At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Trust in physical networks
A trust network has at least one transmission medium supporting transmission of data, wherein data transmitted is in at least some instances transmitted in...
Trusting crowdsourced data with issued tags
Embodiments control submission of crowdsourced data from a computing device to a cloud service. The cloud service receives a packet from the computing device...
Proxy server-based malware detection
Disclosed are various embodiments for malware detection by way of proxy servers. In one embodiment, a proxy server application generates a browsing history for...
Method and system for network connection chain traceback using network
Disclosed are provided a method and a system for network connection chain traceback by using network flow data in order to trace an attack source site for cyber...
Flagging security threats in web service requests
Provided are methods and systems for flagging security threats in web service requests. Specifically, a method for flagging security threats in web service...
Secure browsing via a transparent network proxy
A system for providing secure browsing via a transparent network proxy is disclosed. The system may receive, from a client, a request to access a resource. The...
Assessment of cyber threats
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for assessing cyber threats. In some implementations, data...
Process security validation
Techniques for process security validation are described herein. In one example, a method includes determining, via a processor, that a process is in a first...
Methods, systems, and devices for detecting and isolating device posing
Methods and systems are disclosed for detecting a security threat. The methods and systems comprise detecting that a first device is coupled with the first I/O...
Security risk mapping of potential targets
A method for security risk mapping of attack vectors of target assets of an organization at risk of being attacked, wherein each of the attack vectors is...
Anomalous network monitoring, user behavior detection and database system
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for network monitoring, user account compromise determination,...
Cyber security monitoring system and method for data center components
A security monitoring system is disclosed which is adapted for use with a component having a service processor. The system may use a device configured to...
Network adaptor configured for connection establishment offload
Coupling circuitry couples a network to a host. The host operating system is configured for transfer of data between the host and at least one peer via the...
Method, system, and storage medium for adaptive monitoring and filtering
traffic to and from social networking...
Embodiments disclosed herein provide a system, method, and computer readable storage medium storing computer instructions for implementing a Socialware...
Method and apparatus for detecting vulnerability status of a target
A computer implemented method for detecting vulnerability status of a target having interfaces and ports is provided. The method comprises tracking the...
Handling potentially malicious communication activity
At least some incoming traffic is distributed into a first set of traffic groups according to a first grouping scheme. Communication activity from a potentially...
System for providing behavior information notification service and method
for providing behavior information...
The present invention has the aim of providing a method of an activity information notification service in which a server can receive activity information from...
Secure analysis application for accessing web resources
Embodiments described herein may be directed to systems, methods, apparatuses, devices, computer program products, computer-executable instructions, and/or...
Secure neighbor discovery (SEND) using pre-shared key
An extension is provided to the SEND protocol without requiring a CGA or third party trust anchor. A shared key is provided to both a sender and receiver of a...
Systems and methods for categorizing network traffic content
A method for categorizing network traffic content includes determining a first characterization of the network traffic content determining a first probability...
Detecting unauthorized devices
Methods and systems are disclosed that, in some aspects, provide for receiving a provisioning request from a requesting device, and identifying one or more...
Geographical restrictions for application usage on a mobile device
Apps are secured or security-wrapped either before they are downloaded onto a device, such as a smart phone or tablet device, or after they are downloaded but...
Communication management and policy-based data routing
A network environment includes a wireless access point providing access to a corresponding network. One or more mobile communication devices communicate with...
Digital social network trust propagation
A trust propagation system is disclosed that propagates trust data based on established trust relationships. The trust system may automatically propagate trust...
Method and apparatus to control the use of applications based on network
A method and apparatus to control the use of applications on handheld device is based on network service, the method comprising the steps of: receiving a...
Access control using tokens and black lists
Examples of techniques for validating access tokens are described herein. An example computer-implemented method includes receiving, via a processor, a pushed...
Encryption system using web browsers and untrusted web servers
In one embodiment of the present invention, a first user--the creator--uses a web browser to encrypt some information. The web browser provides to the creator a...
Data driven role based security
Data driven role based security is provided. At login, the system queries for a data context in connection with access to computing objects of a computing...
Relayed network access control systems and methods
A computer system for authenticating and managing network traffic may comprise a network link providing a connection to a network, an authentication,...
Method of mutual verification between a client and a server
A method of mutual verification between a client and a server is disclosed. The method comprises receiving a request via a telecommunication link, the request...
Display control apparatus, display control method and server system
A display control apparatus performs download processing and streaming processing. In the download processing, after first mutual authentication between...
Method for authenticating identity of handset user in a cloud-computing
A method for authenticating the identity of a handset user in a cloud-computing environment is provided. The method includes: obtaining, a login account and a...
Methods and apparatus to support globalplatform.TM. usage on an embedded
Disclosed herein is a technique for managing one or more electronic Subscriber Identity Modules (eSIMs) on an embedded UICC (eUICC). In particular, the...
Distributed password verification
Distribution of verification of passwords for electronic account. Password verification is distributed (divided) across multiple entities to reduce potential...
Redirection method for electronic content
Electronic content, for example, a web page, is configured for display by a web browser application to include content that is not included in or referenced by...
Secure authenticated distance measurement
The invention relates to a method for a first communication device to perform authenticated distance measurement between the first communication device and a...
Transmitting encoded digital certificate data to certificate authority
using mobile device
Techniques are disclosed for managing a digital certificate enrollment process. A certificate assistant on a server is configured to encode certificate...
Sign-on service and client service information exchange interactions
Techniques are described for providing customizable sign-on functionality, such as via an access manager system that provides single sign-on functionality and...
Cloud queue access control
An example implementation may involve a media playback system obtaining an authorization token corresponding to a particular queue of media items at a remote...
Revoking sessions using signaling
Embodiments are directed to revoking user sessions using signaling. In one scenario, an identity platform operating on a computer system receives an indication...
Information processing apparatus, information processing method, and
An information processing apparatus includes a storage unit capable of storing authentication information corresponding to a web service. Information is output...
Service provision system, service provision method, and computer program
A service provision system includes: a management information storage unit that stores management information for managing user identification information,...
Application security system and method
According to an aspect, a computing device includes a processor; a computer readable memory; a display screen; a touch sensitive panel overlying the display...
Image based key derivation function
Embodiments of the invention relate to methods of generating and using an image-based derived key. In various embodiments, the image-based derived key may be...
Integrity check optimization systems and methods in live connectivity
A method, a network element, and a network include determining an authentication mechanism between two nodes in a network path; operating the network path;...
Determining authenticity based on indicators derived from information
relating to historical events
A method comprises storing in a memory of a first processing device information relating to one or more historical events visible to the first processing device...
Access control to operating modules of an operating unit
The invention relates to an operating unit (1) for a production plant (2). The operating unit (1) comprises an authorization receiving module (71) so as to...
Method, client, server and system of login verification
The present disclosure introduces a method, a client, a server and a system of login verification. When a user logins, the client obtains a login request from...
Secondary communications channel facilitating document security
Disclosed are various embodiments for facilitating the sharing of files or documents on behalf of a sending user to a recipient user. A secured file is...
Key management for compromised enterprise endpoints
Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple...