At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
TRAFFIC FEATURE INFORMATION EXTRACTION METHOD, TRAFFIC FEATURE INFORMATION
EXTRACTION DEVICE, AND TRAFFIC...
A traffic feature information extraction method including a regular expression process, a clustering process, and a feature information extraction process. The...
Method and Apparatus for File Identification
The present application discloses a method and an apparatus for file identification. The method for file identification comprises: determining a virus family...
SYSTEM, APPARATUS AND METHOD FOR TRANSFERRING OWNERSHIP OF A DEVICE FROM
MANUFACTURER TO USER USING AN EMBEDDED...
In one embodiment, a method includes receiving, in an on-boarding system for a first network, a request to transfer ownership of a first device having a...
Protection of communication on a vehicular network via a remote security
Methods and systems for protecting components of a linked vehicle from cyber-attack are disclosed. These methods and systems comprise elements of hardware and...
MALICIOUS ENCRYPTED NETWORK TRAFFIC IDENTIFICATION
A malicious encrypted traffic detector connected to a computer network, the detector comprising: a Shannon entropy estimator; an entropy comparator; a store...
DOMAIN CLASSIFICATION USING DOMAIN CO-OCCURRENCE INFORMATION
Domain classification based on domain co-occurrence information derived from client request behavior is provided. The network requests of clients are analyzed...
MANAGED DISSEMINATION OF LOCATION DATA
A location provider manages dissemination of location data of a user to one or more third-party services, so that the user can take advantage of services...
SYSTEMS AND METHODS OF USING GEOLOCATION VERIFICATION
Systems and methods for displaying one or more submissions are described. One such exemplar method includes: (i) accepting, from a client device associated...
AUTHENTICATION SERVER SYSTEM, METHOD, AND STORAGE MEDIUM
An authentication server system issues a first-type token for verification of whether a user operating a terminal is a valid user and a second-type token for...
Group User Experience
Disclosed is a method, system and computer programs to provide emergent behavior in a network of connected mobile user devices. The method includes advertising...
INTELLIGENT MANAGEMENT OF APPLICATION CONNECTIVITY
Network connectivity is selectively established by monitoring, on a client, communications activity incident to accessing a network, the communications...
UNIVERSAL REMOTE APPLIANCE LIFECYCLE MANAGEMENT
A mobile device, which has internet connectivity and several input/output devices, includes a mobile universal remote controller (MURC) and an appliance...
SYSTEM AND METHOD OF SUPERVISORY CONTROL
A method of supervisory control is provided according to aspects of the technology. The method includes setting, at a remote device, at least a first usage...
SYSTEM ACCOUNT ACCESS MANAGER
In one aspect, a computerized system of an access-manager server for managing account access includes a computer store containing data, wherein the data...
LINKING IDENTITIES IN A NETWORK ENTITY
A network entity that allows collaboration among end users of a collaborative application by using different identifiers. The network entity receives an...
System Security Using Multi-user Control
An authorization method comprising receiving command signals from a plurality of controlling accounts, determining whether the number of received command...
SYSTEM AND METHOD FOR VIRTUAL IMAGE SECURITY IN A CLOUD ENVIRONMENT
Systems and methods enabling secure virtual image access in a virtual or cloud computing environment. The systems and methods include assigning a status to...
DATA SOCKET DESCRIPTOR ATTRIBUTES FOR APPLICATION DISCOVERY IN DATA
In one embodiment, a system includes a processing circuit and logic integrated with and/or executable by the processing circuit. The logic is configured to...
System, Apparatus and Method for Auto-Optimization of Access Control
Policy and Key Management in A Network...
In one embodiment, a method includes: presenting, in a user interface of an authoring tool, a plurality of levels of abstraction for a network having a...
DYNAMIC EXTENSIBLE APPLICATION SERVER MANAGEMENT
A real-time plugin command-driven administrative control interface is provided that implements direct real-time command-driven control of operational...
Secure Zone for Secure Purchases
An apparatus according to the present disclosure may comprise a secure zone configured to execute a task having a subtask. The task and subtask may have...
NETWORK PERSONAL DIGITAL VIDEO RECORDER SYSTEM (NPDVR)
The Shared Internet Storage Resource provides Internet-based file storage, retrieval, access, control, and manipulation for a user. Additionally, an...
INSTALLATION OF A SECURE-ELEMENT-RELATED SERVICE APPLICATION IN A SECURE
ELEMENT IN A COMMUNICATION DEVICE,...
A method for installation of a secure-element-related service application in a secure element of a user equipment (UE) associated with a subscriber of a...
SYSTEM, APPARATUS AND METHOD FOR STATEFUL APPLICATION OF CONTROL DATA IN A
In one embodiment, a system includes a processor having a first logic to execute in a trusted execution environment, and a storage to store a plurality of...
CONFIGURATION MANAGEMENT FOR VIRTUAL MACHINE ENVIRONMENT
A computer-implemented method for controlling a connection between a virtual machine and a physical device comprises receiving a connection request for...
USAGE TRACKING FOR SOFTWARE AS A SERVICE (SAAS) APPLICATIONS
Various of the disclosed embodiments concern computer systems, methods, and programs for brokering logins to software as a service (SaaS) applications and...
METHOD AND SYSTEM FOR STATE MACHINE SECURITY DEVICE
A security device may be utilized to provide security measures to an electronic device that may incorporate the security device or be coupled to it. The...
METHOD FOR CONTROLLING ACCESS TO DATA RELATING TO AN ELECTRICAL
INSTALLATION, ASSOCIATED COMPUTER PROGRAMME AND...
A controlling access to data exchanged between a management unit of a respective electrical installation and a relay platform, each management unit has a first...
SECURE DEVICE COMMUNICATION
A system and associated method for securing communication between a first device and a second device are provided. The system includes a first device...
APPARATUS AND METHOD FOR PROVIDING SECURITY SERVICE BASED ON
An apparatus for providing security services based on virtualization, the apparatus including: a host virtual machine in which a host operating system that...
LIVENESS DETECTION METHOD AND DEVICE, AND IDENTITY AUTHENTICATION METHOD
Liveness detection and an identity authentication is included in the disclosure. A user's biological characteristic information is collected and displayed at...
BIOMETRIC SIGNATURE AUTHENTICATION AND CENTRALIZED STORAGE SYSTEM
A biometric authentication system may include a centralized database including stored biometric signature information for authenticating a user of one or more...
NETWORK NODE, DEVICE AND METHODS FOR PROVIDING AN AUTHENTICATION MODULE
The invention relates to a method, for providing an Authentication Module (AM) to a device. The method comprises computing an authentication parameter to be...
SCREEN-ANALYSIS BASED DEVICE SECURITY
Systems and methods are provided for a content-based security for computing devices. An example method includes identifying content rendered by a mobile...
SERVICE PROVIDING METHOD, AND SERVICE PROVIDING DEVICE
A service providing method, the method comprises transmitting, by a first information processing device, a certification token including a first role...
CONFIGURATION AND AUTHENTICATION OF WIRELESS DEVICES
An apparatus and method for registering and configuring a wireless device for use within a wireless local area network (WLAN) are disclosed. In at least one...
DEVICE NAMING IN AN INTERNET OF THINGS
In an example, there is disclosed a computing apparatus, having: a network interface; and one or more logic elements providing a name management engine,...
SINGLE SIGN-ON FOR UNMANAGED MOBILE DEVICES
Disclosed are various examples for providing a single sign-on experience for mobile devices that may or may not be managed. A service provider receives an...
SINGLE SIGN-ON FOR MANAGED MOBILE DEVICES
Disclosed are various examples for providing a single sign-on experience for managed mobile devices. A management application executed in a computing device...
SINGLE SIGN-ON FOR MANAGED MOBILE DEVICES
Disclosed are various examples for single-sign on by way of managed mobile devices. For example, an identity provider service can receive a request for an...
SINGLE SIGN-ON FOR UNMANAGED MOBILE DEVICES
Disclosed are various examples for providing a single sign-on experience for mobile applications that may or may not be managed. A first application executed...
Token-based Authentication and Authorization Information Signaling and
Exchange for Adaptive Streaming
A method implemented by a network element (NE) configured as a streaming client, the method comprising obtaining, via a processor of the NE, a first...
ENCRYPTED PURGING OF DATA FROM CONTENT NODE STORAGE
Described herein are methods, systems, and software for encrypting and erasing data objects in a content node. In one example, a method of operating a content...
DRM PROTECTED VIDEO STREAMING ON GAME CONSOLE WITH SECRET-LESS APPLICATION
Techniques are disclosed for secure playback of protected multimedia content on a game console using a secret-less application. An SSO model can be used for...
CALL ENCRYPTION SYSTEMS AND METHODS
Techniques described herein may be used to encrypt a telephone call between users. User devices (e.g., smart phones) may be connected to encryption relay...
INTER-BUS COMMUNICATION INTERFACE DEVICE
Described herein is a security network controller having a main bus to which is coupled a central processing unit, a cryptographic processing circuit, a...
WILDCARD SEARCH IN ENCRYPTED TEXT
A wildcard searchable encryption method enables wildcard search of encrypted text in a cloud-stored encrypted document. In some embodiments, the wildcard...
MANAGED OPEN SOURCE MEDICAL DEVICES
This document discusses designing and managing medical devices that are equipped with software, including a variety of ways of managing the public interest in...
System, Apparatus and Method for Managing Lifecycle of Secure
In one embodiment, a method includes: request enrollment of the device with an identity provider, the enrollment including at least one role for the device for...
SECURED CELL PHONE COMMUNICATION SYSTEM
The present invention is regarding a cellphone communication security system comprising a first cellphone; a second cellphone; a network system; a software...