At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
METHOD AND APPARATUS FOR DISTRIBUTING FIREWALL RULES
Some embodiments of the invention provide a novel method for specifying firewall rules. In some embodiments, the method provides the ability to specify for a...
DISTRIBUTED SECURE CONTENT DELIVERY
Techniques for distributed and secure content delivery are provided. Requests for content are routed to a centralized service where the requestors are...
SYSTEM AND RELATED METHOD FOR NETWORK MONITORING AND CONTROL BASED ON
A network architecture system that expands the control network administrators have on existing networks. The system provides application identification and...
REAL-TIME MOBILE SECURITY POSTURE
In an example, a system and method for real-time mobile security posture updates is provided. A mobile device management (MDM) agent may run on the mobile...
WIDE AREA NETWORK ACCESS MANAGEMENT COMPUTER
A system and method for connecting a classified internet protocol (IP) network to a public IP network including an unclassified computing device. The...
TECHNOLOGIES FOR MANAGING NETWORK PRIVILEGES BASED ON PHYSICAL PRESENCE
Technologies for managing network privileges of members of graft-network include detecting a computing device in physical presence with a network ...
PLUGGABLE API FIREWALL FILTER
A web server includes a servlet and a pluggable API firewall filter coupled to the servlet. The pluggable filter protects the web server from content based...
SYSTEM FOR DETECTING THREATS USING SCENARIO-BASED TRACKING OF INTERNAL AND
EXTERNAL NETWORK TRAFFIC
Disclosed is an improved approach to implement a system and method for detecting insider threats, where models are constructed that is capable of defining what...
CLOUD BASED LOGGING SERVICE
Methods and systems are provided for facilitating access to a cloud-based logging service. According to one embodiment, access to a cloud-based logging service...
METHODS OF UNSUPERVISED ANOMALY DETECTION USING A GEOMETRIC FRAMEWORK
A method for unsupervised anomaly detection, which are algorithms that are designed to process unlabeled data. Data elements are mapped to a feature space...
SYSTEM FOR IMPLEMENTING THREAT DETECTION USING DAILY NETWORK TRAFFIC
A method and system for identifying insider threats within an organization is provided. The approach constructs an internal connectivity graph to identify...
SYSTEM FOR IMPLEMENTING THREAT DETECTION USING THREAT AND RISK ASSESSMENT
OF ASSET-ACTOR INTERACTIONS
Disclosed is an approach to detect insider threats, by tracking unusual access activity for a specific user or computer with regard to accessing key assets...
ACCELERATED THREAT MITIGATION SYSTEM
An intrusion detection and prevention system and method for dealing with threats to computers and computer networks, and in particular to computers and...
Methods and Systems of Detecting and Analyzing Correlated Operations in a
A method of detecting correlated operations in a common storage. The method comprises providing at least one input operation, each the input operation being...
BLOCKING INTRUSION ATTACKS AT AN OFFENDING HOST
A method, apparatus, and program product are provided for protecting a network from intrusions. An offending packet communicated by an offending host coupled...
Secured Automated or Semi-Automated Systems
Secured automated or semi-automated systems are provided herein. In one embodiment, a sensor system includes a sensor, a legacy computing environment that is...
SYSTEM AND METHOD FOR IDENTIFICATION OF AUTOMATED BROWSER AGENTS
Disclosed herein are methods and systems for evaluating web browser behavior to report on human versus non-human activity, based on varying analyses of...
ALERT TRANSMISSION METHOD, COMPUTER-READABLE RECORDING MEDIUM, AND ALERT
An alert transmission method is disclosed. Behavior logs of multiple users are collected from multiple terminals. A computer groups users having a high...
NETWORK MONITORING SYSTEM AND METHOD
A disclosed network monitoring method includes: obtaining, by a first apparatus, packets from a node outside a network to a first terminal in the network, and...
METHOD AND SYSTEM FOR DETECTING THREATS USING METADATA VECTORS
An approach for detecting network attacks using metadata vectors may initially involve receiving network communications or packets, extracting metadata items...
MICROVISOR-BASED MALWARE DETECTION ENDPOINT ARCHITECTURE
A threat-aware microvisor may be deployed in a malware detection endpoint architecture and execute on an endpoint to provide exploit and malware detection...
RICH METADATA-BASED NETWORK SECURITY MONITORING AND ANALYSIS
Network security monitoring for external threats is provided that is based on rich metadata collected from internal network traffic that is analyzed for...
METHOD AND SYSTEM FOR MISUSE DETECTION
This disclosure discusses methods, systems, and an apparatus that can determine whether email content is potentially malicious, contains potentially malicious...
Zero-Day Rotating Guest Image Profile
According to one embodiment, a threat detection platform features a housing, a communication interface, a processor coupled to the communication interface, and...
APPLICATION MALWARE ISOLATION VIA HARDWARE SEPARATION
A system for application malware isolation via hardware separation for use in a networked server-client system in the event of a possible malicious intrusion...
SYSTEMS AND METHODS FOR MONITORING VIRTUAL NETWORKS
The disclosed computer-implemented method for monitoring virtual networks may include (1) identifying a virtual network containing at least one virtualized...
USER TERMINAL, SERVICE PROVIDING APPARATUS, DRIVING METHOD OF USER
TERMINAL, DRIVING METHOD OF SERVICE...
A user terminal, a service providing apparatus, a driving method of a user terminal, a driving method of a service providing apparatus, and an encryption...
SECURE NEIGHBOR DISCOVERY (SEND) USING PRE-SHARED KEY
An extension is provided to the SEND protocol without requiring a CGA or third party trust anchor. A shared key is provided to both a sender and receiver of a...
MESSAGE SENDER AUTHENTICITY VALIDATION
In an example, a system and method are provided for validating the sender of a message, such as an e-mail, text message, voice mail, network message, internet...
METHOD AND SYSTEM FOR NETWORK VALIDATION OF INFORMATION
Embodiments of the present application relate to a method for network validation of information, a system for network validation of information, and a computer...
AUTHENTICATION BASED ON PROXIMATE DEVICES
In one embodiment, a computer-implemented method includes, in response to an attempt by a user to perform a transaction using a computing device, accessing a...
SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR PUBLICLY PROVIDING WEB
CONTENT USING A MULTI-TENANT SYSTEM
In accordance with embodiments, there are provided mechanisms and methods for publicly providing web content of a tenant using a multi-tenant on-demand...
CROSS PLATFORM SOCIAL NETWORKING AUTHENTICATION SYSTEM
Disclosed in one example is a method of authenticating with multiple social network services. The method may include storing first authentication information...
IMPLEMENTING USER-SPECIFIED TRANSACTION PARAMETERS FOR TRANSFERRING
DIGITAL CONTENT ITEMS AMONGST USERS
A computing system and/or network environment in which users can transfer (or initiate transfer of) digital content items to other users in accordance with a...
Access Requests at IAM System Implementing IAM Data Model
Systems and methods are provided for provisioning access rights to physical computing resources using an IAM system implementing an IAM data model. The IAM...
METHOD AND APPARATUS FOR CONTROLLING DATA PERMISSIONS
Methods and apparatus for controlling data permission are disclosed herein, and embodiments include generating a relational database that includes entity...
Methods and Systems for Managing Permissions to Access Mobile Device
In an electronic device, a first application sends a request to a second application for access by the first application to a resource of the electronic...
METHOD, APPARATUS, AND SYSTEM FOR RESTRICTING ACCESS
Techniques for restricting access to sensitive application(s) or data to a limited physical area are disclosed. Various embodiments are described in which a...
SYSTEMS FOR NETWORK RISK ASSESSMENT INCLUDING PROCESSING OF USER ACCESS
RIGHTS ASSOCIATED WITH A NETWORK OF DEVICES
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for network risk assessment. One of the methods includes...
METHOD FOR FILE SCRUBBING IN A SECURITY GATEWAY FOR THREAT PREVENTION
Methods and systems for blocking reception of digital content elements by devices are disclosed. These methods and systems comprise elements of hardware and...
TECHNOLOGIES FOR ACCESS CONTROL
Technologies for performing access control include a computing device that parses a network packet received by the computing device to identify an n-tuple of a...
CAPTCHA CHALLENGE INCORPORATING OBFUSCATED CHARACTERS
A method for determining if a user of a computer system is a human. A processor receives an indication that a computer security program is needed and acquires...
REQUEST-SPECIFIC AUTHENTICATION FOR ACCESSING WEB SERVICE RESOURCES
Requests for access to Web service resources are evaluated based on the type of request that is received. Requests are not granted unless sufficient proof of...
Method for Operating a Security Element
A method for operating a security element, preferably in the form of a chip card, having a processor, and a memory. stores an operating system comprising an...
PEER TO PEER ENTERPRISE FILE SHARING
Disclosed are various embodiments for facilitating the distribution of files from a file repository. Files from a file repository can be distributed via peer...
PROTECTING SUPERVISOR MODE INFORMATION
Embodiments of an invention for protecting supervisor mode information are disclosed. In one embodiment, an apparatus includes a storage location, instruction...
RELAYED NETWORK ACCESS CONTROL SYSTEMS AND METHODS
A computer system for authenticating and managing network traffic may comprise a network link providing a connection to a network, an authentication,...
SERVICE AUTHORITY DETERMINATION METHOD AND DEVICE
Provided are a service authority determination method and device. The method comprises: receiving a web (Web) application identifier sent by access equipment;...
METHOD AND APPARATUS FOR ACCESSING WEBSITE
Disclosed are methods and apparatus for accessing a website. A method may comprise: acquiring a web address that meets a preset condition; determining a server...
INTROSPECTION METHOD AND APPARATUS FOR NETWORK ACCESS FILTERING
Some embodiments of the invention provide a method for performing network access filtering and/or categorization through guest introspection (GI) on a device....