At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
2018/0115585 |
AUTOMATED SECURITY POLICY There is disclosed a computing apparatus, including: a hardware platform; a service mapping requirements table including a plurality of components and having... |
2018/0115583 |
INHIBITING ELECTROMAGNETIC FIELD-BASED EAVESDROPPING A technique includes performing a plurality of instances of retrieving components of a security key from a plurality of locations of an electronic device and... |
2018/0115582 |
REAL-TIME CLOUD-BASED DETECTION AND MITIGATION OF DNS DATA EXFILTRATION
AND DNS TUNNELING Various embodiments of the invention disclosed herein provide techniques for managing a domain name system (DNS) based attack. An exfiltration and tunneling... |
2018/0115581 |
SOFTWARE DEFINED NETWORK FOR PREVENTING AN ATTACK ON A HOST TRACKING
SERVICE AND CONTROLLER INCLUDED IN THE SAME Software defined network (SDN) for preventing an attack on a host tracking service and a controller included in the same are disclosed. The SDN comprises a... |
2018/0115580 |
SECURITY APPLIANCE A security appliance may incorporate a touch screen or similar input/output interface, providing command and control over network functionality and... |
2018/0115579 |
MONITORING THE SECURITY STRENGTH OF A CONNECTION Systems, methods, and software can be used to monitor the security strength of a connection. In some aspect, a request to connect to an application server is... |
2018/0115578 |
METHODS AND SYSTEMS FOR DEEP LEARNING BASED API TRAFFIC SECURITY The present invention relates to the field of networking and API/application security. In particular, the invention is directed towards methods, systems and... |
2018/0115577 |
SYSTEM AND METHOD FOR DETECTING AND MITIGATING RANSOMWARE THREATS This disclosure relates generally to malware detection, and more particularly to system and method for detecting and mitigating ransomware threats. For a User... |
2018/0115576 |
METHODS AND SYSTEMS FOR TRANSMITTING PERFORMANCE BEACONS FROM AN EMBEDDED
DEVICE A network sensor, inserted into a mirror port of a network switch or router, may be configured to monitor the network traffic originating from an embedded... |
2018/0115575 |
ATTACK DETECTION METHOD, ATTACK DETECTION DEVICE AND BUS SYSTEM FOR A
MOTOR VEHICLE An attack detection method for a bus system of a motor vehicle, wherein communication rules for transmitting messages are determined for the bus system. The... |
2018/0115574 |
METHODS AND SYSTEMS FOR DETECTING ANOMALOUS BEHAVIOR OF NETWORK-CONNECTED
EMBEDDED DEVICES A network sensor, inserted into a mirror port of a network switch or router, may be configured to monitor the network traffic originating from an embedded... |
2018/0115573 |
PHISHING DETECTION WITH MACHINE LEARNING A system and method for identifying a phishing website is disclosed. Content associated with a website that a user is attempting to access is retrieved and... |
2018/0115572 |
METHODS AND SYSTEMS FOR DETECTING AN ELECTRONIC INTRUSION Systems and methods for detecting an electronic intrusion are described. The system receives an indication of a user activity for a user account for a service... |
2018/0115571 |
DETECTING PAST INTRUSIONS AND ATTACKS BASED ON HISTORICAL NETWORK TRAFFIC
INFORMATION A device may receive information that identifies an attack signature for detecting an intrusion. The device may determine a device configuration that is... |
2018/0115570 |
SYSTEM AND METHOD FOR CATEGORIZING MALWARE A system for categorizing malware threat names comprising a malware correlator and a frequency graph constructor engine based on a malware virus predicate. The... |
2018/0115569 |
CYBER SECURITY A method of automatically structuring data mining of computer networks is provided. The method obtains a first set of rules that define a valid transaction... |
2018/0115568 |
METHOD AND DEVICE FOR DETECTING NETWORK INTRUSION The present disclosure provides a method and a device for detecting network intrusion. The method includes: obtaining a feature vector of a network flow to be... |
2018/0115567 |
LEARNED PROFILES FOR MALICIOUS ENCRYPTED NETWORK TRAFFIC IDENTIFICATION A method for identifying malicious encrypted network traffic associated with a malware software component communicating via a network, the method including:... |
2018/0115566 |
MALICIOUS ENCRYPTED NETWORK TRAFFIC IDENTIFICATION USING FOURIER TRANSFORM A method for identifying malicious encrypted network traffic communicated via a network between a first and second computer system, the method including:... |
2018/0115565 |
PHISHING DETECTION WITH MACHINE LEARNING A system and method for identifying a phishing website is disclosed. Content associated with a website that a user is attempting to access is retrieved and... |
2018/0115564 |
SYSTEM AND METHOD THEREOF FOR IDENTIFYING AND RESPONDING TO SECURITY
INCIDENTS BASED ON PREEMPTIVE FORENSICS A system is connected to a plurality of user devices coupled to an enterprise's network. The system continuously collects, stores, and analyzes forensic data... |
2018/0115563 |
Mitigation of Malicious Software in a Mobile Communications Network There are provided measures for mitigation of malicious software in a mobile communications network. An example measure includes monitoring network traffic on... |
2018/0115562 |
PACKET ANALYSIS DEVICE AND PACKET ANALYSIS METHOD In order to allow a DPI device to determine whether a protocol library needs to be updated, this packet analysis device is provided with: a protocol library... |
2018/0115561 |
Distributed Estimation and Detection of Anomalies in Control Systems Methods and Systems for detecting anomalies in a control area of a control system. Estimating for the control area, a first state from a historical state over... |
2018/0115560 |
METHOD OF VERIFICATION The present invention relates to a method of verification of a communicating party. In particular, the invention relates to a method of verifying the identity... |
2018/0115559 |
AGGREGATION AND PROVISION OF VERIFICATION DATA A computer implemented system comprises one or more data stores storing in one or more entity-specific data locations entity access protocols for determining... |
2018/0115558 |
FAST MULTICAST MESSAGING ENCRYPTION AND AUTHENTICATION To prevent legitimate message recipients from forging new messages and to encrypt messages for a specific set of recipients (channel), a root key is encrypted... |
2018/0115557 |
CLICKJACKING PREVENTION Systems and methods provide for clickjacking prevention code provided in an embedded webpage to prevent clickjacking when the embedded webpage is called by an... |
2018/0115556 |
Systems and Methods of Restricting File Access Example embodiments of the system and methods disclosed herein include receiving a request of a file from a guest of a website, determining that it is access... |
2018/0115555 |
AUTHENTICATING DATA TRANSFER In an embodiment, a method for authenticating data transfer is provided. A user-agent is redirected between an enterprise, an intermediary platform, and an... |
2018/0115554 |
SYSTEM AND METHOD FOR ARCHITECTURE INITIATED NETWORK ACCESS CONTROL A system and method are provided for authenticating a user using a client side server within a computer network, the computer network operating in conformance... |
2018/0115553 |
TRANSPARENT ASYNCHRONOUS NETWORK FLOW INFORMATION EXCHANGE A method for providing a transparent asynchronous network flow exchange is provided. The method may include receiving a query request from a requester, whereby... |
2018/0115552 |
METHODS, SYSTEMS, AND APPARATUSES OF SERVICE PROVISIONING FOR RESOURCE
MANAGEMENT IN A CONSTRAINED ENVIRONMENT The disclosure provides a service provisioning method to support configurations of admission control, and resource control policies for constrained devices by... |
2018/0115551 |
PROXY SYSTEM FOR SECURELY PROVISIONING COMPUTING RESOURCES IN CLOUD
COMPUTING ENVIRONMENT A computer process includes, but is not limited to, obtaining cloud credential data for accessing one or more cloud accounts of a cloud computing system having... |
2018/0115550 |
AUTHORIZATION TO ACCESS A SERVER IN THE CLOUD WITHOUT OBTAINING AN INITIAL
SECRET A method and system provides access control for sensitive data. An access control system defines a plurality of access policies for gaining access to the... |
2018/0115549 |
METHODS AND NODES FOR HANDLING ACCESS TO A SERVICE VIA AN UNTRUSTED
NON-3GPP NETWORK Embodiments herein relate to a 3rd Generation Partnership Project, 3GPP, infrastructure node, a method in the 3GPP infrastructure node, 3GPP Access,... |
2018/0115548 |
APPARATUS AND METHOD FOR INSSEC PACKET GENERATION Techniques are provided herein to achieve data security and integrity using the cryptographic machinery of IEEE MACSec for TCP or UDP packets, for example,... |
2018/0115547 |
EDGE PROTECTION FOR INTERNAL IDENTITY PROVIDERS Systems and methods for edge protection for internal identity providers are provided. A first claimed embodiment of the present disclosure involves a method... |
2018/0115546 |
INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING SYSTEM, AND
INFORMATION PROCESSING METHOD A non-transitory, computer-readable recording medium having stored therein a program for causing a computer execute a process of transmitting a first random... |
2018/0115545 |
DIGITAL IDENTITY CARD MANAGEMENT Embodiments of the present invention provide methods, program products and systems to reduce mistakes in production and management of digital identification... |
2018/0115544 |
Protecting Network Communication Security A method and apparatus for protecting a network communication security. In one embodiment, there is provided a method for protecting network communication... |
2018/0115543 |
METHODS AND SYSTEMS FOR PROVIDING A ONLINE COMMUNICATION PLATFORM FOR A
TARGETED COMMUNITY OF PEOPLE The method for providing an online communication platform for a targeted community of people, by choosing a community of people, and identifying a product... |
2018/0115542 |
SECURITY MECHANISM FOR MULTI-TIERED SERVER-IMPLEMENTED APPLICATIONS A facility providing securely for a multi-tiered server-implemented application is described. The facility receives in a back-end application service a request... |
2018/0115541 |
Method for Distributed Application Segmentation Through Authorization Methods and supporting systems for managing secure communications and establishing authenticated communications between processes of a computer application... |
2018/0115540 |
REAL-TIME ELECTRONIC EVENT PROCESSING AND IDENTITY VALIDATION SYSTEM Disclosed is an event processing and identity validation system. The system typically includes a processor, a memory, and an event processing and identity... |
2018/0115539 |
System and Method for Massive loT Group Authentication It is possible to reduce singling overhead in a radio access network by coordinating authentication of a group of UEs (e.g., IoT devices, etc.) via a master... |
2018/0115538 |
Methods And Apparatus For Recording A Change Of Authorisation State Of One
Or More Authorisation Agents Roughly described, a method of recording a change of authorisation state of one or more authorisation agents, the method comprising: establishing a copy of a... |
2018/0115537 |
METHOD AND SYSTEM FOR PROTECTING USER DATA USING INDIVIDUALIZED KEYS TO
ENABLE SECURE COMPARTMENTALIZED DATA... A data management system is provided. The system includes at least one processor, configured to couple to a plurality of domains of a storage memory. The at... |
2018/0115536 |
Reconfigurable Access Network Encryption Architecture An access platform or other network elements can include multiple line cards configured to encrypt data. The platform and/or each of the line cards may receive... |
2018/0115535 |
Blind En/decryption for Multiple Clients Using a Single Key Pair Different clients encrypt secrets using a server's public RSA key, blind them using randomly generated onetime use blinding factors, and bind them to unique... |