At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Off-device anti-malware protection for mobile devices
Techniques for off-device anti-malware protection for mobile devices are disclosed. In some embodiments, off-device anti-malware protection for mobile devices...
Network access control using subnet addressing
A server responds to a DHCP request for an IP address by setting a subnet in accordance with whether the client's MAC address is recognized as previously having...
Sensitive information leakage prevention system, sensitive information
leakage prevention method, and...
A client device (100) determines whether or not access is allowed, based on security levels that are set for an application program and data held in a server...
Apparatus and method for securing a distributed control system (DCS)
A method includes receiving, at a first distributed control system (DCS) node over a network, information associated with a security manager. The method also...
Shared security utility appliance for secure application and data
A security information technology element (ITE) is disclosed for secure application and data processing, the security ITE including a physical enclosure...
Risk scoring for internet protocol networks
Methods, apparatus and articles of manufacture for risk scoring for internet protocol networks are provided herein. A method includes identifying a network to...
Mitigating scripted attacks using dynamic polymorphism
In an embodiment, a data processing system comprises one or more processors; script analysis logic coupled to the one or more processors and configured to...
Detection of side channel attacks between virtual machines
Technologies are directed to a detector to identify a side channel attack between virtual machines. According to some examples, an inter-processor interrupt...
Computer exploit detection using heap spray pattern matching
According to one embodiment, a threat detection system is integrated with at least a dynamic analysis engine. The dynamic analysis engine is configured to...
Systems and methods for analyzing malicious PDF network content
Systems and methods for analyzing malicious PDF network content are provided herein. According to some embodiments, a PDF parser examines a body portion of a...
Dendritic cell algorithm module with inflammatory inter-node signaling
Artificial Immune Systems (AIS) including the Dendritic Cell Algorithm (DCA) are an emerging method to detect malware in computer systems. An implementation of...
Control flow graph representation and classification
A software sample is identified that includes code and a control flow graph is generated for each of a plurality of functions included in the sample. Features...
Crowdsourcing of trustworthiness indicators
Systems and methods are described herein for calculating trust score based on crowdsourced information. The trust score may reflect the trustworthiness,...
Threat detection and mitigation through run-time introspection and
A system and method for threat detection and mitigation through run-time introspection. The system and method comprising receiving a request to monitor a...
Application security testing
Example embodiments disclosed herein relate to real-time modification of an application under test (AUT). A security rest is performed on the AUT. A real-time...
Network asset information management
A network asset information management system (101) may include an asset determination and event prioritization module (105) to generate real-time asset...
Security risk management
Among other things, traces are received of activities of an online user who is associated with an entity. By analysis of the traces a security state of the...
A distributed multi-agent system and method is implemented and employed across at least one intranet for purposes of real time collection, monitoring,...
Dynamic content activation for automated analysis of embedded objects
According to one embodiment, a threat detection platform is integrated with at least one virtual machine that automatically performs a dynamic analysis of a...
Calculating consecutive matches using parallel computing
Methods and systems for determining consecutive matches are provided. According to one embodiment, a class definition and a data stream are received by a...
Managing a blocked-originator list for a messaging application
Managing a blocked-originator list for a messaging application, including: detecting, by a list management module, a list management initiation event for a...
A method for preventing tampering with the accessibility of resources specified by Universal Resource Locators (URLs) comprising receiving a primary URL from a...
Device verification prior to registration
Embodiments are directed to registering a device to receive notifications. In one scenario, a computer system receives a notification registration request from...
Method and device for verifying the integrity of platform software of an
A method for verifying the integrity of platform software of an electronic device is provided, the method comprising accessing a module of said platform...
Information processing apparatus and verification control method
An information processing apparatus obtains a plurality of messages transmitted between a client and a server, each message including at least one of a...
Environmental-based location monitoring
Aspects of the present disclosure are directed towards environmental based location monitoring. Environmental based location monitoring can include collecting,...
Determining response signature commonalities
An analyzer can obtain data regarding signal characteristics in each of multiple communication channels within an access network. The analyzer can use that data...
Managing user authentication in association with application access
A determination is made that an authentication mechanism is unable to complete an attempt to authenticate, in association with a user attempting to access an...
Method for managing access right of terminal to resource by server in
wireless communication system, and device...
A method for managing an access right of a terminal to a resource by a server according to one embodiment of the present invention is disclosed, and the method...
Evolving rule based contact exchange
Methods and systems are described for managing a user's contact data which use evolving sequential sets of rules where the applicability of each set depends...
Operating group resources in sub-groups and nested groups
The present invention provides a method, a group server, and an apparatus for operating a group resource; a member resource operation request sent to a member...
Apparatus and methods for distributing and storing electronic access
Apparatus and methods for efficiently distributing and storing access control clients within a network. In one embodiment, the access clients include electronic...
Approaches for deployment approval
A deployment approval system receives, from a deployment tool, a deployment request for performing a deployment to a particular resource. The deployment...
Securely updating information identifying services accessible via keys
A first device may receive a service authorization instruction from a second device. The service authorization instruction may include one or more authorization...
Regulating credential information dissemination
A validating device receives, from a client device associated with a user, a representation for a first credential associated with the user. The validating...
Systems and methods for secured global LAN
This invention relates to a method and a network device for establishing a Virtual Private Network (VPN) among Local Area Networks (LANs). The method uses a...
Network resource access control methods and systems using transactional
Methods and systems are provided for use with digital data processing systems to control or otherwise limit access to networked resources based, at least in...
Method and apparatus for establishing tunnel data security channel
Sending an authentication request message to an authentication device, receiving an authentication response message sent by the authentication device, where the...
Method for providing user interface for each user and device applying the
Disclosed herein are a method and device for providing a user interface that displays an icon indicating that a user has approached, if the user approaches an...
System and method for providing unified transport and security protocols
The system and method described herein may provide unified transport and security protocols. In particular, the unified transport and security protocols may...
Biometric authentication device and biometric authentication method
A biometric authentication device includes: a function module which executes a predetermined function; a biometric information acquisition unit which acquires...
Privacy preserving biometric authentication based on error correcting
A method includes transmitting initialization data including an error correction code and a matrix. The method also includes receiving registration data...
Binding a digital file to a person's identity using biometrics
A method and system are described for authenticating one or more digital files in which a feature, characteristic or a portion of the contents of said files is...
Passporting credentials between a mobile app and a web browser
Systems and methods for passporting credentials provide a mechanism by which a native app on a client device can invoke a service provider's core web site web...
System and method for user authentication
Disclosed are a system and method for controlling a user log in and log out process. The system may include the use of a near field communication ("NFC")...
Method and system for processing operation request
A method for processing an operation request includes: detecting by a terminal an operation request, and sending an operation request message to a smart card;...
Trusted vendor access
A system is provided and facilitates management of a device by a first entity and management of a third entity by a second entity, wherein by way of the system...
Provisioning DRM credentials on a client device using an update server
A method of provisioning DRM credentials on a client device, comprising receiving DRM credentials at an update server from a key generation system, the DRM...
Certificate generation method, certificate generation apparatus,
information processing apparatus, and...
A certificate generation method executed by a computer, includes receiving specific information and configuration information of a communication device...
Systems and methods for controlling a local application through a web page
A system, computer-readable storage medium storing at least one program, and a computer-implemented method for controlling a local utility are disclosed. A...