At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Events from network flows
In one embodiment, a system includes a processor to receive network flows, for each of one of a plurality of event-types, compare each one of the network flows...
Apparatus and method for attack source traceback
An apparatus and a method for an attack source traceback capable of tracing back an attacker, that is, an attack source present behind a command and control...
System and method for real-time malware detection based on web browser
According to a method and system for real-time malware detection based on web browser plugin, the method and system may connect a web server of a web site...
Non-harmful insertion of data mimicking computer network attacks
Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a...
Techniques are provided for controlling access to an application. A first request to use an application may be received from a first user and an application...
Access method and communication system for accessing a protected
An access method for accessing a protected communication service via a public communication network by using a secure communication network, whereby the secure...
Mandatory protection control in virtual machines
A method and system for authenticating a user to provide access to a secure application configured on a mobile device are disclosed. The method includes...
Anti-hacking system for quantum communication
A method and apparatus for reducing unauthorized access of an information stream. The information stream is received at a node along a path to a destination...
Systems and methods for publishing datasets
Systems and methods for publishing datasets are provided herein. According to some embodiments, methods for publishing datasets may include receiving a request...
Systems and methods for securing social media for users and businesses and
rewarding for enhancing security
The disclosed system and method enhances security of people, organizations, and other entities that use what has been termed "social media." Recent trends have...
Encryption techniques for improved sharing and distribution of encrypted
In an embodiment, content may be encrypted by a first device using a dual hash chain technique, where the first device maintains a forward hash chain and a...
Systems and methods for profiling client devices
Systems and methods are disclosed for providing, generating, and managing profiles. Such systems and methods may be implemented to control access to a function...
Authentication apparatus and method thereof, and computer program
According to one embodiment, there is provided an authentication apparatus, including: a communication unit, a verifier and a connection configuration checker....
Invariant biohash security system and method
Systems, methods, and program products for providing secure authentication for electronic messages are disclosed. A method may comprise generating an asymmetric...
Multi-factor authentication and comprehensive login system for
Embodiments are directed to a system and method for authenticating a user of a client computer making a request to a server computer providing access to a...
Distributed passcode verification system
A distributed passcode verification system includes devices that each have a hardware secret and that are each able to perform a limited number of verifications...
Method for generating a soft token, computer program product and service
A method is provided for generating a soft token by which attributes of a user may be authenticated. A request to generate the soft token is transmitted from an...
System and method for anti-phishing authentication
A method and system for providing security against phishing attacks. The method can include receiving a login ID from a client, and providing an encrypted...
Pushing a virtual desktop session from an authenticated device using image
Image scanning and encoding technologies can be utilized to authenticate devices to virtual desktops and to transfer virtual desktop sessions between devices....
Method and system for implementing video two factor authentication
A method for authentication includes receiving a log-in request at a first client computer, and capturing user information with the request. The method includes...
Restricting access of a portable communication device to confidential data
or applications via a remote network...
Systems and methods disclosed herein relate to the protection of a plurality of protected personas on a protected network that may be isolated from a...
Method and apparatus for providing radio communication with an object in a
A method and apparatus for providing radio communication with an electronic object in a local environment are disclosed. For example the method receives via a...
Cross-native application authentication application
A user device stores first authentication information used to grant access to a resource associated with a first application, and configuration information...
System and method for single-sign-on in virtual desktop infrastructure
A system and a method for single-sign-on (SSO) in a virtual desktop infrastructure (VDI) environment are disclosed. The system includes a VDI service server...
Generating a data display in view of user activities
A method and system for collecting, aggregating, and displaying type specific content in an inbox like view are described. An inbox manager collects information...
Methods, systems, and media for providing access control for a computing
Methods, systems, and media for providing access control for a computing device are provided. In some implementations, methods for providing access control for...
Information processing device, and method and computer-readable medium
therefor for the input and storage of...
An information processing device including a controller configured to accept a selection of a service from among a plurality of services including a first...
Mobile oauth service
A framework, which conforms to the OAuth standard, involves a generic OAuth authorization server that can be used by multiple resource servers in order to...
Programming vehicle modules from remote devices and related methods and
Methods, apparatus and systems are provided for programming a vehicle module. An exemplary vehicle includes a first module, a gateway module communicatively...
Method and apparatus for sharing content
A method and apparatus for sharing content by selecting a device with which the content is to be shared and performing authentication by using a device which is...
Enabling dynamic authentication with different protocols on the same port
for a switch
The invention enables a client device that does not support IEEE 802.1X authentication to access at least some resources provided through a switch that supports...
Content restriction compliance using reverse DNS lookup
A method for alerting Internet content providers of the age or other personal information of a computer user, which includes receiving a reverse DNS lookup...
Virtual desktop accelerator support for network gateway
The subject disclosure relates to a method for initiating an accelerated desktop session between a client and a remote. In some aspects, the method includes...
Authenticating method of communicating connection, gateway apparatus using
authenticating method, and...
An authenticating method of communicating connection between a terminal and a gateway apparatus, the method including transmitting authentication information...
Methods and credential servers for controlling access to a computer system
Methods and credential systems for use in controlling access to a computer system are disclosed. One example method includes receiving a request for a temporary...
System and method to enable unlicensed mobile access across terminals
A method and apparatus is provided for establishing a Global System for Mobile communications (GSM) call through an Unlicensed Mobile Access (UMA) Network by...
Method and system for authentication over a public network using multiple
out-of-band communications channels...
A method includes sending an open request to a directory server for a first key, the first key being a trusted key wrapped in a public key. The open request...
Agile network protocol for secure communications using secure domain names
A network device comprises a storage device storing an application program for a secure communications service, and at least one processor configured to execute...
Transparent encryption/decryption gateway for cloud storage services
A mechanism is provided for secure data storage in a distributed computing system by a client of the distributed computing system. A gateway device intercepts a...
Secure end-to-end communication system
A secure end-to-end communication system is implemented via one or more security processing devices. In one embodiment, a method includes: loading, by a key...
Bitwise operations and apparatus in a multi-level system
A system uses multi-level encoding where each symbol of a plurality of symbols represents more than one bit of information in a user data symbol stream for...
System and method for testing network firewall using fine granularity
A device may verify whether pinholes in a perimeter protection device are open and may determine pinhole opening and closing delays. The method for determining...
Establishing secure remote access to private computer networks
Techniques are described for providing users with access to computer networks, such as to enable users to interact with a remote configurable network service to...
Nested independent virtual private networks with shared rekey and
First and second nested virtual private networks share a common rekey service. A first key server generates first cryptographic keys and policies for use by...
Authentication of remote host via closed ports
A method, system and apparatus for authenticating a communication request sent from a client computing device. The communication request is initially blocked by...
Remotely processing detection of undesirable network traffic content
A method of detecting a content desired to be detected includes receiving electronic data at a first host, determining a checksum value using the received...
Systems and methods for supporting IP ownership in a cluster
While each node in a cluster of nodes sources connections with the same IP if each node allocates a port on this IP independently, there may be port clashes....
Forwarding selected document passages from an electronic reader
A method of forwarding selected passages from an electronic document being displayed on an electronic reader to a designated recipient. The method includes...
System and method for distributing messages to particular mobile devices
A message distribution system comprising an analytics system to receive an inquiry with qualifiers to generate an estimate of the number of mobile devices...
Programmatic message partner list management
Embodiments of the present invention address deficiencies of the art in respect to instant messaging and real-time communications systems and provide a method,...