G06F2221/2101 - CPC Classification

Classification description:

Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity; Indexing scheme relating to and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity Auditing as a secondary aspect

Recent Application in this class:
#1
20240291793
2024-08-29

Electronic Messaging System for Mobile Devices with Reduced Traceability of Electronic Messages

#2
20240281726
2024-08-22

Complex Application Attack Quantification, Testing, Detection and Prevention

#3
20240273215
2024-08-15

SYSTEM AND METHOD FOR CREATING AND EXECUTING BREACH SCENARIOS UTILIZING VIRTUALIZED ELEMENTS

#4
20240265096
2024-08-08

SYSTEMS AND METHODS FOR EVENT-BASED APPLICATION CONTROL

#5
20240249587
2024-07-25

SYSTEMS AND METHODS FOR PROVIDING ACCESS TO WIRELESS GAMING DEVICES

#6
20240248981
2024-07-25

Security Techniques for Device Assisted Services

#7
20240244063
2024-07-18

PROACTIVE SUSPICIOUS ACTIVITY MONITORING FOR A SOFTWARE APPLICATION FRAMEWORK

#8
20240236146
2024-07-11

METHODS AND APPARATUS FOR DETECTING A PRESENCE OF A MALICIOUS APPLICATION

#9
20240220631
2024-07-04

SYSTEMS AND METHODS FOR CYBERSECURITY RISK ASSESSMENT

#10
20240220424
2024-07-04

BLOCK OR PAGE LOCK FEATURES IN SERIAL INTERFACE MEMORY

#11
20240214285
2024-06-27

APPLICATION MONITORING PRIORITIZATION

#12
20240214217
2024-06-27

METHODS AND APPARATUS TO COLLECT DISTRIBUTED USER INFORMATION FOR MEDIA IMPRESSIONS AND SEARCH TERMS

#13
20240205118
2024-06-20

SYSTEM AND METHOD OF ASSIGNING REPUTATION SCORES TO HOSTS

#14
20240202714
2024-06-20

METHODS AND SYSTEMS FOR PROCESSING TRANSACTIONS ON A VALUE DISPENSING DEVICE USING A MOBILE DEVICE

#15
20240202356
2024-06-20

METHODS FOR VERIFYING DATABASE QUERY RESULTS AND DEVICES THEREOF

#16
20240193301
2024-06-13

TAGGING AND AUDITING SENSITIVE INFORMATION IN A DATABASE ENVIRONMENT

#17
20240193296
2024-06-13

METHODS FOR VERIFYING DATABASE QUERY RESULTS AND DEVICES THEREOF

#18
20240187393
2024-06-06

NETWORK RESOURCE ACCESS CONTROL METHODS AND SYSTEMS USING TRANSACTIONAL ARTIFACTS

#19
20240163188
2024-05-16

ROUND TRIP TIME (RTT) MEASUREMENT BASED UPON SEQUENCE NUMBER

#20
20240152581
2024-05-09

DETECTING UNAUTHORIZED ACCESS TO DIGITAL CONTENT USING FORENSIC WATERMARKING

#21
20240143811
2024-05-02

DATASET LIFECYCLE MANAGEMENT USING MONITORING AND ACL CONTROL FOR CONTENT-BASED DATASETS

#22
20240143737
2024-05-02

AUTOMATED GENERATION OF LABELED TRAINING DATA

#23
20240126910
2024-04-18

PROVIDING A GRAPHICAL REPRESENTATION OF ANOMALOUS EVENTS

#24
20240126841
2024-04-18

DETECTING UNAUTHORIZED ACCESS TO DIGITAL CONTENT USING DIGITAL CREDENTIAL ACCESS CONTROL

#25
20240119126
2024-04-11

DETECTING UNAUTHORIZED ACCESS TO DIGITAL CONTENT USING NEARBY DEVICE DETECTION

#26
20240119125
2024-04-11

DETECTING UNAUTHORIZED ACCESS TO DIGITAL CONTENT USING SONIC SIGNAL CONFIRMATION

#27
20240111889
2024-04-04

METHODS AND SYSTEMS FOR MANAGING DATA IN A DATABASE MANAGEMENT SYSTEM

#28
20240111888
2024-04-04

Methods for verifying vector database query results and devices thereof

#29
20240111841
2024-04-04

DETECTING UNAUTHORIZED ACCESS TO DIGITAL CONTENT USING USAGE PATTERN DETECTION

#30
20240104237
2024-03-28

SUBJECT LOGGING

#31
20240095380
2024-03-21

BLOCKCHAIN TECHNOLOGY FOR REGULATORY COMPLIANCE OF DATA MANAGEMENT SYSTEMS

#32
20240095368
2024-03-21

AUTOMATED TRUST CENTER FOR REAL-TIME SECURITY AND COMPLIANCE MONITORING

#33
20240095319
2024-03-21

USE-BASED SECURITY CHALLENGE AUTHENTICATION

#34
20240089266
2024-03-14

DELAYED AND PROVISIONAL USER AUTHENTICATION FOR MEDICAL DEVICES

#35
20240089121
2024-03-14

SYSTEMS AND METHODS FOR DIGITAL CERTIFICATE SECURITY

#36
20240086569
2024-03-14

SYSTEMS, METHODS, AND APPARATUSES FOR IDENTIFYING UNAUTHORIZED USE OF A USER'S AUTHENTICATION CREDENTIALS TO AN ELECTRONIC NETWORK BASED ON NON-PUBLIC DATA ACCESS

#37
20240078348
2024-03-07

SYSTEM FOR FORENSIC TRACING OF MEMORY DEVICE CONTENT ERASURE AND TAMPERING

#38
20240077969
2024-03-07

GESTURE RECOGNITION DEVICES AND METHODS

#39
20240020356
2024-01-18

PAIRING DEVICES TO PREVENT DIGITAL CONTENT MISUSE

#40
20240015084
2024-01-11

POLICY UTILIZATION ANALYSIS

#41
20240006030
2024-01-04

SECURE COMPUTING SYSTEMS AND METHODS

#42
20240005025
2024-01-04

Methods for verifying database query results and devices thereof

#43
20240004970
2024-01-04

IDENTIFICATION OF A USER REQUESTING AN ELECTRONIC DOCUMENT

#44
20230421585
2023-12-28

DIGITAL SAFETY AND ACCOUNT DISCOVERY

#45
20230421387
2023-12-28

SYSTEMS AND METHODS OF SECURE PROVENANCE FOR DISTRIBUTED TRANSACTION DATABASES

#46
20230418928
2023-12-28

CONTEXT-BASED SECURE CONTROLLER OPERATION AND MALWARE PREVENTION

#47
20230388290
2023-11-30

SECURE FEATURE AND KEY MANAGEMENT IN INTEGRATED CIRCUITS

#48
20230388264
2023-11-30

Sender-correlated reply ID generation in electronic messaging system

#49
20230388108
2023-11-30

SYSTEMS AND METHODS FOR SELECTIVE ACCESS TO LOGS

#50
20230385436
2023-11-30

METHOD AND APPARATUS FOR PROTECTING COMPUTERS

#51
20230377692
2023-11-23

METHODS AND SYSTEMS FOR STORING GENOMIC DATA IN A FILE STRUCTURE COMPRISING AN INFORMATION METADATA STRUCTURE

#52
20230376589
2023-11-23

MULTI-MODALITY ATTACK FORENSIC ANALYSIS MODEL FOR ENTERPRISE SECURITY SYSTEMS

#53
20230362186
2023-11-09

SYSTEM AND METHOD FOR PERFORMING REMOTE SECURITY ASSESSMENT OF FIREWALLED COMPUTER

#54
20230359754
2023-11-09

SYSTEMS AND METHODS FOR DATA CLASSIFICATION AND GOVERNANCE

#55
20230342502
2023-10-26

METHOD AND SYSTEM FOR PREVENTING UNAUTHORIZED PROCESSOR MODE SWITCHES

#56
20230342495
2023-10-26

SELECTIVELY PERMISSIONED DATA ACCESS STORAGE AND METHOD

#57
20230334182
2023-10-19

Managing registry access on a computer device

#58
20230334168
2023-10-19

TIERED DATA SHARING PRIVACY ASSURANCE

#59
20230325525
2023-10-12

SYSTEMS AND METHODS FOR SECURING AND DISSEMINATING TIME SENSITIVE INFORMATION USING A BLOCKCHAIN

#60
20230325518
2023-10-12

Open source library security rating

#61
20230325506
2023-10-12

Methods and Systems for Implementing Automated Controls Assessment in Computer Systems

#62
20230325173
2023-10-12

Virtualized file server user views

#63
20230315846
2023-10-05

SYSTEM AND METHOD FOR DETECTING LEAKED DOCUMENTS ON A COMPUTER NETWORK

#64
20230315845
2023-10-05

PROTECTING A COMPUTER DEVICE FROM ESCALATION OF PRIVILEGE ATTACKS

#65
20230315841
2023-10-05

EVENT DATA PROCESSING

#66
20230306109
2023-09-28

STRUCTURED STORAGE OF ACCESS DATA

#67
20230300044
2023-09-21

UNIQUE ID GENERATION FOR SENSORS

#68
20230289170
2023-09-14

Virtualized file server distribution across clusters

#69
20230281306
2023-09-07

SYSTEM AND METHOD FOR DETECTING LEAKED DOCUMENTS ON A COMPUTER NETWORK

#70
20230281001
2023-09-07

SELF-HEALING VIRTUALIZED FILE SERVER

#71
20230269212
2023-08-24

Electronic messaging system for mobile devices with reduced traceability of electronic messages

#72
20230267210
2023-08-24

DATA CONFIDENCE AND SOFTWARE DEVELOPMENT OPERATIONS

#73
20230244807
2023-08-03

CONTROLLING ACCESS TO DATASETS DESCRIBED IN A CRYPTOGRAPHICALLY SIGNED RECORD

#74
20230239162
2023-07-27

Methods and apparatus to collect distributed user information for media impressions and search terms

#75
20230237149
2023-07-27

Systems and methods for event-based application control

#76
20230230020
2023-07-20

Data Validation in a Mobile Communication Network

#77
20230229792
2023-07-20

RUNTIME RISK ASSESSMENT TO PROTECT STORAGE SYSTEMS FROM DATA LOSS

#78
20230222240
2023-07-13

Governed database connectivity (GDBC) through and around data catalog to registered data sources

#79
20230214479
2023-07-06

METHOD AND SYSTEM FOR DETECTING AND PREVENTING UNAUTHORIZED ACCESS TO A COMPUTER

#80
20230205902
2023-06-29

CALCULATING AND REPORTING COLLABORATION SYSTEM RISKS

#81
20230205890
2023-06-29

Systems and methods for unified cyber threat intelligence searching

#82
20230185940
2023-06-15

BATCH PROCESSING OF AUDIT RECORDS

#83
20230164179
2023-05-25

Systems and methods for artificial model building techniques

#84
20230153442
2023-05-18

System and method for creating and executing breach scenarios utilizing virtualized elements

#85
20230153418
2023-05-18

Context-based secure controller operation and malware prevention

#86
20230153404
2023-05-18

DETERMINING THE TECHNICAL MATURITY OF A SYSTEM USER TO USE AS A RISK INDICATOR WHEN AUDITING SYSTEM ACTIVITY

#87
20230147698
2023-05-11

SYSTEM AND METHOD FOR CONTROLLING DATA USING CONTAINERS

#88
20230147215
2023-05-11

Computerized system for complying with certain critical infrastructure protection requirements

#89
20230144033
2023-05-11

EDGE DAY ZERO SECURE INFRASTRUCTURE PROVISIONING WITH AUTONOMIC METHODS

#90
20230142344
2023-05-11

SECURING DATA LAKES VIA OBJECT STORE MONITORING

#91
20230139000
2023-05-04

Graphical user interface for presentation of network security risk and threat information

#92
20230136724
2023-05-04

SYSTEM & METHOD FOR MANAGING SEGREGATION OF DUTY IN INFORMATION TECHNOLOGY ACCESS MANAGEMENT

#93
20230123258
2023-04-20

Technologies for managing compromised sensors in virtualized environments

#94
20230120843
2023-04-20

Systems and methods for providing access to wireless gaming devices

#95
20230118204
2023-04-20

TRACKING MALICIOUS SOFTWARE MOVEMENT WITH AN EVENT GRAPH

#96
20230117846
2023-04-20

IDENTITY TIME MACHINE

#97
20230117120
2023-04-20

Providing a graphical representation of anomalous events

#98
20230103992
2023-04-06

REFLECTION RUNTIME PROTECTION AND AUDITING SYSTEM

#99
20230097884
2023-03-30

Proactive suspicious activity monitoring for a software application framework

#100
20230097577
2023-03-30

ARTIFICIAL INTELLIGENCE FOR REAL-TIME E-MAIL SENTIMENT ANALYSIS FOR BRAND PROTECTION

#101
20230090190
2023-03-23

DATA MANAGEMENT AND GOVERNANCE SYSTEMS AND METHODS

#102
20230082518
2023-03-16

Digital safety and account discovery

#103
20230081795
2023-03-16

Enforcing trusted application settings for shared code libraries

#104
20230079606
2023-03-16

Round trip time (RTT) measurement based upon sequence number

#105
20230073476
2023-03-09

Subject logging

#106
20230072760
2023-03-09

Systems and methods of secure provenance for distributed transaction databases

#107
20230062033
2023-03-02

Event Based Login And Password History

#108
20230040556
2023-02-09

SYSTEM AND METHOD FOR NETWORK POLICY SIMULATION

#109
20230037489
2023-02-09

Data Loss Prevention via dual mode Indexed Document Matching

#110
20230028382
2023-01-26

Systems and methods for digital certificate security

#111
20230021936
2023-01-26

Adaptive trust profile reference architecture

#112
20230014842
2023-01-19

Application monitoring prioritization

#113
20230011482
2023-01-12

METHODS AND APPARATUS TO COLLECT DISTRIBUTED USER INFORMATION FOR MEDIA IMPRESSIONS AND SEARCH TERMS

#114
20230004892
2023-01-05

NON-INTRUSIVE TECHNIQUES FOR DISCOVERING AND USING ORGANIZATIONAL RELATIONSHIPS

#115
20220414253
2022-12-29

AUDITING OF DATABASE SEARCH QUERIES FOR PRIVILEGED DATA

#116
20220407787
2022-12-22

System and method of detecting whether a source of a packet flow transmits packets which bypass an operating system stack

#117
20220405389
2022-12-22

IMAGE STEGANOGRAPHY DETECTION

#118
20220398342
2022-12-15

Tagging and auditing sensitive information in a database environment

#119
20220377280
2022-11-24

Hiding private user data in public signature chains for user authentication in video conferences

#120
20220368536
2022-11-17

SYSTEM FOR AUTHENTICATING VERIFIED PERSONAL CREDENTIALS

#121
20220353301
2022-11-03

Security techniques for device assisted services

#122
20220350592
2022-11-03

Virtualized file server disaster recovery

#123
20220350591
2022-11-03

VIRTUALIZED FILE SERVER DEPLOYMENT

#124
20220335125
2022-10-20

Protecting a computer device from escalation of privilege attacks

#125
20220327223
2022-10-13

METHOD AND SYSTEM FOR PROVIDING ACCESS CONTROL GOVERNANCE

#126
20220318416
2022-10-06

IDENTITY QUERY LANGUAGE SYSTEMS AND METHODS

#127
20220318415
2022-10-06

INTEGRITY AUDITING FOR MULTI-COPY STORAGE

#128
20220318379
2022-10-06

AUDIT LOG ENHANCEMENT

#129
20220318344
2022-10-06

Docker container based application licensing method, electronic device and medium

#130
20220311800
2022-09-29

Methods and apparatus for detecting a presence of a malicious application

#131
20220309165
2022-09-29

INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM

#132
20220292186
2022-09-15

Similarity analysis for automated disposition of security alerts

#133
20220284445
2022-09-08

APPARATUS FOR CUSTOMER AUTHENTICATION OF AN ITEM

#134
20220269833
2022-08-25

MAINTENANCE OF ACCESS FOR SECURITY ENABLEMENT ON A HOST SYSTEM

#135
20220263809
2022-08-18

METHOD AND SYSTEM FOR DIGITAL RIGHTS MANAGEMENT OF DOCUMENTS

#136
20220262219
2022-08-18

Eye Glasses with Individual User Awareness

#137
20220261504
2022-08-18

Managing registry access on a computer device

#138
20220232013
2022-07-21

Delayed and provisional user authentication for medical devices

#139
20220229903
2022-07-21

FEATURE EXTRACTION AND TIME SERIES ANOMALY DETECTION OVER DYNAMIC GRAPHS

#140
20220215091
2022-07-07

Method and system for detecting coordinated attacks against computing resources using statistical analyses

#141
20220207176
2022-06-30

SECURE DATA PROCESSING

#142
20220198034
2022-06-23

System and method for controlling data using containers

#143
20220198010
2022-06-23

TRACKING MALWARE ROOT CAUSES WITH AN EVENT GRAPH

#144
20220198009
2022-06-23

TRACKING MALWARE ROOT CAUSES WITH AN EVENT GRAPH

#145
20220182415
2022-06-09

ENFORCING SECURITY PARAMETERS SPECIFIED BY AN OWNER ON A BLOCKCHAIN PLATFORM

#146
20220179978
2022-06-09

Context Based Privacy Risk Footprint and Incident Protection

#147
20220179941
2022-06-09

Context-based secure controller operation and malware prevention

#148
20220179803
2022-06-09

Block or page lock features in serial interface memory

#149
20220173917
2022-06-02

Client authentication using split key signing on a blockchain platform

#150
20220167163
2022-05-26

System and method for implicit authentication

#151
20220166781
2022-05-26

SYSTEMS AND METHODS OF DETECTING AND RESPONDING TO RANSOMWARE ON A CLOUD-BASED FILE STORAGE SYSTEM BY IDENTIFYING A VOLUME OF CHANGES IN THE FILES STORED ON THE CLOUD-BASED FILESTORAGESYSTEM

#152
20220164465
2022-05-26

CONTROLLING ACCESS TO ELECTRONIC DATA ASSETS

#153
20220164414
2022-05-26

Pairing devices to prevent digital content misuse

#154
20220156396
2022-05-19

Cybersecurity active defense in a data storage system

#155
20220150262
2022-05-12

SYSTEMS AND METHODS OF DETECTING AND RESPONDING TO A RANSOMWARE ATTACK IMPACTING A CLOUD-BASED FILE STORAGE SERVICE

#156
20220147495
2022-05-12

Virtualized file server

#157
20220147342
2022-05-12

Virtualized file server smart data ingestion

#158
20220141103
2022-05-05

IDENTIFYING BOGON ADDRESS SPACES

#159
20220138334
2022-05-05

Secure management script deployment

#160
20220138325
2022-05-05

SECURE ENCLAVE PATHING CONFIGURATION FOR DATA CONFIDENCE FABRICS

#161
20220138323
2022-05-05

Methods and systems for implementing automated controls assessment in computer systems

#162
20220138285
2022-05-05

Pairing devices to prevent digital content misuse

#163
20220132266
2022-04-28

Notification of access control request and explanation indicative of the access control request on a communication device

#164
20220131773
2022-04-28

DATA CENTER TRAFFIC ANALYTICS SYNCHRONIZATION

#165
20220129584
2022-04-28

Methods and systems for monitoring a risk of re-identification in a de-identified database

#166
20220122097
2022-04-21

METHOD AND SYSTEM FOR PROVIDING BUSINESS INTELLIGENCE BASED ON USER BEHAVIOR

#167
20220116292
2022-04-14

SYSTEM AND METHOD FOR USER OPTIMIZED APPLICATION DEPENDENCY MAPPING

#168
20220109567
2022-04-07

Confirming receipt of audit records for audited use of a cryptographic key

#169
20220107834
2022-04-07

TASK ENGINE

#170
20220100821
2022-03-31

Apparatus and Method for Protecting Media Content Rights

#171
20220094539
2022-03-24

API and encryption key secrets management system and method

#172
20220094538
2022-03-24

Secure transfer of protected application storage keys with change of trusted computing base

#173
20220092181
2022-03-24

Ransomware attack monitoring

#174
20220091891
2022-03-24

METHOD, DEVICE, APPARATUS OF FEDERATED COMPUTING, AND STORAGE MEDIUM

#175
20220083694
2022-03-17

AUDITING SYSTEM

#176
20220083632
2022-03-17

Information processing apparatus and non-transitory computer readable medium

#177
20220075870
2022-03-10

System and method for scalable file filtering using wildcards

#178
20220075846
2022-03-10

Systems and methods of digital content certification and verification using cryptography and blockchain

#179
20220058272
2022-02-24

Systems and methods for cybersecurity risk assessment

#180
20220050914
2022-02-17

Systems and methods for securing and disseminating time sensitive information using a blockchain

#181
20220038353
2022-02-03

Technologies for annotating process and user information for network flows

#182
20220006623
2022-01-06

Systems and methods for selective access to logs

#183
20220004377
2022-01-06

Virtualized file server

#184
20210409270
2021-12-30

Dynamic configuration in cloud computing environments

#185
20210406396
2021-12-30

System and method for securing data through proctored working environment

#186
20210405983
2021-12-30

Smart contract mapping to trusted hardware in a data confidence fabric

#187
20210392059
2021-12-16

AUTO UPDATE OF SENSOR CONFIGURATION

#188
20210385243
2021-12-09

System and method for performing remote security assessment of firewalled computer

#189
20210383009
2021-12-09

Controlling access to datasets described in a cryptographically signed record

#190
20210377136
2021-12-02

System and method of assigning reputation scores to hosts

#191
20210366054
2021-11-25

System and method for embedding a data analytics system in a third party native environment

#192
20210365257
2021-11-25

VIRTUALIZED FILE SERVER DATA SHARING

#193
20210357926
2021-11-18

Methods and systems for processing transactions on a value dispensing device using a mobile device

#194
20210357526
2021-11-18

Using a secure enclave to satisfy retention and expungement requirements with respect to private data

#195
20210357489
2021-11-18

COMMUNICATION NETWORK BASED NON-FUNGIBLE TOKEN CREATION PLATFORM WITH INTEGRATED CREATOR BIOMETRIC AUTHENTICATION

#196
20210351935
2021-11-11

System for authenticating verified personal credentials

#197
20210351926
2021-11-11

Allowing restricted external access to devices

#198
20210349970
2021-11-11

APPLICATION PROTECTION ENFORCEMENT IN THE CLOUD

#199
20210336969
2021-10-28

Computerized system for complying with certain critical infrastructure protection requirements

#200
20210334827
2021-10-28

METHOD AND SYSTEM FOR INFLUENCING AUCTION BASED ADVERTISING OPPORTUNITIES BASED ON USER CHARACTERISTICS

#201
20210326462
2021-10-21

Open source library security rating

#202
20210319112
2021-10-14

Method and apparatus for implementing a release automation dashboard module

#203
20210297425
2021-09-23

Risk adaptive protection

#204
20210271758
2021-09-02

RANSOMWARE DETECTION AND DATA PRUNING MANAGEMENT

#205
20210271756
2021-09-02

System and method for detecting leaked documents on a computer network

#206
20210271340
2021-09-02

Gesture recognition devices and methods

#207
20210256825
2021-08-19

Anticipation and warning of potential loss/theft for portable personal items

#208
20210256166
2021-08-19

Method and system for preventing unauthorized processor mode switches

#209
20210248236
2021-08-12

Methods and systems for implementing automated controls assessment in computer systems

#210
20210247973
2021-08-12

Virtualized file server user views

#211
20210243093
2021-08-05

Round trip time (RTT) measurement based upon sequence number

#212
20210232714
2021-07-29

Systems and methods for managing content

#213
20210216649
2021-07-15

Systems and methods for analyzing, assessing and controlling trust and authentication in applications and devices

#214
20210211460
2021-07-08

Methods and apparatus for detecting a presence of a malicious application

#215
20210209894
2021-07-08

Systems and methods for providing access to wireless gaming devices

#216
20210209624
2021-07-08

ONLINE PLATFORM FOR PREDICTING CONSUMER INTEREST LEVEL

#217
20210209623
2021-07-08

METHOD AND SYSTEM FOR CREATING AN AUDIENCE LIST BASED ON USER BEHAVIOR DATA

#218
20210209225
2021-07-08

Methods and apparatus for control and detection of malicious content using a sandbox environment

#219
20210200848
2021-07-01

Systems and methods for creating a verified digital association

#220
20210185063
2021-06-17

Cyber-security presence monitoring and assessment

#221
20210185056
2021-06-17

In-vehicle network system, fraud-detection electronic control unit, and fraud-detection method

#222
20210184924
2021-06-17

Method for secure enrollment of devices in the industrial internet of things

#223
20210176145
2021-06-10

MDL-based clustering for dependency mapping

#224
20210173939
2021-06-10

System and method for creating and executing breach scenarios utilizing virtualized elements

#225
20210160157
2021-05-27

Technologies for annotating process and user information for network flows

#226
20210157849
2021-05-27

DETERMINING AN AUDIT LEVEL FOR DATA

#227
20210152443
2021-05-20

Technologies for annotating process and user information for network flows

#228
20210150064
2021-05-20

Method and system for storage-based intrusion detection and recovery

#229
20210150057
2021-05-20

Tagging and auditing sensitive information in a database environment

#230
20210144073
2021-05-13

Policy utilization analysis

#231
20210141630
2021-05-13

Virtualized file server distribution across clusters

#232
20210136580
2021-05-06

Systems and methods of electronic lock control and audit

#233
20210136110
2021-05-06

Systems and methods for artificial model building techniques

#234
20210133313
2021-05-06

Block device signature-based integrity protection for containerized applications

#235
20210110034
2021-04-15

Audit log enrichment

#236
20210097195
2021-04-01

Privacy-Preserving Log Analysis

#237
20210084053
2021-03-18

Using a story when generating inferences using an adaptive trust profile

#238
20210083880
2021-03-18

Systems and methods for digital certificate security

#239
20210075804
2021-03-11

Digital safety and account discovery

#240
20210075608
2021-03-11

Protecting sensitive information from an authorized device unlock

#241
20210073422
2021-03-11

Maintenance of access for security enablement on a host system

#242
20210073395
2021-03-11

Concurrent enablement of encryption on an operational path at a host port

#243
20210073394
2021-03-11

Concurrent enablement of encryption on an operational path at a storage port

#244
20210064732
2021-03-04

Authentication logging using circuitry degradation

#245
20210058387
2021-02-25

Secure feature and key management in integrated circuits

#246
20210044588
2021-02-11

Cloud architecture to secure privacy of personal data

#247
20210044560
2021-02-11

Electronic messaging system for mobile devices with reduced traceability of electronic messages

#248
20210043102
2021-02-11

Systems and methods for customizing a learning experience of a user

#249
20210037014
2021-02-04

Universal operating system

#250
20210034738
2021-02-04

Data correlation using file object cache

#251
20210026946
2021-01-28

Enforcing trusted application settings for shared code libraries

#252
20210021605
2021-01-21

Dynamic access control to network resources using federated full domain logon

#253
20210012005
2021-01-14

Tracking malicious software movement with an event graph

#254
20210006931
2021-01-07

Notification of access control request and explanation indicative of the access control request on a communication device

#255
20210006413
2021-01-07

Methods and apparatus to collect distributed user information for media impressions and search terms

#256
20210004838
2021-01-07

Apparatus for customer authentication of an item

#257
20200411139
2020-12-31

Secure computing systems and methods

#258
20200410515
2020-12-31

Method, system and computer readable medium for creating a profile of a user based on user behavior

#259
20200403981
2020-12-24

Method and system for digital rights management of documents

#260
20200396244
2020-12-17

Complex application attack quantification, testing, detection and prevention

#261
20200394295
2020-12-17

Systems and methods for event-based application control

#262
20200366685
2020-11-19

Delayed and provisional user authentication for medical devices

#263
20200358676
2020-11-12

Unique ID generation for sensors

#264
20200356689
2020-11-12

Controlling access to datasets described in a cryptographically signed record

#265
20200356681
2020-11-12

Open source library security rating

#266
20200356663
2020-11-12

Complex application attack quantification, testing, detection and prevention

#267
20200351298
2020-11-05

Complex application attack quantification, testing, detection and prevention

#268
20200351184
2020-11-05

Hierarchichal sharding of flows from sensors to collectors

#269
20200336325
2020-10-22

Display apparatus, terminal apparatus, and methods of controlling at least one peripheral device using same

#270
20200314054
2020-10-01

Reply ID generator for electronic messaging system

#271
20200313986
2020-10-01

Anomaly detection through header field entropy

#272
20200304463
2020-09-24

Method, apparatus, and system for detecting terminal security status

#273
20200304390
2020-09-24

Synthetic data for determining health of a network security system

#274
20200302055
2020-09-24

Information processing device, information processing method, and recording medium

#275
20200293683
2020-09-17

Tagging and auditing sensitive information in a database environment

#276
20200287872
2020-09-10

Method for detecting, blocking and reporting cyber-attacks against automotive electronic control units

#277
20200279051
2020-09-03

Internal controls engine and reporting of events generated by a network or associated applications

#278
20200274896
2020-08-27

System and method for performing remote security assessment of firewalled computer

#279
20200272642
2020-08-27

Information processing apparatus, information processing method, and non-transitory computer readable medium

#280
20200267066
2020-08-20

Application monitoring prioritization

#281
20200265150
2020-08-20

Cross-domain content-lifecycle management

#282
20200265146
2020-08-20

Embedded data protection and forensics for physically unsecure remote terminal unit (RTU)

#283
20200259836
2020-08-13

Providing control to tenants over user access of content hosted in cloud infrastructures

#284
20200250302
2020-08-06

Security control method and computer system

#285
20200250283
2020-08-06

Digital identity social graph

#286
20200244554
2020-07-30

System and method of detecting hidden processes by analyzing packet flows

#287
20200244468
2020-07-30

Flexible controls for certificates

#288
20200244455
2020-07-30

API and encryption key secrets management system and method

#289
20200242236
2020-07-30

Methods and apparatus for control and detection of malicious content using a sandbox environment

#290
20200236121
2020-07-23

Data protection automatic optimization system and method

#291
20200233976
2020-07-23

Data processing systems and methods for auditing data request compliance

#292
20200228574
2020-07-16

POLICY MANAGEMENT FOR DATA MIGRATION

#293
20200228426
2020-07-16

Data center traffic analytics synchronization

#294
20200226268
2020-07-16

Blockchain technology for regulatory compliance of data management systems

#295
20200218804
2020-07-09

System and method for detecting leaked documents on a computer network

#296
20200218230
2020-07-09

Authentication system and authentication method for executing a work process on an object

#297
20200213132
2020-07-02

Systems and methods of secure provenance for distributed transaction databases

#298
20200210618
2020-07-02

Data processing systems for measuring privacy maturity within an organization

#299
20200204533
2020-06-25

APPARATUS, METHOD, AND PROGRAM FOR VALIDATING USER

#300
20200202289
2020-06-25

Data validation in a mobile communication network