At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
2018/0375886 |
TECHNIQUES FOR MONITORING PRIVILEGED USERS AND DETECTING ANOMALOUS
ACTIVITIES IN A COMPUTING ENVIRONMENT In various implementations, a security management and control system for monitoring and management of security for cloud services can include automated... |
2018/0375885 |
MALWARE DETECTION SYSTEM ATTACK PREVENTION Systems and methods may be used to prevent attacks on a malware detection system. A method may include modeling a time series of directed graphs using incoming... |
2018/0375884 |
DETECTING USER BEHAVIOR ACTIVITIES OF INTEREST IN A NETWORK A user behavior activity detection method is provided in which network traffic relating to user behavior activities in a network is monitored. Data is stored... |
2018/0375883 |
AUTOMATICALLY DETECTING INSIDER THREATS USING USER COLLABORATION PATTERNS Automatically detecting insider threats using user collaboration patterns. In one embodiment, a method may include identifying collaborative access of one or... |
2018/0375882 |
MALICIOUS SOFTWARE IDENTIFICATION A computer implemented method to identify malicious software in a computer system includes receiving an indication of a detection of malicious network traffic... |
2018/0375881 |
INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND
NON-TRANSITORY COMPUTER READABLE RECORDING MEDIUM An information processing device is connected to a network where a plurality of electronic control units perform communication. The information processing... |
2018/0375880 |
MALICIOUS INDUSTRIAL INTERNET OF THINGS NODE ACTIVITY DETECTION FOR
CONNECTED PLANTS A method and apparatus for identifying malicious activity. At least one memory is configured to store historical communication data. At least one processor is... |
2018/0375879 |
VEHICLE NETWORK OPERATING PROTOCOL AND METHOD A communication network includes a plurality of nodes, wherein each of the nodes is operably connected to a bus. A transmitting node sends a data communication... |
2018/0375878 |
SYSTEM, METHOD AND COMPUTER READABLE MEDIUM FOR PROCESSING UNSOLICITED
ELECTRONIC MAIL An internet service provider (ISP) is configured to analyze a subscriber's sent e-mail packets to determine a subscriber identity associated with the e-mail... |
2018/0375877 |
USING MESSAGE CONTEXT TO EVALUATE SECURITY OF REQUESTED DATA Information of an electronic message to be delivered to an intended recipient is received. For an original resource identifier included in the electronic... |
2018/0375876 |
METHOD AND ARRANGEMENT FOR DECOUPLED TRANSMISSION OF DATA BETWEEN NETWORKS Provided is a method for decoupled transmission of data between networks having different security requirements, in which, in a first network having high... |
2018/0375875 |
ACCESS CONTROL FOR DATABASE In an embodiment of the present invention, a command for performing a database operation with respect to a table of a database is received, whereby the table... |
2018/0375874 |
SYSTEM AND METHOD FOR MODIFYING PERMISSIONS ASSOCIATED WITH NETWORK-BASED
RESOURCES VIA FINGERPRINT ENTRY ON... A method and apparatus for adjusting permission settings associated with one or more network-based resources on a communication device. A graphical user... |
2018/0375873 |
Network Device Isolation For Access Control and Information Security A system that includes a switch, a network authentication server (NAS), and a threat management server. The NAS sends a device identifier for an endpoint... |
2018/0375872 |
EPHEMERAL APPLICATIONS A method of executing an application in a direct launch mode includes receiving a user input to download an application from a remote server to a client... |
2018/0375871 |
THIRD PARTY PROGRAM INTEGRITY AND INTEGRATION CONTROL IN WEB BASED
APPLICATIONS Disclosed herein are a resource control service, system, method and architecture. A client device's resource access is limited to an approved resource, or... |
2018/0375870 |
NETWORK SYSTEM FOR SECURE COMMUNICATION In a network system (100) for wireless communication an enrollee (110) accesses the network via a configurator (130). The enrollee acquires a data pattern... |
2018/0375869 |
MULTI-BLOCKCHAIN NETWORK DATA PROCESSING A data processing request is obtained containing blockchain data and an identifier used to identify a blockchain network to which the data processing request... |
2018/0375868 |
Equipment Control System The invention disclosed herein includes an equipment management system. The equipment management system can include an ignition control device for connecting... |
2018/0375867 |
Untrusted Network Device Identification and Removal For Access Control and
Information Security A system that includes a switch, a network authentication server (NAS), and a threat management server. The NAS sends a device identifier for an endpoint... |
2018/0375866 |
SECURE COMMUNICATION NETWORK Secure network communications are described. In one aspect, a secure network can include a passbuilder that provides policy information related to performance... |
2018/0375865 |
Inter-Application Delegated Authentication Disclosed is a system for delegating authentication of an untrusted application executing on a client device. For delegated authentication, an untrusted... |
2018/0375864 |
ID ACQUISITION TERMINAL APPARATUS AND METHOD, INFORMATION PROCESSING
APPARATUS AND METHOD, AND PROGRAM The present technology relates to an ID acquisition terminal apparatus and method, an information processing apparatus and method, and a program by which the... |
2018/0375863 |
WEBSITE LOGIN METHOD AND APPARATUS The present application provides example website login methods and apparatuses. One example method includes identifying a website jump trigger indication to... |
2018/0375862 |
Network Switch Port Access Control and Information Security A system that includes a switch, a network authentication server (NAS), and a threat management server. The NAS sends a device identifier for an endpoint... |
2018/0375861 |
Network Device Removal For Access Control and Information Security A system that includes a switch, a network authentication server (NAS), and a threat management server. The NAS sends a device identifier for an endpoint... |
2018/0375860 |
ENTROPY-BASED AUTHENTICATION OF MOBILE FINANCIAL TRANSACTION A method for leveraging a secure communication channel between a first agent and a second agent to authenticate an activity outside of the secure communication... |
2018/0375859 |
METHOD AND APPARATUS FOR AUTHENTICATION OF USER USING BIOMETRIC A method and an apparatus for authenticating user using biometric information. The apparatus authenticates the user by performing: generating a first feature... |
2018/0375858 |
SYSTEM, IMAGE PROCESSING APPARATUS, AND METHOD OF AUTHENTICATION A system includes a communication device to perform wireless communication with a terminal carried by a user, a biometric authentication device to acquire... |
2018/0375857 |
COMPUTER SECURITY BASED ON MOUSE DEVICE SPEED SETTING AUTHENTICATION A method of performing operations by a processor of a computer terminal, includes determining an operation system (OS) speed scaling gain used by the OS to... |
2018/0375856 |
INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING SYSTEM An information processing apparatus includes a memory, a request unit, an authenticating unit, and a determination unit. The memory stores authentication... |
2018/0375855 |
METHOD FOR AUTHENTICATING A USER The present invention relates to a method and a system for authentication of a user for granting access to a service, the method comprising: receiving, by a... |
2018/0375854 |
AUTHENTICATING TO A NETWORK VIA A DEVICE-SPECIFIC ONE TIME PASSWORD Generally, this disclosure describes a method and system for authenticating to a network via a device-specific one-time password. A method in an embodiment may... |
2018/0375853 |
METHOD FOR IMPROVING INFORMATION SECURITY FOR VEHICLE-TO-X COMMUNICATION,
AND COMMUNICATION APPARATUS (AS AMENDED) A method for improving information security for vehicle-to-X communication, wherein the vehicle-to-X communication is protectable by at least one certificate,... |
2018/0375852 |
DEVICE WITH EMBEDDED CERTIFICATE AUTHORITY A smart device, connected device, Internet of Things (IoT) device, etc. is configured with an embedded certificate authority. The embedded certificate... |
2018/0375851 |
AUTHENTICATION ON A COMPUTING DEVICE Systems and/or methods provide a user of a first computing device with the ability to authenticate themselves on a remotely provided process or service using a... |
2018/0375850 |
SECURE COMMUNICATION NETWORK Secure network communications are described. In one aspect, a secure network can include a passbuilder that provides policy information related to performance... |
2018/0375849 |
ACCESS MANAGEMENT According to an example aspect of the present invention, there is provided an apparatus comprising a memory configured to store an encryption key and a list of... |
2018/0375848 |
UN-PASSWORD: RISK AWARE END-TO-END MULTI-FACTOR AUTHENTICATION VIA DYNAMIC
PAIRING A method for determining a dynamic pairing code for use in exchanging information between a first and a second communications entity. At the at the first... |
2018/0375847 |
STORED VALUE USER IDENTIFICATION SYSTEM USING BLOCKCHAIN OR MATH-BASED
FUNCTION Systems and methods for creating a numeric value for a present certainty of a user's identity, recording and `storing` that numeric value on a distributed... |
2018/0375846 |
TRANSMISSION-ONLY MESH NODES In an aspect of the disclosure, a method, a computer-readable medium, and an apparatus are provided. In certain implementations, the apparatus may determine a... |
2018/0375845 |
SYSTEMS AND METHODS FOR TWO-FACTOR LOCATION-BASED DEVICE VERIFICATION A system for two-factor location-based device verification includes a processor and a non-transitory, tangible, computer-readable storage medium having... |
2018/0375844 |
SECURE CALL ANSWERING In currently available mobile devices (e.g., a user equipment (UE)), no authentication occurs at the mobile device to answer an incoming call at the mobile... |
2018/0375843 |
VEHICLE WIRELESS INTERNET SECURITY Methods, systems, and computer program products for vehicle wireless internet security are provided. A connection request is received from a mobile device. A... |
2018/0375842 |
METHODS AND SECURITY CONTROL APPARATUSES FOR TRANSMITTING AND RECEIVING
CRYPTOGRAPHICALLY PROTECTED NETWORK PACKETS A modular security control apparatus for the protected transfer of network packets is provided. In particular, an exchange of network data (e.g. network... |
2018/0375841 |
SYSTEMS AND METHODS FOR ENTERPRISE COMMUNICATIONS This disclosure relates to systems and methods for protecting enterprise communications and data associated therewith. According to embodiments, systems and... |
2018/0375840 |
SYSTEM AND METHOD FOR USING A DISTRIBUTED LEDGER GATEWAY System and method for using a distributed ledger gateway are disclosed. In one embodiment, in an information processing apparatus comprising at least one... |
2018/0375839 |
System and Method for Secure Remote Control of a Medical Device A system and method for secure wireless control of a device including, but not limited to, replay attack protection, man-in-the-middle protection, data... |
2018/0375838 |
FILTERING AND UNICITY WITH DETERMINISTIC ENCRYPTION Some database systems may implement encryption services to improve the security of data stored in databases. Certain functionality may or may not be supported... |
2018/0375837 |
INTERFACES TO MANAGE DIRECT NETWORK PEERINGS Methods and apparatus for interfaces to manage direct network peerings. A system may include a data center, endpoint routers and a connectivity coordinator.... |