At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Behavioral detection of suspicious host activities in an enterprise
Methods, apparatus and articles of manufacture for behavioral detection of suspicious host activities in an enterprise are provided herein. A method includes...
Identification of unauthorized disclosure
Systems, methods, computer-readable media, and apparatuses for identifying a source of an unauthorized disclosure of information are provided. For instance, a...
Decoding of encrypted file
A method and system for decoding an encrypted file. A recipient computer of a recipient: extracts an encoded address from a filename of the encrypted file,...
Methods and systems for content availability based on location
Access to protected content is based on a client device being within a region. The region may be a mobile or movable region, and/or a region that is in motion....
Behavioral profiling method and system to authenticate a user
Methods and systems for behavioral profiling, and in particular, utilizing crowd-managed data architectures to store and manage that profile, are described. In...
Inheritance based network management
Systems and methods for normalization of physical interfaces having different physical attributes are provided. According to one embodiment, information...
Providing restricted access to given devices by constructing abstract
Methods, systems, and computer program products for providing restricted access to given devices by constructing abstract devices are provided herein. A method...
Methods and systems for using derived user accounts
Methods, systems and articles of manufacture consistent with features of the present invention allow the generation and use of derived user accounts, or DUA, in...
Assignment of security contexts to define access permissions for file
A system and method are provided for restricting various operations in a file system based on security contexts. An object security context including...
Communications system for residents of secure facility
A system and a method are provide for two-way communications, automated request handling, and push notifications, via SMS, MMS, IM, email, and other electronic...
Searching indexed data based on user roles
Embodiments are directed towards a system and method for a cloud-based front end that may abstract and enable access to the underlying cloud-hosted elements and...
Hierarchical policy-based shared resource access control
Access control for shared computing resources in a hierarchical system is provided herein. An as-needed, "lazy evaluation" approach to access control is...
Apparatus and method for providing media services subject to viewing
A system that incorporates teachings of the present disclosure may include, for example, determining that a communication device is outside of a restricted...
Network services infrastructure systems and methods
Network services infrastructure systems and methods are disclosed. Policies for client access to a services network and network services available in the...
Reduced authentication times in constrained computer networks
In one embodiment, a capable node in a low power and lossy network (LLN) may monitor the authentication time for one or more nodes in the LLN. The capable node...
One or more embodiments of techniques or systems for connection authentication are provided herein. A mobile device or device may act as an initiator of a...
System and method for transferring electronic information
A system for collecting and transferring electronic information includes one or more servers, having one or more centralized databases for storing or retrieving...
Automated meeting room
Methods and systems for automatic setup and initiation of meeting resources are described herein. A meeting room, area, or resource may be equipped with a...
Secure management of a smart card
A smart card includes a processing circuit, a memory that contains a protected object, an activity detector that receives a signal that describes a planned...
Accessing virtual desktops via image scanning
Image scanning and encoding technologies can be utilized to authenticate devices to virtual desktops and to transfer virtual desktop sessions between devices....
Method, system and terminal for encrypting/decrypting application program
on communication terminal
A method, system and terminal for encrypting and decrypting an application program on a communication terminal are disclosed, including the communication...
In one implementation, a server system receives, from a device of a user, a request to validate a credential of a second user. The server system identifies the...
System and device for consolidating SIM, personal token, and associated
applications for electronic wallet...
The present invention relates generally to a smart card device that is configured to facilitate wireless network access and credential verification....
Storage array password management
A system and method for generating passwords for secure login to a storage array. A randomly generated root secret is utilized along with a compartment ID to...
Apparatus and method for cryptographic operations using enhanced knowledge
Provided is a process that includes: obtaining a multi-byte character set specifying a plurality of characters; receiving a knowledge factor credential encoded...
Intelligent task assignment and authorization systems and methods
The present disclosure relates to computer-implemented methods and systems for intelligent task management. An example method may include identifying one or...
Communication apparatus, method of controlling the same and storage medium
for transmitting image file to a...
Disclosed are a communication apparatus and a method of controlling the same. The communication apparatus sets, if it is designated to perform encrypted...
Method and server of electronic safes with information sharing
A method of managing electronic safes implemented by a server on behalf of at least one user possessing at least a first electronic safe, said method comprising...
MRCP resource access control mechanism for mobile devices
A system and method for Media Resource Control Protocol (MRCP) access control for a mobile device. An entity requesting to utilize MRCP resources establishes a...
Authenticating a user while the user operates a client apparatus and
possesses an electronic card
A technique perform authentication. The technique involves receiving an authentication request from a user operating a client apparatus (e.g., the user's smart...
Authenticating redirection service
A redirection service may receive a destination URI plus a set of conditions for reaching the URI. The conditions may include authentication conditions. The...
Generating challenge response sets utilizing semantic web technology
Embodiments of the present invention relate to generating challenge response sets utilizing semantic web technology. In response to detecting an authentication...
Verifier and prover have an authentication protocol with
challenge-response with the challenge from prover...
An information processing apparatus including a memory and one or more processors coupled to the memory and configured to transmit commitment information,...
Re-programmable secure cryptographic device
A re-programmable wireless cryptographic device can store data securely and use near field communication (NFC) to exchange functionality data and/or program...
Individual-specific content management
A method, system, apparatus, and computer program product are provided for facilitating individual-specific content management. For example, a method is...
Detecting horizontal attacks
Horizontal attacks may be detected in an authentication system by comparing entered credentials to a list of common credentials, increasing a score if the...
Unified cloud computing network interface
A cloud computing network device is disclosed. The device is configured to receive a request from a joining device for access to the cloud computing network,...
Systems and methods for securing data in motion
Two approaches are provided for distributing trust among certificate authorities. Each approach may be used to secure data in motion. One approach provides...
Methods and apparatus to identify media distributed via a network
Methods, apparatus, systems and articles of manufacture to monitor media presentations are disclosed. An example method includes extracting first network packet...
Runtime instantiation of broadcast encryption schemes
Embodiments of the present invention relate to runtime instantiation of broadcast encryption schemes. In one embodiment, a method of and computer program...
Automated access, key, certificate, and credential management
Certain embodiments provide means for managing automated access to computers, e.g., using SSH user keys and other kinds of trust relationships. Certain...
Secure and scalable detection of preselected data embedded in
electronically transmitted messages
A method and apparatus for detecting preselected data embedded in electronically transmitted messages is described. In one embodiment, the method comprises...
Inline data encryption
Organizations maintain and generate large amount of sensitive information that needs to be saved electronically and there is a need to store that data remotely...
Distributed password-based authentication in a public key cryptography
An authentication system comprises a plurality of servers storing respective shares of a private key, and a controller associated with the servers. The...
Method and apparatus for network address translation and firewall
Various disclosed embodiments include methods and systems for network address translation traversal. The method comprises receiving, at a Voice over Internet...
Keyword ordered storage, search and retrieval on encrypted data for
A method and system for a multi-user searchable encryption system over ordered keywords is disclosed. The system includes a key generation server which issues a...
Automated migration planning for moving into a setting of multiple
A method, a computer program product, and a computer system for automatically migrating servers into an environment of multiple firewalls. A computer creates a...
Network environment separation
The presently disclosed subject matter includes, inter alia, a separation module being operatively connectible to a network device operable to facilitate data...
Managing authentication requests when accessing networks
Techniques for managing authentication requests. At a gateway device to a network, packets of a message intended for said network are received. Fields within...
Communicating reregistration information based on the lifetime of a
Methods are described for communicating a reregistration timer to a mobile device. A request is received from a mobile device to establish an IP communication...