Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
Sub-classes:METHODS AND SYSTEMS FOR USER DATA MANAGEMENT
#2SECURE VSAN CLUSTER USING DEVICE AUTHENTICATION AND INTEGRITY MEASUREMENTS
#3ENTITY IP MAPPING
#4SYSTEM FOR CONTROLLING NETWORK ACCESS AND METHOD THEREOF
#5Device-Assisted Services for Protecting Network Capacity
#6FLEXIBLE AUTHENTICATION
#7Managing and Routing Messages to Distributed User Devices in an Enterprise Computing Environment
#8EDGE COMMUNICATION LOCATIONS
#9Method and System for Providing Time-Critical Services via a Flow Control Environment
#10Systems and Methods for End User Privilege Elevation
#11CONFERENCE SECURITY FOR USER GROUPS
#12DATA PROCESSING METHOD AND APPARATUS, COMPUTER DEVICE, AND READABLE STORAGE MEDIUM
#13SECURE AUTHENTICATION FOR ACCESSING REMOTE RESOURCES
#14METHOD AND APPARATUS FOR ESTABLISHING TRANSPORT LAYER SECURITY PROTOCOL
#15DYNAMIC ONE-TIME USE KNOWLEDGE-BASED AUTHENTICATION VIA MULTI-SOURCED PRIVATE DATA USING ARTIFICIAL INTELLIGENCE TECHNIQUES
#16VEHICLE CONTROL SYSTEM AND COMMUNICATION PROCESSING METHOD
#17METHOD AND SYSTEM FOR USER AUTHENTICATION DURING DATA MIGRATION
#18CONTROLLING WRITE ACCESS FOR INPUT/OUTPUT CHANNELS IN AN INDUSTRIAL PROCESS AUTOMATION ENVIRONMENT
#19METHOD AND SYSTEM FOR PERFORMING IDENTITY CHECKS IN A DISTRIBUTED SYSTEM
#20DATA PACKET GENERATOR AND IMPLEMENTATIONS OF SAME
#21BANK-DRIVEN MODEL FOR PREVENTING DOUBLE SPENDING OF DIGITAL CURRENCY COEXISTING ON MULTIPLE DLT NETWORKS
#22SYSTEMS AND METHODS FOR BREACH-PROOF, RESILIENT, COMPLIANT DATA IN A MULTI-VENDOR CLOUD ENVIRONMENT AND AUTOMATICALLY SELF HEALS IN THE EVENT OF A RANSOMWARE ATTACK
#23Information processing system
#24MANAGEMENT SERVER, IMAGE FORMING APPARATUS, AND MANAGEMENT SERVER SYSTEM
#25SYSTEM AND METHOD FOR SEQUENTIAL SIGNING OF DOCUMENTS
#26CLOUD SECURITY DISTRIBUTED ARCHITECTURE
#27SYSTEM AND METHOD FOR DEVICE AUTHENTICATION IN A DISTRIBUTED ENVIRONMENT WITHOUT USER INTERVENTION
#28LOCATION-BASED MOBILE DEVICE AUTHENTICATION
#29SYSTEM FOR CONTROLLING DATA FLOW BASED ON LOGICAL CONNECTION IDENTIFICATION AND METHOD THEREOF
#30INTEGRATED CYBERSECURITY SYSTEM AND METHOD FOR PROVIDING RESTRICTED CLIENT ACCESS TO A WEBSITE
#31DETECTION OF CONTINUOUS REPLACEMENT OF HOSTS ON PORTS OF NETWORK DEVICES
#32VIRTUAL CURRENCY SYSTEM
#33MULTI-LENDER PLATFORM THAT SECURELY STORES PROPRIETARY INFORMATION FOR GENERATING OFFERS
#34SYSTEM AND METHOD FOR SELECTING SECURITY QUESTIONS FOR DEVICE AUTHENTICATION BASED ON SECURITY SCORES OF DATA
#35PROGRAMMABLE INTEGRATED CIRCUIT CONFIGURED AS A REMOTE TRUST ANCHOR TO SUPPORT MULTITENANCY
#36METHOD AND SYSTEM FOR DEPLOYING A SAAS APPLICATION
#37PRIORITIZATION OF INDIVIDUAL CHANNELS WITHIN MULTIPLEXED STREAMS FOR ZERO TRUST NETWORK ACCESS (ZTNA)
#38SYSTEMS AND METHODS FOR MULTIPLE CUSTODY USING MOBILE DEVICES OR WEARABLES
#39Tying Anomalies To Authentication Levels
#40SECURE DOCUMENT STORAGE SYSTEM
#41AUTHENTICATION AND AUTHORIZATION IN PROXIMITY BASED SERVICE COMMUNICATION USING A GROUP KEY
#42NON-INTERFERING ACCESS LAYER END-TO-END ENCRYPTION FOR IOT DEVICES OVER A DATA COMMUNICATION NETWORK
#43AUTHENTICATION AND AGE VERIFICATION FOR AN AEROSOL DELIVERY DEVICE
#44SYSTEMS AND METHODS FOR FRAUD DETECTION AND PREVENTION
#45CENTRALIZED EVENT DETECTION
#46SYSTEMS, METHODS, AND APPARATUSES FOR IMPLEMENTING A MULTI-COMPONENT AUTHENTICATION USING PRE-DETERMINED SEQUENCES AND INDICATORS IN AN ELECTRONIC ENVIRONMENT
#47Systems and Methods for Remote Management of Appliances
#48IMS PSEUDO-REGISTRATION
#49RESOURCE ACCESS CONTROL METHOD, MEDIUM AND ELECTRIC DEVICE
#50ACCOUNT AUTHENTICATION EXCLUDING MERCHANTS BASED ON MERCHANT LOGOS
#51CONTENT ACTIVATION VIA INTERACTION-BASED AUTHENTICATION, SYSTEMS AND METHOD
#52SERVICE PROCESSING APPARATUS, SYSTEM, METHOD, AND COMPUTER READABLE MEDIUM
#53AUTHENTICATION PROCEDURE IN A VIRTUAL PRIVATE NETWORK
#54HOST AUTHENTICATION USING A NON-ADDRESSABLE DOMAIN CONTROLLER
#55SYSTEM AND METHOD FOR MANUFACTURING AND TRADING SECURITIES AND COMMODITIES
#56COLLECTION AND USE OF TELEMETRY DATA TO MONITOR AND COLLECT MULTI-INTERFACE WORKFLOW INTERACTION
#57AUTHENTICATION USING SESSION-LESS LOGIN
#58EMAIL-BASED AUTHENTICATION FOR SIGN IN AND SECURITY
#59Authentication using session-less login
#60Techniques for simultaneously accessing multiple isolated systems while maintaining security boundaries
#61UNIVERSAL ADAPTER FOR LOW-OVERHEAD INTEGRATION OF MACHINE LEARNING MODELS WITH A WEB-BASED SERVICE PLATFORM
#62SYSTEMS AND METHODS FOR PROCESSING AND TRANSMITTING SENSOR DATA
#63USER AUTHENTICATED ENCRYPTED COMMUNICATION LINK
#64SESSION INFORMATION DISPLAY METHOD AND APPARATUS, AND ELECTRONIC DEVICE
#65Systems and Methods for Implementing Blockchain-Based Content Engagement Platforms Utilizing Media Wallets
#66Zero trust policy engine for controlling access to network applications
#67EMAIL-BASED AUTHENTICATION FOR ACCOUNT LOGIN, ACCOUNT CREATION AND SECURITY FOR PASSWORDLESS TRANSACTIONS
#68System and Methods for Providing Anonymous Verified Identify and Session Management
#69METHOD AND SYSTEM FOR DIGITAL RECORD VERIFICATION
#70Find My using Delegated Location
#71POLICY-BASED SECURE CONTAINERS FOR MULTIPLE ENTERPRISE APPLICATIONS
#72DESCENDENT CASE ROLE ALIAS
#73HIERARCHICAL PERMISSIONS MODEL WITHIN A DOCUMENT
#74DECENTRALIZED PROCESSING OF INTERACTIONS ON DELIVERY
#75MULTI-DEVICE VERIFICATION VIA NON-AUDIBLE SOUND
#76INTERFACE FOR A CORE PROCESS CONTROL SYSTEM
#77Transitioning interactions of an interaction session initiated within a metaverse to a real-world environment to complete the interaction session
#78SYSTEMS AND METHODS OF PHYSICAL INFRASTRUCTURE AND INFORMATION TECHNOLOGY INFRASTRUCTURE SECURITY
#79AUTHENTICATION FOR MOBILE PRINT JOBS ON PUBLIC MULTI-FUNCTION DEVICES
#80PERSONAL DEVICE NETWORK FOR USER IDENTIFICATION AND AUTHENTICATION
#81IDENTITY EXPERIENCE FRAMEWORK
#82SYSTEM AND METHOD OF A RELAY SERVER FOR MANAGING COMMUNICATIONS AND NOTIFICATION BETWEEN A MOBILE DEVICE AND APPLICATION SERVER
#83COMMUNICATION APPARATUS, COMMUNICATION METHOD, AND STORAGE MEDIUM
#84WIRELESS COMMUNICATION APPARATUS, AUTHENTICATION APPARATUS, WIRELESS COMMUNICATION METHOD AND AUTHENTICATION METHOD
#85COMMUNICATION GENERATION IN COMPLEX COMPUTING NETWORKS
#86SECURING SENSITIVE INFORMATION DETERMINED IN AN INPUT MESSAGE
#87SYSTEMS AND METHODS FOR REMOTELY STORING SECURITY CREDENTIALS IN CLOUD COMPUTING SYSTEMS FEATURING PARTITIONED NETWORK STRUCTURES
#88ACCOUNT TAKEOVER PROTECTION USING SITE PROFILES
#89RESOURCE TRANSFER SETUP AND VERIFICATION
#90ADAPTIVE AUTHENTICATION
#91Placement of Hosts Based on Authentication Server Status
#92History-Based Inauthenticity Identification
#93Agent Instance Live-Monitoring By A Management Network for Burnout and Attrition Prediction And Response
#94System and Method for Optimizing Data Transfers and Rendering of Digital Models
#95Virtualization in a Dispersed Storage Network Utilizing Local and Remote Memory
#96USER EQUIPMENT (UE) STATUS INFORMATION DELIVERY IN A WIRELESS COMMUNICATION NETWORK
#97SYSTEMS AND METHODS FOR ESTABLISHING, USING, AND RECOVERING UNIVERSAL DIGITAL IDENTIFIERS
#98SYSTEMS AND METHODS FOR DEPLOYMENT OF WORKSPACE ENDORSEMENTS
#99COMMUNICATION DEVICE, COMMUNICATION METHOD, AND COMPUTER PROGRAM PRODUCT
#100Embedded Universal Integrated Circuit Card Supporting Two-Factor Authentication
#101METHODS AND SYSTEMS FOR GENERATING A SECURE COMMUNICATION CHANNEL INTERFACE FOR VIDEO STREAMING OF SENSITIVE CONTENT
#102MULTITENANT MANAGEMENT SYSTEM AND METHOD
#103SYSTEMS AND METHODS FOR LOCAL DATA STORAGE
#104Security Techniques for Device Assisted Services
#105SYSTEMS AND METHODS FOR MULTILINGUAL METADATA
#106NETWORK-ENABLED ELECTRONIC CIGARETTE
#107SYSTEM FOR CONTROLLING NETWORK CONNECTION BASED ON CONTROLLER, AND METHOD FOR SAME
#108SYSTEMS AND METHODS FOR RESTRICTING SECURITY CONNECTION DATA RESETS
#109SYSTEMS AND METHODS FOR DYNAMIC MESSAGE VERIFICATION
#110SYSTEMS AND METHODS FOR RESTRICTING SECURITY CONNECTION DATA RESETS
#111Method of Sending Messages to Devices Not Configured to Receive Them
#112DIGITAL ACCESS CONTROL USING TIME-BASED BASELINE ACCESS DISTRIBUTIONS
#113VEHICLE COMMUNICATION APPARATUS, IN-VEHICLE NETWORK SYSTEM, AND VEHICLE COMMUNICATION METHOD
#114VIRTUAL AGENT TRUST MECHANISM
#115AUTHENTICATION TRANSLATION
#116CONNECTING IMSI-LESS DEVICES TO THE EPC
#117SECURE ONLINE AUTHENTICATION METHOD USING MOBILE ID DOCUMENT
#118A METHOD FOR AUTHENTICATING A USER TOWARDS A MULTI-NODE PARTY
#119INITIAL ACCESSORY SETUP
#120SYSTEMS AND METHODS OF SHARING INFORMATION THROUGH A TAG-BASED CONSORTIUM
#121COMPUTING SYSTEMS AND METHODS FOR PROTECTING APPLICATION PROGRAMMING INTERFACES WITH TWO-FACTOR AUTHENTICATION
#122SYSTEMS AND METHODS FOR ANONYMIZED VALIDATION AND LOGIN
#123CENTRALIZED LOCATION-BASED NETWORK CONNECTIVITY MANAGEMENT PLATFORM
#124INDIRECT DIAGNOSIS OF MULTIPLE FLUID MIXER UNIT PERFORMANCE
#125Function Execution Device and Communication Terminal
#126Data Streaming Service with Virtualized Broker Clusters
#127NETWORK SECURITY MANAGEMENT METHOD, AND APPARATUS
#128Physical Environment Based Account Authentication
#129Techniques For Automatically Configuring Minimal Cloud Service Access Rights For Container Applications
#130COMMUNICATION METHOD AND COMMUNICATION DEVICE
#131Network Supported Authentication
#132SECURE INFORMATION RETRIEVAL
#133SYSTEM AND METHOD FOR SECURELY PERFORMING MULTIPLE STAGE EMAIL PROCESSING WITH EMBEDDED CODES
#134SYSTEMS AND METHODS FOR PROVISIONING NETWORK SLICES
#135Systems and Techniques for Computer-Enabled Geo-Targeted Product Reservation for Secure and Authenticated Online Reservations
#136SYSTEM AND METHOD FOR ITEM TRACKING
#137APPLICATION NOTIFICATION PREVIEW MANAGEMENT
#138PROVIDING ENHANCED FUNCTIONALITY IN AN INTERACTIVE ELECTRONIC TECHNICAL MANUAL
#139APPLICATION FIREWALL
#140EXTENSIBLE SERVER MANAGEMENT FRAMEWORK BASED ON REVERSE CONNECTION PROTOCOL AND OPERATION METHOD THEREOF AND ACCESS OPERATING METHOD THEREOF
#141COMMUNICATION METHOD AND APPARATUS
#142MULTI-FACTOR AUTHENTICATION IN VIRTUAL REALITY ENVIRONMENTS
#143CONNECTION MANAGEMENT OVER RESTRICTED NETWORK
#144Systems and Methods for Encoding and Sharing Content between Devices
#145METHODS, SYSTEMS, AND DEVICES FOR DYNAMICALLY MODELING AND GROUPING ENDPOINTS FOR EDGE NETWORKING
#146Selective Access to Computing Systems Based on Authentication Mechanisms
#147AUTOMATIC ACCOUNT MANAGEMENT SYSTEM
#148MANAGEMENT OF A SMART HOME AUTOMATION COMMUNITY
#149DIGITAL TWIN TASK AUTHORIZATION METHOD AND APPARATUS, COMMUNICATIONS DEVICE, AND READABLE STORAGE MEDIUM
#150Message Authenticated Communication Sessions
#151DATA EXCHANGE ON A DISTRIBUTED COMPUTING SYSTEM
#152MULTIFUNCTION WIRELESS DEVICE
#153MOBILE AUTHENTICATION AND CONTROL OF DIGITAL RECORDS CAPTURING REAL-WORLD MULTI-PARTY INTERACTIONS
#154AUTHENTICATED MODIFICATIONS OF MULTI-PARTY LEDGER DATA DURING USER CONNECTIVITY VIA IN-FLIGHT SYSTEMS
#155LOCATION-BASED HEALTHCARE COLLABORATION, DATA MANAGEMENT AND ACCESS CONTROL
#156MODELLED SERVICE OBJECT IN MULTI-SOURCE VR ENVIRONMENT
#157JAILED ENVIRONMENT RESTRICTING PROGRAMMATIC ACCESS TO MULTI-TENANT DATA
#158Targeted Content Distribution Over a Network
#159RISK ASSESSMENT FRAMEWORK FOR IDENTITY VERIFICATION SYSTEM
#160INTELLIGENT ELECTRONIC DEVICE HAVING USER-AUTHENTICATING CAPABILITIES
#161Onboarding Auto Creation of UDN Groups and Dynamic Binding
#162Embedded Universal Integrated Circuit Card Supporting Two-Factor Authentication
#163MULTI-SERVICES APPLICATION GATEWAY AND SYSTEM EMPLOYING THE SAME
#164SELF-SERVICE LENDER PORTAL
#165DIGITAL SIGN NETWORK
#166SYSTEMS, DEVICES AND METHODS FOR DETERMINING ITEM AVAILABILITY IN A SHOPPING SPACE
#167METHODS, SYSTEMS, AND DEVICES FOR DYNAMICALLY MODELING AND GROUPING ENDPOINTS FOR EDGE NETWORKING
#168Processing External Messages Using a Secure Email Relay
#169Handling Encoded Information
#170NETWORK RESOURCE ACCESS CONTROL METHODS AND SYSTEMS USING TRANSACTIONAL ARTIFACTS
#171Embedded Universal Integrated Circuit Card Supporting Two-Factor Authentication
#172HOMOMORPHIC ENCRYPTION IN A HEALTHCARE NETWORK ENVIRONMENT, SYSTEM AND METHODS
#173SYSTEM AND METHOD FOR CREATING A SECURE HYBRID OVERLAY NETWORK
#174CONFIGURING A REMOTE ELECTRONIC DEVICE BY A PEER ELECTRONIC DEVICE IN A NETWORKED ENVIRONMENT
#175DIGITAL PLATFORM AND METHODS FOR MANAGING DIGITAL APPLICATION FORMS
#176SYSTEMS AND METHODS FOR NETWORK SECURITY
#177SYSTEMS AND METHODS FOR DYNAMIC GRANULAR ACCESS PERMISSIONS
#178HIERARCHICAL PERMISSIONS MODEL FOR CASE MANAGEMENT
#179Auto-Form Fill Based Website Authentication
#180Embedded Universal Integrated Circuit Card Supporting Two-Factor Authentication
#181CONTROL APPARATUS, IN-VEHICLE COMMUNICATION SYSTEM, COMMUNICATION CONTROL METHOD AND PROGRAM
#182METHOD AND APPARATUS FOR APPLICATION DEPLOYMENT IN SOFTWARE-AS-A-SERVICE PLATFORM AND STORAGE MEDIUM
#183ENTITY IP MAPPING
#184METHODS, SYSTEMS, AND DEVICES FOR DYNAMICALLY MODELING AND GROUPING ENDPOINTS FOR EDGE NETWORKING
#185BROWSER PROFILE SEPARATION FOR A MANAGED USER ACCOUNT
#186COMMUNICATION DEVICE AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING COMPUTER-READABLE INSTRUCTIONS FOR COMMUNICATION DEVICE
#187Cloud Queue Access Control
#188Enclave Interactions
#189QUANTUM BLOCK-CHAINED AUTHENTICATION SYSTEM AND METHODS FOR DATA TRANSMISSION PASSING THROUGH P2P NETWORKS
#190MACHINE LEARNING MODEL FEATURE SHARING FOR SUBSCRIBER IDENTITY MODULE HIJACK PREVENTION
#191SYSTEMS AND METHODS FOR CREATING FINGERPRINTS OF ENCRYPTION DEVICES
#192SYSTEM AND METHOD FOR RAPID AND ACCURATE HISTOLOGIC ANALYSIS OF TUMOR MARGINS USING MACHINE LEARNING
#193SYSTEMS AND METHODS FOR MULTILINGUAL METADATA
#194Defending Against Volumetric Attacks
#195Techniques to pre-authenticate a user identity for an electronic account
#196NETWORK SYSTEMS, CONTROL METHODS, DATABASES, CONTROLLERS, AND PROGRAMS
#197SYSTEM AND METHOD FOR PROVIDING NETWORK SUPPORT SERVICES AND PREMISES GATEWAY SUPPORT INFRASTRUCTURE
#198ENTERPRISE DOCUMENT CLASSIFICATION
#199GRADUATED AUTHENTICATION IN AN IDENTITY MANAGEMENT SYSTEM
#200SYSTEM AND METHOD FOR PROVIDING NETWORK SUPPORT SERVICES AND PREMISES GATEWAY SUPPORT INFRASTRUCTURE
#201METHOD AND SYSTEM FOR CONTACTLESS TRANSACTIONS WITHOUT USER CREDENTIALS
#202SYSTEMS AND METHODS FOR RECOGNIZING A DEVICE
#203SECURE ELECTRONIC TRANSACTIONS USING TRANSPORT LAYER SECURITY (SETUTLS)
#204LARGE LANGUAGE MODEL-BASED AUTHENTICATION
#205Systems and Methods for Service Entitlement Authorization
#206Batch Transfer of Control of Memory Devices over Computer Networks
#207METHOD AND DEVICE FOR ABSENTEE VOTING
#208METHODS AND SYSTEMS FOR LEVERAGING EXISTING USER DATA TO VERIFY USER CREDENTIALS
#209PROTECTING DATA FROM BRUTE FORCE ATTACK
#210Unified Management Interface
#211SECURE ONLINE AUTHENTICATION METHOD USING MOBILE ID DOCUMENT
#212A METHOD FOR AUTHENTICATING A USER TOWARDS A MULTI-NODE PARTY
#213INITIAL ACCESSORY SETUP
#214SYSTEMS AND METHODS OF SHARING INFORMATION THROUGH A TAG-BASED CONSORTIUM
#215SYSTEMS AND METHODS FOR ANONYMIZED VALIDATION AND LOGIN
#216METHOD AND SYSTEM FOR INFLUENCING USER INTERACTIONS
#217Merchant Identification And Secure Data Transfer
#218INFORMATION PROCESSING APPARATUS, METHOD OF REGISTERING DEVICE CONNECTED TO INFORMATION PROCESSING APPARATUS IN SERVER, AND STORAGE MEDIUM
#219Systems and methods for detection of session tampering and fraud prevention
#220ROSTER MANAGEMENT ACROSS ORGANIZATIONS
#221DIGITAL INSTANT ISSUANCE WITH INSTANT PROCESSING
#222User credential authentication using blockchain and machine learning
#223METHODS AND SYSTEMS FOR PROVIDING A VISUAL CONTENT GALLERY WITHIN A CONTROLLED ENVIRONMENT
#224GENTERATING AND PROVIDING VARIOUS DEGREES OF DIGITAL INFORMATION AND ACCOUNT-BASED FUNCTIONALITY BASED ON A PREDICTED NETWORK SECURITY THREAT
#225MOBILE DEVICE SERVICE SYSTEMS AND METHODS USING DEVICE ORIENTATION INFORMATION
#226SYSTEMS AND METHODS FOR MANAGING DIGITAL IDENTITIES
#227CONTROLLED TOKEN DISTRIBUTION TO PROTECT AGAINST MALICIOUS DATA AND RESOURCE ACCESS
#228SYSTEMS AND METHODS FOR GENERATING AND USING SECURE SHARDED ONBOARDING USER INTERFACES
#229SYSTEMS AND METHODS FOR NETWORK DEVICE DISCOVERY OVER ETHERNET ADVANCED PHYSICAL LAYER
#230CRYPTOGRAPHIC KEY GENERATION USING MACHINE LEARNING
#231CLOUD COMPUTING ENVIRONMENT FOR BIOLOGICAL DATA
#232Third Party Data Processing for Improvement of Authentication Questions
#233Aggregatable Application Programming Interface
#234INTELLIGENT DOWNLOAD AND SESSION COPY
#235METHOD FOR MESSENGER SERVICE AND APPARATUS THEREFOR
#236Remote Function Unlock for Scan Tool
#237Remotely Accessing Data In A Secured Data Center
#238FIREWALL PANIC BUTTON FOR QUARANTINING OPERATIONAL TECHNOLOGY (OT) SYSTEMS FROM REAL-TIME ATTACKS ON INTERNET INFORMATION TECHNOLOGY (IT) SYSTEMS
#239TOKEN-BASED BILLING MODEL FOR SERVER-SIDE RENDERING SERVICE
#240METHOD AND SYSTEM FOR SELECTING DATA CENTERS BASED ON NETWORK METERING
#241HUB-BASED TOKEN GENERATION AND ENDPOINT SELECTION FOR SECURE CHANNEL ESTABLISHMENT
#242CONSUMER-PERMISSIONED DATA PROCESSING SYSTEM
#243COMMUNICATION PROTOCOLS FOR AN ONLINE CONTENT MANAGEMENT SYSTEM
#244PROVIDING ENHANCED FUNCTIONALITY IN AN INTERACTIVE ELECTRONIC TECHNICAL MANUAL
#245Secure Web Container for a Secure Online User Environment
#246SYSTEM AND METHOD FOR VERIFYING THE IDENTITY OF EMAIL SENDERS TO IMPROVE EMAIL SECURITY WITHIN AN ORGANIZATION
#247METHODS AND PROCEDURES TO PROTECT NETWORK NODES IN CLOUD-BASED TELECOMMUNICATION AND ENTERPRISE NETWORKS
#248SYSTEM AND METHOD FOR PASSWORDLESS LOGINS
#249FILE FORMAT AND PLATFORM FOR STORAGE AND VERIFICATION OF CREDENTIALS
#250SECURE ENDPOINT AUTHENTICATION CREDENTIAL CONTROL
#251LICENSING VERIFICATION MESSAGE
#252INSTANT INTELLIGENT COMMUNICATION SYSTEM FOR STRANGERS
#253METHOD AND APPARATUS FOR PACKET FORWARDING, NETWORK NODE AND STORAGE MEDIUM
#254SYSTEMS AND METHODS FOR AUTHENTICATING A USER COMMERCE ACCOUNT ASSOCIATED WITH A MERCHANT OF A COMMERCE PLATFORM
#255SYSTEMS AND METHODS FOR DECRYPTION AS A SERVICE
#256ESTABLISHING ACCESS SESSIONS
#257SECURE DELIVERY OF ASSETS TO A TRUSTED DEVICE
#258SYSTEM FOR IMPLEMENTING DYNAMIC MULTI-FACTOR SOFT LOCK ON USER IDENTIFIERS
#259LOW-LATENCY, OUTBOUND MESSAGE MONITORING, CONTROL, AND AUTHENTICATION
#260MITIGATING RISK FROM MULTI-FACTOR AUTHENTICATION FATIGUE ATTACKS
#261SECURE OVER-THE-AIR UPDATES
#262SYSTEMS AND METHODS FOR MULTI-FACTOR LOCATION-BASED DEVICE VERIFICATION
#263TRUSTED PERSONAL NETWORKS MATCHMAKING SYSTEM
#264AUTOMATED DMARC DEVICE DISCOVERY AND WORKFLOW
#265ACCESS TO MESSAGES SENT VIA COLLABORATION APPLICATIONS
#266LOCATION BASED HOME SCREENS FOR CAREGIVER PORTABLE WIRELESS DEVICES
#267DATA MESH BASED ENVIRONMENTAL AUGMENTATION
#268CARD ENABLED SERVICES
#269SYSTEM AND METHOD FOR EVALUATING SOLAR INSTALLATION PLANS, STRUCTURAL AND ELECTRICAL ANALYSES, AND PERMIT PREPARATION
#270GENERATING TOKEN VALUE FOR ENABLING A NON-APPLICATION CHANNEL TO PERFORM OPERATION
#271COMMUNICATION APPARATUS, SERVER, COMMUNICATION SYSTEM, AND COMMUNICATION METHOD
#272Hosted email authentication
#273SYSTEM AND METHOD FOR AGGREGATING CLIENT DATA AND CYBER DATA FOR AUTHENTICATION DETERMINATIONS
#274FILE FORMAT AND PLATFORM FOR STORAGE AND VERIFICATION OF CREDENTIALS
#275DEVICE PROGRAMMING WITH SYSTEM GENERATION
#276NETWORK CONNECTION AUTOMATION
#277Systems, Methods and Devices for Networked Media Distribution
#278PROXY-BASED IDENTITY AND ACCESS MANAGEMENT FOR WEB APPLICATIONS
#279STRONG AUTHENTICATION VIA DISTRIBUTED STATIONS
#280INTERACTIVE AND DYNAMIC DIGITAL EVENT PROGRAM
#281SEE, DO, REVIEW, FULL-CYCLE INSTRUCTION PERFORMANCE ANALYSIS PROCESS AND SYSTEM
#282PROVIDING PERSONALIZED DATA TO CUSTOMERS BASED ON CUSTOMER PREFERENCES
#283MANAGING SECURITY CREDENTIALS
#284INFORMATION PROCESSING APPARATUS, METHOD FOR CONTROLLING THE INFORMATION PROCESSING APPARATUS, AND STORAGE MEDIUM
#285Method and system for activating telematics services
#286METHODS, SYSTEMS, AND DEVICES FOR DYNAMICALLY MODELING AND GROUPING ENDPOINTS FOR EDGE NETWORKING
#287SYSTEMS AND METHODS FOR PROVIDING A DIGITAL CREDENTIALS REGISTRY
#288NETWORK TRAFFIC MONITORING BASED ON CONTENT DATA
#289Tagging pump messages with identifiers that facilitate restructuring
#290DATA PAYMENT AND AUTHENTICATION VIA A SHARED DATA STRUCTURE
#291System and method for presenting tire-related information to customers
#292System of generating, inheriting and destroying avatar attribute of real-name identity in metaverse and method thereof
#293Remote execution using a global identity
#294NETWORK SERVICE PLAN DESIGN
#295ACCESSING SHARED PARTITIONS ON A STORAGE DRIVE OF A REMOTE DEVICE
#296GRANULAR SECURE USER ACCESS TO PRIVATE RESOURCES
#297SYSTEMS AND METHODS FOR USING JWTS FOR INFORMATION SECURITY
#298Identity Proofing and Portability on Blockchain
#299IN-VEHICLE NETWORK OTA SECURITY COMMUNICATION METHOD AND APPARATUS, VEHICLE-MOUNTED SYSTEM, AND STORAGE MEDIUM
#300Enterprise Subscription Management