At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method and system for detecting restricted content associated with
Techniques are described for detecting restricted content associated with retrieved content. A method and system includes receiving a client request for...
System and method for detection of targeted attacks
Methods, systems, and computer programs for detecting targeted attacks on compromised computer. An example method includes receiving from a plurality of...
System and method for correlating historical attacks with diverse
indicators to generate indicator profiles for...
An apparatus and method predict and detect network attacks by using a diverse set of indicators to measure aspects of the traffic and by encoding traffic...
Method and system for tracking fraudulent activity
A method and system for tracking potentially fraudulent activities associated with one or more web sites is disclosed. The system includes a fraud tracking...
System and method for malware detection using multidimensional feature
Methods and systems for malware detection techniques, which detect malware by identifying the Command and Control (C&C) communication between the malware and...
Detection of pileup vulnerabilities in mobile operating systems
A system is provided for detecting pileup vulnerabilities corresponding to mobile operating system updates. The system includes: an exploit opportunity...
System and method for scheduling and executing secure electronic
A secure electronic correspondence method and system based on a principle relating to the uniqueness of the originals of the correspondences. The archiving...
Modulation analysis and distortion identification
An apparatus, method, computer readable medium, and system are provided to generate a symbol placement associated with a transmission scheme by transforming a...
System and method for detecting modified or corrupted external devices
Disclosed are systems and methods for detecting modified or corrupted external devices connected to a computer system. An exemplary method includes storing in a...
Method, apparatus and system for managing packet delivery
Portable electronic devices typically have reduced computing resources, including reduced available bandwidth to receive communications. A method, apparatus and...
Systems and methods of virtual worlds access
Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that...
Restricting network access to untrusted virtual machines
Approaches for providing operating environments selective access to network resources. A guest operating system, executing on a device, may issue a request to a...
Permission-based updating of contact information
A system for automatically updating personal consumer and business contact information is disclosed. A server located "in the cloud" automatically controls a...
System and method for controlled access to network devices
In one embodiment, a system includes a non-transitory computer readable medium comprising one or more rules associated with access to a first server. The system...
Distributed cryptography system
A card reader controller engine includes an interface controller responsive to information. The engine is coupled to the interface controller and is configured...
Authentication device, system and method
An authentication device includes: a memory; and a processor coupled to the memory and configured to: when a registration request including authentication...
System and device for authentication
An authentication device receives each authentication context including an output information block, an input information block, and an authenticator block. The...
Security model for industrial devices
Systems and/or methods are described relating to a security model that provides interoperability with foreign security domains while remaining scalable to small...
Soft token system
Systems and methods for a secure soft token solution applicable to multiple platforms and usage scenarios are provided. According to one embodiment a unique...
Dynamic password authentication method and system thereof
The present invention discloses a dynamic password authentication method and a system thereof. The method comprises: a server receives first information sent...
Web based system that allows users to log into websites without entering
username and password information
Internet user passwords are securely managed. A formation component can enable a user to create a master account on a web server, the master account comprising...
Systems and methods for managing resetting of user online identities or
Systems and methods are disclosed for managing the resetting of online identities or accounts of users of Internet web pages. One method includes: receiving,...
Abstracted authenticated client connectivity application programming
A request to establish a connection to a server application executed by a server device is received at a client-side authenticated-connection application...
Secure identification string
Providing secure access to a mobile or other device using a network-assisted PIN or other short password is disclosed. In various embodiments, upon entry by a...
Secure installation of encryption enabling software onto electronic
A process/method is provided, which authenticates electronic devices allowing the installation and utilization of encryption enabling software capable of...
Multi-domain applications with authorization and authentication in cloud
A multi-domain application requiring SSO and SLO operations in cloud environment is presented. The computing system of the multi-domain application includes a...
Authentication mechanism for domain redirection of a representational
state transfer (REST)-compliant client
An initial server responds to a request with a redirection object describing the a different server to which the request should be redirected, and providing...
Method and system for data communication over network
Embodiments of the present application relate to a method for data communication, a system for data communication, and a computer program product for data...
Peer based authentication
The disclosure is related to confirming an identity of a first user of a first user device. An aspect includes receiving a request to confirm the identity of...
System and method for secure transactions
The present disclosure describes systems and methods directed towards a highly secure and intelligent, end to end provisioning, authentication, and transaction...
Systems and methods to deliver information to a member
Systems, methods, and computer-readable media deliver a variety of personalized information to a member of an association. In embodiments, information intended...
Border gateway protocol (BGP) communications over trusted network function
virtualization (NFV) hardware
A first Network Function Virtualization (NFV) computer system generates Hardware Root-of-Trust (HRoT) challenge data and transfers the HRoT challenge data in...
System and method for establishing a communication link
A system for and method of establishing a secure communication link is disclosed. The method comprises: (1) generating a Domain Name Service (DNS) request; (2)...
Systems and methods for securely streaming media content
Systems and methods securely provide media content from a media server to a media client via a network. The media content is segmented to create multiple media...
Signaling and carriage of protection and usage information for dynamic
A Dynamic Adaptive Streaming over Hypertext Transport Protocol (DASH) server component is disclosed. The DASH server component may comprise a memory, a...
Protection of control words employed by conditional access systems
In accordance with a method for communicating a control word (CW) from a client such as an encryptor to a server such as the entitlement control message...
Method of operating a computing device, computing device and computer
Data is stored on a computing device in an encrypted form using a control application. A data access application requests access to the data. It is determined...
A method and system for anonymous purchase by a first user device, is described, the method and system including sending R from the first user device to a...
Network security device
Methods and apparatus, including computer program products, implementing and using techniques for processing a data packet. An input port receives a data...
Media for detecting common suspicious activity occurring on a computer
network using firewall data and reports...
Some embodiments described herein relate to a method including receiving a report of a first suspicious activity from a network filter device. The report of the...
Inline key-based peer-to-peer processing
Various exemplary embodiments relate to a method and related network element including one or more of the following: receiving, in a network element in the...
Distributed system and method for tracking and blocking malicious internet
Disclosed are systems and methods to perform coordinated blocking of source addresses, such as an Internet Protocol (IP) addresses, across a plurality of...
Relay server and relay communication system
A relay server stores a first routing target address, and stores a second routing target address in association with a virtual address assigned to the second...
Method and apparatus for managing MAC address generation for virtualized
MAC addresses are flexibly and dynamically allocated across groups of devices that need MAC addresses. MAC address pools are defined for the groups by...
Internet infrastructure survey
A system for surveying Internet access quality includes a nameserver, registered to be authoritative for a domain name and configured to receive a DNS query to...
Controlling notification based on power expense and social factors
In one embodiment, a computer system determines a wireless transmit cost for each of one or more outgoing messages for a first user, and transmits to the first...
Timing for providing relevant notifications for a user based on user
interaction with notifications
A social networking system provides relevant third-party content objects to users by matching user location, interests, and other social information with the...
Systems and methods for assisting users with contact, access, and
Managing contact groups entails receiving email header information for electronic messages sent during a certain period of time. Each header includes unique...
Computer-implemented system and method for notifying users upon the
occurrence of an event
A computer-implemented system and method for notifying users on the occurrence of an event is disclosed. An embodiment further includes notifying selected users...
Gallery of messages from individuals with a shared interest
A machine includes a processor and a memory connected to the processor. The memory stores instructions executed by the processor to receive a message and a...