At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Platforms for implementing an analytics framework for DNS security
Flux domain is generally an active threat vector, and flux domain behaviors are continually changing in an attempt to evade existing detection measures....
Detecting covert routing
A method and apparatus for detecting covert routing is disclosed. In the method and apparatus, data addressed to an unrestricted computer system traverses a...
System and method of detecting delivery of malware using cross-customer
According to one embodiment, a computerized method comprises receiving a set of indicators of compromise (IOCs) associated with a known malware of a first...
Assessing threat to at least one computer network
Apparatus configured to determine predicted threat activity based on stochastic modelling of threat events capable of affecting at least one computer network in...
Dynamic and selective response to cyber attack for telecommunications
The disclosed subject matter provides a response to a cyber attack on a carrier network. The response can be based on inspection of traffic flowing through a...
Systems and methods for detecting and preventing flooding attacks in a
A method for processing network traffic data includes receiving a packet, and determining whether the packet is a previously dropped packet that is being...
Method and system for testing and validation of cryptographic algorithms
A method for testing cryptographic algorithms includes: receiving one or more request files, wherein each request files is associated with a cryptographic...
Sampled deterministic finite automata for deep packet inspection
In one embodiment, a method includes sampling text in a received packet at a network device and analyzing the sampled text using a sampled deterministic finite...
Methods and systems for broadcasting pictures
A method and system for broadcasting pictures across multiple user terminals are provided. The method includes generating a user signature based on information...
Secure clock synchronization
The present disclosure provides a secure one-step IEEE 1588 clock using either a symmetric or asymmetric protection scheme. Clocks of mission-critical or...
System and method for identity management for mobile devices
Systems and methods for managing a user identity on a mobile device are provided. The system comprises the mobile device comprising a user agent and a client...
Method and system of reserving and using an access channel
A radio access network (RAN) may be providing, in a coverage area, at least two access channels that are available for use by any wireless communication devices...
Personas in application lifecycle management
A user management construct, referred to as a persona, is provided to enable a flexible mechanism that grants elevated or administrative privileges to users,...
Zero day threat detection based on fast flux detection and aggregation
A method in a cloud-based security system includes operating a Domain Name System (DNS) resolution service, proxy, or monitor in the cloud-based security...
System and method for controlling multicast geographic distribution
A content distribution network includes first and second controllers, and multicast enabled routers. The first controller is configured to select a multicast...
Transaction verification through enhanced authentication
Methods, systems, and computer program products for providing transaction verification through enhanced authentication are provided. A method performed by a...
Secured electronic device
Methods, systems, and apparatus for communicatively pairing and securing an electronic device to a vehicle based electronic system. The pairing can enable the...
Methods and systems for enhancing the accuracy performance of
A method for enhancing the accuracy performance of authentication systems includes determining an authentication data requirement for a desired transaction and...
Networked device access control
A computer apparatus is remotely initiated. Confirmation of a detected and authenticated presence of a user is detected and confirmed remote from the computer...
Just in time polymorphic authentication
Methods, systems, apparatuses, and computer-readable media for utilizing just-in-time polymorphic authentication techniques to secure information are presented....
Authentication tokens managed for use with multiple sites
A method and system for authenticating an account holder using multi-factor authentication. An account holder is associated with a token device configured to...
Synchronous timestamp computer authentication system and method
A method and system for authenticating computer nodes on a network, including providing a synchronized clock system, at a predetermined clock frequency, for use...
Detecting sharing of passwords for password protected user accounts
A method for detecting the sharing of a password related to a password protected user account provided by an organization, by multiple entities of the...
Performing client authentication using onetime values recovered from
Techniques are disclosed for authenticating users accessing computing applications, e.g., applications hosted in a cloud environment accessed using a variety of...
Secure digital signature system
The illustrative embodiments provide a computer implemented method, apparatus, and computer program product for receiving a request from a client to instantiate...
Secure federated identity service
Federated identity is the means of linking a person's electronic identity and attributes, such that the user can be authenticated with a single sign-on, across...
User authentication in separate authentication channels
Apparatuses, systems, methods, and computer program products are disclosed for user authentication in separate authentication channels. A token module is...
Cloud queue playhead
An example implementation may involve a computing system receiving, from a media playback system, a request for an indication of a playhead pointer for a...
Cloud queue access control
An example implementation may involve a computing system receiving a request to establish a queue of media items. The computing system may assign a first access...
Systems and methods for pairing bluetooth devices
Embodiments of software-supervised pairing processes are provided. The processes enable a user to pair a mouse and keyboard with a Bluetooth transceiver without...
Method for customizing software applications
In one example embodiment, a method includes, in one of an interpreted computer environment and a compiled computer environment, generating a software...
Systems and methods for credential management between electronic devices
Embodiments are provided for managing user credentials that enable access to secure websites. According to certain aspects, a browser device connects (230) to a...
Hub coordination service
In implementations of a hub coordination service, a device includes a communication interface for communication coordination with one or more associated devices...
Secure simple enrollment
Methods, systems, and apparatus are disclosed for generating one or more device identifiers based on a public key associated with a respective device. Various...
Data encryption in a network memory architecture for providing data based
on local accessibility
A network memory system is disclosed. The network memory system comprises a first appliance configured to encrypt first data, and store the encrypted first data...
Method of securing files under the semi-trusted user threat model using
symmetric keys and per-block key encryption
A computer system and method for securing files in a file system equipped with storage resources that are accessible to an authenticable user operating with an...
Certificate distribution device and method for same, and computer program
Distribution of a certificate and a private key via a network includes a certificate/private key storage unit by which a certificate and a private key prepared...
Secure network access
The present invention relates to a system and method for facilitating access to secure network sites, such as sites providing secure financial information. An...
Realizing authorization via incorrect functional behavior of a white-box
A method of authorization in a cryptographic system that provides separate authorization for a plurality of different input message groups using a single...
External indexing and search for a secure cloud collaboration system
An end-to-end secure cloud-hosted collaboration service is provided with a hybrid cloud/on-premise index and search capability. This approach includes...
Trusted communications between untrusting parties
A system and method is disclosed for assuring that networked communications between parties playing a game on a network (e.g., the Internet) are not tampered...
Cryptographic enforcement based on mutual attestation for cloud services
In accordance with embodiments disclosed herein, there are provided systems, apparatuses, and methods for implementing cryptographic enforcement based on mutual...
Method and system for reducing network latency
Method, system, and programs for reducing network latency in a network. A first connection is established between a relay and a host in the network. The relay...
Intelligent deliverable message annotation
Enabling recipients to share tags that they associate with received e-mails includes receiving an e-mail from a sending user addressed to a receiving user, the...
Repackaging demographic data with anonymous identifier
Using uniquely generated identifiers in a network-based ecosystem in which a plurality of client devices request media content and software applications from...
Secure data exchange between data processing systems
A data transfer method performed at a proxy server includes intercepting a data request from a client computer that is directed to a target server, encrypting...
Walled garden providing access to one or more websites that incorporate
content from other websites
A cleared sites list includes one or more hostname descriptors. A firewall includes rules associated with a cleared IP list including cleared IP addresses, and...
Multi-service VPN network client for mobile device having integrated
An integrated, multi-service virtual private network (VPN) network client for cellular mobile devices is described. The multi-service network client can be...
Fast update filter
A method may include defining a filter for a network device, the filter including a rule and a particular number of prioritized fields, where at least one of...
Network accountability among autonomous systems
In one kind of DoS attack, malicious customers may try to send a large number of filter requests against an innocent customer. In one implementation, a Filter...