At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Incident triage engine
An incident triage engine performs incident triage in a system by prioritizing responses to incidents within the system. One prioritization method may include...
Systems and methods for automating blind detection of computational
Methods for blind detection of computational vulnerabilities include the submission by a detecting system of potentially interpretable information to a target...
Detection of malware beaconing activities
Malware beaconing activity detection is disclosed, including: monitoring a plurality of conversations between an internal device and one or more external...
OWL-based intelligent security audit
The disclosure herein describes a system for facilitating intelligent auditing of security log records. A set of security policies are converted into a set of...
Mitigation of path-based convergence attacks
Technologies are generally described for mitigation of a convergence attack in a network portion that includes multiple nodes interconnected by links in a...
System for detection of mobile applications network behavior-netwise
The invention is a system for protecting mobile devices in cellular networks from unauthorized harmful applications and for protecting cellular network...
System and method for securing a third party communication with a hosting
A system and method for providing secure communications between third parties and hosting web pages. The method includes uploading a hosting web page to a...
Analytics data validation
Analytics data validation techniques are described. In one or more implementations, an analytics service collects analytics data from a client device that...
Method and system for extending network resources campus-wide based on
user role and location
A method, system, and computer readable medium is disclosed which utilizes the LISP control plane to increase communications and access to enterprise resources...
Embodiments disclosed herein provide an authorization framework. An apparatus may include a data storage to store a first plurality of authorization plugin...
Interaction privacy in a default network
A system and a method are disclosed for controlling access to content in a default network computing system. The method includes receiving a request for a data...
User collision detection and handling
Techniques for user collision detection and handling are described. According to various embodiments, a network resource provides content, services, and so...
Method for managing access to protected computer resources
A system for securing and tracking usage of transaction services or computer resources by a client computer from a first server computer, which includes...
Generation of a visually obfuscated representation of an alphanumeric
message that indicates availability of a...
This disclosure relates to a system and related operating methods. A computer-implemented server device receives a request from a device that includes an...
System, method, and computer program for providing generic access to web
content on a mobile device
A system, method, and computer program product are provided for providing generic access to web content on a mobile device. In use, a request for requested web...
Managing use of network resources
Some aspects of what is described here relate to managing the use of network resources on a mobile device. User input received at the device indicates whether...
System for transmitting data by using USB interface
A system for transmitting data by using a USB interface is provided. The system includes: a terminal equipment; a data transmission line, having a first...
Scalable authentication system
Disclosed is a key management method for administering a token with an administrative server and an authentication server wherein a set of keys stored therein...
Information processing method and system
Disclosed are an information processing method and system. The first terminal sends operation request information to an electronic signature token. The...
Secure data entry via audio tones
A cloud client device identifies one or more devices within a predetermined range of the cloud client device operable to communicate with the cloud client...
Passcode verification using hardware secrets
A hardware secret is securely maintained in a computing device. The hardware secret is used to generate a hash of a passcode that is persistently stored for...
Disclosed are various embodiments for an authentication manager. The authentication manager performs a certificate validation for a network site. If the...
Method of establishing secure groups of trusted contacts with access
rights in a secure communication system
A method of establishing secure groups of trusted contacts with access rights in a secure communication system. The method includes establishing secure groups...
Web-centric authentication protocol
Systems and methods are disclosed for providing a Web-centric authentication protocol. In one implementation, a processing device receives a user request to...
Mobile multifactor single-sign-on authentication
Features are disclosed for authentication of mobile device applications using a native, independent browser using a single-sign-on system. An authentication...
Single sign-on in multi-tenant environments
The disclosed embodiments provide a system that authenticates a user. During operation, the system identifies a first tenant associated with a first request for...
Computerized method and system for managing an email input facility in a
networked secure collaborative...
In embodiments of the present invention improved capabilities are described for managing an email input facility in a networked secure collaborative computer...
Computerized method and system for managing a community facility in a
networked secure collaborative exchange...
In embodiments of the present invention improved capabilities are described for managing a community facility in a networked secure collaborative computer data...
Information processing apparatus and information processing system
An information processing apparatus includes a user authentication unit that authenticates a user, a data storage controller that controls the storing of data...
System and method for secure message reply
A system and method whereby an unregistered, anonymous user at an organization's website makes a submission/inquiry and is able to access a secure response...
Systems, methods, and apparatuses for sharing rights
A method of sharing rights includes, using one or more processors, at the request of a first user, granting a right of the first user to a second user,...
Methods preserving user identities during login and related systems,
devices, and machines
A method of accepting a remote access at a target machine from a source machine may include receiving a login request at the target machine from the source...
Providing an enterprise application store
Methods, systems, and computer-readable media for providing an application store are presented. In some embodiments, authentication credentials of an...
Network security parameter generation and distribution
Disclosed are various embodiments for facilitating network security parameter distribution and generation in a converged network incorporating multiple...
System and method to securely transfer data
Various embodiments of the invention achieve optimal data security by adding a security layer to data at the point of generation. Some embodiments add a...
Secure remote desktop
A method for communication includes receiving in a secure installation via a network from a remote user terminal an input comprising a stream of symbols that...
Bin enabled data object encryption and storage apparatuses, methods and
The BIN ENABLED DATA OBJECT ENCRYPTION AND STORAGE APPARATUSES, METHODS AND SYSTEMS ("MBIN") transforms bin creation requests, bin templates and unencrypted...
Remote access service inspector
A method, system, and computer program product for providing protected remote access from a remote access client to a remote access server over a computer...
Field level data protection for cloud services using asymmetric
Systems, apparatuses, and methods for providing data security for data that is stored in a cloud-level platform. In one embodiment, each session is associated...
System and method for the safe spontaneous transmission of confidential
data over unsecure connections and...
Disclosed is a method and system for transmitting data. The system includes at least one first stationary and/or mobile communication terminal at least one...
End-to-end secure communication system
The present disclosure is directed to an end-to-end secure communication system wherein, in addition to encrypting transmissions between clients, ...
Securing private information in public, private and mobile devices
Technologies are generally disclosed for methods and systems for securing data. An example method may include storing, by a processing device, the data in a...
Method for internet transactions
The present invention consists of a computer security method that enables all users of a computer application to enjoy superior security levels when sensitive...
Supervised data transfer
An apparatus and method are provided for controlling a transfer of data between data communications networks. In a preferred implementation, an apparatus is...
Internet-based proxy service to modify internet responses
A proxy server receives from a client device a request for a network resource that is hosted at an origin server for a domain. The request is received at the...
Firewall method and apparatus for industrial systems
Method and apparatus for use with systems including networked resources where communication between resources is via dual packet protocols wherein a first...
Method for providing authoritative application-based routing and an
improved application firewall
A method for providing authoritative application-based routing and an improved application firewall, as well as a method for application classification, is...
Whitelist-based network switch
A whitelist-based network switch defines a whitelist and a handling rule based on an access control list, security policies, etc., and monitors and blocks...
Cloud based social networking policy and compliance systems and methods
Cloud based social networking policy and compliance systems and methods use the "cloud" to pervasively enforce security and policy on websites such as Web 2.0...
System and method for secure network communications
A system and method for establishing secure communication between a first device and a second device, wherein the first device is behind a firewall. A Secure...