Match Document Document Title
US20160006769 PROVIDING SERVICES TO VIRTUAL OVERLAY NETWORK TRAFFIC  
In one embodiment, an apparatus includes a processor and logic integrated with and/or executable by the processor. The logic is configured to communicate with a first physical switch, a second...
US20160006768 Controlling Physical Access to Secure Areas Via Client Devices in a Network Environment  
A method is disclosed for providing physical access credentials to a client device. The method may include receiving a request for a physical access credential, where the first request includes at...
US20160006767 DISTRIBUTED NETWORK CONNECTION POLICY MANAGEMENT  
A connection policy for a communications network has a local connection policy indicating which paths between a given one of the nodes (computer A, router A, host 898) and others of the nodes...
US20160006766 METHOD AND APPARATUS FOR PROVIDING ANALYSIS SERVICE BASED ON BEHAVIOR IN MOBILE NETWORK ENVIRONMENT  
An apparatus and method for providing analysis service based on behavior in a mobile network environment are disclosed. The apparatus includes a control unit configured to control the path of a...
US20160006765 CONNECTION-SPECIFIC COMMUNICATION MANAGEMENT  
A method of managing a connection-specific policy for accessing a target system includes receiving a request from a user client for a connection with a target system. A unique identifier is...
US20160006764 DISTRIBUTED NETWORK INSTRUMENTATION SYSTEM  
A distributed network instrumentation system (100) includes a security management station (110) including a global network policy decomposer (112) configured to decompose global network security...
US20160006763 METHOD AND APPARATUS TO DETERMINE USER PRESENCE  
According to some embodiments, a method and apparatus are provided to receive a first signal from a sensor, determine that a user is present based on the received first signal, receive a second...
US20160006762 METHOD FOR CREATING A PROFILE IN A SECURITY DOMAIN OF A SECURED ELEMENT  
Disclosed is a method for creating a profile in a target security domain of a secure element. In various implementations, the method includes a reception operation by said target security domain,...
US20160006761 ANTI-PHISHING FILTER  
A method operates to detect personal identifying or account information exchanged in a real-time electronic communication occurring between computer network users, such as electronic chat. A...
US20160006760 DETECTING AND PREVENTING PHISHING ATTACKS  
Embodiments are directed to detecting and preventing phishing attacks. In one scenario, a computer system accesses a message and analyzes content in the message to determine whether a link is...
US20160006759 System and Method for Automatic Use-After-Free Exploit Detection  
Systems, methods and media are shown for automatically detecting a use-after-free exploit based attack that involve receiving crash dump data relating to a fault event, determining whether the...
US20160006758 COMMAND INJECTION PROTECTION FOR JAVA APPLICATIONS  
A method of enhancing secure operation of a computer is disclosed. The computer receives input data from one us to source and also operates an application program which can utilise the input data....
US20160006757 DETECTION AND PREVENTION OF INSTALLATION OF MALICIOUS MOBILE APPLICATIONS  
A combination of shim and back-end server applications may be used to identify and block the installation of malicious applications on mobile devices. In practice, a shim application registers...
US20160006756 TRUSTED THREAT-AWARE MICROVISOR  
A trusted threat-aware microvisor may be deployed as a module of a trusted computing base (TCB) that also includes a root task module configured to cooperate with the microvisor to load and...
US20160006755 Dynamic Traffic Steering System and Method in a Network  
The invention provides a security system and method for use in a communications network, said network comprising means to allow a plurality of devices to communicate over the network; a security...
US20160006754 SECURE ENCLAVE-RENDERED CONTENTS  
By way of example, a computing system may include an enclave or other similar secured memory location or process. When the system receives new content or data, it may classify the content as...
US20160006753 System and Method for Embedded Mobile (EM)/Machine to Machine (M2M) Security, Pattern Detection, Mitigation  
The invention provides a security system and method for use in a communications network, said network comprising means to allow a plurality of devices to communicate over the network wherein at...
US20160006752 MOTOR VEHICLE WITH A DRIVING BEHAVIOR WHICH CAN BE MODIFIED AT A LATER STAGE USING AN APPLICATION PROGRAM  
A motor vehicle has a processor device to run application programs in a first communication zone and a storage device for vehicle control data, by which a driving behavior of the motor vehicle is...
US20160006751 REMOTE MALWARE REMEDIATION  
An opportunity to assist with remediation of a file at a remote particular host device is identified. One or more remediation techniques are identified that can be applied to assist with...
US20160006750 RELIABLE SELECTION OF SECURITY COUNTERMEASURES  
Among other things, this document describes a computer-implemented security method such as for authenticated selection of security countermeasures and for reliable identification of computing...
US20160006749 INTERNAL MALWARE DATA ITEM CLUSTERING AND ANALYSIS  
Embodiments of the present disclosure relate to a data analysis system that may automatically generate memory-efficient clustered data structures, automatically analyze those clustered data...
US20160006748 METHOD FOR DETECTING SECURITY ERROR IN MOBILE TELECOMMUNICATIONS SYSTEM AND DEVICE OF MOBILE TELECOMMUNICATIONS  
According to one embodiment, a method of performing a re-establishment procedure in a mobile communication system includes: receiving at least one packet data convergence protocol (PDCP) control...
US20160006747 SYSTEM AND METHOD FOR PARALLEL SECURE CONTENT BOOTSTRAPPING IN CONTENT-CENTRIC NETWORKS  
One embodiment of the present invention provides a system for retrieving a content collection over a network. During operation, the system determines additional information associated with the...
US20160006746 PRIORITY BASED RADIUS AUTHENTICATION  
An apparatus, method and machine readable storage medium, for an authentication server such as a RADIUS server, for authenticating a subscriber are disclosed. The method comprises: receiving at...
US20160006745 PROPAGATING AUTHENTICATION BETWEEN TERMINALS  
Propagating authentication between terminals connected to a server having identification information and user information for the terminals. The terminal receives identification information, user...
US20160006744 SENSOR-BASED HUMAN AUTHORIZATION EVALUATION  
A resource-access management system detects whether a user is authorized to access resources. The system may include a user device being configured to include a sensor that detects sensor data...
US20160006743 Bidirectional authorization system, client and method  
Disclosed is a bidirectional authorization system, including a first service provision subsystem configured to acquire a first temporary credential of the first service provision subsystem and a...
US20160006742 INFORMATION PROCESSING APPARATUS AND CONTROL METHOD THEREOF  
An information processing apparatus which manages identification information of a first user and device identification information of a device of the first user in association with each other,...
US20160006741 NETWORK SWITCH WITH HIERARCHICAL SECURITY  
Network switches and methods are disclosed. A network switch may include multiple input ports and multiple output ports, a switch fabric, and switch controller. The controller may receive and...
US20160006740 METHOD AND SYSTEM FOR EXTRACTING ACCESS CONTROL LIST  
A method and system for extracting an access control list having a predetermined format from packets collected for a predetermined period of time, without requiring TCP flag information. By an...
US20160006739 WIRELESS LOCAL AREA NETWORK ACCESS  
A system and machine-implemented method of wireless network access are provided. An authentication request comprising credentials for a user account of a cloud-based service is received from a...
US20160006738 ENHANCED USER INTERFACE AND DATA HANDLING IN BUSINESS INTELLIGENCE SOFTWARE  
A business intelligence and reporting solution can include a databook interface that acts as both as a reporting mechanism and an interface for providing data visualization parameters. In some...
US20160006737 REMOTE ACCESS TO SHARED MEDIA  
Remote media access is facilitated. According to an example embodiment, remote-user media access is facilitated using media provided by a subscriber media source, over a packet-based network. This...
US20160006736 Method and system for implementing authentication and accounting in interaction between wireless local area network and fixed network  
Disclosed is a method for implementing authentication and accounting in the interaction between a wireless local area network (WLAN) and a fixed network. The method comprises: after a user...
US20160006735 SYSTEMS AND METHODS OF DEVICE AUTHENTICATION INCLUDING FEATURES OF CIRCUIT TESTING AND VERIFICATION IN CONNECTION WITH KNOWN BOARD INFORMATION  
A method and system for authenticating a device, board, assembly or system includes obtaining or processing test/scan information provided via extraction of ECID or other unique identifying...
US20160006734 DUAL CHANNEL IDENTITY AUTHENTICATION  
Identity authentication comprises: determining, in response to a request from a first device operated by a source user, that an identity authentication is to be performed for the source user;...
US20160006733 Personal Portable Secured Network Access System  
A connection request is received from a network application for content provided by the content server. A determination is made that the network application is of a type associated with a secure...
US20160006732 TECHNOLOGIES FOR SECURE STORAGE AND USE OF BIOMETRIC AUTHENTICATION INFORMATION  
Generally, this disclosure describes technologies for securely storing and using biometric authentication information, such as biometric reference templates. In some embodiments, the technologies...
US20160006731 DOCUMENT AUTHENTICATION  
A method of authenticating a document transmitted to a service, the method comprising: selecting or inserting at least one keyword in a copy of the document as received by the service; receiving a...
US20160006730 CORRELATING COGNITIVE BIOMETRICS FOR CONTINUOUS IDENTIFY VERIFICATION  
A technique is provided for continuous user authentication through real-time fusion and correlation of multiple factors. Monitored data is continuously obtained from a computer. The monitored data...
US20160006729 METHODS AND APPARATUS FOR ESTABLISHING A SECURE COMMUNICATION CHANNEL  
A method for establishing a secure communication channel between an off-card entity and an embedded Universal Integrated Circuit Card (eUICC) is provided. The method involves establishing...
US20160006728 METHOD AND APPARATUS FOR INSTALLING PROFILE FOR EUICC  
A method and an apparatus for installing a profile in a terminal including a universal integrated circuit card (UICC) corresponding to a smart card security module, which is inserted into a mobile...
US20160006727 Interconnect Assembly  
An interconnect assembly and authentication method are disclosed herein. An example of the authentication method includes coupling a wireless connector to a wireless communications port and...
US20160006726 USING COOKIES TO IDENTIFY SECURITY CONTEXTS FOR CONNECTIONLESS SERVICE  
A mobility management entity (MME) receives a request for a key to establish a security context for communication between a base station and a user equipment in response to the user equipment...
US20160006725 Systems, Methods and Apparatuses for the Application-Specific Identification of Devices  
The systems, methods and apparatuses described herein provide a computing environment that manages application specific identification of devices. An apparatus according to the present disclosure...
US20160006724 SECURE INSTALLATION OF SOFTWARE IN A DEVICE FOR ACCESSING PROTECTED CONTENT  
The invention relates to a device for decrypting protected content and for providing the decrypted content for playback, the device comprising a secure module for carrying out cryptographic...
US20160006723 DECOUPLING IDENTITY FROM DEVICES IN THE INTERNET OF THINGS  
This invention provides for data generated by intelligent devices exchanging information about their operation and performance over the so-called “Internet of Things” to be unidentified. Where...
US20160006722 METHOD FOR MANAGING THE INSTALLATION OF AN APPLICATION ON AN ELECTRONIC DEVICE  
A method for managing the installation of an application on an electronic device is disclosed. In one aspect, the method includes seeking the authenticity of a second signature using the public...
US20160006721 Providing Social Network Content Based on the Login State of a User  
An electronic device includes a display, one or more processors, and memory storing one or more programs. The one or more programs include a first program having a user-logged-in state for a first...
US20160006720 DETECTING SHARING OF PASSWORDS FOR PASSWORD PROTECTED USER ACCOUNTS  
A method for detecting the sharing of a password related to a password protected user account provided by an organization, by multiple entities of the organization is disclosed. In one embodiment,...