Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Sub-classes:SYSTEMS AND METHODS FOR DYNAMIC POLICY ASSIGNMENT OF SECURE COMMUNICATION SESSIONS USING SPDM
#2SYSTEMS AND METHODS FOR CLONING BMC PROFILES IN A CLUSTER ENVIRONMENT
#3INTEGRATED INSTANT MESSAGING SYSTEM WITH BUILT IN TRANSLATION AND METHOD THEREOF
#4APPARATUS FOR MANAGING QUANTUM KEY AND METHOD OF OPERATING SAME
#5PROVISIONING OF A SHIPPABLE STORAGE DEVICE AND INGESTING DATA FROM THE SHIPPABLE STORAGE DEVICE
#6WATER SEALING SURFACE ATTACHMENT
#7SYSTEMS AND METHODS FOR AUTHENTICATING DATA TRANSMISSIONS TO VEHICLES
#8USER AUTHENTICATED ENCRYPTED COMMUNICATION LINK
#9SECURE SCALABLE TRANSMISSION OF INAUDIBLE OR ULTRASOUND PACKET URL INSTRUCTIONS FOR SECOND SCREEN APPLICATIONS
#10METHOD AND SYSTEM FOR SECURE AND SYNCHRONOUS STORAGE AREA NETWORK (SAN) INFRASTRUCTURE TO SAN INFRASTRUCTURE DATA REPLICATION
#11CLASSICAL IMPLEMENTATION OF QUANTUM ENTANGLEMENT IN DATACENTER NETWORK DESIGN
#12Electronic Messaging System for Mobile Devices with Reduced Traceability of Electronic Messages
#13Secure Communication System And Software Architecture For A Digital License Plate
#14SYSTEM FOR SECURED ELECTRONIC DATA ACCESS THROUGH MACHINE-LEARNING BASED ANALYSIS OF COMBINED ACCESS AUTHORIZATIONS
#15SYSTEM, METHOD, AND COMPUTER PROGRAM FOR OAUTH OR OIDC OPTIMIZED REGISTRATION
#16METHOD AND APPARATUS FOR DYNAMIC DATA ENCRYPTION IN A COMMUNICATION SYSTEM WITH FORWARD SECRECY
#17BROADCAST ENCRYPTION WITH IMPROVED RESOURCE UTILIZATION
#18SYSTEM AND METHOD FOR SECURING AND CONTROLLING NATIONALLY PROTECTED WARGAME TRAINING DATA FLOWS THROUGH A SHARED NETWORK
#19ACCESS CONTROL AND OWNERSHIP TRANSFER OF DIGITAL CONTENT USING A DECENTRALIZED CONTENT FABRIC AND LEDGER
#20SHARING CRYPTOGRAPHIC SESSION KEYS AMONG A CLUSTER OF NETWORK SECURITY PLATFORMS MONITORING NETWORK TRAFFIC FLOWS
#21USER PLANE INTEGRITY PROTECTION
#22EDGE OPTIMIZED TRANSRATING SYSTEM
#23TRANSMITTING CONTENT DURING A NETWORKED CONFERENCE
#24VIRTUALIZED CONTROLLERS FOR IN-VEHICLE AND IOT NETWORKS
#25Secure Data Exchange Using Format-Preserving Encryption
#26Decrypting synthetic transactions with beacon packets
#27OFFLOAD OF ACKNOWLEDGEMENTS TO A NETWORK DEVICE
#28DIGITAL COMMUNICATION MODULE FOR TRANSMISSION OF DATA FROM A MEDICAL DEVICE
#29Access Control System for Electric Vehicle Charging
#30TRANSACTION AUTHORIZATION PROCESS USING BLOCKCHAIN
#31SECURE CONNECTIONS BETWEEN SERVERS IN A VIRTUAL PRIVATE NETWORK
#32METHODS AND SYSTEMS TO REDUCE THEFT IN GROUND-BASED CROP SPRAYING OPERATIONS
#33SECURING SENSITIVE INFORMATION DETERMINED IN AN INPUT MESSAGE
#34SYSTEM AND METHODS FOR USING CIPHER OBJECTS TO PROTECT DATA
#35INCIDENT COMMUNICATIONS NETWORK WITH DYNAMIC ASSET MARSHALING AND A MOBILE INTEROPERABILITY WORKSTATION
#36AUTOMATED SECURITY POLICY GENERATION FOR CONTROLLERS
#37LOGIC REPOSITORY SERVICE USING ENCRYPTED CONFIGURATION DATA
#38HYBRID MEDIA DISTRIBUTION FOR TELEHEALTH SESSIONS
#39SYSTEMS AND METHODS FOR TRANSMITTING ELECTRONIC DATA ACROSS NETWORKS
#40DATA TRANSMISSION METHOD, APPARATUS, SYSTEM, ELECTRONIC DEVICE AND READABLE MEDIUM
#41GENERATING KEYS FOR A CLUSTER OF NODES IN A SINGLE SECURITY ASSOCIATION
#42DATA OBJECT STORE AND SERVER FOR A CLOUD STORAGE ENVIRONMENT
#43SYSTEMS AND METHODS FOR ESTABLISHING, USING, AND RECOVERING UNIVERSAL DIGITAL IDENTIFIERS
#44Embedded Universal Integrated Circuit Card Supporting Two-Factor Authentication
#45METHODS AND SYSTEMS FOR SECURING CONTAINERIZED APPLICATIONS
#46METHODS AND SYSTEMS FOR GENERATING A SECURE COMMUNICATION CHANNEL INTERFACE FOR VIDEO STREAMING OF SENSITIVE CONTENT
#47COMMUNICATION SYSTEM, COMMUNICATION METHOD, AND PROGRAM
#48Optimizing I/O Operations For Compressed Data
#49Security Techniques for Device Assisted Services
#50DIGITAL LICENSE PLATE, SYSTEM AND METHOD FOR OPERATING SAME
#51METHODS TO STRENGTHEN CYBER-SECURITY AND PRIVACY IN A DETERMINISTIC INTERNET OF THINGS
#52SECURE DATA MIGRATION SERVICE ACROSS ON-PREMISE AND MULTI-CLOUD ENVIRONMENT(S)
#53TRUST-BASED APPLICATION TO APPLICATION CONNECTIVITY
#54SYSTEM AND METHODS FOR USING CIPHER OBJECTS TO PROTECT DATA
#55PROVIDING ACCESS WITH SEPARATE AUTHENTICATION TO SECURE CONTENT IN REPOSITORIES
#56METHOD AND SYSTEM FOR PERFORMING AUTHENTICATION AND OBJECT DISCOVERY FOR ON-PREMISES CLOUD SERVICE PROVIDERS
#57BI-DIRECTIONAL ENCRYPTION/DECRYPTION DEVICE FOR UNDERLAY AND OVERLAY OPERATIONS
#58ELECTRONIC DEVICE AND METHOD FOR UPLOADING DATA OF EXTERNAL ELECTRONIC DEVICE IN ELECTRONIC DEVICE
#59SECURE INTERFACES FOR NEURAL DEVICES
#60Pure Differentially Private Algorithms for Summation in the Shuffled Model
#61SYSTEM AND METHOD ENABLING NETWORKED SYSTEMS TO SAFELY USE DIGITAL CONTENT E.G. CODE
#62BUILDING AND USING ATTESTATION MODEL IN CONFIDENTIAL COMPUTING
#63SERVER-SIDE INITIATION OF DNS RESOLUTION
#64SYSTEM AND METHOD WITH REAL TIME MESSAGING
#65Method for Arranging a Shared Cryptographic Key and Method for Encrypted Communication, Computer Program Product and Device
#66IMPROVEMENTS IN OR RELATING TO DATA TRANSMISSION
#67PROXIMITY BASED AUTHENTICATION SYSTEM AND METHOD
#68DATA MANAGEMENT AND CONTROL IN EXTENDED REALITY EXPERIENCES
#69ELECTRONIC DEVICE FOR PERFORMING EVALUATION OF ENCRYPTED MESSAGES AND METHODS THEREOF
#70AUTHENTICATION OF A VENTILATOR
#71Transactional Platform
#72DATA PROCESSING APPARATUS AND METHODS
#73Secure Start System for an Autonomous Vehicle
#74APPLICATION FIREWALL
#75System and Method for Authorized Digital Content Distribution
#76SYSTEMS, METHODS, AND APPLICATIONS FOR TRANSCODING DATA INTO MEDIA FILES
#77EFFICIENT COMMON STORAGE OF PARTIALLY ENCRYPTED CONTENT
#78METHOD TO MIGRATE WORKLOAD BETWEEN TWO ENVIRONMENTS AND A SYSTEM THEREOF
#79CONNECTION MANAGEMENT OVER RESTRICTED NETWORK
#80SYSTEM AND METHOD FOR SECURE RELAYED COMMUNICATIONS FROM AN IMPLANTABLE MEDICAL DEVICE
#81METHODS AND APPARATUS TO COLLECT DISTRIBUTED USER INFORMATION FOR MEDIA IMPRESSIONS AND SEARCH TERMS
#82AUTOMATED TRANSPARENT LOGIN WITHOUT SAVED CREDENTIALS OR PASSWORDS
#83ENDPOINT-ASSISTED INSPECTION OF ENCRYPTED NETWORK TRAFFIC
#84SECURE KEY MANAGEMENT FOR SERVICE MESH DEPLOYMENTS
#85METHOD AND APPARATUS FOR METADATA CONVERSION WITH A FLOW IDENTIFIER OF A PACKET SEQUENCE IN A TUNNEL-LESS SDWAN
#86INTERPOSING SERVICE MESH
#87METHOD AND APPARATUS FOR FLOW IDENTIFIER OF PACKET SEQUENCE IN TUNNEL-LESS SDWAN
#88SYSTEM AND METHOD FOR AUTHENTICATING AND AUTHORIZING DEVICES
#89IMAGE-FORMING APPARATUS, TERMINAL DEVICE, METHOD FOR CONTROLLING IMAGE-FORMING APPARATUS, AND METHOD FOR CONTROLLING TERMINAL DEVICE
#90Embedded Universal Integrated Circuit Card Supporting Two-Factor Authentication
#91KEY INDICATION PROTOCOL
#92TECHNOLOGIES FOR DYNAMIC ACCELERATOR SELECTION
#93Network Restrictions For Secure Sharing Of Cloud Storage Data
#94WAN OPTIMIZATION FOR ENCRYPTED DATA TRAFFIC USING FULLY HOMOMORPHIC ENCRYPTION
#95ANALYZING ENCRYPTED TRAFFIC BEHAVIOR USING CONTEXTUAL TRAFFIC DATA
#96Embedded Universal Integrated Circuit Card Supporting Two-Factor Authentication
#97AUTOMATIC PRIVACY-AWARE MACHINE LEARNING METHOD AND APPARATUS
#98HOMOMORPHIC ENCRYPTION IN A HEALTHCARE NETWORK ENVIRONMENT, SYSTEM AND METHODS
#99SYSTEM AND METHOD FOR CREATING A SECURE HYBRID OVERLAY NETWORK
#100WAN OPTIMIZATION FOR ENCRYPTED DATA TRAFFIC USING FULLY HOMOMORPHIC ENCRYPTION
#101WAN OPTIMIZATION FOR ENCRYPTED DATA TRAFFIC USING FULLY HOMOMORPHIC ENCRYPTION
#102CONFIGURING A REMOTE ELECTRONIC DEVICE BY A PEER ELECTRONIC DEVICE IN A NETWORKED ENVIRONMENT
#103WAN OPTIMIZATION FOR ENCRYPTED DATA TRAFFIC USING FULLY HOMOMORPHIC ENCRYPTION
#104WAN OPTIMIZATION FOR ENCRYPTED DATA TRAFFIC USING FULLY HOMOMORPHIC ENCRYPTION
#105WAN OPTIMIZATION FOR ENCRYPTED DATA TRAFFIC
#106SYSTEM, METHOD AND APPARATUS FOR REAL-TIME ACCESS TO NETWORKED RADIOLOGY DATA
#107SYSTEMS AND METHODS FOR DETECTION AND MITIGATION OF MALICIOUS ENCRYPTION
#108Embedded Universal Integrated Circuit Card Supporting Two-Factor Authentication
#109COMMUNICATION DEVICE AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING COMPUTER-READABLE INSTRUCTIONS FOR COMMUNICATION DEVICE
#110DYNAMIC STEGANOGRAPHIC EMBEDDINGS FOR MESSAGE THREAT DETECTION
#111SERVICE OPTIMIZATION IN NETWORKS AND CLOUD INTERCONNECTS
#112DECENTRALIZED CONTENT FABRIC
#113METHOD OF COMMUNICATING VEHICLE DATA FOR VEHICLE CONTROL
#114METHOD AND SYSTEM FOR AUTHORIZATION USING A PUBLIC LEDGER AND ENCRYPTION KEYS
#115System, Apparatus And Method For Integrity Protecting Tenant Workloads In A Multi-Tenant Computing Environment
#116Identity And Access Management Using A Decentralized Gateway Computing System
#117ACCESS AND MESSAGING IN A MULTI CLIENT NETWORK
#118Enclave Interactions
#119SYSTEMS AND METHODS FOR CREATING FINGERPRINTS OF ENCRYPTION DEVICES
#120SYSTEMS, METHODS, AND MEDIA FOR A CLOUD BASED SOCIAL MEDIA NETWORK
#121Storing, Processing and Analyzing Large Volumes of Data in a Storage Network
#122RECOMMENDATION ENGINE USING FULLY HOMOMORPHIC ENCRYPTION
#123SYSTEM AND METHOD FOR ROUTING-BASED INTERNET SECURITY
#124SYSTEMS AND METHODS FOR PROCESSING PEER-TO-PEER FINANCIAL PRODUCT MARKUP LANGUAGE AGENCY NOTICES
#125SYSTEM AND METHOD OF CORRELATING MULTIPLE DATA POINTS TO CREATE A NEW SINGLE DATA POINT
#126AUTOMATIC PATIENT POSITIONING WITHIN A LASER EYE SURGERY SYSTEM
#127METHODS AND SYSTEMS AND SECURE CONNECTIONS FOR JOINING WIRELESS NETWORKS
#128SYSTEMS AND METHOD FOR PROVIDING A DATA SECURITY SERVICE
#129Address Verification Method and Corresponding Apparatus
#130DYNAMIC AUTHENTICATION ATTACK DETECTION AND ENFORCEMENT AT NETWORK, APPLICATION, AND HOST LEVEL
#131PERSISTENT DATA SECURITY FOR DATA PROCESSING UNITS
#132Linked Account System Using Personal Digital Key (PDK-LAS)
#133Method and apparatus for creating and using quantum resistant keys
#134ENDPOINT-ASSISTED INSPECTION OF ENCRYPTED NETWORK TRAFFIC
#135GRADUATED AUTHENTICATION IN AN IDENTITY MANAGEMENT SYSTEM
#136APPLICATION SINGLE SIGN-ON DETERMINATIONS BASED ON INTELLIGENT TRACES
#137SYSTEMS AND METHODS FOR BLIND MULTIMODAL LEARNING
#138METHOD AND SYSTEM FOR CONTACTLESS TRANSACTIONS WITHOUT USER CREDENTIALS
#139TECHNIQUES TO PERFORM APPLET PROGRAMMING
#140EXTENSIBLE BODY SENSOR NETWORK PLATFORM FOR WEARABLE AND IMPLANTABLE DEVICES
#141SYSTEM AND METHOD FOR A VIRAL MOLECULAR NETWORK UTILIZING MOBILE DEVICES
#142ACCESSING AN ENCRYPTED PLATFORM
#143Authentication of Networked Devices Having Low Computational Capacity
#144Secure Content Access Authorization
#145PRIVACY-PRESERVING DISTRIBUTED COMPUTING
#146SECURE PACKET RECORD IN MULTI-SOURCE VR ENVIRONMENT
#147SYSTEMS AND METHODS FOR DISTRIBUTING CRYPTOGRAPHIC RESOURCES UPON DETERMINATION OF AN IRREGULARITY THROUGH SELF-EXECUTING CODE
#148METHOD AND DEVICE FOR ABSENTEE VOTING
#149SYSTEMS AND METHODS FOR CONTROLLED ACCESS TO BLOCKCHAIN DATA
#150SIMPLE NONAUTONOMOUS PEERING MEDIA CLONE DETECTION
#151QUICK USER DATAGRAM PROTOCOL (UDP) INTERNET CONNECTIONS (QUIC) PACKET OFFLOADING
#152METHOD AND SYSTEM FOR PERFORMING AUTHENTICATION AND OBJECT DISCOVERY FOR ON-PREMISES CLOUD SERVICE PROVIDERS
#153ELECTRONIC DEVICE AND METHOD FOR UPLOADING DATA OF EXTERNAL ELECTRONIC DEVICE IN ELECTRONIC DEVICE
#154SECURE INTERFACES FOR NEURAL DEVICES
#155PRIVACY-ENHANCED SENSOR DATA EXCHANGE SYSTEM
#156SYSTEM AND METHOD ENABLING NETWORKED SYSTEMS TO SAFELY USE DIGITAL CONTENT E.G. CODE
#157SYSTEM AND METHOD FOR ROUTING-BASED INTERNET SECURITY
#158SYSTEM AND METHOD WITH REAL TIME MESSAGING
#159Method for Arranging a Shared Cryptographic Key and Method for Encrypted Communication, Computer Program Product and Device
#160JM06-17U SECURE LINE-OF-SIGHT COMMUNICATION WITH AIRCRAFT
#161VISION-BASED INTERFACE FOR CONTENT TRANSFER
#162INFORMATION PROCESSING APPARATUS, CONTROL METHOD FOR INFORMATION PROCESSING APPARATUS, AND STORAGE MEDIUM
#163IDENTITY ANONYMIZATION WITH CONTROLLED MASKING AND FORMAT PRESERVING ENCRYPTION
#164END-TO-END NETWORK ENCRYPTION FROM CUSTOMER ON-PREMISE NETWORK TO CUSTOMER VIRTUAL CLOUD NETWORK USING CUSTOMER-MANAGED KEYS
#165Persisting Encrypted Remote Browser Data At a Local Browser for Use in a Remote Browser
#166DATA SECURITY USING REQUEST-SUPPLIED KEYS
#167SHARING DATA VIA TRANSACTIONS OF A BLOCKCHAIN
#168AUTONOMOUS REPORT COMPOSER
#169TECHNOLOGIES FOR ACCELERATED QUIC PACKET PROCESSING WITH HARDWARE OFFLOADS
#170STREAMING ONE TIME PAD VIRTUAL PRIVATE NETWORK
#171ENHANCING SECURITY OF SENSITIVE DATA IN HTTP/2 AND HTTP/3 CONNECTIONS
#172ANONYMOUS PROXYING
#173Graph Based Embedding Under Fully Homomorphic Encryption
#174MODIFICATION OF DEVICE BEHAVIOR FOR USE IN SECURE NETWORKING
#175Remotely Accessing Data In A Secured Data Center
#176SYSTEMS AND METHODS FOR ENCRYPTING AND TRANSMITTING DATA PACKETS USING A UNICAST ADDRESS
#177Secure connections between servers in a virtual private network
#178Secure connections between servers in a virtual private network
#179Secure connections between servers in a virtual private network
#180AGENT MESSAGE DELIVERY FAIRNESS
#181SYSTEMS AND METHODS FOR VERIFYING DATA VIA BLOCKCHAIN
#182Secure Remote Debugging
#183DISTRIBUTED SYSTEM FOR CYBERSECURITY DATA COLLECTION AND TRAFFIC MASKING
#184SYSTEMS AND METHODS FOR NETWORK PRIVACY
#185Method for Transmitting Data By Way of at Least Two Moving Components, Computer Program Product, Transmitter and Receiver
#186Privacy computing-enabled migration method for large-scale persistent data across platforms
#187ON-PREMISES AUGMENTED AND VIRTUAL REALITY PROCESSING AND PRIVACY PRESERVING INFRASTRUCTURE
#188DATA TRANSFER WORKFLOW IN A MULTI-MACHINE ECOSYSTEM
#189PRIVACY-PRESERVING AUGMENTED AND VIRTUAL REALITY USING HOMOMORPHIC ENCRYPTION
#190ID-BASED CONTROL UNIT-KEY FOB PAIRING
#191SECURING AUDIO COMMUNICATIONS
#192USE OF A DISTRIBUTED LEDGER SYSTEM FOR MONITORING GOODS DELIVERIES
#193AGE AND IDENTITY VERIFICATION SYSTEM
#194DECENTRALIZED COMPUTER SYSTEMS AND METHODS FOR EFFICIENT TRANSACTION DISPUTE MANAGEMENT USING BLOCKCHAIN
#195SYSTEMS AND METHODS FOR DECRYPTION AS A SERVICE
#196MESSAGING AMONG MESSAGE GROUPS IN A MESH NETWORK
#197CLOUD STORAGE USING ENCRYPTION GATEWAY WITH CERTIFICATE AUTHORITY IDENTIFICATION
#198SECURE TRANSMISSION OF CONTENT UPDATES VIA SUPERDENSE CODING
#199PRIVATE ALIAS ENDPOINTS FOR ISOLATED VIRTUAL NETWORKS
#200SECURE EXCHANGE OF CRYPTOGRAPHICALLY SIGNED RECORDS
#201IPCON MCDATA SESSION ESTABLISHMENT METHOD
#202SYSTEMS AND METHODS FOR REDUCING SEED THEFT IN PLANTING OPERATIONS
#203CARD ENABLED SERVICES
#204DECENTRALIZED FRAMEWORK FOR PROVIDING APPLICATION PROGRAMMING INTERFACE GATEWAYS
#205METHODS FOR PROVIDING AN ALERT OR AN ALARM TO A USER OF A MOBILE COMMUNICATIONS DEVICE
#206SECURE MESSAGING FOR OUTAGE EVENTS
#207METHOD AND SYSTEM FOR CAPTURE OF VISITED LINKS FROM ENCRYPTED AND NON-ENCRYPTED NETWORK TRAFFIC
#208SELECTIVE DEEP INSPECTION IN SECURITY ENFORCEMENT BY A NETWORK SECURITY SYSTEM (NSS)
#209DYNAMIC DATA SECURITY REQUIREMENTS IN A NETWORK
#210METHOD AND SYSTEM FOR VERIFICATION OF IDENTIFY OF A USER
#211NETWORK CONNECTION AUTOMATION
#212CRYPTOGRAPHIC METHOD FOR VERIFYING DATA
#213TECHNIQUES FOR A TRUSTED EXECUTION ENVIRONMENT AT A COMPUTE SERVER TO USE A REMOTE ACCELERATOR
#214IDENTITY BREACH NOTIFICATION AND REMEDIATION
#215Method and apparatus for simultaneous key generation on device and server for secure communication
#216METHOD FOR SECURELY COMMUNICATING EMAIL CONTENT BETWEEN A SENDER AND A RECIPIENT
#217UPSTREAM APPROACH FOR SECURE CRYPTOGRAPHY KEY DIST
#218DATA COMMUNICATION SYSTEM, DATA COMMUNICATION DEVICE, HOST DEVICE, DATA COMMUNICATION METHOD, AND DATA COMMUNICATION PROGRAM
#219PRIVATE APPLICATION PLATFORM
#220SYSTEM AND METHOD FOR ALERTING PROVIDERS TO INEFFECTIVE OR UNDER EFFECTIVE TREATMENTS BASED ON GENETIC EFFICACY TESTING RESULTS
#221SYSTEMS AND METHODS FOR PRIVACY-ENABLED BIOMETRIC PROCESSING
#222DEDUPLICATED DATA DISTRIBUTION TECHNIQUES
#223DISTRIBUTION OF MESSAGES WITH GUARANTEED OR SYNCHRONIZED TIME OF DELIVERY
#224CYBER SECURITY APPLIANCE FOR AN OPERATIONAL TECHNOLOGY NETWORK
#225ENCRYPTED TRAFFIC OBFUSCATION METHOD AND SYSTEM
#226METHODS AND SYSTEMS FOR DISTRIBUTING ENCRYPTED CRYPTOGRAPHIC DATA
#227SYSTEMS AND METHODS FOR MANAGED DATA TRANSFER
#228SECURE ELECTRONIC MESSAGING SYSTEMS GENERATING ALTERNATIVE QUERIES
#229SYSTEM AND METHOD FOR PARTITIONING DIGITAL RESOURCES USING A NETWORKED RESOURCE PLATFORM
#230SYSTEM AND METHOD FOR AUTHENTICATING ELECTRONIC MONEY
#231TECHNOLOGIES FOR MEMORY REPLAY PREVENTION USING COMPRESSIVE ENCRYPTION
#232NETWORK SERVICE PLAN DESIGN
#233INCORPORATING SOFTWARE-AS-A-SERVICE DATA INTO A CYBER THREAT DEFENSE SYSTEM
#234A Method and Function for Accessing a Non-Public Network
#235MULTI-INDEPENDENT LEVEL SECURE (MILS) STORAGE ENCRYPTION
#236METHOD AND SYSTEM FOR INTEGRATION OF NETWORK SLICE ENCRYPTION
#237SYSTEM AND METHOD FOR OPTIMAL MULTISERVER VPN ROUTING
#238Compliance Platform for use with Identity Data
#239DISTRIBUTED ANONYMIZED COMPLIANT ENCRYPTION MANAGEMENT SYSTEM
#240SHARING EVENTS AND OTHER METRICS IN NATIVE APPLICATIONS
#241INFORMATION PROCESSING APPARATUS, CONTROL METHOD FOR INFORMATION PROCESSING APPARATUS, AND STORAGE MEDIUM
#242BLOCKCHAIN-BASED SDP ACCESS CONTROL METHOD AND APPARATUS
#243VERTICAL FEDERATED LEARNING PLATFORM AND METHODS FOR USING SAME
#244Provisioning secured data access to authorized users through light fidelity (LiFi) data transmission and a virtual reality device
#245VERIFIABLE IDENTITY MAPS
#246Apparatus and Method for Setting Up Online Meeting Services
#247SYSTEMS AND METHODS FOR LINKING HIGH-VALUE TOKENS USING A LOW-VALUE TOKEN
#248INTEGRATED HEALTHCARE EXCHANGE
#249PROCESS AND SYSTEM FOR SELECTABLE DATA TRANSMISSION
#250NETWORK SECURITY DEVICES AND METHOD
#251MEDIUM ACCESS CONTROL HEADER OBFUSCATION
#252Data exchange protection and governance system
#253ENCRYPTION AND DECRYPTION OF VISIBLE CODES FOR REAL TIME AUGMENTED REALITY VIEWS
#254DISTRIBUTED ANONYMIZED COMPLIANT ENCRYPTION MANAGEMENT SYSTEM
#255MULTI-CLOUD BI-DIRECTIONAL STORAGE REPLICATION SYSTEM AND TECHNIQUES
#256INTERNET-OF-THINGS DEVICE SECURITY OPTIMIZATION
#257SYSTEM AND METHOD FOR WEB-BROWSER BASED END-TO-END ENCRYPTED MESSAGING AND FOR SECURELY IMPLEMENTING CRYPTOGRAPHY USING CLIENT-SIDE SCRIPTING IN A WEB BROWSER
#258PORT LEVEL POLICY ISOLATION IN OVERLAY NETWORKS
#259VIRTUAL PRIVATE GATEWAY FOR ENCRYPTED COMMUNICATION OVER DEDICATED PHYSICAL LINK
#260Secure Circuit For Encryption Key Generation
#261DISTRIBUTION AND USE OF ENCRYPTION KEYS TO DIRECT COMMUNICATIONS
#262CONFIDENTIAL COMPUTING IN HETEROGENEOUS COMPUTE ENVIRONMENT INCLUDING NETWORK-CONNECTED HARDWARE ACCELERATOR
#263TRANSMISSION OF MEDICAL VIDEO DATA
#264PROTOCOL STATE AWARE POWER MANAGEMENT
#265Secured data derivation for user devices
#266BUSINESS DATA PROCESSING METHOD AND APPARATUS, DEVICE, STORAGE MEDIUM, AND PROGRAM PRODUCT
#267SYSTEM AND METHOD FOR MAINTAINING INTERNET ANONYMITY VIA CLIENT FINGERPRINT
#268METHOD FOR AUTHORIZING A SECURE ACCESS FROM A LOCAL DEVICE TO A REMOTE SERVER COMPUTER
#269System, method, and computer-accessible medium for hiding messages sent to third parties
#270VIRTUAL PRIVATE NETWORK ENHANCEMENT USING MULTIPLE CORES
#271Using Signed Tokens to Verify Short Message Service (SMS) Message Bodies
#272ANALYSIS OF TRANSPORT DAMAGE
#273Securing Connections of a Process Control or Automation System
#274METHOD FOR SHARING CYBERSECURITY THREAT ANALYSIS AND DEFENSIVE MEASURES AMONGST A COMMUNITY
#275SYSTEM AND METHOD FOR MIDSERVER FACILITATION OF MASS SCANNING NETWORK TRAFFIC DETECTION AND ANALYSIS
#276MASTER LEDGER AND LOCAL HOST LOG EXTENSION DETECTION AND MITIGATION OF FORGED AUTHENTICATION ATTACKS
#277A Method for Tunneling an Internet Protocol Connection Between Two Endpoints
#278TECHNIQUES FOR MANAGING A DIGITAL ASSET REPOSITORY
#279PRESCIENT AND ADAPTIVE POINT-OF-SALE SYSTEMS
#280MEDIA AGNOSTIC CONTENT ACCESS MANAGEMENT
#281Systems and Methods for Sharing a Control Connection
#282AGGREGATION AND MANAGEMENT AMONG A PLURALITY OF STORAGE PROVIDERS
#283SYSTEMS AND METHODS FOR AUTHENTICATING DATA ACCESS REQUESTS
#284DATA TRANSMISSION METHOD, DEVICE AND CORRESPONDING PROGRAM
#285Systems and Methods for Self-Contained Certificate Signing Request in Delegation Scenarios
#286Internet packet provenance to verify packet validity and control packet usage
#287Wearable article with integrated display for displaying cryptographically secured digital images
#288Network Telemetry with Byte Distribution and Cryptographic Protocol Data Elements
#289ESTABLISHING DYNAMIC EDGE POINTS IN A DISTRIBUTED NETWORK FOR AGNOSTIC DATA DISTRIBUTION AND RECOVERY
#290Electronic interaction authentication and verification, and related systems, devices, and methods
#291SECURE VERIFICATION OF AN INDIVIDUAL USING WIRELESS BROADCASTS
#292Optimized authentication system
#293Method, system and apparatus for protecting access tokens created by multifactor authentication
#294LOCKING ENCRYPTED VIDEO CONFERENCES
#295OPTIMIZED AUTHENTICATION SYSTEM
#296NETWORK EXPOSURE FUNCTION (NEF) FOR SUCI-BASED UE-INITIATED SERVICE AUTHORIZATION
#297CONFIDENTIAL AUTHENTICATION AND PROVISIONING
#298Encrypted traffic inspection in a cloud-based security system
#299TECHNIQUES FOR PROVIDING NATURAL LANGUAGE UNDERSTANDING (NLU) SERVICES TO CONTACT CENTERS
#300ELECTRONIC CONTROL DEVICE