At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Hierarchical event detection in a computer network
In one embodiment, network data is received at a first node in a computer network. A low precision machine learning model is used on the network data to detect...
Systems and methods for updating content detection devices and systems
A method of updating a content detection module includes obtaining content detection data, and transmitting the content detection data to a content detection...
Managing data traffic in the presence of a sensitive site
Website security may be managed based on known site attributes and placing limits on communication outside a site. One example may include at least one of...
Target-based SMB and DCE/RPC processing for an intrusion detection system
or intrusion prevention system
A method performed in a processor of an intrusion detection/prevention system (IDS/IPS) checks for valid packets in an SMB named pipe in a communication...
A computer implemented method for managing a network intrusion is disclosed. The method can include monitoring, by an intrusion management system, a set of...
Method and apparatus for machine to machine network security monitoring in
a communications network
A method, non-transitory computer readable medium and apparatus for providing network security monitoring in a communications network are disclosed. For...
Network attack detection using combined probabilities
In one embodiment, a device in a network receives a set of output label dependencies for a set of attack detectors. The device identifies applied labels that...
Device, system, and method of visual login and stochastic cryptography
Devices, systems, and methods of detecting user identity, differentiating between users of a computerized service, and detecting a possible attacker. The...
Automatic blocking of bad actors across a network
Disclosed is a system for restricting access to a network, the system comprising a monitoring module configured to be coupled to a plurality of network access...
System and method for key challenge validation
This document discusses, among other things, a system and method for detecting an initiation of a transaction and generating a string of characters based on the...
Media stream trust display
Media stream trust display techniques are described in which trust information regarding content elements is accessible on an individual element basis. In...
Intelligent network service provisioning and maintenance
A network gateway is implemented on behalf of a customer entity. The network gateway may be implemented using a distributed computer system and the network...
Method and apparatus for lifecycle integrity verification of virtual
A method and system for verifying the integrity of virtual machines and for verifying the integrity of discrete elements of the virtual machines throughout the...
Mobile device, program, and control method
When a pre-determined time period has elapsed after a user access is last detected, a mobile device performs protection processing on account-related...
Information processing system, information processing method, and computer
An information processing system includes a receiving unit and a determining unit. The receiving unit receives an application request to request an application...
Multiple resource servers interacting with single OAuth server
A framework, which conforms to the OAuth standard, involves a generic OAuth authorization server that can be used by multiple resource servers in order to...
System and method for access control and usage monitoring
A system (100) for providing access control and usage monitoring of a plurality of electronic devices or applications (110a-h) enables efficient access control....
Mechanism for facilitating dynamic adjustments to computing device
characteristics in response to changes in...
A mechanism is described for facilitating dynamic adjustments to features of computing devices according to one embodiment. A method of embodiments, as...
Virtual machine file system restriction system and method
A method includes creating a virtual machine including a remote file system, a file system service, and a security application. Access to the remote file system...
Method and system for utilizing a location-based internetwork gateway
A system for utilizing a location-based application across a plurality of networks. A target mobile device operates within a target network of the plurality of...
Permission delegation technology
In one implementation, a computer system maintains one or more permissions associated with a credential held by a first user, where at least one of the one or...
Interactive mail verification system and method
The present disclosure relates generally to electronic systems and methods, and more particularly, to systems, methods, and various other disclosures related to...
Proximity-based system for automatic application initialization
A system and method provide automatic access to applications or data. A portable physical device, referred to herein as a Personal Digital Key or "PDK", stores...
Authenticator for user state management
Different types of soft-lockout policies can be associated with different organizations (or groups) in an identity management system. Each soft-lockout policy...
Form filling with digital identities, and automatic password generation
In one implementation, form field(s) of a form of a website or application are populated with data obtained using a digital identity, and the populated form...
Blacklisting of frequently used gesture passwords
A method of maintaining a blacklist for gesture-based passwords is provided. A data store of vectors corresponding to gestures is maintained on a blacklist...
Live tiles without application-code execution
Techniques enabling live tiles without application-code execution permit live content to be presented in tiles without executing code of applications associated...
Secure over-the-air provisioning solution for handheld and desktop devices
In one embodiment, a device and a services provisioning system establish an over-the-air connection with each other, and perform device posture validation to...
Secure session capability using public-key cryptography without access to
the private key
A server establishes a secure session with a client device where a private key used in the handshake when establishing the secure session is stored in a...
Method for computer access control by means of mobile end device
A method for access control to a computer with a mobile end device relies on using contactless interfaces. An authentication to the computer is carried out with...
Method for securely searching, finding, reproducing, recovering, and/or
exporting of electronic data
A method for securely searching, finding, reproducing, recovering, and/or exporting electronic data from at least two systems which can be found in a network...
Apparatus and method for securing a debugging session
A device executes debugging instructions received from a debugging computer. The device receives a debugging establishment request from the debugging computer....
Secure identity federation for non-federated systems
Methods and apparatus, including computer program products, implementing and using techniques for providing user credentials over a network to a remote computer...
Unified access controls for cloud services
A cloud service access and information gateway receives, from a user device, a request to access a cloud service. The cloud service access and information...
System and method for pass-through authentication
A gateway device comprising a processor and a memory, the processor is configured to receive a login operation request from an external endpoint, the login...
Method and apparatus for remote connection
A system and method for establishing a virtual network connection between an initiating computing device operated by an initiator and a target computing device...
Access to resources
A method performed by one or more processing devices, comprising: receiving a request for a quick response code associated with the hosted resource; generating...
Recovery of managed security credentials
Disclosed are various embodiments for recovery and other management functions relating to security credentials which may be centrally managed. Account data,...
Intelligent system for enabling automated secondary authorization for
service requests in an agile information...
A service request for a managed computer system is received and once a primary authorization for same has been given, a secondary authorization management...
Method and apparatus for service login based on third party's information
A method and apparatus for service login to a service provider sites have been disclosed. The method including: receiving a login request from a user, wherein...
Information secure proactive multiparty computation (PMPC) protocol with
linear bandwidth complexity
Described is system for secure proactive multi-party computation. The system securely evaluates a circuit in the presence of an adversary. The circuit receives...
Vehicle network authentication system, and vehicle network authentication
Provided is a vehicle network authentication system such that processing by a vehicle control device can be smoothed while security of communication using dummy...
Method of processing requests for digital services
A method of processing requests for different digital services hosted by respective service entities is disclosed. The method including steps of receiving a...
Systems and methods for deployment of secure shell devices
A shell device with minimal software and/or hardware resources can download from a server configuration information and/or user data in order to allow the shell...
Managed access to content and services
Aspects of the disclosure relates to managed access to content and/or services in a network environment. In certain aspects, tokens or other artifacts can be...
Systems and methods for device and data authentication
Embodiments relate to systems and methods for authenticating devices and securing data. In embodiments, a session key for securing data between two devices can...
Mobile device and information protection method thereof
A mobile device and an information protection method are presented. The mobile device includes a sensor, a storage and a processor that is electrically...
Reducing authentication confidence over time based on user history
Technologies are provided in embodiments to manage an authentication confirmation score. Embodiments are configured to identify, in absolute session time, a...
Device association via video handshake
A method of pairing a first device with a second device is disclosed. Accordingly, an image that includes encoded data is generated. The encoded data includes a...
Communication device, communication system, and computer program product
According to an embodiment, a communication device is connected to a plurality of external devices which share key information with each other. The...