Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
Voice Biometric Authentication in a Virtual Assistant
#2PROVISIONING AND SECURE ACCESS CONTROL FOR STORAGE ON PUBLIC SERVERS
#3NETWORK SYSTEM, DEVICE, AND PROCESSING METHOD
#4GRAPHICAL USER INTERFACES (GUIs) INCLUDING OUTGOING USPTO CORRESPONDENCE FOR USE IN PATENT CASE MANAGEMENT AND DOCKETING
#5DYNAMIC UNLOCKING OF SOFTWARE DEFINED SILICON (SDSi) PROCESSOR FEATURES VIA SECURITY PROTOCOL DATA MODEL (SPDM)
#6SYSTEM AND METHOD TO VERIFY TRUSTWORTHINESS OF AN IHS USING SYSTEM TIME
#7Discriminating Defense Against DDoS Attacks
#8Sharing System Access Using a Device
#9REMOTE MANAGEMENT OF HOSTED SERVICES
#10OBTAINING SECURE TIME OVER A HETEROGENEOUS NETWORK
#11CRYPTOGRAPHIC METHODS AND SYSTEMS FOR MANAGING DIGITAL CERTIFICATES
#12EXTERNAL SIGNALING SAFEGUARDS FOR INFUSION PUMP
#13SYSTEM AND METHOD FOR ESTABLISHING REAL-TIME LOCATION
#14UNIVERSAL DEVICE IDENTIFIERS AND SIGNAL EXCHANGE COLLABORATION
#15Method for the authenticated establishment of a connection between an equipment connected to at least one communication network and a server of a service provider, and corresponding devices
#16PROXY CERTIFICATE MANAGEMENT FOR NFV ENVIRONMENT (PCS)
#17INTER-MESSAGE CERTIFICATE AND DIGEST ARRANGEMENTS IN WIRELESS COMMUNICATIONS SYSTEMS
#18Access Control System for Electric Vehicle Charging
#19Data Breach Detection and Mitigation
#20INFORMATION PROVISION METHOD
#21SERVER APPARATUS, ONLINE LEARNING SYSTEM, PROGRAM, AND STORAGE MEDIUM
#22CONDITIONAL REQUEST AND KEEP ALIVE
#23ELECTRICITY METER AND SYSTEM HARDENED AGAINST ATTACK VECTORS
#24ELECTRONIC SIGNATURE MANAGEMENT METHOD, ELECTRONIC SIGNATURE MANAGEMENT SYSTEM, AND COMPUTER-READABLE STORAGE MEDIUM
#25Systems and Methods for Privacy Preserving Accurate Analysis of Network Paths
#26ENHANCED BLOCKCHAIN DATA COMPUTING PLATFORM FOR STRATEGIC MASTER DATA MANAGEMENT
#27INCIDENT COMMUNICATIONS NETWORK WITH DYNAMIC ASSET MARSHALING AND A MOBILE INTEROPERABILITY WORKSTATION
#28REMOTE ACCESS COMPUTER SECURITY
#29Automated Certificate Management in Air-Gapped Networks
#30DIRECTED ISOLATED NETWORK CONNECTIVITY
#31A METHOD FOR MANAGING A DIGITAL IDENTITY
#32CRYPTOGRAPHIC METHODS AND SYSTEMS FOR MANAGING DIGITAL CERTIFICATES
#33CRYPTOGRAPHIC SECRET GENERATION AND PROVISIONING
#34METHOD AND SYSTEM FOR VERIFYING INTEGRITY OF A DIGITAL ASSET USING A DISTRIBUTED HASH TABLE AND A PEER TO-PEER DISTRIBUTED LEDGER
#35SYSTEMS AND METHODS FOR ORCHESTRATING IHS UPDATES
#36SYSTEMS AND METHODS FOR SECURE, SCALABLE ZERO TRUST SECURITY PROCESSING
#37SYSTEMS AND METHODS FOR MANAGING DEVICE ASSOCIATION
#38MANAGING CREDENTIALS USABLE IN THE ORCHESTRATION OF WORKSPACES BY MULTIPLE REMOTE ORCHESTRATORS
#39CONFIGURABLE NETWORK SECURITY FOR NETWORKED ENERGY RESOURCES, AND ASSOCIATED SYSTEMS AND METHODS
#40Authentication and Authorization of Servers and Clients in Edge Computing
#41BLUETOOTH LOW ENERGY (BLE) PRE-CHECK IN
#42CERTIFICATE BASED SECURITY FOR DECLARATIVE OPERATIONS
#43Authenticating Data And Communication Sources
#44DATA AUTHENTICATION IN DISTRIBUTED NETWORKS
#45PLATFORM AND METHOD FOR VALIDATING ELECTRONIC SIGNATURES IN SIGNED ELECTRONIC DOCUMENTS
#46PEER-TO-PEER SECURITY STATUS DETECTION
#47AUTHENTICATION TRANSLATION
#48AUTHENTICATING WORK ORDER REQUESTS IN A MULTIPLE NODE ENVIRONMENT
#49CERTIFICATE BASED SECURITY FOR DECLARATIVE OPERATIONS
#50INDIRECT DIAGNOSIS OF MULTIPLE FLUID MIXER UNIT PERFORMANCE
#51METHOD AND SYSTEM FOR ANONYMOUS DIRECTED BLOCKCHAIN TRANSACTION
#52DIGITAL IDENTITY SIGN-IN
#53Wireless Network Service Transaction Protocol
#54PROVIDING ZERO TRUST NETWORK SECURITY WITHOUT MODIFICATION OF NETWORK INFRASTRUCTURE
#55NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING AUTHENTICATION PROGRAM, AUTHENTICATION DEVICE, AND AUTHENTICATION METHOD
#56AUTHENTICATION APPARATUS, AUTHENTICATION METHOD, AND COMPUTER READABLE MEDIUM
#57SYSTEM AND METHOD FOR SECURE RELAYED COMMUNICATIONS FROM AN IMPLANTABLE MEDICAL DEVICE
#58SYSTEM AND APPARATUS FOR RESELLING DIGITAL MEDIA RIGHTS
#59ENHANCED SECURITY OF PROCESS CONTROL INSTRUMENTS
#60AUTHENTICATION AND IDENTITY ARCHITECTURE FOR A MANAGEMENT PLANE OF A MULTI-TENANT COMPUTING SYSTEM
#61METHOD AND SYSTEM FOR AUTHENTICATING A USER WITH AN AUTHENTICATION SERVER
#62PROVISIONING OF ENCRYPTED DNS SERVICES
#63AUTOMATIC WEB PAGE LOGIN FOR WEB-BASED APPLICATIONS
#64SECURE KEY MANAGEMENT FOR SERVICE MESH DEPLOYMENTS
#65SECURE ATTESTATION OF ENDPOINT CAPABILITY
#66SYSTEM AND METHOD FOR AUTHENTICATING AND AUTHORIZING DEVICES
#67Dynamic Data Storage Based on Estimated Update Frequency
#68ATTESTATION-BASED SCHEME FOR VALIDATING PEERING SETUPS FOR CRITICAL INFRASTRUCTURE PROTOCOLS
#69SECURE COMMUNICATION BETWEEN IN-VEHICLE ELECTRONIC CONTROL UNITS
#70REMOTE CERTIFICATE AUTHORITY MANAGEMENT
#71COMPUTER-IMPLEMENTED METHODS AND SYSTEMS FOR ESTABLISHING AND/OR CONTROLLING NETWORK CONNECTIVITY
#72MANAGEMENT METHOD FOR THE RENEWAL OF AUTHENTICATION CERTIFICATES OF CONNECTED COMPONENTS
#73Zero Trust Network Access and Virtual Private Network Client Offloading
#74PERMISSION-BASED CONTROL OF INTERFACING COMPONENTS WITH A MEDICAL DEVICE
#75NETWORK GATEWAY MESSAGING SYSTEMS AND METHODS
#76CLIENT CERTIFICATES TO COMMUNICATE TRUSTED INFORMATION
#77METHOD FOR CONNECTION ESTABLISHMENT AND INTERNET OF THINGS (IOT) DEVICE
#78NON-3GPP DEVICE ACESS TO CORE NETWORK
#79VOTING AS LAST RESORT ACCESS TO PREVENT ERRONEOUS OR MALICIOUS CHANGES
#80VOTING AS LAST RESORT ACCESS RECOVERY FOR COMMON IDENTITY AND ACCESS MANAGEMENT
#81REGION-BASED AUTHENTICATION AND ACCESS POLICIES FOR SERVICES
#82ACCESS AND MESSAGING IN A MULTI CLIENT NETWORK
#83HORTICULTURE CLOUD PLATFORM
#84APPLICATION PROGRAMMING INTERFACE FOR CERTIFICATE MANAGEMENT SYSTEMS
#85USING A TOFU (TRUST ON FIRST USE) SCHEME TO PROVIDE A SECURE INTERFACE BETWEEN TWO MODULES
#86BGP BLACKHOLE AND HIJACK MITIGATION
#87DETECTION OF UNKNOWN APPLICATIONS
#88Facilitating direct device-to-cloud communications within a secure deployment management system
#89PLUGGABLE TRUSTED PLATFORM MODULE REMOTE ATTESTATION
#90CREDENTIAL DEPENDENCY ENCODING AND VERIFICATION BASED ON OTHER CREDENTIAL RESOURCES
#91PACS MODIFICATION TO INCORPORATE LACS AUTHENTICATION
#92SYSTEMS AND METHODS FOR DETERMINING ASSET IMPORTANCE IN SECURITY RISK MANAGEMENT
#93SYSTEM AND METHOD FOR PERSONALIZATION OF A CHAT BOT
#94DIGITAL IDENTITY
#95Devices and Methods for Performing Cryptographic Handshaking
#96Secure DNS Using Delegated Credentials and Keyless SSL
#97Mutual Secure Communications
#98TRUSTED COMMUNICATION SESSION AND CONTENT DELIVERY
#99APPLYING LOGGED-IN-USER-SPECIFIC 802.1X SECURITY ON A MULTI-USER CLIENT COMPUTING DEVICE
#100Authentication of Networked Devices Having Low Computational Capacity
#101Data encryption using public key cryptography and certificate verification
#102SYSTEMS AND METHODS FOR RECLAIMING IDENTITY CREDENTIALS IN A CLOUD MANAGEMENT SERVICE
#103SECURITY KEY INTEGRITY VERIFICATION USING INVENTORY CERTIFICATES
#104DIGITAL IDENTITY LOCK
#105Authentication and Authorization of Servers and Clients in Edge Computing
#106PLATFORM AND METHOD FOR VALIDATING ELECTRONIC SIGNATURES IN SIGNED ELECTRONIC DOCUMENTS
#107PEER-TO-PEER SECURITY STATUS DETECTION
#108ONLINE IDENTITY REPUTATION
#109SYSTEMS AND METHODS FOR IMPROVING FUNCTIONALITY AND REMOTE MANAGEMENT OF COMPUTING RESOURCES DEPLOYED IN A CONTROLLED HIERARCHICAL NETWORK
#110Cross-Domain Secure Connect Transmission Method
#111AUTHENTICATED NAME RESOLUTION
#112USER CERTIFICATE WITH USER AUTHORIZATIONS
#113PRIVACY-PROTECTION BASED VERIFICATION
#114SYSTEM IDENTIFICATION BASED ON DETERMINED CLOCK INFORMATION
#115SECURE DIGITAL ART AND OWNERSHIP RECORDS
#116DYNAMIC ROUTING OF APPLICATION TRAFFIC TO ZTNA CONNECTORS
#117SYSTEM AND METHOD FOR SECURE COMMUNICATION IN A RETAIL ENVIRONMENT
#118Browser Extension for Validating Communications
#119Ascertaining an Evaluation of a Data Set
#120CONTENT SECURITY AT SERVICE LAYER
#121INFORMATION PROCESSING
#122DETECTING IDENTITY THEFT OR IDENTITY CHANGE IN MANAGED SYSTEMS
#123Identity-based application of domain filtering rules using domain name system (DNS) platform
#124SYSTEMS, METHODS, AND APPARATUSES FOR TRANSMISSION OF VERIFICATION CERTIFICATES IN AN ELECTRONIC NETWORK
#125CRYPTOGRAPHIC SYSTEMS AND METHODS
#126SERVICE FUNCTION AUTHORIZATION
#127CLOUD STORAGE USING ENCRYPTION GATEWAY WITH CERTIFICATE AUTHORITY IDENTIFICATION
#128ESTABLISHMENT OF SECURE BLUETOOTH CONNECTION TO INTERNET OF THINGS DEVICES, SUCH AS ELECTRONIC LOCKS
#129DIGITAL IDENTITY SIGN-UP
#130SESSION INITIATION PROTOCOL (SIP) BASED TRANSFER OF USER INFORMATION FROM AN INVITING USER TO AN INVITED USER
#131SELECTIVE DEEP INSPECTION IN SECURITY ENFORCEMENT BY A NETWORK SECURITY SYSTEM (NSS)
#132SYSTEMS AND METHODS FOR EXTRACTING DISCRETE DATA FROM A DATA UNIT AND MANAGING ACCESS THERETO USING ELECTRONIC DIGITAL CERTIFICATES
#133SETTING SYSTEM TIME FOR SERVER CERTIFICATE VALIDATION
#134Vehicle charging system
#135DEVICE PROGRAMMING WITH SYSTEM GENERATION
#136DETECTION OF UNKNOWN APPLICATIONS
#137MEDICAL DEVICES WITH CIRCUITRY FOR CAPTURING AND PROCESSING PHYSIOLOGICAL SIGNALS
#138METHOD AND APPARATUS OF MANAGING ACCESS TO VIRTUAL SPACES BASED ON DIGITAL NON-FUNGIBLE TOKENS
#139ON THE FLY CERTIFICATE GENERATION
#140ON THE FLY CERTIFICATE GENERATION
#141ON THE FLY CERTIFICATE GENERATION
#142Method and apparatus for controlling computing assets within a zero-trust architecture
#143DECENTRALIZED EDGE NODE AUTHENTICATION
#144INFORMATION PROCESSING APPARATUS, METHOD OF CONTROLLING THE SAME, AND STORAGE MEDIUM
#145SCALABLE CREATION OF CONNECTIONS
#146SECURE CROSS-PLATFORM SMART HOSTING, CREDENTIAL SHARING, AND IDENTITY MANAGEMENT
#147AVATAR MANAGEMENT SYSTEM, AVATAR MANAGEMENT METHOD, PROGRAM, AND COMPUTER-READABLE RECORDING MEDIUM
#148TRUSTING A CERTIFICATE FOR A SECURE CONNECTION BASED ON A REMOTE USER SESSION
#149METHOD AND SYSTEM FOR PROVIDING DATA SECURITY FOR MICRO-SERVICES ACROSS DOMAINS
#150CRYPTOGRAPHICALLY SECURE POST-SECRETS-PROVISIONING SERVICES
#151AUTOMATIC NETWORK PROVISIONING OF A MEDICAL DEVICE
#152Security Monitoring at Operating System Kernel Level
#153Digital certificate malicious activity detection
#154SYSTEMS AND TECHNIQUES FOR TRANS-ACCOUNT DEVICE KEY TRANSFER IN BENEFIT DENIAL SYSTEM
#155User Data and Personalization Models Implemented on a Blockchain
#156SESSION-CENTRIC ACCESS CONTROL FOR SECURE EPHEMERAL SHELLS
#157AUTHENTICATING A COMMUNICATION PARTNER ON A DEVICE
#158Secure Circuit For Encryption Key Generation
#159LATTICE MESH
#160Fleet management system and method
#161TECHNIQUES FOR SECURE HOST CONNECTIVITY IN DISASTER RECOVERY SCENARIOS
#162Devices and System
#163METHOD FOR COMMUNICATION BETWEEN A THIRD-PARTY COMPONENT ON A USER DEVICE AND A SERVICE COMPONENT IN THE CLOUD, AND NETWORK ARRANGEMENT FOR IMPLEMENTING THE METHOD
#164CALL AUTHORIZATION AND VERIFICATION VIA A SERVICE PROVIDER CODE
#165SECURE EXCHANGE OF CERTIFICATE AUTHORITY CERTIFICATE INLINE AS PART OF FILE TRANSFER PROTOCOL
#166Protecting non-HTTP and TCP/UDP applications in a ZTNA/webVPN environment
#167SECURE EXCHANGE OF CERTIFICATE AUTHORITY CERTIFICATE INLINE AS PART OF FILE TRANSFER PROTOCOL
#168Dynamic, user-configurable virtual private network
#169METHODS AND SYSTEMS FOR DEVICE AUTHENTICATION
#170SECURE ELEMENT ARRAYS IN INTERNET-OF-THINGS SYSTEMS
#171DATA TRANSMISSION METHOD, DEVICE AND CORRESPONDING PROGRAM
#172PLATFORM FOR INFORMATION TECHNOLOGY MANAGEMENT AS A SERVICE
#173Systems and methods for integrating with a native component using a network interface
#174Network Telemetry with Byte Distribution and Cryptographic Protocol Data Elements
#175Electronic interaction authentication and verification, and related systems, devices, and methods
#176SYSTEMS AND METHODS FOR USING ENTERPRISE IDP FUNCTIONALITY TO AUTHORIZE USER ACCESS ACROSS SERVERS
#177SYSTEM AND METHOD FOR SECURING AND RESOLVING INTERNET PROTOCOL ADDRESS
#178COMMUNICATION SYSTEM
#179OPERATION APPARATUS, OPERATION METHOD, AND PROGRAM
#180AUTHENTICATION OF NODES IN A DISTRIBUTED NETWORK
#181CONFIGURATION OF MULTIPLE SECRETS
#182SECURELY PROVISIONING A SERVICE TO A CUSTOMER EQUIPMENT
#183DNS PACKAGE IN A NETWORK
#184SECURE AUTHENTICATION OF REMOTE EQUIPMENT
#185Using PKI for security and authentication of control devices and their data
#186PROVIDING SSL CONNECTIVITY INSIDE SOFTWARE DEFINED DATACENTERS WITH HYPERCONVERGED INFRASTRUCTURE
#187SYSTEMS AND METHODS FOR PREVENTING TOLL FRAUD IN A SIP ENVIRONMENT
#188Encrypted Communication Platform and Related Systems and Methods
#189ORGANIZATION IDENTIFICATION OF NETWORK ACCESS SERVER DEVICES INTO A MULTI-TENANT CLOUD NETWORK ACCESS CONTROL SERVICE
#190AUTHENTICATION SYSTEM, AUTHENTICATION METHOD, AND AUTHENTICATION PROGRAM
#191SECURE CONFIGURATION OF A VIRTUAL PRIVATE NETWORK SERVER
#192CHARGING CONTROL APPARATUS
#193Method and system for obfuscating senstive personal data in processes requiring personal identification in unregulated platforms
#194METHOD FOR PERFORMING USER AUTHENTICATION AND DEVICE FOR PERFORMING SAME
#195Method for Using NFC Enabled Wallet Passes as Mobile Credentials and a Convenient Way to Create and Distribute Those
#196SECURE FEATURE AND KEY MANAGEMENT IN INTEGRATED CIRCUITS
#197BYPASSING A USER PASSCODE WHEN ACCESSING A GATEWAY OF A VIRTUAL DISKTOP INFRASTRUCTURE SYSTEM
#198DATA PROCESSING METHODS, APPARATUSES, AND DEVICES
#199ONLINE DATA IN A SECURE ENVIRONMENT
#200Systems and methods for device and user authorization
#201AUTHENTICATION TRANSLATION
#202Systems, methods, and devices for multi-stage provisioning and multi-tenant operation for a security credential management system
#203MASTER KEY ESCROW PROCESS
#204METHODS AND SYSTEMS OF PROVIDING VERIFICATION OF INFORMATION USING A CENTRALIZED OR DISTRIBUTED LEDGER
#205Transient Transaction Server DNS Strategy
#206Selective access and verification of user information
#207REMOTE ATTESTATION TRANSPORT LAYER SECURITY AND SPLIT TRUST ENCRYPTION
#208Delegation based access to secure systems
#209SYSTEMS AND METHODS FOR BLOCK DATA SECURITY FOR DIGITAL COMMUNICATIONS FROM A PHYSICAL DEVICE
#210CALL PROCESSING METHOD, RELATED DEVICE, AND COMMUNICATIONS SYSTEM
#211MUTUALLY AUTHENTICATED COMMUNICATION WITH REMOTE SIP DEVICE
#212AUTHENTICATION ORCHESTRATION ACROSS REMOTE APPLIANCES
#213IOT DEVICE AND METHOD FOR ONBOARDING IOT DEVICE TO SERVER
#214AUTOMATIC, SECURE AND BULK ONBOARDING OF DEVICES
#215Method and System for Enabling Drive Features Using Secure Certificates
#216Secure Router Authentication
#217SYSTEM AND METHOD FOR FILE AND FILE SYSTEM INTEGRITY USING DIRECTORIES
#218SYSTEMS AND METHOD FOR PAYMENT TRANSACTION PROCESSING WITH PAYMENT APPLICATION DRIVER
#219Systems and methods for reducing server load with HTTPS cache
#220Enforcing data sovereignty policies in a cloud environment
#221PLATFORM AND METHOD OF CERTIFICATION OF AN ELECTRONIC NOTICE FOR ELECTRONIC IDENTIFICATION AND TRUST SERVICES (EIDAS)
#222Device for Use in the Internet of Things
#223CONTROL-PLANE PROTOCOL FOR ISOLATED OR DISCONNECTED ENVIRONMENTS OF AN INFORMATION HANDLING SYSTEM
#224SYSTEMS AND METHODS FOR SECURELY ESTABLISHING TRUSTED DEVICE BONDING
#225IDENTITY DEFINED SECURE CONNECT
#226METHOD AND DEVICE FOR TWO-FACTOR AUTHENTICATION, COMPUTER DEVICE, AND STORAGE MEDIUM
#227Certificate-Based Connections Reflecting a Network Architecture
#228TESTS RESULTS WITH SECURE ELEMENTS AND CRYPTOGRAPHY
#229AUTOMATED, MULTI-CLOUD LIFECYCLE MANAGEMENT OF DIGITAL IDENTITIES OF IOT DATA ORIGINATORS
#230COMPUTING DEVICE COMPONENT MONITORING SYSTEM
#231Framework For Configurable Per-Service Security Settings In A Forward Proxy
#232Independent sequence processing to facilitate security between nodes in wireless networks
#233Security system for handheld wireless devices using time-variable encryption keys
#234SYSTEMS AND METHODS FOR UPDATING MICROSERVICES SECURE SOCKETS LAYER CERTIFICATE
#235AUTHENTICATION SYSTEM FOR PROVIDING BIOMETRICS-BASED LOGIN SERVICE
#236HARDWARE-ASSISTED CLIENT AUTHENTICATION FOR SECURITY ENHANCEMENT OF VIRTUAL DEVICE
#237SYSTEMS AND METHODS FOR PRESERVING PRIVACY OF A REGISTRANT IN A DOMAIN NAME SYSTEM ("DNS")
#238Collaborative Document Editing
#239SECURE AGGREGATION OF IOT MESSAGES
#240SYSTEM FOR SHARING VEHICLE SENSOR INFORMATION
#241DEVICE AND METHOD FOR ADDING EQUIPMENT DATA INTO A DISTRIBUTED DATABASE SYSTEM
#242Transferring application data between devices
#243SYSTEMS, METHODS, AND DEVICES FOR PREVENTING CREDENTIAL PASSING ATTACKS
#244ADDING DEVICES TO A NETWORK VIA A ZERO-KNOWLEDGE PROTOCOL
#245CRYPTOGRAPHICALLY SIGNED NETWORK CONFIGURATIONS
#246Secure configuration of a virtual private network server
#247METHODS AND SYSTEMS FOR DETECTING AND PREVENTING COMPROMISED NETWORK CONNECTIONS
#248STRUCTURED DATA DISCOVERY AND CRYPTOGRAPHIC ANALYSIS
#249CERTIFICATION SYSTEM
#250EMBEDDING PROGRAMMING CODE IN AN ELECTRONIC MESSAGE
#251A REST INTERFACE SPECIFICATION ENCAPSULATION SYSTEM BASED ON NETWORK SNIFFING
#252Systems and Methods for Generating Contextual Labels
#253CERTIFICATE AUTHORITY SELECTION IN A CLOUD PROVIDER NETWORK
#254METHOD AND SYSTEM FOR PROVISIONING DEVICE SPECIFIC WLAN CREDENTIALS
#255Secure access of remote device
#256Computer-Implemented Registration Authority, System and Method for Issuing a Certificate
#257Systems and methods for storing and sharing transactional data using distributed computer systems
#258APPARATUS AND METHOD FOR MANAGING DATA CERTIFICATES IN AN ICN NETWORK
#259AUTHENTICATION USING A SECURE CIRCUIT
#260Secure methods, systems, and media for generating and verifying user credentials
#261SYSTEMS AND METHODS FOR PROVIDING ACCESS TO APPLICATIONS AND SERVICES RUNNING ON A PRIVATE NETWORK
#262DEVICE AUTHENTICATION METHOD AND ELECTRONIC DEVICE
#263System and method for pool-based identity authentication for service access without use of stored credentials
#264Information processing method, device, apparatus and system, medium, andprogram
#265Wireless device connection
#266METHOD AND SYSTEM FOR CRYSTALIZING CAPTURED EMOTIONS
#267Enabling communications between applications in a mobile operating system
#268BUSINESS CONTINUITY APPARATUS
#269SECURE MANAGEMENT OF A ROBOTIC PROCESS AUTOMATION ENVIRONMENT
#270SYSTEM AND METHOD USING DISTRIBUTED BLOCKCHAIN DATABASE
#271Digital certificate and reservation
#272DECENTRALIZED SECURE TRUE DIGITAL ID FOR COMMUNICATION
#273REAL-TIME ANALYSIS PLUGIN FOR CYBER DEFENSE
#274SYSTEMS AND METHODS FOR REAL-TIME IDENTITY VERIFICATION USING A TOKEN CODE
#275AUTHENTICATION OF DEVICE IN NETWORK USING CRYPTOGRAPHIC CERTIFICATE
#276Auto-Configuration of Security Features in Distributed System with Minimal User Interaction
#277AUTHENTICATION OF AVATARS FOR IMMERSIVE REALITY APPLICATIONS
#278Systems and methods for ensuring data security in the treatment of diseases and disorders using digital therapeutics
#279Systems and methods for privacy preserving accurate analysis of network paths
#280Automated validation of data sources in a managed network
#281Autonomous vehicle sensor security system
#282METHODS AND APPARATUS FOR AUTOMATICALLY SECURING COMMUNICATIONS BETWEEN A MEDIATION DEVICE AND A LAW ENFORCEMENT DEVICE
#283METHODS AND APPARATUS FOR AUTOMATICALLY SECURING COMMUNICATIONS BETWEEN A MEDIATION DEVICE AND POINT OF INTERCEPT
#284UNIFIED IDENTIFICATION VERIFICATION SYSTEM
#285Pixelwise Filterable Depth Maps for Robots
#286Zero trust private application access for government applications
#287METHOD AND SYSTEM FOR SECURELY PROVIDING VEHICLE SERVICES DATA TO A VEHICLE
#288Advertisement of Discovered User Premises Network Devices and Services
#289TLS server certificate replacement using a notification mechanism
#290DYNAMIC ATTACHMENT OF SECURE PROPERTIES TO MACHINE IDENTITY WITH DIGITAL CERTIFICATES
#291Secure inter-application communication with unmanaged applications using certificate enrollment
#292Wireless peer to peer mobile wallet connections
#293SECURE DATA PARSER METHOD AND SYSTEM
#294METHODS AND SYSTEMS FOR NETWORK DEVICE AUTHENTICATION
#295Attestation of application identity for inter-app communications
#296MEDICAL DEVICE COMMUNICATION CERTIFICATE MANAGEMENT
#297Onboarding for remote management
#298WIRELESS COMMUNICATION DEVICE AND WIRELESS COMMUNICATION METHOD ABLE TO VERIFY VENDOR INFORMATION
#299Secure session capability using public-key cryptography without access to the private key
#300SYSTEM AND METHOD FOR SECURING PROTECTED HOST