At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
APPARATUS, SYSTEM, AND METHOD OF DETERMINING DESTINATION FOR STATE
INFORMATION, AND RECORDING MEDIUM
A control system includes a plurality of control apparatuses each capable of controlling a first communication terminal connected to the control apparatus....
ADAPTIVE VOICE COMMUNICATION SYSTEM AND METHOD BASED ON HYPERTEXT
A system and method of performing voice communication over a hypertext transport protocol (HTTP)-based network. The adaptive voice communication system...
INFORMATION PROCESSING APPARATUS AND DETERMINATION RESULT PROVIDING METHOD
An information processing apparatus includes a determination unit configured to determine whether a first communication port used by a first communication...
Controlling a PBX Phone Call Via a Client Application
In one or more embodiments, a hit test thread which is separate from the main thread, e.g. the user interface thread, is utilized for hit testing on web...
SHARING DATA ACROSS PROFILES
Systems, methods, and software can be used to share data across profiles. In some aspects, a first request from a first application for application data...
SYSTEM AND METHOD OF MONITORING AND CONTROLLING APPLICATION FILES
A system and method for updating, monitoring, and controlling applications on a workstation. The workstation includes a workstation management module...
MEDIA MANAGEMENT AND SHARING SYSTEM
The distribution of media clips stored on one or more servers is controlled using updateable permissions or rules defined by a content owner. The clip is made...
COMMUNICATIONS SECURITY SYSTEMS
A method of establishing secure communications between a first computer, eg a client computer, and a second computer, eg a web server, whereby the client...
SECURE DATA REDACTION AND MASKING IN INTERCEPTED DATA INTERACTIONS
A system, and computer program product for modifying intercepted data interactions are provided in the illustrative embodiments. At a security application...
CLIENT/SERVER POLYMORPHISM USING POLYMORPHIC HOOKS
Computer systems and methods in various embodiments are configured for improving the security and efficiency of client computers interacting with server...
NETWORK-BASED SECURE INPUT/OUTPUT (I/O) MODULE (SIOM)
A Secure Input/Output (I/O) Module (SIOM) is networked-enabled providing secure communications with terminals and peripherals integrated into the terminals....
SECURE TRANSMISSION METHOD AND SYSTEM
A secure transmission method and system that can reduce the channel capacity of an eavesdropper even in an environment in which there is no direct path between...
DYNAMIC SECURITY SANDBOXING BASED ON INTRUDER INTENT
A method of security sandboxing which may include detecting an illicit intrusion to a computer on a first computer system; cloning the intruded computer;...
SYSTEMS, DEVICES, AND METHODS FOR IMPROVED NETWORK SECURITY
Embodiments relate to systems, devices, and computing-implemented methods for providing DoS mitigation using a list of persistent clients generated using...
Automated Cyber Threat Mitigation Coordinator
Various computer systems and networks may benefit from an automated cyber threat mitigation coordinator. A related method can include receiving, at a server,...
PERSISTENT CROSS-SITE SCRIPTING VULNERABILITY DETECTION
Various techniques for detecting a persistent cross-site scripting vulnerability are described herein. In one example, a method includes detecting, via the...
PERSISTENT CROSS-SITE SCRIPTING VULNERABILITY DETECTION
A system and program product are described herein for various techniques for detecting a persistent cross-site scripting vulnerability are described herein. In...
DIGITAL DYE PACKS
Embodiments relate to systems and methods for providing digital dye packs in connection with a transaction via a device user interface. In an embodiment, a...
Method For Intrusion Detection In Industrial Automation And Control System
A method and system for automatic signalling an alert when a possible intrusion occurs in an industrial automation and control system, based on security events...
SYSTEM AND METHOD FOR NETWORK DATA CHARACTERIZATION
Described herein are embodiments of a system and method for network data characterization and/or classification that overcome the defects of the prior art....
Method(s) and apparatus are described for use in preventing unauthorised redirection and/or routing of packets transmitted in a communication network. Packets...
SECURITY LOG MINING DEVICES, METHODS, AND SYSTEMS
Devices, methods, and systems for security log mining are described herein. One method includes combining, using a data fusion unit of an access control...
METHOD AND SYSTEM TO MODIFY FUNCTION CALLS FROM WITHIN CONTENT PUBLISHED
BY A TRUSTED WEB SITE
A network-based publication system, to publish data over a communications network, includes an interface to receive, via the communications network and from a...
Detecting the Introduction of Alien Content
A computer-implemented method for identifying abnormal computer behavior includes receiving, at a computer server subsystem, data that characterizes subsets of...
SYSTEM AND METHOD FOR REAL-TIME REMEDIATION RESPECTIVE OF SECURITY
A system, an apparatus, and a method thereof identifies at least one security threat in an enterprise's network. The system characterizes sources affected by...
SYSTEMS AND METHODS FOR MALICIOUS CODE DETECTION
There is provided a computer implemented method for detection and prevention of an attempt at establishment of a network connection for malicious...
METHOD AND SYSTEM FOR DETECTING THREATS USING PASSIVE CLUSTER MAPPING
An approach for detecting network threats is disclosed, that may involve receiving network traffic, plotting the network traffic in a n-dimensional feature...
DETERMINING A LEGITIMATE ACCESS POINT RESPONSE
A first request is sent from a station to an access point. The station receives a first response from the access point that includes a first sequence number,...
ILLEGAL MESSAGE DESTROYER
A communication apparatus for preventing the broadcasting of unauthorised messages on a broadcast bus network, the communication apparatus comprising: a...
COLLABORATIVE NETWORK SECURITY
Security is managed on a collaboration of plural computers that together define a trusted network environment. Each computer presents one or more real services...
MONITORING USE OF A SENSOR OF A COMPUTING DEVICE
Monitoring use of a sensor of a computing device. A sensor obtains information from an environment of the computing device. A co-processor provides...
Methods and Systems For Providing Comprehensive Cyber-Security Protection
Using An Open Application Programming...
Methods of providing cyber-security services to a plurality of customers include providing a platform that includes a software program that is configured to...
SYSTEMS AND METHODS FOR PROTECTING AGAINST UNAUTHORIZED NETWORK INTRUSIONS
The disclosed computer-implemented method for protecting against unauthorized network intrusions may include (1) identifying a signal received by one or more...
Methods, Systems, and Products for Identity Verification
Methods, systems, and products verify an identity claimed by a person. A signature, representing the presence of a device, is acquired. The signature is...
SECURE GROUP CREATION IN PROXIMITY BASED SERVICE COMMUNICATION
A method of forming a secure group in ProSe communication includes requesting a service request to a ProSe server from a requesting device (21), the service...
SYSTEM AND METHODS FOR PROTECTING USERS FROM MALICIOUS CONTENT
A method, system and device for allowing the secure collection of sensitive information is provided. The device includes a display, and a user interface...
Systems and Methods for Facilitating Access to Private Files Using a Cloud
A method for providing access to objects associated with a particular client in a cloud storage system is disclosed. The method includes the steps of...
SYSTEMS AND METHODOLOGIES FOR CONTROLLING ACCESS TO A FILE SYSTEM
A method for controlling access to a file system having data elements, including the steps of maintaining a record of respective actual accesses by users of...
Systems and Methods for Automatic Discovery of Systems and Accounts
In various embodiments, a method comprises scanning a directory structure to generate a scan result comprising a plurality of discovered systems, identifying...
KEY MANAGEMENT SYSTEM FOR TOLL-FREE DATA SERVICE
A system may receive a network address to be validated to determine whether the network address is associated with a toll-free data service. The system may...
VISUALIZATION OF ACCESS INFORMATION
A request to access a resource is received from a machine. The request contains machine data. Contextual information is retrieved from the request based on one...
TRUSTED PERIPHERAL DEVICE FOR A HOST IN A SHARED ELECTRONIC ENVIRONMENT
A trusted peripheral device can be utilized with an electronic resource, such as a host machine, in order to enable the secured performance of security and...
METHOD AND APPARATUS FOR SPECIFYING TIME-VARYING INTELLIGENT
A method and an apparatus for specifying a time-varying, intelligent service-oriented model are provided. A method implemented in a computer infrastructure...
TARGETED USER ACCESS CONTROL SYSTEM
A system includes a network interface, at least one processing device, and at least one memory device. The at least one memory device stores instructions that...
SECURE INFORMATION INTERACTION METHOD FOR ELECTRONIC RESOURCES TRANSFER
The invention proposes a security information interaction method. In the method, a first security information interaction terminal executes a security...
SECURITY PROFILE MANAGEMENT IN A MACHINE-TO-MACHINE MESSAGING SYSTEM
Techniques and systems for managing security profiles in a machine-to-machine messaging system are provided. For example, computing device, a method, and a...
Method and Nodes for Authorizing Network Access
The embodiments herein relate to a method performed by an AAA server (103) for enabling authorization of a wireless device (101) to access a first network...
METHOD OF PROVIDING FRESH KEYS FOR MESSAGE AUTHENTICATION
The present invention provides a method of operating a mobile unit in a wireless communication system. Embodiments of the method may include providing access...
User Consent for Generic Bootstrapping Architecture
It is disclosed a method and a bootstrapping client (33) for assuring that a particular user (31) is present at local user authentication. It is also disclosed...
Access Control in an Information Centric Network
A node (17, 21) in an information centric network (ICN) receives a first identifier associated with an information object. The node (17, 21) causes creation of...