Network architectures or network communication protocols for network security for controlling access to network resources Entity profiles
REAL-TIME ENTITY ANOMALY DETECTION
#2Policy Engine for Governing Cloud Environments
#3SHORTEST PATH BRIDGING (SPB) SECURITY GROUP POLICY
#4METHOD TO REDUCE USERS FROM FALLING VICTIM OF RANSOMWARE
#5SYSTEMS AND METHODS FOR APPLYING UNFAIR THROTTLING TO SECURITY SERVICE REQUESTS
#6Systems and Methods for Anonymous Administrative Login
#7Systems and Methods for End User Privilege Elevation
#8CONFERENCE SECURITY FOR USER GROUPS
#9SYSTEMS AND METHODS FOR CONTROLLING ACCESS TO AN ELECTRONIC DEVICE
#10EVENTS ACCOUNT FOR NATIVE APP EVENT SHARING
#11SYSTEMS AND METHOD FOR AUTHENTICATING USERS OF A DATA PROCESSING PLATFORM FROM MULTIPLE IDENTITY PROVIDERS
#12CLOUD-BASED DYNAMIC ACCESS TO PRIVATE RESOURCES
#13MULTI-FACTOR ENABLED ACCESS USING RANDOMLY SELECTED DIGITAL IDENTITY AUTHENTICATION FACTORS
#14REAL-TIME OWNERSHIP STATUS CHECK FOR NETWORK DEVICES IN A NETWORK
#15Large Network Graph Processing
#16CYBERATTACK DETECTION USING PROBABILISTIC GRAPHICAL MODELS
#17METHODS AND SYSTEMS FOR DETECTING INADVERTENT UNAUTHORIZED ACCOUNT ACCESS
#18MANAGING VERSION SHARING IN A DATA EXCHANGE
#19AUTHORIZING FRONT-END DEVICES WITH TOKENS
#20INTEGRATED CYBERSECURITY SYSTEM AND METHOD FOR PROVIDING RESTRICTED CLIENT ACCESS TO A WEBSITE
#21DYNAMIC COMPUTING PLATFORM FOR REAL-TIME DATA CONTAINER GENERATION, AUTHORIZATION, AND THROTTLING MANAGEMENT
#22MULTI-LENDER PLATFORM THAT SECURELY STORES PROPRIETARY INFORMATION FOR GENERATING OFFERS
#23PRIORITIZING OPERATIONS OVER CONTENT OBJECTS OF A CONTENT MANAGEMENT SYSTEM
#24SECURE DOCUMENT STORAGE SYSTEM
#25SYSTEM AND METHOD FOR AUTHENTICATING INTERACTIONS WITH DYNAMICALLY VARYING DIGITAL RESOURCES LINKED TO RESOURCE DISTRIBUTION DEVICES
#26VARIABLE-STEP AUTHENTICATION FOR COMMUNICATIONS IN CONTROLLED ENVIRONMENT
#27DETECTION OF OPERATIONAL THREATS USING ARTIFICIAL INTELLIGENCE
#28MULTIPLAYER COLLABORATIVE TASK ASSURANCE METHOD BASED ON AGENT AND BACKUP TECHNIQUES
#29Configuring Context-Based Restrictions For A Computing Device
#30CENTRALIZED EVENT DETECTION
#31DATA TRANSFER DISCOVERY AND ANALYSIS SYSTEMS AND RELATED METHODS
#32CREDENTIAL MANAGEMENT SERVICE
#33Third-Party Declarative Transaction Verification
#34CREDIT UNITS-BASED ACCESS CONTROL FOR DATA CENTER RESOURCES
#35SYSTEMS AND METHODS FOR CORRELATED ACCESS INSIGHTS AND GROUP REPORTING
#36SYSTEM AND METHOD FOR PERFORMING INTERACTIONS ACROSS GEOGRAPHICAL REGIONS WITHIN A METAVERSE
#37VOTING AS LAST RESORT ACCESS RECOVERY FOR ACCESS MANAGEMENT
#38System and Method for Authenticating Client Devices Communicating with an Enterprise System
#39SYSTEM, METHOD, AND INFORMATION PROCESSING APPARATUS
#40ACCOUNT AUTHENTICATION EXCLUDING MERCHANTS BASED ON MERCHANT LOGOS
#41ILLICIT ROUTE VIEWING SYSTEM AND METHOD OF OPERATION
#42METHOD FOR PURCHASING GOODS, ACCESS AUTHORIZATIONS OR AUTHORIZATIONS FOR USING A SERVICE FROM A PLURALITY OF OFFERED GOODS, ACCESS AUTHORIZATIONS OR AUTHORIZATIONS FOR USING A SERVICE
#43ARCHITECTURES, SYSTEMS AND METHODS FOR GENERATING AUDIBLE CONTENT
#44COLLECTION AND USE OF TELEMETRY DATA TO MONITOR AND COLLECT MULTI-INTERFACE WORKFLOW INTERACTION
#45MANAGING CONTENT PLACEMENT IN EXTENDED REALITY ENVIRONMENTS
#46TEXT CHAT MANAGEMENT SYSTEM CONNECTED TO A VIDEO CONFERENCE MANAGEMENT SYSTEM
#47SYSTEMS AND METHODS FOR CLONING BMC PROFILES IN A CLUSTER ENVIRONMENT
#48Providing Meeting Controls For Network Conferences
#49SECURE AUTHENTICATION
#50SYSTEM AND METHOD FOR PROVIDING A TRAINED MODEL TO A COMPUTING DEVICE OF A USER
#51Systems and Methods for Servicing Vehicle Messages
#52TECHNIQUES FOR VERIFYING A SENDER IDENTITY USING A USER-GENERATED IDENTIFIER
#53Continuous User Authentication Criteria for Access to Encrypted Files
#54ENHANCED VALUE COMPONENT PREDICTIONS USING CONTEXTUAL MACHINE-LEARNING MODELS
#55SYSTEM AND METHODS FOR CONTROLLED ACCESS TO COMPUTER RESOURCES
#56SECURE MEETING SYSTEM AND METHOD
#57CENTRALIZED AND DECENTRALIZED INDIVIDUALIZED MEDICINE PLATFORM
#58PERVASIVE ADVISOR FOR MAJOR EXPENDITURES
#59APPLYING A GROUP BASED POLICY TO NETWORK TRAFFIC FROM A CLIENT
#60Graphical User Interface and Console Management, Modeling, and Analysis System
#61ROLE AND ATTRIBUTE BASED DATA MULTI-TENANCY ARCHITECTURE
#62EMAIL-BASED AUTHENTICATION FOR ACCOUNT LOGIN, ACCOUNT CREATION AND SECURITY FOR PASSWORDLESS TRANSACTIONS
#63APPARATUS AND METHOD FOR TRAFFIC DATA ACCESS MANAGEMENT
#64Smart environment control device using prioritized thermal sensing to trigger personalized functions
#65SECURE SYSTEM FOR HIDING REGISTRATION RULES FOR DYNAMIC CLIENT REGISTRATION
#66SYSTEMS, METHODS, AND APPARATUSES FOR ACTIVATING A DECOY RESOURCE BASED ON DURESS TRIGGERS IN AN ELECTRONIC NETWORK
#67MANAGED SOFTWARE REMEDIATION
#68COMMUNICATION SYSTEM, MANAGER APPARATUS, COMMUNICATION METHOD, AND COMMUNICATION PROGRAM
#69FACTOR HEALTH ASSESSMENT AND SELECTION FOR LOGIN AT AN IDENTITY PROVIDER
#70FILTERING PASSWORDS BASED ON A PLURALITY OF CRITERIA
#71Access Control System for Electric Vehicle Charging
#72Free Time Monetization Exchange
#73SYSTEMS AND METHODS FOR AUTOMATIC LEAD GENERATION AND MESSAGING USING ARTIFICIAL INTELLIGENCE
#74SYNCHRONOUS INTERFACING WITH UNAFFILIATED NETWORKED SYSTEMS TO ALTER FUNCTIONALITY OF SETS OF ELECTRONIC ASSETS
#75Systems Using an Authorization Service User Interface for Secure Role-Based Access Control
#76CONTENT COLLECTIONS LINKED TO A BASE ITEM
#77SYSTEM AND METHOD FOR PREDICTIVE PLATFORMS IN IDENTITY MANAGEMENT ARTIFICIAL INTELLIGENCE SYSTEMS USING ANALYSIS OF NETWORK IDENTITY GRAPHS
#78Device Searching Method, Apparatus and System
#79EMBEDDED BUSINESS ANALYTICS BI-DIRECTIONAL FLOW
#80SECURING SENSITIVE INFORMATION DETERMINED IN AN INPUT MESSAGE
#81SYSTEM AND METHOD FOR IMPLEMENTING DATA SOVEREIGNTY SAFEGUARDS IN A DISTRIBUTED SERVICES NETWORK ARCHITECTURE
#82SYSTEMS, METHODS, AND APPARATUS FOR ENHANCED HEADSETS
#83SYSTEMS AND METHODS FOR DYNAMICALLY ENABLING AND DISABLING A BIOMETRIC DEVICE
#84Security Techniques for Enterprise Messaging Systems
#85ADAPTIVE PROTECTION MECHANISMS LOOP
#86MULTI-TENANCY AUTHORIZATION FRAMEWORK FOR HIERARCHICAL RESOURCES OF A DATA MANAGEMENT SYSTEM
#87MULTI FACTOR AUTHENTICATION
#88SYSTEMS AND METHODS FOR MANAGING THE GENERATION OR DELETION OF RECORD OBJECTS BASED ON ELECTRONIC ACTIVITIES AND COMMUNICATION POLICIES
#89MANAGEMENT OF COLLABORATIVE CONTENT ITEM MODIFICATION
#90SYSTEM AND METHODS FOR NETWORK ADDRESS BASED BLOCKING FOR MULTIPLE SUBSTRATES
#91USER MANAGEMENT IN A MULTI-TENANT DATA MANAGEMENT SYSTEM
#92COMMUNICATION PORTAL IN A CLIENT APPLICATION
#93Multicast traffic segmentation in an overlay network
#94History-Based Inauthenticity Identification
#95PROVIDING DYNAMIC NETWORK SECURITY BASED ON IMPORTANCE OF PROPRIETARY CONTENT
#96MULTI-BASELINE UNSUPERVISED SECURITY-INCIDENT AND NETWORK BEHAVIORAL ANOMALY DETECTION IN CLOUD-BASED COMPUTE ENVIRONMENTS
#97SYSTEMS AND METHODS FOR AUTHORIZING AGE-RESTRICTED INTERACTIONS
#98COMPUTER-BASED SYSTEMS AND DEVICE CONFIGURED FOR ELECTRONIC AUTHENTICATION AND VERIFICATION OF DOCUMENTS AND METHODS THEREOF
#99ACCESS CONTROL DATA EVALUATION SYSTEMS, METHODS, AND APPARATUSES
#100TECHNIQUES FOR RESOLVING CONTRADICTORY DEVICE PROFILING DATA
#101SYSTEMS AND METHODS FOR MANAGING WORKSPACE CAPABILITIES
#102ENFORCING JIT ACCESS CONTROL BY LEVERAGING PAM AND LDAP
#103SYSTEMS AND METHODS FOR DEPLOYMENT OF WORKSPACE ENDORSEMENTS
#104PERSISTENT SOURCE VALUES FOR ASSUMED ALTERNATIVE IDENTITIES
#105ENTITLEMENT ENGINE FOR CERTIFYING USER PERMISSIONS
#106Methods And Systems For Memory Tracing In Asset Managing Systems
#107SYSTEMS AND METHODS FOR TEMPORARY ACCESS WITH ADAPTIVE TRUST LEVELS FOR AUTHENTICATION AND AUTHORIZATION
#108SYSTEMS AND METHODS FOR ACCESSING CLOUD RESOURCES FROM A LOCAL DEVELOPMENT ENVIRONMENT
#109DYNAMIC VIRTUAL IDENTIFIER GENERATION FOR USER INTERACTION AUTHORIZATION VERIFICATION AND LOGGING
#110EXTENDED PRELAUNCH FOR LOCAL OR REMOTE PHYSICAL AND VIRTUAL SYSTEMS
#111SECURE AUTHENTICATION AND EXECUTION OF APPLICATIONS ON SHARED DEVICES
#112Dynamic Passive Authentication
#113SYSTEMS AND METHODS FOR RESTRICTING SECURITY CONNECTION DATA RESETS
#114SYSTEMS AND METHODS FOR RESTRICTING SECURITY CONNECTION DATA RESETS
#115METHOD, APPARATUS AND ELECTRONIC DEVICE FOR INFORMATION PROCESSING
#116DYNAMIC MEETING SPACE CONFIGURATION BASED ON CONTENT
#117PROVIDING ACCESS WITH SEPARATE AUTHENTICATION TO SECURE CONTENT IN REPOSITORIES
#118EMBEDDED FOLDER VIEWS
#119COLLABORATIVE APPLICATION SERVICE PROCESS MANAGEMENT SYSTEM AND METHOD BASED ON MULTI-TENANT MODE
#120IDENTIFYING PERSONALIZED OR ALTERED WEBPAGE CONTENT USING A BROWSER EXTENSION TOOL
#121Systems and Methods for Network Security
#122METHOD AND SYSTEM FOR VIRTUAL DESKTOP SERVICE MANAGER PLACEMENT BASED ON SECURITY PROFILES
#123VEHICLE COMMUNICATION APPARATUS, IN-VEHICLE NETWORK SYSTEM, AND VEHICLE COMMUNICATION METHOD
#124DYNAMIC PRIVILEGED ACCESS REQUEST SYSTEM
#125STATED AGE FILTER
#126PROFILE PROVISIONING PLATFORM
#127PROVIDING ACCESS CONTROL TO DISTRIBUTED RESOURCES TO AN INFORMATION HANDLING SYSTEM
#128AUTHORIZATION AND CONTENT MANAGEMENT IN AUTHORIZED PROFILES BASED ON ASSOCIATED STANDARDIZED HIERARCHICAL IDENTIFICATION
#129SYSTEM AND METHOD FOR MANAGING USER ACCESS TO CLOUD-BASED APPLICATIONS IN AN ENTERPRISE ENVIRONMENT
#130CONTROLLING ACCESS TO DATA IN A CLOUD-BASED SOFTWARE PLATFORM BASED ON APPLICATION AUTHORIZATION
#131SYSTEMS AND METHODS FOR PROVIDING PRIORITIZATION FOR DATA TRANSPORT SERVICES
#132Managing Trusted User Devices Via Silent Push Notifications
#133ENROLLMENT AND SHARING OF DEVICES AND NETWORK-BASED SERVICES VIA ON-PREMISES NETWORK ACCESS POINT
#134APPARATUSES, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR OFFLINE AUTHENTICATION
#135METHOD AND SYSTEM FOR PERFORMING AUTHENTICATION AND OBJECT DISCOVERY FOR ON-PREMISES CLOUD SERVICE PROVIDERS
#136Methods and Systems for Connecting Physical Objects to Digital Communications
#137Method and System for Personalization of Advertisement Content
#138MANAGEMENT AND CONTROL OF MOBILE COMPUTING DEVICE USING LOCAL AND REMOTE SOFTWARE AGENTS
#139ACCESS CONTROL OF AUDIO AND VIDEO STREAMS AND CONTROL OF REPRESENTATIONS FOR COMMUNICATION SESSIONS
#140SOCIAL MEDIA POST SUBSCRIBE REQUESTS FOR BUFFER USER ACCOUNTS
#141Universal Conceptual Control Management
#142ARCHITECTURE HAVING A PROTECTIVE LAYER AT THE DATA SOURCE
#143SYSTEM AND METHOD FOR PROTECTING NON-PUBLIC INFORMATION FROM MALICIOUS USERS
#144TECHNIQUES FOR SECURELY COMMUNICATING SENSITIVE DATA FOR DISPARATE DATA MESSAGES
#145ENCRYPTED CACHE PROTECTION
#146Preventing Unauthorized Access to Personal Data During Authentication Processes
#147PROVIDING ENHANCED FUNCTIONALITY IN AN INTERACTIVE ELECTRONIC TECHNICAL MANUAL
#148UNIFIED AUTHENTICATION SYSTEM FOR DECENTRALIZED IDENTITY PLATFORMS
#149ROUTER, METHOD FOR ROUTER, COMPUTER READABLE MEDIUM, AND APPARATUS
#150PEER-TO-PEER OFFLINE ACCESS MODE
#151System and Method for Outlier and Anomaly Detection in Identity Management Artificial Intelligence Systems Using Cluster Based Analysis of Network Identity Graphs
#152TECHNIQUES FOR ACTIVE INSPECTION OF CLOUD COMPUTING APPLICATIONS UTILIZING OPTICAL CHARACTER RECOGNITION
#153MULTI-FACTOR AUTHENTICATION IN VIRTUAL REALITY ENVIRONMENTS
#154User Presence Detection for Authentication Question Generation
#155METHODS AND SYSTEMS FOR CONTROLLING ACCESS TO, AND INTEGRITY OF, RESOURCES ON A BLOCKCHAIN
#156ONLINE MARKETPLACE OF PLUGINS FOR ENHANCING DIALOG SYSTEMS
#157VEHICLE CONTROL SYSTEM, VEHICLE CONTROL METHOD IN VEHICLE CONTROL SYSTEM, PORTABLE DEVICE, CONTROL METHOD FOR PORTABLE DEVICE, IN-VEHICLE CONTROLLER, AND CONTROL METHOD FOR IN-VEHICLE CONTROLLER
#158Systems and Methods for Encoding and Sharing Content between Devices
#159METHODS, SYSTEMS, AND DEVICES FOR DYNAMICALLY MODELING AND GROUPING ENDPOINTS FOR EDGE NETWORKING
#160MONITORING TOOL FOR DETECTING VIOLATIONS OF DEVICE BEHAVIOR CONSTRAINTS
#161SYSTEM TO PRESENT CONTEXT BASED CREATIVE TOOL
#162AUTOMATIC ACCOUNT MANAGEMENT SYSTEM
#163SYSTEMS AND METHODS FOR CONNECTING A PUBLIC DEVICE TO A PRIVATE DEVICE WITH PRE-INSTALLED CONTENT MANAGEMENT APPLICATIONS
#164MANAGEMENT OF A SMART HOME AUTOMATION COMMUNITY
#165SYNCHRONIZING A USER'S AUTHENTICATION STATE ACROSS MULTIPLE DATA CENTERS USING EVENT MESSAGES
#166AUTHENTICATION AND IDENTITY ARCHITECTURE FOR A MANAGEMENT PLANE OF A MULTI-TENANT COMPUTING SYSTEM
#167CLUSTER ACCESS METHOD, ELECTRONIC DEVICE AND MEDIUM
#168INTEGRATING DATA ACCESS AMONG DISPARATE PLATFORMS OVER A CLOUD STORAGE SCHEME
#169DATA EXCHANGE ON A DISTRIBUTED COMPUTING SYSTEM
#170Performing concealed transactions using a zero-knowledge data management network
#171Receiving information through a zero-knowledge data management network
#172SOURCING INFORMATION FOR A ZERO-KNOWLEDGE DATA MANAGEMENT NETWORK
#173SYSTEMS AND METHODS FOR CONTROLLING DATA EXPOSURE USING ARTIFICIAL-INTELLIGENCE-BASED MODELING
#174JAILED ENVIRONMENT RESTRICTING PROGRAMMATIC ACCESS TO MULTI-TENANT DATA
#175SYSTEMS AND METHODS FOR DYNAMIC BIO-BEHAVIORAL AUTHENTICATION
#176CREDENTIAL ENABLED REFERENCE FOR EXTERNAL RESOURCE ACCESS
#177HARDWARE INTEGRATED, PRIORITY-ENCODED DOMAINS
#178Producing Recovered Data in a Storage Network
#179DATA TRANSMISSION METHOD AND RELATED DEVICE
#180Cloud Data Security Posture Detection Based On Network Communication Paths And Sensitivity Data
#181SELF-SERVICE LENDER PORTAL
#182SYSTEM FOR SECURE CHANNEL SELECTION FOR MULTI-FACTOR AUTHENTICATION USING NON-FUNGIBLE ELECTRONIC RESOURCES
#183POLICY-BASED IP ADDRESS ALLOCATION
#184METHODS, SYSTEMS, AND DEVICES FOR DYNAMICALLY MODELING AND GROUPING ENDPOINTS FOR EDGE NETWORKING
#185SYSTEMS, METHODS, AND APPARATUSES FOR DETERMINING RESOURCE MISAPPROPRIATION BASED ON DISTRIBUTION FREQUENCY IN AN ELECTRONIC NETWORK
#186VALIDATING COMPLIANCE OF ROLES WITH ACCESS PERMISSIONS
#187SYSTEMS AND METHODS FOR ENHANCED AUTHORIZATION MESSAGES
#188TRANSACTION SYSTEM, TRANSACTION METHOD, AND INFORMATION RECORDING MEDIUM
#189METHODS AND APPARATUS FOR FACILITATING NFC TRANSACTIONS
#190THIRD-PARTY AUTHENTICATION PROTOCOLS FOR NATIVE ACCESS CONTROL
#191METHOD OF TERMINATING NETWORK DEVICE SESSION
#192SYSTEMS AND METHODS FOR INTELLIGENT FORMS AUTOMATION
#193WORKFORCE SENTIMENT MONITORING AND DETECTION SYSTEMS AND METHODS
#194SYSTEMS AND METHODS FOR OBJECTIVE-BASED SCORING USING MACHINE LEARNING TECHNIQUES
#195WEARABLE DEVICES IN A CONTROLLED ENVIRONMENT
#196ACCESS CONTROL INTERFACE FOR MANAGING ENTITIES AND PERMISSIONS
#197Privacy Border for a Portion of Resources on a Computing Machine
#198SECURITY HANDLING FOR RRC RESUME FROM INACTIVE STATE
#199ENHANCED AUTHORIZATION LAYERS FOR NATIVE ACCESS TO SECURE NETWORK RESOURCES
#200SYSTEMS AND METHODS FOR DYNAMIC GRANULAR ACCESS PERMISSIONS
#201ADAPTIVE AUTHENTICATION FOR ACCESS TO SECURE NETWORK RESOURCES
#202NATIVE AGENTLESS EFFICIENT QUERIES
#203AGENTLESS SINGLE SIGN-ON FOR NATIVE ACCESS TO SECURE NETWORK RESOURCES
#204ACCESS CONTROL INTERFACE FOR MANAGING ENTITIES AND PERMISSIONS
#205ANIMAL REPELLING SYSTEM
#206VOTING AS LAST RESORT ACCESS TO PREVENT ERRONEOUS OR MALICIOUS CHANGES
#207METHODS, SYSTEMS, AND DEVICES FOR DYNAMICALLY MODELING AND GROUPING ENDPOINTS FOR EDGE NETWORKING
#208INFORMATION EXCHANGE APPARATUS, INFORMATION EXCHANGE SYSTEM AND INFORMATION EXCHANGE METHOD
#209Using an Entity Behavior Profile When Performing Human-Centric Risk Modeling Operations
#210VOTING AS LAST RESORT ACCESS RECOVERY FOR COMMON IDENTITY AND ACCESS MANAGEMENT
#211SECURE ROLES FOR DATA SHARING
#212MONITORING APPARATUS AND CONTROL METHOD THEREOF
#213DATA PROTECTION WITH ONLINE ACCOUNT VALIDATION
#214TRUST-BASED DYNAMIC ACCESS CONTROL SYSTEM
#215SYSTEMS AND METHODS FOR VALIDATING NETWORK OPERATIONS BETWEEN USER ACCOUNTS THROUGH ACCESS TOKENS
#216BROWSER PROFILE SEPARATION FOR A MANAGED USER ACCOUNT
#217Identity And Access Management Using A Decentralized Gateway Computing System
#218MONITORING APPARATUS AND CONTROL METHOD THEREOF
#219APPLICATION PROGRAMMING INTERFACE FOR CERTIFICATE MANAGEMENT SYSTEMS
#220COMMUNICATION DEVICE AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING COMPUTER-READABLE INSTRUCTIONS FOR COMMUNICATION DEVICE
#221SHARING SECURITY SETTINGS BETWEEN ENTITIES USING VERIFIABLE CREDENTIALS
#222SYSTEMS AND METHODS FOR PROVIDING AN INTEGRATED IDENTIFIER
#223Grant inheritance in RBAC
#224Enhanced application programming interface gateway orchestrator
#225ENTERPRISE SECURITY IN METERS
#226DATA SECURITY SYSTEMS AND METHODS
#227FEDERATED IDENTITY VERIFICATION AND ACCESS CONTROL FOR PUBLIC SERVICE ENTITIES
#228SYSTEMS AND METHODS FOR SECURING LOGIN ACCESS
#229REAL-TIME DATA ENCRYPTION/DECRYPTION SECURITY SYSTEM AND METHOD FOR NETWORK-BASED STORAGE
#230Data management system for networked endpoints
#231ENTERPRISE DOCUMENT CLASSIFICATION
#232CONTROLLING ACCESS TO COMPUTER RESOURCES
#233SYSTEM CONFIGURED TO DETECT AND BLOCK THE DISTRIBUTION OF MALICIOUS CONTENT THAT IS ATTRIBUTABLE TO AN ENTITY
#234PROVIDING IDENTITY PROTECTION
#235APPLYING SECURITY POLICIES BASED ON ENDPOINT AND USER ATTRIBUTES
#236PRE-AUTHORIZATION ACCESS REQUEST SCREENING
#237TECHNIQUES FOR UNIFYING MULTIPLE IDENTITY CLOUDS
#238TECHNIQUES FOR UNIFYING MULTIPLE IDENTITY CLOUDS
#239DEVICE AUTHENTICATION METHOD AND SYSTEM, AND APPARATUS
#240Method to Validate Application Programming Interface (API) leveraging Non fungible Token (NFT)
#241Utilizing dynamic interface elements to improve user interfaces
#242SYSTEMS AND METHODS FOR RECOGNIZING A DEVICE
#243SYSTEMS AND METHODS FOR MANAGING PRIVILEGES IN A DATA PROCESSING SYSTEM
#244RESOURCE ACCESS MANAGEMENT BASED ON CONFIDENCE LEVEL IN DEVICE POSTURE
#245Systems and Methods for Network Security
#246COMPUTER-BASED SYSTEMS CONFIGURED FOR AUTOMATIC DETECTION OF A VERIFIED IDENTITY RELATED TO INTERACTION SESSIONS AND METHODS OF USE THEREOF
#247Alerting on Anomalous Authorization Requests Derived with Proximity Graph
#248System and method for validating users in a virtual ecosystem based on stacking of digital resources
#249AUTHORIZATION FRAMEWORK FOR APPLICATION PROGRAMMING INTERFACE (API) COLLECTIONS
#250Secure Content Access Authorization
#251Method and System for Remote Data Access
#252Collaborative application service process management system and method based on multi-tenant mode
#253IDENTIFYING PERSONALIZED OR ALTERED WEBPAGE CONTENT USING A BROWSER EXTENSION TOOL
#254METHOD AND SYSTEM FOR VIRTUAL DESKTOP SERVICE MANAGER PLACEMENT BASED ON SECURITY PROFILES
#255DETECTING SUSPICIOUS DATA ACCESS BY A ROGUE CLOUD RESOURCE
#256Dynamic privileged access request system
#257PROFILE PROVISIONING PLATFORM
#258SYSTEMS AND METHODS FOR PROVIDING PRIORITIZATION FOR DATA TRANSPORT SERVICES
#259Managing Trusted User Devices Via Silent Push Notifications
#260ENROLLMENT AND SHARING OF DEVICES AND NETWORK-BASED SERVICES VIA ON-PREMISES NETWORK ACCESS POINT
#261METHOD AND SYSTEM FOR PERFORMING AUTHENTICATION AND OBJECT DISCOVERY FOR ON-PREMISES CLOUD SERVICE PROVIDERS
#262APPLICATION USER SINGLE SIGN-ON
#263Methods and Systems for Connecting Physical Objects to Digital Communications
#264METHOD OF LIVE EVENT TICKETING WITH PRIORITIZED LINK FOR SEATING REARRANGEMENT
#265MANAGEMENT AND CONTROL OF MOBILE COMPUTING DEVICE USING LOCAL AND REMOTE SOFTWARE AGENTS
#266SYSTEMS, METHODS, AND APPARATUSES FOR TRACKING NETWORK TRAFFIC DATA AND IDENTIFYING ROGUE ACCESS PATTERNS IN AN ELECTRONIC NETWORK
#267APPARATUS AND METHOD FOR INTELLIGENT PROCESSING OF CYBER SECURITY RISK DATA
#268SYSTEMS AND METHODS FOR IMPROVING FUNCTIONALITY AND REMOTE MANAGEMENT OF COMPUTING RESOURCES DEPLOYED IN A CONTROLLED HIERARCHICAL NETWORK
#269IDENTITY ANONYMIZATION WITH CONTROLLED MASKING AND FORMAT PRESERVING ENCRYPTION
#270ACCESS ENFORCEMENT THROUGH AUTHENTICATION VERIFICATION ENTITY (AVE)
#271METHOD AND APPARATUS FOR AUTHENTICATION
#272DISTRIBUTED DEVICE TRUST DETERMINATION
#273ROSTER MANAGEMENT ACROSS ORGANIZATIONS
#274Architectures, systems and methods for program defined transaction system and decentralized cryptocurrency system
#275METHODS, ARCHITECTURES AND SYSTEMS FOR PROGRAM DEFINED SYSTEMS
#276REAL-TIME SERVICING OF VERIFICATION QUERIES USING HYBRID DATA SOURCES
#277SYSTEM AND METHOD FOR USING UNIQUE DEVICE IDENTIFIERS TO ENHANCE SECURITY
#278ACCESS CONTROL FOR CONTENT DELIVERY SERVICES
#279CLOUD-BASED DOSE VERIFICATION
#280METHODS AND SYSTEMS FOR PROVIDING A VISUAL CONTENT GALLERY WITHIN A CONTROLLED ENVIRONMENT
#281Location Aware Authorization System
#282APPARATUS AND METHOD FOR UPDATING RISK DETERMINATION BASED ON REAL-TIME CHANGES
#283PROACTIVE RENDERING OF CREDENTIALS ACCORDING TO DETERMINED LOCATION CHARACTERISTICS
#284SYSTEMS AND METHODS FOR AUTHENTICATING END USERS OF A WEB SERVICE
#285CYBERSECURITY INSIDER RISK MANAGEMENT
#286SYSTEM AND METHOD FOR PROVIDING MULTI-CHANNEL AUTHENTICATION
#287SYSTEMS AND METHODS FOR GENERATING AND USING SECURE SHARDED ONBOARDING USER INTERFACES
#288REAL-TIME SAFE SOCIAL NETWORKING
#289CLOUD COMPUTING ENVIRONMENT FOR BIOLOGICAL DATA
#290AUGMENTED REALITY REMOTE AUTHORING AND SOCIAL MEDIA PLATFORM AND SYSTEM
#291Third Party Data Processing for Improvement of Authentication Questions
#292SUPERVISED LEARNING SYSTEM FOR IDENTITY COMPROMISE RISK COMPUTATION
#293REAL-TIME ANALYTICAL QUERIES OF A DOCUMENT STORE
#294SYSTEMS AND METHODS FOR DATA COLLECTION USING WORKFLOW FORMS
#295SECURE USER EQUIPMENT POLICY DATA IN A COMMUNICATION NETWORK ENVIRONMENT
#296AUTOMATED POLICY REFINER FOR CLOUD-BASED IDENTITY AND ACCESS MANAGEMENT SYSTEMS
#297SYSTEMS AND METHODS FOR PROVIDING ACCESS TO A SECURE DEVICE
#298RUNTIME CONFIGURATION OF AUTHENTICATION JOURNEYS
#299USING TOKENS FROM PUSH NOTIFICATION PROVIDERS TO ENHANCE DEVICE FINGERPRINTING
#300METHODS, APPARATUSES AND COMPUTER PROGRAM PRODUCTS FOR IMPLEMENTING UNIFIED DATA CONTROL POLICY IN DISTRIBUTED AND PRODUCT-ORIENTED COMPUTING PLATFORMS