At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
US-9,961,104 |
Side channel attack deterrence in networks The present disclosure relates to technologies to deter side channel data center attacks. An example method may include receiving an incoming packets destined... |
US-9,961,103 |
Intercepting, decrypting and inspecting traffic over an encrypted channel A network-based appliance includes a mechanism to intercept, decrypt and inspect secure network traffic flowing over SSL/TLS between a client and a server. The... |
US-9,961,102 |
Detection of stack pivoting Particular embodiments described herein provide for an electronic device that can be configured to receive a function call for a function, determine a current... |
US-9,961,101 |
Methods and systems for implementing a phishing assessment A system, method, and computer program product for implementing a phishing assessment of a target computer network that includes a phishing assessment platform... |
US-9,961,100 |
Network security analysis system A network security analysis system performs anomaly detection with low false positives by implementing a multiple perspective analysis of network data. The... |
US-9,961,099 |
Systems and methods for detecting and tracking adversary trajectory This disclosure is related to using network flow information of a network to determine the trajectory of an attack. In some examples, an adjacency data... |
US-9,961,098 |
Container data offline and online scan in a cloud environment Techniques for security scanning of containers executing within VMs. A virtualization system maintains container disk files that store data for containers. The... |
US-9,961,097 |
System for remote access of a user premises A home security and control system for monitoring and controlling an external environment such as a home environment comprising: an Internet browser connectable... |
US-9,961,096 |
Distributed behavior based anomaly detection Systems and methods for detecting behavior-based anomalies are described herein. In various embodiments, the system includes a context engine for creating... |
US-9,961,095 |
System and method for extracting and preserving metadata for analyzing
network communications Systems and methods are provided for advanced persistent threat detection on a network. The method includes capturing data packets from a network and performing... |
US-9,961,094 |
Symptom detection using behavior probability density, network monitoring
of multiple observation value types,... One network monitoring system maintains information regarding historical activity and emergent activity of the network. Comparison of recent with historical... |
US-9,961,093 |
Monitoring for reverse-connection network activity to detect a
remote-administration tool Techniques are disclosed for detecting malicious remote-administration tool (RAT) software by detecting reverse-connection communication activity.... |
US-9,961,092 |
Method and system for forensic data tracking The present invention relates to a method and system for tracking the movement of data elements as they are shared and moved between authorized and unauthorized... |
US-9,961,091 |
Apparatus and method for characterizing the risk of a user contracting
malicious software A non-transitory computer readable storage medium includes executable instructions to identify specified network interactions initiated by a client machine. The... |
US-9,961,090 |
Message quarantine Systems, methods, apparatuses, and computer-readable media configured to receive a search query and identify one or more messages matching at least a portion of... |
US-9,961,089 |
Distributed estimation and detection of anomalies in control systems Methods and Systems for detecting anomalies in a control area of a control system. Estimating for the control area, a first state from a historical state over a... |
US-9,961,088 |
Systems and methods for geolocation-based authentication and authorization Systems and methods are provided for controlling the authentication or authorization of a mobile device user for enabling access to the resources or... |
US-9,961,087 |
Third party paywall authentication system The present technology provides a less burdensome mechanism to bring media items owned or licensed in the physical world into an account hosted by an electronic... |
US-9,961,086 |
Dynamic content authentication for secure merchant-customer communications According to various embodiments, the Message Authentication Engine is given permission to access dynamically changing content provided by a buyer system. The... |
US-9,961,085 |
Linking identities in a network entity A network entity that allows collaboration among end users of a collaborative application by using different identifiers. The network entity receives an... |
US-9,961,084 |
Computer readable storage media for tiered connection pooling and methods
and systems for utilizing same Systems and methods for tiered connection pooling are disclosed herein, which may be used in a method of fulfilling user requests in an enterprise computing... |
US-9,961,083 |
Dynamic extensible application server management A real-time plugin command-driven administrative control interface is provided that implements direct real-time command-driven control of operational... |
US-9,961,082 |
Access control for digital data A system and method to control access to data are disclosed. An access request is received from a requesting device to access requested data and a context for... |
US-9,961,081 |
System for transaction authentication Systems and methods for secure transaction authorization are provided. An emulator is instantiated on a host device and configured to emulate an integrated... |
US-9,961,080 |
Communicating notifications from a third party system to online system
users via the online system To allow a third party system to more particularly identify sets of users for distributing content, an online system receives data from a third party system... |
US-9,961,079 |
Context aware intruder detection using WIFI MAC addresses A method and system for intruder detection is provided. The method includes generating a whitelist of media access control (MAC) addresses of a plurality of... |
US-9,961,078 |
Network system comprising a security management server and a home network,
and method for including a device in... The network system comprises a security management server and a first device is added to the network system by creating a one-time code on the security... |
US-9,961,077 |
System and method for biometric authentication with device attestation A system, apparatus, method, and machine readable medium are described for biometric device attestation. For example, one embodiment of an apparatus includes: a... |
US-9,961,076 |
System and method for identity authentication A system, comprising includes an orchestration server including a processor, the orchestration server to receive authentication factors. A rules engine connects... |
US-9,961,075 |
Identity based ticketing A system for identity based ticketing is provided, wherein a user device sends a challenge to a terminal; the terminal updates a filter based on the challenge... |
US-9,961,074 |
System and method for providing an authentication certificate for a
wireless handheld device a data center... A system includes an access controller including a short range wireless communication controller to couple to a mobile device, and an access point including a... |
US-9,961,073 |
Dynamic certificate generation on a certificate authority cloud Techniques are disclosed for dynamically generating a digital certificate for a customer server. A customer server creates a certificate profile and receives an... |
US-9,961,072 |
Delegating authorizations Delegating authorizations sufficient to access services is contemplate. The authorization may be delegated in the form of a token or other transmissible... |
US-9,961,071 |
Native application single sign-on In an example embodiment, a virtual private network (VPN) connection is established between a client device and an authentication service. Then a request is... |
US-9,961,070 |
Strong authentication with feeder robot in a federated identity web
environment Method, system, and programs for performing two-factor authentication for a controlled access application via one or more third-party host verification servers.... |
US-9,961,069 |
Ticket generator for alternate authentication environments In a computer system, some resources may be protected within an SSO environment, and other resources may be protected in an alternate authentication... |
US-9,961,068 |
Single sign-on for interconnected computer systems Methods, systems, and computer-readable media support provisioning a computer application that is executed on an associated computing component through a... |
US-9,961,067 |
Zero sign-on authentication A method of facilitating zero sign-on access to media services depending on trust credentials. The trust credentials may be cookies, certificates, and other... |
US-9,961,066 |
Method and apparatus for limiting traffic rate to an origin server A method and an apparatus of limiting a rate at which traffic is received at an origin server are described. A first request for a resource at an origin server... |
US-9,961,065 |
Computerized method and system for managing an email input facility in a
networked secure collaborative... In embodiments of the present invention improved capabilities are described for managing an email input facility in a networked secure collaborative computer... |
US-9,961,064 |
Ad hoc communications Ad hoc communications are established between unknown contacts. For example, in today's mobile communications environment, there are many instances in which a... |
US-9,961,063 |
Electronic device, server, electronic device controlling method,
information processing method and recording medium An information processing device includes an interface configured to receive authentication information from an electronic device. The device also includes... |
US-9,961,062 |
Centralized authentication server for providing cross-domain resources via
a rest-based tunnel In various example embodiments, an authentication server provides a secure communication pathway between a client device and a service provider. The... |
US-9,961,061 |
Node for use by a network, a system for interconnecting multiple networks
and methods of operating the node and... There is provided a method of operating a node (512, 520, 1102) for use by a first network (502, 504), the first network (502, 504) applies an authentication... |
US-9,961,060 |
Embedded universal integrated circuit card supporting two-factor
authentication A module with an embedded universal integrated circuit card (eUICC) can include a profile for the eUICC. The profile can include a first and second shared... |
US-9,961,059 |
Authenticator plugin interface Authenticator plugin interface for an enterprise virtualization portal is provided. An example method for evaluating a portal access request may comprise:... |
US-9,961,058 |
System and method of message routing via connection servers in a
distributed computing environment A system and method of message routing messages via connections in a distributed computing environment. The method includes providing a platform server, a set... |
US-9,961,057 |
Securing a cryptographic device against implementation attacks Methods of securing a cryptographic device against implementation attacks, are described. A disclosed method comprises the steps of obtaining a key (230) from... |
US-9,961,056 |
Method of deniable encrypted communications Embodiments herein provide, for example, a method that includes generating a deniability key; downloading an encrypted blob from a server, where the encrypted... |
US-9,961,055 |
Inaccessibility of data to server involved in secure communication A client negotiates multiple cryptographic keys with a server. One of the cryptographic keys is used to encrypt communications that the server can decrypt.... |