At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
METHOD OF PROTECTING A NETWORK COMPUTER SYSTEM FROM THE MALICIOUS ACTS OF
HACKERS AND ITS OWN SYSTEM ADMINISTRATORS
A method that protects a network computer system from the malicious acts of hackers and its own system administrators includes a behavior analysis of system...
SOFTWARE TAMPERING DETECTION AND REPORTING PROCESS
A method is disclosed. The method includes determining, by a security software application on a communication device, that the communication device has been...
DENIAL OF SERVICE AND OTHER RESOURCE EXHAUSTION DEFENSE AND MITIGATION
USING TRANSITION TRACKING
Described is a method and system for determining a suspect in a resource exhaustion attack, for example DDoS (Distributed Denial of Service Attack), against a...
METHOD FOR DETECTING INTRUSION IN NETWORK
A method for detecting an intrusion in a network is disclosed. The network includes a plurality of nodes for data transmission/reception and switches for...
METHODS AND APPARATUS FOR APPLICATION ISOLATION
Processor(s) for detecting malicious software. A hardware virtual machine monitor (HVMM) operates under a host OS. Container(s) initialized with network...
DETECTION OF A MALICIOUS PERIPHERAL
Particular embodiments described herein provide for an electronic device that can be configured to determine when a peripheral is connected to the electronic...
DETERMINING A REPUTATION THROUGH NETWORK CHARACTERISTICS
Particular embodiments described herein provide for an electronic device that can be configured to monitor network traffic to and from a device, compare the...
HTML SECURITY GATEWAY
A technique allows a client computing system with a web browser to receive a web page in response to transmitting a request for content. The web page may...
ADAPTING USER TERMINAL APPLICATION OPERATION RESPONSIVE TO MEASURED USER
User profile information is generated which characterizes measured user's interaction with an application program that is encapsulated by the computer readable...
Equipment And Network Health Monitoring Using Security Systems
A monitoring system is continuously coupled to and in communication with a selected network. The system monitors characteristics of the network, and also...
RELIABLE SELECTION OF SECURITY COUNTERMEASURES
Among other things, this document describes a computer-implemented security method such as for authenticated selection of security countermeasures and for...
COMPUTER DEFENSES AND COUNTERATTACKS
A method includes instantiating a first detection agent based on detection criteria, where the first detection agent includes first program code executable by...
SYSTEMS AND METHODS FOR STERILIZING EMAIL ATTACHMENTS AND OTHER
COMMUNICATIONS DELIVERED BY EMAIL
A system for sterilizing data sent through electronic messages includes first computing circuitry configured to receive a first electronic communication...
In an example, a computing device may an input verification engine (IVE) that provides input verification services within a trusted execution environment...
Application with Multiple Operation Modes
A method and system for operating an application with multiple modes are described. A plurality of applications may be presented to a user on a mobile device...
SYSTEMS AND METHODS FOR SECURE LOCATION-BASED DOCUMENT VIEWING
A computer-implemented method, the method being performed in a computerized system incorporating a central processing unit, a localization signal receiver, a...
SYSTEMS AND METHODS OF GEO-LOCATION BASED COMMUNITY OF INTEREST
The embodiments described herein recite a geo-location based community of interest (COI) system and method which add the capability to configure Network...
METHOD AND SYSTEM FOR PROVIDING PERMISSIONS MANAGEMENT
Reference architecture pattern role data representing reference architecture pattern roles to be associated with entities taking part in the development,...
Social network privacy management systems and methods
A first privacy setting notification is provided to a user. Events are monitored to determine satisfaction of a privacy trigger condition based at least in...
SECURITY AND PERMISSION ARCHITECTURE
When a user inputs an action request, such as a requested command, to be performed on a target machine, a management system receives the request and verifies...
SYSTEM PLATFORM FOR CONTEXT-BASED CONFIGURATION OF COMMUNICATION CHANNELS
The techniques described herein include configuration of channels between devices and service providers at a connectable system platform. For example, a system...
UNIFIED IDENTITY VERIFICATION
Apparatus, systems, and methods are disclosed that operate to receiving an authentication request at a server associated with an authenticating entity from a...
CLOUD-BASED DATA PROVIDING METHOD AND SYSTEM
The present invention relates to a cloud based data providing method and a cloud based data providing system, and more particularly, to a method and a system...
System and Method for Associating a Universal User Identification and a
Domain Specific User Identification
There is presented a system and method for associating a domain transcendent identification (ID) of a user and a domain specific ID of the user, the system...
METHOD, APPARATUS AND SYSTEM FOR CLIENT ACCESSING AUTHENTICATED WEB
The invention discloses a method, an apparatus and a system for a client accessing an authenticated web address. The method comprises: automatically querying a...
METHOD AND SYSTEM RELATED TO AUTHENTICATION OF USERS FOR ACCESSING DATA
The present invention relates to a system and method for authenticating a user that requests access to services of a computer network, comprising using a...
Self-Organizing Trusted Networks
Organizing a trusted network includes receive, by a local device, a message from a first remote trusted device identifying a first service hosted by the first...
WEB FORM PROTECTION
A request for a web page is received and the requested web page is retrieved. The web page is modified to obfuscate a set of form attribute values into a...
PRESENTING AUTHORIZED DATA TO A TARGET SYSTEM
Embodiments of the invention are directed to systems, methods, and computer program products for presenting authorized data to a target system. The system is...
MULTI-SOURCE CONTENT GENERATION
As may be implemented in accordance with one or more embodiments, specific electronic magazines are generated based on user interests as follows. Respective...
WLAN AUTHENTICATION ACCESS CONTROL
Authentication control for devices within a cellular network is provided. The authentication between a device and an authenticating entity within the cellular...
Automatic Configuration of Household Playback Devices
An example implementation involves a first playback device receiving, from a remote server over a wide area network, a configuration table corresponding to a...
APPARATUS AND METHOD FOR SECURE PROVISIONING OF A COMMUNICATION DEVICE
A system that incorporates the subject disclosure may perform, for example, receiving an over-the-air programming message that includes programming data for...
AUTOMATED SECURITY TOKEN ADMINISTRATIVE SERVICES
This invention provides a system, method and computer program product to allow a user to access administrative security features associated with the use of a...
APPARATUS MANAGEMENT SYSTEM, APPARATUS MANAGEMENT METHOD, AND PROGRAM
A apparatus management system includes: a forwarding node(s) that supplies identification information that uniquely identifies an individual terminal to a...
TECHNIQUES FOR LOAD BALANCING IN A PACKET DISTRIBUTION SYSTEM
Various embodiments are generally directed to techniques to distribute encrypted packets among multiple cores in a load-balanced manner for further processing....
IDENTITY ATTESTATION OF A MINOR VIA A PARENT
A technique allows a parentally attested security token to serve as authentication for a minor using identifying attributes of the minor child. The security...
Wireless Pairing and Communication Between Devices Using Biometric Data
In a first implementation, a host determines to pair with a device and transmits biometric data for a user to the device. The device receives the transmitted...
SYSTEM AND METHOD FOR GENERATING A BIOMETRIC IDENTIFIER
Systems and methods are provided for recording a user's biometric features and generating an identifier representative of the user's biometric features using...
SYSTEM AND METHOD FOR DETERMINING LIVENESS
Systems and methods are provided for recording a user's biometric features and generating an identifier representative of the user's biometric features and...
METHOD AND APPARATUS FOR PROCESSING A RTCWEB AUTHENTICATION
Systems and methods of processing a real-time communication in web-browsers (RTCWEB) authentication by a first server are disclosed. These include receiving a...
CONTINUOUS AUTHENTICATION OF MOBILE DEVICE USERS
Technology for performing continuous authentication of a mobile device utilizes user activity context data and biometric signature data related to the user. A...
USER PROFILE SELECTION USING CONTEXTUAL AUTHENTICATION
In embodiments, apparatuses, methods and storage media (transitory and non-transitory) are described that are associated with user profile selection using...
MOBILE USER INTERFACE SYSTEM AND METHODS THEREFOR
A system. At least some embodiments are a system including a first processor and a non-volatile random access memory coupled to the first processor, the...
SYSTEMS AND METHODS FOR ANONYMOUS AUTHENTICATION USING MULTIPLE DEVICES
A system and method of anonymous authentication is described. In operation, the authenticator receives a request to access a resource from one of the user...
TRUST ESTABLISHMENT BETWEEN A TRUSTED EXECUTION ENVIRONMENT AND PERIPHERAL
Technologies are provided in embodiments to establish trust between a trusted execution environment (TEE) and a peripheral device. Embodiments are configured...
SEPARATED USE MOBILE DEVICES
Separated use mobile devices may be provided having multiple memories associated respectively with multiple operating environments that are managed by a common...
TRUSTED EPHEMERAL IDENTIFIER TO CREATE A GROUP FOR A SERIVCE AND/OR TO
PROVIDE THE SERVICE
Devices and methods may provide for generating and/or using a trusted ephemeral identifier (TEID) to create a group for a service, and/or to provide the...
EXTENSION OF TRUST IN A BODY AREA NETWORK
Systems and techniques for extension of trust in a body area network are described herein. A device that may be a potential participant of the body area...
AUTHENTICATOR DEVICE FACILITATING FILE SECURITY
Disclosed are various embodiments for facilitating the encryption of files as well as facilitating requiring a user to employ an authenticator device in order...