WO2021067446A1
|
|
Third-party access-control support using role history analysis
|
WO2021050346A1
|
|
Secure resource management to prevent resource abuse
|
WO2021034932A1
|
|
Automated path-based recommendation for risk mitigation
|
WO2021011308A1
|
|
Secure resource management to prevent fraudulent resource access
|
WO2020232137A1
|
|
Data protection via attributes-based aggregation
|
WO2020198236A1
|
|
Verification of electronic identity components
|
WO2020142417A1
|
|
Production-ready attributes creation and management for software development
|
US2020134387A1
|
|
Evaluation of modeling algorithms with continuous outputs
|
CA3114361A1
|
|
Controlling access to multi-granularity data
|
US2019377896A1
|
|
Systems and methods for securing data in electronic communications
|
US2019356672A1
|
|
Controlling access to secured data via timed filtering of data
|
WO2019217876A1
|
|
Training or using sets of explainable machine-learning modeling algorithms for predicting timing of events
|
US2021004373A1
|
|
Facilitating queries of encrypted sensitive data via encrypted variant data objects
|
CA3089248A1
|
|
Facilitating entity resolution via secure entity resolution database
|
EP3746928A1
|
|
Verification of access to secured electronic resources
|
US2019228173A1
|
|
Data access control system accessible from third-party web server
|
WO2019136407A1
|
|
Facilitating entity resolution, keying, and search match without transmitting personally identifiable information in the clear
|
US2020394331A1
|
|
Embedded third-party application programming interface to prevent transmission of sensitive data
|
US2019164173A1
|
|
Synthetic online entity detection
|
EP3710927A1
|
|
Building segment-specific executable program code for modeling outputs
|