Match Document Document Title
US20160080404 DETECTION OF MALICIOUS NETWORK CONNECTIONS  
In one embodiment a method, system and apparatus is described for detecting a malicious network connection, the method system and apparatus including determining, for each connection over a...
US20160080403 SYSTEM AND METHOD FOR MONITORING DATA AND PROVIDING ALERTS  
A method for monitoring data and providing alerts is disclosed. In particular, the method may including monitoring and capturing data associated with a user of a device. Additionally, the method...
US20160080402 DYNAMIC CONFIGURATION OF SETTINGS IN RESPONSE TO DDOS ATTACK  
A system can monitor the server for indications of an attack and adjusts server settings accordingly. In response, the system can increase server tolerance in a systematic way to deal with DDoS by...
US20160080401 METHOD AND SYSTEM FOR DETECTING UNAUTHORIZED ACCESS ATTACK  
A method is provided for detecting unauthorized access attack. The detecting method includes obtaining at least one HTTP request and at least one URL address of the HTTP request by parsing the...
US20160080400 FILE REPUTATION EVALUATION  
One or more techniques and/or systems are provided for file acquisition for reputation evaluation. A reputation service may be configured to evaluate files and provide reputations of such files to...
US20160080399 THREAT DETECTION USING A TIME-BASED CACHE OF REPUTATION INFORMATION ON AN ENTERPRISE ENDPOINT  
Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple labeling schemes to distinguish between...
US20160080398 SYSTEM AND METHOD FOR DETECTION OF TARGETED ATTACKS  
Methods, systems, and computer programs for detecting targeted attacks on compromised computer. An example method includes receiving from a plurality of computer systems data about the network...
US20160080397 Method and System for Forensic Data Tracking  
The present invention relates to a method and system for tracking the movement of data elements as they are shared and moved between authorized and unauthorized devices and among authorized and...
US20160080396 METHOD AND SYSTEM FOR DATA SECURITY  
A method for data security is provided. The method may include obtaining a first object which is set as a sensitive object. The method may also include obtaining a second object, whereby there is...
US20160080395 Provisional Bot Activity Recognition  
In one implementation, a network device is configured to monitor communications associated with an endpoint and identify domain name service messages in the communications. Subsequently, the...
US20160080394 METHOD, APPARATUS AND COMPUTER DEVICE FOR SCANNING INFORMATION TO BE SCANNED  
The present invention provides a method for scanning information to be scanned in a computer device, the information to be scanned needing multiple scans, and the method comprising the steps of:...
US20160080393 ALLOWING VARIED DEVICE ACCESS BASED ON DIFFERENT LEVELS OF UNLOCKING MECHANISMS  
Systems and methods may provide for receiving runtime input from one or more unlock interfaces of a device and selecting a level of access with regard to the device from a plurality of levels of...
US20160080392 IMPLEMENTING SECURITY IN A SOCIAL APPLICATION  
Implementing security in social applications includes inferring a closeness level of a connection to a user's profile of a social application based on a closeness policy and implementing a...
US20160080391 SYSTEM FOR MONITORING ACCESS TO NETWORK WITHIN SECURED SITE  
A controller is provided which monitors/manages information terminals' access to a network within a secured site. A controller of the present invention includes: a storage device for storing...
US20160080390 METHOD AND APPARATUS FOR NETWORK CONTROLLED TICKET ACCESS  
The system provides a method and apparatus for providing controlled access to events, premises, transportation, and the like. In one embodiment, the system provides a ticket that is tied to a user...
US20160080389 Using Connections Between Users In A Social Networking System To Regulate Operation Of A Machine Associated With A Social Networking System User  
A social networking system includes information identifying a machine (e.g., a robot, a drone, a computer, a thermostat, etc.) and a connection between the machine and an owner of the machine,...
US20160080388 MANAGING SECURITY RESTRICTIONS ON A RESOURCE IN A DEFINED ENVIRONMENT  
Approaches described herein manage security restrictions on a resource in a defined environment to provide authorization and access. Specifically, a security system maintains a security...
US20160080387 Database Access Using A Common Web Interface  
Methods and systems for accessing databases using a common web interface are provided. A method for transmitting data retrieved from an endpoint device to a client device using a common web...
US20160080386 Boosting Remote Direct Memory Access Performance Using Cryptographic Hash Based Approach  
A mechanism is provided in a data processing system for performing a remote direct memory access operation. Responsive to receiving in a network interface controller a hash value of data to be...
US20160080385 Contact Identification Validation via Social Invitation  
Systems and techniques are disclosed for receiving one or more recipient identifiers and a destination location from a user or an application. A uniform resource locator may be generated and may...
US20160080384 METHOD AND APPARATUS FOR DNA-BASED AUTHENTICATION SYSTEM  
Techniques for biochemcally-enabled security/authentication mechanisms are described herein. In an example embodiment, a security system receives a biological sample from a key. The biological...
US20160080383 RECOVERY FROM ROLLING SECURITY TOKEN LOSS  
An aspect of recovery from rolling security token loss includes storing, in a memory device accessible by a server computer, a token pair (B) transmitted to a client device. The token pair (B)...
US20160080382 Information Processing Method and Electronic Device  
An information processing method is described that is applied to an electronic device capable of running an application. The method includes inserting a first execution module into a target...
US20160080381 SYSTEMS AND METHODS FOR ONLINE THIRD-PARTY AUTHENTICATION OF CREDENTIALS  
Systems and methods are disclosed for online authentication of online attributes. One method includes receiving an authentication request from a rely party, the authentication request including...
US20160080380 ESTABLISHING TRUST BETWEEN TWO DEVICES  
Techniques described herein leverage a trusted entity within a domain to enable devices to establish trust with one another so they can securely discover each other and connect to one another. In...
US20160080379 EFFICIENT AND RELIABLE ATTESTATION  
A computing device, or a security component of a computing device, implements delayed attestation by initially providing first credentials to a remote access device to establish a first level of...
US20160080378 IDENTIFYING UNTRUSTED NETWORK ACCESS POINTS  
An apparatus, method and program product are provided that determines a location associated with a network access point, the network access point being identified by an access point identifier,...
US20160080377 SYSTEMS AND METHODS FOR PROVIDING SECURE PRE-BOOT AND ROOT AUTHENTICATION TO AN INFORMATION HANDLING SYSTEM  
In accordance with embodiments of the present disclosure, a method may include receiving a unique identifier associated with a host information handling system. The method may also include,...
US20160080376 METHOD AND DEVICE FOR CHECKING AN IDENTIFIER  
An embodiment relates to a method for processing data that includes (a) calculating a second identifier based on input data, (b) conducting a first operation comparing the second identifier with a...
US20160080375 METHOD AND DEVICE FOR PROCESSING DATA  
A method for processing data is suggested, and includes (i) conveying input data from a safety component to a security component, and (ii) calculating, at the security component, a second...
US20160080374 OUTPUT SYSTEM, OUTPUT METHOD, OUTPUT DATA STORAGE APPARATUS, AND OUTPUT DATA RELAY APPARATUS  
An output system includes a first system that performs authentication using user information including first authentication information and outputs from an output apparatus output data specified...
US20160080373 Sensor Information Transparency System and Method  
The present invention relates generally to the field of information transparency, and, more particularly, to a system and method for providing non-ambiguous sensor information transparency for...
US20160080372 CRYPTOGRAPHIC PROTOCOL FOR PORTABLE DEVICES  
Embodiments are directed towards communicating using a mobile device that performs actions including. A mobile device may be provisioned with an access point such that a provisioning key and a...
US20160080371 Method for Authenticating Identity of Handset User in A Cloud-Computing Environment  
A method for authenticating the identity of a handset user in a cloud-computing environment is provided. The method includes: obtaining, a login account and a password from the user; judging...
US20160080370 SECURE MANAGEMENT OF A SMART CARD  
A smart card includes a processing circuit, a memory that contains a protected object, an activity detector that receives a signal that describes a planned activity of a person who is in physical...
US20160080369 SOURCE DEVICE FOR SYSTEMS AND METHODS OF VERIFYING AN AUTHENTICATION USING DYNAMIC SCORING  
A source device for systems and methods of verifying an authentication based on dynamic scoring is disclosed, wherein the source device is configured to receive at least one identification feature...
US20160080368 FACILITATING DYNAMIC END-TO-END INTEGRITY FOR DATA REPOSITORIES IN AN ON-DEMAND SERVICES ENVIRONMENT  
In accordance with embodiments, there are provided mechanisms and methods for facilitating dynamic end-to-end integrity for data repositories in an on-demand services environment in an on-demand...
US20160080367 ADAPTIVE TIMEOUTS FOR SECURITY CREDENTIALS  
Session-specific information stored to a cookie or other secure token can be selected and/or caused to vary over time, such that older copies will become less useful over time. Such an approach...
US20160080366 TRANSFORMATION RULES FOR ONE-TIME PASSWORDS  
A one-time password may be used and generated using transformation rules. A one-time password transformation rule is received. The one-time password is sent to a user. A response to the one-time...
US20160080365 MEDICAL DEVICE WIRELESS ADAPTER  
The invention relates generally to a medical device wireless adapter, and more particularly, to a module that adapts an existing legacy or newly designed medical device to a healthcare provider's...
US20160080364 METHOD AND SYSTEM FOR PROVIDING A SECURE COMMUNICATION CHANNEL TO PORTABLE PRIVATIZED DATA  
A system and method for communicating secure, privatized data stored on a first user device with a second user device requesting access thereto includes initiating a timed access gate for...
US20160080363 COMPUTER IMPLEMENTED METHOD OF ANALYZING X.509 CERTIFICATES IN SSL/TLS COMMUNICATIONS AND THE DATAPROCESSING SYSTEM  
A computer implemented method of analyzing X.509 certificates in SSL/TLS communications, and the data processing system for implementing said method, that may include: extracting X.509...
US20160080362 VIRTUAL MASS RECOGNITION TOOL  
A tool for administering virtual recognition of a group of users is provided. The group of users may be specifically identified or dynamically generated based on criteria selected by an...
US20160080361 SINGLE SIGN-ON (SSO) FOR MOBILE APPLICATIONS  
A framework, which conforms to the OAuth standard, involves a generic OAuth authorization server that can be used by multiple resource servers in order to ensure that access to resources stored on...
US20160080360 Detection And Repair Of Broken Single Sign-On Integration  
An identity management system provides single sign-on (SSO) services to clients, logging the clients into a variety of third-party services for which the clients have accounts. An SSO integration...
US20160080359 AUTHENTICATION USING LIGHTS-OUT MANAGEMENT CREDENTIALS  
A method includes upon receiving a request from a user to perform an operation on a device that is running under an operating system, authenticating the user on the basis of credential data that...
US20160080358 HOSTED APPLICATION SANDBOX MODEL  
An application host (such as a web application server) may execute a set of applications on behalf of a set of users. Such applications may not be fully trusted, and a two-way isolation of the...
US20160080357 UTILIZING VEHICLE INFORMATION AS A SECURITY PIN/PASSKEY  
A method for connecting a mobile device to a vehicle system of a vehicle. The method includes the following: generating a passkey based on at least one of vehicle information and an image...
US20160080356 AUTHENTICATION MECHANISM  
A computer-implemented method for preventing password leakage into a non-password field includes detecting that a user of an electronic device has entered a character in a non-password field...
US20160080355 AUTHENTICATION OF API-BASED ENDPOINTS  
A method includes detecting an incoming request from a first application to a second application. The method further includes performing an authentication that involves sending a challenge message...