Match Document Document Title
US20180077196 REDUCING NETWORK ATTACK SURFACE AREA FOR A DATABASE USING DEEP INPUT VALIDATION  
Techniques described herein improve database security by reducing network attack surface area in conjunction with deep input validation. In an embodiment, a database session receives one or more...
US20180077195 Methods And Systems For On-Device Real-Time Adaptive Security Based On External Threat Intelligence Inputs  
Methods, and computing devices implementing the methods, that enable client computing devises to work in conjunction with a server device to identify and temporarily defend against non-benign...
US20180077194 METHOD AND SYSTEM OF REPAIRING VULNERABILITIES OF SMART DEVICES  
Disclosed are systems and methods for repairing vulnerabilities of smart devices connected to a data network. An example method includes: transmitting a request through the network to obtain...
US20180077193 ORDERED COMPUTER VULNERABILITY REMEDIATION REPORTING  
Techniques for ranking a set of vulnerabilities of a computing asset and set of remediations for a computing asset, and determining a risk score for one or more computing assets are provided. In...
US20180077192 ACCOUNT THEFT RISK IDENTIFICATION  
An operation request is received from a terminal device. An identification of the terminal device is determined. Based on the identification of the terminal device, historical operation requests...
US20180077191 FORECASTING AND CLASSIFYING CYBER-ATTACKS USING NEURAL EMBEDDINGS BASED ON PATTERN OF LIFE DATA  
A first collection including a pattern of life (POL) feature vector and a Q&A feature vector is constructed. A second collection is constructed from the first collection by inserting noise in at...
US20180077190 CLOUD-BASED THREAT OBSERVATION SYSTEM AND METHODS OF USE  
A computer program that is executable on a user device and operable to display information on a user display, the computer program being configured to transmit a threat data request, receive...
US20180077189 VISUALIZATION OF NETWORK THREAT MONITORING  
A method to monitor a network is provided, including receiving traffic metric data indicating measurements related to a characteristic of network traffic flowing in the network and identifying...
US20180077188 Methods And Systems For On-Device Real-Time Adaptive Security Based On External Threat Intelligence Inputs  
Methods, and computing devices implementing the methods, that enable client computing devises to work in conjunction with a server device to identify and temporarily defend against non-benign...
US20180077187 CYBERSECURITY INCIDENT DETECTION SYSTEMS AND TECHNIQUES  
Behavioral baselines for a computer system may be accurately and efficiently established by (1) monitoring occurrences on the computer system, (2) determining, based on security rules or...
US20180077186 METHOD AND SYSTEM FOR DETECTING SUSPICIOUS ADMINISTRATIVE ACTIVITY  
Disclosed is an improved approach for identifying suspicious administrative host activity within a network. Network traffic is examined to learn the behavior of hosts within a network. This...
US20180077185 METHOD OF AND SYSTEM FOR USER AUTHENTICATION IN ELECTRONIC SERVICE FOR TRANSMISSION OF DIGITAL OBJECTS  
A method of and a system for user authentication in an electronic service for transmitting digital objects, the electronic service accessible by a client device via a client application, the...
US20180077184 TAMPERPROOF LOGS  
Methods and devices for creating a secure log of security events may include receiving a historical digest representing approved historical security events associated with a trusted network of...
US20180077183 MODULAR EVENT PIPELINE  
A modular pipeline for event management in a computer environment is provided to enable the high volume of events that may be relevant to the security and stability of that environment to be...
US20180077182 LEARNING INTERNAL RANGES FROM NETWORK TRAFFIC DATA TO AUGMENT ANOMALY DETECTION SYSTEMS  
In one embodiment, a device in a network receives traffic records indicative of network traffic between different sets of host address pairs. The device identifies one or more address grouping...
US20180077181 BOT DETECTION BASED ON BEHAVIOR ANALYTICS  
A system automatically detects bots and/or botnets.
US20180077180 BOT DETECTION SYSTEM BASED ON DEEP LEARNING  
A system automatically detects bots and/or botnets.
US20180077179 BOT DETECTION BASED ON DIVERGENCE AND VARIANCE  
A system automatically detects bots and/or botnets.
US20180077178 METHOD AND SYSTEM FOR DETECTING MALICIOUS PAYLOADS  
Disclosed is an improved method, system, and computer program product for identifying malicious payloads. The disclosed approach identifies potentially malicious payload exchanges which may be...
US20180077177 PERIODICITY DETECTION OF NETWORK TRAFFIC  
The improved detection of malicious processes executing on a networked computing device is provided. An agent running on the networked computing device monitors the communications transmitted to...
US20180077176 DETECTING INTRUSION ATTEMPTS IN DATA TRANSMISSION SESSIONS  
A computer-implemented method includes identifying a data transmission session associated with a display-oriented data transmission scheme; identifying an outbound data stream associated with the...
US20180077175 MALICIOUS THREAT DETECTION THROUGH TIME SERIES GRAPH ANALYSIS  
Malicious threat detection through time-series graph analysis, in which a data analysis device receives a data file comprising multiple log data entries. The log data entries include parameters...
US20180077174 Intrusion Detection and Response System  
Disclosed herein are system, method, and computer program product embodiments for intrusion detection and response. An embodiment operates by receiving one or more events corresponding to one or...
US20180077173 DISTRIBUTED STORAGE NETWORK WITH ENHANCED SECURITY MONITORING  
A method includes receiving a data access request from a requesting device regarding one or more encoded data slices. A data object is dispersed storage error encoded into a plurality of sets of...
US20180077172 CLIENT REPUTATION DRIVEN ROLE-BASED ACCESS CONTROL  
The present disclosure discloses a system and method for dynamically modifying role based access control for a client based on the activity. Generally, a client device is granted access to a...
US20180077171 TRANSPARENT BRIDGE FOR MONITORING CRYPTO-PARTITIONED WIDE-AREA NETWORK  
This disclosure is directed to monitoring a crypto-partitioned, or cipher-text, wide-area network (WAN). A first computing device may be situated in a plain-text portion of a first enclave behind...
US20180077170 CONDITIONAL CONTENT ACCESS  
In one embodiment, a method comprises: in response to a request of a user device to access first content, sending a challenge, relating to digital video included in second content, the challenge...
US20180077169 Reflective Network Device Position Identification  
A method of identifying a device positioned in a network and making domain assignments includes instantiating a network comprising an offsite server and a plurality of trusted devices positioned...
US20180077168 PROXIMITY-BASED DEVICE AUTHENTICATION  
An accurate distance between two devices can be determined in continuous and secure manner using modulated audible signals containing time-based information. This calculated distance can be used...
US20180077167 SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR PUBLICLY PROVIDING WEB CONTENT OF A TENANT USING A MULTI-TENANT ON-DEMAND DATABASE SERVICE  
In accordance with embodiments, there are provided mechanisms and methods for publicly providing web content of a tenant using a multi-tenant on-demand database service. These mechanisms and...
US20180077166 METHOD OF AND SYSTEM FOR GENERATING USER PROFILES  
There are disclosed methods of and systems for generating a user profile. The method is executable at a server, the server having previously generated a first profile of a first user. The first...
US20180077165 METHODS, MEDIA, AND SYSTEMS FOR SECURING COMMUNICATIONS BETWEEN A FIRST NODE AND A SECOND NODE  
Methods, media, and systems for securing communications between a first node and a second node are provided. In some embodiments, methods for securing communication between a first node and a...
US20180077164 METHODS, SYSTEMS, AND MEDIA FOR CONTROLLING ACCESS TO CONTENT  
Methods, systems, and media for controlling access to content are provided. In some embodiments, the method comprises: receiving a request to modify a first access list associated with a container...
US20180077163 POTENTIAL BLOCKING IMPACTS  
Examples disclosed herein relate to potential blocking impacts. Some of the examples enable obtaining network traffic data of a network that is accessible by a plurality of users. The network...
US20180077162 WEBPAGE UPDATING METHOD AND SYSTEM AND WEBPAGE SERVER  
The present disclosure relates to a method and system for updating a webpage and a webpage server. The method includes: upon detection of an update instruction, acquiring a feature value of an...
US20180077161 METHOD AND APPARATUS FOR PROVIDING AND RECEIVING CONTENTS VIA NETWORK, METHOD AND APPARATUS FOR BACKING UP DATA VIA NETWORK, BACKUP DATA PROVIDING DEVICE, AND BACKUP SYSTEM  
Provided are methods and apparatuses for providing contents via a network, in which original data of contents provided via a network can be traced, and contents that are modified according to...
US20180077160 CLIENT/SERVER SECURITY BY EXECUTING INSTRUCTIONS AND RENDERING CLIENT APPLICATION INSTRUCTIONS  
In an embodiment, a method comprises intercepting, from a server computer, a first set of instructions that define a user interface; executing, using a headless browser, the first set of...
US20180077159 SECURITY RESPONSE PROTOCOL BASED ON SECURITY ALERT ENCODED DATA SLICES OF A DISTRIBUTED STORAGE NETWORK  
A method includes receiving, from a requesting device, an access request for at least one security alert encoded data slice of a set of security alert encoded data slices. A security alert message...
US20180077158 PRIVATELY PERFORMING APPLICATION SECURITY ANALYSIS  
Systems and methods for analyzing applications on a mobile device for risk so as to maintain the privacy of the application user are provided. In the example method, the process receives a request...
US20180077157 METHOD AND SYSTEM FOR IDENTIFYING USER INFORMATION IN SOCIAL NETWORK  
A method for identifying user information includes obtaining a first user identifier of a user in a social network; obtaining identity authentication information corresponding to the first user...
US20180077156 SYSTEMS AND METHODS FOR DEVICE AUTHENTICATION  
Embodiments include methods, and systems and computing devices configured to implement the methods of authenticating a computing device. A processor of a first computing device may obtain a...
US20180077155 VERIFYING AN APPLICATION IDENTIFIER ON A MOBILE DEVICE THROUGH A TELECOMMUNICATION NETWORK  
A system for verifying an association between an application and a mobile computing device. The application is identified by an application instance identifier, which uniquely identifies the...
US20180077154 USER PROFILE SELECTION USING CONTEXTUAL AUTHENTICATION  
In embodiments, apparatuses, methods and storage media (transitory and non-transitory) are described that are associated with user profile selection using contextual authentication. In various...
US20180077153 ANONYMIZING BIOMETRIC DATA FOR USE IN A SECURITY SYSTEM  
An anonymized biometric representation of a target individual is used in a computer based security system. A detailed input biometric signal associated with a target individual is obtained. A...
US20180077152 VIRTUAL SIM AUTHENTICATION  
According to a first aspect of the present disclosed subject matter, a mobile terminal comprises a single cellular modem having concurrent protocol stack that is capable of simultaneous...
US20180077151 Architecture For Access Management  
Disclosed are techniques that use devices with corresponding identity wallet applications that execute on an electronic processor device of the devices, and which identity wallets store identity...
US20180077150 Device Security Utilizing Continually Changing QR Codes  
A method provides device access security via use of periodically changing Quick Response (QR) codes. The method includes: generating (706) a first authentication QR code and assigning (708) the...
US20180077149 DISTRIBUTING AN AUTHENTICATION KEY TO AN APPLICATION INSTALLATION  
Disclosed are various examples for facilitating distribution of an authentication code to installation of managed applications. An identity certificate is sent to a device by installing a...
US20180077148 DISTRIBUTING SECURITY CODES THROUGH A RESTRICTED COMMUNICATIONS CHANNEL  
Disclosed are various examples for facilitating distribution of security codes for a two-factor authentication scheme or one-time passwords. Security codes can represent one-time passwords or...
US20180077147 ATTRIBUTED NETWORK ENABLED BY SEARCH AND RETREIVAL OF PRIVITY DATA FROM A REGISTRY AND PACKAGING OF THE PRIVITY DATA INTO A DIGITAL REGISTRATION CERTIFICATE FOR ATTRIBUTING THE DATA OF THE ATTRIBUTED NETWORK  
Methods and systems generate an attributed network for tracing transmitted data that is attributable to a user. A digital registration certificate includes an identity marker and a verified...