Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity; Protecting data; Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Sub-classes:SYSTEMS AND METHODS FOR EFFICIENT AND SECURE PROCESSING, ACCESSING AND TRANSMISSION OF DATA VIA A BLOCKCHAIN NETWORK
#2Data Encryption for a Hearing Device
#3SYSTEM AND METHOD FOR PROVIDING EXCLUSIVE ACCESS TO SECONDARY STORAGE TO APPLICATION ON ANDROID DEVICE
#4Implementing Volume-Level Access Policies In Storage Systems
#5SECURITY ARCHITECTURE FOR INTERCONNECTED DIGITAL ENGINEERING AND CERTIFICATION ECOSYSTEM
#6ARTIFICIAL INTELLIGENCE (AI) MODEL TRAINED USING CLUSTERING AND REINFORCEMENT LEARNING FOR DATA DE-IDENTIFICATION ENGINE
#7METHOD AND SYSTEM FOR GENERATING AN AUTOMATIC SERVICE REQUEST BASED ON METADATA
#8METHOD AND SYSTEM FOR RECONFIGURING A DATA PROTECTION MODULE BASED ON METADATA
#9SYSTEMS AND METHODS FOR DETERMINING QUARANTINE STATUSES OF OUTBOUND EMAILS
#10CENTRALIZED MASTER DATA MANAGEMENT SYSTEM AND METHOD
#11Replicating A Storage System
#12EXTENSIBLE DATA ENCLAVE PATTERN
#13Preference Based Selection of Storage Network Memory for Data Storage
#14METHOD AND SYSTEM FOR INDIRECT SHARING OF SENSOR INSIGHTS
#15SYSTEM, METHOD AND STORAGE MEDIUM FOR VEHICLE INSPECTION AUTHORIZATION INFORMATION MANAGEMENT
#16DEVICE FOR DRIVING SECURITY TOOL SYSTEM PROVIDING FOLDER PROTECTION FUNCTION, AND METHOD FOR OPERATING SAME
#17SYSTEM, METHOD, AND COMPUTER PROGRAM FOR ENHANCING SOCIAL PLATFORM INFORMATION PROCESSING
#18VISUAL CONTENT SELECTION SYSTEM AND METHOD
#19CONVERSATIONAL LARGE LANGUAGE MODEL-BASED USER TENANT ORCHESTRATION
#20ENHANCED VALUE COMPONENT PREDICTIONS USING CONTEXTUAL MACHINE-LEARNING MODELS
#21System And Method For Managing Exception Request Blocks In A Blockchain Network
#22SYSTEM, METHODS, AND DEVICES FOR DATA STORAGE AND PROCESSING WITH IDENTITY MANAGEMENT
#23SYSTEM SUPPORTING OPERATIONS ON SECURELY COMMINGLING SELF-GOVERNING DATA SETS FROM A PLURALITY OF PUBLISHERS
#24SYSTEM AND METHOD FOR DATA ACCESS MANAGEMENT USING ENVIRONMENTAL VALIDATION
#25UNAUTHORIZED ACCESS DETECTION SYSTEM AND UNAUTHORIZED ACCESS DETECTION METHOD
#26SYSTEM AND METHOD FOR ENHANCED DATA PROTECTION
#27DIAGNOSE INSTRUCTION TO EXECUTE VERIFICATION CERTIFICATE RELATED FUNCTIONS
#28METADATA SEARCH VIA N-GRAM INDEX
#29SYSTEMS AND METHODS FOR PROCESSING REQUESTS FOR REAL-TIME TRANSFERS OF RESOURCES
#30SYSTEM AND METHOD FOR VALIDATING A RESPONSE BASED ON CONTEXT INFORMATION
#31Non-Persistent Data Caching Web Server
#32DATA PROCESSING METHOD, DATA PROCESSING APPARATUS, AND DATA PROCESSING PROGRAM
#33FILE MIGRATION METHOD, ELECTRONIC DEVICE , AND STORAGE MEDIUM
#34FILE LEAK DETECTION METHOD AND DEVICE
#35DATA RIGHTS ENFORCEMENT IN SECURE ENCLAVES
#36TECHNIQUES FOR REPLICATION CHECKPOINTING DURING DISASTER RECOVERY
#37AUTOMATED SEARCH EVALUATION
#38DESCENDENT CASE ROLE ALIAS
#39HIERARCHICAL PERMISSIONS MODEL WITHIN A DOCUMENT
#40METHOD AND APPARATUS FOR PROVIDING SECURE DEBUG INFORMATION
#41PRIVACY PRESERVING TRANSFER LEARNING
#42Systems and Methods for a Cryptographic File System Layer
#43SYSTEM AND METHOD FOR MANAGING DATA ACCESS REQUESTS
#44Systems Using an Authorization Service User Interface for Secure Role-Based Access Control
#45Data Breach Detection and Mitigation
#46SYSTEMS AND METHODS FOR POSTURE-BASED MODELING
#47API MODEL FOR AS-A-SERVICE DATA RESILIENCE MANAGEMENT
#48Methods and Systems for Generating, Maintaining, and Using Information Related to Vehicle Seats Stored on a Blockchain
#49MULTICOMPUTER PROCESSING TO PROTECT DATA FROM UNAUTHORIZED MODIFICATION
#50METHOD AND SYSTEM FOR ENFORCING SECONDARY USAGE CONTROL ON DATA ANALYTICS SERVICE
#51AGENT-BASED DEVICE PROTECTION USING DETECTION AND MITIGATION OF MODIFICATIONS TO A PROTECTED STORAGE REGION
#52CREATION AND RETENTION OF IMMUTABLE SNAPSHOTS TO FACILITATE RANSOMWARE PROTECTION
#53SHARING DATA IN AN ORGANIZED STORAGE SYSTEM
#54SYSTEMS AND METHODS FOR DETECTING EVENTS BASED ON UPDATES TO NODE PROFILES FROM ELECTRONIC ACTIVITIES
#55BLOCKCHAIN FOR ACCESS CONTROL
#56SYSTEM AND METHOD FOR IMPLEMENTING DATA SOVEREIGNTY SAFEGUARDS IN A DISTRIBUTED SERVICES NETWORK ARCHITECTURE
#57ENFORCING LOCATION-BASED DATA PRIVACY RULES ACROSS NETWORKED WORKLOADS
#58EMBEDDED NEXT GENERATION ACCESS CONTROL SYSTEM AND IMPOSING FINE-GRAINED ACCESS CONTROL OF DATA IN A DATABASE
#59DYNAMIC DATA PRODUCT CREATION
#60Security Enabled False Desktop Computing Environment
#61QUERY PROCESSING USING MULTIPLE INDICES
#62SYSTEMS AND METHODS FOR MANAGING DATABASE-LEVEL ROLES FOR DATA SHARING
#63DYNAMIC CURATION OF SEQUENCE EVENTS FOR COMMUNICATION SESSIONS
#64IMPLEMENTING LOGIC GATE FUNCTIONALITY USING A BLOCKCHAIN
#65INFORMATION PROCESSING APPARATUS, SERVICE PROVIDING SYSTEM, AND METHOD TO MODIFY A LICENSE BASED ON USAGE
#66Data System, Data Access Method and Apparatus, and Data Processing Unit
#67SECRET SEARCH SYSTEM, SECRET SEARCH METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
#68AUTOMATIC FILE ENCRYPTION
#69SECURITY SYSTEM REMOTE DEVICE ACCESS TRANSPARENCY
#70FRAGMENTING DATA FOR THE PURPOSES OF PERSISTENT STORAGE ACROSS MULTIPLE IMMUTABLE DATA STRUCTURES
#71SYSTEM AND METHOD FOR MINTING NON-FUNGIBLE TOKEN
#72INTELLIGENT CLOUD STORAGE SECURITY
#73ESTABLISHING COMMUNICATION STREAM WITH DATABASE CONTROL AGENT OVER WHICH DATABASE COMMANDS ARE DISPATCHED FOR EXECUTION AGAINST DATABASE
#74SECURE DATA COLLECTION FROM AN AIR-GAPPED NETWORK
#75RESTRICTED DATABASE ACCESS IN WEB APPLICATIONS
#76DETECTING RANSOMWARE IN MONITORED DATA
#77SYSTEMS AND METHODS FOR RAPID NATURAL LANGUAGE BASED MESSAGE CATEGORIZATION
#78AUTOMATIC SEMANTIC SIMILARITY METHOD AND APPARATUS
#79DECENTRALIZED POLICY-BASED TRANSACTIONAL OBJECT MANAGEMENT FOR FEDERATED WORKFLOWS
#80METHOD AND SYSTEM FOR IDENTIFYING PRODUCT FEATURES BASED ON METADATA
#81SYSTEMS AND METHODS FOR DETECTION OF TOXIC ACCESS COMBINATIONS
#82TIME-DELAY-BASED ACCESS CONTROL FOR CONTINUOUS INTEGRATION PIPELINES
#83SYSTEMS AND METHODS FOR SUBORDINATE WORKSPACES
#84INTELLIGENT DEVICE WIPES FOR MOBILE DEVICE MANAGEMENT
#85PERFORMANT WORKSPACE DATA ORCHESTRATION USING INFORMATION TRUST SCORES
#86System and method to enable a hybrid backup solution using snapshot-based backups and stream-based backups
#87MANAGEMENT OF COMMUNICATIONS DURING THE ORCHESTRATION OF WORKSPACES BY MULTIPLE REMOTE ORCHESTRATORS
#88MANAGING CREDENTIALS USABLE IN THE ORCHESTRATION OF WORKSPACES BY MULTIPLE REMOTE ORCHESTRATORS
#89METHODS AND SYSTEMS FOR DATA SYNCHRONIZATION, AND COMPUTER-READABLE STORAGE MEDIA
#90CENTRALIZED ACCESS CONTROL FOR CLOUD RELATIONAL DATABASE MANAGEMENT SYSTEM RESOURCES
#91Method and System for Processing File Metadata
#92METHOD AND SYSTEM FOR IDENTIFYING HEALTH OF A MICROSERVICE BASED ON RESOURCE UTILIZATION OF THE MICROSERVICE
#93Systems And Methods For Provisioning A Database Of Trusted Users Stored Within One Or More Information Handling Systems
#94EMBEDDED FOLDER VIEWS
#95Method and System for Processing File Metadata
#96CLOUD-BASED SCALE-UP SYSTEM COMPOSITION
#97APPLICATION AND INFRASTRUCTURE TEMPLATE MANAGEMENT TO EASILY CREATE SECURE APPLICATIONS FOR ENTERPRISES
#98CONTROLLING ACCESS TO DATA IN A CLOUD-BASED SOFTWARE PLATFORM BASED ON APPLICATION AUTHORIZATION
#99GENERATING DATA PLANES FOR PROCESSING OF DATA WORKLOADS
#100VISUAL DISCOVERY TOOL FOR AUTOMOTIVE MANUFACTURERS WITH NETWORK ENCRYPTION, DATA CONDITIONING, AND PREDICTION ENGINE
#101PROXIMITY-BASED CONTENT VISIBILITY CONTROL
#102Object Movement Method, Apparatus and Electronic Device
#103CONTROL METHOD, SERVER, RECORDING MEDIUM, AND SECURITY ANALYSIS SYSTEM
#104INTEGRATION OF A BLOCK CHAIN, MANAGING GROUP AUTHORITY AND ACCESS IN AN ENTERPRISE ENVIRONMENT
#105MANAGEMENT AND CONTROL OF MOBILE COMPUTING DEVICE USING LOCAL AND REMOTE SOFTWARE AGENTS
#106SYSTEMS AND METHODS FOR BLOCKCHAIN WALLET OWNER VERIFICATION AND ACCESS MANAGEMENT
#107INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND COMPUTER READABLE RECORDING MEDIUM
#108DATA MANAGEMENT SYSTEM, DATA MANAGEMENT SERVER, DATA MANAGEMENT METHOD, DATA MANAGEMENT PROGRAM, AND RECORDING MEDIUM
#109SENSITIVE DATA PROTECTION
#110CONTROLLING ACCESS TO DATA IN A CLOUD-BASED SOFTWARE PLATFORM BASED ON DATA SCHEMAS
#111CONTROLLING ACCESS TO DATA IN A CLOUD-BASED SOFTWARE PLATFORM BASED ON USER ROLES
#112DATA ACCESS UNDER REGULATORY CONSTRAINTS
#113STORING AND RETRIEVING DATA BASED ON EXPERIENCE IN CATEGORIES ASSOCIATED WITH HISTORICAL INTERACTIONS
#114BUILDING ANNOTATED MODELS BASED ON EYES-OFF DATA
#115METHOD AND SYSTEM FOR AUTOMATIC DATA PROTECTION FOR LIMITED ACCESS CLOUD DATA
#116DIGITAL KEY PROFILE HIERARCHY
#117METHOD FOR DEFINITION, CONSUMPTION, AND CONTROLLED ACCESS OF DPU RESOURCES AND SERVICES
#118SYSTEMS AND METHODS FOR A DATA-DRIVEN WORKFLOW PLATFORM
#119PERMISSION-BASED INDEX FOR QUERY PROCESSING
#120SYSTEMS, DEVICES, AND METHODS FOR SUBSCRIPTION MANAGEMENT SERVICES
#121PROVIDING ENHANCED FUNCTIONALITY IN AN INTERACTIVE ELECTRONIC TECHNICAL MANUAL
#122PROVIDING ENHANCED FUNCTIONALITY IN AN INTERACTIVE ELECTRONIC TECHNICAL MANUAL
#123METHOD AND APPARATUS FOR A REPORT CONNECTOR
#124BLOCKCHAIN-BASED SYSTEM AND METHOD FOR PREVENTING UNAUTHORIZED DELETION OF SURVEILLANCE VIDEO
#125BROWSER EXTENSION TO DETECT CLOUD UPLOADS
#126HOLISTIC EVALUATION OF VULNERABILITIES IN A VULNERABILITY CHAIN
#127MONITORING APPARATUS AND SYSTEM
#128SYSTEMS AND METHODS OF COMMUNICATING ELECTRONIC DATA TRANSACTION UPDATES TO CLIENT COMPUTER SYSTEMS
#129PROVIDING ENHANCED FUNCTIONALITY IN AN INTERACTIVE ELECTRONIC TECHNICAL MANUAL
#130PROVING WHETHER SOFTWARE FUNCTIONALITY HAS CHANGED FOLLOWING A SOFTWARE CHANGE
#131DETERMINING COLLABORATION RECOMMENDATIONS FROM FILE PATH INFORMATION
#132Inhibiting Memory Disclosure Attacks using Destructive Code Reads
#133THIRD PARTY RESOLUTION OF TEMPLATE PARAMETERS DURING AUTOMATED DOCUMENT GENERATION PROCESSING
#134SYSTEM AND METHOD FOR SECURITY CONTROL IN CYBER-PHYSICAL SYSTEMS WITH DELAY-INDUCED FEEDBACK WATERMARKING
#135SYSTEMS AND METHODS FOR ALGORITHM VALIDATION IN A ZERO-TRUST ENVIRONMENT
#136Container Storage Interface Filter Driver-Based Security for a Storage System
#137SECURE COMMUNICATION IN MOBILE DIGITAL PAGES
#138SYSTEMS AND METHODS FOR GENERATING A FILTERED DATA SET
#139MANIPULATING INTER-CHIP COMMUNICATIONS FOR IoT SECURITY
#140Dynamic Data Storage Based on Estimated Update Frequency
#141Targeted Content Distribution Over a Network
#142SYSTEMS AND METHODS OF SECURE NETWORKED DATA EXCHANGE
#143SYSTEMS AND METHODS FOR RESPONSIBLE AI
#144THIN NETWORK-BASED RESOURCE INTEGRATION
#145GENERATING CONTENT COLLECTIONS FROM DIGITAL CONTENT CLUSTERS
#146SECURE ACCESS DEVICE WITH MULTIPLE AUTHENTICATION MECHANISMS
#147COORDINATION OF OVERLAPPING PROCESSING OF AUDIO QUERIES
#148HANDLING OF DATABASE ENCRYPTION KEY REVOCATION
#149DATA AGGREGATION SYSTEM FOR ENABLING QUERY OPERATIONS ON RESTRICTED DATA THAT ORIGINATES FROM MULTIPLE INDEPENDENT MULTIPLE SOURCES
#150GRAPH OBJECT STORAGE AND ACCESS CONTROL SYSTEM AND METHOD
#151RUNTIME APPLICATION SELF-PROTECTION
#152AUTOMATIC MANAGEMENT OF USER PERMISSIONS
#153Method and system for identifying data and managing access thereto across multiple data platforms
#154DATA AUTHORIZATION EVALUATION FRAMEWORK
#155Managing Workspaces for Computing Devices
#156SYSTEMS AND METHODS OF PROTECTING SECRETS IN USE WITH CONTAINERIZED APPLICATIONS
#157RAISEABLE PROFILE-BASED ACCESS FOR MEDIA CONTENT
#158MAPPING OF TENANT-SPECIFIC DATABASE SESSIONS TO WORKLOAD CLASSES
#159SYSTEMS AND METHODS FOR OBJECTIVE-BASED SCORING USING MACHINE LEARNING TECHNIQUES
#160TOKEN-BASED DATA SECURITY SYSTEMS AND METHODS WITH EMBEDDABLE MARKERS IN UNSTRUCTURED DATA
#161DATA MANAGEMENT DEVICE, DATA SHARING SYSTEM AND METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
#162DATA SECURITY PROCESSING METHOD AND APPARATUS
#163REPLACING DISTINCT DATA IN A RELATIONAL DATABASE WITH A DISTINCT REFERENCE TO THAT DATA AND DISTINCT DE-REFERENCING OF DATABASE DATA
#164COMPUTER-READABLE RECORDING MEDIUM STORING DATABASE MANAGEMENT PROGRAM, DATABASE MANAGEMENT METHOD, AND INFORMATION PROCESSING DEVICE
#165SYSTEM AND METHOD FOR MULTIFACTOR PRIVACY RATING
#166APPARATUS AND METHOD FOR DEFINING AREA OF AUTHORITY FOR USER ACCESS RIGHTS
#167SYSTEM AND METHOD FOR PROVIDING PROTECTED DATA STORAGE IN DATA MEMORY
#168Verification of Access Permissions
#169HIERARCHICAL PERMISSIONS MODEL FOR CASE MANAGEMENT
#170Web Access Management System
#171ELECTRONIC APPARATUS AND METHOD FOR VERIFYING ENCRYPTED DATA
#172SECURE SEARCH METHOD, SYSTEM THEREOF, APPARATUS THEREOF, ENCRYPTION APPARATUS, SEARCHER TERMINAL, AND PROGRAM
#173Multi-Computer System for Data Privacy and Governance
#174SYSTEMS, METHODS, AND APPARATUS FOR MEMORY PROTECTION FOR COMPUTATIONAL STORAGE DEVICES
#175SYSTEMS AND METHODS OF GENERATING AN ENGAGEMENT PROFILE
#176SYSTEM AND METHOD FOR INTERNET ACTIVITY AND HEALTH FORECASTING AND INTERNET NOISE ANALYSIS
#177BI-DIRECTIONAL DATA SHARING BETWEEN PRIVATE AND PUBLIC CLOUDS
#178SOFTWARE-DEFINED CONTROL OF SERVICE ACCESS IN DISTRIBUTED SYSTEMS
#179VERIFICATION METHOD, SERVER, AND RECORDING MEDIUM
#180EXPLORATION AND ACCESS TO ELECTRONIC DATA ASSETS
#181EDGE DEVICE COMPLIANCE
#182DISTRIBUTED FILE SYSTEM WITH SECURE MULTI-PARTY ACCESS
#183IMPLEMENTING INHERITED GRANTS USING SECURE SCHEMAS
#184NATIVE MULTI-TENANT ROW TABLE ENCRYPTION
#185A CYBERSECURITY VULNERABILITY MANAGEMENT SYSTEM AND METHOD THEREOF
#186SYSTEMS AND METHODS FOR A VIRTUAL SANDBOX DATABASE
#187MUSIC SELECTION SYSTEM AND METHOD
#188DATA SECURITY SYSTEMS AND METHODS
#189ENTERPRISE DOCUMENT CLASSIFICATION
#190INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND RECORDING MEDIUM RECORDED WITH PROGRAM
#191FILE SYSTEM METADATA PROTECTION
#192Applying Multi-Faceted Trust Scores for Decision Making Using a Decision Table and Predetermined Action Triggering
#193DATA COLLABORATION WITH SOVEREIGNTY
#194CONFIGURATION METHOD, DATA INTEGRATION METHOD, APPARATUS, DEVICE, AND STORAGE MEDIUM OF DATA INTEGRATION STRATEGY
#195DATA PROTECTION SYSTEM
#196TAKING SNAPSHOTS WITH INTEGRITY OF SECURE WORKSPACES HAVING DISTRIBUTED CACHE
#197E-MAIL ADDRESS VERIFICATION
#198CREATOR-PROTECTED COPIES IN STORAGE SYSTEMS
#199METHOD FOR DATA COMPRESSION AND ENCRYPTION
#200TESTING OF SECURITY SYSTEMS IN INTEGRATED CIRCUITS
#201Augmenting Handling of Logs Generated in PaaS Environments
#202SYSTEMS AND METHODS FOR FILTERING ELECTRONIC ACTIVITIES BY PARSING CURRENT AND HISTORICAL ELECTRONIC ACTIVITIES
#203SYSTEMS AND METHODS FOR IDENTIFYING AND MAPPING SENSITIVE DATA ON AN ENTERPRISE
#204MEDIA STREAMING
#205SECURE COLLABORATIVE LABORATORY DATA ANALYTICS SYSTEM
#206MANAGING ACCESS TO DATA STORED ON A TERMINAL DEVICE
#207ENABLING PERSISTENCE IN A VOLATILE SECURE WORKSPACE
#208BLOCKCHAIN-ENFORCED DATA ACCESS CONTROL
#209SYSTEMS FOR TIME DEPENDENT DATA ACCESS AUTHORIZATION
#210DATA ACCESS CONTROL FOR USER DEVICES USING A BLOCKCHAIN
#211SECURITY SYSTEM AND METHOD FOR REAL-TIME ENCRYPTION OR DECRYPTION OF DATA USING KEY MANAGEMENT SERVER
#212PARALLEL EXECUTION OF A SET OF AUDITED PRIVILEGED ACTIONS ACROSS WORKER NODES
#213SECURE DIGITAL FINGERPRINT KEY OBJECT DATABASE
#214DEVICE FOR RESOURCE DISPENSING USING ALTERNATIVE COMMUNICATION RAILS
#215TOKEN-BASED DATA SECURITY SYSTEMS AND METHODS WITH CROSS-REFERENCING TOKENS IN FREEFORM TEXT WITHIN STRUCTURED DOCUMENT
#216SYSTEMS AND METHODS FOR AUTO DISCOVERY OF SENSITIVE DATA IN APPLICATIONS OR DATABASES USING METADATA VIA MACHINE LEARNING TECHNIQUES
#217APPARATUSES, SYSTEMS, AND METHODS FOR PROVIDING ACCESS RIGHTS MANAGEMENT IN A BUILDING GRAPH
#218ACCESS CONTROL VERIFICATION IN KNOWLEDGE GRAPHS BY UTILIZING DYNAMIC NODE-BASED ACCESS CONTROL CACHES
#219ON-DEMAND OPERATIONAL AIRGAP POLICY - VALUE THRESHOLD
#220Information Acquisition, Filtering and Analyzing System and Method
#221VERSION CONTROL SYSTEM USING CONTENT-BASED DATASETS AND DATASET SNAPSHOTS
#222DYNAMIC AND SECURE ACCESS TO UEFI SERVICES BASED ON INDICATOR OF ATTACK DRIVER
#223CLASSIFIER AND CLASSIFIER BEHAVIOR MANAGER FOR DATA MANAGEMENT USING CONTENT-BASED DATASETS
#224MULTI-NETWORK DATA MANAGEMENT USING CONTENT-BASED DATASETS AND DISTRIBUTED TAGGING
#225DATASET LIFECYCLE MANAGEMENT USING MONITORING AND ACL CONTROL FOR CONTENT-BASED DATASETS
#226ACCESS CONTROL LIST (ACL) AND ROLE-BASED ACCESS CONTROL (RBAC) MANAGEMENT USING CONTENT-BASED DATASETS
#227SERVICE AND SYSTEM INTEGRATION
#228ACCESS CONTROLS FOR MODELLED CONTENT USING NAMESPACES
#229SECURELY EXECUTING CLIENT CODE IN A SHARED INFRASTRUCTURE
#230Encryption Key Management Using Content-Based Datasets
#231COMBINED STRUCTURE AND IMPORT BEHAVIOR SIGNATURES BASED MALWARE LEARNING AND DETECTION
#232Method and System for Remote Data Access
#233METHODS AND APPARATUS FOR AUTOMATIC CREATION AND ACCESS TO FAVORITE PERSONAL CLOUD DATA
#234TECHNOLOGIES FOR DIVIDING WORK ACROSS ACCELERATOR DEVICES
#235METHOD OF LIVE EVENT TICKETING WITH PRIORITIZED LINK FOR SEATING REARRANGEMENT
#236INTEGRATION OF A BLOCK CHAIN, MANAGING GROUP AUTHORITY AND ACCESS IN AN ENTERPRISE ENVIRONMENT
#237MANAGEMENT AND CONTROL OF MOBILE COMPUTING DEVICE USING LOCAL AND REMOTE SOFTWARE AGENTS
#238MACHINE LEARNING FOR IDENTITY ACCESS MANAGEMENT
#239DATA MANAGEMENT SYSTEM, DATA MANAGEMENT SERVER, DATA MANAGEMENT METHOD, DATA MANAGEMENT PROGRAM, AND RECORDING MEDIUM
#240STORING AND RETRIEVING DATA BASED ON EXPERIENCE IN CATEGORIES ASSOCIATED WITH HISTORICAL INTERACTIONS
#241GENERATING DATA PLANES FOR PROCESSING OF DATA WORKLOADS
#242BUILDING ANNOTATED MODELS BASED ON EYES-OFF DATA
#243METHOD AND SYSTEM FOR AUTOMATIC DATA PROTECTION FOR LIMITED ACCESS CLOUD DATA
#244DIGITAL KEY PROFILE HIERARCHY
#245METHOD FOR DEFINITION, CONSUMPTION, AND CONTROLLED ACCESS OF DPU RESOURCES AND SERVICES
#246SHARING INFORMATION BETWEEN NEXUSES THAT USE DIFFERENT CLASSIFICATION SCHEMES FOR INFORMATION ACCESS CONTROL
#247SYSTEMS AND METHODS FOR A DATA-DRIVEN WORKFLOW PLATFORM
#248PERMISSION-BASED INDEX FOR QUERY PROCESSING
#249DETERMINATION METHOD, DETERMINATION APPARATUS, COMMUNICATION SYSTEM, AND PROGRAM
#250PROVIDING A GRAPHICAL REPRESENTATION OF ANOMALOUS EVENTS
#251IMMUTABLE LOGGING OF ACCESS REQUESTS TO DISTRIBUTED FILE SYSTEMS
#252SYSTEMS AND METHODS FOR HARD DELETION OF DATA ACROSS SYSTEMS
#253TRANSMISSION DEVICE AND COMMUNICATION SYSTEM
#254SYSTEM AND METHOD FOR USING UNIQUE DEVICE IDENTIFIERS TO ENHANCE SECURITY
#255METHODS FOR DYNAMIC PLATFORM SECURITY CONFIGURATION
#256Systems and Methods for Managing Access to Confidential Data
#257SIMULATION OF EDGE COMPUTING NODES FOR HCI PERFORMANCE TESTING
#258INGESTION LAYER FOR IMPROVED SECURITY OF DISTRIBUTED INFORMATION
#259LABELING METHOD FOR INFORMATION SECURITY DETECTION RULES AND TACTIC, TECHNIQUE AND PROCEDURE LABELING DEVICE FOR THE SAME
#260ACCESS CONTROL FOR CONTENT DELIVERY SERVICES
#261SERVER FOR INGESTING AND UPDATING RENDERABLE DATA OBJECTS FROM A FLAT FILE SERVER
#262GENERATING A SECURE UPLOAD URL AND GRANTING ACCESS TO A USER WITHIN A SECURE DOCUMENT SYSTEM
#263SECURED DATABASE RESTORATION ACROSS SERVICE REGIONS
#264CLOUD COMPUTING ENVIRONMENT FOR BIOLOGICAL DATA
#265HORIZONTAL FEDERATED FOREST VIA SECURE AGGREGATION
#266PRIVACY PRESERVATION IN NEURAL NETWORKS
#267DATA MANAGEMENT SYSTEM, DATA MANAGEMENT SERVER, DATA MANAGEMENT METHOD, DATA MANAGEMENT PROGRAM, AND RECORDING MEDIUM
#268SYSTEM AND METHOD FOR MEMORY-LESS ANOMALY DETECTION USING AN AUTOENCODER
#269SYSTEM AND METHOD FOR MEMORY-LESS ANOMALY DETECTION USING ANOMALY LEVELS
#270COPY PREVENTION OF DIGITAL SAMPLE IMAGES
#271ACCESS CONTROL SYSTEM FOR IMPLEMENTING ACCESS RESTRICTIONS OF REGULATED DATABASE RECORDS WHILE IDENTIFYING AND PROVIDING INDICATORS OF REGULATED DATABASE RECORDS MATCHING VALIDATION CRITERIA
#272Generating data dictionary metadata
#273Authenticating a File System Within Untrusted Storage
#274IMPROVED COALESCENCE OF ROLES FOR ROLE-BASED ACCESS CONTROL
#275Automatic Classification of Files with Hierarchical Structure with the Digital Fingerprints Library
#276DECENTRALIZED DATA PLATFORM
#277PROVIDING ENHANCED FUNCTIONALITY IN AN INTERACTIVE ELECTRONIC TECHNICAL MANUAL
#278SAFE CONTENT DISCOVERY
#279TECHNIQUES FOR AGENTLESS DETECTION OF SENSITIVE DATA ON MANAGED DATABASES
#280ENCRYPTED INFORMATION RETRIEVAL
#281CONTENT TAGGING AND LIMITED SHARING
#282SMART CONTENT LOAD
#283ROW-LEVEL SECURITY
#284INFORMATION PROCESSING METHOD AND APPARATUS, TERMINAL, AND STORAGE MEDIUM
#285DEVICE MANAGEMENT SYSTEM AND COMPUTING SYSTEM
#286IMAGE PROCESSING APPARATUS, IMAGE PROCESSING METHOD, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM
#287SYSTEM AND METHOD FOR AGGREGATING VIEWABLE CONTENT FROM MULTIPLE SOURCES VIA USER-FRIENDLY INTERFACE
#288DATASET PRIVACY MANAGEMENT SYSTEM
#289SYSTEMS AND METHODS FOR GENERATING FILE SYSTEMS OF DATA SOURCES INCOMPATIBLE WITH ANTI-VIRUS SCANNERS
#290MUTUAL TRANSPORT LAYER SECURITY (TLS) VERIFICATION USING AN AUTHORIZED VIEWER
#291ASSOCIATING CONFIDENTIAL INFORMATION WITH A DOCUMENT SEPARATE THEREFROM
#292DATA INTEGRITY MANAGEMENT IN A COMPUTER NETWORK, INCLUDING SYSTEM THAT ENABLES ROBUST POINT-IN TIME DIGITAL EVIDENCE GENERATION
#293ORGANIZATION HIERARCHY SYSTEMS AND METHODS
#294SMART PRIVILEGE ESCALATION IN A CLOUD PLATFORM
#295Hosted email authentication
#296DYNAMIC DATA SECURITY REQUIREMENTS IN A NETWORK
#297INTEGRATED CONTENT PORTAL FOR ACCESSING AGGREGATED CONTENT
#298INFORMATION PROCESSING DEVICE
#299ELECTRONIC DEVICE AND METHOD OF PROVIDING CONTENT SHARING BASED ON OBJECT
#300Digital Property Authentication and Management System