| Utility: AUTHENTICATION CREDENTIAL WITH EMBEDDED AUTHENTICATION INFORMATION Filling date: 5 Sep 2025 Issue date: 8 Sep 2022 | 23 May 2022 | 8 Sep 2022 |
| Utility: Verification code injection at build time Filling date: 5 Sep 2025 Issue date: 9 Aug 2022 | 16 Aug 2021 | 9 Aug 2022 |
| Utility: ANALYZING AND ADDRESSING SECURITY THREATS IN NETWORK RESOURCES Filling date: 5 Sep 2025 Issue date: 4 Aug 2022 | 20 Apr 2022 | 4 Aug 2022 |
| Utility: Understanding and mediating among diversely structured operational policies Filling date: 5 Sep 2025 Issue date: 19 Jul 2022 | 26 Feb 2020 | 19 Jul 2022 |
| Utility: DEVELOPING LEAST-PRIVILEGE PERMISSION SETS BASED ON GLOBAL OPTIMIZATION Filling date: 5 Sep 2025 Issue date: 23 Jun 2022 | 27 Oct 2021 | 23 Jun 2022 |
| Utility: SYSTEMS AND METHODS FOR SECURING VIRTUALIZED EXECUTION INSTANCES Filling date: 5 Sep 2025 Issue date: 16 Jun 2022 | 20 Dec 2021 | 16 Jun 2022 |
| Utility: PROTECTIONS AGAINST SECURITY VULNERABILITIES ASSOCIATED WITH TEMPORARY ACCESS TOKENS Filling date: 5 Sep 2025 Issue date: 2 Jun 2022 | 16 Feb 2022 | 2 Jun 2022 |
| Utility: NATIVE REMOTE ACCESS TO TARGET RESOURCES USING SECRETLESS CONNECTIONS Filling date: 5 Sep 2025 Issue date: 19 May 2022 | 13 Nov 2020 | 19 May 2022 |
| Utility: Efficient and secure provisioning and updating of identity credentials Filling date: 5 Sep 2025 Issue date: 10 May 2022 | 13 Apr 2020 | 10 May 2022 |
| Utility: Systems and methods for monitoring secure web sessions Filling date: 5 Sep 2025 Issue date: 3 May 2022 | 29 Oct 2021 | 3 May 2022 |
| Utility: Analyzing and addressing least-privilege security threats on a composite basis Filling date: 5 Sep 2025 Issue date: 3 May 2022 | 18 Dec 2019 | 3 May 2022 |
| Utility: CENTRALIZED SECURITY ANALYSIS AND MANAGEMENT OF SOURCE CODE IN NETWORK ENVIRONMENTS Filling date: 5 Sep 2025 Issue date: 28 Apr 2022 | 3 Jan 2022 | 28 Apr 2022 |
| Utility: Identity verification based on electronic file fingerprinting data Filling date: 5 Sep 2025 Issue date: 26 Apr 2022 | 15 Oct 2019 | 26 Apr 2022 |
| Utility: Automated creation of dynamic privileged access resources Filling date: 5 Sep 2025 Issue date: 26 Apr 2022 | 11 Jul 2018 | 26 Apr 2022 |
| Utility: DETECTING AND PREVENTING UNAUTHORIZED CREDENTIAL CHANGE Filling date: 5 Sep 2025 Issue date: 17 Mar 2022 | 24 Nov 2021 | 17 Mar 2022 |
| Utility: End-to-end secure lifecycle of secrets with minimal footprint Filling date: 5 Sep 2025 Issue date: 8 Mar 2022 | 14 Jul 2021 | 8 Mar 2022 |
| Utility: Understanding and mediating among diversely structured operational policies Filling date: 5 Sep 2025 Issue date: 1 Mar 2022 | 27 Oct 2020 | 1 Mar 2022 |
| Utility: Coordinated management of cryptographic keys for communication with peripheral devices Filling date: 5 Sep 2025 Issue date: 22 Feb 2022 | 31 Mar 2021 | 22 Feb 2022 |
| Utility: Secure remote access based on inspection and validation of remote access protocol traffic Filling date: 5 Sep 2025 Issue date: 22 Feb 2022 | 25 Nov 2020 | 22 Feb 2022 |
| Utility: Protections against security vulnerabilities associated with temporary access tokens Filling date: 5 Sep 2025 Issue date: 22 Feb 2022 | 8 May 2020 | 22 Feb 2022 |
| Utility: Identity-based security layer for peripheral computing devices Filling date: 5 Sep 2025 Issue date: 8 Feb 2022 | 31 Mar 2021 | 8 Feb 2022 |
| Utility: Secure, efficient, and flexible searchable-encryption techniques Filling date: 5 Sep 2025 Issue date: 1 Feb 2022 | 20 Apr 2020 | 1 Feb 2022 |
| Utility: Centralized security assessments of scripts in network environments Filling date: 5 Sep 2025 Issue date: 25 Jan 2022 | 28 Jan 2020 | 25 Jan 2022 |
| Utility: Dynamic visualization of scripts based on centralized security assessments Filling date: 5 Sep 2025 Issue date: 25 Jan 2022 | 28 Jan 2020 | 25 Jan 2022 |
| Utility: Securing privileged virtualized execution instances from penetrating a virtual host environment Filling date: 5 Sep 2025 Issue date: 11 Jan 2022 | 22 Apr 2019 | 11 Jan 2022 |
| Utility: Detecting compromised cloud-identity access information Filling date: 5 Sep 2025 Issue date: 11 Jan 2022 | 2 Jan 2018 | 11 Jan 2022 |
| Utility: AUTOMATIC LEAST-PRIVILEGE ACCESS AND CONTROL FOR TARGET RESOURCES Filling date: 5 Sep 2025 Issue date: 30 Dec 2021 | 7 Sep 2021 | 30 Dec 2021 |
| Utility: Detecting and preventing unauthorized credential change Filling date: 5 Sep 2025 Issue date: 28 Dec 2021 | 16 Aug 2018 | 28 Dec 2021 |
| Utility: SECURITY PROTECTION AGAINST THREATS TO NETWORK IDENTITY PROVIDERS Filling date: 5 Sep 2025 Issue date: 9 Dec 2021 | 25 Feb 2021 | 9 Dec 2021 |
| Utility: Developing least-privilege permission sets based on global optimization Filling date: 5 Sep 2025 Issue date: 16 Nov 2021 | 22 Dec 2020 | 16 Nov 2021 |
| Utility: PROTECTIONS AGAINST SECURITY VULNERABILITIES ASSOCIATED WITH TEMPORARY ACCESS TOKENS Filling date: 5 Sep 2025 Issue date: 11 Nov 2021 | 8 May 2020 | 11 Nov 2021 |
| Utility: SECURE, EFFICIENT, AND FLEXIBLE SEARCHABLE-ENCRYPTION TECHNIQUES Filling date: 5 Sep 2025 Issue date: 21 Oct 2021 | 20 Apr 2020 | 21 Oct 2021 |
| Utility: ON-DEMAND AND PROACTIVE DETECTION OF APPLICATION MISCONFIGURATION SECURITY THREATS Filling date: 5 Sep 2025 Issue date: 7 Oct 2021 | 7 Apr 2020 | 7 Oct 2021 |
| Utility: Measuring and comparing security efficiency and importance in virtualized environments Filling date: 5 Sep 2025 Issue date: 5 Oct 2021 | 15 Jun 2020 | 5 Oct 2021 |
| Utility: RECOVERY OF STATE, CONFIGURATION, AND CONTENT FOR VIRTUALIZED INSTANCES Filling date: 5 Sep 2025 Issue date: 23 Sep 2021 | 7 Jun 2021 | 23 Sep 2021 |
| Utility: Automatic least-privilege access and control for target resources Filling date: 5 Sep 2025 Issue date: 21 Sep 2021 | 5 Nov 2019 | 21 Sep 2021 |
| Utility: RISK ASSESSMENT FOR NETWORK ACCESS CONTROL THROUGH DATA ANALYTICS Filling date: 5 Sep 2025 Issue date: 2 Sep 2021 | 28 Apr 2021 | 2 Sep 2021 |
| Utility: UNDERSTANDING AND MEDIATING AMONG DIVERSELY STRUCTURED OPERATIONAL POLICIES Filling date: 5 Sep 2025 Issue date: 26 Aug 2021 | 27 Oct 2020 | 26 Aug 2021 |
| Utility: UNDERSTANDING AND MEDIATING AMONG DIVERSELY STRUCTURED OPERATIONAL POLICIES Filling date: 5 Sep 2025 Issue date: 26 Aug 2021 | 26 Feb 2020 | 26 Aug 2021 |
| Utility: CENTRALIZED SECURITY ASSESSMENTS OF SCRIPTS IN NETWORK ENVIRONMENTS Filling date: 5 Sep 2025 Issue date: 29 Jul 2021 | 28 Jan 2020 | 29 Jul 2021 |
| Utility: DYNAMIC VISUALIZATION OF SCRIPTS BASED ON CENTRALIZED SECURITY ASSESSMENTS Filling date: 5 Sep 2025 Issue date: 29 Jul 2021 | 28 Jan 2020 | 29 Jul 2021 |
| Utility: DYNAMICALLY GENERATING MULTI-FACTOR ENTITY RISK ASSESSMENTS WITHIN VIRTUALIZED ENVIRONMENTS Filling date: 5 Sep 2025 Issue date: 1 Jul 2021 | 11 Mar 2021 | 1 Jul 2021 |
| Utility: Adaptive response generation on an endpoint Filling date: 5 Sep 2025 Issue date: 29 Jun 2021 | 2 Apr 2020 | 29 Jun 2021 |
| Utility: Web-based authentication for non-web clients Filling date: 5 Sep 2025 Issue date: 29 Jun 2021 | 13 Mar 2018 | 29 Jun 2021 |
| Utility: MEASURING AND COMPARING SECURITY EFFICIENCY AND IMPORTANCE IN VIRTUALIZED ENVIRONMENTS Filling date: 5 Sep 2025 Issue date: 24 Jun 2021 | 15 Jun 2020 | 24 Jun 2021 |
| Utility: ANALYZING AND ADDRESSING LEAST-PRIVILEGE SECURITY THREATS ON A COMPOSITE BASIS Filling date: 5 Sep 2025 Issue date: 24 Jun 2021 | 18 Dec 2019 | 24 Jun 2021 |
| Utility: Multidimensional vectors for analyzing and visually displaying identity permissions Filling date: 5 Sep 2025 Issue date: 15 Jun 2021 | 23 Jul 2020 | 15 Jun 2021 |
| Utility: Recovery of state, configuration, and content for virtualized instances Filling date: 5 Sep 2025 Issue date: 8 Jun 2021 | 26 May 2020 | 8 Jun 2021 |
| Utility: Secure provisioning and validation of access tokens in network environments Filling date: 5 Sep 2025 Issue date: 8 Jun 2021 | 7 Apr 2020 | 8 Jun 2021 |
| Utility: Decentralized management of data access and verification using data management hub Filling date: 5 Sep 2025 Issue date: 18 May 2021 | 10 Sep 2020 | 18 May 2021 |