EP3757846A2
|
|
Analyzing diversely structured operational policies
|
US10931454B1
|
|
Decentralized management of data access and verification using data management hub
|
US10965674B1
|
|
Security protection against threats to network identity providers
|
US10963583B1
|
|
Automatic detection and protection against file system privilege escalation and manipulation vulnerabilities
|
EP3687139A2
|
|
Secure provisioning and validation of access tokens in network environments
|
EP3683709A2
|
|
Variable encryption techniques for secure and efficient searchable encryption
|
US10749910B1
|
|
Multidimensional vectors for analyzing and visually displaying identity permissions
|
US10885217B1
|
|
Client microservice for secure and efficient searchable encryption
|
US2020380109A1
|
|
Efficient and secure provisioning and updating of identity credentials
|
US10897458B1
|
|
Enhancing secure client experience through selective encryption of cookies
|
US2020334371A1
|
|
Secure and temporary access to sensitive assets by virtual execution instances
|
US10747875B1
|
|
Customizing operating system kernels with secure kernel modules
|
US10860719B1
|
|
Detecting and protecting against security vulnerabilities in dynamic linkers and scripts
|
EP3660714A2
|
|
Centralized security assessments of scripts in network environments
|
US10749886B1
|
|
Analyzing diversely structured operational policies
|
US10735436B1
|
|
Dynamic display capture to verify encoded visual codes and network address information
|
US10812272B1
|
|
Identifying computing processes on automation servers
|
EP3660720A2
|
|
Multi-context encoding and secure communication of data
|
US10601876B1
|
|
Detecting and actively resolving security policy conflicts
|
US10972465B1
|
|
Secure authentication through visual codes containing unique metadata
|