At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method and system for web integrity validator
A computer-implemented method and system for the validation of a true browsing user on a website is disclosed. The invention allows for the collection of data...
Relay attack countermeasure system
An apparatus for preventing a relay attack that includes a microcontroller, a receiver, and a transmitter. The receiver is configured to receive a challenge...
Cyber threat identification and analytics apparatuses, methods and systems
The cyber threat identification and analytics ("CTIA") apparatuses, methods and systems, for example, identify a list of relevant malware indicators of...
Crowdsourcing of trustworthiness indicators
Systems and methods are described herein for calculating trust score based on crowdsourced information. The trust score may reflect the trustworthiness,...
Enhanced browsing with security scanning
A method scans a second web page linked to a first web page being displayed by a browser. The method identifies a target link to the second web page. Prior to...
Controlled delivery and assessing of security vulnerabilities
A method for providing security vulnerability information is provided. The method may include checking for the security vulnerability information product...
System and method for detecting mobile cyber incident
A method for detecting mobile cyber incidents includes: allowing a mobile incident collection server to determine whether new text is received; extracting the...
Presentation of threat history associated with network activity
Methods and systems for extracting, processing, displaying, and analyzing events that are associated with one or more threats are provided. According to one...
System and method for real time data awareness
A system includes a sensor and a processor. The sensor is configured to passively read data in packets as the packets are in motion on a network. The processor...
Dynamic field re-rendering
A computer-implemented method involves identifying an initial element for serving by a web server system to a client device and recoding the element by creating...
Performance enhancements for finding top traffic patterns
A method for network traffic characterization is provided. Flow data records are acquired associated with a security alert signature. Unidimensional traffic...
Enterprise intrusion detection and remediation
Events are securely packaged and transmitted from peripherals of terminals and from secure input/out modules (SIOMs) of terminals. The events are collected and...
Out-of band IP traceback using IP packets
A method and system for tracing internet protocol packets is disclosed. One aspect of the method involves generating traceback packets containing information...
In-band identity verification and man-in-the-middle defense
A variety of techniques for performing identity verification are disclosed. As one example, a verification request is received from a remote user. The...
Method and system for obtaining peripheral information, and location proxy
A method for obtaining peripheral information method is disclosed herein and includes steps of: receiving a request for obtaining peripheral information, and...
Securing databases against piracy attacks
A database for location or geographic based services is secured by requiring location based requests to include a unique identifier that identifies the location...
User authentication based on FOB/indicia scan
Embodiments of the invention are directed to systems, methods and computer program products for receiving a request from a user for access to at least one...
Anonymous discussion forum
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for enabling anonymous posting of content, e.g., over a...
Systems, methods, and devices for predicting entitlements to computing resources are described. An entitlement associated with a user of a computer system may...
Sensor-based human authorization evaluation
A resource-access management system detects whether a user is authorized to access resources. The system may include a user device being configured to include a...
Virtual private network access control
According to an example, a method for virtual private network (VPN) access control includes receiving a request from an application on a user device to access a...
Monitoring network traffic by using event log information
A solution is provided for associating network traffic traversing a networked environment according to a selected category item, such as a user name or other...
Bi-directional communication over a one-way link
Apparatus for communication includes a single one-way link, which is physically capable of carrying the communication signals in one direction and incapable of...
Multi-tiered authentication methods for facilitating communications
amongst smart home devices and cloud-based...
Apparatus, systems, methods, and related computer program products for synchronizing distributed states amongst a plurality of entities and authenticating...
Apparatus, and associated method, for controlling connectivity of a
computer device with a computer network
A computer device can include a plurality of network adapters each operable to connect the computer device with a network, such as a private wired local area...
Dynamic communications controller
Apparatuses, systems, methods, and computer program products are disclosed for a dynamic communications session controller. An identity module is configured to...
Transforms within secure execution environments
Methods and systems for instantiating an enclave according to a request, the enclave being instantiated at a determined location of a set of locations in a...
Proxy authentication for a multiple core network device
The present invention is generally related to a network computing device including a first processor communicating with a second processor as a proxy for a...
Enterprise system authentication and authorization via gateway
Methods and systems are disclosed for providing approaches to authenticating and authorizing client devices in enterprise systems via a gateway device. The...
Binding mobile device secure software components to the SIM
Various embodiments include a method for binding a secure software application to a mobile device wherein the mobile device includes a processor and a...
Network resource management system utilizing physical network
identification for privileged network access
The disclosed network resource management system employs a hardware configuration management (HCM) information handling system (IHS) that may couple to a single...
Verifying an association between an application and a mobile device
through a telecommunication network
A system for verifying an association between an application and a mobile computing device. The mobile computing device transmits a request to a service to...
An automatic machine implemented identification and data processing, gathering and storage system and method. A system, method and computer program product for...
Image capture challenge access
Aspects of image capture challenge access are described. In one embodiment, an access service of a computing device directs an imaging system to capture an...
Auditing and permission provisioning mechanisms in a distributed secure
The embodiments described herein describe technologies for ticketing systems used in consumption and provisioning of data assets, such as a pre-computed (PCD)...
Peer to peer enterprise file sharing
Disclosed are various embodiments for facilitating the distribution of files from a file repository. Files from a file repository can be distributed via peer to...
Distributed password verification
Distribution of verification of passwords for electronic account. Password verification is distributed (divided) across multiple entities to reduce potential...
Server apparatus, information processing method, program, and storage
An information processing method for a server apparatus controlling access based on a role of a user and a scope as authority held by an authorization token for...
Cross instance user authentication architecture
In accordance with disclosed embodiments, there are provided methods, systems, and apparatuses for implementing a cross instance user authentication...
Auto login method and device
Disclosed are an auto login method and device. The method includes: when a request for auto logging into a designated account is received, acquiring the URL of...
Authentication to a remote server from a computing device having stored
Authentication to a remote-server from a computing device having stored credentials for the remote server is described. In one example, a method of...
Transfer dongle for stored vehicle information
A data transfer dongle for transferring electronic information from an existing specific vehicle module to a predetermined specific vehicle module. The dongle...
Resource protection on un-trusted devices
Authenticating a client device to a service to allow the client device to access a resource provided by the service. A client device obtains a secondary...
Methods, systems, and products for authentication of users
Methods, systems, and products authenticate users for access to devices, applications, and services. Skills of a user are learned over time, such that an...
Authentication system and method
A system and method whereby the identity of a person, entity, device or the like attempting to gain access to a secured resource may be securely authenticated...
Feature activation using near field communication
The present disclosure relates to feature activation using near field communication. In an embodiment, a device may include a chip to receive and store wireless...
Managing access to a network
In a method of managing access to a network, a MAC based authentication operation is implemented in determining whether to grant a user device access to the...
Systems and methods for securely monitoring an individual
A biometric sensor may be coupled to a portable communications device, such as a cellular telephone. The biometric sensor may be configured to acquire one or...
Method and system for establishing secure communications using composite
A method is disclosed for establishing a secure communication session using composite key cryptography. The method comprises generating a first plurality of...
Terminal and server for applying security policy, and method of
controlling the same
A method of operating a terminal using Mobile Device Management (MDM) solution includes: installing an application, requesting for registration by a license key...