Network architectures or network communication protocols for network security Applying verification of the received information
Sub-classes:SECURE AND PRIVATE CLOUD BASED BROADCAST IDENTIFICATION
#2SMALL-FOOTPRINT ENDPOINT DATA LOSS PREVENTION
#3Data Processing Method and Apparatus and Computer-Readable Storage Medium
#4DATA INVOCATION METHOD AND APPARATUS
#5"Electronic Device"
#6System and Method For Controlling Time Dilation In Time-Sensitive Networks
#7Dynamic Data Storage Based on Estimated Update Frequency
#8Producing Recovered Data in a Storage Network
#9INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM
#10Secure and Private Cloud Based Broadcast Identification
#11NETWORK GATEWAY MESSAGING SYSTEMS AND METHODS
#12PHISHING EMAIL CAMPAIGN IDENTIFICATION
#13SYSTEMS AND METHODS FOR CREATING FINGERPRINTS OF ENCRYPTION DEVICES
#14INTELLIGENT REAL TIME DYNAMIC SMART CONTRACT GENERATION FOR SECURE PROCESSING OF INTERNET OF THINGS (IOT) DEVICE BASED EVENTS
#15METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR DETECTING STOLEN ACCESS TOKENS
#16COMMUNICATION NETWORK NODES, METHODS FOR PROVIDING COMMUNICATION NETWORK NODES, TERMINAL DEVICE, METHOD FOR OPERATING A TERMINAL DEVICE, METHODS FOR COMMUNICATION NETWORKS
#17USE OF BLOCKCHAIN BASED DISTRIBUTED CONSENSUS CONTROL
#18Method and System for Remote Data Access
#19PRIVACY-PROTECTION BASED VERIFICATION
#20METHOD AND SYSTEM FOR VERIFICATION OF END-TO-END DATA INTEGRITY DURING BIG DATA TRANSFER
#21Network Forensic System and Method
#22METHODS AND SYSTEMS FOR IMPROVING HARDWARE RESILIENCY DURING SERIAL PROCESSING TASKS IN DISTRIBUTED COMPUTER NETWORKS
#23ELECTRONIC FORM AUTOMATION
#24METHODS PROVIDING NON-3GPP ACCESS USING ACCESS NETWORK KEYS AND RELATED WIRELESS TERMINALS AND NETWORK NODES
#25METHODS AND SYSTEMS IMPLEMENTED IN A NETWORK ARCHITECTURE WITH NODES CAPABLE OF PERFORMING MESSAGE-BASED TRANSACTIONS
#26RECONCILIATION SYSTEMS AND METHODS FOR UNBOUNDED STREAMS
#27METHODS AND SYSTEMS IMPLEMENTED IN A NETWORK ARCHITECTURE WITH NODES CAPABLE OF PERFORMING MESSAGE-BASED TRANSACTIONS
#28NETWORK WATERMARK
#29CLOUD-BASED SYSTEM FOR PROTECTING SENSITIVE INFORMATION IN SHARED CONTENT
#30MARKING INFORMATION PROCESSING METHOD AND DEVICE, AND STORAGE MEDIUM
#31Network Forensic System and Method
#32Method and Apparatus for Route Verification and Data Sending, Device, and Storage Medium
#33Webpage integrity monitoring
#34DATA AND SOURCE VALIDATION FOR EQUIPMENT OUTPUT DATA OR EQUIPMENT FAILURE PREDICTION USING BLOCKCHAINS
#35METHODS AND SYSTEMS FOR DEVICE AUTHENTICATION
#36ENABLING SECURE COMMUNICATION VIA ATTESTATION OF MULTI-TENANT CONFIGURATION ON ACCELERATOR DEVICES
#37METHOD AND APPARATUS FOR DECENTRALIZED MANAGEMENT OF TRUSTED DATA ON TRUSTLESS NETWORKS
#38OPERATOR ACTION AUTHENTICATION IN AN INDUSTRIAL CONTROL SYSTEM
#39Rule-based network-threat detection
#40HEADER-BASED AUTHENTICATION IN A VIRTUAL PRIVATE NETWORK
#41DISTRIBUTED PLATFORM FOR COMPUTATION AND TRUSTED VALIDATION
#42Power line communication (PLC) denial of service attack
#43Broadcast remote sealing for scalable trusted execution environment provisioning
#44SYSTEMS AND METHODS FOR DYNAMIC NETWORK PAIRINGS TO ENABLE END-TO-END COMMUNICATIONS BETWEEN ELECTRONIC DEVICES
#45Secure and private cloud based broadcast identification
#46Optimized access control for network services
#47CRYPTOGRAPHICALLY TRANSMITTING AND STORING IDENTITY TOKENS AND/OR ACTIVITY DATA AMONG SPATIALLY DISTRIBUTED COMPUTING DEVICES
#48Single Sign-On Solution Using Blockchain
#49TRACKING OR STORING OF EQUIPMENT CONFIGURATION DATA USING IMMUTABLE LEDGER FUNCTIONALITY OF BLOCKCHAINS
#50SECURE SERVER CLIENT INTERACTION
#51SECURE MANAGEMENT OF CONTENT DISTRIBUTION DATA BLOCKS ON A BLOCKCHAIN
#52ENABLING LATE-BINDING OF SECURITY FEATURES VIA CONFIGURATION SECURITY CONTROLLER FOR ACCELERATOR DEVICES
#53System and method for ongoing trigger-based scanning of cyber-physical assets
#54Sharing encrypted documents within and outside an organization
#55TELEMETRY HUB
#56SYSTEM FOR SECURING VERIFICATION KEY FROM ALTERATION AND VERIFYING VALIDITY OF A PROOF OF CORRECTNESS
#57ARITHMETIC ENHANCEMENT OF C-LIKE SMART CONTRACTS FOR VERIFIABLE COMPUTATION
#58Rule-based network-threat detection
#59ENABLING SECURE STATE-CLEAN DURING CONFIGURATION OF PARTIAL RECONFIGURATION BITSTREAMS ON FPGA
#60UTILIZING BLOCKCHAINS TO IMPLEMENT NAMED DATA NETWORKING
#61Systems and methods for identifying synthetic identities associated with network communications
#62VISUAL SENSOR VALIDATION SYSTEM
#63SEMI-INTERACTIVE ONE-WAY TRANSFER OF DATA TO AN ISOLATED NETWORK
#64SYSTEM FOR SIMPLIFYING EXECUTABLE INSTRUCTIONS FOR OPTIMISED VERIFIABLE COMPUTATION
#65SECURITY VERIFICATION OF COMMUNICATIONS TO TENANTS OF A SHARED SYSTEM
#66Method and apparatus for controlling digital evidence
#67Verification of message patterns for vehicle ECUs
#68VERIFICATION SYSTEM
#69CLIENT SIDE BROWSER-BASED CACHING FOR MONITORED RESOURCES
#70Storage device authentication
#71METHODS AND SYSTEMS TO IDENTIFY A COMPROMISED DEVICE THROUGH ACTIVE TESTING
#72Intelligent real time dynamic smart contract generation for secure processing of internet of things (IoT) device based events
#73Securing border gateway protocol route propagation and updating
#74Secure and private cloud based broadcast identification
#75Trustworthy data exchange using distributed databases
#76Adjusting efficiency of storing data
#77Cloud-based implementation of dynamic threat detection
#78Computerized System For Analysis Of Vertices And Edges Of An Electronic Messaging System
#79Policies and encryption to protect digital information
#80Header-based authentication in a virtual private network
#81LOCALIZED DEVICE ATTESTATION
#82METHOD AND APPARATUS FOR INPUTTING VERIFICATION INFORMATION, AND STORAGE MEDIUM
#83Website Integrity and Date of Existence Verification
#84Header-based authentication in a virtual private network
#85TECHNOLOGIES FOR TRUSTED I/O WITH A CHANNEL IDENTIFIER FILTER AND PROCESSOR-BASED CRYPTOGRAPHIC ENGINE
#86NETWORK REACHABILITY SOLVING ALGORITHM BASED ON FORMAL VERIFICATION
#87USER CONTROLLED STORAGE AND SHARING OF PERSONAL USER INFORMATION ON A BLOCKCHAIN
#88METHOD TO DETECT EXTERNAL ATTACKS ON CLOUD DATA FROM WITHIN APPLICATION
#89Method and system for remote data access
#90SCALABLE RUNTIME VALIDATION FOR ON-DEVICE DESIGN RULE CHECKS
#91WEBPAGE INTEGRITY MONITORING
#92PEER NODE RECOVERY VIA APPROXIMATE HASH VERIFICATION
#93Transparent network access control for spatial accelerator device multi-tenancy
#94Generating recovered data in a storage network
#95Secure enrolment of security device for communication with security server
#96Zero-Knowledge Environment Based Networking Engine
#97SYSTEM AND METHOD FOR MANAGING DATA OF AN AUTOMATION FIELD DEVICE IN A SECURE MANNER AGAINST MANIPULATION
#98First hop security in multi-site multi-vendor cloud
#99System for executing digital resource transfer using trusted computing
#100System and method to manage large data in blockchain
#101SYSTEMS AND METHODS FOR PRIVATE NODE-LEVEL DATA COMPUTING AND RECONCILIATION
#102TECHNOLOGIES FOR TRUSTED I/O PROTECTION OF I/O DATA WITH HEADER INFORMATION
#103System and method for recording device lifecycle transactions as versioned blocks in a blockchain network using a transaction connector and broker service
#104Storage Unit Validating Requests for a Storage Vault
#105DATA LOSS PREVENTION (DLP) FOR CLOUD RESOURCES VIA METADATA ANALYSIS
#106Single sign-on solution using blockchain
#107Cryptographically transmitting and storing identity tokens and/or activity data among spatially distributed computing devices
#108Tracking or storing of equipment configuration data using immutable ledger functionality of blockchains
#109Method and apparatus for controlling digital evidence
#110SYSTEMS AND TECHNIQUES FOR SMART DEMAND SIDE RESPONSE USING DATA PLANE ARCHITECTURE
#111Attestation manifest derivation and distribution using software update image
#112Heartbeats and consensus in verifiable outsourced ledgers
#113Method and system for remote data access
#114WEBPAGE INTEGRITY MONITORING
#115DAG-AWTC LEDGER SYSTEM USING BFT VERIFICATION CONSENSUS MECHANISM
#116BINDING CRYPTOGRAM WITH PROTOCOL CHARACTERISTICS
#117Secure management of data files using a blockchain
#118METHOD AND SYSTEM FOR MANAGING PERSONAL INFORMATION WITHIN INDEPENDENT COMPUTER SYSTEMS AND DIGITAL NETWORKS
#119Endpoint data loss prevention (DLP)
#120UPSTREAM RESOURCE GRANT METHOD, RELATED DEVICE, AND COMPUTER-READABLE STORAGE MEDIUM
#121Semi-interactive one-way transfer of data to an isolated network
#122APPARATUS FOR CUSTOMER AUTHENTICATION OF AN ITEM
#123Systems and methods for secure data transmission
#124SECURE TRACKING AND TRANSFER OF ITEMS USING A BLOCKCHAIN
#125BLOCKCHAIN-BASED DATA DETECTION METHOD, APPARATUS, AND COMPUTER-READABLE STORAGE MEDIUM
#126Utilizing blockchains to implement named data networking
#127Telemetry hub
#128Detecting potential domain name system (DNS) hijacking by identifying anomalous changes to DNS records
#129Systems and methods for identifying synthetic identities associated with network communications
#130Secure transfer of data between programs executing on the same end-user device
#131Secure self-contained mechanism for managing interactions between distributed computing components
#132Smart device identity recognition method and system, electronic device, and storage medium
#133Rule-based network-threat detection
#134Rule-based network-threat detection
#135Systems and methods for providing provenance and anti-counterfeiting of a part using blockchain technology
#136Enabling stateless accelerator designs shared across mutually-distrustful tenants
#137Broadcast remote sealing for scalable trusted execution environment provisioning
#138Secure and private cloud based broadcast identification
#139EMAIL CERTIFICATION SYSTEM
#140Apparatus for detecting unauthorized communication in a network and searching for a substitute device
#141SECURED DATA WORKFLOW INTEGRATION AND METHODS THEREOF
#142Clearing house validation
#143Clearing House Signaling
#144PROCESSING MESSAGES WITH A DEVICE SERVER OPERATING IN A TELEPHONE
#145BLOCKCHAIN CONSENSUS METHODS AND SYSTEMS
#146Dynamic path verification method based on reorganization of authentication fragments
#147Reoccuring Keying System
#148FILE VAULT AND CLOUD BASED DOCUMENT NOTARY SERVICE
#149Hardware detection method and apparatus, device, and storage medium
#150SYSTEMS AND METHODS FOR VERIFYING ATTRIBUTES OF USERS OF ONLINE SYSTEMS
#151SYSTEM AND METHOD FOR ENABLING AND VERIFYING THE TRUSTWORTHINESS OF A HARDWARE SYSTEM
#152MOBILITY EXTENSIONS TO INDUSTRIAL-STRENGTH WIRELESS SENSOR NETWORKS
#153Transaction Replacement Method, Device, and Storage Medium
#154Methods and systems for improving hardware resiliency during serial processing tasks in distributed computer networks
#155Techniques for fault detection in wireless communications systems
#156Reconstructing data segments in a storage network and methods for use therewith
#157Methods and systems for device authentication
#158INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND INFORMATION PROCESSING PROGRAM
#159Efficient validation of transaction policy compliance in a distributed ledger system
#160Systems and methods for communication between a plurality of electronic devices based on subscriber access score
#161Systems and methods for dynamic network pairings to enable end-to-end communications between electronic devices
#162Secure communication using blockchain technology
#163Electronic form automation
#164Rule-based network-threat detection
#165Data processing systems for fulfilling data subject access requests and related methods
#166METHODS AND SYSTEMS IMPLEMENTED IN A NETWORK ARCHITECTURE WITH NODES CAPABLE OF PERFORMING MESSAGE-BASED TRANSACTIONS
#167Method and system for deploying arrangements of payloads based upon engagement of website visitors
#168Data and source validation for equipment output data or equipment failure prediction using blockchains
#169System and method to extend data loss prevention (DLP) to leverage sensitive outbound emails investigations—(antileaks)
#170Blockchain-based network device management methods and devices
#171Virtual network system, control apparatus, control method, and control program
#172METHOD AND SYSTEM FOR DETERMINING A STATE OF AN ACCOUNT IN A NETWORK DEVICE RUNNING A LIGHT CLIENT PROTOCOL OF A DISTRIBUTED LEDGER TECHNOLOGY NETWORK
#173Distributed digital currency mining to perform network tasks
#174METHOD AND SYSTEM FOR A SECURITY ASSESSMENT OF PHYSICAL ASSETS USING PHYSICAL ASSET STATE INFORMATION
#175E-code multi-imprints
#176VIRTUAL SERVICE AUTHORIZATION
#177PROTECTION METHOD AND PROTECTION DEVICE UNDER DIRECT ROUTING MODE
#178Electronic system for dynamic stepped multi-level authentication
#179Distributed logging for securing non-repudiable multi-party transactions
#180METHOD AND DEVICE FOR MONITORING DATA OUTPUT BY A SERVER
#181Client side browser-based caching for monitored resources
#182Distributed register intelligent node transfer engine
#183Distributed directory caching techniques for secure and efficient resource access
#184Cloud-based system for protecting sensitive information in shared content
#185Retrieving data in a storage network
#186Method and system for verifying user identity
#187VERIFICATION METHOD AND APPARATUS
#188METHOD AND SYSTEM FOR DATA SECURITY WITHIN INDEPENDENT COMPUTER SYSTEMS AND DIGITAL NETWORKS
#189CLUSTER-BASED NEAR-DUPLICATE DOCUMENT DETECTION
#190TAPPING NETWORK DATA TO PERFORM LOAD BALANCING
#191Electronic device
#192Methods and systems for PKI-based authentication
#193Trusted startup methods and apparatuses of blockchain integrated station
#194VALIDATING AUTHORIZATION FOR USE OF A SET OF FEATURES OF A DEVICE
#195System and method for supporting scalable representation of switch port status in a high performance computing environment
#196Network verification method and apparatus
#197Secure compute network devices and methods
#198Data processing systems for fulfilling data subject access requests and related methods
#199Digital certificate management method, apparatus, and system
#200Process-aware trace synthesis for training process learning
#201Distributed platform for computation and trusted validation
#202Systems and methods for secure data transfer between entities in a multi-user on-demand computing environment
#203Dynamic certificate management as part of a distributed authentication system
#204Trustworthy data exchange using distributed databases
#205Configuring access to a network service based on a security state of a mobile device
#206Method for detection of DNS spoofing servers using machine-learning techniques
#207Methods and systems for universal storage and access to user-owned credentials for trans-institutional digital authentication
#208Sharing encrypted documents within and outside an organization
#209System and method for controlling time dilation in time-sensitive networks
#210System and methods for tamper proof interaction recording and timestamping
#211Techniques for launching applications based on partial signature validation
#212BLOCKCHAIN-BASED VERIFICATION FRAMEWORK
#213Security management for network function messaging in a communication system
#214Cloud security based on object metadata
#215Task completion using a blockchain network
#216System and method for fingerprint-based network mapping of cyber-physical assets
#217System and method for trigger-based scanning of cyber-physical assets
#218System and method for supporting node role attributes in a high performance computing environment
#219TAMPERING VERIFICATION SYSTEM AND METHOD FOR FINANCIAL INSTITUTION CERTIFICATES, BASED ON BLOCKCHAIN
#220Method and device for cross-domain strong logical isolation and secure access control in the internet of things
#221Cloud-Based Data Integration System
#222Ability to forget in blockchain
#223Telemetry hub
#224METHOD FOR OPERATING ELECTRONIC DEVICE, APPARATUS AND STORAGE MEDIUM THEREOF
#225System and method for decentralized title recordation and authentication
#226Secure management of content distribution data blocks on a blockchain
#227Verification system
#228Systems and methods for creating a verified digital association
#229Information processing method and information processing system for encryption machine
#230Methods and systems for improving hardware resiliency during serial processing tasks in distributed computer networks
#231SYSTEMS AND METHODS FOR CREATING FINGERPRINTS OF ENCRYPTION DEVICES
#232System and method for verification of reliability and validity of crowd sourcing users
#233Security verification of communications to tenants of a shared system
#234System and methods for IOT security
#235Blockchain-based program review system, method, computing device and storage medium
#236Enabling late-binding of security features via configuration security controller for accelerator devices
#237Interworking between IoT service layer systems and distributed ledger systems
#238Monitoring in distributed computing system
#239Data transmission method, device, and system
#240Protecting information using policies and encryption
#241Systems and methods for providing provenance and anti-counterfeiting of a part using blockchain technology
#242Broadcast remote sealing for scalable trusted execution environment provisioning
#243Secure enrolment of security device for communication with security server
#244Systems and methods for gated offer eligibility verification
#245Enabling stateless accelerator designs shared across mutually-distrustful tenants
#246Secure management of data files using a blockchain
#247Scalable runtime validation for on-device design rule checks
#248Enabling secure state-clean during configuration of partial reconfiguration bitstreams on FPGA
#249Enabling secure communication via attestation of multi-tenant configuration on accelerator devices
#250Transparent network access control for spatial accelerator device multi-tenancy
#251Distributed ledger certification
#252Systems and methods for the secured entry and storage of sensitive data
#253Verification apparatus, vehicle-to-x communication device, method and use
#254Systems and methods for identifying synthetic identities associated with network communications
#255DATA CONSISTENCY VERIFICATION METHOD, AND DATA UPLOADING AND DOWNLOADING DEVICE
#256Relay device, non-transitory computer-readable storage medium and communication system
#257Method, apparatus, and system for reestablishing radio communication links due to radio link failure
#258System and method for security health monitoring and attestation of virtual machines in cloud computing systems
#259Detecting potential domain name system (DNS) hijacking by identifying anomalous changes to DNS records
#260Identity verification and login methods, apparatuses, and computer devices
#261Operator action authentication in an industrial control system
#262DYNAMICALLY ANALYZING THIRD-PARTY APPLICATION WEBSITE CERTIFICATES ACROSS USERS TO DETECT MALICIOUS ACTIVITY
#263Vehicle data verification
#264Method and system for managing content of digital brand assets on the internet
#265Electronic device intrusion detection
#266System and method for maintaining user session continuity across multiple devices and/or multiple platforms
#267Method of achieving synchronization management of account information of WEB interface in multi-system DAS
#268Shared electronic device management device and method
#269Methods and systems to identify a compromised device through active testing
#270System and method for consensus management
#271Rights-based system
#272STORED VALUE SMART CONTRACTS ON A BLOCKCHAIN
#273Blockchain consensus method, accounting node and node
#274E-code multi-imprints
#275On-board communication system, switching device, verification method, and verification program
#276Communication system using a random code as an encryption code
#277Secure and private cloud based broadcast identification
#278Technologies for securing network function virtualization images
#279Systems and methods for block chain authentication
#280Data transmission based on verification codes
#281Platform attestation and registration for servers
#282Apparatus for customer authentication of an item
#283System and method for managing a public software component ecosystem using a distributed ledger
#284Cloud-based shared security cache
#285Network forensic system and method
#286Data processing systems for fulfilling data subject access requests and related methods
#287Method for scaling computation in blockchain by delaying transaction execution
#288Method and system for inter-DLT networks trust enhancement
#289Hardware security module systems and methods
#290INFORMATION PROCESSING APPARATUS AND NON-TRANSITORY COMPUTER READABLE MEDIUM STORING PROGRAM
#291Rule-based network-threat detection
#292Storage medium, communication method, and communication device
#293Secure failsafe apparatus
#294Peer node recovery via approximate hash verification
#295Risk assessment using social networking data
#296METHOD FOR STORING AN OBJECT ON A PLURALITY OF STORAGE NODES
#297Webpage integrity monitoring
#298Cryptographically transmitting and storing identity tokens and/or activity data among spatially distributed computing devices
#299System for simplifying executable instructions for optimised verifiable computation
#300System for association of customer information across subscribers