At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Establishing sessions with defined quality of service
The present invention allows different types of communication applications to cooperate with an associated communication client to facilitate communications...
Classification of security policies across multiple security products
A management entity connects with multiple security devices across a network. Each security device operates in accordance with one or more security policies....
Device and method for detection of anomalous behavior in a computer
A device and method for providing forensic data in network activity indicative of the presence of malware. A distributed set of network-based sensors operates...
Method and system for dynamically associating access rights with a
A method for dynamically associating, by a server, access rights with a resource includes the step of receiving, by the server, a request for a resource from a...
System and method for using partial evaluation for efficient remote
An attribute-based policy defining subjects' access to resources is enforced by a computer system. A processing means (PDP) in the system communicates with a...
Method, system and computer program product for tagging content on
uncontrolled Web application
Communications by a device in a private network to a site operating outside of the network can be programmatically inspected. Unstructured data, including...
Data stream security processing method and apparatus
Embodiments of the present invention provide a data stream security processing method and apparatus. In the embodiments of the present invention, security...
Compromised insider honey pots using reverse honey tokens
According to one embodiment, a method for setting a trap to detect that an intruder has compromised a client end station (CES) in an attempt to gain...
System and method for implementation of cyber security
The present invention provides a system and method designed to continually monitor and evaluate an IT system. More specifically, the present invention teaches a...
Systems and methods for detecting security threats based on user profiles
A computer-implemented method for detecting security threats based on user profiles may include 1) identifying behavior on a computing system that is...
Monitoring operational activities in networks and detecting potential
network intrusions and misuses
Concepts and technologies disclosed herein are for monitoring operational activities in networks and detecting potential network intrusions and misuses....
Electronic system for detecting and preventing compromise of vehicle
electrical and control systems
A method for detecting threats or attacks on an automobile network, the automobile network connected to a plurality of electronic components and an attack...
Systems and methods for analysis of abnormal conditions in computing
Systems and methods are provided for detecting an anomalous condition in a virtual computing environment having a virtualization control system coupled to a...
Insuring integrity of remote procedure calls used in a client and server
A system and method generates a message integrity check. The message integrity check value is computed by hashing one or more block checksums from procedure...
Black core network system and method
In a network having an encryptor device having an encryption module, a plaintext interface and a ciphertext interface, wherein the encryption module encrypts...
Web form protection
A request for a web page is received and the requested web page is retrieved. The web page is modified to obfuscate a set of form attribute values into a...
User to user delegation service in a federated identity management
Method for providing user-to-user delegation service in federated identity environment, characterized in that it comprises a delegation or assignment step...
Pre-caching resources based on a cache manifest
A method executed on a first electronic device for accessing an application server on a second electronic device includes receiving a cache manifest for an...
Method for providing a user with an authenticated remote access to a
remote secure device
The invention relates to a method for providing a user with an authenticated remote access to a remote secure device (2), said remote access being initiated...
Secondary device as key for authorizing access to resources
A secondary device may be used to provide access to resources to a primary device. Upon receiving an authorization indication at a device, a registration key...
Utilization of multiple keypads for password inputs
A method includes generating a first virtual keypad for entry of a first portion of a password, wherein the first portion includes a first value and a second...
Updating stored passwords
A device may include an authentication server and a server. The authentication server may receive a first form of a password from a client device in accordance...
Late binding authentication
A late-binding token (LBT) is securely generated and provided to a device application. When the LBT is presented and validated, a resource associated with the...
One-time password certificate renewal
Embodiments are directed to providing a certificate extension to an authentication certificate, to validating an authentication certificate request and to...
Establishing and maintaining an improved single sign-on (SSO) facility
A backend server system includes at least one hardware processor configured to initiate and/or perform the following. A login page is sent to a browser...
System for and method of providing single sign-on (SSO) capability in an
application publishing environment
A client-server computing system includes a computer cluster for hosting certain resources, applications, programs, processes, files, and/or data that are...
Authentication interworking in communications networks
A system performs authentication for real-time communications (RTC). The system receives a request from a browser application for web authentication of a user....
Information processing apparatus and method, recording medium and program
An electronic device that shares a secret key with another electronic device; receives a first response request transmitted from the another electronic device;...
Method and apparatus for providing authorized remote access to application
A method and apparatus for providing authorized remote access to one or more application sessions includes a client node, a collection agent, a policy engine,...
Transferring soft token authentication capabilities to a new device
A technique transfers soft token authentication capabilities from an old device to a new device. The technique involves receiving a transfer initiation message...
Security migration in a business intelligence environment
In various implementations, local identifiers associated with users may be utilized to enable access one or more functions in a Business Intelligence (BI)...
Facilitating access to data from virtual private networks
Arrangements and methods for facilitating access to VPN-derived data regardless of computing platform power state.
Method for exchanging strong encryption keys between devices using
alternate input methods in wireless personal...
A method for exchanging strong encryption keys between devices using alternate input methods. At least two devices that want to communicate with one another are...
Self-configuring wireless network
Methods, systems, and apparatus, are provided for wireless networking. In some implementations, a self-configuring wireless system includes at least one...
Secure electronic mail system with thread/conversation opt out
An e-mail system is disclosed that overcomes many deficiencies of, but is backward compatible with, existing e-mail systems. An exemplary method for...
System and method for signaling segment encryption and key derivation for
An apparatus for decoding a media stream, wherein the apparatus comprises a memory module, a processor module coupled to the memory module, wherein the memory...
System and method for wireless data protection
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for wireless data protection utilizing cryptographic key management on...
System and method for monitoring secure data on a network
A system and method for monitoring secure digital data on a network are provided. An exemplary network monitoring system may include a network device in...
Systems and methods for authenticating and protecting the integrity of
data streams and other data
Systems and methods are disclosed for enabling a recipient of a cryptographically-signed electronic communication to verify the authenticity of the...
Device configuration for secure communication
A method including generating a mapping in response to an enrollment message received from a customer device. The enrollment message includes a device...
Proximity signature for secure communication with implantable medical
Systems, devices and methods employing coded magnetic fields or transfer of encryption key information via proximity telemetry are described. The systems,...
System and method for providing data security in a hosted service system
Aspects of the present disclosure are directed to methods and systems for protecting sensitive data in a hosted service system. The system includes a host...
Method for addressing messages in a computer network
In a method for addressing messages in a computer network in which two different types of address are used, wherein at least one first network element (4, 5, 6,...
Network address translation traversals for peer-to-peer networks
In a networking environment, multiple end-users applications running on computing devices may operate behind a respective NAT device. Information transferred...
Method and a network element for content based addressing in a data
In a content addressable network, a hash result of a data item, which is a part of or relating to an entity to be accessed via the network, constitutes (401,...
Port-based dynamic network parameter assignment
Systems, apparatus and methods described herein are configured to dynamically assign network parameters based on a location (e.g., port) of a network parameter...
Internet protocol mapping resolution in fixed mobile convergence networks
Techniques for facilitating operation of a communication device having a first internet protocol (IP) address in a first network and a second IP address in a...
Identifying content in an incoming message on a social network
Identifying content in an incoming message on a social network includes categorizing a sender-recipient relationship between a sender and a recipient of an...
Preventing personal information from being posted to an internet
A method of preventing personal information from being posted to an internet, comprising determining whether text within a post includes a pre-identified text...
Data push service method and system using data pull model
A data push service method and system are provided. The service data push method includes: providing a device with data push information regarding service data...