At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Call flow system and method for use in a legacy telecommunication system
A method of operating a network server, such as a mobile application gateway, connect devices on a cellular or carrier network with individual networks, such as...
Extending SIP P-served user header over IMS interfaces
The invention provides a method of handling SIP messages in an IMS core network. The method comprises receiving at a first network entity, a first SIP message...
Soft website block override
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for overriding a soft website block. One of the methods includes...
Cloud based mobile device management systems and methods
The present disclosure relates to cloud based mobile device management (MDM) systems and methods to use the "cloud" to pervasively manage mobile devices. The...
Method, system, and computer program product for facilitating
communication in an interoperability network
Methods and apparatus are described for facilitating communication among a plurality of entities via an interoperability network. Each entity has policy data...
Methods and devices for analyzing user privacy based on a user's online
A method, non-transitory computer readable medium, and policy rating server device that receives a request from a client computing device for one or more...
System and method for switching between messaging security policies
A system and method are provided for switching between messaging security policies. The method includes determining that a messaging security policy for the...
Secure mobile framework
Systems and methods for a secure mobile framework to securely connect applications running on mobile devices to services within an enterprise are provided....
Data loss prevention (DLP) methods by a cloud service including third
party integration architectures
Embodiments of the present disclosure include data loss prevention methods by a cloud-based service including third party integration architectures. The...
Endpoint traffic profiling for early detection of malware spread
According to one exemplary embodiment, a method for detecting malware in a network stream to at least one host computer is provided. The method may include...
Client-side active validation for mitigating DDOS attacks
Methods and systems for mitigating denial-of-service attacks include a proxy server that monitors a set of application servers configured to receive and service...
Prevention of denial of service (DoS) attacks on session initiation
protocol (SIP)-based systems using method...
A device receives an attack on a Session Initiation Protocol (SIP) based device, and applies, based on a type of the attack, a method vulnerability based filter...
Identification of malware sites using unknown URL sites and newly
registered DNS addresses
In some embodiments, identification of malware sites using unknown URL sites and newly registered DNS addresses includes performing a heuristic analysis for...
Automatically generated and shared white list
Each time a version of a virus pattern is downloaded to a local computer a scanned file cache is generated including all files scanned by that version. A...
Fight-through nodes for survivable computer network
A survivable network is described in which one or more network device includes enhanced functionality to fight through cyber attacks. A Fight-Through Node (FTN)...
Dynamic loading and configuation of threat detectors based on feedback
from other nodes
Artificial Immune Systems (AIS) including the Dendritic Cell Algorithm (DCA) are an emerging method to detect malware in computer systems. The DCA...
Computer system for distributed discovery of vulnerabilities in
In one aspect, the disclosure provides: A method comprising: inviting a distributed plurality of researchers to participate in one or more computer...
Execution of test inputs with applications in computer security assessment
A given application is instrumented to trace its execution flow. Constraints and/or transformation associated with input identified in the execution flow are...
System and method for securing a computer system against malicious actions
by utilizing virtualized elements
A method and system for protecting a computing system, the method comprising allocating simulator nodes, the simulator nodes emulating operations of devices in...
Method and system for information leak prevention
A method for mitigating false positive type errors while applying an information leak prevention policy to identify important information and to prevent outward...
Systems and methods for incubating malware in a virtual organization
Systems and methods for tracking malware operator behavior patterns in a network environment simulated for an extended period of time include a processor that...
System, method, and computer program product for identifying unwanted data
communicated via session initiation...
A system, method, and computer program product are provided for identifying unwanted data communicated via a session initiation protocol. In use, packets...
Securing network communications with logical partitions
Embodiments of the present invention provide methods, systems, and computer program products that enable secure network communications with logical partitions....
Content screening method, apparatus and system
A content screening method, apparatus and system are provided for a content screening component to verify the trust relationship and the categorization standard...
Detecting network attacks based on a hash
Techniques for analyzing access to a network-based document may be provided. For example, a portion of the network-based document for hashing may be identified....
Method, device and system for securely downloading data
A method for data downloading is provided, including: sending a download request, and sending a security check request according to the download request;...
Efficient sensor data delivery
A method is provided to enhance efficiency of sensor event data transmission over network. Specifically, a method is described to buffer a set of sensor data,...
Authentication based on proximate devices
In one embodiment, a computer-implemented method includes, in response to an attempt by a user to perform a transaction using a computing device, accessing a...
Methods and systems to implement fingerprint lookups across remote agents
The present invention provides methods and systems to protect an organization's secure information from unauthorized disclosure. The present system uses protect...
Geographical location authentication
The method includes identifying a computing device attempting to access content. The method further includes identifying a defined geographical boundary that is...
System and method for location verification
Location data from one or more geolocation engines such as GPS, a system that determines location from relative signal strengths or transit times, etc., within...
Selectively permitting or denying usage of wearable device services
Selectively permitting or denying usage of a service available on a device is provided. Usage restrictions on usage of services available on the device are...
Method for the protected deposit of event protocol data of a computer
system, computer program product and...
A method for the protected deposit of event protocol data of a computer system provides access control which prohibits access to event protocol data in the...
Social and proximity based access control for mobile applications
Methods and systems for proximity-based access control include determining whether a distance from a first mobile device to each of one or more safe mobile...
Secure file transfer and notification server
A system, method and computer readable medium for secure file transfer is disclosed. In one embodiment, the system encrypts a file; sends, via a secure channel,...
Management of third party access privileges to web services
A user clicks on a link on a third-party Web site from his computer in order to utilize a third-party application with a Web service with which the user has an...
Role based access control for connected consumer devices
A processing device authenticates a computing device of a user to a user account. The processing device determines a role associated with the user account, and...
Systems and methods of object processing in virtual worlds
Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that...
Atomically updating ternary content addressable memory-based access
Embodiments described herein provide techniques for atomically updating a ternary content addressable memory (TCAM)-based access control list (ACL). According...
System and method for associating a universal user identification and a
domain specific user identification
There is presented a system and method for associating a domain transcendent identification (ID) of a user and a domain specific ID of the user, the system...
Compliance validator for restricted network access control
A method, system, and computer program product for detecting and enforcing compliance with access requirements for a computer system in a restricted computer...
Federated role provisioning
In various embodiments, techniques for federated role provisioning are provided. A federated role definition for a resource is constructed and distributed. The...
Method for using java servlets as a stack based state machine
A client module downloaded by web browser from a server receives authentication information to open a smart card in a card reader and to initiate a secure...
Exclusion engine for electronic communications in controlled-environment
An exclusion engine for electronic communications in controlled-environment facilities. In some embodiments, a method may include method may include receiving,...
Dynamically mapping network trust relationships
In an embodiment, the method is comprising, receiving an access request, from an authenticator device, to grant a supplicant device access to a data network;...
User authentication for proxy-configured clients in captive portal
Methods, systems and computer readable media for user authentication for proxy-configured clients in captive portal deployments are described. In some...
Access credentials using biometrically generated public/private key pairs
A method and system for access credential functionality using biometrically generated public/private key pairs may involve generating an asymmetric encryption...
Secure data communication
A system and a method for secure data communication over a network are described. In one embodiment, a method comprises generating a visual flashing code...
Password scheme that can be used for security of modems in an
independently operated cable system that is...
A password scheme is provided that can be used for security of cable modems in a cable network. In the system, the password is unique to each modem, the...
Computing device with integrated authentication token
Disclosed are various embodiments for a computing device with an integrated authentication token. The computing device includes first circuitry having a...