Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
SYSTEMS AND METHOD FOR AUTHENTICATING USERS OF A DATA PROCESSING PLATFORM FROM MULTIPLE IDENTITY PROVIDERS
#2ENHANCED NETCONF ACCESS CONTROL MODEL (NACM) OPERATIONS AND GRANULAR CONTROLS FOR SHARED DATA NODE MANAGEMENT
#3MULTI-FACTOR ENABLED ACCESS USING RANDOMLY SELECTED DIGITAL IDENTITY AUTHENTICATION FACTORS
#4SECURE DEVICE PAIRING
#5SYSTEM AND METHOD FOR DEVICE AUTHENTICATION USING SECURITY QUESTIONS BASED ON ANOMALOUS DATA
#6CREDENTIAL-BASED SECURITY POSTURE ENGINE IN A SECURITY MANAGEMENT SYSTEM
#7INTEGRATED SYSTEM, INTERFACE CALLING METHOD, AUTHENTICATION METHOD, AND RELATED DEVICE
#8SECURE ONBOARDING OF USERS AND ORGANIZATIONS ON MOBILITY-AS-A-SERVICE (MAAS) PLATFORM
#9SYSTEM AND METHOD FOR SCORING SECURITY QUESTIONS BASED ON DATA VARIABILITY WHILE PERFORMING DEVICE AUTHENTICATION
#10INTEGRATED CYBERSECURITY SYSTEM AND METHOD FOR PROVIDING RESTRICTED CLIENT ACCESS TO A WEBSITE
#11ATTESTATION MANIFEST DERIVATION AND DISTRIBUTION USING SOFTWARE UPDATE IMAGE
#12DETECTING AUTHENTICATION OBJECT-FOCUSED ATTACKS
#13Method for Device Commissioning in a Network System and Network System
#14PROVIDING ACCESS CONTROL AND IDENTITY VERIFICATION FOR COMMUNICATIONS WHEN INITIATING A COMMUNICATION TO AN ENTITY TO BE VERIFIED
#15TRANSFERRING ACTIONS FROM A SHARED DEVICE TO A PERSONAL DEVICE ASSOCIATED WITH AN ACCOUNT OF A USER
#16DATA TRANSFER DISCOVERY AND ANALYSIS SYSTEMS AND RELATED METHODS
#17System and Method for Authenticating Client Devices Communicating with an Enterprise System
#18REMOTE CLUSTER ENROLLMENT
#19SECURE ACCESS VIA 802.1X PORT-BASED NETWORK ACCESS CONTROL (PNAC)
#20MID-SESSION TRUST ASSESSMENT
#21PROVIDING ACCESS CONTROL AND IDENTITY VERIFICATION FOR COMMUNICATIONS WHEN INITIATING A COMMUNICATION TO AN ENTITY TO BE VERIFIED
#22MACHINE LEARNING TECHNIQUES FOR ASSOCIATING ASSETS RELATED TO EVENTS WITH ADDRESSABLE COMPUTER NETWORK ASSETS
#23SYSTEMS AND METHODS FOR INTELLIGENT STEP-UP FOR ACCESS CONTROL SYSTEMS
#24Posture control for cloud environments
#25INTEGRATION PACKAGING FOR A MULTI-TENANT COMPUTING ENVIRONMENT
#26SYSTEMS AND METHODS FOR AUTHENTICATING DATA TRANSMISSIONS TO VEHICLES
#27ENHANCED CLOUD ACCESS SECURITY BROKER FUNCTIONALITY UTILIZING IN-BAND APPLICATION OBSERVABILITY
#28SYSTEM AND METHOD FOR MULTIFACTOR AUTHENTICATION FOR ACCESS TO A RESOURCE BASED ON CO-CONNECTED DEVICE PRESENCE
#29Context-Based Risk Assessment for an Identity Verification System
#30EDGE CLOUD RESOURCE ALLOCATION USING HINTS FROM NETWORK PROVIDERS
#31CONTROLLING A DEVICE WITH AN INOPERABLE USER INTERFACE
#32Systems, Methods, and Computer Program Products for Authenticating Devices
#33UNIVERSAL DEVICE IDENTIFIERS AND SIGNAL EXCHANGE COLLABORATION
#34SYSTEMS AND METHODS FOR QUEUE CONTROL BASED ON CLIENT-SPECIFIC PROTOCOLS
#35EQUIPMENT ACCESS METHOD, DATA EXCHANGE METHOD AND DEVICES
#36MICRO-FORUM NETWORK
#37Techniques to Detect Attacks for Time Synchronization Networking
#38MAC ADDRESS AND CONTROLLED PORT BASED NETWORK ACCESS MANAGEMENT
#39END-TO-END ENCRYPTION FOR MULTIPLE RECIPIENT DEVICES
#40IMAGE FORMING DEVICE RESTRICTING TRANSMISSION OF EMAIL HAVING SCAN DATA TO EMAIL ADDRESS WHEN MEMORY STORES NO DOMAIN MATCHING DOMAIN OF THE MAIL ADDRESS
#41CONTENT PROVISION DEVICE, CONTENT PROVISION METHOD, PROGRAM, AND RECORDING MEDIUM
#42Secure Content Management Through Authentication
#43TOKEN-BASED DEVICE TRACKING
#44SYSTEMS AND METHODS FOR DIRECTING NETWORK TRAFFIC FROM THIRD-PARTY DOMAINS
#45Method and System of Securing VPN Communications
#46SYSTEM AND METHODS FOR DETECTING AUTHENTICATION OBJECT FORGERY OR MANIPULATION ATTACKS
#47Methods And Systems For Memory Tracing In Asset Managing Systems
#48SECURE AUTHENTICATION AND EXECUTION OF APPLICATIONS ON SHARED DEVICES
#49MANAGEMENT OF COMMUNICATIONS DURING THE ORCHESTRATION OF WORKSPACES BY MULTIPLE REMOTE ORCHESTRATORS
#50SYSTEM AND METHOD FOR ELECTRONIC AUTHENTICATION OF ELECTRONIC DISTRIBUTED NETWORK TRAFFIC VIA ENRICHED DATA
#51MANAGING CREDENTIALS USABLE IN THE ORCHESTRATION OF WORKSPACES BY MULTIPLE REMOTE ORCHESTRATORS
#52CONTROLLER-BASED DISTRIBUTED REMOTE ACCESS WITH STATIC PUBLIC IP AVOIDANCE
#53Authentication and Authorization of Servers and Clients in Edge Computing
#54BLUETOOTH LOW ENERGY (BLE) PRE-CHECK IN
#55DISPLAY DEVICE AND SYSTEM
#56AUTHORIZATION AND CONTENT MANAGEMENT IN AUTHORIZED PROFILES BASED ON ASSOCIATED STANDARDIZED HIERARCHICAL IDENTIFICATION
#57Managing Trusted User Devices Via Silent Push Notifications
#58APPARATUSES, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR OFFLINE AUTHENTICATION
#59CORRELATIONS BETWEEN PRIVATE NETWORK ADDRESSES AND ASSIGNED NETWORK ADDRESSES
#60SYSTEMS AND METHODS FOR RECOGNIZING NEW DEVICES
#61AUTOMATED REMEDIATION OF A DEVICE THAT FAILED SECURE ONBOARDING
#62UNAUTHORIZED DEVICE DETECTION IN A COMPUTING ENVIRONMENT
#63CONFIGURING OFFLINE ELECTRIC VEHICLE SUPPLY EQUIPMENT (EVSE) VIA 2-FACTOR AUTHENTICATION
#64SYSTEM AND METHODS FOR CLOUD-BASED VIRTUAL PRIVATE SECURED CONTAINED COMMUNICATION PORTAL
#65AUTOMATED SUSPECT DEVICE FILTERING ON EQUIPMENT IDENTITY REGISTERS
#66SECURE GROUP CREATION IN PROXIMITY BASED SERVICE COMMUNICATION
#67METHOD AND SYSTEM FOR VIRTUAL MACHINE AWARE POLICY MANAGEMENT
#68INTRA-VLAN TRAFFIC FILTERING IN A DISTRIBUTED WIRELESS NETWORK
#69SYSTEMS AND METHODS FOR THIRD PARTY TOKEN BASED AUTHENTICATION
#70DIGITAL IDENTITY SIGN-IN
#71NETWORK BASED HYPERLOCAL AUTHENTICATION
#72SYSTEM AND METHODS FOR PROACTIVE PROTECTION AGAINST MALFEASANT DATA COLLECTION
#73DEVICE CONTROL PERMISSION SETTING METHOD AND APPARATUS, AND COMPUTER DEVICE AND STORAGE MEDIUM
#74CLIENT DEVICE HAVING AGENT APPLICATION CONFIGURED TO COMMUNICATE WITH WEB SERVER ENDPOINT FOR AUTHENTICATION
#75MULTI-FACTOR AUTHENTICATION USING SYMBOLS
#76APPLICATION MONITORING PRIORITIZATION
#77ACCESS MANAGEMENT SYSTEM AND ACCESS MANAGEMENT METHOD
#78METHOD AND SYSTEM FOR AUTHENTICATING A USER WITH AN AUTHENTICATION SERVER
#79PROVISIONING OF ENCRYPTED DNS SERVICES
#80SYSTEMS AND METHODS FOR INTERNAL SECURE NETWORK RESOLUTION
#81SYSTEM AND METHOD OF ASSIGNING REPUTATION SCORES TO HOSTS
#82ENABLING COORDINATED IDENTITY MANAGEMENT BETWEEN AN OPERATOR-MANAGED MOBILE-EDGE PLATFORM AND AN EXTERNAL NETWORK
#83LOCATION COORDINATE-BASED USER AUTHENTICATION WITH DEVICE LOSS SECURITY TOLERANCE
#84MANAGING AND SECURING CLOUD COMPUTING TASKS FOR MULTIPLE TENANTS
#85MULTI-SERVICES APPLICATION GATEWAY AND SYSTEM EMPLOYING THE SAME
#86PROGRAMMING VERIFICATION RULESETS VISUALLY
#87INTERNET ACCESS MANAGEMENT SERVICE SERVER THAT CAN MANAGE INTERNET ACCESS FOR ELECTRONIC TERMINALS THROUGH SETTING OF SCHEDULING RULES FOR INTERNET USE RESTRICTION AND THE OPERATING METHOD THEREOF
#88REDUCING THE NUMBER OF KEYS USED TO SECURE IN-VEHICLE NETWORKS
#89SYSTEMS AND METHODS FOR OBJECTIVE-BASED SCORING USING MACHINE LEARNING TECHNIQUES
#90SYSTEMS AND METHODS FOR NETWORK SECURITY
#91NETWORK ACCESS ANOMALY DETECTION AND MITIGATION
#92ADAPTIVE AUTHENTICATION FOR ACCESS TO SECURE NETWORK RESOURCES
#93Selective Content Delivery
#94SYSTEM FOR DYNAMIC COMMUNICATION CHANNEL SWITCHING BASED ON PRECONFIGURED NETWORK SECURITY PROTOCOLS
#95MONITORING APPARATUS AND CONTROL METHOD THEREOF
#96SYSTEMS AND METHODS FOR VALIDATING NETWORK OPERATIONS BETWEEN USER ACCOUNTS THROUGH ACCESS TOKENS
#97DIFFERENTIATED AUTHORIZATION FOR DOMAINS OF A MULTI-DOMAIN APPLICATION
#98MONITORING APPARATUS AND CONTROL METHOD THEREOF
#99SYSTEM AND METHOD FOR HOSTING FIDO AUTHENTICATORS
#100CUSTOMIZABLE TRUST-BASED DYNAMIC ACCESS CONTROL SYSTEM
#101SYSTEMS AND METHODS FOR CREATING FINGERPRINTS OF ENCRYPTION DEVICES
#102NETWORK-BASED DEVICE AUTHENTICATION SYSTEM
#103DYNAMIC OPTICAL SWITCHING IN A TELECOMMUNICATIONS NETWORK
#104SYSTEMS AND METHODS FOR SECURING LOGIN ACCESS
#105METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR DETECTING STOLEN ACCESS TOKENS
#106SECURE PAIRING OF DEVICES
#107ROUND TRIP TIME (RTT) MEASUREMENT BASED UPON SEQUENCE NUMBER
#108SYSTEM AND METHOD FOR PROVIDING NETWORK SUPPORT SERVICES AND PREMISES GATEWAY SUPPORT INFRASTRUCTURE
#109DEVICE AUTHENTICATION METHOD AND SYSTEM, AND APPARATUS
#110CLIENT IDENTIFICATION METHOD AND APPARATUS, AND STORAGE MEDIUM AND NETWORK DEVICE
#111Secure identity provider authentication for native application to access web service
#112USING COMMON IDENTIFIERS RELATED TO LOCATION TO LINK FRAUD ACROSS MOBILE DEVICES
#113SYSTEMS AND METHODS FOR ENHANCED ZTNA SECURITY
#114SYSTEM AND METHOD FOR PROVIDING NETWORK SUPPORT SERVICES AND PREMISES GATEWAY SUPPORT INFRASTRUCTURE
#115METHOD, COMMUNICATION DEVICES AND A SERVER FOR CONTROLLING CONTENT
#116PREVENTING DATA MANIPULATION AND PROTECTING USER PRIVACY IN DETERMINING ACCURATE LOCATION EVENT MEASUREMENTS
#117ACCESS CONTROL METHOD, ACCESS CONTROL SYSTEM, AND RELATED DEVICE
#118EXCHANGE ENGINE FOR SECURE ACCESS SERVICE EDGE (SASE) PROVIDER ROAMING
#119ACCESSING AN ENCRYPTED PLATFORM
#120Method and System for Remote Data Access
#121Authentication and Authorization of Servers and Clients in Edge Computing
#122DISPLAY DEVICE AND SYSTEM
#123Distributed Encryption Management
#124Managing Trusted User Devices Via Silent Push Notifications
#125UNAUTHORIZED DEVICE DETECTION IN A COMPUTING ENVIRONMENT
#126TWO-WAY AUTHENTICATION SYSTEM AND METHOD
#127SYSTEM AND METHODS FOR CLOUD-BASED VIRTUAL PRIVATE SECURED CONTAINED COMMUNICATION PORTAL
#128AUTHENTICATED HEALTH CREDENTIAL ACCESS METHODS AND APPARATUS
#129DISTRIBUTED DEVICE TRUST DETERMINATION
#130SYSTEMS AND METHODS FOR USING A NETWORK ACCESS DEVICE TO SECURE A NETWORK PRIOR TO REQUESTING ACCESS TO THE NETWORK BY THE NETWORK ACCESS DEVICE
#131Smart Computing Device Implementing Network Security and Data Arbitration
#132SERVICE TO SERVICE COMMUNICATION AND AUTHENTICATION VIA A CENTRAL NETWORK MESH
#133SYSTEMS, METHODS, AND APPARATUS FOR NAMESPACE IDENTIFICATION FOR DEVICES
#134REMOTE AUTHORIZATION METHOD AND ELECTRONIC DEVICE FOR PERFORMING SAME METHOD
#135Cross-Domain Secure Connect Transmission Method
#136Systems and methods for detection of session tampering and fraud prevention
#137INFORMATION DISPLAY
#138MOBILE DEVICE SERVICE SYSTEMS AND METHODS USING DEVICE ORIENTATION INFORMATION
#139NETWORK SANITIZATION FOR DEDICATED COMMUNICATION FUNCTION AND EDGE ENFORCEMENT
#140Client Entity Validation with Session Tokens Derived From Underlying Communication Service Values
#141HUNT GROUP MESSAGING IN A NETWORK
#142DETECTING IDENTITY THEFT OR IDENTITY CHANGE IN MANAGED SYSTEMS
#143Generation of the Digital Fingerprints Library with Hierarchical Structure
#144AUTHENTICATION OF MEDICAL DEVICES
#145USING TOKENS FROM PUSH NOTIFICATION PROVIDERS TO ENHANCE DEVICE FINGERPRINTING
#146MODIFICATION OF DEVICE BEHAVIOR FOR USE IN SECURE NETWORKING
#147INTERNET OF THINGS (IOT) DEVICE IDENTIFICATION USING TRAFFIC PATTERNS
#148KEY MATERIAL SENDING METHOD, KEY MATERIAL OBTAINING METHOD, INFORMATION TRANSMISSION METHOD, AND DEVICE
#149MULTI-CAMERA VISION SYSTEM FACILITATING AUTHENTICATION AND SECURE DATA TRANSFER
#150METHODS, MEDIUMS, AND SYSTEMS FOR VERIFYING DEVICES IN AN ENCRYPTED MESSAGING SYSTEM
#151WEBSITE VERIFICATION PLATFORM
#152Embedded Authentication in a Service Provider Network
#153HARDWARE IDENTITY IMPERSONATION FOR TARGET ACCESS CONTROL
#154AUTOMATED ACCESS TO RACKS IN A COLOCATION DATA CENTER
#155Automatically configuring a gateway device arranged in a network
#156SYSTEMS AND METHODS FOR DECRYPTION AS A SERVICE
#157DEVICE REGISTRATION METHODS AND APPARATUSES, ELECTRONIC DEVICES AND STORAGE MEDIA
#158UNPLANNED REMOTE COLLABORATION
#159GEO-FENCE AUTHORIZATION PROVISIONING
#160SYSTEMS AND METHODS FOR DETERMINING TRUSTED DEVICES
#161REMOTE TRANSACTION VERIFICATION
#162SYSTEM AND METHOD FOR PROVIDING A VIRTUAL AUTHENTICATOR AND SUPPLICANT
#163AUTHENTICATING A USER DEVICE VIA A MONITORING DEVICE
#164CLOUD STORAGE USING ENCRYPTION GATEWAY WITH CERTIFICATE AUTHORITY IDENTIFICATION
#165Digital identity sign-up
#166EVALUATION OF NETWORK CORRECTNESS REQUIREMENT
#167SYSTEMS, METHODS, AND APPARATUSES FOR VERIFYING AUTHENTICATION CREDENTIALS IN AN ELECTRONIC NETWORK
#168ADAPTIVE ARTIFICIAL INTELLIGENCE SYSTEMS AND METHODS FOR TOKEN VERIFICATION
#169COMPUTER SYSTEM AND DEVICE FOR CONTROLLING USE OF SECURE MEDIA RECORDINGS
#170RISK-BASED MULTI-FACTOR AUTHENTICATION
#171Clustering of Virtual Private Network Servers
#172CONTROLLER-BASED NETWORK ACCESS CONTROL SYSTEM, AND METHOD THEREOF
#173METHODS FOR SERVICE SLICE SELECTION AND SEPARATION
#174Connecting A Phone Device To A Virtual Meeting Using Multi-Factor Authentication
#175COMPUTER-BASED SYSTEMS INVOLVING SHARING SESSION AUTHENTICATION AND/OR ACCOUNT DETAILS WITH A TRUSTED PARTY AND METHODS OF USE THEREOF
#176CONTROL METHOD AND DEVICE AND ELECTRONIC DEVICE
#177Methods and systems for persistent cross-application mobile device identification
#178Authentication interface rendering and mirroring in a distributed architecture
#179INFORMATION SECURITY SYSTEM AND METHOD FOR PHISHING THREAT PREVENTION USING TOKENS
#180MESSAGE ENCAPSULATION AND DE-ENCAPSULATION METHOD AND DEVICE, STORAGE MEDIUM, AND ELECTRONIC DEVICE
#181SYSTEMS, METHODS AND DEVICES FOR DEVICE FINGERPRINTING AND AUTOMATIC DEPLOYMENT OF SOFTWARE IN A COMPUTING NETWORK USING A PEER-TO-PEER APPROACH
#182Computing power network system
#183System and methods for detecting SAML forgery or manipulation attacks
#184METHODS, MEDIUMS, AND SYSTEMS FOR VERIFYING DEVICES IN AN ENCRYPTED MESSAGING SYSTEM
#185METHODS AND APPARATUS TO EXPAND PANELIST ENROLLMENT
#186SYSTEMS AND METHODS FOR SCALABLE-FACTOR AUTHENTICATION
#187TRUSTING A CERTIFICATE FOR A SECURE CONNECTION BASED ON A REMOTE USER SESSION
#188SERVICE ACCESS METHOD AND APPARATUS
#189SYSTEMS AND METHODS FOR ENDPOINT MANAGEMENT
#190RENDERING ENDPOINT CONNECTION WITHOUT AUTHENTICATION DARK ON NETWORK
#191DEVICE AUTHENTICATION METHOD, TERMINAL DEVICE, SERVER, AND COMPUTER DEVICE
#192USER-LEVEL TOKEN FOR USER AUTHENTICATION VIA A USER DEVICE
#193Systems and techniques for trans-account device key transfer in benefit denial system
#194Integrated Order Management for Publishing Digital Content Campaigns
#195DYNAMIC OPTICAL SWITCHING IN A TELECOMMUNICATIONS NETWORK
#196Hardware Pairing Communication for Streaming Service
#197SERVICE PROCESSING METHOD AND APPARATUS, ELECTRONIC DEVICE, AND STORAGE MEDIUM
#198SECURITY MONITORING UTILIZING DEVICE SIGNATURE DETECTION
#199HASHING TECHNIQUES FOR VERIFYING CORRECTNESS OF ASSOCIATIONS BETWEEN ASSETS RELATED TO EVENTS AND ADDRESSABLE COMPUTER NETWORK ASSETS
#200AUTHENTICATING A COMMUNICATION PARTNER ON A DEVICE
#201SUPER-COOKIE IDENTIFICATION FOR STOLEN COOKIE DETECTION
#202METHOD AND APPARATUS FOR PROCESSING PUSH MESSAGE
#203APPLICATION IDENTIFICATION
#204RECONFIGURABLE ROBOTIC MANUFACTURING CELLS
#205Multi-factor message authentication
#206COMMUNICATION APPARATUS, CONTROL METHOD, AND COMPUTER-READABLE STORAGE MEDIUM
#207CONTINUOUS ACTIVE DEFENSE FOR DIGITAL SERVICES
#208System and method for security management of a plurality of invalid interactions
#209METHOD FOR PROCESSING AN OPERATION INVOLVING SECRET DATA, TERMINAL, SYSTEM AND CORRESPONDING COMPUTER PROGRAM
#210AUTHORIZATION AND AUTHENTICATION OF ENDPOINTS FOR NETWORK CONNECTIONS AND COMMUNICATION
#211INTEGRATION PACKAGING FOR A MULTI-TENANT COMPUTING ENVIRONMENT
#212METHOD, RECORDING MEDIUM, AND SERVER FOR USER AUTHENTICATION BY COMPUTER
#213NETWORKING DEVICE CREDENTIAL INFORMATION RESET SYSTEM
#214Automated Workflows for Publishing Digital Content Campaigns
#215MEDIA AGNOSTIC CONTENT ACCESS MANAGEMENT
#216SECURITY MODEL UTILIZING MULTI-CHANNEL DATA
#217PER-HOST ACCESS LISTS
#218SYSTEM AND METHOD FOR SELECTING AN ELECTRONIC COMMUNICATION PATHWAY FROM A POOL OF POTENTIAL PATHWAYS
#219POLICY UTILIZATION ANALYSIS
#220Internet packet provenance to verify packet validity and control packet usage
#221Integrated Targeting of Digital Content Campaigns
#222Authentication of medical device computing systems by using metadata signature
#223WEB BROWSING SYSTEM, SERVER, AND CONTROL METHOD THEREOF
#224USER DEFINED NETWORK ACCESS THAT SUPPORTS ADDRESS ROTATION
#225PRIVACY INDICATORS FOR CONTROLLING AUTHENTICATION REQUESTS
#226AUTOMATIC ONBOARDING OF HETEROGENEOUS DEVICES ONTO A CLIENT NETWORK
#227Using proof of purchase for multifactor authentication
#228MULTI-FACTOR AUTHENTICATION AND ACCESS CONTROL IN A VEHICULAR ENVIRONMENT
#229Resolving Access Policies Between Intent-Based Network Architectures and Cloud Native Architectures
#230Automatic security device network
#231DISTRIBUTION OF SECURE CLIENT DEVICES
#232Email Processing for Improved Authentication Question Accuracy
#233AUTHENTICATION OF NODES IN A DISTRIBUTED NETWORK
#234USING CREATION TIMES IN IDENTIFYING OPTIMAL VPN SERVERS
#235Using PKI for security and authentication of control devices and their data
#236METHOD AND SYSTEM FOR VERIFICATION OF IDENTITY ATTRIBUTE INFORMATION
#237Method and Apparatus for Determining Locations of Wireless Cameras
#238SMART LINK GENERATION
#239METHOD AND APPARATUS FOR POLICY ATTRIBUTES EXCHANGE BETWEEN SECURITY POLICY MANAGEMENT PLATFORMS AND 5G AS A SERVICE PLATFORMS
#240Hybrid customer premises equipment and cloud-based implementation of dynamic residential threat detection
#241INDUSTRIAL DEVICE MAC AUTHENTICATION BYPASS BOOTSTRAPPING
#242TYING ADDRESSES TO AUTHENTICATION PROCESSES
#243Device Component of Digital Healthcare Platform
#244SYSTEMS AND METHODS FOR PREVENTING TOLL FRAUD IN A SIP ENVIRONMENT
#245METHODS AND SYSTEMS FOR ONBOARDING NETWORK EQUIPMENT
#246Protected configuration of a virtual private network server
#247HEADER-BASED AUTHENTICATION IN A VIRTUAL PRIVATE NETWORK
#248Automated device access
#249NETWORK ACCESS CONTROL INTENT-BASED POLICY CONFIGURATION
#250AUTHENTICATION AND AUTHORIZATION SYSTEM, AUTHENTICATION AND AUTHORIZATION MEANS DETERMINATION METHOD, AND AUTHENTICATION AND AUTHORIZATION MEANS DETERMINATION PROGRAM
#251INTERNET PROTOCOL (IP) WHITELISTING FOR SIGNED UNIFORM RESOURCE LOCATORS (URLS)
#252SYSTEM AND METHOD OF FILTERING INTERNET TRAFFIC VIA CLIENT FINGERPRINT
#253INDIVIDUALLY CENTRIC DEVICE, SYSTEM AND METHOD FOR AUTHENTICATING DEVICE USER IDENTITY
#254DATA PROCESSING METHOD, DEVICE, AND APPARATUS, AND STORAGE MEDIUM
#255ORGANIZATION IDENTIFICATION OF NETWORK ACCESS SERVER DEVICES INTO A MULTI-TENANT CLOUD NETWORK ACCESS CONTROL SERVICE
#256DISTRIBUTED HARDWARE VULNERABILITY IDENTIFICATION AND RESOLUTION
#257DHCP server-based steering logic for policy enforcement on IoT devices
#258DHCP relay-based steering logic for policy enforcement on IoT devices
#259SCALABLE AUTHENTICATION MANAGEMENT
#260URL-BASED AUTHENTICATION FOR PAYMENT CARDS
#261DATA TRANSMISSION METHOD, ELECTRONIC DEVICE AND COMPUTER-READABLE STORAGE MEDIUM
#262USER PERMISSION IN A MULTI-TENANT ENVIRONMENT
#263ASSET MANAGEMENT IDENTIFICATION KEY
#264Method and device for storing and distributing file content in mc network
#265METHODS AND APPARATUS FOR LAWFUL INTERCEPTION OF COMMUNICATIONS
#266DECENTRALIZED APPLICATION AUTHENTICATION
#267NETWORK SYSTEM AND INFORMATION PROVIDING METHOD
#268Techniques for selective container access to cloud services based on hosting node
#269METHOD FOR LOGGING IN ONLINE SYSTEM WITHOUT USERNAME AND PASSWORD, AND AUTHENTICATION SERVER
#270SYSTEM AND METHOD FOR PROVIDING NETWORK SUPPORT SERVICES AND PREMISES GATEWAY SUPPORT INFRASTRUCTURE
#271NETWORK SECURITY MANAGEMENT SYSTEM AND MANAGEMENT SERVER FOR CONTROLLING DISPOSABLE DRUG INJECTOR
#272MULTIPLE HOST WEB AUTHENTICATION ON THE SAME PORT USING SEGMENT SECURITY
#273Multi-Modal Transportation Service Planning and Fulfillment
#274TELECOMMUNICATIONS APPARATUSES AND METHODS
#275INTELLIGENT TRACKING SYSTEM AND METHODS AND SYSTEMS THEREFOR
#276INFRASTRUCTURE LEVEL LAN SECURITY
#277SYSTEMS AND METHODS FOR ACCESS TOKENS CONFIGURATION WITH UNIFORM RESOURCE LOCATOR (URL) PARAMETERS
#278SECURITY-ENHANCED AUTO-CONFIGURATION OF NETWORK COMMUNICATION PORTS FOR CLOUD-MANAGED DEVICES
#279IDENTITY VALIDATION USING BLUETOOTH FINGERPRINTING AUTHENTICATION
#280SYSTEMS, METHODS, AND STORAGE MEDIA FOR CONTROLLING USER ACCESS TO AN APPLICATION
#281PROCESS LEVEL AUTHENTICATION FOR CLIENT DEVICE ACCESS TO A SERVER SYSTEM
#282SECURITY PROFILE SELECTION AND CONFIGURATION OF NETWORK DEVICES VIA OWNERSHIP VOUCHER EXTENSION
#283Authentication and enforcement of differentiated policies for a bridge mode virtual machine behind a wireless host in a MAC-based authentication network
#284NETWORKED DEVICE SECURITY POSTURE MANAGEMENT
#285SECURE SERVER CLIENT INTERACTION
#286SYSTEMS AND METHODS FOR DATA COMMUNICATIONS
#287SYSTEM AND METHOD FOR PROVIDING NETWORK SUPPORT SERVICES AND PREMISES GATEWAY SUPPORT INFRASTRUCTURE
#288NETWORK MESSAGE TRANSMISSIONS REDUCTION SYSTEMS AND METHODS
#289TELECOMMUNICATION SERVICE EMPLOYING AN ELECTRONIC INFORMATION REPOSITORY STORING SOCIAL NETWORK USER INFORMATION, DEVELOPER INFORMATION, AND MOBILE NETWORK OPERATOR INFORMATION
#290ACCESS CONFIGURATION IN HYBRID NETWORK ENVIRONMENTS
#291IDENTIFYING ACCOUNTS HAVING SHARED CREDENTIALS
#292CROSS-ORIGIN RESOURCE HANDLING FOR WEB CONTENT
#293DATA OBFUSCATION AUTHENTICATION SECURITY DISPLAY SESSION SYSTEM
#294INFORMATION PROCESSING APPARATUS, AUTHENTICATOR, METHOD THEREFOR, AND STORAGE MEDIUM
#295Systems And Methods For Enabling Additional Devices To Check In To Bluetooth Low Energy (Ble) Beacons
#296System and method for authorizing entity users based on augmented reality and LiDAR technology
#297Device Risk Level Based on Device Metadata Comparison
#298ELECTRONIC DEVICE AND METHOD FOR AUTHENTICATION IN SESSION INITIATION PROTOCOL
#299Network device provisioning based on device type
#300Dynamic hyper context-driven microsegmentation