At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Distributed polymorphic transformation of served content
A computer-implemented method includes receiving, at a computer security server system located between the Internet and a client computing device that makes...
Unsupervised aggregation of security rules
A processing device comprises a processor coupled to a memory and is configured to obtain at least one rule set utilized to detect malicious activity in a...
Computer security threat sharing
A computer security threat sharing technology is described. A computer security threat is recognized at an organization. A partner network graph is queried for...
Identification of and countermeasures against forged websites
A system, a method, and computer program product identify a website that is a forgery of a primary website. Client side executable code is included in a page of...
Collaborative phishing attack detection
Described herein are methods, network devices and machine-readable storage media for detecting whether a message is a phishing attack based on the collective...
K-zero day safety
Systems and methods for determining a safety level of a network vulnerable to attack from at least one origin to at least one target are described. Machines,...
Systems and methods for implementing and scoring computer network defense
Processes for the implementation and scoring of computer and network system defense exercises include base and modified scoring in accordance with various...
Email verification of link destination
In some embodiments, techniques for computer security comprise receiving a first email, detecting a first link in the email, wherein the first link is...
Method and system for virtual asset assisted extrusion and intrusion
detection in a cloud computing environment
An analysis trigger monitoring system is provided in one or more virtual assets. One or more analysis trigger parameters are defined and analysis trigger data...
Automated deployment of protection agents to devices connected to a
distributed computer network
Network traffic is monitored to detect attempted inter-network communications, including attempts by devices internal to the network to communicate with...
Time zero classification of messages
Detecting infectious messages comprises performing an individual characteristic analysis of a message to determine whether the message is suspicious,...
Proximity service security system and method using beacon
Provided are a system and method for securing security for a proximity service using a beacon signal transmitted by a beacon. A proximity service security...
Apparatus, method, and computer-readable medium
An apparatus includes a memory; and a processor coupled to the memory and configured to: set an indicator so that the indicator indicates an access to data is...
Restricting access to objects created by privileged commands
A method and system for restricting access to objects created by privileged commands. In an RBAC environment, execution of certain privileged commands creates...
System and method of controlling application level access of subscriber to
The invention is a system and method of controlling an access of a subscriber to a network. The method includes sending an identification of the subscriber and...
Method and system for evaluating access granted to users moving
dynamically across endpoints in a network
A network analysis tool is provided in support of a data communication network having user devices at indeterminate endpoints wherein user identities, namely,...
System and method for communications routing
Provided is a system which allows a user to efficiently locate and contact those individuals the user would like to communicate with. The system can also...
Web-store restriction of external libraries
A browser-based fetch of an external library may include a browser receiving a request from a web application to load an external library and determining...
Method, apparatus and computer program for enabling access to remotely
A method, and apparatus and computer program for enabling the method, the method comprising: detecting a user input at a first apparatus and, in response to the...
System and method for controlling access to personal user data
Disclosed are system and methods for controlling access of a consumer to personal data of a user. An example method includes: collecting information about the...
System and methods for access control based on a user identity
System and methods for access control in a Universal Plug and Play (UPnP) network are based on a user identity. A control point has an identity assertion...
Systems and methods for controlling email access
Embodiments of the disclosure relate to proxying at least one email resource from at least one email service to at least one client device, identifying at least...
Unified user identification with automatic mapping and database absence
An identification system that may be used in heterogeneous computing environments provides a fail-free path to providing identifiers from a single canonical...
Apparatus and data processing systems for accessing an object
A system and method for providing access to an object over a network may comprise hosting an object on a distributed data processing system accessible over the...
Personal content server apparatus and methods
Personal content server apparatus and associated methods that allow a user (e.g., cable or satellite network subscriber) to access content, such as a video...
System and method for importing and merging content items from different
Systems, methods, and computer-readable storage media for importing and merging photos from different sources are disclosed. The system receives credentials...
Secure access to data in a device
The invention concerns secure access to data in an electronic device (3). For this a link is set up with a server (2). The user of the electronic device (3)...
Method for identifying/authenticating a person using the venous network
A person may be identified by at least an identification system including a device for capturing an image of a venous network of a finger and a database...
Methods, systems, and computer program products for determining an
originator of a network packet using...
Associating a network packet with biometric information for a user includes identifying biometric identification information for a user of a network device,...
Trusted internet identity
A token or other storage device uses Internet identities to set file access attribute rights. Subsequently, requests to access a file can be controlled by...
Data access method and device
Disclosed are a data access method and device. The method comprises: a terminal sending an authentication request to a server, the authentication request being...
Automatic security parameter management and renewal
A method of automatic security parameter renewal including determining if a security parameter satisfies a renewal condition and automatically updating the...
Method for secure user and transaction authentication and risk management
To provide a user signature on a network transaction, a security server receives transaction information representing a transaction between a network user and a...
Method and apparatus for the secure authentication of a web-site
Methods for the authentication of a web site. A dynamic identification string and a one-time password are calculated by a device. The dynamic identification...
Service account access
A computer system detects an external media device and determines the external media device contains authentication data for the computer system. In response, a...
Method for apparatus for routing application programming interface (API)
A method and apparatus for routing Application Programming Interface (API) calls from a partner entity to a telephony service provider (TSP) network are...
Method and apparatus for on-site authorisation
A method for authorization of a user to access a computer system locally at a site is described. The computer system determines whether a network connection to...
Provisioning and managing certificates for accessing secure services in
Systems and methods for provisioning and managing of certificates in a network are described. In one implementation, a signing certificate is generated by a...
System and method for authenticating to a participating website using
locally stored credentials
A system and method is disclosed for authenticating a user using locally stored credentials. A website is configured to provide, to a web browser, a login page,...
Token caching in trust chain processing
A method, system, and computer usable program product for token caching in a trust chain processing are provided in the illustrative embodiments. An information...
Anonymous entity authentication method and system
An anonymous entity authentication method includes the steps of: an entity B sending RB and IGB; an entity A sending RB, R'A, IGA and IGB to a trusted third...
Method and apparatus for identity federation gateway
Techniques for an ID federation gateway include determining whether a user associated with a request for a particular network resource is to be identified by...
Methods and apparatus, including computer program products, related to relationship-based authorization. In general, data characterizing a request for...
Video management method and video management system
A video management method includes: associating video information to be uploaded to a moving image distribution server by a user with user information...
Concepts and technologies are disclosed herein for verifying sender information. According to various embodiments of the concepts and technologies disclosed...
Transcoding content based on verification of ownership of the content
A computer-implemented method includes generating data indicative of one or more times in which to sample content of a first resource and content of a second...
Methods, systems, and computer readable mediums for performing workflow
credential management in a converged...
Methods, systems, and computer readable mediums for performing workflow credential information management in a converged infrastructure system (CIS) are...
Remote authentication using mobile single sign on credentials
Systems and methods for remote authentication using mobile single sign on credentials are disclosed. In some implementations, a proxy server receives, from a...
System and method of generating verification code
The present disclosure provides techniques for generating an authentication code. These techniques may modularize processing diagram, noise element and words...
Authentication switch and network system
An authentication switch monitors a failure of an external server, and redirect information to a Web server that holds authentication information registration...