Match Document Document Title
US20170026395 Extracting forensic indicators from activity logs  
A method for computer system forensics includes receiving an identification of a time of occurrence of an anomalous event in a computer network including multiple host computers. Logs of activity...
US20170026394 IDENTIFYING THREATS BASED ON HIERARCHICAL CLASSIFICATION  
A system and a method are disclosed for identifying network threats based on hierarchical classification. The system receives packet flows from a data network and determines flow features for the...
US20170026393 METHODS, SYSTEMS AND APPLICATION PROGRAMMABLE INTERFACE FOR VERIFYING THE SECURITY LEVEL OF UNIVERSAL RESOURCE IDENTIFIERS EMBEDDED WITHIN A MOBILE APPLICATION  
The present disclosure discloses a method of allowing Web View to verify the security level of a web content and inform the user with regards to the security and blocks web contents that are...
US20170026392 SYSTEM AND METHOD OF DETECTING MALICIOUS MULTIMEDIA FILES  
Systems and methods for detection of malicious exploitations in a multimedia file are disclosed. In one embodiment, such an approach includes parsing the compiled bytecode of a multimedia file to...
US20170026391 SYSTEM AND METHOD FOR THE AUTOMATED DETECTION AND PREDICTION OF ONLINE THREATS  
A method for monitoring online security threats comprising of a machine-learning service that receives data related to a plurality of features related to internet traffic metrics, the service then...
US20170026390 Identifying Malware Communications with DGA Generated Domains by Discriminative Learning  
Techniques are presented to identify malware communication with domain generation algorithm (DGA) generated domains. Sample domain names are obtained and labeled as DGA domains, non-DGA domains or...
US20170026389 PHISHING WARNING TOOL  
According to one embodiment, an apparatus includes a memory and a processor. The processor is configured to receive an email and to detect a click of a button that indicates that a user should be...
US20170026388 Phishing Training Tool  
According to one embodiment, an apparatus is configured to communicate a first plurality of phishing emails to a first plurality of users, each phishing email of the first plurality of phishing...
US20170026387 MONITORING ACCESS OF NETWORK DARKSPACE  
A system includes one or more “BotMagnet” modules that are exposed to infection by malicious code. The BotMagnets may include one or more virtual machines hosing operating systems in which...
US20170026386 IN-VEHICLE NETWORK SYSTEM, FRAUD-DETECTION ELECTRONIC CONTROL UNIT, AND FRAUD-DETECTION METHOD  
In a fraud-detection method for use in an in-vehicle network system including a plurality of electronic control units (ECUs) that exchange messages on a plurality of buses, a plurality of...
US20170026385 METHOD AND SYSTEM FOR PROXIMITY-BASED ACCESS CONTROL  
A system, method and computer program product for proximity-based access control, including a physical token device having a programmable computing device, a memory storage device, and a wireless...
US20170026384 CONTEXT-BASED ANALYTICS AND INTELLIGENCE  
According to some implementations, context-based information is provided. The method can establish a first context for a user to start a process of correlation of information from multiple...
US20170026383 Anonymous Application Wrapping  
Methods and systems are disclosed for providing approaches to anonymous application wrapping on a mobile device. The methods and systems may include receiving, by a controller service, a request...
US20170026382 DEVICE MANAGEMENT SYSTEM  
A system comprises a policy storage separately located relative to the user device, the policy database arranged to store information indicative of at least one usage policy set applicable to at...
US20170026381 CONTENT ACCESS VALIDATION SYSTEM AND METHOD  
To provide validation information to web publishers indicative of the presence of operational malicious software protection systems on user computing devices, an evaluation system resident on a...
US20170026380 METHOD AND SYSTEM FOR SECURE AUTHENTICATION  
A method and system for accessing a resource associated with a resource control entity that includes receiving, by a ledger, a request, corresponding to a user, to access the resource; obtaining,...
US20170026379 PROXY AUTHORIZATION OF A NETWORK DEVICE  
Some methods enable a first device to assist a second device in becoming authenticated with a content management system. The content management system can receive user credentials or an elevated...
US20170026378 CLUSTERED FILESYSTEMS FOR MIX OF TRUSTED AND UNTRUSTED NODES  
A cluster of computer system nodes share direct read/write access to storage devices via a storage area network using a cluster filesystem. At least one trusted metadata server assigns a mandatory...
US20170026377 RESOURCE MANAGEMENT IN A PRESENTATION ENVIRONMENT  
Aspects of the present disclosure are directed toward managing resources in a presentation environment. Aspects are directed toward collecting, using a set of monitoring devices, context...
US20170026376 AUTHORIZATION DELEGATION SYSTEM, CONTROL METHOD, AUTHORIZATION SERVER, AND STORAGE MEDIUM  
An authorization delegation system includes a resource server that provides a service and an authorization server that performs authorization delegation for authorizing a cooperation server, which...
US20170026375 SECURE ONLINE GAMING REGISTRATION SYSTEM WITH PRIVACY CONTROLS  
An online gaming registration system allows online gaming patrons to register once and use this registration to create online gaming accounts with gaming Web sites, thereby avoiding having to show...
US20170026374 SYSTEM AND METHOD FOR PROXYING FEDERATED AUTHENTICATION PROTOCOLS  
A system and method that include receiving a service provider identity request through a federated authentication protocol; transmitting a proxy identity request to a configured identity provider;...
US20170026373 COMMUNICATION RELAY DEVICE, COMMUNICATION NETWORK, AND COMMUNICATION RELAY METHOD  
A communication relay device that is situated between a corresponding communication node and a bus in a communication network in which a plurality of communication nodes mutually perform a data...
US20170026372 COMMON INTERNET FILE SYSTEM PROXY AUTHENTICATION OF MULTIPLE SERVERS  
Techniques are described for a proxy system to provide a client device with transparent access to multiple network file servers. The proxy system may appear to the client device as a single...
US20170026371 User Equipment Credential System  
A user equipment in a communications system, the user equipment comprising: a memory arranged to store at least one identifier associated with the user equipment; a transceiver arranged to...
US20170026370 Authenticating Communications  
The method of authenticating the source of a communication is disclosed. The method includes executing a clock for an operation period. The method also includes receiving a communication from a...
US20170026369 AUTHENTICATION OF A USER DEVICE USING TRAFFIC FLOW INFORMATION  
A device may receive traffic flow information that includes user device identifiers. The device may receive, from a user device accessing an application associated with a third party service, an...
US20170026368 Portable Device with Bio-Security Code Generating Module  
A mobile phone comprises a control unit; a wireless communication module coupled to the control unit; a display coupled to the control unit; an eye light source formed on the mobile phone for...
US20170026367 CAPTCHA SYSTEMS AND METHODS  
Systems and methods for verifying human users through cognitive processes that computers cannot imitate are described herein. Human cognitive language processing techniques may be used to verify...
US20170026366 Providing a virtual connection for transmitting application data units  
Method, comprising authenticating one or more first clients by a server, authenticating one or more second clients by the server and providing at least one application data unit switching by the...
US20170026365 MULTI-DEVICE SINGLE NETWORK SIGN-ON  
Methods, systems and computer readable media for multi-device single network sign-on are described. For example, a method can include authenticating a first device for network access via a first...
US20170026364 METHOD AND ROUTER FOR ACCESSING NETWORK  
Embodiments of the present invention provide a method implemented on a router for accessing a network, where the method comprises: obtaining an access password sent by a terminal device;...
US20170026363 Visualization of Trust in an Address Bar  
Described are a system and method for presenting security information about a current site or communications session. Briefly stated, a browsing software is configured to receive a certificate...
US20170026362 TICKET GENERATOR FOR ALTERNATE AUTHENTICATION ENVIRONMENTS  
In a computer system, some resources may be protected within an SSO environment, and other resources may be protected in an alternate authentication environment. A user logged into an alternate...
US20170026361 Federated Single Sign-On to Hadoop Cluster  
Methods, systems, and computer-readable media support provisioning a computer application that is executed on an associated computing component through a primary computing component. Even though...
US20170026360 SAFETY MEASURES FOR A NETWORK, SECURED NETWORK AND METHOD FOR SECURING A NETWORK  
Safety measures for a network as provided for example in vehicles or all kinds of rolling stock, which network includes at least a switch provided in front of or between a gateway or access...
US20170026359 DATA PROVISION SYSTEM  
A data provision system includes: a certification issuing unit that transmits business entity certification to a business entity system; a password issuing unit that transmits a password to a user...
US20170026358 SECURITY MIGRATION IN A BUSINESS INTELLIGENCE ENVIRONMENT  
In various implementations, local identifiers associated with users may be utilized to enable access one or more functions in a Business Intelligence (BI) Environment. A mapping may be generated...
US20170026357 PROXY AUTHENTICATION METHOD AND COMMUNICATION DEVICE  
A proxy authentication method executed by a communication device includes acquiring equipment identification information from equipment, the equipment identification identifying the equipment,...
US20170026356 METHOD AND APPARATUS FOR GENERATING AN INTELLIGENT PRIMARY KEY FACILITATING FASTER OBJECT RETRIEVAL  
Various methods are provided for facilitating a reduction in the number of required search operations during account creation. One example method may comprise causing creation of a user account...
US20170026355 SECURE ACCESS TO VIRTUAL MACHINES IN HETEROGENEOUS CLOUD ENVIRONMENTS  
Systems, methods, and computer-readable media provide for secure access to virtual machines in heterogeneous cloud environments. In an example embodiment, client credentials, such as a public key...
US20170026354 VEHICLE WIRELESS INTERNET SECURITY  
Methods, systems, and computer program products for vehicle wireless internet security are provided. A connection request is received from a mobile device. A data request is transmitted to the...
US20170026353 MANAGEMENT OF ACCESS SESSIONS  
Disclosed are examples of managing access sessions for a computing device. In some examples, a computing device obtains a key and timeout data from secured storage. The computing device determines...
US20170026352 GENERATING BRIDGE MATCH IDENTIFIERS FOR LINKING IDENTIFIERS FROM SERVER LOGS  
Systems and methods of matching identifiers between multiple datasets are described herein. A system can transmit a first identifier vector to a third party server. The first identifier vector can...
US20170026351 ENCODER, DECODER, SYSTEM AND METHOD FOR TRANSMITTING ENCRYPTED DATA  
An encoder for providing encrypted data for transmission via a transmission medium includes an encryption unit that is configured to encrypt data received at the encoder block by block and a...
US20170026350 SEARCHABLE ENCRYPTION ENABLING ENCRYPTED SEARCH BASED ON DOCUMENT TYPE  
A searchable encryption method enables encrypted search of encrypted documents based on document type. In some embodiments, the searchable encryption method is implemented in a network...
US20170026349 COMMUNICATION DEVICE FOR IMPLEMENTING SELECTIVE ENCRYPTION IN A SOFTWARE DEFINED NETWORK  
The present disclosure pertains to systems and methods for selectively encrypting data flows within a software defined network (SDN). In one embodiment, a communication device may be configured to...
US20170026348 MESSAGE ENCRYPTION  
The computer receives customer registration information and encryption parameters from a customer, then transmits them to the server of an entity such as a pharmacy or bank. After the entity...
US20170026347 Ultra Dense Network Security Architecture and Method  
A method for establishing a trust relationship in an ultra dense network is provided. The method comprises receiving, by a user equipment (UE), a reconfiguration request from a macrocell;...
US20170026346 Secure Content Access Authorization  
A secure content delivery or access method may include coordination among three devices such as servers—a content management server, a delivery server, and an authorization server. A request for...