G06F2221/2105 - CPC Classification

Classification description:

Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity; Indexing scheme relating to and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity Dual mode as a secondary aspect

Recent Application in this class:
#1
20240249353
2024-07-25

SYSTEM AND METHOD FOR PROVIDING A TRUSTLESS TRADING ENGINE FOR TRADING PLATFORMS

#2
20240220275
2024-07-04

Secure Start System for an Autonomous Vehicle

#3
20240214285
2024-06-27

APPLICATION MONITORING PRIORITIZATION

#4
20240205118
2024-06-20

SYSTEM AND METHOD OF ASSIGNING REPUTATION SCORES TO HOSTS

#5
20240202316
2024-06-20

METHOD, DEVICE AND COMPUTER PROGRAM PRODUCT FOR GENERATING NEURAL NETWORK MODEL

#6
20240178996
2024-05-30

Set of Servers for "Machine-to-Machine" Communications Using Public Key Infrastructure

#7
20240176918
2024-05-30

System and Method for Remotely Initiating Lost Mode On A Computing Device

#8
20240163188
2024-05-16

ROUND TRIP TIME (RTT) MEASUREMENT BASED UPON SEQUENCE NUMBER

#9
20240134954
2024-04-25

Secure Authentication

#10
20240104227
2024-03-28

SECURE CREDENTIALS CONTROL METHOD

#11
20240095339
2024-03-21

METHOD, DEVICE, AND COMPUTER PROGRAM PRODUCT FOR EXECUTING COMPUTER PROGRAMS

#12
20240086514
2024-03-14

INFORMATION PROCESSING DEVICE, APPLICATION SOFTWARE START-UP SYSTEM, AND APPLICATION SOFTWARE START-UP METHOD

#13
20240015084
2024-01-11

POLICY UTILIZATION ANALYSIS

#14
20230379148
2023-11-23

Key Derivation for a Module Using an Embedded Universal Integrated Circuit Card

#15
20230342502
2023-10-26

Method and system for preventing unauthorized processor mode switches

#16
20230315620
2023-10-05

System and Method for Diagnosing a Computing Device in Safe Mode

#17
20230300044
2023-09-21

UNIQUE ID GENERATION FOR SENSORS

#18
20230273298
2023-08-31

Advanced gaming and virtual reality control using radar

#19
20230229760
2023-07-20

MOBILE DEVICE WITH SECURE PRIVATE MEMORY

#20
20230208629
2023-06-29

Systems and methods for “machine-to-machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)

#21
20230185901
2023-06-15

DATA PROCESSING METHOD, HOST, AND APPARATUS

#22
20230123258
2023-04-20

Technologies for managing compromised sensors in virtualized environments

#23
20230109011
2023-04-06

PLACING A DEVICE IN SECURE MODE

#24
20230084049
2023-03-16

LESS-SECURE PROCESSORS, INTEGRATED CIRCUITS, WIRELESS COMMUNICATIONS APPARATUS, METHODS FOR OPERATION THEREOF, AND METHODS FOR MANUFACTURING THEREOF

#25
20230079606
2023-03-16

Round trip time (RTT) measurement based upon sequence number

#26
20230040556
2023-02-09

SYSTEM AND METHOD FOR NETWORK POLICY SIMULATION

#27
20230021594
2023-01-26

METHOD AND DEVICE FOR OPERATING A COMPUTING DEVICE

#28
20230019756
2023-01-19

Information processing device, application software start-up system, and application software start-up method

#29
20230014842
2023-01-19

Application monitoring prioritization

#30
20220407787
2022-12-22

System and method of detecting whether a source of a packet flow transmits packets which bypass an operating system stack

#31
20220350881
2022-11-03

ACCESS MONITORING OF MOBILE DEVICE IN POSSESSION BY UNAUTHORIZED USER

#32
20220321771
2022-10-06

METHOD, SYSTEM AND APPARATUS FOR PRIVACY ENHANCEMENT MODE FOR INTEGRATED CAMERAS

#33
20220261460
2022-08-18

Setting and terminating restricted mode operation on electronic devices

#34
20220215112
2022-07-07

System of enclaves

#35
20220188406
2022-06-16

Methods and systems for managing access of an application

#36
20220141103
2022-05-05

IDENTIFYING BOGON ADDRESS SPACES

#37
20220141010
2022-05-05

Systems and methods for “machine-to-machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)

#38
20220131773
2022-04-28

DATA CENTER TRAFFIC ANALYTICS SYNCHRONIZATION

#39
20220116292
2022-04-14

SYSTEM AND METHOD FOR USER OPTIMIZED APPLICATION DEPENDENCY MAPPING

#40
20220075867
2022-03-10

Temporary removal of software programs to secure mobile device

#41
20220075866
2022-03-10

Mobile device with secure private memory

#42
20220066568
2022-03-03

Gesture recognition using multiple antenna

#43
20220066567
2022-03-03

Gesture recognition using multiple antenna

#44
20220043519
2022-02-10

Fine-motion virtual-reality or augmented-reality control using radar

#45
20220038353
2022-02-03

Technologies for annotating process and user information for network flows

#46
20220019291
2022-01-20

Gesture recognition using multiple antenna

#47
20210392059
2021-12-16

AUTO UPDATE OF SENSOR CONFIGURATION

#48
20210377136
2021-12-02

System and method of assigning reputation scores to hosts

#49
20210351923
2021-11-11

Key derivation for a module using an embedded universal integrated circuit card

#50
20210326642
2021-10-21

User-customizable machine-learning in radar-based gesture detection

#51
20210326579
2021-10-21

Mask aware biometric identification system

#52
20210326418
2021-10-21

Secure device sharing

#53
20210286870
2021-09-16

Step-Up Authentication

#54
20210256166
2021-08-19

Method and system for preventing unauthorized processor mode switches

#55
20210243093
2021-08-05

Round trip time (RTT) measurement based upon sequence number

#56
20210184846
2021-06-17

Set of servers for “machine-to-machine” communications using public key infrastructure

#57
20210176145
2021-06-10

MDL-based clustering for dependency mapping

#58
20210165893
2021-06-03

Secure credentials control method

#59
20210160157
2021-05-27

Technologies for annotating process and user information for network flows

#60
20210152443
2021-05-20

Technologies for annotating process and user information for network flows

#61
20210144073
2021-05-13

Policy utilization analysis

#62
20210132955
2021-05-06

Secure start system for an autonomous vehicle

#63
20210096653
2021-04-01

Advanced gaming and virtual reality control using radar

#64
20210049857
2021-02-18

Methods, systems, and devices for secure payment and providing multimedia at fuel dispensers

#65
20210049286
2021-02-18

Data input method and apparatus and user equipment

#66
20210004451
2021-01-07

Step-up authentication

#67
20200394293
2020-12-17

Information processing device, application software start-up system, and application software start-up method

#68
20200393912
2020-12-17

Gesture recognition using multiple antenna

#69
20200372166
2020-11-26

System of enclaves

#70
20200364074
2020-11-19

Collecting and processing contextual attributes on a host

#71
20200358676
2020-11-12

Unique ID generation for sensors

#72
20200351184
2020-11-05

Hierarchichal sharding of flows from sensors to collectors

#73
20200327458
2020-10-15

Context-dependent authentication system, method and device

#74
20200313986
2020-10-01

Anomaly detection through header field entropy

#75
20200311236
2020-10-01

Electric device and control method thereof

#76
20200304390
2020-09-24

Synthetic data for determining health of a network security system

#77
20200280439
2020-09-03

Key derivation for a module using an embedded universal integrated circuit card

#78
20200278422
2020-09-03

Application-based signal processing parameters in radar-based detection

#79
20200267066
2020-08-20

Application monitoring prioritization

#80
20200257795
2020-08-13

Trusted execution of an executable object on a local device

#81
20200257779
2020-08-13

Secure device sharing

#82
20200244637
2020-07-30

Operating system integrated domain management

#83
20200244554
2020-07-30

System and method of detecting hidden processes by analyzing packet flows

#84
20200235923
2020-07-23

Set of servers for “machine-to-machine” communications using public key infrastructure

#85
20200228426
2020-07-16

Data center traffic analytics synchronization

#86
20200221303
2020-07-09

Computing device with environment aware features

#87
20200202019
2020-06-25

Input to locked computing device

#88
20200167507
2020-05-28

Secure computing device

#89
20200136940
2020-04-30

Identifying bogon address spaces

#90
20200112494
2020-04-09

Server-client determination

#91
20200112493
2020-04-09

Technologies for managing compromised sensors in virtualized environments

#92
20200089890
2020-03-19

Device unit suitable for operation in a protected and/or open operating state and associated method

#93
20200089314
2020-03-19

Fine-motion virtual-reality or augmented-reality control using radar

#94
20200081846
2020-03-12

Less-secure processors, integrated circuits, wireless communications apparatus, methods for operation thereof, and methods for manufacturing thereof

#95
20200065496
2020-02-27

Domain-authenticated control of platform resources

#96
20200052984
2020-02-13

System and method of detecting whether a source of a packet flow transmits packets which bypass an operating system stack

#97
20200050765
2020-02-13

Methods and apparatus for identifying and removing malicious applications

#98
20200050749
2020-02-13

Secure authentication

#99
20200043275
2020-02-06

Methods, systems, and devices for secure payment and providing multimedia at fuel dispensers

#100
20200036521
2020-01-30

Systems and methods for “Machine-to-Machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)

#101
20200007557
2020-01-02

Application with multiple operation modes

#102
20190384915
2019-12-19

Countermeasures to frequency alteration attacks on ring oscillator based physical unclonable functions

#103
20190370466
2019-12-05

TwinBoards mobile computing system

#104
20190362061
2019-11-28

Information processing device, application software start-up system, and application software start-up method

#105
20190334790
2019-10-31

Round trip time (RTT) measurement based upon sequence number

#106
20190321719
2019-10-24

Radar-enabled sensor fusion

#107
20190306035
2019-10-03

MDL-based clustering for dependency mapping

#108
20190303625
2019-10-03

Method and system for preventing unauthorized processor mode switches

#109
20190266004
2019-08-29

Extended context delivery for context-based authorization

#110
20190261183
2019-08-22

Computing device with environment aware features

#111
20190260653
2019-08-22

Determining a reputation of a network entity

#112
20190257939
2019-08-22

Gesture component with gesture library

#113
20190253404
2019-08-15

Advanced authentication techniques and applications

#114
20190253330
2019-08-15

Hierarchichal sharding of flows from sensors to collectors

#115
20190251266
2019-08-15

Clearance of bare metal resource to trusted state usable in cloud computing

#116
20190232156
2019-08-01

Advanced gaming and virtual reality control using radar

#117
20190215253
2019-07-11

Technologies for annotating process and user information for network flows

#118
20190207952
2019-07-04

Malware inspection apparatus and malware inspection method

#119
20190182132
2019-06-13

System and method of assigning reputation scores to hosts

#120
20190179780
2019-06-13

Set buffer state instruction

#121
20190173673
2019-06-06

Power management and security for wireless modules in “machine-to-machine” communications

#122
20190171808
2019-06-06

Electronic apparatus and unlocking method thereof

#123
20190097794
2019-03-28

Key derivation for a module using an embedded universal integrated circuit card

#124
20190097793
2019-03-28

Secure PKI communications for “machine-to-machine” modules, including key derivation by modules and authenticating public keys

#125
20190080064
2019-03-14

Verifying a user's identity based on adaptive identity assurance levels

#126
20190075085
2019-03-07

Operating environment partitioning for securing group communication device resources

#127
20190065786
2019-02-28

System and method for enabling and disabling of baseboard management controller configuration lockdown

#128
20190056968
2019-02-21

Guest operating system physical memory page protection using hypervisor

#129
20190044939
2019-02-07

Secure type-enforced actions

#130
20190034603
2019-01-31

COMPUTER IMPLEMENTED METHOD

#131
20190026500
2019-01-24

Method and system for preventing unauthorized processor mode switches

#132
20190026464
2019-01-24

Mobile application management

#133
20190018969
2019-01-17

Data input method and apparatus and user equipment

#134
20190018615
2019-01-17

HOST FOR CONTROLLING NON-VOLATILE MEMORY CARD, SYSTEM INCLUDING THE SAME, AND METHODS OPERATING THE HOST AND THE SYSTEM

#135
20190005260
2019-01-03

Method and system for isolating application data access

#136
20190004935
2019-01-03

System and method for diagnosing a computing device in safe mode

#137
20180373898
2018-12-27

Secure mode state data access tracking

#138
20180365477
2018-12-20

Mobile terminal and operating method therefor

#139
20180357430
2018-12-13

Secure credentials control method

#140
20180349596
2018-12-06

Information processing apparatus that sets the number of times of password re-entry and prompts user to perform password re-entry at set number of times

#141
20180343117
2018-11-29

Systems and methods for “machine-to-machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)

#142
20180341756
2018-11-29

TECHNOLOGIES FOR AUTHENTICATING A USER OF A COMPUTING DEVICE BASED ON AUTHENTICATION CONTEXT STATE

#143
20180341711
2018-11-29

Robust filters for social networking environments

#144
20180336040
2018-11-22

Secure start system for an autonomous vehicle

#145
20180322312
2018-11-08

Verification of service access in a communications system

#146
20180310180
2018-10-25

Computing device with environment aware features

#147
20180307827
2018-10-25

System and method to cause an obfuscated non-functional device to transition to a starting functional state using a specified number of cycles

#148
20180300466
2018-10-18

METHOD AND APPAPRATUS FOR CONTROLLING ELECTRONIC DEVICE, AND ELECTRODE DEVICE

#149
20180285578
2018-10-04

TEMPORALLY ISOLATING DATA ACCESSED BY A COMPUTING DEVICE

#150
20180276353
2018-09-27

Setting and terminating restricted mode operation on electronic devices

#151
20180276218
2018-09-27

Intelligent database control systems with automated request assessments

#152
20180270129
2018-09-20

Techniques for determining network topologies

#153
20180270059
2018-09-20

Secure PKI communications for “machine-to-machine” modules, including key derivation by modules and authenticating public keys

#154
20180262329
2018-09-13

Set of servers for “machine-to-machine” communications using public key infrastructure

#155
20180254897
2018-09-06

Power management and security for wireless modules in “machine-to-machine” communications

#156
20180239930
2018-08-23

Device for operating a camera in a private mode and a non-private mode

#157
20180239891
2018-08-23

In-band peripheral authentication

#158
20180234923
2018-08-16

Adaptive sleep delay

#159
20180225462
2018-08-09

Method and apparatus for protecting digital content using device authentication

#160
20180225008
2018-08-09

Method and system for creating adaptive user interfaces using user provided and controlled data

#161
20180212932
2018-07-26

Addressing a trusted execution environment using signing key

#162
20180196937
2018-07-12

Electronic device and method of controlling same

#163
20180196934
2018-07-12

Proximity-based accidental lock screen command prevention for mobile communication terminal

#164
20180183764
2018-06-28

Collecting and processing contextual attributes on a host

#165
20180181763
2018-06-28

Collecting and storing threat level indicators for service rule processing

#166
20180181423
2018-06-28

Collecting and processing contextual attributes on a host

#167
20180145992
2018-05-24

Data verification method

#168
20180137299
2018-05-17

System of enclaves

#169
20180089431
2018-03-29

Mobile application management

#170
20180033234
2018-02-01

Methods, systems, and devices for secure payment and providing multimedia at fuel dispensers

#171
20180032749
2018-02-01

ON-DEMAND DATABASE SERVICE SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR CONDITIONALLY ALLOWING AN APPLICATION OF AN ENTITY ACCESS TO DATA OF ANOTHER ENTITY

#172
20180024846
2018-01-25

Method for entering operating system desktop and mobile intelligent terminal

#173
20180018475
2018-01-18

Data processing system capable of securing files

#174
20180012000
2018-01-11

User authentication method and system for implementing the same

#175
20170373845
2017-12-28

Key derivation for a module using an embedded universal integrated circuit card

#176
20170364677
2017-12-21

USB stack isolation for enhanced security

#177
20170353460
2017-12-07

Apparatus and method for preventing file access by nodes of a protected system

#178
20170332235
2017-11-16

Apparatus, system and method of waking up a computing device based on detected presence of an NFC device

#179
20170329941
2017-11-16

Method and device for enhancing the protection of a signal, in particular a multimedia signal, against a malicious attack

#180
20170323103
2017-11-09

METHOD AND APPARATUS FOR SELECTIVELY ENABLING A MICROPROCESSOR-BASED SYSTEM

#181
20170302447
2017-10-19

Power management and security for wireless modules in “machine-to-machine” communications

#182
20170289141
2017-10-05

Operating method for one-time password with updatable seed

#183
20170277897
2017-09-28

System on chip to perform a secure boot, an image forming apparatus using the same, and method thereof

#184
20170255777
2017-09-07

Methods and apparatus for identifying and removing malicious applications

#185
20170237561
2017-08-17

Systems and methods for “machine-to-machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)

#186
20170235930
2017-08-17

Content protection via online servers and code execution in a secure operating system

#187
20170223524
2017-08-03

Surveillance method for a mobile telecommunications terminal

#188
20170222815
2017-08-03

Control mechanisms for data processing devices

#189
20170178142
2017-06-22

Context-dependent authentication system, method and device

#190
20170177871
2017-06-22

Technique for secure data loading to a system component

#191
20170134610
2017-05-11

Systems and Methods for Universal Imaging Components

#192
20170132411
2017-05-11

Detecting program evasion of virtual machines or emulators

#193
20170116431
2017-04-27

Method and apparatus for accessing secured electronic data off-line

#194
20170116402
2017-04-27

Information processing device, application software start-up system, and application software start-up method

#195
20170076100
2017-03-16

Dynamic application hiding

#196
20170063546
2017-03-02

Data processing system with secure key generation

#197
20170039368
2017-02-09

Trusted execution of an executable object on a local device

#198
20170039364
2017-02-09

System and method to cause an obfuscated non-functional device to transition to a starting functional state using a specified number of cycles

#199
20170034018
2017-02-02

Generate a communication graph using an application dependency mapping (ADM) pipeline

#200
20170026841
2017-01-26

Computing device with environment aware features

#201
20170024557
2017-01-26

Maintaining secure data isolated from non-secure access when switching between domains

#202
20170017809
2017-01-19

Method and system for preventing unauthorized processor mode switches

#203
20170017794
2017-01-19

METHOD AND DEVICE FOR PROTECTING A COMPUTING APPARATUS AGAINST MANIPULATION

#204
20170017582
2017-01-19

Data storage apparatus, coding unit, systems including the same, method of coding and method of reading data

#205
20170011206
2017-01-12

Adapting a mobile application to a partitioned environment

#206
20160378979
2016-12-29

Detection of malicious thread suspension

#207
20160359913
2016-12-08

Conditional policies

#208
20160359897
2016-12-08

Determining a reputation of a network entity

#209
20160359891
2016-12-08

Application monitoring prioritization

#210
20160359890
2016-12-08

System and method of detecting whether a source of a packet flow transmits packets which bypass an operating system stack

#211
20160359889
2016-12-08

Technologies for managing compromised sensors in virtualized environments

#212
20160359888
2016-12-08

System and method of assigning reputation scores to hosts

#213
20160359881
2016-12-08

Anomaly detection through header field entropy

#214
20160359879
2016-12-08

System and method of detecting hidden processes by analyzing packet flows

#215
20160359878
2016-12-08

Synthetic data for determining health of a network security system

#216
20160359877
2016-12-08

Intra-datacenter attack detection

#217
20160359740
2016-12-08

Augmenting flow data for improved network monitoring and management

#218
20160359712
2016-12-08

Round trip time (RTT) measurement based upon sequence number

#219
20160359711
2016-12-08

Late data detection in data center

#220
20160359709
2016-12-08

System and method of spoof detection

#221
20160359708
2016-12-08

Hierarchichal sharding of flows from sensors to collectors

#222
20160359705
2016-12-08

Optimizations for application dependency mapping

#223
20160359704
2016-12-08

High availability of collectors of traffic reported by network sensors

#224
20160359699
2016-12-08

Identifying bogon address spaces

#225
20160359698
2016-12-08

System and method of detecting packet loss in a distributed sensor-collector architecture

#226
20160359697
2016-12-08

MDL-based clustering for application dependency mapping

#227
20160359696
2016-12-08

Technologies for determining sensor deployment characteristics

#228
20160359686
2016-12-08

Creating classifiers for servers and clients in a network

#229
20160359680
2016-12-08

Cluster discovery via multi-domain fusion for application dependency mapping

#230
20160359679
2016-12-08

System and method for network information mapping and displaying

#231
20160359678
2016-12-08

System and method for user optimized application dependency mapping

#232
20160359673
2016-12-08

Policy utilization analysis

#233
20160359658
2016-12-08

Auto update of sensor configuration

#234
20160359628
2016-12-08

Unique ID generation for sensors

#235
20160359592
2016-12-08

Techniques for determining network anomalies in data center networks

#236
20160357981
2016-12-08

Limited-access functionality accessible at login screen

#237
20160357957
2016-12-08

System and method of determining malicious processes

#238
20160357950
2016-12-08

Methods for configuring security restrictions of a data processing system

#239
20160357587
2016-12-08

Technologies for annotating process and user information for network flows

#240
20160350132
2016-12-01

Systems and methods for exporting diagnostic data and securing privileges in a service operating system

#241
20160342790
2016-11-24

Protecting anti-malware processes

#242
20160332082
2016-11-17

Information processing device and assignment method for input device

#243
20160308673
2016-10-20

Protection of registers against unilateral disturbances

#244
20160306594
2016-10-20

Host, system, and methods for transmitting commands to non-volatile memory card

#245
20160299716
2016-10-13

Volatile memory access mode in an electronic terminal for protecting application files from file operations

#246
20160275305
2016-09-22

Image-based unlock functionality on a computing device

#247
20160274920
2016-09-22

Method and device for controlling usability of a communication device

#248
20160270000
2016-09-15

Power management and security for wireless modules in “machine-to-machine” communications

#249
20160269103
2016-09-15

Method for realizing bluetooth-binding between smart key device and mobile device

#250
20160234020
2016-08-11

Key derivation for a module using an embedded universal integrated circuit card

#251
20160232372
2016-08-11

System, method and database proxy server for separating operations of read and write

#252
20160232336
2016-08-11

Setting and terminating restricted mode operation on electronic devices

#253
20160232335
2016-08-11

Mechanism for enforcing user-specific and device-specific security constraints in an isolated execution environment on a device

#254
20160232113
2016-08-11

Set buffer state instruction

#255
20160232105
2016-08-11

Methods, apparatus, and systems for secure demand paging and other paging operations for processor devices

#256
20160219468
2016-07-28

System for efficient recovery of node-B buffered data following MAC layer reset

#257
20160196443
2016-07-07

On-demand database service system, method and computer program product for conditionally allowing an application of an entity access to data of another entity

#258
20160196432
2016-07-07

Operating system integrated domain management

#259
20160188853
2016-06-30

Technologies for authenticating a user of a computing device based on authentication context state

#260
20160188848
2016-06-30

Technologies for authenticating a user of a computing device based on authentication context state

#261
20160188347
2016-06-30

Option read-only memory use

#262
20160182530
2016-06-23

Application with multiple operation modes

#263
20160164678
2016-06-09

Secure PKI communications for “machine-to-machine” modules, including key derivation by modules and authenticating public keys

#264
20160162419
2016-06-09

Methods and systems for protecting data in USB systems

#265
20160156599
2016-06-02

Method for communicating medical data

#266
20160149709
2016-05-26

Systems and methods for “machine-to-machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)

#267
20160142295
2016-05-19

Stateful services on stateless clustered edge

#268
20160125199
2016-05-05

Verifying a user's identity based on adaptive identity assurance levels

#269
20160098554
2016-04-07

In-band peripheral authentication

#270
20160088016
2016-03-24

Policy application for multi-identity apps

#271
20160087858
2016-03-24

Systems and methods for providing trusted service management services

#272
20160080393
2016-03-17

Allowing varied device access based on different levels of unlocking mechanisms

#273
20160072825
2016-03-10

Mobile station comprising security resources with different security levels

#274
20160063242
2016-03-03

Data processing apparatus and method for protecting secure data and program code from non-secure access when switching between secure and less secure domains

#275
20160048693
2016-02-18

Temporally isolating data accessed by a computing device

#276
20160044005
2016-02-11

Mutually assured data sharing between distrusting parties in a network environment

#277
20160041792
2016-02-11

Recovering from unexpected flash drive removal

#278
20160026811
2016-01-28

Protection of memory areas

#279
20160013110
2016-01-14

Less-secure processors, integrated circuits, wireless communications apparatus, methods and processes of making

#280
20160006745
2016-01-07

Propagating authentication between terminals

#281
20150381792
2015-12-31

Apparatus and method for managing application in wireless terminal

#282
20150371051
2015-12-24

Method and apparatus for protecting digital content using device authentication

#283
20150356293
2015-12-10

Secure application development and execution

#284
20150347766
2015-12-03

Secure reservation mode for logical unit numbers and persistent reservations

#285
20150339469
2015-11-26

Method and apparatus for differentiated access control

#286
20150324583
2015-11-12

Method for operating a control unit

#287
20150324214
2015-11-12

Interpreting I/O operation requests from pageable guests without host intervention

#288
20150317480
2015-11-05

System and device for verifying the integrity of a system from its subcomponents

#289
20150310216
2015-10-29

Apparatus and method for displaying computer health index

#290
20150310117
2015-10-29

Robust filters for social networking environments

#291
20150304113
2015-10-22

Set of servers for “machine-to-machine” communications using public key infrastructure

#292
20150254466
2015-09-10

Method and apparatus for inputting data

#293
20150254442
2015-09-10

System and method of data cognition incorporating autonomous security protection

#294
20150244718
2015-08-27

Biometric authentication

#295
20150242613
2015-08-27

Directional touch unlocking for electronic devices

#296
20150237107
2015-08-20

Method for processing URL and associated server and non-transitory computer readable storage medium

#297
20150227739
2015-08-13

Physical key secure peripheral interconnection

#298
20150205952
2015-07-23

Dividing a data processing device into separate security domains

#299
20150199521
2015-07-16

Method and device for altering a unified extensible firmware interface (UEFI) secure boot process in a computing device

#300
20150195302
2015-07-09

Hardware-assisted integrity monitor