At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Threat Indicator Analytics System
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for analyzing threat intelligence information. One of the...
METHOD AND SYSTEM FOR CHECKING SECURITY OF URL FOR MOBILE TERMINAL
A method for checking security of a URL for a mobile terminal includes: receiving a URL security check request sent by a mobile terminal, where the URL...
MALICIOUS ATTACK DETECTION METHOD AND APPARATUS
A malicious attack detection method includes: receiving, by a controller, a Packet-in message sent by a switch, where the Packet-in message includes a source...
PREDICTIVE ANALYTICS UTILIZING REAL TIME EVENTS
A method and system for providing predictive analytics which include calculating forecast trend curves utilizing historical events, determining which of the...
SECURITY ACTION OF NETWORK PACKET BASED ON SIGNATURE AND REPUTATION
Example embodiments disclosed herein relate to perform a security action, (e.g., filtering) based on reputation and a signature match. A reputation is...
SOFTWARE PROGRAM IDENTIFICATION BASED ON PROGRAM BEHAVIOR
Operations performed by a software application instance executed by a computing device are monitored. A determination is made that a particular operation...
A service logic layer module receives an application message forwarded by a network device, classifies and identifies an application type of the application...
Scalable Network Security Detection And Prevention Platform
This disclosure provides a network security architecture that permits installation of different software security products as virtual machines (VMs). By...
DEPLOYING A SECURITY APPLIANCE SYSTEM IN A HIGH AVAILABILITY ENVIRONMENT
WITHOUT EXTRA NETWORK BURDEN
A security appliance system routing strings of data packets in a high availability environment. The security appliance system contains a plurality of intrusion...
METHODS AND SYSTEMS FOR PROVIDING SECURITY TO DISTRIBUTED MICROSERVICES
Systems for providing security to distributed microservices are provided herein. In some embodiments, a system includes a plurality of microservices, each of...
Large Scale Malicious Process Detection
Identify a set or session of processes as having certain characteristics. A method obtains a known set or session of processes, wherein the known set or...
Methods and systems for malware analysis
Methods, system, and media for analyzing a potential malware sample are disclosed. A sample for malware analysis may be received. The sample may be received...
SYSTEMS AND METHODS FOR MALWARE NULLIFICATION
Generally discussed herein are systems, devices, and methods for malware nullification. A system can include a detect module to identify a file type of an...
Method for network security using statistical object identification
Methods to enforce network policy based on identity authentication at a network endpoint device by offloading the authentication to a network attached...
APPARATUS FOR VERIFYING SAFETY OF RESOURCE, SERVER THEREOF, AND METHOD
According to an exemplary embodiment, an apparatus for verifying safety of a resource may include: a resource requester to request a resource to an origin...
APPLICATION PLATFORM WITH FLEXIBLE PERMISSIONING
Systems and methods are provided for an application platform with flexible permissioning according to one or more embodiments. In one embodiment, an...
METHOD, SYSTEM, AND APPARATUS FOR MANAGING AND STORING DATA BASED ON
Methods, systems, and devices for managing and storing sensitive sensor data received at a storage server. The system includes a storage server and a sensor...
DYNAMIC DATA MASKING FOR MAINFRAME APPLICATION
This disclosure relates generally to data masking, and more particularly to method and system for dynamic data masking for mainframe application. In one...
ANONYMOUSLY SHARING RESOURCES BASED ON SOCIAL NETWORK USER DATA
"A method for controlling access to a resource of an owner of the resource is provided. The owner can be a user of a resource computer system. The access...
TRANSACTION AUTHORIZATION USING A VOCALIZED CHALLENGE
A method of transaction authorization, includes, at a server: receiving, from a computerized transaction system, transaction request data responsive to a user...
Wireless Communication Apparatus, Information Processing Apparatus,
Communication System, and Method of...
Provided is a wireless communication apparatus including an accepting unit that accepts a transfer operation to transfer a connection right from a first...
Venue-Specific Wi-Fi Connectivity Notifications
A method includes receiving a wireless connection request at a backend computing device from a user device to allow wireless connection of the user device to a...
SYSTEMS AND METHODS FOR CLOUD-BASED NETWORK CONTROL
A method is described. The method includes receiving an access request from a router, the router having received the access request from a client device, the...
System and Method for Anonymous Biometric Access Control
A database stored in a server includes records of biometric templates associated with non-personally identifiable information about of individuals, used for...
METHOD, SYSTEM AND DEVICE FOR NETWORK AUTHORIZATION BASED ON NO PASSWORD
OR RANDOM PASSWORD
Disclosed are a method, system and device for network authorization based on no password or a random password, the method comprising: a network access device...
Meeting Join for Meeting Device
Various embodiments enable an application on a first device to log into an online meeting in association with a trusted entity, such as a trusted user. Once...
METHODS AND SYSTEMS FOR MANAGING A NODE
The present invention discloses methods and systems for managing a node through a management server. The management server verifies whether a management...
BROADCAST-BASED TRUST ESTABLISHMENT
A method and apparatus for device authentication are provided. In the method and apparatus, authentication data for a first device is received. The first...
Range Based User Identification and Profile Determination
An embodiment includes a main compute node that detects the physical presence of a first user and subsequently loads a profile for the first user. The main...
COMMUNICATION APPARATUS, COMMUNICATION CONTROL METHOD, AND
COMPUTER-READABLE RECORDING MEDIUM
A communication apparatus includes a first communication unit that transmits connection data of a second network to an electronic device by way of a first...
DYNAMIC DISTRIBUTION OF AUTHENTICATION SESSIONS
This disclosure relates to authenticating and providing transport security over unsecured IP networks to network subscribers. The system includes an...
MULTI-FACTOR USER AUTHENTICATION
Embodiments of the present invention relates to a multi-factor authentication system and method using an authentication device, a browsing device and an...
METHODS AND SYSTEMS FOR MANAGING NETWORK ACTIVITY USING BIOMETRICS
The present disclosure describes systems and methods for managing network traffic using biometrics. A server may store a first value N, a primitive root modulo...
PERSON AUTHENTICATION METHOD
According to one embodiment, a person authentication method includes obtaining, from a medium carried by a person who passes through a first position, first...
Methods of Tracking and Utilizing Location Data, Biometric Data,
Multibiometric Data and Other Associated Data...
The present invention provides enhanced security through multi-biometrics, collected from the same object where each species of biometric is correlated to the...
SYSTEM AND APPARATUS FOR BIOMETRIC IDENTIFICATION OF A UNIQUE USER AND
AUTHORIZATION OF THE UNIQUE USER
A verification device provides an approach to identification and authorization by requiring an authorized biometric presence before permitting the input of a...
ON DEMAND PASSWORDS
In one embodiment, a user password is received in relation to a user identifier, wherein the user identifier and user password are associated with a user...
REISSUE OF CRYPTOGRAPHIC CREDENTIALS
Effecting reissue in a data processing system of a cryptographic credential certifying a set of attributes, the credential being initially bound to a first...
Methods and Systems for Controlling Mobile Terminal Access to a
The present disclosure includes an exemplary method for controlling access to a third-party server by a mobile terminal. The method comprises: acquiring, at...
DETECTING SHARING OF PASSWORDS FOR PASSWORD PROTECTED USER ACCOUNTS
A method for detecting the sharing of a password related to a password protected user account provided by an organization, by multiple entities of the...
Method for Connecting to Wi-Fi Hotspot Device, Wi-Fi Hotspot Device, and
A method for connecting to a Wi-Fi hotspot device, the Wi-Fi hotspot device, and a user equipment (UE), where the method includes generating, by the Wi-Fi...
PROTECTING PASSWORDS AND BIOMETRICS AGAINST BACK-END SECURITY BREACHES
A method and system are provided for authenticating a user to an application back-end using a key pair and one or more bearer tokens such as a password, a...
SYSTEM AND METHOD FOR MANAGING OFFLINE AND ONLINE PASSWORD BASED
A method and system has been provided in which the security of passwords in general and offline passwords in particular can be enhanced and which can enable...
METHODS AND SYSTEMS FOR PROVIDING A LOW VALUE TOKEN BUFFER
Embodiments of the present invention are directed at methods and systems for providing a low value token buffer using only low value tokens (i.e., tokens that...
DISPLAY APPARATUS AND CONTROL METHOD FOR DISPLAY APPARATUS
A display apparatus includes a display section configured to display an image on a display surface, a storing section configured to store a first code and...
INFORMATION SHARING SYSTEM AND PROGRAM
An information sharing system suitable for sharing golf-related information among a plurality of golf players enables mutual communication between a server...
EXTENSION OF AUTHORIZATION FRAMEWORK
To provide better administrative access control for allowing access to network applications, an authorization framework is extended by dynamically adding...
Location And Device Based Student Access Control
Techniques are described for controlling access to an online service by a one or more authentication mechanisms based on device, browser, or location, or a...
Network Supporting Two-Factor Authentication for Modules with Embedded
Universal Integrated Circuit Cards
A network with a set of servers can support authentication from a module, where the module includes an embedded universal integrated circuit card (eUICC). The...
LOCATION SERVICE FOR USER AUTHENTICATION
A method and apparatus for location authentication of the user are disclosed. In the method and apparatus, the location of the user is authenticated if one or...