Search results
Appearance
Page title matches
- =ENDPOINT AND REMOTE SERVER PROTECTION= ==ENDPOINT AND REMOTE SERVER PROTECTION - A simplified explanation of the abstract== ...3 KB (469 words) - 03:21, 3 January 2024
Page text matches
- =ENDPOINT AND REMOTE SERVER PROTECTION= ==ENDPOINT AND REMOTE SERVER PROTECTION - A simplified explanation of the abstract== ...3 KB (469 words) - 03:21, 3 January 2024
- ...on data, endpoint-specific public key, and TEE signature with a second TLS endpoint during a TLS handshake message exchange. * The computer device creates a secure TLS endpoint within a TEE of the processor. ...4 KB (586 words) - 05:52, 12 July 2024
- ...receiving a key, and generating a second key for encryption and integrity protection. * Home network security endpoint receives request from user equipment ...3 KB (376 words) - 05:43, 17 March 2024
- ...primary user's authentication credentials. An authentication agent on the endpoint device manages access to the device and resources. In the absence of the pr * Endpoint device associated with a primary user ...3 KB (482 words) - 08:28, 19 July 2024
- ...rypted frames are packetized into data packets for transmission to another endpoint. * Protection of sensitive media content during transmission. ...3 KB (492 words) - 09:06, 27 September 2024
- =MULTI-FACTOR AUTHENTICATION IN ENDPOINT DETECTION AND RESPONSE= ==MULTI-FACTOR AUTHENTICATION IN ENDPOINT DETECTION AND RESPONSE - A simplified explanation of the abstract== ...3 KB (465 words) - 17:25, 1 January 2024
- ...service with the synthetic IP addresses, where they are correlated to the endpoint identifiers. - Correlation of synthetic IP addresses to endpoint identifiers ...4 KB (574 words) - 02:49, 26 July 2024
- ...ocusing on protecting sensitive data using a volume master key (VMK) on an endpoint. * The VMK is encrypted and protected by security protocols on the endpoint to prevent unauthorized access in case of hardware failure or alteration. ...3 KB (521 words) - 04:59, 18 October 2024
- ...ertificate granting permission to a user to perform an operation within an endpoint node. ...ient node, including a work order for the operation to be performed in the endpoint node. ...3 KB (462 words) - 06:04, 11 July 2024
- ...service with the synthetic IP addresses, where they are correlated to the endpoint identifiers. * Zero-trust client receives requests for IP addresses for endpoint identifiers ...4 KB (603 words) - 07:20, 25 July 2024
- =ENDPOINT SECURITY ARCHITECTURE WITH PROGRAMMABLE LOGIC ENGINE= ==ENDPOINT SECURITY ARCHITECTURE WITH PROGRAMMABLE LOGIC ENGINE - A simplified explana ...4 KB (567 words) - 03:53, 9 February 2024
- Vmware, inc. (20240244036). FLOW BASED BREAKOUT OF FIREWALL USAGE BASED ON TRUST simplified abstract...so includes generating policies to allow flows associated with the trusted endpoint to bypass the firewall and configuring an edge services gateway to apply th * Receiving flow data for external endpoint flows ...4 KB (627 words) - 08:21, 19 July 2024
- * The computer device instantiates a first TLS endpoint with access to a TEE. * It generates an endpoint-specific public-private key pair in the TEE. ...4 KB (585 words) - 04:30, 26 April 2024
- * The computer device instantiates a first TLS endpoint with access to a TEE. ...ndpoint-specific public-private key pair in the TEE bound to the first TLS endpoint. ...4 KB (606 words) - 06:34, 8 May 2024
- =ENDPOINT AGENT EXTENSION OF A MACHINE LEARNING CYBER DEFENSE SYSTEM FOR EMAIL= ==ENDPOINT AGENT EXTENSION OF A MACHINE LEARNING CYBER DEFENSE SYSTEM FOR EMAIL - A si ...4 KB (622 words) - 06:40, 4 July 2024
- ...DEVICE HAVING AGENT APPLICATION CONFIGURED TO COMMUNICATE WITH WEB SERVER ENDPOINT FOR AUTHENTICATION= ...DEVICE HAVING AGENT APPLICATION CONFIGURED TO COMMUNICATE WITH WEB SERVER ENDPOINT FOR AUTHENTICATION - A simplified explanation of the abstract== ...3 KB (491 words) - 06:53, 28 June 2024
- ...sensitive data that may be encrypted using a volume master key (VMK) on an endpoint. The VMK is protected by security protocols to prevent unauthorized access * Encryption of sensitive data using a volume master key (VMK) on an endpoint. ...4 KB (598 words) - 02:18, 18 October 2024
- ...the process to the data recorder through the kernel driver. where a tamper protection cache or similarly secured repository is available, this secure information ...2 KB (216 words) - 11:17, 25 May 2025
- * An access policy is determined for each endpoint based on its position in the hierarchy, controlling the commands that can b ...policy by deciding whether a client's command should be transmitted to the endpoint via the proxy chain. ...4 KB (627 words) - 07:01, 28 June 2024
- * Generating a proxy authentication with information identifying a private endpoint and transmitting it to an egress proxy service * Transmitting the processed request to the private endpoint via the egress proxy service ...3 KB (483 words) - 02:37, 18 July 2024
(Ad) Transform your business with AI in minutes, not months
✓
Custom AI strategy tailored to your specific industry needs
✓
Step-by-step implementation with measurable ROI
✓
5-minute setup that requires zero technical skills
Trusted by 1,000+ companies worldwide