H04L63/20 - CPC Classification

Classification description:

Network architectures or network communication protocols for network security for managing network security; network security policies in general

Sub-classes:
Recent Application in this class:
#1
20240305671
2024-09-12

SELF-ADJUSTING CYBERSECURITY ANALYSIS AND SCORE GENERATION

#2
20240305670
2024-09-12

USED CACHED SUMMARIES FOR EFFICENT ACCESS ANALYSIS FOR CLOUD PROVIDER ENTITIES

#3
20240305669
2024-09-12

Third-Party Declarative Transaction Verification

#4
20240305668
2024-09-12

IDENTITY-AWARE SECURE NETWORK

#5
20240305657
2024-09-12

ANALYTICS FOR PROCESSING INFORMATION SYSTEM DATA

#6
20240305643
2024-09-12

VOTING AS LAST RESORT ACCESS RECOVERY FOR ACCESS MANAGEMENT

#7
20240305641
2024-09-12

DATA SHARING METHOD, APPARATUS AND SYSTEM, AND SERVER AND COMPUTER STORAGE MEDIUM

#8
20240305640
2024-09-12

CREATING GRAPHICAL MODELS OF NETWORK SECURITY POLICIES AND DISPLAYING ON A NETWORK TOPOLOGY GRAPH

#9
20240305635
2024-09-12

System and Method for Authenticating Client Devices Communicating with an Enterprise System

#10
20240305634
2024-09-12

REMOTE CLUSTER ENROLLMENT

#11
20240305610
2024-09-12

IOT MULTICAST OUT-OF-BAND CYBERSECURITY MESSAGING SYSTEM AND METHOD

#12
20240305552
2024-09-12

MANAGING ACTIVE AND STANDBY GATEWAYS USING DUPLICATE ADDRESS DETECTION PACKETS

#13
20240305539
2024-09-12

AUTOMATICALLY DETECTING AUTHORIZED REMOTE ADMINISTRATION SESSIONS IN A NETWORK MONITORING SYSTEM

#14
20240303336
2024-09-12

DYNAMIC SECURITY FOR FABRIC NETWORKS

#15
20240298309
2024-09-05

METHODS AND APPARATUS FOR FLEXIBLE USE OF FREQUENCY BANDS

#16
20240298180
2024-09-05

SYSTEMS AND METHODS FOR DISTRIBUTING SD-WAN POLICIES

#17
20240297904
2024-09-05

ORDERING SECURITY INCIDENTS USING ALERT DIVERSITY

#18
20240297903
2024-09-05

ACCESS CONTROL SYSTEM, ACCESS CONTROL METHOD, AND ACCESS CONTROL PROGRAM

#19
20240297902
2024-09-05

SYSTEMS AND METHODS FOR DYNAMIC POLICY ASSIGNMENT OF SECURE COMMUNICATION SESSIONS USING SPDM

#20
20240297901
2024-09-05

DYNAMIC UNLOCKING OF SOFTWARE DEFINED SILICON (SDSi) PROCESSOR FEATURES VIA SECURITY PROTOCOL DATA MODEL (SPDM)

#21
20240297881
2024-09-05

Systems and Methods for Distributed Remote Access

#22
20240297878
2024-09-05

SYSTEMS AND METHODS FOR FIRMWARE PASSWORD MANAGEMENT

#23
20240297872
2024-09-05

TECHNIQUES FOR SIMULTANEOUSLY ACCESSING MULTIPLE ISOLATED SYSTEMS WHILE MAINTAINING SECURITY BOUNDARIES

#24
20240297805
2024-09-05

Providing Meeting Controls For Network Conferences

#25
20240297795
2024-09-05

MACHINE LEARNING TECHNIQUES FOR ASSOCIATING ASSETS RELATED TO EVENTS WITH ADDRESSABLE COMPUTER NETWORK ASSETS

#26
20240291870
2024-08-29

AUTOMATICALLY COMPUTING AND IMPROVING A CYBERSECURITY RISK SCORE

#27
20240291869
2024-08-29

SELF-ADJUSTING CYBERSECURITY ANALYSIS WITH NETWORK MAPPING

#28
20240291868
2024-08-29

IDENTIFYING SERVERLESS FUNCTIONS WITH OVER-PERMISSIVE ROLES

#29
20240291867
2024-08-29

ENFORCING SECURITY POLICIES IN A ZERO TRUST SECURITY FRAMEWORK USING A BEHAVIORAL SCORE

#30
20240291866
2024-08-29

DYNAMIC PERMISSIONS MANAGEMENT FOR CLOUD WORKLOADS

#31
20240291865
2024-08-29

SYSTEMS AND METHODS FOR SCHEDULED POLICY DEPLOYMENT IN OPERATIONAL TECHNOLOGY NETWORKS

#32
20240291860
2024-08-29

Methods and Apparatus to Automate Cyber Defense Decision Process and Response Actions by Operationalizing Adversarial Technique Frameworks

#33
20240291839
2024-08-29

DETECTING TAMPERING WITH HOSTED SERVICES

#34
20240291835
2024-08-29

METHOD AND SYSTEM FOR MONITORING HEALTH AND SECURITY OF DATA CENTER COMPONENTS VIA BI-DIRECTIONAL PROXY

#35
20240291822
2024-08-29

SYSTEM AND METHODS FOR CONTROLLED ACCESS TO COMPUTER RESOURCES

#36
20240291818
2024-08-29

INTEGRATION PACKAGING FOR A MULTI-TENANT COMPUTING ENVIRONMENT

#37
20240291816
2024-08-29

ENHANCED CLOUD ACCESS SECURITY BROKER FUNCTIONALITY UTILIZING IN-BAND APPLICATION OBSERVABILITY

#38
20240291815
2024-08-29

ZERO-TRUST ATTESTATION IN CLOUD COMPUTING

#39
20240291809
2024-08-29

Sharing System Access Using a Device

#40
20240291802
2024-08-29

Enforcing a Segmentation Policy in Co-Existence with a System Firewall

#41
20240291801
2024-08-29

ALTERNATE MEANS TO SHARING CONFIGURATION ACROSS MULTIPLE FIREWALLS OR GROUPS OF FIREWALLS

#42
20240291789
2024-08-29

REMOTE MANAGEMENT OF HOSTED SERVICES

#43
20240289259
2024-08-29

Incrementally Validating Security Policy Code Using Information From An Infrastructure As Code Repository

#44
20240286043
2024-08-29

VERIFYING TRUSTED EXECUTION ENVIRONMENTS FOR ONLINE APPLICATIONS USING IN-APPLICATION CONTENT

#45
20240283827
2024-08-22

SYSTEM AND METHOD FOR SELF-ADJUSTING CYBERSECURITY ANALYSIS AND SCORE GENERATION

#46
20240283826
2024-08-22

Zero trust policy engine for controlling access to network applications

#47
20240283825
2024-08-22

QUALITY OF TRUST FRAMEWORK FOR WIRELESS COMMUNICATION NETWORKS

#48
20240283818
2024-08-22

USING CROSS WORKLOADS SIGNALS TO REMEDIATE PASSWORD SPRAYING ATTACKS

#49
20240283811
2024-08-22

SYSTEMS AND METHODS FOR INTELLIGENCE VERIFICATION

#50
20240283797
2024-08-22

ACTION BASED ON PRE-IMPLEMENTATION DETERMINATION WHETHER A PROPOSED ROLE ASSIGNMENT ASSOCIATED WITH A ROLE HIERARCHY CONFORMS TO SECURITY PROPERTIES

#51
20240283790
2024-08-22

Context-Based Risk Assessment for an Identity Verification System

#52
20240283784
2024-08-22

DIGITAL DATA PASSPORT AND VISA CREDENTIALING FOR DATA AUTHORIZATION

#53
20240281349
2024-08-22

AUTO-CORRECTING DEFICIENCIES OF A SYSTEM

#54
20240275821
2024-08-15

AUTOMATED EDGE DRIVEN COLLABORATIVE DATA PROTECTION POLICY MANAGEMENT IN LARGE SCALE EDGE ENVIRONMENTS

#55
20240275820
2024-08-15

SCENARIO-BASED ACCESS ENTITLEMENT ENGINE AND CONTROLLER

#56
20240275819
2024-08-15

SECURE SYSTEM FOR HIDING REGISTRATION RULES FOR DYNAMIC CLIENT REGISTRATION

#57
20240275818
2024-08-15

SECURITY AUDIT OF DATA-AT-REST

#58
20240275817
2024-08-15

USING CATEGORIZATION TAGS FOR RULE GENERATION AND UPDATE IN A RULES-BASED SECURITY SYSTEM

#59
20240275811
2024-08-15

CYBER SECURITY SYSTEM AND METHOD USING INTELLIGENT AGENTS

#60
20240275807
2024-08-15

MULTI-OBJECTIVE COMPUTER INFRASTRUCTURE VULNERABILITY PRIORITIZATION

#61
20240275803
2024-08-15

Policy based traffic inspection in zero trust private networks

#62
20240275801
2024-08-15

ENHANCED CLOUD INFRASTRUCTURE SECURITY THROUGH RUNTIME VISIBILITY INTO DEPLOYED SOFTWARE

#63
20240275800
2024-08-15

INTELLIGENT QUARANTINE ON SWITCH FABRIC FOR PHYSICAL AND VIRTUALIZED INFRASTRUCTURE

#64
20240275799
2024-08-15

METHOD AND SYSTEM FOR DETERMINING AND ACTING ON A STRUCTURED DOCUMENT CYBER THREAT RISK

#65
20240275792
2024-08-15

AUTOMATED USER PROFILE PROVISIONING IN MULTI-TENANT CLOUD NETWORKS

#66
20240275777
2024-08-15

FILTERING PASSWORDS BASED ON A PLURALITY OF CRITERIA

#67
20240267415
2024-08-08

STATIC ANALYSIS TECHNIQUES FOR DETERMINING REACHABILITY PROPERTIES OF NETWORK AND COMPUTING OBJECTS

#68
20240267414
2024-08-08

NETWORK-BOUNDARY CONVERGED MULTI-LEVEL SECURE COMPUTING SYSTEM

#69
20240267413
2024-08-08

PERSONAL DEVICE NETWORK FOR USER IDENTIFICATION AND AUTHENTICATION

#70
20240267412
2024-08-08

ACCESS LAYER SYSTEMS OF PEER DATA PROCESSING NODES PROVIDING A SECURITY FRAMEWORK AND TRUST CONTROLS

#71
20240267404
2024-08-08

DYNAMIC METHOD INVOCATION FOR ZERO-DAY EXPLOITS

#72
20240267402
2024-08-08

DETECTING KERBEROS TICKET ATTACKS WITHIN A DOMAIN

#73
20240267401
2024-08-08

SCALEABLE RISK MANAGEMENT ASSESSMENT SYSTEM AND METHOD

#74
20240267397
2024-08-08

INTERCEPTING WORTHLESS REQUESTS AT THE NETWORK EDGE USING MACHINE LEARNING

#75
20240267393
2024-08-08

ADAPTIVE SECURITY ARCHITECTURE BASED ON STATE OF POSTURE

#76
20240267392
2024-08-08

ADAPTIVE SECURITY ARCHITECTURE USING EMBEDDED PROTECTION IN VENDOR APPLICATIONS

#77
20240267377
2024-08-08

MAC ADDRESS AND CONTROLLED PORT BASED NETWORK ACCESS MANAGEMENT

#78
20240267366
2024-08-08

IDENTITY EXPERIENCE FRAMEWORK

#79
20240267248
2024-08-08

Device Searching Method, Apparatus and System

#80
20240265150
2024-08-08

USING SECURE MULTI-PARTY COMPUTATION TO IMPROVE CONTENT SELECTION PROCESS INTEGRITY

#81
20240265127
2024-08-08

SYSTEM AND METHOD FOR IMPLEMENTING DATA SOVEREIGNTY SAFEGUARDS IN A DISTRIBUTED SERVICES NETWORK ARCHITECTURE

#82
20240265120
2024-08-08

SYSTEM AND METHODS FOR USING CIPHER OBJECTS TO PROTECT DATA

#83
20240265099
2024-08-08

APPARATUS AND METHOD FOR CONDUCTING ENDPOINT-NETWORK-MONITORING

#84
20240265002
2024-08-08

ENHANCED BLOCKCHAIN DATA COMPUTING PLATFORM FOR STRATEGIC MASTER DATA MANAGEMENT

#85
20240259434
2024-08-01

SMALL-FOOTPRINT ENDPOINT DATA LOSS PREVENTION

#86
20240259433
2024-08-01

MANAGING EDGE NETWORK PROTECTION SERVICE

#87
20240259432
2024-08-01

IMAGE FORMING DEVICE RESTRICTING TRANSMISSION OF EMAIL HAVING SCAN DATA TO EMAIL ADDRESS WHEN MEMORY STORES NO DOMAIN MATCHING DOMAIN OF THE MAIL ADDRESS

#88
20240259431
2024-08-01

SYSTEM AND METHOD FOR PROVIDING NETWORK AND COMPUTER FIREWALL PROTECTION WITH DYNAMIC ADDRESS ISOLATION TO A DEVICE

#89
20240259430
2024-08-01

TECHNIQUES FOR PROCESSING QUERIES RELATED TO NETWORK SECURITY

#90
20240259429
2024-08-01

SYSTEMS AND METHODS FOR AUTOMATICALLY RENDERING AND DEPLOYING NETWORK SECURITY POLICIES

#91
20240259428
2024-08-01

CONTEXT-BASED SECURITY IN MOBILE NETWORKS USING AN API AND A DATA STORE

#92
20240259419
2024-08-01

THREAT MITIGATION SYSTEM AND METHOD

#93
20240259396
2024-08-01

MONITORING AND REMEDIATION OF SECURITY DRIFT EVENTS IN A PUBLIC CLOUD NETWORK

#94
20240259395
2024-08-01

AUTOMATED SECURITY POLICY GENERATION FOR CONTROLLERS

#95
20240259391
2024-08-01

ENFORCING GOVERNANCE AND DATA SOVEREIGNTY POLICIES ON A COMPUTING DEVICE USING A DISTRIBUTED LEDGER

#96
20240259382
2024-08-01

SYSTEMS AND METHODS FOR MANAGING THE GENERATION OR DELETION OF RECORD OBJECTS BASED ON ELECTRONIC ACTIVITIES AND COMMUNICATION POLICIES

#97
20240259374
2024-08-01

SYSTEM FOR DYNAMIC NETWORK SECURITY CONTROL

#98
20240259360
2024-08-01

SESSION RECOVERY MECHANISM

#99
20240259345
2024-08-01

Methods and Systems for Prevention of Attacks Associated with the Domain Name System

#100
20240259219
2024-08-01

METHODS AND APPARATUS FOR SECURE CONFIGURATION OF A COMPUTE DEVICE

#101
20240257183
2024-08-01

EFFICIENT AND SECURE COMMUNICATION USING WIRELESS SERVICE IDENTIFIERS

#102
20240256336
2024-08-01

SYSTEMS AND METHODS CONFIGURED TO ENABLE AN OPERATING SYSTEM FOR CONNECTED COMPUTING THAT SUPPORTS USER USE OF SUITABLE TO USER PURPOSE RESOURCES SOURCED FROM ONE OR MORE RESOURCE ECOSPHERES

#103
20240251243
2024-07-25

METHOD, APPARATUS AND SYSTEM FOR NETWORK CONNECTION, AND SERVER AND MEDIUM

#104
20240250997
2024-07-25

ENFORCING SECURITY POLICIES AND ATTESTATION ON EDGE INFRASTRUCTURE

#105
20240250996
2024-07-25

SYSTEM AND METHOD FOR ALGORITHM CROWDSOURCING, MONETIZATION, AND EXCHANGE

#106
20240250995
2024-07-25

CYBERSECURITY RECONNAISSANCE, ANALYSIS, AND SCORING USING DISTRIBUTED SYSTEMS

#107
20240250994
2024-07-25

REPORTING OF DELTA CHANNEL QUALITY INDICATOR (CQI)-MODULATION AND CODING SCHEME (MCS) INFORMATION

#108
20240250993
2024-07-25

Software Defined Remote Access for Zero-Trust Support

#109
20240250992
2024-07-25

ANALYZING CLOUD COMPUTING SERVICES (CCS) ACCOUNTS USING CCS APPLICATION PROGRAMMING INTERFACES TO ENFORCE SECURITY POLICIES

#110
20240250991
2024-07-25

SYSTEMS, METHODS, AND DEVICES FOR SECURITY ENHANCEMENTS IN CLOUD COMPUTING ENVIRONMENTS

#111
20240250990
2024-07-25

Control of Cloud Infrastructure Configuration

#112
20240250989
2024-07-25

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR IMPROVING INTER-PUBLIC LAND MOBILE NETWORK (PLMN) ROUTING ACROSS SECURITY EDGE PROTECTION PROXIES (SEPPs) BY IMPLEMENTING HEALTH CHECKS FOR REMOTE SEPPs

#113
20240250980
2024-07-25

System and Method for Assigning Threat Valuations to Network Events and Security Events

#114
20240250966
2024-07-25

INTELLIGENT QUARANTINE ON SWITCH FABRIC FOR PHYSICAL AND VIRTUALIZED INFRASTRUCTURE

#115
20240250957
2024-07-25

Method And System For Improving Enriching Experiences

#116
20240250953
2024-07-25

SYSTEMS AND METHODS FOR MANAGING WORKSPACE CAPABILITIES

#117
20240250951
2024-07-25

DYNAMIC INHERITANCE OF SECURITY POLICIES ACROSS DIFFERENT VIRTUAL SECURITY ZONES

#118
20240250944
2024-07-25

TRANSACTION SECURITY SYSTEMS AND METHODS

#119
20240250943
2024-07-25

USE OF MULTIFACTOR AUTHENTICATION IN ASSESSING SUSPICIOUS ACTIVITY

#120
20240250934
2024-07-25

Method and System of Securing VPN Communications

#121
20240250932
2024-07-25

AUTOMATED CREATION OF TRUSTED NETWORK PERIMETER

#122
20240249231
2024-07-25

Optimizing Cyber Security Projects

#123
20240248981
2024-07-25

Security Techniques for Device Assisted Services

#124
20240248979
2024-07-25

PERSISTENT SOURCE VALUES FOR ASSUMED ALTERNATIVE IDENTITIES

#125
20240248747
2024-07-25

FRAMEWORKS AND INTERFACES FOR OFFLOAD DEVICE-BASED PACKET PROCESSING

#126
20240248233
2024-07-25

TRANSPORTATION SECURITY APPARATUS, SYSTEM, AND METHOD TO ANALYZE IMAGES TO DETECT A THREAT CONDITION

#127
20240244090
2024-07-18

CYBERSECURITY ANALYSIS AND PROTECTION USING DISTRIBUTED SYSTEMS

#128
20240244089
2024-07-18

HONEYPOT ENTITY AND METHOD OF OPERATING THE SAME

#129
20240244088
2024-07-18

CLOUD-TO-EDGE WORKLOAD ORCHESTRATION

#130
20240244087
2024-07-18

DATA INVOCATION METHOD AND APPARATUS

#131
20240244086
2024-07-18

SYSTEMS AND METHODS FOR SECURE, SCALABLE ZERO TRUST SECURITY PROCESSING

#132
20240244085
2024-07-18

SYSTEMS AND METHODS FOR SECURITY POLICY ORGANIZATION USING A DUAL BITMAP

#133
20240244084
2024-07-18

INFERENTIAL ANALYSIS USING FEEDBACK FOR EXTRACTING AND COMBINING CYBER RISK INFORMATION

#134
20240244083
2024-07-18

CENTRALIZED COMPLIANCE MANAGEMENT PLATFORM FOR SECURITY OBJECTS

#135
20240244082
2024-07-18

SECURITY POSTURE VISUALIZATION

#136
20240244079
2024-07-18

TECHNIQUES FOR GENERATING SIGNATURES CHARACTERIZING ADVANCED APPLICATION LAYER FLOOD ATTACK TOOLS

#137
20240244075
2024-07-18

GENERATING PASSWORD COMPLEXITY RULES BASED ON ATTACK PATTERN ANALYSIS USING HASH SEGMENTATION

#138
20240244074
2024-07-18

RISK LEVEL FOR MODIFYING SECURITY SAFEGUARDS

#139
20240244061
2024-07-18

USER CONTACT CONTROL IN A NETWORK APPLICATION

#140
20240244058
2024-07-18

SYSTEMS AND METHODS FOR TEMPORARY ACCESS WITH ADAPTIVE TRUST LEVELS FOR AUTHENTICATION AND AUTHORIZATION

#141
20240244045
2024-07-18

MANAGING CREDENTIALS USABLE IN THE ORCHESTRATION OF WORKSPACES BY MULTIPLE REMOTE ORCHESTRATORS

#142
20240244012
2024-07-18

STRETCHED EPG AND MICRO-SEGMENTATION IN MULTISITE FABRICS

#143
20240243915
2024-07-18

CONFIGURABLE NETWORK SECURITY FOR NETWORKED ENERGY RESOURCES, AND ASSOCIATED SYSTEMS AND METHODS

#144
20240241972
2024-07-18

SYSTEM AND METHODS FOR USING CIPHER OBJECTS TO PROTECT DATA

#145
20240241947
2024-07-18

DEVICES, SYSTEMS, AND METHODS FOR STANDARDIZING AND STREAMLINING THE DEPLOYMENT OF SECURITY INFORMATION AND EVENT MANAGEMENT ARTIFACTS FOR MULTIPLE TENANTS

#146
20240236171
2024-07-11

FAST FILE SERVER METHODS AND SYSTEMS

#147
20240236149
2024-07-11

CERTIFICATE BASED SECURITY FOR DECLARATIVE OPERATIONS

#148
20240236147
2024-07-11

IDENTIFYING PERSONALIZED OR ALTERED WEBPAGE CONTENT USING A BROWSER EXTENSION TOOL

#149
20240236143
2024-07-11

Systems and Methods for Network Security

#150
20240236136
2024-07-11

SYSTEMS AND METHODS FOR VULNERABILITY PROOFED CLUSTER MANAGEMENT

#151
20240236130
2024-07-11

DETECTING ANOMALOUS DOWNLOADS

#152
20240236122
2024-07-11

ADVANCED INTRUSION PREVENTION MANAGER

#153
20240236121
2024-07-11

SYSTEMS AND METHODS FOR DRAG AND DROP MAPPING

#154
20240236120
2024-07-11

MANAGING AND DEPLOYING CUSTOM INTRUSION DETECTION SYSTEM SIGNATURE POLICIES

#155
20240236115
2024-07-11

VEHICLE COMMUNICATION APPARATUS, IN-VEHICLE NETWORK SYSTEM, AND VEHICLE COMMUNICATION METHOD

#156
20240236095
2024-07-11

SYSTEM AND METHOD FOR RESTRICTING COMMUNICATIONS BETWEEN VIRTUAL PRIVATE CLOUD NETWORKS THROUGH SECURITY DOMAINS

#157
20240236093
2024-07-11

APPARATUSES, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR OFFLINE AUTHENTICATION

#158
20240236091
2024-07-11

SYSTEMS AND METHODS FOR RECOGNIZING NEW DEVICES

#159
20240236072
2024-07-11

AUTHENTICATION TRANSLATION

#160
20240236043
2024-07-11

Signature reporting system and method

#161
20240235855
2024-07-11

CERTIFICATE BASED SECURITY FOR DECLARATIVE OPERATIONS

#162
20240235854
2024-07-11

CERTIFICATE BASED SECURITY FOR DECLARATIVE OPERATIONS

#163
20240232407
2024-07-11

DATA ACCESS UNDER REGULATORY CONSTRAINTS

#164
20240223617
2024-07-04

Wireless Network Service Interfaces

#165
20240223616
2024-07-04

SYSTEMS AND METHODS OF INFORMATION SECURITY MONITORING WITH THIRD-PARTY INDICATORS OF COMPROMISE

#166
20240223615
2024-07-04

SYSTEM AND METHOD FOR DATA SET CREATION WITH CROWD-BASED REINFORCEMENT

#167
20240223614
2024-07-04

SYSTEM AND METHOD FOR APPLYING A POLICY ON A NETWORK PATH

#168
20240223613
2024-07-04

NETWORK SECURITY MANAGEMENT METHOD, AND APPARATUS

#169
20240223612
2024-07-04

METHOD AND SYSTEM FOR VIRTUAL MACHINE AWARE POLICY MANAGEMENT

#170
20240223611
2024-07-04

MANAGING COMPUTING SYSTEM CONFIGURATIONS FOR SECURITY QUALITY OF SERVICE (QOS)

#171
20240223610
2024-07-04

SYSTEMS AND METHODS FOR POLICY UNDO IN OPERATIONAL TECHNOLOGY DEVICES

#172
20240223609
2024-07-04

SYSTEMS AND METHODS FOR PROVISIONAL POLICIES IN OPERATIONAL TECHNOLOGY DEVICES

#173
20240223608
2024-07-04

HIERARCHICAL POLICY-BASED DECISION FRAMEWORK FOR CLOUD-NATIVE TELECOMMUNICATION SYSTEMS

#174
20240223590
2024-07-04

SYSTEMS AND METHODS FOR CYBER RISK ASSESSMENT FOR COMPUTING SYSTEMS

#175
20240223583
2024-07-04

Methods and Apparatus for Network Control

#176
20240223582
2024-07-04

SYSTEMS AND METHODS FOR INTELLIGENTLY GENERATING CYBERSECURITY CONTEXTUAL INTELLIGENCE AND GENERATING A CYBERSECURITY INTELLIGENCE INTERFACE

#177
20240223579
2024-07-04

Detecting and Remediating Anomalies of a Container System by a Distributed Storage System

#178
20240223578
2024-07-04

AUTOMATED INCIDENT RESPONSE TRACKING AND ENHANCED FRAMEWORK FOR CYBER THREAT ANALYSIS

#179
20240223569
2024-07-04

Techniques For Automatically Configuring Minimal Cloud Service Access Rights For Container Applications

#180
20240223537
2024-07-04

ENCRYPTED CACHE PROTECTION

#181
20240223536
2024-07-04

SYSTEM AND METHOD FOR TRACKING DATA TRANSFERRED IN A DISTRIBUTED NETWORK VIA SECURED, LAYERED DATA TAGGING

#182
20240221534
2024-07-04

METHOD AND SYSTEM FOR TRAINING NON-TECHNICAL USERS ON HIGHLY COMPLEX CYBER SECURITY TOPICS

#183
20240221028
2024-07-04

PRESERVATION OF SCORES OF THE QUALITY OF TRAFFIC TO NETWORK SITES ACROSS CLIENTS AND OVER TIME

#184
20240220631
2024-07-04

SYSTEMS AND METHODS FOR CYBERSECURITY RISK ASSESSMENT

#185
20240220623
2024-07-04

TRUSTED EXECUTION BROKER

#186
20240214431
2024-06-27

Network Traffic Capture

#187
20240214429
2024-06-27

COMPLEX IT PROCESS ANNOTATION, TRACING, ANALYSIS, AND SIMULATION

#188
20240214428
2024-06-27

PLATFORM FOR MANAGEMENT AND TRACKING OF COLLABORATIVE PROJECTS

#189
20240214427
2024-06-27

CREATING SIMULATION MODELS FOR COMPLEX ADAPTIVE SYSTEMS USING A MULTI-MODEL, GENERATIVE APPROACH

#190
20240214426
2024-06-27

SERVICE RISK DISCOVERY BASED ON RISK OBJECTS

#191
20240214425
2024-06-27

USING AN END-TO-END POLICY CONTROLLER TO AUTOMATICALLY DISCOVER AND INVENTORY ENFORCEMENT POINTS IN A NETWORK

#192
20240214424
2024-06-27

USING AN END-TO-END POLICY CONTROLLER TO SPLIT POLICIES BETWEEN ENFORCEMENT POINTS IN A NETWORK

#193
20240214423
2024-06-27

SYSTEM AND METHOD FOR SECURING CLOUD BASED SERVICES

#194
20240214420
2024-06-27

APPLICATION FIREWALL

#195
20240214419
2024-06-27

DETECTING A SPOOFED ENTITY BASED ON COMPLEXITY OF A DISTRIBUTION OF EVENTS INITIATED BY THE SPOOFED ENTITY

#196
20240214415
2024-06-27

NETWORK BASED HYPERLOCAL AUTHENTICATION

#197
20240214412
2024-06-27

HIERARCHICAL NOVELTY DETECTION USING INTENDED STATES FOR NETWORK SECURITY

#198
20240214407
2024-06-27

SYSTEM AND METHOD FOR IMPROVED RENDERING OF USER INTERFACE FOR CYBERSECURITY MONITORING SYSTEM

#199
20240214403
2024-06-27

SYSTEM AND METHODS FOR PROACTIVE PROTECTION AGAINST MALFEASANT DATA COLLECTION

#200
20240214402
2024-06-27

INTELLIGENT QUARANTINE ON SWITCH FABRIC FOR PHYSICAL AND VIRTUALIZED INFRASTRUCTURE

#201
20240214388
2024-06-27

PEER-TO-PEER OFFLINE ACCESS MODE

#202
20240214374
2024-06-27

MULTI-FACTOR AUTHENTICATION USING SYMBOLS

#203
20240214350
2024-06-27

NETWORK TRAFFIC INSPECTION

#204
20240214349
2024-06-27

LOCALIZATION AT SCALE FOR A CLOUD-BASED SECURITY SERVICE

#205
20240214336
2024-06-27

COMPUTERIZED SYSTEM FOR DYNAMIC IMAGE INCLUSION IN AN ELECTRONIC MESSAGE

#206
20240214285
2024-06-27

APPLICATION MONITORING PRIORITIZATION

#207
20240214221
2024-06-27

PEER-TO-PEER UPDATING OF OFFLINE DEVICES

#208
20240205287
2024-06-20

SYSTEMS AND METHODS TO PROTECT AGAINST INFORMATION DISCLOSURE

#209
20240205267
2024-06-20

MODELING MULTI-PERIL CATASTROPHE USING A DISTRIBUTED SIMULATION ENGINE

#210
20240205266
2024-06-20

EPISTEMIC UNCERTAINTY REDUCTION USING SIMULATIONS, MODELS AND DATA EXCHANGE

#211
20240205265
2024-06-20

MULTI-LAYER BROWSER-BASED CONTEXT EMULATION DETECTION

#212
20240205255
2024-06-20

THREAT AWARE SERVICE MESH

#213
20240205244
2024-06-20

Endpoint-assisted inspection of encrypted network traffic

#214
20240205243
2024-06-20

INTELLIGENT QUARANTINE ON SWITCH FABRIC FOR PHYSICAL AND VIRTUALIZED INFRASTRUCTURE

#215
20240205237
2024-06-20

System and method of anomalous configuration-related activity

#216
20240205231
2024-06-20

Generating zero-trust policy for application access utilizing knowledge graph based application segmentation

#217
20240205210
2024-06-20

DATA EXCHANGE ON A DISTRIBUTED COMPUTING SYSTEM

#218
20240205192
2024-06-20

SYSTEM AND METHOD FOR SEGMENTING TRANSIT CAPABILITIES WITHIN A MULTI-CLOUD ARCHITECTURE

#219
20240205191
2024-06-20

SECURITY POLICY ENFORCEMENT FOR ADDITIONAL INSTANCES OF AN APPLICATION

#220
20240205189
2024-06-20

SYSTEMS AND METHODS FOR INTERNAL SECURE NETWORK RESOLUTION

#221
20240205118
2024-06-20

SYSTEM AND METHOD OF ASSIGNING REPUTATION SCORES TO HOSTS

#222
20240205028
2024-06-20

SECURE ATTESTATION OF ENDPOINT CAPABILITY

#223
20240202354
2024-06-20

Dynamic Data Storage Based on Estimated Update Frequency

#224
20240195844
2024-06-13

INTENT-BASED ENTERPRISE SECURITY USING DYNAMIC LEARNING OF NETWORK SEGMENT PREFIXES

#225
20240195843
2024-06-13

SYSTEM FOR AUTOMATED CAPTURE AND ANALYSIS OF BUSINESS INFORMATION FOR RELIABLE BUSINESS VENTURE OUTCOME PREDICTION

#226
20240195842
2024-06-13

MASSIVELY SCALABLE COMPUTER PLATFORM USING A DISTRIBUTED COMPUTATIONAL GRAPH

#227
20240195841
2024-06-13

SYSTEM AND METHOD FOR MANIPULATION OF SECURE DATA

#228
20240195840
2024-06-13

SYNTHETIC REQUEST INJECTION FOR REAL-TIME CLOUD SECURITY POSTURE MANAGEMENT

#229
20240195839
2024-06-13

DATA TRANSMISSION METHOD AND RELATED DEVICE

#230
20240195838
2024-06-13

SECURITY POLICY COMPLIANCE VERIFICATION AND CERTIFICATION AS A SERVICE LEVERAGING SYSTEMS PROVIDING ACCESS MANAGEMENT AS A SERVICE

#231
20240195832
2024-06-13

SYSTEMS AND METHODS THAT PERFORM FILTERING, LINKING, AND RENDERING

#232
20240195831
2024-06-13

METHOD, PRODUCT, AND SYSTEM FOR TRANSLATING ENTITY PRIORITIZATION RULES TO A CONTINUOUS NUMERICAL SPACE

#233
20240195816
2024-06-13

A LIGHTWEIGHT ATTACKER IDENTIFICATION METHOD FOR FEDERATED LEARNING WITH SECURE BYZANTINE-ROBUST AGGREGATION VIA CLUSTERING

#234
20240195810
2024-06-13

Identity Adapter and Method

#235
20240195797
2024-06-13

Systems and Methods to Ensure Proximity of a Multi-Factor Authentication Device

#236
20240195796
2024-06-13

REMOTE CERTIFICATE AUTHORITY MANAGEMENT

#237
20240195705
2024-06-13

AUTOMATICALLY DETECTING AUTHORIZED REMOTE ADMINISTRATION SESSIONS IN A NETWORK MONITORING SYSTEM

#238
20240187457
2024-06-06

RULES ENGINE FOR SELECTIVELY GRANTING ACCESS TO SECURED RESOURCES

#239
20240187455
2024-06-06

METHOD FOR CONFIGURING ACTIONS RESPONSIVE TO CONDITIONS OF ASSETS CONNECTED TO A COMPUTER NETWORK

#240
20240187453
2024-06-06

NETWORK SECURITY FOR MULTIPLE FUNCTIONAL DOMAINS

#241
20240187447
2024-06-06

SYSTEMS AND METHODS FOR PROTECTION OF AUTHORITATIVE NAME SERVERS

#242
20240187445
2024-06-06

METHOD, APPARATUS, AND SYSTEM TO MAP NETWORK REACHABILITY

#243
20240187442
2024-06-06

DISASTER SCENARIO BASED INFERENTIAL ANALYSIS USING FEEDBACK FOR EXTRACTING AND COMBINING CYBER RISK INFORMATION

#244
20240187438
2024-06-06

POLICY-BASED IP ADDRESS ALLOCATION

#245
20240187435
2024-06-06

MATCHING DEVICE, MATCHING METHOD, AND MATCHING PROGRAM

#246
20240187424
2024-06-06

INTELLIGENT QUARANTINE ON SWITCH FABRIC FOR PHYSICAL AND VIRTUALIZED INFRASTRUCTURE

#247
20240187419
2024-06-06

INTERNET ACCESS MANAGEMENT SERVICE SERVER THAT CAN MANAGE INTERNET ACCESS FOR ELECTRONIC TERMINALS THROUGH SETTING OF SCHEDULING RULES FOR INTERNET USE RESTRICTION AND THE OPERATING METHOD THEREOF

#248
20240187417
2024-06-06

VALIDATING COMPLIANCE OF ROLES WITH ACCESS PERMISSIONS

#249
20240187401
2024-06-06

SECURING IN-VEHICLE SERVICE ORIENTED ARCHITECTURE WITH MAC GENERATE ALLOW LIST

#250
20240187386
2024-06-06

SYSTEM AND METHOD FOR CREATING A SECURE HYBRID OVERLAY NETWORK

#251
20240187377
2024-06-06

CONDITIONAL EGRESS IP FOR DELIVERY OF LOCALIZED CONTENT

#252
20240187376
2024-06-06

Cloud data lake platform and SaaS orchestration

#253
20240187305
2024-06-06

CONFIGURING A REMOTE ELECTRONIC DEVICE BY A PEER ELECTRONIC DEVICE IN A NETWORKED ENVIRONMENT

#254
20240184883
2024-06-06

Privacy Border for a Portion of Resources on a Computing Machine

#255
20240179228
2024-05-30

SYSTEM AND METHODS FOR AUTOMATED COMPUTER SECURITY POLICY GENERATION AND ANOMALY DETECTION

#256
20240179187
2024-05-30

SYSTEM FOR PROVIDING END-TO-END SECURITY SERVICE USING PORTABLE SECURITY UNIT BASED ON INTELLIGENT HOME NETWORK

#257
20240179186
2024-05-30

PREDICTIVE LOAD BALANCING FOR A DIGITAL ENVIRONMENT

#258
20240179185
2024-05-30

INTELLIGENT AUTOMATED PLANNING SYSTEM FOR LARGE-SCALE OPERATIONS

#259
20240179184
2024-05-30

ENHANCED AUTHORIZATION LAYERS FOR NATIVE ACCESS TO SECURE NETWORK RESOURCES

#260
20240179183
2024-05-30

EFFICIENT UPDATING OF DEVICE-LEVEL SECURITY CONFIGURATION BASED ON CHANGES TO SECURITY INTENT POLICY MODEL

#261
20240179182
2024-05-30

AUTHORIZATION POLICY VALIDATION

#262
20240179181
2024-05-30

AUTHORIZATION POLICY EVALUATION

#263
20240179154
2024-05-30

SECURITY EVENT TRANSFORMATION AND LOGGING SYSTEMS AND METHODS

#264
20240179148
2024-05-30

AGENTLESS IN-MEMORY CACHING FOR NATIVE NETWORK RESOURCE CONNECTIONS

#265
20240179146
2024-05-30

ROLE-BASED PERMISSION DELEGATION IN A PROVIDER NETWORK

#266
20240179141
2024-05-30

AGENTLESS SINGLE SIGN-ON FOR NATIVE ACCESS TO SECURE NETWORK RESOURCES

#267
20240179133
2024-05-30

SYSTEMS AND METHODS FOR VIRTUAL PRIVATE NETWORK AUTHENTICATION

#268
20240179127
2024-05-30

MANAGEMENT SYSTEM, MANAGEMENT METHOD, AND SERVER DEVICE

#269
20240177115
2024-05-30

Software Defined Community Cloud

#270
20240171615
2024-05-23

DYNAMIC, RUNTIME APPLICATION PROGRAMMING INTERFACE PARAMETER LABELING, FLOW PARAMETER TRACKING AND SECURITY POLICY ENFORCEMENT USING API CALL GRAPH

#271
20240171614
2024-05-23

SYSTEM AND METHOD FOR INTERNET ACTIVITY AND HEALTH FORECASTING AND INTERNET NOISE ANALYSIS

#272
20240171613
2024-05-23

SECURITY POLICY SELECTION BASED ON CALCULATED UNCERTAINTY AND PREDICTED RESOURCE CONSUMPTION

#273
20240171612
2024-05-23

SYSTEM FOR DYNAMIC COMMUNICATION CHANNEL SWITCHING BASED ON PRECONFIGURED NETWORK SECURITY PROTOCOLS

#274
20240171608
2024-05-23

Method, Apparatus and computer readable storage medium for processing data of a security protocol

#275
20240171602
2024-05-23

VOTING AS LAST RESORT ACCESS TO PREVENT ERRONEOUS OR MALICIOUS CHANGES

#276
20240171592
2024-05-23

Method and System for Forensic Data Tracking

#277
20240171587
2024-05-23

REGION-BASED AUTHENTICATION AND ACCESS POLICIES FOR SERVICES

#278
20240171585
2024-05-23

MONITORING APPARATUS AND CONTROL METHOD THEREOF

#279
20240171576
2024-05-23

IDENTITY PROXY AND ACCESS GATEWAY

#280
20240171553
2024-05-23

SYSTEMS AND METHODS FOR CREATING FINGERPRINTS OF ENCRYPTION DEVICES

#281
20240171547
2024-05-23

APPARATUS FOR CONTROLLING AND BLOCKING USER ACCESS USING WEB APPLICATION PROXY

#282
20240171546
2024-05-23

ENHANCED INTERNET PROTOCOL SECURITY MANAGEMENT FOR VIRTUAL PRIVATE NETWORK CONCENTRATORS

#283
20240171545
2024-05-23

METHOD AND SYSTEM FOR SECURE OPERATIONS, ADMINISTRATION, AND MANAGEMENT FOR REMOTE NETWORKS

#284
20240171406
2024-05-23

SHARING SECURITY SETTINGS BETWEEN ENTITIES USING VERIFIABLE CREDENTIALS

#285
20240169348
2024-05-23

MANAGING PRE-PROVISIONING AND POST-PROVISIONING OF RESOURCES USING BITEMPORAL ANALYSIS

#286
20240163317
2024-05-16

BROWSER EXTENSION ACCESS BASED ON RE-AUTHORIZATION

#287
20240163316
2024-05-16

DATA PLATFORM WITH UNIFIED PRIVILEGES

#288
20240163315
2024-05-16

MOBILE USER IDENTITY AND/OR SIM-BASED IOT IDENTITY AND APPLICATION IDENTITY BASED SECURITY ENFORCEMENT IN SERVICE PROVIDER NETWORKS

#289
20240163314
2024-05-16

ENTERPRISE SECURITY IN METERS

#290
20240163313
2024-05-16

Software-Defined Wide Area Network Self-Service for Service Assurance

#291
20240163310
2024-05-16

MANAGING TRAFFIC CONTROL IN A NETWORK MITIGATING DDOS

#292
20240163301
2024-05-16

Isolating Internet-of-Things (IoT) Devices Using a Secure Overlay Network

#293
20240163295
2024-05-16

Facilitating direct device-to-cloud communications within a secure deployment management system

#294
20240163279
2024-05-16

SYSTEMS AND METHODS FOR SECURING LOGIN ACCESS

#295
20240163274
2024-05-16

CREDENTIAL DEPENDENCY ENCODING AND VERIFICATION BASED ON OTHER CREDENTIAL RESOURCES

#296
20240163253
2024-05-16

NETWORK SECURITY ANALYSIS SYSTEM WITH REINFORCEMENT LEARNING FOR SELECTING DOMAINS TO SCAN

#297
20240163188
2024-05-16

ROUND TRIP TIME (RTT) MEASUREMENT BASED UPON SEQUENCE NUMBER

#298
20240163131
2024-05-16

SYSTEM AND METHOD FOR PROVIDING NETWORK SUPPORT SERVICES AND PREMISES GATEWAY SUPPORT INFRASTRUCTURE

#299
20240160768
2024-05-16

ENTERPRISE DOCUMENT CLASSIFICATION

#300
20240160762
2024-05-16

DATA PROTECTION SYSTEM