At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
LAWFUL INTERCEPTION IN A WI-FI / PACKET CORE NETWORK ACCESS
A method, by an authentication unit of a wireless access network, allows anchoring of a data packet session of a user entity connected to the wireless access...
Providing A Managed Browser
Methods, systems, computer-readable media, and apparatuses for providing a managed browser are presented. In various embodiments, a computing device may load a...
Method to Modify Android Application Life Cycle to Control Its Execution
in a Containerized Workspace Environment
Methods, devices, and systems are described to modify the life cycle of a Google Android.RTM. application, in its application manifest file and byte code, such...
ADAPTATION OF ACCESS RULES FOR A DATA INTERCHANGE BETWEEN A FIRST NETWORK
AND A SECOND NETWORK
Adapting access rules for a data interchange between a first network and a second network by the second network is provided based on a service-specific...
Enabling an on-premises resource to be exposed to a public cloud
application securely and seamlessly
An application deployed in a public cloud is enabled to access an on-premises resource securely and without requiring additional ports on a firewall. A pair of...
Advanced asset tracking and correlation
A security management system may be remotely deployed (e.g., using a cloud-based architecture) to add security to an enterprise network. For example, the...
INTELLIGENT CONTENT GHOSTING ON MOBILE DEVICES
A method includes performing operations as follows on a processor: receiving a request for a content item from a mobile device, determining that the content...
DYNAMIC PROVISIONING OF PROTECTION SOFTWARE IN A HOST INTRUSION PREVENTION
Methods and apparatus for optimizing security configurations of a set of computers are disclosed. A set of local servers, each functioning as a deep-security...
IDENTIFICATION OF TRUSTED WEBSITES
This document describes techniques for identifying trusted websites. In one embodiment, a computer system can receive a request from user to access a website...
System and Method for Identification and Blocking of Unwanted Network
Network traffic can be prevented from entering a protected network. An alert can be received that can be triggered by network traffic that matches at least one...
Network Traffic Data Scrubbing With Services Offered via Anycasted
Novel tools and techniques for filtering network traffic in an anycasting environment includes receiving network traffic addressed to a plurality of anycasted...
METHOD AND APPARATUS FOR IDENTIFYING MALICIOUS WEBSITE
Disclosed are a method and an apparatus for identifying a malicious website, the method including: acquiring uniform resource locators (URLs) of websites...
METHODS FOR DETERMINING CROSS-SITE SCRIPTING AND RELATED VULNERABILITIES
The invention provides computer-implemented methods and computer systems for testing applications such as web-based (HTTP) applications for cross-site...
Monitoring and Managing User Privacy Levels
Various embodiments pertain to techniques for measuring a user's privacy level as a user interacts with various web services. In various embodiments, entities...
SYSTEM AND METHOD FOR MONITORING NETWORK TRAFFIC
Described is a method of assigning a network address to a trap, the network address being a dark address of a virtual private network. The network traffic...
ANALYZE CODE THAT USES WEB FRAMEWORK USING LOCAL PARAMETER MODEL
Example embodiments disclosed herein relate to analyze code of a web application associated with a framework. The code is loaded. Data objects of the framework...
METHOD AND SYSTEM FOR IDENTIFYING A THREATENING NETWORK
A system and method for identifying a threatening network is provided. The system comprises a network movement before/after algorithm that provides a graphical...
RISK MANAGEMENT IN AN AIR-GAPPED ENVIRONMENT
This disclosure provides for risk management in an air-gapped environment. A method includes collecting data, by a risk manager system, from a plurality of...
Systems and methods for automated selection of payloads for use in a security scan of a web application by a security scanner are described herein. More...
System and Method of Cyber Threat Intensity Determination and Application
to Cyber Threat Mitigation
A security system comprising a computer, a memory, a data store comprising a plurality of consensus evaluations and a plurality of cyber threat analyst...
System and Method of Cyber Threat Structure Mapping and Application to
Cyber Threat Mitigation
A security system comprising a computer, a memory, a data store comprising a cyber threat intent dictionary and a technology dictionary; and an application...
APPARATUS AND METHODS FOR DATA COLLECTION, ANALYSIS AND SERVICE
MODIFICATION BASED ON ONLINE ACTIVITY
Methods and apparatus for evaluating collected data relating to online activity, and modification of services within a service provider network. In one...
VOLUMETRIC EVENT FORECASTING TOOL
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for forecasting event volumes. One of the methods includes...
METHODS FOR ENHANCING RAPID DATA ANALYSIS
A method for enhancing rapid data analysis includes receiving a set of data; storing the set of data in a first set of data shards sharded by a first field;...
DETECTION OF ANOMALOUS NETWORK ACTIVITY
Access to web services is managed. Metrics associated with accesses to a service are collected, and the metrics include activities associated with a user. A...
INFORMATION PROCESSING SYSTEM AND INFORMATION PROCESSING METHOD
An information processing system includes circuitry configured to request a mail server to provide mail data addressed to a user, extract link data included in...
SYSTEMS AND METHODS FOR DETERMINING TRUSTWORTHINESS OF THE SIGNALING AND
DATA EXCHANGE BETWEEN NETWORK SYSTEMS
A method of determining real-time operational integrity of an application or service operating on a computing device, the method including inspecting network...
SECURITY EVENT DETECTION THROUGH VIRTUAL MACHINE INTROSPECTION
Methods and apparatus are disclosed for security event detection through virtual machine introspection. Example methods involve monitoring usage of a plurality...
MAINTAINING DYNAMIC CONFIGURATION INFORMATION OF A MULTI-HOST OFF-CLUSTER
SERVICE ON A CLUSTER
Techniques for maintaining dynamic configuration information of a multi-host off-cluster service on a cluster are described. An apparatus may comprise a...
SYSTEM AND METHOD FOR AUTHENTICATION OF A COMMUNICATION DEVICE
A system and method for authentication of a communication device is disclosed. A system that incorporates teachings of the present disclosure may include, for...
DECODING OF ENCRYPTED FILE
A method and system for decoding an encrypted file. A recipient computer of a recipient: extracts an encoded address from a filename of the encrypted file,...
INFORMATION SHARING FOR THIRD PARTY APPLICATIONS IN CELLULAR
A method, system and computer program product are disclosed for providing content to a communications device. In an embodiment of the invention, a ...
VALIDATION OF A LOCATION RESOURCE BASED ON RECIPIENT ACCESS
Aspects of the present disclosure relate to a method, a system, and a computer program product for validating a location resource, e.g., a hyperlink, embedded...
CONTROLLING OPERATION OF A MACHINE AND DESCRIBING ACTIONS PERFORMED BY THE
MACHINE THROUGH A SOCIAL NETWORKING...
A social networking system includes information identifying a machine (e.g., a robot, a drone, a computer, a thermostat, etc.) and a connection between the...
SYSTEM OF THIRD PARTY CONTROL OF NETWORK CONNECTED DEVICES
A system of controlling one or more building control devices. The system may incorporate receiving from a third party a request for access to a user account at...
CONVEYING REQUESTS TO SERVICE PERSONS USING AVATARS ACTING AS PROXIES
In accordance with an exemplary embodiment of the present invention, an avatar object is presented which is well-suited for the NewWave service platform. An...
DEVICE WITH EMBEDDED NETWORK SUBSCRIPTION AND METHODS
An electronic device with a network subscription is provided. The device comprises an embedded secure element including a subscription identification code for...
MANAGING LIMITED NETWORK ACCESS CONFIGURATION
A system, a method, and a computer program product for managing network configuration by a controller. A request to connect a device to a network is received....
PORTABLE ELECTRONIC DEVICE WITH USER-CONFIGURABLE API DATA ENDPOINT
In various example embodiments, systems, devices, methods, and media for configurable data endpoints are presented. In one example, a system comprises a...
Identifying a Measure of Online Security
A computer-implemented method includes retrieving, by one or more processing devices and from one or more data repositories, user information; generating,...
CLIENT-SITE DOM API ACCESS CONTROL
A method of restricting usage of a Document Object Model (DOM) application programming interfaces (API) is disclosed. A DOM virtualization layer intercepts a...
Method and System for Credential Management
A security system comprises an access control node broadcasting a beacon including a time stamp and user devices generating replies to the beacon that are...
Automatic Key Management Using Enterprise User Identity Management
A method forms a key pair for a user. The key pair has a public key and a private key that is unique to the user and that is encrypted using a passphrase...
METHOD FOR SECURED COMMUNICATION BETWEEN AN OPERATING SYSTEM OF A TERMINAL
AND A DEVICE DISTINCT FROM THE TERMINAL
Disclosed are methods, systems, and devices for secure communication between an operating system of a terminal and a device distinct from the terminal, the...
MUTUAL AUTHENTICATION WITH INTEGRATED USER MUSCLE MEMORY
A method for mutual authentication between a client device and authentication server is provided whereby an account identifier is sent from the client device...
TOGGLING BIOMETRIC AUTHENTICATION
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for receiving user input indicating a first user selection...
LOCAL USER AUTHENTICATION WITH NEURO AND NEURO-MECHANICAL FINGERPRINTS
In accordance with one embodiment, a method for locally verifying the identification of a user with an electronic device is disclosed. The method includes...
WEARABLE DEVICE AND OPERATING METHOD THEREOF
A wearable device is provided. The wearable device including a sensor configured to detect a wearing state of the wearable device and to obtain authentication...
SYSTEM AND METHOD FOR BIOMETRIC AUTHENTICATION WITH DEVICE ATTESTATION
A system, apparatus, method, and machine readable medium are described for biometric device attestation. For example, one embodiment of an apparatus includes:...
SYSTEM AND A METHOD FOR VALIDATING AN IDENTIFICATION TOKEN
An Identification Device (10) for providing validation information comprising: a Token (11) and a Validator (20); wherein the display (17) is adapted to...