Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using an additional device, e.g. smartcard, SIM or a different communication terminal
TECHNIQUES FOR TOKEN PROXIMITY TRANSACTIONS
#2SECURE USER AUTHENTICATION LEVERAGING QUANTUM KEY AND STEGANOGRAPHY
#3SYSTEMS AND METHODS FOR SECURE AUTHENTICATION THROUGH NEAR FIELD COMMUNICATION
#4PROVIDING ACCESS CONTROL AND IDENTITY VERIFICATION FOR COMMUNICATIONS WHEN INITIATING A COMMUNICATION TO AN ENTITY TO BE VERIFIED
#5Multi-Factor Authentication and Post-Authentication Processing System
#6SMART CARD FOR GENERATING AND PROVIDING VIRTUAL CODE, AND METHOD AND PROGRAM THEREFOR
#7SYSTEM AND METHOD FOR MULTIFACTOR AUTHENTICATION FOR ACCESS TO A RESOURCE BASED ON CO-CONNECTED DEVICE PRESENCE
#8DISTRIBUTED MANAGEMENT SYSTEM AND MANAGEMENT METHOD FOR SMART CARD MANAGEMENT APPARATUSES
#9MOBILE ENROLLMENT USING A KNOWN BIOMETRIC
#10APPLICATION SECURITY THROUGH DECEPTIVE AUTHENTICATION
#11SYSTEMS AND METHODS FOR ONE-TIME PASSWORD AUTHENTICATION
#12QUORUM-BASED SECURE AUTHENTICATION
#13AUTHENTICATION BYPASS INFRASTRUCTURE
#14Safe Logon
#15AUTHENTICATION SYSTEM HAVING PIPELINED PROCESSING
#16TECHNIQUES TO CONTROL APPLETS FOR CONTACTLESS CARDS
#17CONTROL METHOD, CONTROLLER, DATA STRUCTURE, AND POWER TRANSACTION SYSTEM
#18SYSTEMS AND METHODS FOR PROVIDING IDENTITY VERIFICATION SERVICES
#19TRANSACTION SECURITY SYSTEMS AND METHODS
#20Risk-Based Factor Selection
#21Security Techniques for Device Assisted Services
#22TECHNIQUES FOR BIOMETRIC AUTHENTICATION OF USER OF MOBILE DEVICE
#23SYSTEMS AND METHODS FOR PASSWORD MANAGERS
#24SYSTEMS AND METHODS FOR PROVIDING PRIORITIZATION FOR DATA TRANSPORT SERVICES
#25SYSTEMS AND METHODS FOR AUTHENTICATION FOR USER SUPPORT
#26CONFIGURING OFFLINE ELECTRIC VEHICLE SUPPLY EQUIPMENT (EVSE) VIA 2-FACTOR AUTHENTICATION
#27AUTHENTICATION OF SOFTWARE ROBOTS WITH GATEWAY PROXY FOR ACCESS TO CLOUD-BASED SERVICES
#28DEVICES, METHODS, COMPUTER-READABLE MEDIA, AND SYSTEMS FOR AUTHENTICATING USERS
#29FIRST FACTOR CONTACTLESS CARD AUTHENTICATION SYSTEM AND METHOD
#30Fixture
#31VERIFYING WHETHER A DEVICE IS COMMUNICATING WITH A SERVER
#32SYSTEMS AND METHODS FOR ISSUING AND USING DEDICATED TOKENS FOR REWARDS ACCOUNTS
#33CLIENT DEVICE HAVING AGENT APPLICATION CONFIGURED TO COMMUNICATE WITH WEB SERVER ENDPOINT FOR AUTHENTICATION
#34SMART GATEWAY ENABLED LOW COST SMART BUILDING SOLUTION
#35METHOD AND SYSTEM FOR PATIENT CARE USING A PATIENT CONTROLLED HEALTH RECORD
#36DIGITAL AUTHENTICATION SYSTEM
#37SECURE AUTHENTICATION AND TRANSACTION SYSTEM AND METHOD
#38METHOD OF HOST-DIRECTED ILLUMINATION AND SYSTEM FOR CONDUCTING HOST-DIRECTED ILLUMINATION
#39METHODS AND SYSTEMS OF USING REMOTE SUBSCRIBER IDENTIFICATION MODULES AT A DEVICE
#40Device to Device Binding for Push Approval
#41TRANSACTION SYSTEM, TRANSACTION METHOD, AND INFORMATION RECORDING MEDIUM
#42Handling Encoded Information
#43A BIOMETRIC SYSTEM COMPRISING A CONTACTLESS SMARTCARD AND AN ENROLLMENT ASSISTANCE DEVICE, AND A METHOD FOR ENROLLING A USER HAVING THE SYSTEM
#44CONTEXT-BASED AUTHENTICATION OF A USER
#45THIRD-PARTY AUTHENTICATION PROTOCOLS FOR NATIVE ACCESS CONTROL
#46AUTHENTICATED INTERFACE ELEMENT INTERACTIONS
#47SYSTEMS AND METHODS FOR AUTHORIZING A TRANSACTION
#48OPTIMIZED ACCESS CONTROL SYSTEM
#49OPTIMIZED ACCESS CONTROL SYSTEM
#50SYSTEMS AND TECHNIQUES TO PERFORM VERIFICATION OPERATIONS WITH WIRELESS COMMUNICATION
#51PROTECTIVELY DISPLAYING SPECIFIC FIELDS IN SPECIFIC VIEWS OF A SECURE INTERFACE
#52FEDERATED IDENTITY VERIFICATION AND ACCESS CONTROL FOR PUBLIC SERVICE ENTITIES
#53PLUGGABLE TRUSTED PLATFORM MODULE REMOTE ATTESTATION
#54MULTI-LEGGED NETWORK ATTRIBUTION USING TRACKING TOKENS AND ATTRIBUTION STACK
#55TECHNIQUES FOR PEER ENTITY ACCOUNT MANAGEMENT
#56Linked Account System Using Personal Digital Key (PDK-LAS)
#57ELECTRONIC INFORMATION PROCESSING SYSTEM, ELECTRONIC INFORMATION PROCESSING METHOD, AND PROGRAM
#58REAL-NAME INFORMATION PACKAGE AND REAL-NAME INFORMATION SECURITY PROTECTION METHOD
#59Authentication System and Method for Windows Systems
#60METHOD AND SYSTEM FOR IDENTITY AUTHENTICATION
#61SETTING SYSTEM FOR MOBILE COMMUNICATION TERMINAL AND METHOD THEREFOR
#62DYNAMICALLY TAILORED TRUST FOR SECURE APPLICATION-SERVICE NETWORKING IN AN ENTERPRISE
#63AUTHORIZATION FRAMEWORK FOR APPLICATION PROGRAMMING INTERFACE (API) COLLECTIONS
#64Context Aware Client Firewall for Mobile Devices in Cloud Security Systems
#65SYSTEMS AND METHODS FOR PROVIDING PRIORITIZATION FOR DATA TRANSPORT SERVICES
#66METHOD, APPARATUS, AND COMPUTER PROGRAM PRODUCT FOR SELECTIVELY GRANTING PERMISSIONS TO GROUP-BASED OBJECTS IN A GROUP-BASED COMMUNICATION SYSTEM
#67Portable Access Point for Secure User Information Using a Blockchain Backed Credential
#68ROUTING DEVICE, MANAGEMENT CENTER DEVICE, USER AUTHENTICATION METHOD, AND STORAGE MEDIUM
#69System and method for using a validated card in a virtual environment
#70VEHICLE NETWORK SECURITY
#71Devices, Methods, and Computer Readable Mediums for Security and Authentication
#72Cross-Cloud Workload Identity Virtualization
#73APP FREE AUTHENTICATION ACROSS CHANNELS
#74SECURED DATABASE RESTORATION ACROSS SERVICE REGIONS
#75TARGETED AUTHENTICATION QUERIES BASED ON DETECTED USER ACTIONS
#76SECURE RESOURCE AUTHORIZATION FOR EXTERNAL IDENTITIES USING REMOTE PRINCIPAL OBJECTS
#77SYSTEMS AND METHODS FOR PROVIDING ACCESS TO A SECURE DEVICE
#78SYSTEM AND METHOD OF IMAGED BASED LOGIN TO AN ACCESS DEVICE
#79SYSTEMS AND METHODS FOR SUCCESSIVELY EXECUTING AN OPERATION OVER MULTIPLE COMMUNICATION NETWORKS
#80SYSTEMS AND METHODS FOR EXECUTING SEQUENTIAL SUBOPERATIONS AT AN AGGREGATED VIRTUAL CONTAINER PROVIDER SYSTEM
#81UTILIZING A TRANSACTION CARD TO PROVIDE SECONDARY AUTHENTICATION FOR ACCESSING A SECURE APPLICATION WITH A USER DEVICE
#82LOCATION BASED AUTHENTICATION
#83MANAGING ACCESS LEVEL PERMISSIONS BY A DISTRIBUTED LEDGER NETWORK
#84SYSTEM AND METHOD FOR PASSWORDLESS LOGINS
#85Connection revocation in overlay networks
#86LICENSING VERIFICATION MESSAGE
#87AUTOMATED ACCESS TO RACKS IN A COLOCATION DATA CENTER
#88REDIRECTING TO A TRUSTED DEVICE FOR SECURED DATA TRANSMISSION
#89SECURE MESSAGING IN A MACHINE LEARNING BLOCKCHAIN NETWORK
#90LOGIN AND AUTHENTICATION METHODS AND SYSTEMS
#91AUTHENTICATING A USER DEVICE VIA A MONITORING DEVICE
#92NETWORK DEVICE PROXIMITY-BASED AUTHENTICATION
#93EXTERNALLY HELD ACCOUNT DISCOVERY AND AGGREGATION
#94MODULAR BIOMETRIC STATION WITH COHESIVE FORM FACTOR
#95SYSTEM AND METHOD FOR PROVIDING LOCATION-BASED ACCESS IN 5G
#96TIME-ONLY BASED AUTHENTICATION FACTORS
#97ADAPTIVE ARTIFICIAL INTELLIGENCE SYSTEMS AND METHODS FOR TOKEN VERIFICATION
#98PROXIMITY-AWARE MULTIFACTOR AUTHENTICATION FOR CONTINUOUS TRUSTED ACCESS
#99NETWORK CONNECTION AUTOMATION
#100DATA SYNCHRONIZATION OF ELECTRONIC PATIENT CONTROLLED HEALTH RECORDS
#101Use of QR codes in Online Encoding
#102System and method for pre-authenticating user devices within a metaverse
#103Method and system for activating telematics services
#104DYNAMIC WEB CONTENT INSERTION
#105ACCESS CONTROL FOR NETWORK SERVICES
#106Secure access to devices in a virtual environment using security tokens
#107COMPUTER-BASED SYSTEMS INVOLVING ENHANCED ONE-TIME PASSCODE (OTP) MESSAGING AND METHODS OF USE THEREOF
#108COMPUTER-BASED SYSTEMS INVOLVING ENHANCED ONE-TIME PASSCODE (OTP) MESSAGING AND METHODS OF USE THEREOF
#109SYSTEMS AND METHODS TO CHECK-IN SHOPPERS IN A CASHIER-LESS STORE
#110SYSTEMS AND METHODS FOR PAYMENT COLLECTION FROM THIRD PARTY SOURCE
#111NETWORK SERVICE PLAN DESIGN
#112IoT BASED AUTHENTICATION
#113TRANSMISSION DEVICE, SYSTEM AS WELL AS METHOD FOR TRANSMITTING MONITORING INFORMATION
#114NETWORK OF TRUST FOR BILL SPLITTING
#115SYSTEMS AND METHODS FOR TRACKING, AUTHENTICATING, AND GENERATING RESOURCE DISTRIBUTIONS TO TRUSTED ENTITIES IN A NETWORK ENVIRONMENT
#116SYSTEM AND METHOD FOR APPROVING TRANSACTIONS
#117USER-LEVEL TOKEN FOR USER AUTHENTICATION VIA A USER DEVICE
#118COMPUTER ACCESS CONTROL USING REGISTRATION AND COMMUNICATION SECRETS
#119SYSTEMS AND TECHNIQUES FOR TRANS-ACCOUNT DEVICE KEY TRANSFER IN BENEFIT DENIAL SYSTEM
#120NON-VERBAL SENSITIVE DATA AUTHENTICATION
#121METHOD FOR AUTHORIZING A SECURE ACCESS FROM A LOCAL DEVICE TO A REMOTE SERVER COMPUTER
#122METHOD(S) AND SYSTEM(S) FOR UTILIZING AN INDEPENDENT SERVER TO FACILITATE SECURE EXCHANGE OF DATA
#123SYSTEMS AND METHODS FOR CROSS COUPLING RISK ANALYTICS AND ONE-TIME-PASSCODES
#124SYSTEM AND METHOD FOR PROVIDING A WEB SERVICE USING A MOBILE DEVICE CAPTURING DUAL IMAGES
#125Accessing a virtual sub-environment in a virtual environment
#126SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS
#127Method and System for Multifactor Mutual Authentication
#128AUTHENTICATING DEVICES VIA TOKENS AND VERIFICATION COMPUTING DEVICES
#129SECURE ELEMENT ARRAYS IN INTERNET-OF-THINGS SYSTEMS
#130METHOD AND SYSTEM FOR ESTABLISHING MULTIPLE CONNECTIONS AT A WIRELESS COMMUNICATION DEVICE
#131OPERATOR ACTION AUTHENTICATION IN AN INDUSTRIAL CONTROL SYSTEM
#132SECURE VERIFICATION OF AN INDIVIDUAL USING WIRELESS BROADCASTS
#133Optimized authentication system
#134CONTROLLING ACCESS TO COMPONENTS OF A SOFTWARE-DEFINED DATA CENTER IN A HYBRID ENVIRONMENT
#135INTEGRATION OF REAL-WORLD AND VIRTUAL-WORLD SYSTEMS
#136AUTHENTICATING COMMANDS ISSUED THROUGH A CLOUD PLATFORM TO EXECUTE CHANGES TO INVENTORY OF VIRTUAL OBJECTS DEPLOYED IN A SOFTWARE-DEFINED DATA CENTER
#137CONNECTING A SOFTWARE-DEFINED DATA CENTER TO CLOUD SERVICES THROUGH AN AGENT PLATFORM APPLIANCE
#138OPTIMIZED AUTHENTICATION SYSTEM
#139USB DEVICE
#140MULTI-FACTOR AUTHENTICATION AND ACCESS CONTROL IN A VEHICULAR ENVIRONMENT
#141Systems for securely tracking incident data and automatically generating data incident reports using collaboration rooms with dynamic tenancy
#142BIOMETRIC INTERACTION MANAGER
#143THIRD-PARTY PAYMENT INTERFACES
#144SECURE PERMISSIONING OF ACCESS TO USER ACCOUNTS, INCLUDING SECURE DISTRIBUTION OF AGGREGATED USER ACCOUNT DATA
#145Methods for maintaining user access to computing devices based on determining user control
#146DYNAMIC UPDATES TO CLOUD ACCESS POLICIES
#147Systems for Securely Tracking Incident Data and Automatically Generating Data Incident Reports Using Collaboration Rooms with Dynamic Tenancy
#148GENERATING AND UTILIZING DIGITAL VISUAL CODES TO GRANT PRIVILEGES VIA A NETWORKING SYSTEM
#149Multifactor identity authentication via cumulative dynamic contextual identity
#150MULTI FACTOR AUTHENTICATION USING DIFFERENT DEVICES
#151System includes server, printing apparatus, information processing apparatus to provide a technique for specifying a physical printer associated with a logical printer, and non-transitory storage medium
#152Mobile enrollment using a known biometric
#153Secure peer-to-peer based communication sessions via network operating system in secure data network
#154VIRTUAL DESKTOP SCREEN SHARING WITH MULTIPLE SHARERS IN A COLLABORATION SESSION
#155SYSTEM AND METHOD FOR MOBILE TELEPHONE ROAMING
#156TOKEN BASED IDENTITY VERIFICATION AND CONSENT MANAGEMENT
#157System for implementing multifactor authentication based on secure tokenization
#158METHODS, SYSTEMS AND MACHINE-READABLE PROGRAMS FOR COMMUNICATING SELF DESTRUCTIVE MESSAGES
#159AUTHENTICATABLE SAMPLE COLLECTION KIT FOR PLANT SAMPLE COLLECTION AND USE THEREOF
#160System and method for second factor authentication to perform services
#161System and method for hosting FIDO authenticators
#162MULTIMEDIA MESSAGE (MMS) OBJECT SEQUENCES AS MULTI-FACTOR AUTHENTICATION (MFA) FOR USER IDENTIFICATION IN 5G
#163Two-Factor Authentication Systems And Methods
#164Method for Using NFC Enabled Wallet Passes as Mobile Credentials and a Convenient Way to Create and Distribute Those
#165TOKENIZED HARDWARE SECURITY MODULES
#166SMART TABLE SYSTEM UTILIZING EXTENDED REALITY
#167RELAY CONTROL METHOD, STORAGE MEDIUM, RELAY CONTROL DEVICE
#168Dynamic secure keyboard resource obtaining interface definitions for secure ad-hoc control of a target device in a secure peer-to-peer data network
#169IDENTITY VERIFICATION METHOD AND SYSTEM
#170Authentication bypass infrastructure
#171METHOD FOR AUTHENTICATING AN ELECTRONIC DEVICE
#172SECURITY SYSTEM FOR A MOVEABLE BARRIER OPERATOR
#173SYSTEM AND METHOD FOR AUTHORIZING ENTITY USERS BASED ON AUGMENTED REALITY AND LIDAR TECHNOLOGY
#174Device Risk Level Based on Device Metadata Comparison
#175Trusted Identification of Enrolling Users Based on Images and Unique Identifiers Associated with Sponsoring Users
#176AUTHORIZED MACHINE LEARNING MODEL RETRIEVAL FOR A COMMUNICATIONS NETWORK
#177SECURE COMMUNICATIONS VIA THIRD-PARTY SYSTEMS THROUGH FRAMES
#178SECURE COMMUNICATIONS VIA THIRD-PARTY SYSTEMS THROUGH FRAMES
#179Multi-legged network attribution using tracking tokens and attribution stack
#180ACCESS CONTROL SYSTEM
#181System and method to protect privacy of Personal-Identification-Number entry on consumer mobile device and computing apparatus
#182Authentication token management for multiple processes and representational state transfer clients
#183SECURE COMMUNICATIONS VIA THIRD-PARTY SYSTEMS THROUGH FRAMES
#184System and method for establishing secure communication between applications
#185Structure-based access control
#186SINGLE SIGN-ON ENABLED WITH OAUTH TOKEN
#187SYSTEM FOR MANAGING IOT DEVICES
#188BIOMETRIC MULTI-FACTOR AUTHENTICATION
#189Anti-phish, personalized, security token to authenticate electronic communications in the meta verse
#190Double anti-phish, personalized, security token for use with electronic communications
#191Control method, controller, data structure, and power transaction system
#192Remote secured console over a secured connection for inoperable virtual machine
#193CERTIFICATION SYSTEM
#194VERIFYING WHETHER A DEVICE IS COMMUNICATING WITH A SERVER
#195System for sending e-mail and/or files securely
#196CLIENT DEVICE AUTHENTICATION USING CONTACTLESS LEGACY MAGNETIC STRIPE DATA
#197SYSTEMS AND METHODS FOR VERIFIED MESSAGING VIA SHORT-RANGE TRANSCEIVER
#198Systems and methods for providing secure access to collaboration rooms with dynamic tenancy in response to an event
#199SYSTEM AND METHOD OF SHARING USER CREDENTIALS
#200SYSTEM AND METHOD FOR AGNOSTIC AUTHENTICATION OF A CLIENT DEVICE
#201SYSTEMS AND METHODS FOR MONITORING DECENTRALIZED DATA STORAGE
#202COMPUTER CHALLENGE SYSTEMS BASED ON OBJECT ALIGNMENT
#203Entity engine of a computing platform
#204Terminal Device, Access Point, Communication Device, and Computer Programs Therefor
#205Location-based task execution for enhanced data access
#206Security platform architecture
#207Methods for managing user access to computing devices based on evaluation of authentication and maintenance of user control
#208Multifactor identity authentication via cumulative dynamic contextual identity
#209SYSTEMS AND METHODS FOR AUTHENTICATING A USER AT A PUBLIC TERMINAL
#210SYSTEMS AND METHODS OF AUTHENTICATION USING VEHICLE DATA
#211USER AUTHENTICATION SYSTEM AND PORTABLE TERMINAL
#212Secure user authentication leveraging quantum key and steganography
#213Enabling communications between applications in a mobile operating system
#214Synthetic genomic variant-based secure transaction devices, systems and methods
#215SYSTEMS AND METHODS FOR IMPLEMENTING COMPUTER TRANSMISSION SECURITY PROTOCOL
#216SYSTEM AND METHOD USING DISTRIBUTED BLOCKCHAIN DATABASE
#217Authentication question topic exclusion based on response hesitation
#218DATA ACCESS CONTROL SYSTEM ACCESSIBLE FROM THIRD-PARTY WEB
#219SECURE LOGIN WITH AUTHENTICATION BASED ON A VISUAL REPRESENTATION OF DATA
#220Systems and methods for signaling an attack on contactless cards
#221SYSTEMS AND METHODS FOR AUTHENTICATING ACCESS TO A SERVICE BY A MOBILE DEVICE
#222PRIVACY PRESERVING ZERO KNOWLEDGE PROOF OF DEVICE CO-LOCATION
#223Method and system for ultrasonic proximity service
#224Using the NFC field from a phone to power card to phone Bluetooth communications
#225METHOD AND APPARATUS WITH SELECTIVE COMBINED AUTHENTICATION
#226Network management using trusted execution environments
#227CONTEXT SPECIFIC USER CHATBOT
#228Dynamic web content insertion
#229DATA MANAGEMENT SYSTEMS AND METHODS
#230PROVIDING ACCESS TO DATACENTER RESOURCES IN A SCALABLE MANNER
#231MULTI STEP AUTHENTICATION METHOD AND SYSTEM
#232Methods and systems for spatial rendering of multi-user voice communication
#233METHOD AND SYSTEM OF SECURELY ADDING AN EDGE DEVICE OPERATING IN A PUBLIC NETWORK TO AN SD-WAN
#234Dynamic secure keyboard resource obtaining interface definitions for secure ad-hoc control of a target device in a secure peer-to-peer data network
#235Dynamic modification of a verification method associated with a transaction card
#236MAIL ROUTING SYSTEM UTILIZING PRINTED INDICIA-CONTAINING MAILING ADDRESSES
#237RESOURCE ACCESS CONTROL IN CLOUD ENVIRONMENTS
#238Travel identity tokening
#239Utilizing a high generation cellular network to authorize an event
#240SYSTEM AND METHOD FOR AUGMENTED AUTHENTICATION USING ACOUSTIC DEVICES
#241STREAMING SYSTEM DEVICE AUTHENTICATION SYSTEM AND METHOD
#242IDENTITY MANAGEMENT SYSTEM
#243SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR EFFECTIVE DOCUMENT CAPTURE E.G. DURING ONBOARDING
#244Expedited User Authentication
#245Provisioning and integrating devices
#246Methods and systems of using remote subscriber identification modules at a device
#247APPARATUS AND METHOD OF AUTHENTICATING DEVICE THROUGH INFRARED TRANSMISSION
#248SYSTEMS AND METHODS FOR CREDENTIALS SHARING
#249SECURE AUTHENTICATION AND TRANSACTION SYSTEM AND METHOD
#250Mount, authentication device, authentication method, and program
#251METHOD AND SYSTEM FOR INVOKING APPLICATION PROGRAMMING INTERFACE, AND APPARATUS
#252APPARATUS FOR CONTROLLING ACCESS OF VEHICLE DIAGNOSTIC DEVICE AND METHOD THEREOF
#253Apparatus and methods for reverse identification and authentication
#254Multi-Level Authentication Security Service
#255Trustworthy data exchange using distributed databases
#256Method and system for asynchronous medical patient data communication between multiple parties
#257Systems and methods for mitigating fraud based on geofencing
#258Method for transmitting an existing subscription profile from a MNO to a secure element, corresponding servers and secure element
#259System and method for multifactor authentication for access to a resource based on co-connected device presence
#260USER AUTHENTICATION SYSTEM
#261SYSTEM AND METHOD FOR THE AUTOMATED PROCESSING OF PHYSICAL OBJECTS
#262Authenticating a user device via a monitoring device
#263METHOD FOR ADAPTING THE SECURITY SETTINGS OF A COMMUNICATION STATION, COMMUNICATION STATION AND IDENTIFICATION MODULE
#264ELECTRONIC DEVICE AND METHOD FOR CONTROLLING VEHICLE BASED ON DRIVER AUTHENTICATION
#265Cross-Cloud Workload Identity Virtualization
#266AUTHENTICATION OF DATA SHARING
#267ELECTRONIC DEVICE, DATA USAGE METHOD, AND RECORDING MEDIUM
#268Systems and methods to check-in shoppers in a cashier-less store
#269STATIC UNIFORM RESOURCE LOCATORS HAVING PLACEHOLDER PARAMETERS FOR DYNAMIC VALUES
#270MULTI NODAL AUTHENTICATION TECHNOLOGY
#271ACCESS TOKEN CONVERSION
#272Proximity-Based System for Object Tracking
#273SECURE AUTHENTICATION SYSTEM AND METHOD
#274Expedited authorization and access management
#275Biometric transaction system
#276POLICY ENFORCEMENT AND VISIBILITY BY OPEN APIS
#277SECURE AUTONOMIC RECOVERY FROM UNUSABLE DATA STRUCTURE VIA A TRUSTED DEVICE IN A SECURE PEER-TO-PEER DATA NETWORK
#278NATIVE REMOTE ACCESS TO TARGET RESOURCES AND SECRETLESS CONNECTIONS
#279Secure resource authorization for external identities using remote principal objects
#280Adaptive artificial intelligence systems and methods for token verification
#281Single sign-on using smart credential
#282METHODS FOR SECURE DATA STORAGE
#283Multi-factor autonomous SIM lock
#284COMMUNICATION APPARATUS, CONTROL METHOD, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM STORING PROGRAM
#285Socket Security and Authentication Device, System and Method
#286ONE-OF-A-KIND TO OPEN EDITION NON-FUNGIBLE TOKEN DYNAMICS
#287FILE JOURNAL INTERFACE FOR SYNCHRONIZING CONTENT
#288NETWORK ACCESS AUTHENTICATION METHOD AND ASSOCIATED SYSTEM
#289METHOD, CONTROLLER, AND COMPUTER-READABLE MEDIUM FOR DETERMINING AUTHORIZED TOKEN TRANSFERS IN A TOKENIZED TRANSFER NETWORK
#290Access rejection method, apparatus and system, and storage medium and processor
#291Card-personalization system
#292Systems and methods for authorizing a transaction
#293System, method and computer program product for credential provisioning in a mobile device platform
#294MOBILE TERMINAL, CONTROL METHOD, AND STORAGE MEDIUM
#295Providing physical access to a secured space based on high-frequency electromagnetic signaling
#296Wearable identity device for fingerprint bound access to a cloud service
#297Systems and Methods for Providing Collaboration Rooms with Dynamic Tenancy and Role-based Security
#298Cellular service account transfer and authentication
#299VIRTUAL LINE REGISTRATION SYSTEM
#300Methods and systems of using remote subscriber identification modules at a device