arrangements for secret or secure communications Cryptographic mechanisms or cryptographic ; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
Sub-classes:FINGERPRINT-BASED NETWORK MAPPING OF CYBER-PHYSICAL ASSETS
#2SYSTEM, METHOD AND NON-TRANSITORY COMPUTER READABLE MEDIUM FOR AN INTERNET-ENABLED NETWORK RADIO NODE
#3ARTIFICIAL INTELLIGENCE MODEL ACCURACY VALIDATION
#4SYSTEMS AND METHODS FOR PEER-TO-PEER SINGLE USE ACCESS TOKEN
#5METHOD AND APPARATUS FOR IMPROVED VIDEO INFORMATION SECURITY AGAINST UNAUTHORIZED ACCESS
#6MACHINE LEARNING TECHNIQUES FOR ASSOCIATING ASSETS RELATED TO EVENTS WITH ADDRESSABLE COMPUTER NETWORK ASSETS
#7ASIC Identity Auto-Provisioning
#8EFFICIENT TOKEN PROVISIONING SYSTEM AND METHOD
#9SYSTEMS AND METHODS FOR IDENTIFYING FIRMWARE VERSIONS USING SPDM ALIAS CERTIFICATES
#10METHOD FOR COLLECTION, VALIDATION AND REPORTING OF DATA FOR LARGE-SCALE, ACCURATE, AND SECURE OPEN-SOURCE SOFTWARE AUDITING
#11SECURITY-ENHANCED ORIGINATION OF BLOCKCHAIN TRANSACTIONS
#12USER DEVICE FOR ACQUIRING VERIFIABLE CLAIMS, SYSTEM INCLUDING SAID USER DEVICE, AND METHOD FOR ACQUIRING VERIFIABLE CLAIMS
#13MULTI-PARTY BLOCKCHAIN ADDRESS SCHEME
#14ELECTRONIC DEVICE AND METHOD FOR PREVENTING NON-FUNGIBLE TOKEN PLAGIARISM IN ELECTRONIC DEVICE
#15Blockchain-Based Integrity Protection for CDR
#16ELECTRONIC DEVICE FOR ENCRYPTING BIOMETRIC INFORMATION AND METHOD FOR OPERATING THE SAME
#17SECURE ENVIRONMENT FOR OPERATIONS ON PRIVATE DATA
#18INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD AND NON-TRANSITORY COMPUTER-READABLE MEDIUM
#19SYSTEM FOR ADVANCED USER AUTHENTICATED KEY MANAGEMENT FOR 6G-BASED INDUSTRIAL APPLICATIONS
#20NON-FUNGIBLE TOKEN (NFT) GENERATION FOR SECURE APPLICATIONS
#21NON-FUNGIBLE TOKEN (NFT) GENERATION FOR SECURE APPLICATIONS
#22SEPARATING HASHING FROM PROOF-OF-WORK IN BLOCKCHAIN ENVIRONMENTS
#23DIGITAL SECURITIZATION, OBFUSCATION, POLICY AND COMMERCE OF EVENT TICKETS
#24Blockchain Rideshare Data Aggregator Solution
#25METHOD AND APPARATUS FOR VERIFYING FIRMWARE
#26TRACKING, STORAGE AND AUTHENTICATION OF DOCUMENTED INTELLECTUAL PROPERTY
#27SYSTEM AND METHOD OF MULTI-ROUND TOKEN DISTRIBUTION USING A BLOCKCHAIN NETWORK
#28PROTOCOL FLOW FOR NOTARIZING A TRANSACTION
#29TRUSTED MEASUREMENT METHODS AND TRUSTED COMPUTING NODES
#30METHOD FOR VERIFYING DIGITAL SIGNATURES, VEHICLE COMPUTING UNIT AND VEHICLE
#31NESTED BLOCKCHAIN SYSTEM
#32DETECTING AND DEFENDING AGAINST ADVERSARIAL ATTACKS IN DECENTRALIZED MACHINE LEARNING SYSTEMS
#33TRANSFER OF OWNERSHIP OF A COMPUTING DEVICE VIA A SECURITY PROCESSOR
#34TOKEN-BASED DEVICE TRACKING
#35AUTHENTICATION METHOD AND SYSTEM
#36METHODS FOR GRINDING-RESISTANT CONSENSUS IN A PROOF-OF-SPACE-BASED BLOCKCHAIN
#37INFORMATION PROCESSING DEVICE AND CONTROL METHOD FOR INFORMATION PROCESSING DEVICE
#38DETECTION AND SURVIVAL METHOD AGAINST ADVERSARIAL ATTACKS ON AUTOMATED SYSTEMS
#39METHOD AND SYSTEM FOR VERIFYING INTEGRITY OF A DIGITAL ASSET USING A DISTRIBUTED HASH TABLE AND A PEER TO-PEER DISTRIBUTED LEDGER
#40RESOLVING BLOCKCHAIN DOMAINS
#41SELF-SIGNED CERTIFICATE
#42ZERO-KNOWLEDGE CONFIDENTIAL COMPUTING
#43INTELLIGENT SERVICE LAYER FOR SEPARATING APPLICATION FROM PHYSICAL NETWORKS AND EXTENDING SERVICE LAYER INTELLIGENCE OVER IP ACROSS THE INTERNET, CLOUD, AND EDGE NETWORKS
#44METHOD AND SYSTEM FOR OUT-OF-BAND USER IDENTIFICATION IN THE METAVERSE VIA BIOGRAPHICAL (BIO) ID
#45COMPUTING SYSTEMS AND METHODS FOR PROTECTING APPLICATION PROGRAMMING INTERFACES WITH TWO-FACTOR AUTHENTICATION
#46APPLIANCE AND METHOD FOR IMAGE PROCESSING
#47SYSTEM AND METHOD FOR DOCUMENT TRANSFORMATION AND ACCOUNTABILITY
#48Computer-Implemented Method for Providing Cryptographic Keys for Signing Data, Signature Module, Method for Signing Data, and Method for Authenticated Communication
#49IPU BASED OPERATORS
#50MULTI-SHARD TRANSACTIONS IN A BYZANTINE COMPUTING ENVIRONMENT
#51POST-QUANTUM CRYPTOGRAPHY SIGNATURE VERIFICATION
#52VERIFICATION OF THE RELIABILITY OF SOFTWARE AND DEVICES AGAINST ASSERTIONS AND GUARANTEES
#53DEVICES AND METHODS FOR CONSOLIDATING SERIALIZED TOKENS
#54AUTHENTICATING OWNERSHIP OF DIGITAL OBJECTS IN ONLINE MARKETPLACES
#55REGISTRY AND AUTOMATED MANAGEMENT METHOD FOR BLOCKCHAIN-ENFORCED SMART CONTRACTS
#56COMMUNICATION METHOD AND APPARATUS
#57Virtual Environment Type Validation For Policy Enforcement
#58SYSTEMS AND METHODS FOR FACILITATING INITIAL DEPLOYMENTS OF CRYPTOGRAPHIC ASSETS ACROSS COMPUTER NETWORKS IN A CRYPTOGRAPHICALLY SECURE MANNER
#59SECURE CONSOLIDATION SYSTEM, INFORMATION PROCESSING APPARATUS, SECURE CONSOLIDATION METHOD, AND PROGRAM
#60SIMILARITY DEGREE DERIVATION SYSTEM AND SIMILARITY DEGREE DERIVATION METHOD
#61METHOD AND SYSTEM FOR PERFORMING CELL OPERATIONS USING A VERIFIABLE DATA STRUCTURE
#62IMAGING APPARATUS, INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM
#63METHOD AND SYSTEM FOR PATIENT CARE USING A PATIENT CONTROLLED HEALTH RECORD
#64NET SETTLEMENT OF SUBROGATION CLAIMS USING A DISTRIBUTED LEDGER
#65CONSTRAINING INJECTION OF UNLOCKING TRANSACTION BYTECODE
#66Verifying Slice Migration in a Storage Network
#67Performing concealed transactions using a zero-knowledge data management network
#68Receiving information through a zero-knowledge data management network
#69SOURCING INFORMATION FOR A ZERO-KNOWLEDGE DATA MANAGEMENT NETWORK
#70UNIFORM RESOURCE IDENTIFIER
#71SYSTEMS AND METHODS FOR SECURELY TRANSFERRING ACCOUNT INFORMATION BETWEEN DEVICES
#72ZERO KNOWLEDGE PROOF OF SMART CONTRACT COMPUTATION USING PRIVATE INPUT
#73METHOD, METER, AND SYSTEM FOR DATA AUDIT TRAIL
#74Systems and methods for providing a decentralized processing network
#75DIGITAL-ASSET AUTHENTICATION WITH ANONYMITY
#76METHOD FOR ISSUING IDENTITY CERTIFICATE TO BLOCKCHAIN NODE AND RELATED APPARATUS
#77METHOD AND DEVICE FOR ZERO-TRUST FUSION COMPUTATION OF MULTI-PARTY DATA
#78SYSTEM AND METHOD FOR MULTI-PARTY GENERATION OF BLOCKCHAIN-BASED SMART CONTRACT
#79METHOD AND APPARATUS FOR GENERATING, PROVIDING AND DISTRIBUTING A TRUSTED ELECTRONIC RECORD OR CERTIFICATE BASED ON AN ELECTRONIC DOCUMENT RELATING TO A USER
#80Validating Authenticity of Electronic Documents Shared via Computer Networks
#81PROVIDING SECURITY IN AN INTELLIGENT ELECTRONIC DEVICE
#82AGENT-BASED TURING COMPLETE TRANSACTIONS INTEGRATING FEEDBACK WITHIN A BLOCKCHAIN SYSTEM
#83PERFORMING VERIFIED RESTORE OF DATA ASSETS IN A CRYPTOGRAPHIC DEVICE
#84BLOCKCHAIN-BASED SYSTEM AND METHOD FOR PURCHASE DOCUMENT TRANSFORMATION AND ACCOUNTABILITY
#85STORING DATA IN A TREE USING BILINEAR ACCUMULATION
#86METHOD TO VALIDATE OWNERSHIP AND AUTHENTICATION OF A DIGITAL ASSET
#87PRIVACY-PRESERVING MULTI-TOUCH ATTRIBUTION
#88INFORMATION INTERMEDIARY SYSTEM AND INFORMATION INTERMEDIARY METHOD
#89METHOD FOR ANTI-TAMPERING APPARATUS SERVICING DATA AND SYSTEM THEREOF
#90DATA AUTHENTICITY PROVING SYSTEM AND DATA AUTHENTICITY PROVING METHOD
#91IDENTIFYING DEPLOYED SOFTWARE PACKAGES IN STATELESS CONTAINERS
#92DYNAMIC AUTHENTICATION ATTACK DETECTION AND ENFORCEMENT AT NETWORK, APPLICATION, AND HOST LEVEL
#93SIGNING VIDEO FOR REDUCED BIT RATE
#94Methods and systems for forensic investigations in contract networks
#95VEHICLE-MOUNTED RELAY DEVICE, MANAGEMENT DEVICE, VEHICLE-MOUNTED SYSTEM, AND COMMUNICATION MANAGEMENT METHOD
#96PRIVACY PRESERVING IDENTITY RESOLUTION VIA PAGE CONTENT
#97Method to Validate Application Programming Interface (API) leveraging Non fungible Token (NFT)
#98SYSTEM AND METHOD FOR DOCUMENT TRANSFORMATION AND ACCOUNTABILITY
#99CUSTOM MEMPOOL PROTOCOL ASSOCIATED WITH PROCESSING OF CRYPTOGRAPHIC EVENTS
#100PROTECTING COMMERCIAL OFF-THE-SHELF PROGRAM BINARIES FROM PIRACY USING HARDWARE ENCLAVES
#101DATA STORAGE USING VECTORS OF VECTORS
#102CONDUCTING MULTI-PARTY AUTHENTICATION IN A PRIVACY PRESERVING MANNER
#1033D OBJECT MANAGEMENT DATA, COMPUTER PROGRAM, AND DISTRIBUTED MANAGEMENT METHOD FOR 3D OBJECT
#104SYSTEM AND METHOD FOR DOCUMENT TRANSFORMATION
#105COUNTERPARTY PHYSICAL PROXIMITY VERIFICATION FOR DIGITAL ASSET TRANSFERS
#106SYSTEMS AND METHODS FOR CONTROLLED ACCESS TO BLOCKCHAIN DATA
#107Blockchain-based Authentication of Artwork
#108INTELLIGENT SERVICE LAYER FOR SEPARATING APPLICATION FROM PHYSICAL NETWORKS AND EXTENDING SERVICE LAYER INTELLIGENCE OVER IP ACROSS THE INTERNET, CLOUD, AND EDGE NETWORKS
#109METHODS AND SYSTEMS FOR INTRODUCING SELF-CONTAINED INTENT FUNCTIONALITY INTO DECENTRALIZED COMPUTER NETWORKS
#110METHOD AND SYSTEM FOR OUT-OF-BAND USER IDENTIFICATION IN THE METAVERSE VIA BIOGRAPHICAL (BIO) ID
#111Method And System For Improving Coupling And Cohesion Of At Least One Educational Program
#112SYSTEM AND METHOD FOR DOCUMENT TRANSFORMATION AND ACCOUNTABILITY
#113INFORMATION PROCESSING METHOD, INFORMATION PROCESSING PROGRAM, INFORMATION PROCESSING APPARATUS, AND INFORMATION PROCESSING SYSTEM
#114SYSTEMS AND METHODS FOR DUAL HASH ROLLING PATCH SECURE AUTHENTICATION
#115Method and system for zero-knowledge and identity based key management for decentralized applications
#116CREDENTIAL-CHANGING PLUGIN FOR IOT DEVICES
#117SYSTEMS AND METHODS FOR MANAGING DIGITAL IDENTITIES
#118EFFICIENT KEY MANAGEMENT IN DISTRIBUTED APPLICATION
#119DIGITAL SIGNATURES
#120METHOD FOR CHECKING CRYPTOGRAPHIC SECRETS FOR EQUALITY
#121METHOD AND SYSTEM FOR ENCODING AND DECODING INFORMATION IN TEXTS
#122DISTRIBUTED PRIVATELY SUBSPACED BLOCKCHAIN DATA STRUCTURES WITH SECURE ACCESS RESTRICTION MANAGEMENT
#123SYSTEM TO ESTABLISH A NETWORK OF NODES AND PARTICIPANTS FOR DYNAMIC MANAGEMENT OF MEDIA CONTENT RIGHTS
#124AUTHENTICATION PROCESS WITH AN EXPOSED AND UNREGISTERED PUBLIC CERTIFICATE
#125RAM Hashing in Blockchain Environments
#126SECURE HASHING OF LARGE DATA FILES TO VERIFY FILE IDENTITY
#127SYSTEMS AND METHODS FOR VERIFYING DATA VIA BLOCKCHAIN
#128ASSOCIATING UNCLAIMED COMMUNICATIONS NODES
#129HIDING PRIVATE USER DATA IN PUBLIC SIGNATURE CHAINS FOR USER AUTHENTICATION IN VIDEO CONFERENCES
#130GENERATING REPORTS FROM INFORMATION WITHIN A ZERO-KNOWLEDGE DATA MANAGEMENT NETWORK
#131AUTHENTICATION PROCESS
#132DIOPHANTINE SYSTEM FOR DIGITAL SIGNATURES
#133SECURE COMPUTATION SYSTEM, SECURE COMPUTATION SERVER APPARATUS, SECURE COMPUTATION METHOD, AND SECURE COMPUTATION PROGRAM
#134MULTIFACTOR AUTHENTICATION VIA BIFURCATED PASSCODE AND NON-FUNGIBLE TOKEN
#135METHOD FOR DIGITAL ASSET TRANSACTIONS
#136METHOD AND APPARATUS FOR ATTESTATION
#137ESTABLISHING ACCESS SESSIONS
#138CONSENSUS TRUSTED CLUSTER CHANGING METHOD, COMPUTER DEVICE AND COMPUTER-READABLE STORAGE MEDIUM
#139BLOCKCHAIN VERIFICATION OF DIGITAL CONTENT ATTRIBUTIONS
#140DELIVERING HASH VALUES
#141TREE STRUCTURE FOR BYZANTINE FAULT TOLERANCE
#142SELF-ENFORCING SECURITY TOKEN IMPLEMENTING SMART-CONTRACT-BASED COMPLIANCE RULES CONSULTING SMART-CONTRACT-BASED GLOBAL REGISTRY OF INVESTORS
#143METHOD AND SYSTEM FOR VERIFICATION OF IDENTIFY OF A USER
#144IMAGE PROCESSING APPARATUS, SYSTEM, AND DATA MANAGEMENT METHOD
#145LIGHTWEIGHT FAULT DETECTION MECHANISM FOR STREAMING OF CRYPTOGRAPHIC DATA OBJECTS
#146REMOTE ATTESTATION
#147METHOD FOR MANAGING A DIGITAL IDENTITY SYSTEM
#148DATA SYNCHRONIZATION OF ELECTRONIC PATIENT CONTROLLED HEALTH RECORDS
#149COMPUTER-IMPLEMENTED DOCUMENT TRANSFORMATION SYSTEMS AND METHODS
#150System and Method for Identifying a Cutscene
#151DATA COMMUNICATION SYSTEM, DATA COMMUNICATION DEVICE, HOST DEVICE, DATA COMMUNICATION METHOD, AND DATA COMMUNICATION PROGRAM
#152DYNAMIC CERTIFICATE MANAGEMENT IN CRYPTOGRAPHIC AGILITY FRAMEWORKS
#153DECENTRALIZED MULTI-AUTHORITY ATTRIBUTE-BASED ENCRYPTION FROM BILINEAR DIFFIE-HELLMAN ASSUMPTIONS
#154Computer-implemented systems and methods for combining blockchain technology with digital twins
#155METHOD FOR FORMING BLUETOOTH NETWORK PERFORMING COMMUNICATION BASED ON POST-QUANTUM CRYPTOGRAPHY AT APPLICATION LEVEL AND OPERATING BLUETOOTH NETWORK OPERATING SYSTEM PERFORMING SAME
#156Techniques For Expediting Processing Of Blockchain Transactions
#157Method and system for exchange of value or tokens between blockchain networks
#158COMPUTER NETWORK SYSTEMS ADMINISTERING CRYPTOGRAPHICALLY-SECURED, TOKEN-BASED SUBSTITUTION MANAGEMENT AND METHODS OF USE THEREOF
#159SECURING A CONTAINER ECOSYSTEM
#160Application Integrity Attestation
#161SECURING A CONTAINER ECOSYSTEM
#162SECURING A CONTAINER ECOSYSTEM
#163SYSTEMS AND METHODS FOR DISTRIBUTED LEDGER-BASED DATA EXCHANGE
#164AUTHENTICATION BASED ON DETECTION OF USER-SPECIFIC AUTHENTICATION INPUT ERRORS
#165IMAGE-BASED LOGIN AND AUTHENTICATION
#166BLOCKING SENSITIVE DATA
#167SECURE AND TRUSTWORTHY COMPUTING ENVIRONMENTS FOR EXCHANGES
#168CRYPTOCURRENCY MINER AND JOB DISTRIBUTION
#169PLAINTEXT INTEGRITY PROTECTION MECHANISM
#170CRYPTOGRAPHIC HASH CHAIN FOR VEHICLE CONFIGURATION VERIFICATION
#171SYSTEMS AND METHODS FOR PROCESSING REQUESTS FOR CONTENT OF A CONTENT DISTRIBUTION NETWORK
#172SYSTEMS AND METHODS USING PHYSICALLY UNCLONABLE FUNCTIONS WITHOUT A CHALLENGE-RESPONSE DATABASE
#173METHOD AND PROGRAM
#174CRYPTOCURRENCY MINER AND STATISTICAL BUILT-IN SELF TESTS
#175METHODS AND TOOLS FOR PREVENTING THE COUNTERFEITING AND TAMPERING OF SEMICONDUCTOR DEVICES
#176SYSTEM AND METHOD FOR ESTABLISHING PERMANENT RECORDS BASED ON MICROINTERACTIONS
#177INFORMATION PROVISION SYSTEM, INFORMATION PROVISION METHOD, AND NON-TRANSITORY COMPUTER-READABLE MEDIUM
#178METHODS AND SYSTEM FOR MANAGING INTELLECTUAL PROPERTY USING A BLOCKCHAIN
#179METHODS AND SYSTEMS FOR DIGITAL REWARD PROCESSING
#180MACHINE LEARNING TECHNIQUES FOR VERIFYING CORRECTNESS OF ASSOCIATIONS BETWEEN ASSETS RELATED TO EVENTS AND ADDRESSABLE COMPUTER NETWORK ASSETS
#181Authenticated Modification of Blockchain-Based Data
#182HASHING TECHNIQUES FOR ASSOCIATING ASSETS RELATED TO EVENTS WITH ADDRESSABLE COMPUTER NETWORK ASSETS
#183DISTRIBUTED COMPUTER SYSTEM AND METHOD ENABLING APPLICATION OF AUTONOMOUS AGENTS
#184Method and system for registering digital documents
#185METHOD AND APPARATUS FOR PROCESSING PUSH MESSAGE
#186SINGLE-PURPOSE CERTIFICATES WITH HASH VALUES TIED TO SPECIFIC ARTIFACTS OR CONNECTIONS RELATED APPLICATIONS
#187Apparatus, Device, Method, and Computer Program for Determining an Integrity of a Generated Cryptographic Signature
#188SYSTEM FOR DIGITAL IDENTITY DETECTION AND VERIFICATION WHEN TRAVERSING BETWEEN VIRTUAL ENVIRONMENTS
#189Multi-level access distributed ledger system
#190Automated update of a customized secure boot policy
#191BLOCKCHAIN IMPLEMENTED COUNTING SYSTEM AND METHOD FOR USE IN SECURE VOTING AND DISTRIBUTION
#192DATA AND SOURCE VALIDATION FOR EQUIPMENT OUTPUT DATA OR EQUIPMENT FAILURE PREDICTION USING BLOCKCHAINS
#193SYSTEM AND METHOD FOR MIDSERVER FACILITATION OF MASS SCANNING NETWORK TRAFFIC DETECTION AND ANALYSIS
#194MASTER LEDGER AND LOCAL HOST LOG EXTENSION DETECTION AND MITIGATION OF FORGED AUTHENTICATION ATTACKS
#195Electronic system for resource origination tracking
#196BLOCKCHAIN-IMPLEMENTED METHODS AND SYSTEMS FOR AUTHORISATION BASED ON BILINEAR MAP ACCUMULATORS
#197SYSTEMS AND METHODS FOR SELECTIVELY INDEXING BLOCKCHAIN OPERATIONS BY PARSING RAW BLOCKCHAIN DATA FOR RELEVANT DATA PRIOR TO EXECUTING CONFIRMATORY FUNCTION CALLS
#198PROCESSING PRIVATE INFORMATION IN A DISTRIBUTED ENCLAVE FRAMEWORK
#199APPARATUS AND METHOD FOR PROVIDING ANONYMOUS DELEGATED CREDENTIAL IN DID-BASED SERVICE
#200LEVERAGING CONTEXTUAL METADATA COMMUNICATION TO IMPROVE DNS SECURITY
#201SYSTEMS AND METHODS FOR FACILITATING BLOCKCHAIN OPERATION CHARACTERISTIC SELECTION WHEN CONDUCTING BLOCKCHAIN OPERATIONS
#202ACCESSING A VIRTUAL REALITY ENVIRONMENT
#203IN-LINE VERIFICATION OF TRANSACTIONS
#204DEVICE AND A METHOD FOR SIGNING A METADATA FRAME CORRESPONDING TO AN IMAGE FRAME OF A SEQUENCE OF IMAGE FRAMES
#205TEAM-BASED TELE-DIAGNOSTICS BLOCKCHAIN-ENABLED SYSTEM
#206CONTENT ENCRYPTION AND IN-PLACE DECRYPTION USING VISUALLY ENCODED CIPHERTEXT
#207CLA CERTIFICATELESS AUTHENTICATION OF EXECUTABLE PROGRAMS
#208CRYPTOCURRENCY MINING PROGRESSIVE POOLS
#209CRYPTOCURRENCY MINING PROGRESSIVE POOLS
#210SYSTEM AND METHOD FOR INSERTING TRANSACTIONS INTO TRANSACTION POOLS
#211NODE VERSIONING
#212Computer System And Method For Distributed Privacy-Preserving Shared Execution Of One Or More Processes
#213DUPLICATING SMART CONTRACTS WITH TERMINATION CONDITION
#214SECURE PROVISION OF UNDETERMINED DATA FROM AN UNDETERMINED SOURCE INTO THE LOCKING SCRIPT OF A BLOCKCHAIN TRANSACTION
#215SECURE PROVISION OF UNDETERMINED DATA FROM AN UNDETERMINED SOURCE INTO THE LOCKING SCRIPT OF A BLOCKCHAIN TRANSACTION
#216HEADER-BASED AUTHENTICATION IN A VIRTUAL PRIVATE NETWORK
#217ELECTRONIC DEVICE FOR PERFORMING HASH AUTHENTICATION ON NEURAL NETWORK, AND OPERATING METHOD THEREFOR
#218TRACKING DATA THROUGHOUT AN ASSET LIFECYCLE
#219REGISTRATION TERMINAL, HOLDER TERMINAL, METHOD, AND PROGRAM
#220Blockchain Foundry Built into Integrated Circuit
#221DISTRIBUTED PLATFORM FOR COMPUTATION AND TRUSTED VALIDATION
#222SYSTEM AND METHOD OF FILTERING INTERNET TRAFFIC VIA CLIENT FINGERPRINT
#223INFORMATION PROCESSING METHOD AND APPARATUS, ELECTRONIC DEVICE, AND STORAGE MEDIUM
#224ACCESSING A VIRTUAL REALITY ENVIRONMENT
#225NON-FUNGIBLE TOKEN (NFT) GENERATION FOR SECURE APPLICATIONS
#226CLOUD PLATFORM RESOURCE CROSS-PROJECT TRANSFER METHOD AND SYSTEM, AND COMPUTER STORAGE MEDIUM
#227TRUSTED DECISION SUPPORT SYSTEM AND METHOD
#228METHODS AND SYSTEMS FOR NFT GENERATION
#229SESSION COLLABORATION SYSTEM
#230Techniques for shared private data objects in a trusted execution environment
#231NFT-BASED AUTHENTICATION SYSTEM FOR TAGGED OBJECTS AND METHODS FOR USE THEREWITH
#232System, Method, and Computer Program Product for Validating Software Agents in Robotic Process Automation Systems
#233ULTRA HIGH ENTROPY MATERIAL-BASED NON-REVERSIBLE SPECTRAL SIGNATURE GENERATION VIA QUANTUM DOTS
#234ULTRA HIGH ENTROPY MATERIAL-BASED NON-REVERSIBLE SPECTRAL SIGNATURE GENERATION VIA QUANTUM DOTS
#235IDENTITY AND PRIVACY PRESERVATION IN ASYNCHRONOUS COMMUNICATIONS
#236METHOD FOR USING CRYPTOGRAPHIC KEYS IN A VEHICLE ON-BOARD COMMUNICATION NETWORK
#237SECURING ELECTRONIC BALLOT SYSTEMS VIA SECURE MEMORY DEVICES WITH EMBEDDED HARDWARE SECURITY MODULES
#238CRYPTOGRAPHICALLY TRANSMITTING AND STORING IDENTITY TOKENS AND/OR ACTIVITY DATA AMONG SPATIALLY DISTRIBUTED COMPUTING DEVICES
#239DETECTING AND MITIGATING FORGED AUTHENTICATION OBJECT ATTACKS IN MULTI - CLOUD ENVIRONMENTS WITH ATTESTATION
#240SYSTEM AND METHODS FOR PREDICTIVE CYBER-PHYSICAL RESOURCE MANAGEMENT
#241Systems and methods of enabling blockchain-based building automation systems
#242SYSTEMS AND METHODS FOR LOYALTY POINT DISTRIBUTION
#243Telecommunication System and Method for Settling Session Transactions
#244TRACKING OR STORING OF EQUIPMENT CONFIGURATION DATA USING IMMUTABLE LEDGER FUNCTIONALITY OF BLOCKCHAINS
#245SYSTEM FOR DYNAMIC DATA AGGREGATION AND PREDICTION FOR ASSESSMENT OF ELECTRONIC NON-FUNGIBLE RESOURCES
#246CHALLENGE-RESPONSE PROTOCOL BASED ON PHYSICALLY UNCLONABLE FUNCTIONS
#247SYSTEMS AND METHODS FOR DISTRIBUTED EXTENSIBLE BLOCKCHAIN STRUCTURES
#248DECENTRALIZED MULTI-AUTHORITY ATTRIBUTE-BASED ENCRYPTION
#249FORCING THE INJECTION OF A PREVIOUS TRANSACTION'S BYTECODE INTO A BLOCKCHAIN TRANSACTION
#250HYPER-SCALE P2P DEDUPLICATED STORAGE SYSTEM USING A DISTRIBUTED LEDGER
#251METHOD FOR CONDUCTING A BIOPROCESS
#252NETWORK ACTION CLASSIFICATION AND ANALYSIS USING WIDELY DISTRIBUTED HONEYPOT SENSOR NODES
#253SYSTEMS AND METHODS FOR PROVABLE PROVENANCE FOR ARTIFICIAL INTELLIGENCE MODEL ASSESSMENTS
#254BOOTSTRAPPING A CODE TRANSPARENCY SYSTEM
#255CLIENT AUTHENTICATION AND ACCESS TOKEN OWNERSHIP VALIDATION
#256METHODS AND SYSTEMS OF PROVIDING VERIFICATION OF INFORMATION USING A CENTRALIZED OR DISTRIBUTED LEDGER
#257SYSTEM AND METHOD FOR SECURELY SHARING CRYPTOGRAPHIC MATERIAL
#258SYSTEM AND METHOD ENABLING APPLICATION OF AUTONOMOUS AGENTS
#259SECURE MANAGEMENT OF CONTENT DISTRIBUTION DATA BLOCKS ON A BLOCKCHAIN
#260Distributed metadata definition and storage in a database system for public trust ledger smart contracts
#261REMOTE ATTESTATION TRANSPORT LAYER SECURITY AND SPLIT TRUST ENCRYPTION
#262System and method for ongoing trigger-based scanning of cyber-physical assets
#263NETWORK ACTION CLASSIFICATION AND ANALYSIS USING WIDELY DISTRIBUTED AND SELECTIVELY ATTRIBUTED SENSOR NODES AND CLOUD-BASED PROCESSING
#264NETWORK AUTHENTICATION TOXICITY ASSESSMENT
#265SCALING GATEWAY TO GATEWAY TRAFFIC USING FLOW HASH
#266Systems and methods for predicting communication account identities across decentralized applications
#267USER IDENTIFICATION AND AUTHENTICATION METHOD AND SYSTEM
#268ESTABLISHING A CONTINGENT ACTION TOKEN
#269SELECTING A CONTINGENT ACTION TOKEN
#270UTILIZING A CONTINGENT ACTION TOKEN
#271GENERATING A CONTINGENT ACTION TOKEN
#272Proof of play blockchain mining
#273Transaction Access Control Using Tokenized Reputation Scores
#274Utilizing a contingent action token
#275SYSTEMS AND METHODS FOR TOKENIZATION TO SUPPORT PSEUDONYMIZATION OF SENSITVE DATA
#276Self-Defending Mobile Device
#277Systems and methods of providing immutable records
#278METHOD, APPARATUS, AND COMPUTER-READABLE MEDIUM FOR ROUTING DATA SERVICES OVER A DECENTRALIZED NETWORK
#279SYSTEM AND METHOD FOR CREATING A PERSISTENT DIRECTORY SIGNATURE FILE
#280SYSTEM AND METHOD FOR FILE AND FILE SYSTEM INTEGRITY USING DIRECTORIES
#281SYSTEM AND METHOD FOR HASH VALUE CONFIRMATION OF ELECTRONIC COMMUNICATIONS
#282SYSTEM AND METHOD FOR PRODUCING A UNIQUE STABLE BIOMETRIC CODE FOR A BIOMETRIC HASH
#283Anti-counterfeiting system and method of use
#284CONTENT ENCRYPTION AND IN-PLACE DECRYPTION USING VISUALLY ENCODED CIPHERTEXT
#285Image cache for session replays of mobile applications
#286CRYPTOGRAPHIC CURRENCY FOR SECURITIES SETTLEMENT
#287SYSTEM AND METHOD FOR FILE AND FILE SYSTEM INTEGRITY USING META-DATA
#288RESOURCE SHARING FOR COOPERATIVE COMMUNICATIONS
#289METHODS AND DEVICES FOR SECURE SYMBIOTIC MINING
#290METHODS AND SYSTEM OF PREVENTING DUPLICATION OF ENCRYPTED DATA
#291Identifying deep fake content via smart devices
#292SECURE COMPUTATION SYSTEM, SECURE COMPUTATION SERVER APPARATUS, SECURE COMPUTATION METHOD, AND SECURE COMPUTATION PROGRAM
#293METHOD FOR SIGNING A NEW BLOCK IN A DECENTRALIZED BLOCKCHAIN CONSENSUS NETWORK
#294ELECTRONIC SMOKING DEVICE AND CAPSULE SYSTEM
#295MANAGING CLOUD ACQUISITIONS USING DISTRIBUTED LEDGERS
#296SYSTEMS AND METHODS FOR GENERATING AND MONITORING DIGITAL CERTIFICATE RIGHTS IN A DISTRIBUTED NETWORK
#297MODULE, METHOD, AND SYSTEM FOR PRODUCING A DATA BLOCK
#298DATA STORAGE DEVICE, DATA STORAGE METHOD, AND NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM
#299Data protection on distributed data storage (DDS) protection networks
#300DATA TRANSMISSION METHOD AND DATA TRANSMISSION DEVICE