At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Policy approval layer
A customer of a policy management service may use an interface with a configuration and management service to interact with policies that may be applicable to...
Collaborative graphics rendering using mobile devices to support remote
Systems, devices and methods are described including receiving a policy from a secure storage device, where the policy may be used to implement collaborative...
Gateway-based audit log and method for prevention of data leakage
A system and method for prevention of data leakage, the system comprising: a server configured to receive and transmit user activity commands; a protection...
Method and system for network validation of information
Embodiments of the present application relate to a method for network validation of information, a system for network validation of information, and a computer...
Method for packet processing, electronic device and storage medium
A method for processing packets, an electronic device and a storage medium are proposed. The present invention presets a defense module preventing DoS in the...
A method of protecting connectivity in a network is provided. The method includes monitoring a client communication received from a client on the network, and...
Systems and methods for tokenizing user-generated content to enable the
prevention of attacks
The present invention relates to systems and methods for the tokenization of user-generated content in order to prevent attacks on the user-generated content....
Method, electronic device, and user interface for on-demand detecting
A method, an electronic device, and a user interface for on-demand detecting a malware are provided and adapted for estimating whether an application has...
Determination of spoofing of a unique machine identifier
In one embodiment, an edge network device may monitor a network service that is provided at a network service device. Information related to the monitored...
Proxy gateway anti-virus method, pre-classifier, and proxy gateway
A proxy gateway anti-virus method, a pre-classifier, and a proxy gateway are provided. The method includes: receiving a resource obtaining request for obtaining...
Detection of repackaged mobile applications
A repackaged mobile app that has been unpacked and repackaged back is detected based on similarity of app labels of a target mobile app being evaluated and a...
Systems and methods for providing information identifying the
trustworthiness of applications on application...
The disclosed computer-implemented method for providing information identifying the trustworthiness of applications on application distribution platforms may...
Integrated network threat analysis
The inventive systems and methods aggregate network information to accompany file information in an indicator and warning environment. This system also provides...
Method and system for monitoring application program of mobile device
The present disclosure provides a method and system for monitoring an application. The method includes creating a simulated system service; establishing a...
Monitoring and limiting requests to access system resources
Systems, apparatuses and methods for preventing requests to access a system's resources from having a negative impact on higher priority data processing...
Enhanced security using service provider authentication
A method (100) and an apparatus (e.g., a network node (210)) for providing enhanced security using service provider authentication. In addition to...
System and method for detecting classes of automated browser agents
A method for determining if a web browser is being operated by a human or a non-human agent, based on analysis of certain aspects of how a user interacts with a...
Dynamic adjustment of authentication mechanism
According to one aspect of the present disclosure, a method and technique for dynamic adjustment of authentication mechanism is disclosed. The method includes:...
Systems and methods to protect against a vulnerability event
A computer-implemented method to protect against a vulnerability event is described. A first set of security policies is enforced. A client device is monitored...
Automated privacy level suggestions for social networking
Embodiments of the present invention provide a method, system and computer program product for the automated suggestion of a privacy level setting for a new...
Loan origination software system for processing mortgage loans over a
A loan origination and processing system is described. The system can reside on a server computer that is coupled to a data store storing data related to a...
Managing restricted access resources
Entities such as resource and service providers can utilize a ticketing system to define operational actions as primitives that can be stored, combined into...
Apparatus and method for access validation
One or more techniques for access validation are provided. Access validation may be performed automatically or in real-time. Access validation may be at the...
A method, comprising: storing, at a server device, an electronic resource; receiving, at the server device and from a client device associated with a first...
Restricting communication over an encrypted network connection to internet
domains that share common IP...
An apparatus prevents communication by a client device to a domain that cannot be uniquely identified by relocating the DNS mapping of the domain to a...
Incrementally changing the availability of a feature
Techniques are described to incrementally change the availability of a feature of a software service to clients over a network based on a configuration setting...
Systems and methods for identifying a secure application when connecting
to a network
A computer system receives, from a user device, a request to access a resource within a network of an organization and receives access credentials associated...
Communication apparatus, relay apparatus, wireless communication system,
control method of communication...
A communication apparatus, which is connected to a relay apparatus, and transmits data to a server apparatus connected via the relay apparatus, includes a...
System and method of performing electronic transactions
A system and method of performing electronic transactions between a server computer and a client computer. The method implements a communication protocol with...
System and method for determining liveness
Systems and methods are provided for recording a user's biometric features and generating an identifier representative of the user's biometric features and...
Secure BIOS access and password rotation
A device may periodically update a BIOS password on a client device. In some implementations, the device may determine a particular password generation...
Multi-factor authentication using an authentication device
Systems and methods of authenticating users using a possession factor communicate a first authentication code to the user device and a second authentication...
System and method for assigning quality to cryptographaic identities used
in a digital transaction
A method of assessing risk in an electronic transaction involves assignment of quality attributes to cryptographic identities presented in a digital...
System and method for secure access of a remote system
A system and method for providing a user with secure access to devices operatively connected to a network comprising at least one processing device that has...
Collision avoidance in a distributed tokenization environment
A client receives sensitive data to be tokenized. The client queries a token table with a portion of the sensitive data to determine if the token table includes...
Verification of configuration using an encoded visual representation
Aspects of the present disclosure relate to a method, system, and computer program product for verifying a parameter on a computing node. The method can include...
Management and authentication in hosted directory service
A user, group, and device management and authentication system allows administrators to manage one or more directories with devices that are not associated with...
Communications hub for use in life critical network
Secured communications between patient portable communicators (PPC) and a central authority (CA) via an unsecured network are implemented using software...
A first request from a client using a first protocol is translated into one or more second requests by a servicer using a second protocol through a virtual...
Shutting down access to all user accounts
Disclosed is a system and associated method or restricting access to a user's account via one or more account access channels. The system typically includes a...
Automatic management of secure connections
In an example embodiment, on-premise systems have access to a cloud connector located on-premise. When the on-premise cloud connector is started, it may...
Providing domain-joined remote applications in a cloud environment
Embodiments are directed to provisioning private virtual machines in a public cloud and to managing private virtual machines hosted on a public cloud. In one...
Network site customization using proxies
Disclosed are various embodiments for network site customization using proxy server applications. A first request is obtained from an administrator of a network...
Federated transaction path and service level agreement monitoring across
service oriented application partner...
Computer implemented method, system and computer usable program code for monitoring a transaction that crosses an enterprise boundary in a composite...
Systems and methods for authenticating devices
A computer-implemented method for authenticating devices may include (1) identifying a request from a device for a credentialing service to issue a credential...
Communication apparatus, communication system, and computer program
According to an embodiment, a communication apparatus includes a sharing processing unit, an extension unit, and a communication unit. The sharing processing...
Policy-based configuration of internet protocol security for a virtual
A method for performing policy-based configuration of Internet Protocol Security (IPSec) for a Virtual Private Network (VPN) is provided. According to one...
Protecting information using policies and encryption
A technique and system protects documents at rest and in motion using declarative policies and encryption. Encryption in the system is provided transparently...
System and method to merge encrypted signals in distributed communication
In a computer implemented method for data privacy in a distributed communication system including a plurality of client terminals, the method includes:...
Systems and methods for quantum key generation
A quantum key generation system including two photon detector units, two photon entanglement chains extending between the two photon detector units, and a...