Network architectures or network communication protocols for network security for controlling access to network resources
Sub-classes:MANAGEMENT SERVER AND MANAGEMENT SERVER SYSTEM
#2DYNAMICALLY RESTRICTING SOCIAL MEDIA ACCESS
#3Authentication Question Topic Exclusion Based on Response Hesitation
#4REQUEST ALLOCATION METHOD FOR VIRTUAL CHANNEL, AND RELATED APPARATUS
#5SYSTEMS AND METHODS FOR REMOTE CONTROL IN INFORMATION TECHNOLOGY INFRASTRUCTURE
#6CLOUD SECURITY VISUAL DASHBOARD
#7SYSTEMS AND METHODS TO DETERMINE CONTENT TO PRESENT BASED ON INTERACTION INFORMATION OF A GIVEN USER
#8Publisher Permissioned Activation in Cookieless Authentication Environment
#9Policy based authentication for Privileged Remote Access (PRA) systems
#10METHOD AND DEVICE FOR IDENTITY AUTHENTICATION
#11FINE-GRAINED SEGMENTATION AND TRAFFIC ISOLATION IN DATA CONFIDENCE FABRIC NETWORKS
#12LOCATION-BASED MOBILE DEVICE AUTHENTICATION
#13IDENTITY AUTHENTICATION METHOD AND APPARATUS
#14CLAIMING DELAYED LIVE REFERENCE STREAMS
#15SYSTEMS AND METHODS FOR MULTIPLE CUSTODY USING MOBILE DEVICES OR WEARABLES
#16RESTRICTED OPERATIONS DUE TO ATTACHMENT OF COMPUTE INSTANCES OWNED BY DIFFERENT TENANCIES
#17SYSTEMS, METHODS AND COMPUTER PROGRAM PRODUCTS FOR INFORMATION INTEGRATION ACROSS DISPARATE INFORMATION SYSTEMS
#18ACCESS GATEWAY SYSTEM FOR ACCESSING A RESOURCE
#19DEVICE AND METHOD FOR THE SECURE PROCESSING OF DATA
#20Fabric-Based Virtual Air Gap Provisioning, System And Methods
#21Wireless Device Connection
#22COMMUNICATION WITH HOME DIALYSIS MACHINES USING A NETWORK CONNECTED SYSTEM
#23RESOURCE ACCESS CONTROL METHOD, MEDIUM AND ELECTRIC DEVICE
#24SYSTEM AND METHOD TO DISTRIBUTE ACCESS TO SHARED ACCOUNTS WITH A TRUSTED INTERMEDIATE SERVICE MANAGER
#25COMBINED SESSION NEGOTIATIONS FOR NETWORK CONNECTIONS
#26MULTIPLEXED DATA EXCHANGE PORTAL INTERFACE IN SCALABLE DATA NETWORKS
#27PROVISIONING AND SECURE ACCESS CONTROL FOR STORAGE ON PUBLIC SERVERS
#28MANICODING FOR COMMUNICATION VERIFICATION
#29METHOD FOR RESOURCE TRANSFER MODE EVALUATION IN DISTRIBUTED NETWORK USING SEMI-DYNAMIC TOKENIZED GRAPH NODE PROCESSING
#30ILLICIT ROUTE VIEWING SYSTEM AND METHOD OF OPERATION
#31SYSTEM AND METHOD FOR MANUFACTURING AND TRADING SECURITIES AND COMMODITIES
#32Security architecture for interconnected digital engineering and certification ecosystem
#33Consumer Choice for Broadband Application and Content Services
#34CYBER SECURITY SYSTEM WITH CLOUD ARCHITECTURE FORMATION AND VISUALIZATION
#35CERTIFICATE BASED PROFILE CONFIRMATION
#36Systems and Methods for Distributed Remote Access
#37MACHINE LEARNING TECHNIQUES FOR ASSOCIATING ASSETS RELATED TO EVENTS WITH ADDRESSABLE COMPUTER NETWORK ASSETS
#38METHOD AND SYSTEM FOR INDIRECT SHARING OF SENSOR INSIGHTS
#39SYSTEMS AND METHODS FOR SCHEDULED POLICY DEPLOYMENT IN OPERATIONAL TECHNOLOGY NETWORKS
#40COMPUTER IMPLEMENTED NETWORKING SYSTEM AND METHOD FOR CREATING, SHARING AND ARCHIVING CONTENT INCLUDING THE USE OF A USER INTERFACE (UI) VIRTUAL SPACE, CONTENT PROMPTING TOOL, AND INTELLIGENT TEMPLATE-DRIVEN CONTENT POSTING
#41USER AUTHENTICATED ENCRYPTED COMMUNICATION LINK
#42TOKEN PROCESSING SYSTEM AND METHOD
#43Multi-Factor Authentication and Post-Authentication Processing System
#44SYSTEMS AND METHODS FOR PROVIDING INSTANT PROVISIONING AND ACTIVATION OF A CLIENT DEVICE FOR A NETWORK
#45ANALYSIS APPARATUS, ANALYSIS METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
#46SYSTEMS AND METHODS FOR PROCESSING REQUESTS FOR REAL-TIME TRANSFERS OF RESOURCES
#47SYSTEMS AND METHODS FOR CAPTURING, RECORDING, STORING, AND TRANSMITTING IMAGES IN RESPONSE TO ONLOOKER DETECTION EVENTS IN HETEROGENEOUS COMPUTING PLATFORMS
#48SECURE PRIVATE NETWORK NAVIGATION
#49APPLICATION ACCESS CONTROL METHOD AND APPARATUS, AND COMPUTER DEVICE AND STORAGE MEDIUM
#50DECENTRALIZED PROCESSING OF INTERACTIONS ON DELIVERY
#51SYSTEMS AND METHODS FOR QUEUE CONTROL BASED ON CLIENT-SPECIFIC PROTOCOLS
#52QUORUM-BASED SECURE AUTHENTICATION
#53DATA SERVICE TRACKER MODULE FOR A COMMUNICATION SYSTEM AND METHOD OF DETERMINING A SET OF DATA COUPLINGS
#54PERSONAL DEVICE NETWORK FOR USER IDENTIFICATION AND AUTHENTICATION
#55BLOCKCHAIN FOR ACCESS CONTROL
#56RESOURCE SHARING BETWEEN USERS ACROSS APPLICATIONS IN A UNIFIED SUITE
#57Disabling Executable Instructions from a Network Message
#58CONFINING LATERAL TRAVERSAL WITHIN A COMPUTER NETWORK
#59SYSTEM AND METHOD OF A RELAY SERVER FOR MANAGING COMMUNICATIONS AND NOTIFICATION BETWEEN A MOBILE DEVICE AND APPLICATION SERVER
#60CONTROL AND CONFIGURATION FOR WIRELESS AUDIO DEVICES
#61SYSTEM AND METHOD FOR DETERMINING AND COMMUNICATING PRESENCE INFORMATION
#62SMALL-FOOTPRINT ENDPOINT DATA LOSS PREVENTION
#63METHODS AND SYSTEMS FOR ASSIMILATING CLIENT-FACING DATA AND CLIENT INSTRUCTIONS FOR A BIOMANUFACTURING SYSTEM
#64POLICY GENERATION APPARATUS, POLICY GENERATION METHOD, AND NONTRANSITORY COMPUTER READABLE MEDIUM STORING PROGRAM
#65SYSTEM FOR DYNAMIC NETWORK SECURITY CONTROL
#66Multicast traffic segmentation in an overlay network
#67QUANTUM SERVICE DISCOVERY
#68System of Aggregating Servers
#69SYSTEMS AND METHODS CONFIGURED TO ENABLE AN OPERATING SYSTEM FOR CONNECTED COMPUTING THAT SUPPORTS USER USE OF SUITABLE TO USER PURPOSE RESOURCES SOURCED FROM ONE OR MORE RESOURCE ECOSPHERES
#70PROVISION OF A LEASE FOR STREAMING CONTENT
#71TOKEN-BASED DEVICE TRACKING
#72SHARED RESOURCE ACCESS CONTROL
#73TRANSACTION SECURITY SYSTEMS AND METHODS
#74COMMUNICATION DEVICE, COMMUNICATION METHOD, AND COMPUTER PROGRAM PRODUCT
#75METHODS AND SYSTEMS FOR SECURING CONTAINERIZED APPLICATIONS
#76Security Techniques for Device Assisted Services
#77REVOKING CREDENTIALS AFTER SERVICE ACCESS
#78Automatic Transaction Processing Failover
#79SYSTEM FOR A SECURE MODULAR CLOUD-ENABLED RESOURCE EXCHANGE APPARATUS
#80METHOD AND SYSTEM FOR ON DEMAND DEFENSE-IN-DEPTH SECURITY POLICY TRANSLATION AND ENFORCEMENT
#81CERTIFICATE BASED SECURITY FOR DECLARATIVE OPERATIONS
#82SYSTEM AND METHOD FOR RESTRICTING COMMUNICATIONS BETWEEN VIRTUAL PRIVATE CLOUD NETWORKS THROUGH SECURITY DOMAINS
#83VIRTUAL AGENT TRUST MECHANISM
#84AUTHENTICATION TRANSLATION
#85SYSTEMS AND METHODS OF SHARING INFORMATION THROUGH A TAG-BASED CONSORTIUM
#86TUNNELLING WITH SUPPORT FOR DYNAMIC NAMING RESOLUTION
#87METHOD AND SYSTEM FOR VIRTUAL MACHINE AWARE POLICY MANAGEMENT
#88Automatically Deployed Information Technology (IT) System and Method
#89CLOUD VIRTUAL REALITY ECOSYSTEM
#90PEER-TO-PEER SECURE MODE AUTHENTICATION
#91CONTROL TOWER FOR PROSPECTIVE TRANSACTIONS
#92APPLICATION FIREWALL
#93MANAGEMENT OF BOT DETECTION IN A CONTENT DELIVERY NETWORK
#94AI-DRIVEN INTEGRATION PLATFORM AND USER-ADAPTIVE INTERFACE FOR BUSINESS RELATIONSHIP ORCHESTRATION
#95EXTENSIBLE SERVER MANAGEMENT FRAMEWORK BASED ON REVERSE CONNECTION PROTOCOL AND OPERATION METHOD THEREOF AND ACCESS OPERATING METHOD THEREOF
#96NETWORK DATA PACKET PROCESSING METHOD, ELECTRONIC DEVICE, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM
#97NETWORK TRAFFIC INSPECTION
#98SMART GRID DISTRIBUTED OPERATIONS PLATFORM
#99Automated, Non-Invasive Artificial Intelligence Machine Learning Method and System for Identifying and Redacting Personally Identifiable Information in a Monitored Environment using Real-Time Sensor Data
#100Initiating Preventaive Action and Preventing Unauthorized Access of a Usere to Information by a HIPAA-Compliant Computer Security Method and System for Recording Visual Personal Health Information in an Electronic Format Relating to at least Two Individuals, at least one of whom is an Individual Under Care, from a Video Camera
#101SYSTEM AND APPARATUS FOR RESELLING DIGITAL MEDIA RIGHTS
#102CONTROL TOWER FOR LINKING ACCOUNTS TO APPLICATIONS
#103MULTI-LAYER BROWSER-BASED CONTEXT EMULATION DETECTION
#104MULTIFUNCTION WIRELESS DEVICE
#105RESOURCE SHARING BETWEEN CLOUD-HOSTED VIRTUAL NETWORKS
#106CONTROL TOWER FOR UNLINKING APPLICATIONS FROM ACCOUNTS
#107COMPUTERIZED SYSTEMS AND METHODS FOR CONFIGURATION OF NETWORK INTERFACES OF A DISTRIBUTED NETWORK
#108METHOD FOR DYNAMICALLY CONNECTING A COMMUNICATION CHANNEL AND SOFTWARE SYSTEM USING THE SAME
#109Producing Recovered Data in a Storage Network
#110System and method to guarantee provenance of information, system and method for granting an access to a resource
#111USER-DEFINED NETWORK CONNECTORS BETWEEN SERVERLESS FUNCTIONS AND ISOLATED CLOUD RESOURCES
#112Identity Adapter and Method
#113SECURE EXECUTION OF MICROSERVICES
#114Accessing a Cloud-Based Service
#115SYSTEMS AND METHODS FOR CLOUD RESOLVING AND INTERNET PATH FINDING
#116APPLICATION SHARING
#117Data Segregation For Partially Supervised Computer
#118SYSTEM AND METHOD FOR AUTHORISING OPERATIONS FOR DEVICES IN A NETWORK
#119Handling Encoded Information
#120HUMAN SYSTEM OPERATOR IDENTITY ASSOCIATED AUDIT TRAIL OF CONTAINERIZED NETWORK APPLICATION WITH PREVENTION OF PRIVILEGE ESCALATION, ONLINE BLACK-BOX TESTING, AND RELATED SYSTEMS AND METHODS
#121NETWORK RESOURCE ACCESS CONTROL METHODS AND SYSTEMS USING TRANSACTIONAL ARTIFACTS
#122DATABASE-CENTERED COMPUTER NETWORK SYSTEMS AND COMPUTER-IMPLEMENTED METHODS FOR CRYPTOGRAPHICALLY-SECURED DISTRIBUTED DATA MANAGEMENT BASED ON ENTROPY AND HAVING A SUPERVISORY NODE
#123SYSTEMS AND METHODS FOR OBJECTIVE-BASED SCORING USING MACHINE LEARNING TECHNIQUES
#124ACCESS CONTROL INTERFACE FOR MANAGING ENTITIES AND PERMISSIONS
#125Privacy Border for a Portion of Resources on a Computing Machine
#126SYSTEMS AND METHODS FOR NETWORK SECURITY
#127AGENTLESS IN-MEMORY CACHING FOR NATIVE NETWORK RESOURCE CONNECTIONS
#128NETWORK SLICE CONFIGURATION
#129VEHICLE MIDDLEWARE
#130ACCESS CONTROL INTERFACE FOR MANAGING ENTITIES AND PERMISSIONS
#131SYSTEM FOR DYNAMIC COMMUNICATION CHANNEL SWITCHING BASED ON PRECONFIGURED NETWORK SECURITY PROTOCOLS
#132Method and System for Forensic Data Tracking
#133WEBSITE ACCESS MANAGEMENT DEVICE THROUGH CATALOGED WEB ADDRESS
#134METHOD, APPARATUS, AND COMPUTER-READABLE RECORDING MEDIUM FOR CONTROLLING ACCESS TO REMOTE SYSTEM IN HOME NETWORK ENVIRONMENT
#135Grant inheritance in RBAC
#136SECURE REUSE OF CLOUD AT CUSTOMER HARDWARE
#137SYSTEM AND METHOD FOR PROVIDING NETWORK SUPPORT SERVICES AND PREMISES GATEWAY SUPPORT INFRASTRUCTURE
#138Systems and Methods for Green Proof of Stake Consensus Mechanisms
#139SYSTEMS AND METHODS FOR DATA SECURITY AND FRAUD PREVENTION IN COLLABORATIVE EDITING ENVIRONMENTS
#140CONTROL TOWER FOR LINKING ACCOUNTS TO APPLICATIONS
#141CONTROL TOWER FOR VIRTUAL REWARDS CURRENCY
#142DISTRIBUTED ACCESS CONTROL METHOD AND RELATED APPARATUS AND SYSTEM
#143SYSTEM AND METHOD FOR ACCESS CONTROL BASED ON DOMAIN NAME OF CLOUD SERVICE
#144SYSTEM AND METHOD FOR PROVIDING NETWORK SUPPORT SERVICES AND PREMISES GATEWAY SUPPORT INFRASTRUCTURE
#145DETECTING UNAUTHORIZED ACCESS TO DIGITAL CONTENT USING FORENSIC WATERMARKING
#146SECURE ELECTRONIC TRANSACTIONS USING TRANSPORT LAYER SECURITY (SETUTLS)
#147METHOD AND APPARATUS FOR PROCESSING MULTI-CLOUD SERVICE, ELECTRONIC DEVICE AND STORAGE MEDIUM
#148LARGE LANGUAGE MODEL-BASED AUTHENTICATION
#149AI-DRIVEN INTEGRATION PLATFORM AND USER-ADAPTIVE INTERFACE FOR BUSINESS RELATIONSHIP ORCHESTRATION
#150ACCESS CONTROL METHOD, ACCESS CONTROL SYSTEM, AND RELATED DEVICE
#151Systems and Methods for Service Entitlement Authorization
#152ACCESS CONTROL USING A BLOCKCHAIN IDENTITY AND POLICY BASED AUTHORIZATION
#153SYSTEMS AND METHODS FOR CONTROLLED ACCESS TO BLOCKCHAIN DATA
#154Method and System for Remote Data Access
#155SYSTEMS AND METHODS OF SHARING INFORMATION THROUGH A TAG-BASED CONSORTIUM
#156CREATING A GLOBAL DATA SHARING LISTING
#157METHODS AND SYSTEMS FOR CLOUD SECURITY OPERATIONS
#158Portable Access Point for Secure User Information Using a Blockchain Backed Credential
#159SERVICE TO SERVICE COMMUNICATION AND AUTHENTICATION VIA A CENTRAL NETWORK MESH
#160USER CERTIFICATE WITH USER AUTHORIZATIONS
#161Systems, Methods And Apparatus For Local Area Network Isolation
#162System, Apparatus, And Method For Controlling Internet Devices Via A Mobile Device Session
#163IOT DRONE FLEET
#164UNLINKING APPLICATIONS FROM ACCOUNTS
#165SYSTEMS AND METHODS FOR ENTITLEMENT MANAGEMENT
#166DETECTING UNAUTHORIZED ACCESS TO DIGITAL CONTENT USING DIGITAL CREDENTIAL ACCESS CONTROL
#167Cloud Computing Platform That Executes Code in A Distributed Cloud Computing Network
#168METHODS AND SYSTEMS FOR PROVIDING A VISUAL CONTENT GALLERY WITHIN A CONTROLLED ENVIRONMENT
#169REQUEST AUTHORIZATION
#170CONTROLLED TOKEN DISTRIBUTION TO PROTECT AGAINST MALICIOUS DATA AND RESOURCE ACCESS
#171SECURED DATABASE RESTORATION ACROSS SERVICE REGIONS
#172CRYPTOGRAPHIC KEY GENERATION USING MACHINE LEARNING
#173DISTRIBUTED PRIVATELY SUBSPACED BLOCKCHAIN DATA STRUCTURES WITH SECURE ACCESS RESTRICTION MANAGEMENT
#174DETECTING UNAUTHORIZED ACCESS TO DIGITAL CONTENT USING NEARBY DEVICE DETECTION
#175DETECTING UNAUTHORIZED ACCESS TO DIGITAL CONTENT USING SONIC SIGNAL CONFIRMATION
#176Systems and Methods for In-Session Refresh of Entitlements Associated with Web Applications
#177METHODS AND APPARATUS FOR IDENTITY AND ACCESS MANAGEMENT ON NETWORKED MACHINES
#178DETECTION DEVICE, DETECTION METHOD, AND DETECTION PROGRAM
#179SYSTEMS AND METHODS FOR SUCCESSIVELY EXECUTING AN OPERATION OVER MULTIPLE COMMUNICATION NETWORKS
#180TOKEN-BASED BILLING MODEL FOR SERVER-SIDE RENDERING SERVICE
#181SYSTEMS AND METHODS FOR VERIFYING DATA VIA BLOCKCHAIN
#182DETECTING UNAUTHORIZED ACCESS TO DIGITAL CONTENT USING USAGE PATTERN DETECTION
#183UNIFIED CONTEXT-AWARE CONTENT ARCHIVE SYSTEM
#184MACHINE LEARNING FOR COMPUTER SECURITY POLICY MODIFICATION
#185Secure Web Container for a Secure Online User Environment
#186Approval Workflows For Anomalous User Behavior
#187SYSTEM AND METHOD FOR IMPLEMENTING A CLOUD AGNOSTIC DATA MESH MODULE
#188DISTRIBUTED ACCESS POLICIES
#189SYSTEM AND METHOD FOR PASSWORDLESS LOGINS
#190LICENSING VERIFICATION MESSAGE
#191FRAUD DETECTION BASED ON AN ANALYSIS OF MESSAGES IN A MESSAGING ACCOUNT
#192SCHEDULE SHARING METHOD, APPARATUS, AND DEVICE
#193METADATA CUSTOMIZATION FOR VIRTUAL PRIVATE LABEL CLOUDS
#194RESOURCE ALLOCATION FOR VIRTUAL PRIVATE LABEL CLOUDS
#195Zero-knowledge environment based social networking engine
#196LOCATION BASED HOME SCREENS FOR CAREGIVER PORTABLE WIRELESS DEVICES
#197SYSTEMS AND METHODS FOR INCORPORATING BREACH VELOCITIES INTO FRAUD SCORING MODELS
#198Secure Storage Network and Methods for use Therewith
#199Computing network for synchronized streaming of audiovisual content
#200SELECTIVE DEEP INSPECTION IN SECURITY ENFORCEMENT BY A NETWORK SECURITY SYSTEM (NSS)
#201METHOD AND SYSTEM FOR DETERMINING DESIGN AND SEGMENTATION FOR ROBUST NETWORK ACCESS SECURITY
#202PROVIDING APPLICATION SECURITY USING CAUSAL GRAPH
#203NETWORK CONNECTION AUTOMATION
#204PROXY-BASED IDENTITY AND ACCESS MANAGEMENT FOR WEB APPLICATIONS
#205METHODS AND SYSTEMS FOR ANALYZING ACCESSING OF MEDICAL DATA
#206INDIVIDUAL DATA UNIT AND METHODS AND SYSTEMS FOR ENHANCING THE SECURITY OF USER DATA
#207Cloud Resource Risk Scenario Assessment and Remediation
#208PRIVATE APPLICATION PLATFORM
#209SECURE MULTI-FACTOR ENCRYPTED AUTHENTICATION SYSTEM
#210Extending server-based desktop virtual machine architecture to client machines
#211Audio Playback Network Joining
#212Secure access to devices in a virtual environment using security tokens
#213DATA PAYMENT AND AUTHENTICATION VIA A SHARED DATA STRUCTURE
#214USER INTERFACES FOR MANAGING ACCESSORIES
#215NETWORK SERVICE PLAN DESIGN
#216SYSTEMS AND METHODS FOR ENTERPRISE-LEVEL SECURITY POLICY MANAGEMENT TOOL
#217BLOCKCHAIN-BASED ADMISSION PROCESSES FOR PROTECTED ENTITIES
#218ASSIGNING IDENTIFIERS TO USER SESSIONS TO MANAGE SECURITY RISK WHEN MONITORING ACCESS OF A CLIENT DEVICE TO SERVICES
#219Encryption method, decryption method, and related apparatus
#220DIRECT ACCESS AUTHENTICATION USING GESTURES
#221SYSTEMS AND METHODS FOR NETWORK ACCESS CONTROL USING DISTRIBUTED LEDGERS
#222SYSTEMS AND METHODS FOR SCALABLE-FACTOR AUTHENTICATION
#223COMMUNICATION METHOD, APPARATUS, AND DEVICE
#224Translation Circuitry for Access Control Identifier Mechanisms
#225ELECTRONIC SYSTEM FOR IMPLEMENTING INTERCONNECTIONS AND AUTHENTICATING PERMISSIONS BETWEEN RESOURCE COMPONENTS
#226MECHANISM TO ENABLE AUTHORIZATION OF NETWORK FUNCTION ACTING AS FEDERATED LEARNING CLIENTS AND FEDERATED LLEARNING SERVERS IN 5G CORE
#227SECURE PASSWORD SHARING FOR WIRELESS NETWORKS
#228Methods and apparatus to monitor streaming media content
#229SERVICE ACCESS METHOD AND APPARATUS
#230IN-VEHICLE RELAY DEVICE, RELAY METHOD, AND RECORDING MEDIUM STORING PROGRAM
#231DATA DEPENDENT RESTRICTIONS
#232SESSION-CENTRIC ACCESS CONTROL FOR SECURE EPHEMERAL SHELLS
#233GUARDRAIL ENFORCEMENT ENGINE FOR IMPORTED ELECTRONIC RESOURCES
#234NON-IN LINE DATA MONITORING AND SECURITY SERVICES
#235SECURITY MONITORING UTILIZING DEVICE SIGNATURE DETECTION
#236HASHING TECHNIQUES FOR ASSOCIATING ASSETS RELATED TO EVENTS WITH ADDRESSABLE COMPUTER NETWORK ASSETS
#237SYSTEM AND METHOD FOR SECURED SHARING OF MEDICAL DATA GENERATED BY A PATIENT MEDICAL DEVICE
#238CLOUD-BASED SYSTEM FOR PROTECTING SENSITIVE INFORMATION IN SHARED CONTENT
#239SYSTEM AND METHOD FOR MAINTAINING INTERNET ANONYMITY VIA CLIENT FINGERPRINT
#240SYSTEM AND METHOD FOR OMNICHANNEL SOCIAL ENGINEERING ATTACK AVOIDANCE
#241Detecting Threats Against Computing Resources Based on User Behavior Changes
#242AI-driven integration platform and user-adaptive interface for business relationship orchestration
#243METHODS AND APPARATUS FOR ESTABLISHING SHARED MEMORY SPACES FOR DATA ACCESS AND DISTRIBUTION
#244DATA ISOLATION AND TWO-FACTOR ACCESS CONTROL
#245CONFIGURING ACCESSORY NETWORK CONNECTIONS
#246DYNAMIC AND INTELLIGENT VIRTUAL DESKTOP MANAGEMENT
#247DYNAMIC FUNCTIONAL PARTITIONING FOR SECURITY PASS-THROUGH VIRTUAL NETWORK FUNCTION (VNF)
#248VISIBILITY AND SCANNING OF A VARIETY OF ENTITIES
#249NETWORK SECURITY TECHNIQUES COMPARING OBSERVED DISTRIBUTIONS TO BASELINE DISTRIBUTIONS
#250CLASSIFYING TYPES OF SENSITIVE EVENTS FOR DATA LOSS PREVENTION
#251METHOD FOR PROCESSING AN OPERATION INVOLVING SECRET DATA, TERMINAL, SYSTEM AND CORRESPONDING COMPUTER PROGRAM
#252SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS
#253METHOD AND APPARATUS FOR SECURE TOKEN GENERATION
#254PAIRING DEVICES TO PREVENT DIGITAL CONTENT MISUSE
#255MEDIA AGNOSTIC CONTENT ACCESS MANAGEMENT
#256Extended domain platform for nonmember user account management
#257ELECTRONIC DEVICE FOR CONTROLLING ACCESS TO DEVICE RESOURCE AND OPERATION METHOD THEREOF
#258NETWORK ACCESS CONTROL OF AUDIO CAPTURE DEVICE
#259COMMUNICATION DEVICE AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING COMPUTER READABLE INSTRUCTIONS FOR COMMUNICATION DEVICE
#260DEVICE CLASSIFICATION
#261METHOD FOR MANAGING A REQUEST TO ACCESS A LOCAL COMMUNICATION NETWORK, METHOD FOR PROCESSING A REQUEST TO ACCESS A LOCAL COMMUNICATION NETWORK, METHOD FOR REQUESTING ACCESS TO A LOCAL COMMUNICATION NETWORK AND CORRESPONDING DEVICES, MANAGEMENT PLATFORM, GATEWAY, USER TERMINAL, SYSTEM AND COMPUTER PROGRAMS
#262SERVICE PROVIDING SYSTEM
#263ACCESS IDENTIFIER PROVISIONING TO APPLICATION
#264SECURE ACCESS MANAGEMENT FOR TOOLS WITHIN A SECURE ENVIRONMENT
#265DATA PROTECTION IN NETWORK ENVIRONMENTS
#266USER DEFINED NETWORK ACCESS THAT SUPPORTS ADDRESS ROTATION
#267INTEGRATION OF REAL-WORLD AND VIRTUAL-WORLD SYSTEMS
#268SYSTEMS AND METHODS FOR ESTABLISHING A USER PURPOSE FULFILLMENT COMPUTING PLATFORM
#269RESOURCE MODELING, ACCESS, AND SECURITY
#270PROVISIONING TEMPORARY FUNCTIONALITY TO USER DEVICES
#271CONTROL TOWER RESTRICTIONS ON THIRD PARTY PLATFORMS
#272HYBRID WORKFLOW SYNCHRONIZATION BETWEEN CLOUD AND ON-PREMISE SYSTEMS IN A CONTENT MANAGEMENT SYSTEM
#273Method and apparatus to reduce the window for policy violations with minimal consistency assumptions
#274Queryless device configuration determination-based techniques for mobile device management
#275Client device security for domain name resolution and browsing
#276MODEL AND CONCEPT TO AUTOMATE PROCESSES ACROSS SEVERAL IT SYSTEMS
#277Using PKI for security and authentication of control devices and their data
#278SYSTEM AND METHOD FOR A TOKEN GATEWAY ENVIRONMENT
#279IPTV FOLLOW ME CONTENT SYSTEM AND METHOD
#280SYSTEMS AND METHODS FOR ON-NETWORK DEVICE IDENTIFICATION
#281Systems and methods for third-party interoperability in secure network transactions using tokenized data
#282SYSTEMS AND METHODS FOR CONNECTING PRIVATE DEVICES TO PUBLIC DEVICES ACCORDING TO CONNECTION PARAMETERS
#283SECURING CONTROL AND USER PLANE SEPARATION IN MOBILE NETWORKS
#284SYSTEMS AND METHODS FOR PROVIDING AN INTERACTIVE ASYNCHRONOUS VIDEO LEARNING PLATFORM
#285SYSTEMS AND METHODS FOR CHARGING OF ELECTRIC VEHICLES WITH CHARGE BALANCING BETWEEN MULTIPLE ELECTRIC VEHICLE CHARGING STATIONS IN A MICROGRID
#286LOGIN USING QR CODE
#287SYSTEMS AND METHODS FOR ANTI-CHEAT DETECTION
#288SYSTEMS AND METHODS FOR REMOTE CONTROL IN INFORMATION TECHNOLOGY INFRASTRUCTURE
#289STATE MANAGEMENT FOR DEVICE-DRIVEN MANAGEMENT WORKFLOWS WITH ACTIVE ATTRIBUTES
#290PLUGIN BASED HOST DEFINITIONS FOR A MULTI-CLOUD INFRASTRUCTURE
#291Bookmarking Support for Federated Login Pages
#292Systems and methods for stateless authentication and authorization using JWT access tokens
#293TRUSTED DECISION SUPPORT SYSTEM AND METHOD
#294SYSTEMS AND METHODS FOR CHARGING OF ELECTRIC VEHICLES WITH CHARGE BALANCING BETWEEN MULTIPLE ELECTRIC VEHICLE CHARGING STATIONS IN A LOCAL AREA NETWORK
#295SECURITY OF SURVEILLANCE MEDIA
#296SYSTEM AND METHOD FOR PROVIDING SERVICES USING DIGITAL TWINS
#297Techniques for anonymous rate limiting for services
#298TRACKING AND ANALYSES OF CONTENT PRESENTATION
#299COMMUNICATION NETWORK WITH CRYPTOGRAPHIC KEY MANAGEMENT FOR SYMMETRIC CRYPTOGRAPHY
#300SYSTEMS FOR NETWORK RISK ASSESSMENT INCLUDING PROCESSING OF USER ACCESS RIGHTS ASSOCIATED WITH A NETWORK OF DEVICES