At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
WEB SERVICE TESTING
Disclosed is a computer-implemented method and system of inferring a web service infrastructure from a web service hosted on a web server. The method includes:...
DETERMINING VULNERABILITY OF A WEBSITE TO SECURITY THREATS
Provided are methods and systems for determining a vulnerability of a website to at least one security threat. An example method can comprise providing a user...
CERTIFICATION OF CORRECT BEHAVIOR OF CLOUD SERVICES USING SHADOW RANK
Determining potential harm associated with a network endpoint external to an enterprise includes receiving information about a network-based communication by a...
IDENTIFYING A POTENTIAL DDOS ATTACK USING STATISTICAL ANALYSIS
Embodiments can identify requests that may be tied to a DDOS attack. For example, the primary identifiers (e.g., a source address) of requests for a network...
INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, AND
INFORMATION PROCESSING METHOD
An information processing system, having one or more information processing apparatuses, includes a data input unit configured to take as input first data...
COMPUTATIONAL SIGNAL PROCESSING ARCHITECTURES FOR ELECTROMAGNETIC
Systems and methods can support a computational signal processing architecture for electromagnetic signature analysis and threat detection. A plurality of...
SENSOR MESH AND SIGNAL TRANSMISSION ARCHITECTURES FOR ELECTROMAGNETIC
Systems and methods can support a sensor mesh and signal transmission architecture for electromagnetic signature analysis and threat detection. Sensor antennas...
METHOD AND APPARATUS FOR IDENTIFYING AND DETECTING THREATS TO AN
ENTERPRISE OR E-COMMERCE SYSTEM
Methods and apparatuses for identifying and detecting threats to an enterprise or e-commerce system are disclosed, including grouping log lines belonging to...
CAPTURE TRIGGERS FOR CAPTURING NETWORK DATA
The disclosed embodiments provide a system that facilitates the processing of network data. During operation, the system provides a risk-identification...
MANAGING INFECTIOUS FORWARDED MESSAGES
Systems and methods for managing forwarded infectious messages are provided. Managing electronic message comprises receiving a message, forwarding the message,...
Malicious Message Detection and Processing
Malicious message detection and processing systems and methods are provided herein. According to various embodiments, a method includes detecting, via an...
Apparatus and Method for Efficient Identification of Code Similarity
A method for identifying similarity between query samples and stored samples in an efficiently maintained reference library may include receiving a first...
SYSTEMS, DEVICES, AND METHODS FOR SEPARATING MALWARE AND BACKGROUND EVENTS
Embodiments relate to systems, devices, and computing-implemented methods for separating malware and background events to classify malware based on traffic...
INFORMATION PROCESSING APPARATUS AND IDENTIFYING METHOD
An information processing apparatus includes an adding unit and an identifying unit. The adding unit adds, to data received from a communication destination...
System and method for network intrusion detection of covert channels based
on off-line network traffic
A network intrusion detection system and method is configured to receive off-line network traffic. The off-line network traffic with a predefined format, PCAP...
Action Response Framework for Data Security Incidents
An incident manager application (IM) for responding to data security incidents in enterprise networks is disclosed. An IM tracks the incidents in an enterprise...
Electronic Message Analysis For Malware Detection
An electronic message is analyzed for malware contained in the message. Text of an electronic message may be analyzed to detect and process malware content in...
ELECTROMAGNETIC SIGNATURE ANALYSIS FOR THREAT DETECTION IN A WIRELESS
ENVIRONMENT OF EMBEDDED COMPUTING DEVICES
Systems and methods can support detecting and identifying threats associated with wireless devices. A radio receiver can collect radio frequency signals from...
ENTERPRISE INTRUSION DETECTION AND REMEDIATION
Events are securely packaged and transmitted from peripherals of terminals and from secure input/out modules (SIOMs) of terminals. The events are collected and...
METHOD AND APPARATUS FOR DETECTING PORT SCANS IN A NETWORK
A method and an apparatus for detecting a port scan in a network are disclosed. For example, the method extracts statistics from a message, detects the port...
PREVENTING URL CONFUSION ATTACKS
Methods and apparatus are disclosed for detecting illegitimate or spoofed links on a web page. Illegitimate links can be detected by receiving a web link that...
SIMILARITY SEARCH AND MALWARE PRIORITIZATION
Methods, system, and media for determining similar malware samples are disclosed. Two or more malware samples are received and analyzed to extract information...
Method for Combining Multiple Signal Values in the Dendritic Cell
Artificial Immune Systems (AIS) including the Dendritic Cell Algorithm (DCA) are an emerging method to detect malware in computer systems. A DCA module may...
Restricting Communications Between Subscriber Machines
A method of transferring information between subscribers associated with a communication service is disclosed. The method includes receiving a first handle...
METHOD AND APPARATUS FOR SYNCHRONIZING AN ADAPTABLE SECURITY LEVEL IN AN
A method of communicating in a secure communication system, comprises the steps of assembling as message at a sender, then determining a security level, and...
METHOD AND SYSTEM FOR GEOLOCATION VERIFICATION OF RESOURCES
A method of geolocation verification, including obtaining the geolocation of an operating system, generating a unique system ID for an installed operating...
AGGREGATE SERVICE WITH FILE SHARING
One embodiment provides a method, including: sending, from a device, input from a user requesting access to data retrievable by an aggregate service device;...
DETERMINING VARIABLE WAIT TIME IN AN ASYNCHRONOUS CALL-BACK SYSTEM BASED
ON CALCULATED AVERAGE SUB-QUEUE WAIT TIME
A method includes a workload management (WLM) server that receives a first CHECK WORKLOAD command for a workload in a queue of the WLM server. It may be...
NETWORK CONNECTION METHOD, HOTSPOT TERMINAL AND MANAGEMENT TERMINAL
Embodiments of the disclosure provide a network connection method, a hotspot terminal, and a management terminal. A hotspot terminal receives an Internet...
SYSTEM AND METHOD TO VERIFY PREDETERMINED ACTIONS BY A COMPUTER ON A
A system, a method, and a computer program for identifying a device on a network that participates in communication sessions, where the device may rotate its...
SUPERVISED ONLINE IDENTITY
Technologies to facilitate supervision of an online identify include a gateway server to facilitate and monitor access to an online service by a user of a...
INTERNET ACCESS AUTHORIZATION AND REGULATION SYSTEMS AND METHODS FOR
CONTROLLED ENVIRONMENT OF AN INSTITUTIONAL...
Access and regulations systems to facilitate safe and secure access of web content by residents of an institutional facility such as a correctional facility...
POLICY PARTIAL RESULTS
Technology for policies with reduced associated costs is disclosed. A policy may include an ordered rule set. When evaluated, the highest priority rule in the...
METHOD, SYSTEM AND APPARATUS FOR NETWORK MANAGEMENT BASED ON BUSINESS
A method for providing a dynamic business network and data management service system includes defining an account for a co-operation organization for accessing...
METHOD AND APPARATUS FOR SECURE WIRELESS SHARING
A method for generating a secure one-time network for a new device includes receiving an instruction at an access point for generation of a one-time network. A...
Using Third Party Information To Improve Predictive Strength for
Embodiments of the present invention are directed to methods and systems for utilizing the history of previous authentications and authorizations related to...
AUTOMATIC CONNECTED VEHICLE DEMONSTRATION PROCESS
The present invention is directed toward an automatic connected vehicle demonstration method and system for automatically designating any registered vehicle as...
HIERARCHICAL AUTHENTICATION AND AUTHORIZATION SYSTEM
A method for controlling access to a system for supporting home control activities includes hierarchical authorization of the user. Access in an online mode,...
SYSTEM AND METHOD FOR PROVIDING ERROR HANDLING IN AN UNTRUSTED NETWORK
An example method is provided and may include receiving a DIAMETER-based error over an SWm interface by a first evolved packet data gateway (ePDG) for a user...
TECHNIQUES FOR CALL-BASED USER VERIFICATION
Techniques for call-based user verification are described. In one embodiment, for example, an apparatus may comprise a processor circuit and a storage...
METHOD, DEVICE AND SYSTEM FOR USER AUTHENTICATION
A method of user authentication is disclosed. The method is performed at a server device having one or more processors and memory for storing programs to be...
Method, Apparatus, and System for Controlling Access of User Terminal
A method, an apparatus, and a system for controlling access of a user terminal, where the method includes receiving, by a controller, an authentication packet...
SYSTEMS AND METHODS FOR PRIVATELY PERFORMING APPLICATION SECURITY ANALYSIS
Systems and methods for analyzing applications on a mobile device for risk so as to maintain the privacy of the application user are provided. In the example...
ANONYMOUS SIGNATURE SCHEME
Technologies are generally described for providing an anonymous signature scheme. In some examples, a method performed under control of an end device ma 320...
The disclosed invention is a system and method that allows for authentication of a user to a network using a token. The token interacts with a device and...
Apparatus and Method for Host Abstracted Networked Authorization
An information handling system includes a host processing system and an authentication processing system. The authentication processing system authenticates to...
Method and System for Verifying the Identity of a User of an Online
A method for verifying the identity of a user of an online service, with the steps of: when a user is connected (A1) to an online service (2), sending (A2) an...
AUTHENTICATION SYSTEM, AUTHENTICATION METHOD AND SERVICE PROVIDING SYSTEM
An authentication system comprising an authentication terminal and an authentication server is provided. The authentication terminal comprises an...
An authentication terminal comprising an authentication apparatus authenticating an authentication subject, an artifact operating in accordance with an input...
SYSTEMS AND METHODS FOR AUTHENTICATING A USER BASED ON SELF-PORTRAIT MEDIA
Systems, methods, and non-transitory computer-readable media can receive an indication that a user is attempting to authenticate as a particular identity. A...