Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity; Authentication, i.e. establishing the identity or authorisation of security principals; User authentication by observing the pattern of computer usage, e.g. typical user behaviour
DIGITAL VERIFICATION SYSTEMS AND METHODS
#2METHOD FOR SAFETY RESPONSES TO SECURITY POLICY VIOLATIONS
#3Vapour Generating Systems
#4Consensus Based Authentication and Authorization Process
#5INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM
#6SYSTEMS AND METHODS FOR IMPROVED BEHAVIORAL SCORING ACCURACY
#7SCENARIO-BASED ACCESS ENTITLEMENT ENGINE AND CONTROLLER
#8SYSTEMS AND METHODS FOR RAPID NATURAL LANGUAGE BASED MESSAGE CATEGORIZATION
#9AUTOMATED ID PROOFING USING A RANDOM MULTITUDE OF REAL-TIME BEHAVIORAL BIOMETRIC SAMPLINGS
#10METHODS AND USER INTERFACES FOR ACCOUNT RECOVERY
#11SYSTEM AND METHOD FOR ELECTRONIC COMMUNICATION
#12BIOMETRIC IDENTIFICATION PLATFORM
#13INFORMATION PROCESSING DEVICE AND INFORMATION PROCESSING METHOD
#14System and method for auto-generating and sharing customized virtual environments
#15USER IDENTITY RISK SCORE GENERATION IN AN ENTERPRISE NETWORK
#16LIVENESS DETECTION FOR AN ELECTRONIC DEVICE
#17AUTOMATED TRANSPARENT LOGIN WITHOUT SAVED CREDENTIALS OR PASSWORDS
#18APPARATUSES, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR PROACTIVE OFFLINE AUTHENTICATION
#19TWO-SIDED MACHINE LEARNING FRAMEWORK FOR POINTER MOVEMENT-BASED BOT DETECTION
#20SYSTEMS AND METHODS FOR DYNAMIC BIO-BEHAVIORAL AUTHENTICATION
#21BIOMETRIC ACCESS SENSITIVITY
#22AUTHENTICATION OF USERS BASED ON RE-ENTRY OF PASSWORDS
#23METHOD AND SYSTEM FOR AUTHENTICATING USER CONTENT
#24Privacy Border for a Portion of Resources on a Computing Machine
#25USER AUTHENTICATION SYSTEMS AND METHODS OF USE THEREOF
#26IMPLEMENTATION OF BIOMETRIC AUTHENTICATION
#27MULTI-FACTOR AUTOMATED TELLER MACHINE (ATM) PERSONAL IDENTIFICATION NUMBER (PIN)
#28MULTI-FACTOR AUTHENTICATION USING BEHAVIOR AND MACHINE LEARNING
#29MACHINE LEARNING MODEL FEATURE SHARING FOR SUBSCRIBER IDENTITY MODULE HIJACK PREVENTION
#30Active Locking Mechanism Using Machine Learning
#31BEHAVIORAL BIOMETRICS USING KEYPRESS TEMPORAL INFORMATION
#32SYSTEM FOR IMPLEMENTING CONTINUOUS AUTHENTICATION BASED ON OBJECT LOCATION RECOGNITION
#33USER IDENTIFICATION WITH BLENDED RESPONSE FROM DUAL-LAYER IDENTIFICATION SERVICE
#34MONITORING USER INTERACTION WITH CLIENT DEVICES
#35DYNAMIC KEYBOARD FOR ELECTRONIC COMPUTING DEVICE
#36USER ACCESS CONTROL METHOD FOR INFORMATION SYSTEM, USER ACCESS CONTROL APPARATUS FOR INFORMATION SYSTEM, AND STORAGE MEDIUM STORING INSTRUCTIONS TO PERFORM USER ACCESS CONTROL METHOD
#37Method, Device, and System of Differentiating Between a Cyber-Attacker and a Legitimate User
#38Data Security Using Multi-Factor Authentication
#39System and method for auto-generating and sharing customized virtual environments
#40Architectures, systems and methods for program defined transaction system and decentralized cryptocurrency system
#41METHODS, ARCHITECTURES AND SYSTEMS FOR PROGRAM DEFINED SYSTEMS
#42User credential authentication using blockchain and machine learning
#43SYSTEMS, METHODS AND APPARATUS FOR EVALUATING STATUS OF COMPUTING DEVICE USER
#44SUPERVISED LEARNING SYSTEM FOR IDENTITY COMPROMISE RISK COMPUTATION
#45SELECTION OF ELECTRONIC TRANSACTION PROCESSING CHANNEL AND MULTI-FACTOR USER AUTHENTICATION
#46NETWORK DEVICE PROXIMITY-BASED AUTHENTICATION
#47METHODS AND SYSTEMS FOR AUTOMATICALLY PRESERVING A USER SESSION ON A PUBLIC ACCESS SHARED COMPUTER
#48MAZE-BASED USER AUTHENTICATION
#49USE-BASED SECURITY CHALLENGE AUTHENTICATION
#50ADJUSTING BIOMETRIC DETECTION THRESHOLDS BASED ON RECORDED BEHAVIOR
#51Device, System, and Method of Detecting Vishing Attacks
#52AUTHENTICATING A USER BASED ON EXPECTED BEHAVIOUR
#53METHODS AND APPARATUS TO ENABLE A TRADING DEVICE TO ACCEPT A USER INPUT
#54METHODS AND SYSTEMS FOR SECURE AND RELIABLE IDENTITY-BASED COMPUTING
#55CONTEXTUALLY ESCALATED AUTHENTICATION BY SYSTEM DIRECTED CUSTOMIZATION OF USER SUPPLIED IMAGE
#56Secure User Authentication Through Hardware Analysis and Monitoring
#57Systems and methods for password spraying identification and prevention using hash signature segmentation and behavior clustering analysis
#58User Authentication Using Behavior Patterns
#59ACTIVE PRESENCE DETECTION WITH DEPTH SENSING
#60Custom Function Implementation Method, Storage Medium, and Electronic Device
#61SYSTEMS AND METHODS FOR USING MACHINE LEARNING MODELS TO ORGANIZE AND SELECT ACCESS-RESTRICTED COMPONENTS FOR ACCESSED USING USER-SPECIFIC ACCESS TOKENS WITH VARIABLE PROPERTIES
#62PROGRAMMABLE LOGIC CONTROLLER (PLC) SECURITY MODEL
#63VALIDATION OF A NETWORK OPERATION RELATED TO USE OF A TOKEN VIA TOKEN-REQUEST-TRIGGERED STORAGE OF SNAPSHOT URL DATA
#64INTEROPERABILITY OF REAL-WORLD AND METAVERSE SYSTEMS
#65AUTHENTICATING A CARD BASED ON CARD MOVEMENT
#66Intelligent authentication of users in Metaverse leveraging non-fungible tokens and behavior analysis
#67BROWSER SIGNAL COLLECTION FOR DETECTION OF AUTOMATED ACTIVITY IN BROWSER SESSION
#68STEMS AND METHODS FOR MAKING CHANGES TO SECURITY SYSTEM SETTINGS BASED ON IDENTIFIED CHANGES IN OCCUPANT BEHAVIOR
#69Data security in a metaverse environment
#70DEVICE ACCESS CONTROL
#71CLASSIFYING USER BEHAVIOR AS ANOMALOUS
#72DYNAMIC USER DASHBOARD BASED ON ARTIFICIAL INTELLIGENCE TECHNIQUES
#73SYSTEM AND METHOD FOR REDUCING GOVERNMENT IDENTIFICATION FRAUD
#74SYSTEMS AND METHODS FOR VALIDATING THE ACCURACY OF AN AUTHENTICATED, END-TO-END, DIGITAL RESPONSE SYSTEM
#75SYSTEM AND METHOD FOR DETECTING LOGIN FRAUD BASED ON A MACHINE LEARNING MODEL
#76CONTROLLING PUBLISHING OF ASSETS ON A BLOCKCHAIN
#77SYSTEMS AND METHODS FACILITATING INTERACTIONS BETWEEN IMPOSTER DEVICES AND PROTECTED CONTENT SYSTEMS
#78FINGERPRINT AUTHENTICATION-RELATED INDICATORS FOR CONTROLLING DEVICE ACCESS AND/OR FUNCTIONALITY
#79SYSTEMS AND METHODS FOR PASSIVE CONTINUOUS SESSION AUTHENTICATION
#80USING DOMAIN SPECIFIC VOCABULARIES TO SPELLCHECK INPUT STRINGS
#81Method for safety responses to security policy violations
#82Access control by changing a ticketing interface
#83SENSOR-BASED HUMAN AUTHORIZATION EVALUATION
#84DISAMBIGUATION AND AUTHENTICATION OF DEVICE USERS
#85SECURING A DATA STORAGE DEVICE AGAINST ROGUE HOSTS
#86SYSTEMS AND METHODS FOR EMPLOYING A CARD ROTATION SEQUENCE TO AUTHENTICATE A USER
#87Methods and systems for detecting suspicious or non-suspicious activities involving a mobile device use
#88METHODS AND SYSTEMS FOR BINDING ENTITY-RESTRICTED ACCESS TOKENS
#89AUTOMATICALLY ASSESSING ALERT RISK LEVEL
#90MODIFYING APPLICATION FUNCTION BASED ON LOGIN ATTEMPT CONFIDENCE SCORE
#91SMART VERIFICATION OF AUTHENTICATION FOR USER LOG INS BASED ON RISK LEVELS
#92METHODS AND SYSTEMS FOR LEVERAGING TRANSACTIONS TO DYNAMICALLY AUTHENTICATE A USER
#93METHOD AND SYSTEM FOR PRIVACY-PRESERVING COMMUNICATION ON WIRELESS EDGE DEVICES
#94Architectures, systems and methods having segregated secure and public functions
#95Architectures, systems and methods for program defined transaction system and decentralized cryptocurrency systems
#96IMAGE FORMING APPARATUS, SHARED MACHINE, IMAGE FORMING SYSTEM, AND CONTROL METHOD OF IMAGE FORMING APPARATUS
#97System and Method for Capturing Notes on a Mobile Device
#98LOGIN CLASSIFICATION WITH SEQUENTIAL MACHINE LEARNING MODEL
#99METHOD AND SYSTEM FOR BEHAVIOR-BASED AUTHENTICATION OF A USER
#100DETECTING SYNTHETIC USER ACCOUNTS USING SYNTHETIC PATTERNS LEARNED VIA MACHINE LEARNING
#101METHODS AND SYSTEMS FOR ADDRESSING UNREPORTED THEFT OR LOSS OF MOBILE COMMUNICATIONS DEVICES
#102EXTRAPOLATING RETURN DATA FOR A PLURALITY OF COMPUTING DEVICES
#103Method and system for contextual user logon authentication
#104Biometric identification platform
#105USER AUTHENTICATION, FOR ASSISTANT ACTION, USING DATA FROM OTHER DEVICE(S) IN A SHARED ENVIRONMENT
#106UTILIZING MACHINE-LEARNING MODELS TO DETERMINE TAKE-OVER SCORES AND INTELLIGENTLY SECURE DIGITAL ACCOUNT FEATURES
#107DYNAMIC FRAUD INTERVENTION MACHINE
#108EMBEDDED AUTHENTICATION SYSTEMS IN AN ELECTRONIC DEVICE
#109Creating and Using Device Orientation Fingerprints
#110Account access security using a distributed ledger and/or a distributed file system
#111IDENTIFYING SECURITY THREATS VIA USER-INPUT METRCS
#112Continuous authentication system and related methods
#113SYSTEMS AND METHODS FOR EMPLOYING A JOYSTICK SEQUENCE TO AUTHENTICATE A USER
#114APPLICATION IDENTITY ACCOUNT COMPROMISE DETECTION
#115Adaptive Online Service Access Control
#116Automated ID proofing using a random multitude of real-time behavioral biometric samplings
#117Device deactivation based on behavior patterns
#118AUTHENTICATION AND CALIBRATION VIA GAZE TRACKING
#119AUTHENTICATION OF A USER BASED ON A USER-SPECIFIC SWIPE
#120DYNAMIC USER AUTHENTICATION
#121LEARNING COGNITIVE ACCESS CONTROL SERVICE
#122Universal, hierarchally-outsourced multi-phased authentication framework with a central global database
#123APPARATUSES, COMPUTER-IMPLEMENTED METHODS, AND COMPUTER PROGRAM PRODUCTS FOR IMPROVED IDENTITY VERIFICATION USING SENSOR DATA PROCESSING
#124SCREEN-ANALYSIS BASED DEVICE SECURITY
#125Multi-factor automated teller machine (ATM) personal identification number (PIN)
#126ARCHITECTURES, SYSTEMS AND METHODS FOR PROGRAM DEFINED SYSTEM
#127BOT DETECTION FOR A SURVEY PLATFORM
#128INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND RECORDING MEDIUM
#129DETERMINING THE TECHNICAL MATURITY OF A SYSTEM USER TO USE AS A RISK INDICATOR WHEN AUDITING SYSTEM ACTIVITY
#130COMPUTER-IMPLEMENTED CONTINUOUS CONTROL METHOD, SYSTEM AND COMPUTER PROGRAM
#131Authentication system and authentication method
#132Systems and methods for verifying user activity using behavioral models
#133USER AUTHENTICATION USING A MOBILE DEVICE
#134Systems and methods for employing a card rotation sequence to authenticate a user
#135Active locking mechanism using machine learning
#136Graph-based multi-threading group detection
#137Identity intelligence in cloud-based services
#138SYSTEMS AND METHOD FOR RESPONSIVELY AUGMENTING A RISK ENGINE TO ADDRESS NOVEL RISK PATTERNS
#139BEHAVIORAL BIOMETRICS VERIFICATION ADAPTATION FOR CROSS DEVICES
#140SYSTEMS AND METHODS FOR VERIFYING USER IDENTITY BASED ON A CHAIN OF EVENTS
#141ENCRYPTION AND PRIVACY PROTECTION USING HUMAN ATTRIBUTES AND BEHAVIORS
#142DURESS-BASED USER ACCOUNT DATA PROTECTION
#143RECOMMENDATION CONTROL DEVICE, SYSTEM, METHOD, AND NON-TRANSITORY COMPUTER-READABLE MEDIUM STORING PROGRAM THEREIN
#144Sensor-based human authorization evaluation
#145Device, computer program and method
#146Systems and methods for rapid natural language based message categorization
#147ANOMALOUS USER INTERFACE INPUT DETECTION
#148Visual Indicator of Application of Security Policy
#149Visual Indicator for Organizational Computing Resource
#150SYSTEMS AND METHODS FOR DETECTING INSIDER ATTACKS ON A COMMUNICATION NETWORK
#151SYSTEMS AND METHODS FOR ENCODING BEHAVIORAL INFORMATION INTO AN IMAGE DOMAIN FOR PROCESSING
#152SYSTEMS AND METHODS FOR CONTINUOUS USER AUTHENTICATION
#153USER AUTHENTICATION BASED ON BIOMETRIC DATA
#154Scheme evaluation authentication system
#155Static Authentication Questions for Account Authentication
#156BIOMETRIC AUTHENTICATION BASED ON BEHAVIORAL ANALYSIS
#157IDENTITY AUTHENTICATION METHOD, AND METHOD AND APPARATUS FOR TRAINING IDENTITY AUTHENTICATION MODEL
#158USER AUTHENTICATION DEVICE, USER AUTHENTICATION METHOD, AND USER AUTHENTICATION COMPUTER PROGRAM
#159METHOD AND APPARATUS FOR AUTHENTICATING HANDWRITTEN SIGNATURE USING MULTIPLE AUTHENTICATION ALGORITHMS
#160METHOD AND SYSTEM FOR USER AUTHENTICATION
#161COMPUTER-IMPLEMENTED METHOD AND A VIRTUAL REALITY DEVICE FOR PROVIDING BEHAVIOR-BASED AUTHENTICATION IN VIRTUAL ENVIRONMENT
#162Enhancing verification in mobile devices using model based on user interaction history
#163Systems, methods and apparatus for evaluating status of computing device user
#164Systems, methods and apparatus for evaluating status of computing device user
#165Personalization of a user interface using machine learning
#166System for implementing continuous authentication based on object location recognition
#167METHOD FOR INTRUSION DETECTION TO DETECT MALICIOUS INSIDER THREAT ACTIVITIES AND SYSTEM FOR INTRUSION DETECTION
#168Systems and methods for determining access outcomes using access request scoring
#169Methods and user interfaces for account recovery
#170Systems and Methods for Providing Trustworthiness Scores
#171Access Control Using User Behavior Profile and Storage System-Based Multi-Factor Authentication
#172Multi-modal context based vehicle management
#173SYSTEMS AND METHODS FOR ANALYZING NETWORK DATA TO IDENTIFY HUMAN AND NON-HUMAN USERS IN NETWORK COMMUNICATIONS
#174Architectures, systems and methods having segregated secure and public functions
#175Secure kinetic key patterns with soft assist for vision-impaired users
#176Gesture-based device activation system
#177Method, device, and system of differentiating between a cyber-attacker and a legitimate user
#178Executing application without unlocking mobile device
#179Classifying user behavior as anomalous
#180Using Multi-Factor Authentication as a Labeler for Machine Learning- Based Authentication
#181Methods and apparatus to enable a trading device to accept a user input
#182Authentication based on object recognition
#183System to utilize user's activities pattern as additional authentication parameter
#184USER AUTHENTICATION METHOD AND DEVICE FOR EXECUTING SAME
#185Method for generating a human likeness score
#186Methods and systems for secure and reliable identity-based computing
#187Multichannel threat detection for protecting against account compromise
#188Role design advisor
#189Data security using multi-factor authentication
#190Fraud detection system, fraud detection method, and program
#191DATA PROCESSING SYSTEMS AND METHODS FOR EFFICIENTLY ASSESSING THE RISK OF CAMPAIGNS
#192DATA PROCESSING SYSTEMS AND METHODS FOR EFFICIENTLY ASSESSING THE RISK OF CAMPAIGNS
#193Offline processing using on-demand access tokens
#194DYNAMIC TRANSACTION-AWARE WEB APPLICATION AUTHENTICATION USING CALL INTERCEPTS
#195Authentication system, authentication method and program
#196DATA PROCESSING AND SCANNING SYSTEMS FOR ASSESSING VENDOR RISK
#197DATA PROCESSING AND SCANNING SYSTEMS FOR ASSESSING VENDOR RISK
#198Authentication System
#199Modifying application function based on login attempt confidence score
#200Modifying application function based on login attempt confidence score
#201System for time-based credential access
#202Deep Learning for Behavior-Based, Invisible Multi-Factor Authentication
#203USER AUTHENTICATION IN A RECALL-MEMORY ENHANCING MANNER
#204Network device proximity-based authentication
#205NETWORK DEVICE PROXIMITY-BASED AUTHENTICATION
#206Computer-based systems with programmed automatic real-time updatable browsing data objects and activity data objects and methods of use thereof
#207Using domain specific vocabularies to spellcheck input strings
#208METHOD AND SYSTEM FOR SECURELY DEPLOYING AN ARTIFICIAL INTELLIGENCE MODEL
#209Intelligent Friction for Authentication Methods and Systems
#210DEVICES AND METHODS FOR SMARTPHONE IMPOSTOR DETECTION USING BEHAVIORAL AND ENVIRONMENTAL DATA
#211USER AUTHENTICATION BASED ON BEHAVIORAL BIOMETRICS
#212Extrapolating trends in trust scores
#213Methods and systems for automatically preserving a user session on a public access shared computer
#214Systems and methods for using typing characteristics for authentication
#215SYSTEMS AND METHODS FOR AN INTERNET OF THINGS DEVICE REGISTRY DISPLAY
#216Authentication of audio-based input signals
#217Display Method Based on User Identity Recognition and Electronic Device
#218Predictive update of profile database with update logic
#219Automated transparent login without saved credentials or passwords
#220RECOGNITION OF UNAUTHORIZED ACCESS OF A PORTABLE ELECTRONIC APPARATUS
#221METHOD, COMPUTER DEVICE, AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM TO MANAGE CONTENT FOR USER ACCOUNT
#222LOCAL MODEL PROCESSING AND REMOTE VERIFICATION
#223Dynamic authorization control system and method
#224Smart-glasses based contactless automated teller machine (“ATM”) transaction processing
#225Method and apparatus for authentication of a user to a server using relative movement
#226SYSTEMS AND METHODS FOR SECURING USER DEVICES
#227Computer-based systems for a real-time generation of challenge questions based on user-inputted data elements and methods of use thereof
#228Data security using multi-factor authentication
#229Facilitating user input by predicting target storage locations
#230DATA IDENTIFICATION METHOD AND APPARATUS, AND DEVICE, AND READABLE STORAGE MEDIUM
#231DATA PROCESSING SYSTEMS AND METHODS FOR EFFICIENTLY ASSESSING THE RISK OF PRIVACY CAMPAIGNS
#232System and method for implicit authentication
#233Consensus based authentication and authorization process
#234Data processing and scanning systems for assessing vendor risk
#235DATA PROCESSING METHOD, APPARATUS, STORAGE MEDIUM, AND DEVICE
#236BEDSIDE USER DEVICE AND ID AND USER PERFORMANCE
#237METHOD AND APPARATUS FOR USER RECOGNITION
#238ACCESS CONTROL CLASSIFIER TRAINING
#239ACCESS CONTROL
#240Computing system operational methods and apparatus
#241Remedial actions based on user risk assessments
#242System and method for monitoring touch-screen gestures of users and for user authentication
#243Bayesian continuous user authentication
#244Biometric identification platform
#245Platform Agnostic Object Processing
#246Cybersecurity detection and mitigation system using machine learning and advanced data correlation
#247METHOD AND SYSTEM FOR PROVIDING BUSINESS INTELLIGENCE BASED ON USER BEHAVIOR
#248Screen unlocking method and apparatus, and computer device and storage medium
#249REAL-TIME VIABLE USER DETERMINATION
#250Protection of data from malicious user in computing device from pre-boot state
#251User identification with blended response from dual-layer identification service
#252Multi-level classifier based access control
#253MACHINE LEARNING LITE
#254Computer user authentication using machine learning
#255Validating a User Using a Digital Behavioral Fingerprint Generated with Sensor Data from the User's Portable Device
#256System, apparatus and method for privacy preserving contextual authentication
#257Biometric access sensitivity
#258Computer security forensics based on temporal typing changes of authentication credentials
#259Methods and systems for detecting suspicious activities during an electronic payment transaction by authenticating registered users
#260User identification system and method for fraud detection
#261Identifying and authenticating users based on passive factors determined from sensor data
#262Embedded authentication systems in an electronic device
#263DATA PROCESSING AND SCANNING SYSTEMS FOR ASSESSING VENDOR RISK
#264Privacy management systems and methods
#265INFORMATION PROCESSING APPARATUS, CONTROL METHOD, AND PROGRAM
#266Data processing and scanning systems for assessing vendor risk
#267Multi-Factor Authentication Using Positioning Data
#268Implementation of biometric authentication
#269METHOD AND SYSTEM FOR AUTOMATED USER AUTHENTICATION BASED ON VIDEO AND AUDIO FEED IN REAL-TIME
#270Processing authentication requests to secured information systems based on machine-learned user behavior profiles
#271Data processing and scanning systems for assessing vendor risk
#272Motion-based challenge-response authentication mechanism
#273SYSTEMS AND METHODS FOR DETECTING MULTIPLE USERS OF AN ONLINE ACCOUNT
#274Security mechanism for an electronic device
#275IDENTIFYING AND AUTHENTICATING USERS BASED ON PASSIVE FACTORS DETERMINED FROM SENSOR DATA
#276Methods and systems for addressing unreported theft or loss of mobile communications devices
#277USER IDENTITY RECOGNITION METHOD AND DEVICE, ELECTRONIC DEVICE AND STORAGE MEDIUM
#278System and Method for Continuous User Authentication
#279Machine Learning-based user and entity behavior analysis for network security
#280Authenticating a user subvocalizing a displayed text
#281System and method for continuous user identification via piezo haptic keyboard and touchpad dynamics
#282Natural language based electronic communication profile system
#283Real-time data stream for carbon emission aggregation
#284System, device, and method to detect unusual activity in electronic records
#285Providing Hands-Free Data for Interactions
#286Systems and methods for protecting a remotely hosted application from malicious attacks
#287ARTIFICIAL INTELLIGENT REFRIGERATOR AND CONTROL METHOD OF THE SAME
#288Method and system to utilize advertisement fraud data for blacklisting fraudulent entities
#289Device deactivation based on behavior patterns
#290Detection of slow brute force attacks based on user-level time series analysis
#291Data processing and scanning systems for assessing vendor risk
#292ELECTRONIC DEVICE FOR PERFORMING USER AUTHENTICATION AND OPERATION METHOD THEREFOR
#293System to utilize user's activities pattern as additional authentication parameter
#294METHOD AND SYSTEM FOR INFLUENCING AUCTION BASED ADVERTISING OPPORTUNITIES BASED ON USER CHARACTERISTICS
#295Device, system, and method of detecting vishing attacks
#296Automatically constructing lexicons from unlabeled datasets
#297Staged information exchange facilitated by content-addressable records indexed to pseudonymous identifiers by a tamper-evident data structure
#298Methods and systems for leveraging transactions to dynamically authenticate a user
#299Systems and methods for authentication of a user based on free text
#300System and method for identity and reputation score based on transaction history