure boot process in a computing device
#300Hardware-assisted integrity monitor