At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Computer system, a telecommunication device and a telecommunication
A telecommunication network 20 configures a telecommunication device 11 and makes and controls communication connections between telecommunication devices. The...
Call handling for IMS registered user
The present invention proposes a solution for providing IMS services to users having circuit-switched controlled terminals. In particular, it is proposed, in...
Converged media packet gateway for a novel LTE data and voice core network
An Evolved Packet Core network comprises a converged media packet gateway control element including a GTP-C function of SGW, PGW, and P-CSCF and ATCF functions....
Mechanisms for handling SIP glare across multiple dialogs
The system and method detect and properly handle a glare condition in a SIP communication session. A glare condition is where a communication device has two...
Method and system for local calling via webpage
The present disclosure provides a method for local calling via a webpage, including that: a local calling operation instruction is serialized, the serialized...
Policy routing-based lawful interception in communication system with
A method for intercepting encrypted communications exchanged between first and second computing devices in a communication network, wherein interception is...
Policy setting for content sharing of a plurality of remotely connected
computing devices in physical or...
An information handling system includes a method for executing instructions for a content sharing system having mixed operating system capabilities, detecting...
Method and system for network service health check and load balancing
A non-transitory computer readable medium includes instructions which, when executed by one or more network devices, causes performance of operations. The...
Method and system for controlling access to shared devices
A non-transitory computer readable medium includes computer readable program code including instructions for subsequent to a client device associating with an...
Method of securing management interfaces of virtual machines
A virtual server set is disclosed, comprising one or more virtual servers for processing user requests, the virtual server set comprising, at least a first...
Client/server security by an intermediary executing instructions received
from a server and rendering client...
In an embodiment, a method comprises intercepting, from a server computer, a first set of instructions that define a user interface; executing, using a headless...
Methods and apparatus for providing mitigations to particular computers
Mitigation for combating malicious codes is delivered to particular endpoint computers. A first malicious code pattern is received in a first computer over a...
Prioritizing security findings in a SAST tool based on historical security
A cloud-based static analysis security tool accessible by a set of application development environments is augmented to provide for anonymous knowledge sharing...
Digital weapons factory and digital operations center for producing,
deploying, assessing, and managing digital...
A method of rapidly producing a new cyber response tool (e.g., in near-real-time) by matching vulnerabilities of enemy threats (e.g., a missile and/or a tank)...
Social network security monitoring
A computer-implemented method includes security settings data associated with one or more profiles of a protected social entity on one or more social networks...
System and method for managed security assessment and mitigation
In an embodiment of the invention, a system for assessing vulnerabilities includes: a security management system; a network device in a system under test (SUT),...
System and method for remotely conducting a security assessment and
analysis of a network
A system and method for performing a security audit of a target network. The system includes a device that establishes a connection to the target network...
Systems, methods, and media protecting a digital data processing device
In accordance with some embodiments of the disclosed subject matter, systems, methods, and media for protecting a digital data processing device from attack are...
Anomaly detection using adaptive behavioral profiles
Anomalous activities in a computer network are detected using adaptive behavioral profiles that are created by measuring at a plurality of points and over a...
Detection of intrusion in a wireless network
A method and associated system for detecting intrusion of a wireless network. A determination is made that a first data stream received by the wireless network...
Anomaly detection on web client
Embodiments for anomaly detection on a web client are generally described herein. A processor on the web client is monitored, where a web browser is installed...
HTML security gateway
A technique allows a client computing system with a web browser to receive a web page in response to transmitting a request for content. The web page may...
Identification of potential fraudulent website activity
Identification of potential fraudulent website activity is performed based on log entry analysis. A log entry representing a user referral from an external...
Method, device and system for detecting security of download link
A method, a device and a system for detecting security of a download link are provided. The method comprises: pre-acquiring an information set of download link...
Access-level control apparatus
An access-level control apparatus includes an NC machine tool, an RFID that is held by an operator and stores an ID given to the operator, a reader unit that...
Method for managing access to protected computer resources
A system for securing and tracking usage of transaction services or computer resources by a client computer from a first server computer, which includes...
Systems, devices, and methods for authentication in an analyte monitoring
Systems, devices, and methods are provided that allow the authentication of devices within analyte monitoring systems. The analyte monitoring systems can be in...
Methods and systems for managing directory information
Methods and systems for managing directory information, such as onboarding a LDAP server, employing a processor coupled to memory and other computer hardware...
Secure identity propagation in a cloud-based computing environment
The present disclosure describes methods, systems, and computer program products for providing secure identity propagation in a cloud-based computing...
Discovering and disambiguating identity providers
Systems, methods, and computer-readable storage media are provided for discovering and disambiguating identity providers such that user knowledge of appropriate...
System and method for enrolling in a biometric system
A system and method for enrolling in a biometric authorization system. A system user may be authorized to enroll by providing biometric data from both his...
Compliant authentication based on dynamically-updated credentials
A system, method and a computer-readable medium for authenticating a user in a live manner in non-face-to-face transactions, including a user downloading an...
Providing a security mechanism on a mobile device
Disclosed are methods, apparatus, systems, and computer program products for providing a security mechanism on a mobile device before performing an action on a...
Attempted security breach remediation
Methods, systems, apparatuses, and computer program products are provided for remediating suspected attempted security breaches. For example, a method is...
Server and method of providing server-based car security service, car
device and method of using server-based...
A server-based car security service provides for image and position information to be provided to the server. The server uses the image information to make an...
Auditing and permission provisioning mechanisms in a distributed secure
The embodiments described herein describe technologies for ticketing systems used in consumption and provisioning of data assets, such as a pre-computed (PCD)...
System and device for consolidating SIM, personal token, and associated
applications for selecting a...
The present invention relates generally to a smart card device that is configured to facilitate wireless network access and credential verification....
Systems and methods for empowering IP practitioners
A browser application has at least two web browser objects for browsing Private PAIR while hiding multi-page navigation from a user. The browser application is...
Providing data security with a token device
A computer-implemented method for providing security to access and store data may include transferring first information for display from a token device having...
Method and system for providing device-specific operator data for an
automation device in an automation...
Method and system for providing device-specific operator data for an automation device in an automation installation, which automation device authenticates...
Information processing apparatus, server, method for controlling the same
and storage medium
An information processing apparatus for accessing a server via a network transmits an issuance request of a certificate including information unique to the...
Method for certificate-based authentication
A first subscriber authenticates himself to a second subscriber with a certificate associated to the first subscriber. The certificate specifies one or several...
Method for secured data processing
A method for facilitating secured data processing, the method includes generating, for each client out of at least two clients, a private key, and a public key;...
Transferring web-application prerequisite files while authentication
interface occludes web-application interface
A web browser sends to a web-application server a request to access a web application. The web server transmits to the web browser a parent document with an...
Login method for client application and corresponding server
The present disclosure provides a login method for a client application and a corresponding server. The method includes: sending an access token to a browser of...
Pluggable authorization policies
A framework, which conforms to the OAuth standard, involves a generic OAuth authorization server that can be used by multiple resource servers in order to...
Global unified session identifier across multiple data centers
Systems and methods are disclosed for using a global unified session identifier across data centers. When a user first accesses a data center and an initial...
A credential management system is described that provides a way to disable and/or rotate credentials, such as when a credential is suspected to have been...
System and method for limited records access for event scheduling
The longstanding problems of user password management and security, and user authentication are addressed. Disclosed is a system and method for providing a...
Device authentication using proxy automatic configuration script requests
Methods and systems for performing device authentication using proxy automatic configuration script requests are described. One example method includes...