At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
TECHNOLOGIES FOR MANAGING COMPROMISED SENSORS IN VIRTUALIZED ENVIRONMENTS
Systems, methods, and computer-readable media for managing compromised sensors in multi-tiered virtualized environments. In some embodiments, a system can...
SYSTEM AND METHOD OF ASSIGNING REPUTATION SCORES TO HOSTS
A method provides for receiving network traffic from a host having a host IP address and operating in a data center, and analyzing a malware tracker for IP...
DOMAIN NAME SYSTEM (DNS) BASED ANOMALY DETECTION
In one embodiment, a method includes receiving at an analytics module operating at a network device, network traffic data collected from a plurality of sensors...
METHOD AND APPARATUS FOR GROUPING FEATURES INTO BINS WITH SELECTED BIN
BOUNDARIES FOR USE IN ANOMALY DETECTION
In one embodiment, a method includes receiving network data at an analytics device, identifying features for the network data at the analytics device, grouping...
UNAUTHORIZED BEACON DETECTION
A method to detect unauthorized beacons includes receiving position information that defines a positional pattern for a plurality of authorized beacons,...
Method and Apparatus for Classifying and Combining Computer Attack
A method and apparatus for classifying and combining computer attack information identifying as malicious events, events in a network that cause...
METHOD AND SYSTEM FOR DETECTING RESTRICTED CONTENT ASSOCIATED WITH
In embodiments of the present invention improved capabilities are described for detecting restricted content associated with retrieved content. The method and...
MANAGING DYNAMIC DECEPTIVE ENVIRONMENTS
A deception management system to detect attackers within a dynamically changing network, including a deployment governor dynamically designating a deception...
ANOMALY DETECTION THROUGH HEADER FIELD ENTROPY
An approach for detecting anomalous flows in a network using header field entropy. This can be useful in detecting anomalous or malicious traffic that may...
GEO VISUALIZATION OF NETWORK FLOWS
The present technology is directed to mapping flow data and overlaying it on a geographic map. Furthermore the geographical map can also display attacks and...
SYSTEM AND METHOD OF DETECTING HIDDEN PROCESSES BY ANALYZING PACKET FLOWS
A method includes capturing first data associated with a first packet flow originating from a first host using a first capture agent deployed at the first host...
SYNTHETIC DATA FOR DETERMINING HEALTH OF A NETWORK SECURITY SYSTEM
An example method can include choosing a pattern or patterns of network traffic. This pattern can be representative of a certain type of traffic such as an...
INTRA-DATACENTER ATTACK DETECTION
An example method can include receiving a traffic report from a sensor and using the traffic report to detect intra-datacenter flows. These intra-datacenter...
SYSTEM AND METHOD FOR CREATION, DEPLOYMENT AND MANAGEMENT OF AUGMENTED
A network surveillance system including a deception management server within a network, including a deployment module managing and planting decoy attack...
APPARATUS, SYSTEM AND METHOD FOR DETECTING AND PREVENTING MALICIOUS
SCRIPTS USING CODE PATTERN-BASED STATIC...
Provided are an apparatus, a system and a method for detecting and preventing malicious scripts. The apparatus for detecting and preventing malicious scripts...
Routing Systems and Methods
Example routing systems and methods are described. In one implementation, an apparatus includes a network interface, a secure system, and a routing system...
Rapid Configuration Security System for Industrial Control Infrastructure
A template for implementing a control system with security features provides a generic control program and device programs for distribution to industrial...
SYSTEM FOR MONITORING AND MANAGING DATACENTERS
An example method includes detecting, using sensors, packets throughout a datacenter. The sensors can then send packet logs to various collectors which can...
STATELESS WEB CONTENT ANTI-AUTOMATION
A computer-implemented method for coordinating content transformation includes receiving, at a computer server subsystem and from a web server system, computer...
METHOD AND APPARATUS FOR DETECTING MALWARE INFECTION
In one embodiment, the present invention is a method and apparatus for detecting malware infection. One embodiment of a method for detecting a malware...
Evolving Rule Based Contact Exchange
Methods and systems are described for managing a user's contact data which use evolving sequential sets of rules where the applicability of each set depends...
SYSTEM AND METHOD FOR TARGETED MESSAGING, WORKFLOW MANAGEMENT, AND DIGITAL
RIGHTS MANAGEMENT FOR GEOFEEDS
The disclosure relates to systems and methods for targeted messaging, workflow management, and digital rights management for geofeeds, including content that...
ADJUSTING ENTERPRISE SECURITY USING A MOBILE DEVICE
A system and method for facilitating configuring software security functionality. An example method includes employing a first computing device to collect...
METHODS AND APPARATUS TO CONTROL COMMUNICATIONS OF ENDPOINTS IN AN
INDUSTRIAL ENTERPRISE SYSTEM BASED ON INTEGRITY
Methods and apparatus to control communications of endpoints in an industrial enterprise system based on integrity are disclosed. An example apparatus includes...
UTILIZATION OF MULTIPLE KEYPADS FOR PASSWORD INPUTS
A computer program product includes program instructions to generate a first virtual keypad for entry of a first portion of a password, wherein the first...
SYSTEM AND METHOD FOR CONTROLLING RESOURCES IN AN INTERNET OF THINGS
The present disclosure relates to system(s) and method(s) for systems and methods for controlling resources in an Internet of Things (IoT) network. The system...
Account Access Recovery System, Method And Apparatus
Some embodiments of the invention provide a program for recovering access to a service associated with an account. The program provides a login credential to...
SYSTEM AND METHOD FOR USING PER-APPLICATION PROFILES IN A COMPUTING DEVICE
Systems and methods for creating and managing per-application profiles are disclosed. A method may include receiving input designating at least a first profile...
ACCESSING AN APPLICATION THROUGH APPLICATION CLIENTS AND WEB BROWSERS
A request from an application client is received at a protected application. The request includes an access token. A grant information associated with the...
SYSTEMS AND METHODS FOR PERFORMING OPERATIONS ON A COMPUTING DEVICE
Methods and systems for performing one or more operations on a first computing device are disclosed. A method includes receiving, from a second computing...
System For Secure File Access
A virtual local file system for managing file access, such as read, write and execute, of files on local media is disclosed. An access manager, executable by...
METHOD FOR SECURING ELECTRONIC DATA BY RESTRICTING ACCESS AND TRANSMISSION
OF THE DATA
A method for securing data by embedding the data in a data structure and utilizing a sensor to detect transfer of the data structure. The data is embedded such...
INACTIVE NON-BLOCKING AUTOMATED AGENT DETECTION
Online retailers may operate one or more services configured to detect requests generated by automated agents. A CAPTCHA may be transmitted in response to...
METHOD, APPARATUS, AND SYSTEM FOR ACCESS CONTROL OF SHARED DATA
A method for access control of shared data includes a data access requester transmitting a request for accessing a shared data to a data storage dealer,...
A technique for network authentication interoperability involves initiating an authentication procedure on a first network, authenticating on a second network,...
INTEGRATED HOSTED DIRECTORY
Methods, systems, and devices for enterprise-wide management of disparate devices, applications, and users are described. A cloud-based central server may...
PROVIDING DEVICES AS A SERVICE
Devices, such as hardware security modules, are provided as a service. A customer of a computing resource provider is able to request the addition of a device...
Methods and Systems for Using Deep-Strings in Computation and
Computer and communications systems and methods are provided in which a first computing system sends a second computing system a message and an associated...
FACIAL CAPTURE MANAGING ACCESS TO RESOURCES BY A DEVICE
Disclosed are various embodiments for controlling access to resources by a client device. Methods may include receiving a user request to access a resource on...
APPARATUS, SYSTEM AND METHOD EMPLOYING A WIRELESS USER-DEVICE
Embodiments of the invention generally relate to apparatus, systems and methods for authenticating an entity for computer and/or network security and for...
SERVICE PROVISION SYSTEM, INFORMATION PROCESSING SYSTEM, INFORMATION
PROCESSING APPARATUS, AND SERVICE...
A service provision system includes a processor configured to provide a predetermined service based on first authentication information issued by an external...
TRUSTED STATUS TRANSFER BETWEEN ASSOCIATED DEVICES
The embodiments set forth systems and techniques to authenticate a user device for device services, such as by transferring or extending a trusted device...
CONTROLLING A DISCOVERY COMPONENT, WITHIN A VIRTUAL ENVIRONMENT, THAT
SENDS AUTHENTICATED DATA TO A DISCOVERY...
A discovery bundle component is applied in a virtual image deployed within a virtual environment, wherein the discovery bundle automatically discovers asset...
SERVICE PROVIDING METHOD, SERVICE REQUESTING METHOD, INFORMATION
PROCESSING DEVICE, AND CLIENT DEVICE
A service providing method, the method includes generating, by an information processing device, data relating to a session and a cookie relating to a...
SECURE AUTHENTICATED DISTANCE MEASUREMENT
The invention relates to a method for a first communication device to perform authenticated distance measurement between the first communication device and a...
AUTOMATIC PROVISIONING OF A DEVICE TO ACCESS AN ACCOUNT
A system for bootstrap provisioning of a device is provided. A vouching device is provisioned to access a bootstrap account of a bootstrap account provider and...
DISTRIBUTED WHITE LIST FOR SECURITY RENEWABILITY
To provide for security and robustness in distribution of high value video content such as UHD video, a white list is provided that does not grant default...
SYSTEM AND METHOD FOR ANTIVIRUS CHECKING OF FILES BASED ON LEVEL OF TRUST
OF THEIR DIGITAL CERTIFICATES
Disclosed are systems, methods and computer program products for antivirus checking of files based on level of trust of their digital certificates. An example...
RESET AND RECOVERY OF MANAGED SECURITY CREDENTIALS
Disclosed are various embodiments for management functions relating to security credentials. Account data, which includes multiple security credentials for...
PRIVATE SIMULTANEOUS AUTHENTICATION OF EQUALS
A passphrase is assigned to an end user device for use in authenticating the end user device for a network using SAE. An identification of the end user device...