At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
METHOD AND SYSTEM FOR BLOCKING MALICIOUS THIRD PARTY SITE TAGGING
The present teaching relates to blocking malicious third party site tagging using content security policy (CSP). A request to access a web page is first...
Information Technology Security Assessment System
A method and system for creating a composite security rating from security characterization data of a third party computer system. The security...
SYSTEMS AND METHODS FOR EVALUATING CONTENT PROVIDED TO USERS VIA USER
The disclosed computer-implemented method for evaluating content provided to users via user interfaces may include (1) monitoring, as part of a security...
AUTOMATICALLY GENERATING ALERTS BASED ON INFORMATION OBTAINED FROM SEARCH
RESULTS IN A QUERY-PROCESSING SYSTEM
The disclosed embodiments relate to a system that generates an alert based on information extracted from search results generated by a query. During operation,...
INFORMATION PROCESSING APPARATUS, METHOD FOR DETERMINING ACTIVITY AND
An information processing apparatus is provided with: a comparison unit that compares a communication by a terminal connected to a network with a pattern held...
INFORMATION PROCESSING APPARATUS, METHOD AND COMPUTER-READABLE MEDIUM
An information processing apparatus includes: a specification unit that specifies a phase of activity of terminals by comparing communication between terminals...
ADVANCED PERSISTENT THREAT DETECTION
A variety of techniques are disclosed for detection of advanced persistent threats and similar malware. In one aspect, the detection of certain network traffic...
SYSTEMS AND METHODS FOR MONITORING AND MITIGATING NETWORK ATTACKS
In a system for detecting and optionally blocking packets from an attacker, an improved multi-hash process, in which rate information for one or more packet...
DATA PROTECTION IN A NETWORKED COMPUTING ENVIRONMENT
Approaches for providing data protection in a networked computing environment are provided. A method includes detecting, by at least one computer device, a...
SYSTEM CONVERSION IN A NETWORKED COMPUTING ENVIRONMENT
Approaches for providing security in a networked computing environment are provided. The method includes detecting, by at least one computer device, a breach...
SYSTEM AND METHOD TO DETECT AND MITIGATE TCP WINDOW ATTACKS
A computer system and method for monitoring traffic for determining denial of service attacks in a network. Data packets are monitored which are attempting to...
APPLYING GROUP POLICIES
Information corresponding to a set of signatures is maintained, and for each signature in the set, an associated group policy of a network is maintained. A...
METHOD, APPARATUS, SYSTEM, AND COMPUTER READABLE MEDIUM FOR PROVIDING
Technologies are provided in embodiments for receiving policy information associated with at least one security exception, the security exception relating to...
Preventing Execution of Programs that are Embedded in Email Messages
Systems and methods are presented which generate modified email messages, which are largely devoid of embedded functions, from original email messages, which...
Computer Imposed Countermeasures Driven by Malware Lineage
A system to identify and counter computer malware. The system comprises a processor, a memory, a data store comprising information about known computer...
Authenticated Communication Between Security Devices
Apparatuses, computer readable media, and methods establishing and maintaining trust between security devices for distributing media content are provided. Two...
SEALING SECRET DATA WITH A POLICY THAT INCLUDES A SENSOR-BASED CONSTRAINT
Technologies pertaining to limiting access to secret data through utilization of sensor-based constraints are described herein. A sensor-based constraint is a...
SYSTEMS AND METHODS FOR PROFILING CLIENT DEVICES
Systems and methods are provided for providing generating and managing profiles. Such systems and methods may be implemented to control access to a function of...
Remote Processing of Mobile Applications
In an example implementation of the disclosed technology, a method includes accessing, by a management agent associated with a client device, a profile...
Network Authentication Of Multiple Profile Accesses From A Single Remote
A network authentication system and method is described for authenticating multiple profile accesses from a single remote device. A device remote from a web...
Network System and Control Method of a Network System, and a Control
In a system having a control server and a control device that connects to the control server through a global network, the control device can appropriately...
DETECTING UNAUTHORIZED RISKY OR INEFFICIENT USAGE OF PRIVILEGED
CREDENTIALS THROUGH ANALYSIS OF TASK COMPLETION...
A privileged account management system can maintain a database that defines a normal amount of time that it takes to perform a task associated with a reason...
METHOD FOR DETECTING AND DEALING WITH UNAUTHORIZED FRAMES IN VEHICLE
A method for dealing with unauthorized frames that makes it possible to take appropriate measures when an unauthorized data frame is detected in a vehicle...
SECURE ACCESS TO REMOTE RESOURCES OVER A NETWORK
A client computer hosts a virtual private network tool to establish a virtual private network connection with a remote network. Upon startup, the virtual...
System and Method for Secure Control of Resources of Wireless Mobile
Systems and methods for secure control of a wireless mobile communication device are disclosed. Each of a plurality of domains includes at least one wireless...
MULTINODE HUBS FOR TRUSTED COMPUTING
Embodiments of multinode hubs for trust operations are disclosed herein. In some embodiments, a multinode hub may include a plurality of memory regions, a...
SEMICONDUCTOR DEVICE FOR CONTROLLING ACCESS RIGHT TO RESOURCE BASED ON
PAIRING TECHNIQUE AND METHOD THEREOF
A method of operating a hub includes the hub receiving a pairing request from an Internet of Things (IoT) device, the hub performing pairing with the IoT...
METHODS AND DEVICES FOR PERMISSION MANAGEMENT
Methods and devices are provided for permission management. In the method, the terminal obtains fingerprint information of a user based on a touch operation on...
Filtering Content In An Online System Based On Text And Image Signals
Extracted From The Content
The disclosure relates (a) a method and computer program product for training a content classifier and (b) a method and computer program product for using the...
PRIVILEGED ACCESS TO TARGET SERVICES
A method of providing a client with a privileged access ticket (PAT) to access a target service is performed at a credentials management service (CMS) in...
Automated Device Provisioning and Activation
A message link server maintains secure message links with device link agents on each of a plurality of wireless end-user devices. Plural network elements send...
SYSTEM, METHOD, AND APPARATUS FOR SECURE IDENTITY AUTHENTICATION
A method for authentication is disclosed. The method may be implemented by a terminal device. The method may comprise generating, by a starting unit of the...
ACCESS NETWORK ASSISTED BOOTSTRAPPING
The Generic Bootstrapping Architecture is used in a method for assigning the bootstrapping transaction ID so that a machine-to-machine server or other device...
SELF-SERVICE TERMINAL SECURE BOOT DEVICE ORDER MODIFICATION
Various embodiments herein each include at least one of systems, methods, and software for SST secure boot device order modification. One such embodiment, in...
MUTUAL AUTHENTICATION METHOD AND SYSTEM WITH NETWORK IN MACHINE TYPE
The present invention discloses a method for a Mobile Mobility Entity (MME) to carry out mutual authentication with a group of Machine Type Communication (MTC)...
Facial Profile Password to Modify User Account Data for Hands-Free
An account management system establishes an account for a user. The user enters user account information into the account and the account management system...
CONTROLLED SUBSTANCE TRACKING SYSTEM AND METHOD
The present disclosure provides a controlled substance tracking system and method that can be used in the management and transfer of controlled substances in a...
METHOD USING A SINGLE AUTHENTICATION DEVICE TO AUTHENTICATE A USER TO A
SERVICE PROVIDER AMONG A PLURALITY OF...
A method for authenticating a user to a provider, among a plurality of providers. The method uses an authentication device comprising, for each of provider, a...
DIGITAL CHARMS SYSTEM AND METHOD
A system and method for controlling access to a digital asset. A first host device is provided to a first host device owner and rights are determined to a...
OFFLINE ACCESS CONTROL FOR AN APPLICATION
Techniques to facilitate offline access control for an application associated with an industrial automation environment are disclosed herein. In at least one...
SECURITY TOKEN WITH EMBEDDED DATA
A system and method are presented that provide authentication tokens to a local device from a remote server. The authentication token incorporates standard...
A secure identifier is derived, using a secured microcontroller of a computing device, that is unique to a pairing of the computing device and a particular...
METHOD AND SYSTEM FOR ONE-TIME PASSWORD GENERATION AND DISPLAY
A system and method are provided for the on-demand generation and display of a one-time password (OTP). A display is coupled to a computing device having at...
METHOD, MANAGEMENT APPARATUS AND DEVICE FOR CERTIFICATE-BASED
AUTHENTICATION OF COMMUNICATION PARTNERS IN A DEVICE
A certificate-based authentication of communication partners in a device is provided and has the first method step of identification of a target frame for the...
MULTI-FACTOR AUTHORIZATION FOR IEEE 802.1X-ENABLED NETWORKS
The present disclosure discloses a system and method for providing multi-factor authorization for IEEE 802.1x-enabled networks. Specifically, a network device...
Secure Import and Export of Keying Material
An embodiment includes a method executed by at least one processor of a first computing node comprising: generating a key pair including a first public key and...
UPDATING STORED PASSWORDS
A device may include an authentication server and a server. The authentication server may receive a first form of a password from a client device in accordance...
DIGITAL CERTIFICATION ANALYZER TEMPORARY EXTERNAL SECURED STORAGE
A digital certification analyzer (or "analyzer") provides protection for digital content stored on servers, file sharing systems, hard drives and USB enabled...
Location Determination for User Authentication
User authentication techniques based on geographical locations associated with a client device is provided. A network connection can be established between two...
OBTAINING DATA FOR CONNECTION TO A DEVICE VIA A NETWORK
Method for managing data for connection to a device via a network. The method includes: receiving, by a referencing server, originating from the device, data...