At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Detection of malicious network connections
In one embodiment a method, system and apparatus is described for detecting a malicious network connection, the method system and apparatus including...
Controlling a computer system
A method and apparatus for control of a computer system are disclosed. The computer system includes a terminal for operator based monitoring of the computer...
Software program identification based on program behavior
Operations performed by a software application instance executed by a computing device are monitored. A determination is made that a particular operation...
Methods and systems for detecting an electronic intrusion
Methods and systems for detecting an electronic intrusion are described. A notification is received, over a network, from a server, the notification reporting a...
Cyber security adaptive analytics threat monitoring system and method
A system and method of detecting command and control behavior of malware on a client computer is disclosed. One or more DNS messages are monitored from one or...
Method and vehicle-to-X communication system for selectively checking data
security sequences of received...
A method for selectively checking data security sequences of received vehicle-to-X messages, in which a number of the vehicle-to-X messages are received and/or...
Detecting malicious HTTP redirections using user browsing activity trees
A method for detecting malicious HTTP redirections. The method includes obtaining, based on a single client IP address, HTTP flows triggered by visiting a...
Systems and methods for delivering introspection notifications from a
Described systems and methods enable a computer security module to protect a set of guest virtual machines against computer security threats. In some...
Method and apparatus for intercepting or cleaning-up plugins
The present invention discloses a method and apparatus for intercepting or cleaning-up plugins. The methods may include: obtaining performance attributes of a...
Device, system, and method of detecting a remote access user
Devices, systems, and methods of detecting user identity, differentiating between users of a computerized service, and detecting a possible attacker. The...
Computer implemented system and method for authenticating a sender of
electronic data to a recipient
A sever receives data from a sender to be dispatched to a recipient. Before dispatching the data to the recipient the server sends a message to the sender's...
Method for establishing a plurality of modes of operation on a mobile
A method, device and system for establishing plural modes of operation on a mobile device, including: associating each application on the mobile device with one...
Apparatus, and associated method, for alerting user of communication
device of entries on a mail message...
Apparatus, and an associated method, for alerting a respondent that generates a reply to a received mail message of addressing of the reply message to a...
Controlled delivery and assessing of security vulnerabilities
A method for providing security vulnerability information is provided. The method may include checking for the security vulnerability information product...
Indirect user authentication
As disclosed herein a method, executed by a computer, includes receiving, from a user, a request for access to a shared system, wherein the request comprises a...
Systems and methods for automatic discovery of systems and accounts
In various embodiments, a method comprises scanning a directory structure to generate a scan result comprising a plurality of discovered systems, identifying...
Optimizing infrastructure support based on authenticated access,
validation and context related information...
fSystems and methods for infrastructure support optimization are described. The system includes an authorization module to verify a user, based on authorization...
Systems and methods of assessing permissions in virtual worlds
Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that...
Phased bucket pre-fetch in a network processor
A packet processor provides for rule matching of packets in a network architecture. The packet processor includes a lookup cluster complex having a number of...
Methods for generating an activity stream
A method includes receiving, at one or more server computers, an activity information request regarding an object; determining whether a user associated with...
Networked access control system
Methods and systems for controlling a network access control system that includes a server encrypting a first identifier that can be related to a registered...
System and methods for leveraging an object cache to monitor network
According to non-limiting embodiments disclosed herein, the functionality of an object cache in a server can be extended to monitor and track web traffic, and...
Permissions for hybrid distributed network resources
A computing resource service provider may receive, from a user client connected to an on-premises network, a security document specifying one or more user roles...
Confirming the identity of integrator applications
An application service system receives, from a merchant service system, an application program code comprising identifying information. The identifying...
Method of securing access to data or services that are accessible via a
device implementing the method and...
The invention allows to secure access to data or services that are available for devices and applications via a device implementing the method. In order to...
Service enabled network
In one embodiment, a service enabled network (SEN) controller receives, from a control plane of a network service device, service instructions for corresponding...
Method and system for protecting credentials
A method and system for accessing local resources. The method includes intercepting, by a proxy, a request from an application to access a local resource, where...
Enterprise authentication via third party authentication support
Methods and systems are disclosed for providing approaches to enterprise authentication via third party authentication support. The methods and systems may...
Method and system for enabling and disabling execution of computer
In a computer implemented method or system, users are enabled to associate usage rights with at least a first entity and a second entity. The first entity and...
Systems and methods for decryption as a service via a message queuing
Systems and methods for decryption of payloads are disclosed herein. In various embodiments, systems and methods herein are configured for decrypting thousands...
Methods, systems, and computer program products for providing media
An aspect of media management services includes allocating a portion of a storage system to a user, storing media files received from the user in the allocated...
Behavioral authentication system using a biometric fingerprint sensor and
user behavior for authentication
A method and a corresponding device for authenticating a user for access to protected information, including at a registration stage, generating a biometric...
Securely unlocking a device using a combination of hold placement and
A method includes receiving input from a touchscreen of a mobile electronic device, and receiving input from a plurality of contact sensors of the mobile...
Systems and methods for using wearable technology for biometric-based
Methods and systems are disclosed herein for determining a biometric state of a user or an emotional state of a user. Based on the determined biometric state or...
Convenient and secure biometrically authenticated system and method for
delivering E-mail and parcels
A computer implemented method that includes receiving a biometric identifier from a biometric reader, generating an identifier associated with the biometric...
Icon password setting apparatus and icon password setting method using
keyword of icon
Disclosed is an icon password setting apparatus and an icon password setting method, which provide a keyword of an icon for an icon password to be set. The icon...
Systems and methods for computer digital certificate management and
Described herein are methods and systems for updating digital certificates on a computer and testing to confirm that the update was performed correctly. The...
Efficient network layer for IPv6 protocol
An electronic device may include a network interface that may enable the electronic device to wirelessly couple the electronic device to other electronic...
Single sign-on via application or browser
Single sign-on techniques via an application or browser are described. In one or more implementations, a single instance of entry of authentication information...
Two-factor authentication systems and methods
Systems and methods for authenticating defined user actions over a computer network. An authentication service receives an authentication request from an...
Method, device, and system of differentiating among users based on
responses to interferences
Devices, systems, and methods of detecting user identity, differentiating between users of a computerized service, and detecting a cyber-attacker. An end-user...
Authentication survivability for assigning role and VLAN based on cached
A system and method is described that allows the assignment of roles and/or VLANs to an authenticated client device even when an external remote authentication...
Electronic protected health information security for digital medical
A medical imaging system includes a data store having stored medical imaging data and a computer. The system may be in a medical treatment room and is adapted...
Identity selector for use with a user-portable device and method of use in
a user-centric identity management...
An identity selector manages the identity requirements of an online interaction between a user and a service provider environment. The identity selector is...
Configurable adaptive access manager callouts
A framework, which conforms to the OAuth standard, involves a generic OAuth authorization server that can be used by multiple resource servers in order to...
Apparatus, system and method for secure payment
Embodiments of the invention generally relate to apparatus, systems and methods for authentication, in particular, apparatus, systems and methods for...
Access control to secured application features using client trust levels
Architecture that facilitates the conveyance of a trust level when the caller makes a call, the trust level in dependence on the state of the caller system. The...
Intelligent delivery system
An access control system includes a plurality of containers. Each container comprises a container identification feature, an interior space, a locking device...
Auditable retrieval of privileged credentials
In an approach for providing auditable retrieval of privileged credentials in a privilege identity management (PIM) system, a processor invokes a checkout of a...
Method of securing mobile applications using distributed keys
Aspects of the present disclosure are directed to methods and systems for securing mobile computing applications with distributed keys. In one aspect, a...