At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Customized Network Traffic Models To Detect Application Anomalies
Systems, methods, and devices of the various aspects enable identification of anomalous application behavior. A computing device processor may detect network...
SYSTEMS AND METHODS FOR CATEGORIZATION OF WEB ASSETS
In a system for determining the state of an asset owned by an entity, a number of scores that are representative of the state of the asset are queried and...
SYSTEM AND METHOD FOR PROVIDING SECURITY TO A COMMUNICATION NETWORK
A system and method for providing security to a network may include identifying a message sent over a network, the message related to a data transfer from an...
SYSTEM AND DEVICE FOR PREVENTING ATTACKS IN REAL-TIME NETWORKED
Disclosed are various embodiments of a system or method for the transparent handling of real-time streaming application-level data. The disclosed embodiments...
DEVICE AND A METHOD FOR DETECTING AND ANALYZING SIGNALS IN THE ULTRASOUNDS
FREQUENCY SPECTRUM FOR ELECTRONIC...
A device and a method for monitoring continuously the activity of a microphone and a speaker of an electronic communications device, filtering any emitted or...
URL SELECTION METHOD, URL SELECTION SYSTEM, URL SELECTION DEVICE, AND URL
A URL selection method disclosed in the present application includes a first extraction step and a second extraction step. The first extraction step extracts...
DETECTION OF MALWARE
Particular embodiments described herein provide for an electronic device that can be configured to monitor a process, determine if the process is parsing to...
PROCESSORS, METHODS, SYSTEMS, AND INSTRUCTIONS TO PROTECT SHADOW STACKS
A processor of an aspect includes a decode unit to decode an instruction. The processor also includes an execution unit coupled with the decode unit. The...
IDENTIFYING NETWORK INTRUSIONS AND ANALYTICAL INSIGHT INTO THE SAME
The present invention collects raw packet data related to network traffic flow over the course of time. By combining metadata from the application layer and/or...
SYSTEMS AND METHODS FOR AUTOMATICALLY MITIGATING DENIAL OF SERVICE ATTACKS
A method for mitigating a denial of service attack includes determining, for a client, a number of requests being transmitted to a server and determining, for...
Identifying and Assessing Malicious Resources
Methods, systems, and computer-readable media for analyzing and indicating network resources as potentially malicious are disclosed. Some aspects of the...
REAL-TIME AGREEMENT ANALYSIS
Techniques for informing a user about an agreement including agreement terms and trustworthiness of data source are described herein. In some examples, a...
HARDWARE BASED DETECTION DEVICES FOR DETECTING NETWORK TRAFFIC CONTENT AND
METHODS OF USING THE SAME
A device for detecting network traffic content is provided. The device includes a first input port configured to receive one or more signatures, each of the...
UPDATING CONTENT DETECTION DEVICES AND SYSTEMS
A method of updating a content detection module includes obtaining content detection data, and transmitting the content detection data to a content detection...
DETECTION OF SHELLCODE
Particular embodiments described herein provide for an electronic device that can be configured to monitor code as it executes. The code can include...
EMULATOR-BASED MALWARE LEARNING AND DETECTION
Methods and systems are described for malware learning and detection. According to one embodiment, an antivirus (AV) engine includes a training mode for...
ANOMALY DETECTION TO IDENTIFY MALWARE
Particular embodiments described herein provide for an electronic device that can be configured to monitor activities of objects in a system, compare the...
METHOD OF COMMUNICATING BETWEEN SECURED COMPUTER SYSTEMS AS WELL AS
COMPUTER NETWORK INFRASTRUCTURE
A method of communicating between secured computer systems includes supplementing a prepared task file with specified information in a source computer system,...
METHOD, SYSTEM AND APPARATUS FOR GEO-VERIFICATION
A method, system and apparatus are provided for geo-verification for access to data stored in a memory of a server having a processor and a network interface...
FRICTIONLESS MULTI-FACTOR AUTHENTICATION SYSTEM AND METHOD
A frictionless multi-factor authentication system and method ("FMFA system") that facilitates verification of the identity of a website user, registrant or...
DATA LOSS PREVENTION FOR MOBILE COMPUTING DEVICES
System calls to a kernel of a mobile computing device are monitored. A particular system call is intercepted relating to input/output (I/O) functionality of...
In one implementation, a data sharing system can comprise a trust engine to identify an environment that satisfies a level of trust, an access engine to...
Management of data of user groups and maintenance of communication thereof
Methods and devices for management of group user data and/or maintenance of instant messaging groups. The methods may include receiving, by a computing device,...
MANAGING DATA PRIVACY AND INFORMATION SAFETY
Automatically screen data associated with a user that may have already been shared on a social network or about to be shared on the social network for a...
INSTALLING VIRTUAL MACHINES WITHIN DIFFERENT COMMUNICATION PATHWAYS TO
ACCESS PROTECTED RESOURCES
A computer-implemented method, system, and/or computer program product controls access to computer resources used by a computer application. One or more...
CONTROLLING USER ACCESS TO COMMAND EXECUTION
Techniques are described for providing users with access to perform commands on network-accessible computing resources. In some situations, permissions are...
FAST USER KIOSK ACCESS IN A NON-PERSISTENT DESKTOP ENVIRONMENT
Techniques for improving logon time for remote desktops a user has not logged onto before. In general, these techniques involve utilizing a pre-logon script to...
Router Based Securing of Internet of Things Devices on Local Area Networks
IoT devices are secured on multiple local area networks. Each local network contains a router which monitors activities of IoT devices, and transmits...
OFF-SITE USER ACCESS CONTROL
Systems and methods are described for off-site user access control to communications services via a site-based communications network. Embodiments operate in...
INSTALLING VIRTUAL MACHINES WITHIN DIFFERENT COMMUNICATION PATHWAYS TO
ACCESS PROTECTED RESOURCES
One or more processors fractionate a computer application into disparate components, and assign two or more of the disparate components to different...
SYSTEM AND METHOD FOR DETECTING AND REPORTING SURREPTITIOUS USAGE
A system and method for determining access and use of sensor and communication peripheral subsystems on a wireless device using resource consumption for the...
METHOD FOR PROVIDNG A SECURE MODE FOR MOBILE DEVICE APPLICATIONS
Method for providing a secure mode for mobile applications including: configuring which applications should be available in secure mode; defining in the mobile...
AD HOC END-TO-END AUTHENTICATION AND AUTHORIZATION OF LOGISTICS NETWORK
Using a mobile solution as described, external logistics providers can be readily on-boarded into a logistics network and identified as trusted providers at a...
TEMPORARY PROCESS DEPRIVILEGING
There is disclosed in an example a computing apparatus, including: a process deprivilging engine operable for: recognizing that a process has an undetermined...
DETECTION OF COMPROMISED UNMANAGED CLIENT END STATIONS USING SYNCHRONIZED
TOKENS FROM ENTERPRISE-MANAGED CLIENT...
Techniques related to detecting compromised unmanaged client end stations using synchronized tokens placed on enterprise-managed client end stations are...
END POINT REPUTATION CREDENTIAL FOR CONTROLLING NETWORK ACCESS
In an approach for controlling access to a resource a processor monitors a first set of traffic of a computing device. A processor calculates reputation based...
USER MANAGED ACCESS SCOPE SPECIFIC OBLIGATION POLICY FOR AUTHORIZATION
A method sends a request for a delegated authorization grant data set, receives a delegated authorization grant data set that defines the delegated...
COMBINED KEY SECURITY
Embodiments of the present invention disclose a method, system, and computer program product for a combined key security program. A computer receives an access...
Diameter Redirect Between Client and Server
A technique redirects a Diameter client command from a first server that has become unavailable to a second server consistent with a Diameter protocol. A...
TECHNIQUES FOR CALL-BASED USER VERIFICATION
Techniques for call-based user verification are described. In one embodiment, for example, an apparatus may comprise a processor circuit and a storage...
MANAGEMENT SYSTEM, COMMUNICATION SYSTEM, DATA MANAGEMENT METHOD AND
A management system includes an authentication information management unit configured to manage authentication information used in authentication of a request...
SIMPLE TRUSTED TRANSFER TO INTERNET OF THINGS DEVICES
A system and method for updating multiple devices that are coupled to a network by a hub provides a trusted platform module in each of the devices, sends...
Authentication for VLAN Tunnel Endpoint (VTEP)
A first network device configured as a first Virtual Local Area Network (VLAN) Tunnel Endpoint (VTEP) may receive a packet from a second network device. The...
FOLDABLE DEVICE AND METHOD OF CONTROLLING THE SAME
A foldable device includes: a display; a touch panel configured to detect a touch input; a sensing interface configured to detect an angle of the foldable...
METHODS AND APPARATUS FOR ALLOWING USERS TO CONTROL USE AND/OR SHARING OF
IMAGES AND/OR BIOMETRIC DATA
Methods and apparatus for allowing an individual to preserve his/her privacy and control the use of the individual's images and/or personal information by...
HUMAN BODY COMMUNICATION DEVICE WITH SECURE ACCESS
Systems, apparatuses, and methods may include a human body communication data storage device having at least first and second electrodes and a human body...
NETWORK SECURITY METHOD AND NETWORK SECURITY SYSTEM
Disclosed are a network security method and a network security system. The method comprises steps: a third-party server, an application server, a mobile...
HOST CARD EMULATION SYSTEMS AND METHODS
A system is configured for detecting a point of sale, receiving a personal identification number (PIN), generating a PIN based key using a message digest of...
Systems and Methods for Authenticating Devices Using Single Factor Dynamic
A computer-implemented method comprising: receiving, by a client device, a username, password and binding code from a user; transmitting, by the client device,...
METHOD, SYSTEM, AND PROGRAM PRODUCT FOR REMOTELY ATTESTING TO A STATE OF A
A method, system, and program product for remotely attesting to a state of computing system is provided. Specifically, the present invention allows a remote...