At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
METHODS FOR OPTIMIZING AN AUTOMATED DETERMINATION IN REAL-TIME OF A RISK
RATING OF CYBER-ATTACK AND DEVICES THEREOF
This technology extracts threat data in real time from received incident data on each of one or more current cyber-attacks. Classified data associated with one...
Intrusion Detection and Radio Fingerprint Tracking
A transmitter is configured to change its unique radio signature enough to defeat radio fingerprinting identification without destroying the content of the...
GEOGRAPHICAL INTRUSION RESPONSE PRIORITIZATION MAPPING THROUGH
AUTHENTICATION AND FLIGHT DATA CORRELATION
Preferred systems and methods for geographically mapping intrusions through network or authentication data and flight data correlation are described. In one...
METHOD AND APPARATUS FOR PERFORMING INTRUSION DETECTION WITH REDUCED
A method and apparatus can be configured to receive, by a first network intrusion detection system, packet data that is transmitted in network traffic. The...
System and Method for Detecting and Protecting Against Malicious Content
The invention relates to computer security and to systems and methods for detecting and protecting against malicious content such as computer viruses. Gateway...
WEB MALWARE BLOCKING THROUGH PARALLEL RESOURCE RENDERING
Apparatus and method for transforming Web resources into safe versions such that malicious code on the resources cannot attack the client viewing the...
COMMUNICATION SYSTEM AND METHOD
A communication analysis method is implemented in a first device that receives communication frames originating from a second device. The first device and the...
SECURE WIRELESS LOCATION INTERFACE PROTOCOL
Systems and techniques for time-of-flight (ToF) location determination, such as WiFi fine time measurement, with secure connections are described herein. A...
SYSTEM AND METHOD TO AGGREGATE CONTROL OF MULTIPLE DEVICES VIA MULTICAST
MESSAGES AND AUTOMATIC SET UP OF...
A method and apparatus are provided to aggregate control of multiple devices. In some methods, a downstream controller can advertise a service group of the...
USING CONNECTIONS BETWEEN USERS IN A SOCIAL NETWORKING SYSTEM TO REGULATE
OPERATION OF A MACHINE ASSOCIATED...
A social networking system includes information identifying a machine (e.g., a robot, a drone, a computer, a thermostat, etc.) and a connection between the...
USING A WIRELESS TRANSMITTER AND RECEIVER TO PREVENT UNAUTHORIZED ACCESS
TO RESTRICTED COMPUTER SYSTEMS
A method and system for automatically terminating a logout session for a restricted access system by determining that an authorized user has left the vicinity...
OVER THE AIR MANAGEMENT OF PAYMENT APPLICATION INSTALLED IN MOBILE DEVICE
Systems, apparatus, and methods for managing an application installed on a mobile device, such as a mobile phone are provided, so as to prevent or limit...
CONFIRMING AN IDENTITY OF A USER OF A SOCIAL NETWORK
In cases where a user of a social network has lost access to one or more email addresses on file with the social network, the social network may confirm an...
Reconciliation of Access Rights in a Computing System
Systems and methods are provide for reconciling access rights of a computing system are described. Access right information that respectively corresponds to...
AUTHORIZATION TOKEN CACHE SYSTEM AND METHOD
A system includes one or more processors to request access tokens from a token service computer, cache the access tokens and related information in a token...
METHOD AND APPARATUS FOR USE WITH DIFFERENT MEMORY MAPS
An apparatus has a data store configured to store access activity information. The access activity information indicates which one or more of a plurality of...
METHODS AND APPARATUS FOR LARGE SCALE DISTRIBUTION OF ELECTRONIC ACCESS
Methods and apparatus for large scale distribution of electronic access control clients. In one aspect, a tiered security software protocol is disclosed. In...
PASSWORD ENTRY THROUGH TEMPORALLY-UNIQUE TAP SEQUENCE
Embodiments replace a password with a tap sequence. Systems and methods receive tapping signals at an input sensor. A learned sequence of taps and correlation...
DEVICE AUTHENTICATION WITHIN DEPLOYABLE COMPUTING ENVIRONMENT
A deployable computing environment may facilitate interaction and data sharing between users and devices. Users, devices, and relationships between the users...
Secure Shell (SSH) Proxy for a Platform-as-a-Service System
Implementations provide for a secure shell (SSH) proxy for a Platform-as-a-Service (PaaS) system. A method of the disclosure includes receiving, by a...
NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM FOR STORING APPLICATION
PROGRAM FOR NETWORK CERTIFICATION
A non-transitory computer readable storage medium for storing an application program for network certification is disclosed. The application program is...
SYSTEM AND METHOD FOR VERIFYING STATUS OF AN AUTHENTICATION DEVICE
A system and method that includes receiving a first device profile and associating the first device profile with a first application instance that is assigned...
HIGHLY SCALABLE, FAULT TOLERANT REMOTE ACCESS ARCHITECTURE AND METHOD OF
Systems and methods for providing a remote access to a service in a client-server remote access system. The method includes selecting, by a scheduler, an...
INTERNET OF THINGS SYSTEM AND CONTROL METHOD THEREOF
A system includes first electronic devices and a digital signature carrier. Each of the first electronic devices has a network identifier distinct from...
SYSTEM AND METHOD OF CONTROLLING NETWORK ACCESS
A method of accessing an enterprise network is provided. A request to access the enterprise network is received at a network access node from a user device....
OUT-OF-BAND BIOMETRIC ENROLLMENT AND VERIFICATION USING INTERACTIVE
A system and method for enabling out of band biometric verification is disclosed. The system includes a biometric engine coupled with an interactive messaging...
CLOUD-BASED BIOMETRIC ENROLLMENT, IDENTIFICATION AND VERIFICATION THROUGH
A system and method for cloud-based biometric enrollment, identification and verification are disclosed. More specifically, a cloud-based system and method is...
AUTHENTICATION USING INDIVIDUAL'S INHERENT EXPRESSION AS SECONDARY
A method and system are provided. The method includes training for one or more secondary signatures of a user. The method further includes identifying one or...
MOTION BASED AUTHENTICATION SYSTEMS AND METHODS
A motion-based authentication method of authenticating a user with a mobile device is provided. A pre-training routine is conducted to detect an orientation...
METHOD AND SYSTEM FOR IMPROVED SECURITY
An improved authentication method and system is provided where a user securely accesses a variety of target servers for online email, online banking, credit...
AUTHORITY TRUSTED SECURE SYSTEM COMPONENT
One embodiment is in the form of a Self-Service Terminal (SST), such as an automated teller machine (ATM). The SST includes a peripheral device, such as a cash...
WIRELESS AUTHENTICATION SYSTEM AND WIRELESS AUTHENTICATION METHOD FOR ONE
TIME PASSWORD OF MOBILE COMMUNICATION...
Provided is a one time password (OTP) authentication system and an OTP authentication method using a mobile communication terminal having a near field...
TERMINAL DEVICE AND INFORMATION PROCESSING DEVICE
There is provided a terminal device including a mobile communication unit configured to perform mobile communication of a mobile communication network, an...
VIRTUAL SUBSCRIBER IDENTITY MODULE
A mobile trusted platform (MTP) configured to provide virtual subscriber identify module (vSIM) services is disclosed. In one embodiment, the MTP includes: a...
USING REPRESENTATIONAL STATE TRANSFER (REST) FOR CONSENT MANAGEMENT
Techniques are disclosed for sending, from an application executing on a device associated with a user, through a Representational State Transfer (REST)-based...
SYSTEM AND METHOD FOR SECURE ACCESS OF A REMOTE SYSTEM
A system and method for providing a user with secure access to devices operatively connected to a network comprising at least one processing device that has...
Methods and Apparatus of Key Pairing for D2D Devices under Different D2D
Methods and apparatus are provided for key pairing between peer D2D UEs in different eNBs or D2D areas. A method may comprise: receiving at a first access...
INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND
[Object] To provide an information processing apparatus through which a safe and convenient user authentication mechanism is implemented according to a public...
IMAGE FORMING SYSTEM HAVING USER AUTHENTICATION FUNCTION, IMAGE FORMING
APPARATUS, METHOD OF CONTROLLING IMAGE...
An image forming system capable of preventing a change in the data structure of information other than information included in a command transmitted to an...
SYSTEMS AND METHODS FOR THE SECURE SHARING OF DATA
In various embodiments, a computer-implemented method for sharing tasks over one or more computer networks is disclosed. The method includes providing a task...
Secret Supplemental Username
Methods for a secret supplemental username are provided. In one example, a method includes the steps of detecting a threat to an account with a primary...
SYSTEMS AND METHODS FOR DEPLOYING RICH INTERNET APPLICATIONS IN A SECURE
Systems and methods for deploying rich internet applications in a secure computing environment. An example computer system comprises: a hardware processor and...
SYSTEM AND METHOD FOR POOL-BASED IDENTITY AUTHENTICATION FOR SERVICE
ACCESS WITHOUT USE OF STORED CREDENTIALS
A computer-implemented system and method for pool-based identity authentication for service access without use of stored credentials is disclosed. The method...
A communication apparatus includes a holding unit, an updating unit, an authentication unit, a mode controller, and a mode acquisition unit. The holding unit...
Portal authentication method, broadband network gateway, portal server and
Disclosed is a portal authentication method including: sending, by a portal server, an information query message to the Broadcast Network Gateway (BNG)...
AUTHENTICATION SURVIVABILITY FOR ASSIGNING ROLE AND VLAN BASED ON CACHED
A system and method is described that allows the assignment of roles and/or VLANs to an authenticated client device even when an external remote authentication...
METHODS AND SYSTEMS FOR COMMUNICATING WITH AN M2M DEVICE
Method, apparatus and system for communicating between a machine to machine, M2M, device 110 and a device management, DM, server 420 over SMS, comprising:...
METHOD, APPARATUS, AND SYSTEM FOR QUANTUM KEY DISTRIBUTION
A quantum key distribution system includes a quantum security key management (QSKM) device, a plurality of quantum security key distribution (QSKD) devices,...
Key Exchange Through a Trusted Proxy
Techniques for exchanging security keys via a trusted proxy are provided. For example, a method may include receiving, at a computing device, a communication...
MULTIPLE RECIPIENT MESSAGE ENCRYPTION
A method performed by a computing system includes receiving instructions from a user to divide content of a message into a plurality of parts, associating a...