At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Security assessment incentive method for promoting discovery of computer
In one aspect, the disclosure provides: A method comprising: inviting a distributed plurality of researchers to participate in one or more computer...
Learning model selection in a distributed network
In one embodiment, local model parameters are generated by training a machine learning model at a device in a computer network using a local data set. One or...
Security policy creation in a computing environment
This disclosure describes, in part, systems and techniques for creating policies to enable software to access resources protected by one or more rule sets after...
Detection of network security breaches based on analysis of network record
Computer program products and methods of inspecting a log of security records in a computer network are provided. The method includes retrieving a log record,...
System for finding code in a data flow
A code finder system deployed as a software module, a web service or as part of a larger security system, identifies and processes well-formed code sequences....
Macro grid governance and communication
A governance apparatus and a communication method for communicating within the governance apparatus. The governance apparatus includes a Government. The...
Dynamic malware analysis of a URL using a browser executed in an
instrumented virtual machine environment
Various techniques for performing malware analysis of a URL (e.g., a URL sample) using a browser executed in an instrumented virtual machine environment are...
Method and apparatus for classifying and combining computer attack
A method and apparatus for classifying and combining computer attack information identifying as malicious events, events in a network that cause...
Managing rogue devices through a network backhaul
Managing rogue devices in a network through a network backhaul. A rogue device is detected in a network and a rogue device message that includes the rogue...
Protecting documents using policies and encryption
A system protects documents at rest and in motion using declarative policies and encryption. A document at rest includes documents on a device such as the hard...
Cloud based application account management
An aspect provides a method, including: receiving at a remote device a client log in to a cloud based account issued from a client device; determining the...
Key management system for toll-free data service
A system may receive a network address to be validated to determine whether the network address is associated with a toll-free data service. The system may...
Method for managing access to protected computer resources
A system for securing and tracking usage of transaction services or computer resources by a client computer from a first server computer, which includes...
Method for establishing connection between devices
A device and method for establishing a connection between devices is disclosed. A first device receives a request to connect to a second network device and,...
Multinode hubs for trusted computing
Embodiments of multinode hubs for trust operations are disclosed herein. In some embodiments, a multinode hub may include a plurality of memory regions, a...
Fuzzing server responses to malicious client devices
A security device may receive a request, from a client device and intended for a server device, to provide a resource. The resource may be associated with...
Coordination between self-organizing networks
A mechanism to handle conflict situations relating to a situation in which an intended SON operation at or near the domain's boundary (border area) may impact...
Asynchronous user permission model for applications
Use of an application to engage services on behalf of a third party is contemplated. The services may be engaged one behalf of the third party with delivery of...
System and method for visual content sharing in an online environment
There is provided herein a system and method for content sharing over the Internet, wherein the user creates visual representations of specific content share...
System and method for data quality analysis between untrusted parties
A system and method for data quality analysis between untrusted parties is provided. A dataset having attributes each associated with one or more elements is...
Apparatus and method for secure delivery of data from a communication
A system that incorporates the subject disclosure may perform, for example, providing an upload request to a mobile communication device to cause a secure...
Communication session transfer between devices
Methods and apparatuses, including computer program products, are described for communication session transfer between a plurality of computing devices. A first...
Secure identity authentication in an electronic transaction
An approach is provided for securely authenticating an identity of a user participating in an electronic transaction. A request is received from a mobile device...
Systems and methods using short-lived proxy token values obfuscating a
stable long-lived token value
Systems and methods in which an intermediary server provides a proxy token value in lieu of a stable token value to a third-party. The intermediary server...
Method for managing identifiers in an integrated circuit board and
corresponding integrated circuit board
A method of managing file identifiers in a portable data medium having an integrated circuit by means of a table of identifiers associating a given reference...
Authenticator device facilitating file security
Disclosed are various embodiments for facilitating the encryption of files as well as facilitating requiring a user to employ an authenticator device in order...
Method for generating a soft token, computer program product and service
A method is provided for generating a soft token by which attributes of a user may be authenticated. A request to generate the soft token is transmitted from an...
One-time password operating method
Disclosed is a dynamic token operating method. In the method, a key on the dynamic token is pressed down. If a power key is pressed down and a power flag is not...
Cooperation system, cooperation method thereof, information processing
system, and storage medium
A client sends a request to start to use a service via an information processing system that is a cooperation source, acquires identification information...
Facilitating single sign-on (SSO) across multiple browser instance
Facilitating single sign-on (SSO) across multiple browser instances such that user authentication at one browser instance is used as a basis to permit access to...
System and method of authentication of a first party respective of a
second party aided by a third party
A method and system of authenticating a service to access data respective of a user on a low-end mobile device are provided. The method includes receiving a...
Content service on demand
A method is provided and may include receiving a request for a network content delivery service from an access device; directing the access device to a network...
Shutting down access to all user accounts
Disclosed is a system and associated method or restricting access to a user's account via one or more account access channels. The system typically includes a...
Extension point application and configuration of a login module
Embodiments of the present invention address deficiencies of the art in respect to applying application security to an extension point oriented application...
System and method for accessing a membership-based service
System and methods for a membership-based service or network to enable access to membership-related services are provided. A portal application for members,...
Method and system for authenticating service
Embodiments of the present application relate to a method, a system, and a computer program product for authenticating a service. A method for authenticating a...
Trust based digital rights management systems
A system and method for allowing access to digitally protected content are disclosed. License metadata and credentials from multiple types of digital rights...
Systems, methods and apparatus to apply permissions to applications
Methods and apparatus are disclosed to apply permissions to applications. A disclosed example apparatus includes an address trust manager to obtain a first...
System, apparatus, and method for sharing electronic device
A system, apparatus, and method for sharing content in an electronic device behaving as a cloud electronic device are provided. An electronic device behaving as...
Establishing secure computing devices for virtualization and
Embodiments are directed to establishing a secure connection between computing systems and to providing computer system virtualization on a secure computing...
System and method for identification and consolidation of related
concurrent document sessions
A cloud computing system identifies opportunities for users to collaborate on a file. Collaboration opportunities are identified based on similarity of separate...
Securing communications with enhanced media platforms
Various methods and systems for securing communications with enhanced media platforms, are provided. In particular, an enhanced media platform is authenticated...
Method and system for using social networks to verify entity affiliations
Login credentials for at least one website, such as a social networking website, are received from a user purporting to act on behalf of an entity, for example,...
Providing an enterprise application store
Methods, systems, and computer-readable media for providing an application store are presented. In some embodiments, a request for a software application may be...
Managing distribution and retrieval of security key fragments among proxy
A method performed by a processor of a computer, includes obtaining a security key associated with data, dividing the security key into key fragments, and...
Methods and apparatus for sharing encrypted data
The present invention is directed to methods and systems in which data are stored as encrypted records on a computer usable medium, and search requests are...
Concurrent device control
Methods, systems, and devices for controlling a plurality of electronic devices are disclosed. An accessory device may monitor one or more frequency bands to...
Vehicle network system
In a vehicle network system, a plurality of ECUs are network-connected. The plurality of ECUs include a first ECU that has set therein a secret key from among...
Encryption in the cloud using enterprise managed keys
An encryption key management system and method implements enterprise managed encryption key for an enterprise using encryption for cloud-based services. In some...
Symmetric encryption apparatus and storage medium, and symmetric
decryption apparatus and storage medium
In a symmetric encryption apparatus according to an embodiment, a storage unit stores a symmetric key formed from a plurality of elements of a first polynomial...