Match
|
Document |
Document Title |
|
US20180077196 |
REDUCING NETWORK ATTACK SURFACE AREA FOR A DATABASE USING DEEP INPUT VALIDATION
Techniques described herein improve database security by reducing network attack surface area in conjunction with deep input validation. In an embodiment, a database session receives one or more... |
|
US20180077195 |
Methods And Systems For On-Device Real-Time Adaptive Security Based On External Threat Intelligence Inputs
Methods, and computing devices implementing the methods, that enable client computing devises to work in conjunction with a server device to identify and temporarily defend against non-benign... |
|
US20180077194 |
METHOD AND SYSTEM OF REPAIRING VULNERABILITIES OF SMART DEVICES
Disclosed are systems and methods for repairing vulnerabilities of smart devices connected to a data network. An example method includes: transmitting a request through the network to obtain... |
|
US20180077193 |
ORDERED COMPUTER VULNERABILITY REMEDIATION REPORTING
Techniques for ranking a set of vulnerabilities of a computing asset and set of remediations for a computing asset, and determining a risk score for one or more computing assets are provided. In... |
|
US20180077192 |
ACCOUNT THEFT RISK IDENTIFICATION
An operation request is received from a terminal device. An identification of the terminal device is determined. Based on the identification of the terminal device, historical operation requests... |
|
US20180077191 |
FORECASTING AND CLASSIFYING CYBER-ATTACKS USING NEURAL EMBEDDINGS BASED ON PATTERN OF LIFE DATA
A first collection including a pattern of life (POL) feature vector and a Q&A feature vector is constructed. A second collection is constructed from the first collection by inserting noise in at... |
|
US20180077190 |
CLOUD-BASED THREAT OBSERVATION SYSTEM AND METHODS OF USE
A computer program that is executable on a user device and operable to display information on a user display, the computer program being configured to transmit a threat data request, receive... |
|
US20180077189 |
VISUALIZATION OF NETWORK THREAT MONITORING
A method to monitor a network is provided, including receiving traffic metric data indicating measurements related to a characteristic of network traffic flowing in the network and identifying... |
|
US20180077188 |
Methods And Systems For On-Device Real-Time Adaptive Security Based On External Threat Intelligence Inputs
Methods, and computing devices implementing the methods, that enable client computing devises to work in conjunction with a server device to identify and temporarily defend against non-benign... |
|
US20180077187 |
CYBERSECURITY INCIDENT DETECTION SYSTEMS AND TECHNIQUES
Behavioral baselines for a computer system may be accurately and efficiently established by (1) monitoring occurrences on the computer system, (2) determining, based on security rules or... |
|
US20180077186 |
METHOD AND SYSTEM FOR DETECTING SUSPICIOUS ADMINISTRATIVE ACTIVITY
Disclosed is an improved approach for identifying suspicious administrative host activity within a network. Network traffic is examined to learn the behavior of hosts within a network. This... |
|
US20180077185 |
METHOD OF AND SYSTEM FOR USER AUTHENTICATION IN ELECTRONIC SERVICE FOR TRANSMISSION OF DIGITAL OBJECTS
A method of and a system for user authentication in an electronic service for transmitting digital objects, the electronic service accessible by a client device via a client application, the... |
|
US20180077184 |
TAMPERPROOF LOGS
Methods and devices for creating a secure log of security events may include receiving a historical digest representing approved historical security events associated with a trusted network of... |
|
US20180077183 |
MODULAR EVENT PIPELINE
A modular pipeline for event management in a computer environment is provided to enable the high volume of events that may be relevant to the security and stability of that environment to be... |
|
US20180077182 |
LEARNING INTERNAL RANGES FROM NETWORK TRAFFIC DATA TO AUGMENT ANOMALY DETECTION SYSTEMS
In one embodiment, a device in a network receives traffic records indicative of network traffic between different sets of host address pairs. The device identifies one or more address grouping... |
|
US20180077181 |
BOT DETECTION BASED ON BEHAVIOR ANALYTICS
A system automatically detects bots and/or botnets. |
|
US20180077180 |
BOT DETECTION SYSTEM BASED ON DEEP LEARNING
A system automatically detects bots and/or botnets. |
|
US20180077179 |
BOT DETECTION BASED ON DIVERGENCE AND VARIANCE
A system automatically detects bots and/or botnets. |
|
US20180077178 |
METHOD AND SYSTEM FOR DETECTING MALICIOUS PAYLOADS
Disclosed is an improved method, system, and computer program product for identifying malicious payloads. The disclosed approach identifies potentially malicious payload exchanges which may be... |
|
US20180077177 |
PERIODICITY DETECTION OF NETWORK TRAFFIC
The improved detection of malicious processes executing on a networked computing device is provided. An agent running on the networked computing device monitors the communications transmitted to... |
|
US20180077176 |
DETECTING INTRUSION ATTEMPTS IN DATA TRANSMISSION SESSIONS
A computer-implemented method includes identifying a data transmission session associated with a display-oriented data transmission scheme; identifying an outbound data stream associated with the... |
|
US20180077175 |
MALICIOUS THREAT DETECTION THROUGH TIME SERIES GRAPH ANALYSIS
Malicious threat detection through time-series graph analysis, in which a data analysis device receives a data file comprising multiple log data entries. The log data entries include parameters... |
|
US20180077174 |
Intrusion Detection and Response System
Disclosed herein are system, method, and computer program product embodiments for intrusion detection and response. An embodiment operates by receiving one or more events corresponding to one or... |
|
US20180077173 |
DISTRIBUTED STORAGE NETWORK WITH ENHANCED SECURITY MONITORING
A method includes receiving a data access request from a requesting device regarding one or more encoded data slices. A data object is dispersed storage error encoded into a plurality of sets of... |
|
US20180077172 |
CLIENT REPUTATION DRIVEN ROLE-BASED ACCESS CONTROL
The present disclosure discloses a system and method for dynamically modifying role based access control for a client based on the activity. Generally, a client device is granted access to a... |
|
US20180077171 |
TRANSPARENT BRIDGE FOR MONITORING CRYPTO-PARTITIONED WIDE-AREA NETWORK
This disclosure is directed to monitoring a crypto-partitioned, or cipher-text, wide-area network (WAN). A first computing device may be situated in a plain-text portion of a first enclave behind... |
|
US20180077170 |
CONDITIONAL CONTENT ACCESS
In one embodiment, a method comprises: in response to a request of a user device to access first content, sending a challenge, relating to digital video included in second content, the challenge... |
|
US20180077169 |
Reflective Network Device Position Identification
A method of identifying a device positioned in a network and making domain assignments includes instantiating a network comprising an offsite server and a plurality of trusted devices positioned... |
|
US20180077168 |
PROXIMITY-BASED DEVICE AUTHENTICATION
An accurate distance between two devices can be determined in continuous and secure manner using modulated audible signals containing time-based information. This calculated distance can be used... |
|
US20180077167 |
SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR PUBLICLY PROVIDING WEB CONTENT OF A TENANT USING A MULTI-TENANT ON-DEMAND DATABASE SERVICE
In accordance with embodiments, there are provided mechanisms and methods for publicly providing web content of a tenant using a multi-tenant on-demand database service. These mechanisms and... |
|
US20180077166 |
METHOD OF AND SYSTEM FOR GENERATING USER PROFILES
There are disclosed methods of and systems for generating a user profile. The method is executable at a server, the server having previously generated a first profile of a first user. The first... |
|
US20180077165 |
METHODS, MEDIA, AND SYSTEMS FOR SECURING COMMUNICATIONS BETWEEN A FIRST NODE AND A SECOND NODE
Methods, media, and systems for securing communications between a first node and a second node are provided. In some embodiments, methods for securing communication between a first node and a... |
|
US20180077164 |
METHODS, SYSTEMS, AND MEDIA FOR CONTROLLING ACCESS TO CONTENT
Methods, systems, and media for controlling access to content are provided. In some embodiments, the method comprises: receiving a request to modify a first access list associated with a container... |
|
US20180077163 |
POTENTIAL BLOCKING IMPACTS
Examples disclosed herein relate to potential blocking impacts. Some of the examples enable obtaining network traffic data of a network that is accessible by a plurality of users. The network... |
|
US20180077162 |
WEBPAGE UPDATING METHOD AND SYSTEM AND WEBPAGE SERVER
The present disclosure relates to a method and system for updating a webpage and a webpage server. The method includes: upon detection of an update instruction, acquiring a feature value of an... |
|
US20180077161 |
METHOD AND APPARATUS FOR PROVIDING AND RECEIVING CONTENTS VIA NETWORK, METHOD AND APPARATUS FOR BACKING UP DATA VIA NETWORK, BACKUP DATA PROVIDING DEVICE, AND BACKUP SYSTEM
Provided are methods and apparatuses for providing contents via a network, in which original data of contents provided via a network can be traced, and contents that are modified according to... |
|
US20180077160 |
CLIENT/SERVER SECURITY BY EXECUTING INSTRUCTIONS AND RENDERING CLIENT APPLICATION INSTRUCTIONS
In an embodiment, a method comprises intercepting, from a server computer, a first set of instructions that define a user interface; executing, using a headless browser, the first set of... |
|
US20180077159 |
SECURITY RESPONSE PROTOCOL BASED ON SECURITY ALERT ENCODED DATA SLICES OF A DISTRIBUTED STORAGE NETWORK
A method includes receiving, from a requesting device, an access request for at least one security alert encoded data slice of a set of security alert encoded data slices. A security alert message... |
|
US20180077158 |
PRIVATELY PERFORMING APPLICATION SECURITY ANALYSIS
Systems and methods for analyzing applications on a mobile device for risk so as to maintain the privacy of the application user are provided. In the example method, the process receives a request... |
|
US20180077157 |
METHOD AND SYSTEM FOR IDENTIFYING USER INFORMATION IN SOCIAL NETWORK
A method for identifying user information includes obtaining a first user identifier of a user in a social network; obtaining identity authentication information corresponding to the first user... |
|
US20180077156 |
SYSTEMS AND METHODS FOR DEVICE AUTHENTICATION
Embodiments include methods, and systems and computing devices configured to implement the methods of authenticating a computing device. A processor of a first computing device may obtain a... |
|
US20180077155 |
VERIFYING AN APPLICATION IDENTIFIER ON A MOBILE DEVICE THROUGH A TELECOMMUNICATION NETWORK
A system for verifying an association between an application and a mobile computing device. The application is identified by an application instance identifier, which uniquely identifies the... |
|
US20180077154 |
USER PROFILE SELECTION USING CONTEXTUAL AUTHENTICATION
In embodiments, apparatuses, methods and storage media (transitory and non-transitory) are described that are associated with user profile selection using contextual authentication. In various... |
|
US20180077153 |
ANONYMIZING BIOMETRIC DATA FOR USE IN A SECURITY SYSTEM
An anonymized biometric representation of a target individual is used in a computer based security system. A detailed input biometric signal associated with a target individual is obtained. A... |
|
US20180077152 |
VIRTUAL SIM AUTHENTICATION
According to a first aspect of the present disclosed subject matter, a mobile terminal comprises a single cellular modem having concurrent protocol stack that is capable of simultaneous... |
|
US20180077151 |
Architecture For Access Management
Disclosed are techniques that use devices with corresponding identity wallet applications that execute on an electronic processor device of the devices, and which identity wallets store identity... |
|
US20180077150 |
Device Security Utilizing Continually Changing QR Codes
A method provides device access security via use of periodically changing Quick Response (QR) codes. The method includes: generating (706) a first authentication QR code and assigning (708) the... |
|
US20180077149 |
DISTRIBUTING AN AUTHENTICATION KEY TO AN APPLICATION INSTALLATION
Disclosed are various examples for facilitating distribution of an authentication code to installation of managed applications. An identity certificate is sent to a device by installing a... |
|
US20180077148 |
DISTRIBUTING SECURITY CODES THROUGH A RESTRICTED COMMUNICATIONS CHANNEL
Disclosed are various examples for facilitating distribution of security codes for a two-factor authentication scheme or one-time passwords. Security codes can represent one-time passwords or... |
|
US20180077147 |
ATTRIBUTED NETWORK ENABLED BY SEARCH AND RETREIVAL OF PRIVITY DATA FROM A REGISTRY AND PACKAGING OF THE PRIVITY DATA INTO A DIGITAL REGISTRATION CERTIFICATE FOR ATTRIBUTING THE DATA OF THE ATTRIBUTED NETWORK
Methods and systems generate an attributed network for tracing transmitted data that is attributable to a user. A digital registration certificate includes an identity marker and a verified... |