Match Document Document Title
US20170099315 SYSTEM AND METHOD FOR OBTAINING KEYS TO ACCESS PROTECTED INFORMATION  
A server uses an encryption key to decrypt authentication information thereby facilitating communication with network-accessible applications that may be remotely located from the server. Servers...
US20170099314 Domain Reputation Evaluation Process and Method  
A system for the identification and subsequent rating of domains based on a result derived from a proprietary algorithm configured to detect when a new domain is registered, correlate the domain...
US20170099313 SYSTEM AND METHOD FOR PROVIDING COMPUTER NETWORK SECURITY  
This disclosure relates generally to computer network, and more particularly to a system and method for providing computer network security. In one embodiment, a method is provided for providing...
US20170099312 Method and system for data breach and malware detection  
Detecting cyber threat and malware, particularly zero-day malware is a major challenge for the security community. Signature-based methods of cyber threat and malware detection are unable to...
US20170099311 NETWORK ANOMALY DETECTION  
A security system detects anomalous activity in a network. The system logs user activity, which can include ports used, compares users to find similar users, sorts similar users into cohorts, and...
US20170099310 DYNAMIC DEEP PACKET INSPECTION FOR ANOMALY DETECTION  
In one embodiment, a device in a network captures a first set of packets based on first packet capture criterion. The captured first set of packets is provided for deep packet inspection and...
US20170099309 DYNAMIC INSTALLATION OF BEHAVIORAL WHITE LABELS  
In one embodiment, a device in a network analyzes data regarding a detected anomaly in the network. The device determines whether the detected anomaly is a false positive. The device generates a...
US20170099308 CYBERSECURITY SYSTEM WITH DIFFERENTIATED CAPACITY TO DEAL WITH COMPLEX CYBER ATTACKS  
An improved cyber security protection system with differentiated capacity to deal with complex cyber attacks in complex, highly-connected industries. The system architecture is goal-oriented and...
US20170099307 SYSTEMS AND METHODS FOR INSTRUCTIONS-BASED DETECTION OF SOPHISTICATED OBFUSCATION AND PACKING  
Disclosed herein are new methods and systems for detecting obfuscated programs. We build a recursive traversal disassembler that extracts the control flow graph of binary files. This allows us to...
US20170099306 DETECTION OF ADVANCED PERSISTENT THREAT ATTACK ON A PRIVATE COMPUTER NETWORK  
A system for detecting an advanced persistent threat (APT) attack on a private computer network includes hosts computers that receive network traffic and process the network traffic to identify an...
US20170099305 MANAGEMENT AND DISTRIBUTION OF VIRTUAL CYBER SENSORS  
A system includes reception of data at a computing network, generation of alerts at the computing network based on received data and on cyber sensor data, the cyber sensor data defining data...
US20170099304 AUTOMATIC GENERATION OF CLUSTER DESCRIPTIONS  
In one embodiment, a method includes receiving data associated with a cluster at a computer and processing the data at the computer to automatically generate a description of the cluster. The data...
US20170099303 METHOD, SYSTEM, AND STORAGE MEDIUM FOR ADAPTIVE MONITORING AND FILTERING TRAFFIC TO AND FROM SOCIAL NETWORKING SITES  
Embodiments disclosed herein provide a system, method, and computer readable storage medium storing computer instructions for implementing a Socialware architecture encompassing a suite of...
US20170099302 METHODS, SYSTEMS, AND MEDIA FOR INHIBITING ATTACKS ON EMBEDDED DEVICES  
Methods, systems, and media for inhibiting attacks on embedded devices are provided. In some embodiments, a system fur inhibiting on embedded devices is provided, the system comprises a processor...
US20170099301 MANAGING ACCESS TO CONTENT FOR A SPONSORED DATA CAMPAIGN  
A device may receive a network address and a signature. The network address may be associated with a sponsored data campaign, and the signature may be generated based on a security key and based...
US20170099300 SYSTEM AND PROCESS FOR DISTRIBUTION OF INFORMATION ON A COMMUNICATION NETWORK  
A communications system includes a plurality of recipient processors located at geographically remote locations with respect to each other and connected for communication with an information...
US20170099299 PERMISSIONS FOR HYBRID DISTRIBUTED NETWORK RESOURCES  
A computing resource service provider may receive, from a user client connected to an on-premises network, a security document specifying one or more user roles defining a level of access to...
US20170099298 CLIENT-SIDE INTEGRATION FRAMEWORK OF SERVICES  
Systems and methods for providing client-side integration of apps and services is provided. An integration framework execution upon a computing device provides integration of various apps,...
US20170099297 VIRTUAL COLLABORATION SYSTEMS AND METHODS  
A system including a domain controller and a document, policy, and collaboration servers. The document server receives a request signal based on an input received at a web browser of a user device...
US20170099296 ACCESS CONTROL SYSTEM AND METHOD  
A team-centric computerized access control system includes at least one data record, one or more collaboration spaces associated with the data record, and for each collaboration space, one or more...
US20170099295 ACCESS AND PORTABILITY OF USER PROFILES STORED AS TEMPLATES  
A system to access one or more user profiles that govern one or more vehicle functions. The system cooperates with a processor and verification module which are adapted to verify, using one or...
US20170099294 Multi-Party Secure Information Integration System  
A method of the present disclosure includes a host system authenticating a user of the user device to access secure host information associated with the user in a database. A request may be...
US20170099293 DIGITAL CERTIFICATION ANALYZER TEMPORARY EXTERNAL SECURED STORAGE SYSTEM TOOLS  
A temporary external secured storage (or “TESS”) system utilizes a group of system tools to aid in the management of digital content. An artificial or virtual chain tool, manager tool and enhanced...
US20170099292 Systems and Methods for Access Permission Revocation and Reinstatement  
Provided herein are systems and methods of managing permissions for applications deployed in a distributed computing infrastructure. An exemplary system includes an access management server having...
US20170099291 PROTECTING PRIVACY IN AN ONLINE SETTING  
Systems, methods, and computer program products to perform an operation comprising receiving digital content associated with an account identifier, parsing the digital content and extracting a set...
US20170099290 AUDITABLE RETRIEVAL OF PRIVILEGED CREDENTIALS  
In an approach for providing auditable retrieval of privileged credentials in a privilege identity management (PIM) system, a processor invokes a checkout of a PIM credential, based on, at least,...
US20170099289 Temporary Mac Address-Based Access Method, Apparatus, and System  
A temporary MAC address-based access method, apparatus, and system is provided. A method includes performing wireless communication access authentication on a base station for a non-base station...
US20170099288 INFORMATION PROCESSING SYSTEM, PERIPHERAL DEVICE, WIRELESS COMMUNICATION CHIP, COMPUTER-READABLE NON-TRANSITORY STORAGE MEDIUM HAVING APPLICATION PROGRAM STORED THEREIN, AND INFORMATION PROCESSING METHOD  
In this information processing system including a server, a communication terminal communicable with the server via the Internet, and a peripheral device capable of performing short-range wireless...
US20170099287 USER AUTHENTICATED ENCRYPTED COMMUNICATION LINK  
Systems and methods are provided for establishing a secure communication link between a first client and a second client. One exemplary computer-implemented method for establishing a secure...
US20170099286 ENABLING APPLICATION FUNCTIONS RESPONSIVE TO BIOMETRIC INPUT FROM MORE THAN ONE PERSON  
A method includes running an application on a mobile computing device, the mobile computing device accepting biometric input, and the mobile computing device enabling one or more function of the...
US20170099285 METHODS AND APPARATUS TO SUPPORT GLOBALPLATFORM USAGE ON AN EMBEDDED UICC (eUICC)  
Disclosed herein is a technique for managing one or more electronic Subscriber Identity Modules (eSIMs) on an embedded UICC (eUICC). In particular, the technique involves leveraging the...
US20170099284 SOFTWARE-DEFINED NETWORK THREAT CONTROL  
In Software-Defined Network (SDN), a trust controller and trust processor exchange hardware-trust data over an SDN southbound interface to maintain hardware-trust. A flow controller transfers a...
US20170099283 SINGLE LOGIN AUTHENTICATION FOR USERS WITH MULTIPLE IPV4/IPV6 ADDRESSES  
Disclosed in the authentication and authorization of a client device to access a plurality of resources, requiring a user of a client device to enter only one set of login information....
US20170099282 ACCESS CONTROL AND SECURITY FOR SYNCHRONOUS INPUT/OUTPUT LINKS  
Aspects include providing automatic access control and security for a synchronous input/output (I/O) link. Providing automatic access control and security includes initializing devices of a...
US20170099281 IDENTITY MANAGEMENT OVER MULTIPLE IDENTITY PROVIDERS  
Systems and processes of advanced identity management over multiple identity providers deployable through mobile applications are provided. The process, e.g., method, includes requesting a backend...
US20170099280 Single Sign-On Method for Appliance Secure Shell  
A system and method for efficiently establishing a secure shell connection for accessing Web resources. A user attempts to establish a secure Hypertext Transfer Protocol (HTTP) session between a...
US20170099279 IN-VEHICLE SHARED-SCREEN SYSTEM WITH WRITE BACK TO MULTIPLE USER ACCOUNTS  
In some examples, a vehicle head unit of a vehicle includes at least one processor; and at least one module operable to: responsive to authenticating a first user at a vehicle head unit of a...
US20170099278 DYNAMIC IDENTITY CHECKING  
A selector apparatus to select one or more shared authentication facilities for a software service executing in a virtualized shared computing environment, the software service including an...
US20170099277 Systems and Methods of External Entity Network Service Authentication  
Systems and methods are disclosed for providing external entity network authentication, including a processor comprising a computer-readable medium with a set of instructions operable to receive...
US20170099276 WRIST WORN RFID DEVICE WITH SECURITY PROTECTION AND METHOD THEREOF  
A wrist worn RFID device with security protection includes a wrist worn body, a control circuit, a sensing circuit, a safety circuit, a RFID module and a processing circuit. When the control...
US20170099275 AUDITABLE RETRIEVAL OF PRIVILEGED CREDENTIALS  
In an approach for providing auditable retrieval of privileged credentials in a privilege identity management (PIM) system, a processor invokes a checkout of a PIM credential, based on, at least,...
US20170099274 CALL ENCRYPTION SYSTEMS AND METHODS  
Techniques described herein may be used to encrypt a telephone call between users. User devices (e.g., smart phones) may be connected to encryption relay devices that operate as relays between...
US20170099273 PERIPHERAL DEVICE, WIRELESS COMMUNICATION CHIP, COMPUTER-READABLE NON-TRANSITORY STORAGE MEDIUM HAVING APPLICATION PROGRAM STORED THEREIN, INFORMATION PROCESSING SYSTEM, AND INFORMATION PROCESSING METHOD  
This first communication section transmits, to an authentication server, an encryption key, identification information capable of uniquely identifying a peripheral device, and signature...
US20170099272 Hiding A Public Key Exchange in Noise  
A process of hiding one or more public keys inside of random noise is introduced, whose purpose is to protect the privacy of the public keys. In some embodiments, the random noise is produced by...
US20170099271 MANAGE ENCRYPTED NETWORK TRAFFIC USING DNS RESPONSES  
This present disclosure generally relates to managing encrypted network traffic using Domain Name System (DNS) responses. One example method includes requesting an address associated with the a...
US20170099270 SYSTEMS AND METHODS FOR ENCRYPTED COMMUNICATION IN A SECURE NETWORK  
A method for users of devices including mobile phones and computers to engage in encrypted communications with other devices using asymmetrical key exchange technology, involving the user of a...
US20170099269 SECURE TRANSMISSION SYSTEM WITH UPGRADED ENCRYPTION STRENGTH  
According to one embodiment, is configured to receive a request to communicate a message comprising a body to an intended recipient and to receive a first public key of the intended recipient and...
US20170099268 ENCRYPTED MESSAGE COMMUNICATION  
Computer-implemented methods are provided for communicating message data from a sender computer to a receiver computer via a network. The sender computer encrypts the message data in dependence on...
US20170099267 SYSTEMS AND METHODS FOR PKCS #8 PRIVATE FILE KEY SUPPORT  
A communications platform may provide asymmetric cryptography using RSA and/or DSA algorithms using a public and private key pair. The communications platform and corresponding cryptographic...
US20170099266 METHOD AND SYSTEM FOR SENDING A MESSAGE THROUGH A SECURE CONNECTION  
The method and system enable secure forwarding of a message from a first computer to a second computer via an intermediate computer in a telecommunication network. A message is formed in the first...