At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Methods and systems for enabling community-tested security features for
A computer-implemented method for enabling community-tested security features for legacy applications may include: 1) identifying a plurality of client systems,...
Implementing security in a social application
Implementing security in social applications includes inferring a closeness level of a connection to a user's profile of a social application based on a...
Categorizing accounts based on associated images
Categorizing accounts based on associated images is described, including identifying information associated with an account associated with a user, the...
Systems and methods for thwarting illegitimate initialization attempts
The disclosed computer-implemented method for thwarting illegitimate initialization attempts may include (1) receiving an initialization packet designed to...
System and method for malware detection in a distributed network of
Disclosed are system and method of distributed detection of malware. An example system includes a security client deployed on a computer node. The security...
System, method, and apparatus for providing network security
Methods, systems, and apparatuses for proactively protecting a computing network are disclosed. A proactive security mechanism is disclosed, among other things,...
Data communication using media files
A web browser may implement a single origin policy that makes an exception for media files such as markup language image files. In cases where the delivery of...
Real-time network attack detection and mitigation infrastructure
The invention features systems and methods for detecting and mitigating network attacks in a Voice-Over-IP (VoIP) network. A server is configured to receive...
Systems and methods for detecting suspicious files
A computer-implemented method for detecting suspicious files may include (1) detecting a file within incoming file traffic directed to a file recipient, (2)...
Utilizing digital linear recursive filters to estimate statistics for
A method is provided to estimate statistics of user interaction with a computing system. For example, the method includes tracking the interaction of a...
Uploading signatures to gateway level unified threat management devices
after endpoint level behavior based...
Zero day threats are detected at gateway level and blocked from entering a network. A database containing signatures identifying malware is maintained at the...
Systems and methods for detecting suspicious internet addresses
The disclosed computer-implemented method for detecting suspicious Internet addresses may include (1) monitoring Internet communications of an entity (e.g., an...
Methods and systems for preventing security breaches
A security payload is attached to a received binary executable file. The security payload is adapted to intercept application programming interface (API) calls...
Method for tracking machines on a network using multivariable
fingerprinting of passively available information
A method for tracking machines on a network of computers includes determining one or more assertions to be monitored by a first web site which is coupled to a...
Establishment of a trust index to enable connections from unknown devices
A method of controlling access to a remote system includes granting a connecting device full access to the system upon determining the device is registered to a...
Method and system for secure authentication
A method and system for accessing a resource associated with a resource control entity that includes receiving, by a ledger, a request, corresponding to a user,...
Monitoring remote access to an enterprise network
Techniques to provide an improved representation of remote network access for a network administrator managing and controlling access to resources on an...
Web server, information providing method, and information providing system
A server device includes a memory and a processor coupled to the memory. The processor executes generating a list in which a privilege of which the number of...
System and method for providing error handling in an untrusted network
An example method is provided and may include receiving a DIAMETER-based error over an SWm interface by a first evolved packet data gateway (ePDG) for a user...
Distribution of broadcast content to controlled-environment facilities
A system for receiving satellite radio signals and/or internet content and extracting a plurality of channels from the satellite radio signals and/or internet...
Neural authentication system
In certain embodiments, a system receives a first request from a user to perform a function with an enterprise. The system communicates a second request for the...
Apparatus and methods for storing electronic access clients
Apparatus and methods for storing and controlling access control clients. In one embodiment, transmitting and receiving devices ensure that only one copy of an...
Secure authentication system with automatic cancellation of fraudulent
The present invention relates to a method and system to securely authenticate an operation request using a secure device. Automatic rejections are initiated on...
Methods and systems for token-based application management
Disclosed herein are methods and systems for token-based application management. In an embodiment, requests are received from applications for tokens that can...
Use, provision, customization and billing of services for mobile users
through distinct electronic apparatuses
An office electronic apparatus is associated to an apparatus card and is able to use or provide a service by means of identification information; the...
Time-based one time password (TOTP) for network authentication
A Time-based One-Time Password (TOTP) validator is interposed between a principal and a network service. The validator interacts with a mobile application (app)...
Method for secure, entryless login using internet connected device
A system, method, and computer-readable medium are disclosed for using an entryless One-Time Password (OTP) in an active tag environment. Authentication...
Service account access
A computer system detects an external media device and determines the external media device contains authentication data for the computer system. In response, a...
System and method for providing switch based subnet management packet
(SMP) traffic protection in a middleware...
A system and method can provide switch based subnet management packet (SMP) traffic protection in a middleware machine environment. The middleware machine...
Digital content acquisition system and techniques
A network- and/or client-side digital content acquisition system facilitates automatic and simplified transactions, between a user of a consumer electronic...
Systems and methods for discovering website certificate information
The disclosed computer-implemented method for discovering website certificate information may include (1) receiving, from a plurality of computing devices...
Authenticating and authorizing a user by way of a digital certificate
An administrator may issue a credential to a user and may define a policy that authorizes its use based on a predefined location. The policy and the credential...
Customizable sign-on service
Techniques are described for providing customizable sign-on functionality, such as via an access manager system that provides single sign-on functionality and...
One-pass authentication mechanism and system for heterogeneous networks
A one-pass authentication mechanism and system for heterogeneous networks are provided. The mechanism comprises authenticating a user based on an authentication...
Information processing system and authentication method
An information processing system includes a first authentication function unit that issues first authentication information which is necessary to perform an...
Dynamic secured network in a cloud environment
The disclosure presents systems, methods and computer program products relating to an overlay network in a cloud environment. A management machine may manage an...
Systems and methods for managing disclosure of protectable information
A server and one or more portals cooperate with a first registered agency, an administrator of the first registered agency, a second agency, and an...
Systems and methods for identifying devices by a trusted service manager
Embodiments of the disclosure provide systems and methods for identifying devices by a trusted service manager. According to one example embodiments of the...
Secure configuration of mobile application
Secure configuration of a mobile application ("app") includes sending the required configuration data for the app to the user's mobile computing device in a...
User authentication based on historical transaction data
Embodiments are directed to systems, methods and computer program products for providing user authentication based on transaction data. Embodiments receive from...
Authentication server and communication device
A communication device comprising a central processing unit (CPU) and a memory device is disclosed. The CPU is configured to send a first attach request...
A scalable access filter that is used together with others like it in a virtual private network to control access by users at clients in the network to...
Authenticating a client using linked authentication credentials
Techniques are provided for improving security in a single-sign-on context by providing, to a user's client system, two linked authentication credentials in...
Trusted and unsupervised digital certificate generation using a security
A method, system and computer program product for ensuring PKI key pairs are operatively installed within a secure domain of a security token prior to...
Secure shared key sharing systems and methods
Systems and methods used to securely communicate a shared key to devices. One embodiment describes a method to securely communicate a shared key to a first...
System and method for provisioning secrets to an application (TA) on a
A system and method can support device management. An authorization entity can pass one or more secrets that are wrapped with a first key to a communication...
Virtual storage system and file encryption methods
A virtual storage system in data communication with a user computing device via a communication network and file encryption methods for encrypting electronic...
Encryption communication method, apparatus and system
An encrypted communication method relating to communication technologies includes allocating a same encryption key for a first application and a terminal that...
Portable device, a stationary device, a digital device and a method for
performing secure communication using...
A method includes sensing an image of a portable device by using a camera unit, acquiring an orientation information estimation value of the portable device by...
Secret sharing method and system
In a secret sharing process based on an improved threshold scheme, secret data is shared as shared data parts equal to or greater than a threshold value in...