At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
TCP CONNECTION RESOURCE DIVERSITY USING TUNABLE GEOMETRIC SERIES
Disclosed is a computer implemented method and apparatus for handling transport control protocol connections. The local host receives a transport control...
SYSTEMS AND METHODS TO DETECT AND DEFEND AGAINST DISTRIBUTED DENIAL OF
A method, operated by a Software Defined Networking (SDN) controller associated with an Autonomous System (AS) with one or more peering points, each peering...
METHODS AND SYSTEMS FOR SHARING RISK RESPONSES BETWEEN COLLECTIONS OF
MOBILE COMMUNICATIONS DEVICES
Methods are provided for determining an enterprise risk level, for sharing security risk information between enterprises by identifying a security response by...
SITE SECURITY MONITOR
Techniques for monitoring site security are disclosed herein. Sites are scanned for security metric values associated with one or more security metrics....
DISTINGUISHING HUMAN-DRIVEN DNS QUERIES FROM MACHINE-TO-MACHINE DNS
The present disclosure is related to a computer-implemented method and system for distinguishing human-driven Domain Name System (DNS) queries from...
System and method for scanning hosts using an autonomous, self-destructing
A method for scanning hosts using an autonomous, self-destructing payload, deploying, by a computing device, at least one payload to at least one host, the at...
REPUTATION-BASED THREAT PROTECTION
Information concerning a plurality of identified threats provided by a plurality of preselected sources is stored in memory. An e-mail message may be received...
CONTENT REQUEST RATE LIMITING IN A CONTENT DELIVERY SYSTEM
Systems, methods, and software for operating a content delivery node to monitor requests for content transferred by at least an end user device to detect when...
METHODS AND SYSTEMS FOR DETECTING AN ELECTRONIC INTRUSION
Methods and systems for detecting an electronic intrusion are described. A notification is received, over a network, from a server, the notification reporting...
Detection of Mutated Apps and Usage Thereof
System, method and product for detection of mutated apps and usage thereof. A method comprises obtaining features of an Application Under Check (AUC);...
CLOUD BASED REPUTATION SYSTEM FOR BROWSER EXTENSIONS AND TOOLBARS
A method and apparatus for an automated classification rating of browser extensions is provided.
APPARATUS AND METHOD FOR IDENTIFYING A DOMAIN NAME SYSTEM RESOURCE
A machine includes a processor and a memory connected to the processor. The memory stores instructions executed by the processor to identify a resource attack...
APPLICATION ATTACK MONITORING
Implementations of the present disclosure include methods, systems, and computer-readable storage mediums for providing application attack monitoring. Actions...
METHOD AND SYSTEM FOR TESTING AND VALIDATION OF CRYPTOGRAPHIC ALGORITHMS
A method for testing cryptographic algorithms includes: receiving one or more request files, wherein each request files is associated with a cryptographic...
CENTRALIZED STORAGE AND MANAGEMENT OF MALWARE MANIFESTS
Updating a central repository with information about malware resident upon a computer system. Upon detecting the malware executing in a virtual machine, a...
A method, system, server processing system and computer readable medium for authenticating a user attempting to access a secure environment is disclosed. In...
Systems and Methods for Document-Level Access Control in a Contextual
Systems and methods are provided for managing contextual collaborations. User data corresponding to a plurality of users is stored. The plurality of users...
METHOD AND SYSTEM FOR ENABLING ACCESS OF A CLIENT DEVICE TO A REMOTE
A computer implemented method, computer program product, and systems for enabling access of a client device to a remote desktop. The remote desktop is...
INFORMATION PROCESSING APPARATUS, COMMUNICATIONS METHOD, AND SYSTEM
An information processing apparatus includes a first communications connector configured to implement first data communications connection between a first...
CONTROLLING OPERATION OF A MACHINE AND DESCRIBING ACTIONS PERFORMED BY THE
MACHINE THROUGH A SOCIAL NETWORKING...
A social networking system includes information identifying a machine (e.g., a robot, a drone, a computer, a thermostat, etc.) and a connection between the...
DNS SECURITY EXTENSIONS FOR EMULATED APPLICATIONS
The non-emulated interface may determine whether the domain-name-to-be-resolved resides in a zone on a list of secured zones. If so, the DNS query may be...
Digital Rights Domain Management for Secure Content Distribution in a
Systems and methods for secure content distribution to playback devices connected to a local network via a residential gateway using secure links are...
SHUT OFF MECHANISM FOR ALL INTERNET TRAFFIC
A client device providing enhanced network traffic security. The client device includes a processor and a network connection element selectively operable to...
DATA LEAK PROTECTION
Methods and systems for Data Leak Prevention (DLP) in an enterprise network are provided. According to one embodiment, a data leak protection method is...
AUTHENTICATING A LIMITED INPUT DEVICE VIA AN AUTHENTICATED APPLICATION
A limited input device, such as a camera, is authenticated based on a request received from an authenticated application. The application can request an...
Hostless mDNS-SD Responder with Authenticated Host Wake Service
Conventional wireless interface (WiFi) controllers cannot resolve authentication for trusted client devices without calculation from a host processor. Leaving...
METHOD OF AUTHENTICATING CAN PACKETS USING MIXTURE OF MACS AND APPARATUS
FOR IMPLEMENTING THE SAME
A method and apparatus for authenticating packets in a controller area network (CAN) are disclosed. The method includes transmitting messages using a mixture...
Authenticating Method and Apparatus Using Electronic Device
An authentication method and apparatus for an electronic device. A first electronic device transmits a mutual authentication request for the first electronic...
METHODS AND SYSTEMS FOR AUTHENTICATING USERS
A method of authenticating users to reduce transaction risks includes indicating a desire to conduct a transaction and determining whether the transaction...
BLUETOOTH LOW ENERGY HOSTLESS PRIVATE ADDRESS RESOLUTION
Conventional Bluetooth low energy (or like personal wireless network) controllers cannot resolve private addresses without some calculation from a host...
SECURE ACCESS TO INDIVIDUAL INFORMATION
A facility for accessing information relating to a person is described. In a reader device, the facility accesses first credentials stored in a first storage...
AUTHENTICATED SESSION ESTABLISHMENT
Methods, devices, and machine-readable media are provided to provide secure communications between entities. As provided in this disclosure, this may include...
DISTRIBUTED SINGLE SIGN ON TECHNOLOGIES INCLUDING PRIVACY PROTECTION AND
Technologies for distributed single sign-on operable to provide user access to a plurality of services via authentication to a single entity. The distributed...
PROCESSING APPARATUS, AUTHORITY SETTING METHOD, AND STORAGE MEDIUM STORING
A processing apparatus performs: in response to reception of first information by one of the network interface and the user interface, identifying, as a first...
Single Sign Off Handling by Network Device in Federated Identity
In one implementation, a network device provides a single signoff service to one or more endpoints in software as a service (SaaS) sessions. The network device...
RESTRICTION OF IP ACCESS BASED ON PERSONAL PERFORMANCE
An application on a computing device communicatively coupled to a communications network for receiving restriction input from a parent user of the application....
USER AUTHENTICATION BASED ON SELF-SELECTED PREFERENCES
Embodiments of the invention are directed to a system, method, and a computer program product for a user authentication based on self-selected preferences. The...
SYSTEMS AND METHODS FOR MANAGING CONNECTIONS FOR UNIVERSAL PLUG-AND-PLAY
Systems and methods of managing network connections are disclosed. The method includes receiving a communication from a media device that requests permission...
HACKER SECURITY SOLUTION FOR PACKAGE TRANSFER TO AND FROM A VEHICLE
A cloud based system for a package exchange with a vehicle service is discussed. The system can have servers having processors, ports, and databases and a...
METHOD OF SEQUENTIALLY AUTHENTICATING CAN PACKETS USING DIVIDED MACS AND
APPARATUS FOR IMPLEMENTING THE SAME
A method of transmitting K messages using divided message authentication codes (MACs) in a controller area network (CAN) includes: generating a MAC using a...
SYSTEMS AND METHODS FOR DETERMINING DIGITAL DEGREES OF SEPARATION FOR
DIGITAL PROGRAM IMPLEMENTATION
This disclosure relates generally to enterprise software management, and more particularly to systems and methods for determining digital degrees of separation...
USING CREDENTIALS STORED IN DIFFERENT DIRECTORIES TO ACCESS A COMMON
A global endpoint may be associated with an organization name and a plurality of directories located in different geographic regions. The global endpoint may...
CLIENT ACCESSIBLE SECURE AREA IN A MOBILE DEVICE SECURITY MODULE
A security module has an assigned unique electronic identifier. The security module has a communication interface, a non-volatile memory, and a processing unit...
SECURE SHARED KEY SHARING SYSTEMS AND METHODS
Systems and methods used to securely communicate a shared key to devices. One embodiment describes a method to securely communicate a shared key to a first...
FINE GRAIN RIGHTS MANAGEMENT OF STREAMING CONTENT
The present invention provides methods, apparatuses, and systems for delivering protected streaming content to a receiving device. In an aspect of the present...
METHOD FOR ESTABLISHING A CRYPTOGRAPHICALLY PROTECTED COMMUNICATION
Some embodiments are directed to a cryptographic method for providing an electronic first device, an electronic second device and an electronic intermediary...
SYSTEM AND METHOD FOR PROVIDING A SECURE ONE-TIME USE CAPSULE BASED
PERSONALIZED AND ENCRYPTED ON-DEMAND...
A secure one-time use capsule based personalized and encrypted on-demand communication platform enables encrypted personalized secure on-demand stateless...
SYSTEM AND METHOD TO PROVIDE BUILT-IN AND MOBILE VPN CONNECTIVITY
A system and method for facilitating the establishment of a virtual private network between a network and a remote computer, the system having: a mobile device...
MULTI-TUNNELING VIRTUAL NETWORK ADAPTER
Among other things, embodiments of the present disclosure allow multiple virtual private network connections to be created without the need for administrative...
SYSTEMS AND METHODS FOR PROTECTING NETWORK DEVICES
Embodiments of the present disclosure help protect network devices from unauthorized access. Among other things, embodiments of the disclosure allow full...