Match Document Document Title
US20160050236 DATA RECEIVING DEVICE, DATA RECEIVING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM  
There is provided a data receiving device including a reception controller and a read controller. The reception controller controls an access processing device to write data received through a...
US20160050235 Flexible Server Architecture With Ability To Dynamically Change Gateway Communication Channels  
This disclosure relates to systems, methods, and computer readable media for allowing users or systems to change the gateway for particular channels of communication in an on-demand fashion, i.e.,...
US20160050234 SEAMLESS AUTHENTICATION ACROSS MULTIPLE ENTITIES  
A user may be authenticated by an identity provider (IdP) and an authentication agent (AA), producing a result. Proof of the authentication, such as a ticket for example, may be provided to the...
US20160050233 APPLYING SECURITY POLICY TO AN APPLICATION SESSION  
Applying a security policy to an application session, includes: recognizing the application session between a network and an application via a security gateway; determining by the security gateway...
US20160050232 SECURITY INFORMATION INTERACTION SYSTEM, DEVICE AND METHOD BASED ON ACTIVE COMMAND OF SECURE CARRIER  
The invention proposes a security information interaction system, apparatus and method based on security carrier's active command. The method comprises: an information interaction terminal, based...
US20160050231 SELECTIVELY PROTECTING VALID LINKS TO PAGES OF A WEB SITE  
In an embodiment, a method comprises intercepting, using a server computer, a first set of instructions that define a user interface and a plurality of links, wherein each link in the plurality of...
US20160050230 METHOD AND SYSTEM FOR RESTORING WEBSITES  
A method for restoring a website in the event of a hack or defacement is disclosed. The method comprises the step of copying the at least one webpage of the website with at least one functional...
US20160050229 VOIP DENIAL-OF-SERVICE PROTECTION MECHANISMS FROM ATTACK  
A system and method for providing advanced voice services in a wireless communications network. The system also interfaces to an Internet Protocol (IP) network to perform the advanced voice...
US20160050228 ENABLING CUSTOM COUNTERMEASURES FROM A SECURITY DEVICE  
A security device may receive information identifying a set of conditions for providing countermeasure code to a client device. The security device may receive information identifying an action to...
US20160050227 OUT OF BAND END USER NOTIFICATION SYSTEMS AND METHODS FOR SECURITY EVENTS RELATED TO NON-BROWSER MOBILE APPLICATIONS  
A cloud based security method includes authenticating a mobile device through a cloud based security system; associating the mobile device with a user of the cloud based security system based on...
US20160050226 IN-LINE FILTERING OF INSECURE OR UNWANTED MOBILE DEVICE SOFTWARE COMPONENTS OR COMMUNICATIONS  
Techniques for in-line filtering of insecure or unwanted mobile components or communications (e.g., insecure or unwanted behaviors associated with applications for mobile devices (“apps”), updates...
US20160050225 ANALYZING CYBER-SECURITY RISKS IN AN INDUSTRIAL CONTROL ENVIRONMENT  
A method of analyzing cyber-security risks in an industrial control system (ICS) including a plurality of networked devices includes providing a processor and a memory storing a cyber-security...
US20160050224 UNWANTED TUNNELING ALERT SYSTEM  
Various systems and methods are provided that detect malicious network tunneling. For example, VPN logs and data connection logs may be accessed. The VPN logs may list client IP addresses that...
US20160050223 SECURING OF SOFTWARE DEFINED NETWORK CONTROLLERS  
Methods and arrangements for securing a software defined network. One or more control messages are intercepted. Information is extracted from the one or more control messages to create a global...
US20160050222 Modification of Computing Resource Behavior Based on Aggregated Monitoring Information  
A computer system deploys monitoring agents that monitor the status and health of the computing resources. An analysis engine aggregates and analyzes event information from monitoring agents in...
US20160050221 ELECTRONIC MESSAGE BOARD FACT CHECKING  
A fact checking system is able to verify the correctness of information and/or characterize information by comparing the information with one or more sources. The fact checking system...
US20160050220 Detection of Webcam Abuse  
A method of detecting unauthorised use of a webcam or a microphone on a computer system, the method including, at the computer, identifying a process that is using the webcam or the microphone,...
US20160050219 BLUETOOTH BEACON PROTOCOL  
Beacon devices may transmit beacon messages to alert an application on a mobile phone of the beacon device's proximity. An encrypted authorization may be used to prevent malicious attacks....
US20160050218 Anonymous Server Based User Settings Protection  
Systems and methods for verifying an application data modification are described herein. In one example, a method includes detecting modified application data in a computing device and determining...
US20160050217 System, Method And Authorization Device For Biometric Access Control To Digital Devices  
A system and method for authenticating and continuously verifying authorized users of a digital device includes an authentication device attached to an arm or wrist of authorized users. The...
US20160050216 CLOUD-BASED GATEWAY SECURITY SCANNING  
Some embodiments of cloud-based gateway security scanning have been presented. In one embodiment, some data packets are received sequentially at a gateway device. The data packets constitute at...
US20160050215 PLATFORM TRUST EXTENSION  
A system and method of providing a platform trust extension for an information handling system is disclosed herein. The platform trust extension receives a notification that an application is...
US20160050214 METHOD FOR AUTOMATICALLY APPLYING ACCESS CONTROL POLICIES BASED ON DEVICE TYPES OF NETWORKED COMPUTING DEVICES  
Techniques for managing access control policies are described herein. According to one embodiment, access control policies (ACPs) and access control rules (ACRs) are downloaded from a management...
US20160050213 SYSTEM, METHOD, COMPUTER PROGRAM AND DATA SIGNAL FOR THE PROVISION OF A PROFILE OF IDENTIFICATION  
In one aspect, the invention provides a method for the provision of a profile, comprising the steps of receiving information relevant to an individual, formatting the information into a format...
US20160050212 METHOD AND APPARATUS FOR ASSIGNING DEVICES TO A MEDIA SERVICE  
A user interface is used to assign different devices and device types to media services where the number of different devices and device types that are capable of being assigned is determined by...
US20160050211 ACCESS MANAGEMENT USING ELECTRONIC IMAGES  
Techniques are described for an access management system to manage access to a service (e.g., a message management service). A client can receive a message including an electronic image from a...
US20160050210 METHOD AND SYSTEM FOR MAINTAINING PRIVACY IN A MACHINE DIRECTED WORKFLOW FOR THE PURPOSE OF CREATING A SET OF AUTHORIZED USERS  
Various of the disclosed embodiments concern methods and systems for maintaining privacy in a machine directed workflow for the purpose of creating a set of authorized users. According to one...
US20160050209 ACCESS CONTROL BASED ON AUTHENTICATION  
Systems and methods for granting access to different applications and/or functionalities on a user device based on at least a length of authentication provided by a user are described. A user...
US20160050208 MOBILE DEVICE ENABLED TIERED DATA EXCHANGE VIA A VEHICLE  
A mobile device enabled tiered data exchange via a vehicle is disclosed. A mobile device can access profile information related to a tiered-data sharing profile. The tiered-data sharing profile...
US20160050207 APPARATUS, AND ASSOCIATED METHOD, FOR CONTROLLING CONNECTIVITY OF A COMPUTER DEVICE WITH A COMPUTER NETWORK  
A computer device can include a plurality of network adapters each operable to connect the computer device with a network, such as a private wired local area network (LAN) or a wireless local area...
US20160050206 ACCESS TO A SUBSET OF INFORMATION RELATIVE TO A USER  
One embodiment described herein is a method comprising obtaining at least one sharing rule, each sharing rule associated with at least one subset of information and defined by at least one...
US20160050205 PREVENTING UNAUTHORIZED ACCESS TO AN APPLICATION SERVER  
A method and platform for preventing unauthorized access to an application server comprises collecting access data associated with an organization, anonymizing the access data, creating...
US20160050204 TECHNIQUES AND SYSTEM FOR EXTENDED AUTHENTICATION  
An apparatus may include a memory to store authentication information for authenticating to a device group and a wearable device identifier for an unauthenticated device, a communications...
US20160050203 Environment-Based Two-Factor Authentication without Geo-Location  
The invention provides a method and system for accomplishing two-factor authentication for internet transactions, wherein the user of the device through which the transaction is negotiated needs...
US20160050202 IDENTITY CARD HOLDER AND SYSTEM  
An identity card holder with a processor, a memory, an antenna, an interface for communicating with an identity card, positioning circuitry for obtaining position data of the identity card holder...
US20160050201 METHOD FOR AUTHENTICATING USERS AND DEVICES ON A COMPUTING NETWORK  
A method for authenticating users and devices on a computing network is disclosed. The method includes authenticating a user and a user's device with a computing network based upon received...
US20160050200 Network Identity Certificate Pinning  
Systems, methods and apparatuses for ensuring that a computing device is attempting to connect to a network, such as a wireless network, provided by an expected or trusted entity. For instance, a...
US20160050199 KEY MANAGEMENT USING QUASI OUT OF BAND AUTHENTICATION ARCHITECTURE  
A portable apparatus is removably and communicatively connectable to a network device to communicate authentication or authorization credentials of a user in connection with the user logging into...
US20160050198 METHOD AND SYSTEM OF PROVIDING A PICTURE PASSWORD PROOF OF KNOWLEDGE AS A WEB SERVICE  
A server provides a picture password proof of knowledge. The server includes a processor creating a user identifier when communicating with a relying party (RP) server, sending the identifier to...
US20160050197 AUDIO AUTHENTICATION SYSTEM  
According to one embodiment, an apparatus is provided that comprises a memory, an interface, and a processor communicatively coupled to the memory and to the interface. The memory can store a...
US20160050196 Control Device and Method for Electronic Atomization Device Based on Mobile Terminal  
Disclosed are a control device and a control method for electronic atomization device based on mobile terminal. The device includes a Bluetooth control module, a matching module and an...
US20160050195 System and Method for Limited Records Access for Event Scheduling  
The longstanding problems of user password management and security, and user authentication are addressed. Disclosed is a system and method for providing a means for a user to identify themselves...
US20160050194 WEB-BASED GOVERNANCE OF MESSAGING SERVICES  
A system for messaging application governance including an application server computer configured to provide an application service, an administration module, and a communication module. The...
US20160050193 SYSTEM AND METHODS FOR SECURE COMMUNICATION IN MOBILE DEVICES  
A system and a method for secure communication in a mobile computing device involve obtaining, by a first program installed on the mobile computing device, an access credential from an...
US20160050192 MULTI-DIMENSIONAL FRAMEWORK FOR DEFINING CRITERIA THAT INDICATE WHEN AUTHENTICATION SHOULD BE REVOKED  
Methods and systems are presented for defining criteria that indicate when authentication for an identified client device should be revoked based on rules associated with interested parties....
US20160050191 INTELLIGENT DELIVERY SYSTEM  
An access control system includes a plurality of containers. Each container comprises a container identification feature, an interior space, a locking device which can be selectively released to...
US20160050190 ENABLING A CONTENT RECEIVER TO ACCESS ENCRYPTED CONTENT  
There is described a method of enabling a content receiver to access encrypted content, the content receiver forming part of a home network. The method comprises executing, on a device that also...
US20160050189 END POINT SECURED NETWORK  
The disclosed embodiments include a method for receiving data packets at a host system. In one embodiment, the method includes the steps of: intercepting a data packet, at a data link layer, that...
US20160050188 SYSTEMS AND METHODS FOR PROTECTING INTERNET ADVERTISING DATA  
Systems and methods are disclosed for protecting user privacy in, for example, online advertising environments. The method includes receiving data related to a user in a first communication...
US20160050187 METHODS AND APPARATUSES TO TRACK INFORMATION USING CALL SIGNALING MESSAGES  
Methods and systems to facilitate real time communications via a telephonic apparatuses that support data communications. In one embodiment, a telephonic apparatus includes: a network interface to...