At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Matrix factorization for automated malware detection
Disclosed herein is a system and method for automatically identifying potential malware files or benign files in files that are not known to be malware. Vector...
Regular expression processing automaton
A method and corresponding apparatus are provided implementing a stage one of run time processing using Deterministic Finite Automata (DFA) and implementing a...
Apparatus and methods for detecting malicious scripts in web pages
One embodiment relates to a computer-implemented method for detecting malicious scripts in web pages. A local engine and an application are executed at a client...
Malicious advertisement detection and remediation
Detecting a malicious advertisement is disclosed. An advertisement is analyzed. A determination that the advertisement is associated with malicious activity is...
Ascertaining domain contexts
Various embodiments pertain to ascertaining domain contexts. In one embodiment, an application receives content that may contain a script (i.e. code). In this...
Cybersecurity training system with automated application of branded
A cybersecurity training system uses lures and training actions to help train a user of an electronic device to recognize and act appropriately in situations...
System, device and method for detecting a malicious attack based on
communcations between remotely hosted...
In an embodiment, a dynamic analysis engine is configured to receive an identifier associated with a source for network traffic including at least one object...
Data detecting method and apparatus for firewall
A data detecting method and apparatus for a firewall device connected with a network to identify security threat in the data, where the method is implemented by...
Method for authenticated communications incorporating intermediary
Method for managing appliance authentication. In one embodiment, the method comprises generating, by a server, a first secret and a second secret from a...
Method for generating and check-controlling network identity
indentification code in network electronic...
A method for generating and check-controlling a network identity identification code in a network electronic identity is provided for the establishment of a...
System and method for reliably authenticating an appliance
A system and an apparatus (41) for reliably authenticating an appliance (42) involves a challenge message (C) being linked to the examination apparatus (40) by...
Server verification of secure electronic messages
Systems and methods for processing encoded messages within a wireless communications system are disclosed. A server within the wireless communications system...
Systems and methods for universal enhanced log-in, identity document
verification, and dedicated survey...
Systems and methods are provided for controlling access via a computer network to a subscriber server. A log-in server receives a query to connect through the...
Method for providing file aging service
A method provides an file aging service. In view of the above, it may be possible to inhibit copyrighted literary works from being redistributed and reshared,...
Graduated authentication in an identity management system
A method and system for graduated security in an identity management system utilize differing levels of time sensitivity, channel security and authentication...
Verifying caller authorization using secret data embedded in code
In a computer system operable at more than one privilege level, confidential code is securely customized to use secret data to establish a code protection...
Virtual currency system
Methods for use with computing devices implementing a plurality of nodes of a ring-shaped overlay network. A joining node implemented by a joining computing...
Isolation of objects representng server resources in browser using iframes
Method for web-based management of resources. On a cloud computing system, for groups of user resources, defining commonly managed subgroups. Accessing...
Cache-free and lock-free handling of security information for multiple
distributed objects in protection...
A native protection storage operating system (PSOS) process receives a request specifying an operation having security related implications for elements in the...
Method for modifying rights to security domain for smartcard, and server,
smartcard, and terminal for same
The present invention relates to modifying rights to a security domain for a smartcard, and more specifically, to a server for managing modification of rights...
Validation of a location resource based on recipient access
Aspects of the present disclosure relate to a method, a system, and a computer program product for validating a location resource, e.g., a hyperlink, embedded...
System, method and computer program product for an authentication
A system and method for allowing a user to access enterprise resources comprising authentication devices and an authentication server. The authentication...
Secure authentication in a multi-party system
A user device transmits a login request. A provider server, receives a random number from and transmits other information to an authentication server. The...
Location determination for user authentication
User authentication techniques based on geographical locations associated with a client device is provided. A network connection can be established between two...
Provisioning layer two network access for mobile devices
In general, techniques are described for provisioning layer two access in computer networks. A network device located in a public network comprising an...
Device driven user authentication
The disclosed embodiments provide a system that authenticates a user. The system includes an authentication server that obtains an authentication request...
Cloud-based system for reading of decodable indicia
A data decoding system can comprise one or more computers communicatively coupled to a network. The computers can execute at least one decoding process. The...
Deferred authentication methods and systems
A wearable computing device, such as a wearable credit card type device or a wearable identification type device, that provides for deferred re-authentication...
Smart space access method, system, controller, and smart space interface
The present disclosure provides a smart space access method, a system, a controller, and a smart space interface server. The smart space access method includes:...
Managing seed provisioning
A method is used in managing seed provisioning. An authentication device having a device value is provisioned with a seed value. The seed value and device value...
Method for reading attributes from an ID token
The invention relates to a method for reading at least one attribute stored in an ID token, wherein the ID token is assigned to a user, comprising the following...
Token device re-synchronization through a network solution
A system and method are illustrated as including receiving a request for a current time and transmitting the current time to a password device. The current time...
Secure communication during provisioning of a mobile device to stream
media content from a media client
A device may be configured to communicate with a mobile device using a short range communication protocol. The device may open a port based on communicating...
System for and method of providing single sign-on (SSO) capability in an
application publishing environment
A client-server computing system includes a computer cluster for hosting certain resources, applications, programs, processes, files, and/or data that are...
Providing authentication using previously-validated authentication
Embodiments of the invention are directed to systems, methods and computer program products for providing authentication using previously-validated...
Methods, devices, and computer readable storage devices for sharing
sensitive content securely
Sensitive content is securely shared. A request is received from a first communication device to share sensitive content. The first communication device is...
Computerized method and system for managing secure content sharing in a
networked secure collaborative exchange...
In embodiments of the present invention, improved capabilities are described for securely sharing computer data content between business entities as managed...
Systems and methods for secure operation of an industrial controller
A method of securing an industrial control system includes operating the industrial control system in an open mode, wherein communications between a plurality...
Establishing historical usage-based hardware trust
Establishing trust according to historical usage of selected hardware involves providing a usage history for a selected client device; and extending trust to a...
Information processing apparatus and user authentication method
An information processing apparatus includes a memory and a processor that is connected to the memory. The processor executes a process including: determining,...
Packet forwarding device, packet forwarding system, and packet forwarding
A packet forwarding device includes: an evaluation unit configured to judge whether or not authentication information is stored in a header, the authentication...
System and method for accessing modular applications
A method and system for providing modular application for use within a cloud-based file includes storing on a cloud computing service a link to a modular...
Authentication using color-shape pairings
A technique provides access control. The technique involves prompting a user to enter color-shape pairings, and receiving multiple color-shape pairings from the...
Digital content distribution and subscription system
Digital content distribution systems and methods are provided for distributing for digital data files, such as digital audio and video data files. In accordance...
Methods and systems of generating and using authentication credentials for
decentralized authorization in the cloud
A method of controlling the sharing of data between entities that are in electronic communication with each other may include generating an authentication...
Bootstrapping user authentication on devices
Disclosed are various embodiments that facilitate bootstrapping authentication of a user at a first device using a second device. The second device is...
Secure portable store for security skins and authentication information
A security component may be associated with a network-enabled application. The security component may access a secure store, which may include customization...
Managing interaction with hosted services
Systems and methods are disclosed which facilitate managing interaction with instances corresponding to hosted services. Customers may implement services on a...
Authenticating acceptance of a string using an automaton
Provided is a server connectable to a client for input of a string and that has an automaton defining a subsequent state for transition for each state and each...
System and method for providing a cryptographic platform for exchanging
A system and method configured for providing a cryptographic platform for exchanging information. One or more information transactions including encrypted...