Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity; Indexing scheme relating to and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity File encryption
PRIVACY-PRESERVING DATA AND PROCESS ANALYTICS
#2SYSTEM AND METHOD FOR PRIVACY POLICY ENFORCEMENT
#3SYSTEM AND METHODS FOR USING CIPHER OBJECTS TO PROTECT DATA
#4Dispersed rebuilding of encoded data slices in a storage network
#5AUTOMATIC FILE ENCRYPTION
#6FRAGMENTING DATA FOR THE PURPOSES OF PERSISTENT STORAGE ACROSS MULTIPLE IMMUTABLE DATA STRUCTURES
#7SYSTEM AND METHOD FOR SECURE DOCUMENT RETRIEVAL AND SHARING USING MULTISTAGE ENCRYPTION AND AUTHORIZATION
#8METHOD AND SYSTEM FOR VERIFYING INTEGRITY OF A DIGITAL ASSET USING A DISTRIBUTED HASH TABLE AND A PEER TO-PEER DISTRIBUTED LEDGER
#9SYSTEM AND METHODS FOR USING CIPHER OBJECTS TO PROTECT DATA
#10METHOD, SYSTEMS AND APPARATUS FOR INTELLIGENTLY EMULATING FACTORY CONTROL SYSTEMS AND SIMULATING RESPONSE DATA
#11CLOUD-BASED SCALE-UP SYSTEM COMPOSITION
#12Encrypting Data In A Storage Device
#13ARCHITECTURE HAVING A PROTECTIVE LAYER AT THE DATA SOURCE
#14METHODS AND APPARATUS TO COLLECT DISTRIBUTED USER INFORMATION FOR MEDIA IMPRESSIONS AND SEARCH TERMS
#15JAILED ENVIRONMENT RESTRICTING PROGRAMMATIC ACCESS TO MULTI-TENANT DATA
#16SELF-SERVICE LENDER PORTAL
#17REPLACING DISTINCT DATA IN A RELATIONAL DATABASE WITH A DISTINCT REFERENCE TO THAT DATA AND DISTINCT DE-REFERENCING OF DATABASE DATA
#18Set of Servers for "Machine-to-Machine" Communications Using Public Key Infrastructure
#19Distributed Computing System for Secure Document Routing
#20IMMUTABLE LOGGING OF ACCESS REQUESTS TO DISTRIBUTED FILE SYSTEMS
#21IMAGE PROCESSING APPARATUS, AND CONTROL METHOD
#22DEVICE PROGRAMMING WITH SYSTEM GENERATION
#23SYSTEM AND METHOD FOR IMPROVED WATERMARKING AND DATA TRACING
#24ARCHITECTURE HAVING A PROTECTIVE LAYER AT THE DATA SOURCE
#25HARDWARE PROTECTION OF INLINE CRYPTOGRAPHIC PROCESSOR
#26SYSTEM AND METHOD FOR SECURING DIAGNOSTIC DATA COLLECTION USING DUAL ENCRYPTION
#27SECURE ACCESS MANAGEMENT FOR TOOLS WITHIN A SECURE ENVIRONMENT
#28WATERMARKING OF GENOMIC SEQUENCING DATA
#29TOKENIZATION AND ENCRYPTION OF SENSITIVE DATA
#30SYSTEMS AND METHODS FOR MANAGING STATE
#31SYSTEMS AND METHODS FOR SELECTIVE ACCESS TO LOGS
#32Internal storage in cloud disk to support encrypted hard drive and other stateful features
#33SECURE MANAGEMENT OF CONTENT DISTRIBUTION DATA BLOCKS ON A BLOCKCHAIN
#34Recovering data from encoded data slices interspersed with auxiliary data
#35Flexible format encryption
#36SYSTEMS AND METHODS FOR SECURING AND DISSEMINATING TIME SENSITIVE INFORMATION USING A BLOCKCHAIN
#37METHOD FOR FILE ENCRYPTION, TERMINAL, ELECTRONIC DEVICE AND COMPUTER-READABLE STORAGE MEDIUM
#38Method, systems and apparatus for intelligently emulating factory control systems and simulating response data
#39APPARATUS AND METHODS FOR VERIFYING LOST USER DATA
#40USER DATA COLLECTION PRIVACY USING PROBABILISTIC DATA STRUCTURES
#41MANAGEMENT APPARATUS, CONTROL METHOD, COMPUTER READABLE MEDIUM, AND ACCESS CONTROL SYSTEM
#42Response-Hiding Searchable Encryption
#43Searchable index encryption
#44System and method for interfacing with a decisioning service from a third party domain
#45DATA STORAGE SYSTEMS AND METHODS OF AN ENFORCEABLE NON-FUNGIBLE TOKEN HAVING LINKED CUSTODIAL CHAIN OF PROPERTY TRANSFERS PRIOR TO MINTING USING A TOKEN-BASED ENCRYPTION DETERMINATION PROCESS
#46Method and System for Automatically Loading Parameters, and Client-End Server Thereof
#47UNIVERSAL DATA SCAFFOLD BASED DATA MANAGEMENT PLATFORM
#48Methods and apparatus to collect distributed user information for media impressions and search terms
#49SYSTEMS AND METHODS OF DATA TRANSFORMATION FOR DATA POOLING
#50Data Validation in a Mobile Communication Network
#51Device programming with system generation
#52Systems and methods for “machine-to-machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)
#53GENERATING HASH VALUES FOR INPUT STRINGS
#54DIRECTING QUERIES TO ENCRYPTED DATABASE FILES
#55SYSTEMS AND METHODS TO SECURE SEARCHABLE DATA HAVING PERSONALLY IDENTIFIABLE INFORMATION
#56Cloud-based scale-up system composition
#57Implementation of a file system on a block chain
#58System and method of configuring a non-volatile storage device
#59COMPUTER-IMPLEMENTED METHOD FOR REMOVING ACCESS TO DATA
#60Method, systems and apparatus for intelligently emulating factory control systems and simulating response data
#61Query analysis using a protective layer at the data source
#62Variable transport data retention and deletion
#63Behavioral baselining from a data source perspective for detection of compromised users
#64Data Privacy Enhancing Technique Selection
#65SYSTEMS AND METHODS FOR RANSOMWARE DETECTION
#66Method and system for verifying integrity of a digital asset using a distributed hash table and a peer to-peer distributed ledger
#67METHODS AND APPARATUS TO COLLECT DISTRIBUTED USER INFORMATION FOR MEDIA IMPRESSIONS AND SEARCH TERMS
#68Progressive key rotation for format preserving encryption (FPE)
#69IMMUTABLE BOOTLOADER AND FIRMWARE VALIDATOR
#70APPROACHES OF PERFORMING DATA PROCESSING WHILE MAINTAINING SECURITY OF ENCRYPTED DATA
#71Data extraction system, data extraction method, registration apparatus, and program
#72Optimizing Access Performance in a Distributed Storage Network
#73Distributed Storage System Data Management And Security
#74Online disk encryption using mirror driver
#75ENCRYPTED GROUP COMMUNICATION METHOD
#76Electronic system for dynamically permitting and restricting access to and modification of computer resources
#77Optimizing docker image encryption-tradeoff between performance and protection level
#78Switching between watches or other accessories
#79Securely provisioning a target device
#80Methods, systems, and media for protecting and verifying video files
#81Security for scene-based sensor networks, with access control
#82Replacing distinct data in a relational database with a distinct reference to that data and distinct de-referencing of database data
#83Implementation of a file system on a block chain
#84Secure management of data files using a blockchain
#85System and method for providing API version control
#86System and method for interfacing with a decisioning service from a third party domain
#87Supervisory monitoring of content consumption
#88Obfuscating a set of encoded data slices
#89SYSTEM AND METHOD FOR FACILITIES ACCESS BREACH DETECTION AND INFORMATION PROTECTION
#90Architecture having a protective layer at the data source
#91Auditable asset tracking model
#92Systems and methods for ensuring privacy in an autonomous vehicle
#93System and method for securely managing recorded video conference sessions
#94TECHNOLOGY FOR DE-IDENTIFYING AND RESTORING PERSONAL INFORMATION IN ENCRYPTION KEY-BASED IMAGE
#95Event Monitoring
#96Wireless display streaming of protected content
#97Selectively encrypting commit log entries
#98Application-specific access privileges in a file system
#99Intelligent privacy data governance system
#100Technologies for dividing work across accelerator devices
#101Trusted communications between untrusting parties
#102Methods for aggregating credit across interactions
#103Systems and methods for “machine-to-machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)
#104SECURE FILE SHARING METHOD AND SYSTEM
#105Method for setting up a secure hierarchical referencing system
#106Data storage device encryption
#107Data storage device encryption
#108Term-based encrypted retrieval privacy
#109Intelligent preprocessing routing to decisioning services
#110Authenticated and encrypted archives
#111Systems and methods for managing state
#112Resolving storage inconsistencies for a set of encoded data slices
#113Encrypting database files
#114Security chip with resistance to external monitoring attacks
#115Implementation of a file system on a block chain
#116Selectively sharing data in unstructured data containers
#117Systems and methods for securing and disseminating time sensitive information using a blockchain
#118Optimizing docker image encryption—tradeoff between performance and protection level
#119Secure Cloaking of Data
#120Federated identity management for data repositories
#121Normalization grid for secured multi-lender platform
#122Fragmenting data for the purposes of persistent storage across multiple immutable data structures
#123Location aware cryptography
#124Variable transport data retention and deletion
#125Systems and methods for selective access to logs
#126System and methods for using cipher objects to protect data
#127Private key cache in secure enclave
#128Methods, systems, and devices for segregated data backup
#129Immutable logging of access requests to distributed file systems
#130Programmer and method for encryption programming
#131Incorporating at-rest data encryption into a cloud-based storage architecture
#132Mathematical method for performing homomorphic operations
#133Key derivation for a module using an embedded universal integrated circuit card
#134System and methods for using cipher objects to protect data
#135IoT devices, block chain platforms and IoT systems for recording transportation data of objects and methods of using the same
#136Secured file storage
#137Method and apparatus for portably binding license rights to content stored on optical media
#138Device programming with system generation
#139Cache management for encryption key rotation
#140Image sensor with inside biometric authentication and storage
#141Server for ingesting and updating renderable data objects from a flat file server
#142Systems and methods for distributed data storage and delivery using blockchain
#143Systems and methods for breach-proof, resilient, compliant data in a multi-vendor cloud environment and automatically self heals in the event of a ransomware attack
#144Encrypting data in a non-volatile memory express (‘NVMe’) storage device
#145System and method for privacy policy enforcement
#146Automatic file encryption
#147Technologies for dividing work across accelerator devices
#148Techniques to provide client-side security for storage of data in a network environment
#149Systems, methods, and devices for encrypting database data
#150SECURED TRANSFER OF DATA BETWEEN DATACENTERS
#151Systems and methods for managing content
#152Methods for behavioral detection and prevention of cyberattacks, and related apparatus and techniques
#153Systems and methods to secure searchable data having personally identifiable information
#154Securing lender output data
#155Memory controller and storage device including the same
#156Secure data at rest
#157Information processing device, information processing method, information processing program, and information processing system
#158Distributed storage system data management and security
#159Secure management of content distribution data blocks on a blockchain
#160Encryption key shares to different devices for rendering
#161Single node multi-party encryption
#162Generating hash values for input strings
#163Decryption and variant processing
#164Set of servers for “machine-to-machine” communications using public key infrastructure
#165Ransomware detection and mitigation
#166Secret distribution system and secret distribution method of files
#167Converting a boolean masked value to an arithmetically masked value for cryptographic operations
#168Data loss prevention
#169UNIVERSAL DATA SCAFFOLD BASED DATA MANAGEMENT PLATFORM
#170Secure access management for tools within a secure environment
#171Cryptographic key management
#172Online disk encryption using mirror driver
#173Technologies for providing accelerated functions as a service in a disaggregated architecture
#174Method for accessing a database stored on a server using a relation
#175Technologies for establishing device locality
#176System and method for a content based classification and adaptive data encryption
#177Verification of bitstreams
#178Secure management of data files using a blockchain
#179Systems and methods for the secured entry and storage of sensitive data
#180Method, apparatus, and electronic device for blockchain-based infringement evidence storage
#181Fractal File Encryption Engine and Method Thereof
#182System for advanced protection of consumable or detachable elements
#183Opaque encryption for data deduplication
#184Progressive key rotation for format preserving encryption (FPE)
#185Data access control using data block level encryption
#186Key-compressible encryption
#187Device having physically unclonable function, method for manufacturing same, and chip using same
#188System and method for decentralized data storage
#189Method for a secured start-up of a computer system, and configuration comprising a computer system and an external storage medium connected to the computer system
#190Systems and methods for managing state
#191COLUMN-ORIENTED LAYOUT FILE GENERATION METHOD
#192SENSITIVE DATA EXTRAPOLATION SYSTEM
#193Switching between watches or other accessories
#194Distributed Storage System Data Management And Security
#195Methods and devices for automatically encrypting files
#196Methods and apparatus to collect distributed user information for media impressions and search terms
#197Method and device for training a model based on federated learning
#198Transient pliant encryption with indicative nano display cards
#199Secure storage of and access to files through a web application
#200Hardware security module systems and methods
#201Technologies for lifecycle management with remote firmware
#202Single node multi-party encryption
#203Secure content delivery computer system
#204System and method for decrypting communication exchanged on a wireless local area network
#205Single sign-on through customer authentication systems
#206Flexible format encryption
#207System and method for interfacing with a decisioning service from a third party domain
#208Jailed environment restricting programmatic access to multi-tenant data
#209Intelligent preprocessing routing to decisioning services
#210Multi-lender platform that securely stores proprietary information for pre-qualifying an applicant
#211Multi-lender platform that securely stores proprietary information for generating offers
#212Normalization grid
#213Securing lender output data
#214Searchable index encryption
#215Self-service lender portal
#216System and method for providing API version control
#217Technologies for providing shared memory for accelerator sleds
#218In-place encryption of a swap file on a host machine
#219Methods, systems, and media for protecting and verifying video files
#220Response-hiding searchable encryption
#221Biofunctional materials
#222Backups of file system instances of encrypted data objects
#223Trusted communications between untrusting parties
#224Wireless display streaming of protected content
#225System and methods for UICC-based secure communication
#226Protecting content-stream portions from modification or removal
#227Smart deployai data pipeline digital signing and encryption
#228Data encryption in medical devices with limited computational capability
#229Data encryption or decryption method and apparatus, and terminal device
#230Server, method for controlling server, and terminal device
#231Encrypted group communication method
#232Systems and methods of data transformation for data pooling
#233Apparatus, method, and program product for storing a hardware manifest
#234System and method for storing encrypted data
#235Security for scene-based sensor networks, with privacy management system
#236Key derivation for a module using an embedded universal integrated circuit card
#237Encryption method, decryption method, encryption system and decryption system
#238Expansion joint seal with splicing system
#239Secure file sharing method and system
#240Method, apparatus, and electronic device for blockchain-based infringement evidence storage
#241Securely provisioning a target device
#242Data storage devices and methods for encrypting a firmware file thereof
#243Secure data at rest
#244Computer-implemented method for removing access to data
#245Secure cloaking of data
#246Providing control to tenants over user access of content hosted in cloud infrastructures
#247Techniques for authentication via a mobile device
#248Method for registering and identifying a user of an institution through a biometric information and registration system and identification device thereof
#249Method and system for verifying integrity of a digital asset using a distributed hash table and a peer-to-peer distributed ledger
#250Method for strongly encrypting .ZIP files
#251Method and system for secure storage of digital data
#252Systems, methods, and storage media for obfuscating a computer program by representing the control flow of the computer program as data
#253Set of servers for “machine-to-machine” communications using public key infrastructure
#254Machine learning training method, controller, device, server, terminal and medium
#255POLICY MANAGEMENT FOR DATA MIGRATION
#256Identity verification using biometric data and non-invertible functions via a blockchain
#257Update management method, update management system, and non-transitory recording medium
#258Scanning of encrypted zip files
#259PAGELISTS FOR JUST-IN-TIME TRANSMISSION OF DIGITAL DOCUMENTS
#260Data validation in a mobile communication network
#261Method and computer program product for generating secure alternative representation for numerical datum
#262Incorporating at-rest data encryption into a cloud-based storage architecture
#263Systems and methods for securing and disseminating time sensitive information using a blockchain
#264Fingerprint encryption method and device, fingerprint decryption method and device, storage medium and terminal
#265System, Apparatus and Method for Secure Monotonic Counter Operations in a Processor
#266Secure database backup and recovery
#267Computer-implemented method for error-correction-encoding and encrypting of a file
#268Systems and methods for the secured entry and storage of sensitive data
#269Systems and methods for distributed data storage and delivery using blockchain
#270Cryptographic pointer address encoding
#271Fragmenting data for the purposes of persistent storage across multiple immutable data structures
#272Mass encryption management
#273Cryptographic engine, scheduler, packet header processor, ingress interfaces, and buffers
#274System and methods for using cipher objects to protect data
#275Event monitoring
#276Key export techniques
#277Method and apparatus for portably binding license rights to content stored on optical media
#278Behavioral baselining from a data source perspective for detection of compromised users
#279Multifactor authentication at a data source
#280Architecture having a protective layer at the data source
#281Federated identity management for data repositories
#282Tokenization and encryption of sensitive data
#283Query analysis using a protective layer at the data source
#284Light weight transport stream streaming protocol for live transcoding system
#285Secure software updates
#286Storage drive protection using file system level encryption
#287Secure cloud-based storage of data shared across file system objects and clients
#288Security of paired storage drives
#289Method of modifying ray tracing samples after rendering and before rasterizing
#290Large network attached storage encryption
#291Autonomous hint generator
#292Reducing compromise of sensitive data in virtual machine
#293Intercepting calls for encryption handling in persistent access multi-key systems
#294Regulating document access
#295Systems and methods for “Machine-to-Machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)
#296Secured transfer of data between datacenters
#297Cloud key escrow system
#298Systems and methods to secure searchable data having personally identifiable information
#299Secure comparison of information
#300Enabling program code on target data processing devices