AcclaimIP-ad

Match Document Document Title
US20160105468 SERVICE CAPABILITIES IN HETEROGENEOUS NETWORK  
In some implementations, a telecommunications network can include a core network device. The core network device can receive from a session-originating device an initiation request of a...
US20160105467 Systems and Methods of Making a Call  
Systems and methods of making calls are provided. A particular method includes receiving input indicating a destination address at a mobile communication device. The method also includes...
US20160105466 Personal Network Access Control System and Method  
A server is provided that includes a processor such that for a Session Initiation Protocol (SIP) request containing a Uniform Resource Identifier (URI) identifying the first device, the processor...
US20160105465 COMMUNICATION WITH ACCESSORIES  
A plurality of connections may be established between an accessory interface and a plurality of accessories. A connection between the accessory interface and a portable electronic device may also...
US20160105464 CRISSCROSS CANCELLATION PROTOCOL  
Technologies, systems, and methods for ordered message delivery that avoid message races or crisscrosses between communicating nodes. For example, if Node A sends message 3 towards Node B and,...
US20160105463 MANAGED REAL-TIME COMMUNICATIONS BETWEEN USER DEVICES  
Managed real-time communications between user devices may be provided. Upon receiving a request to instantiate a communication connection from an application, a secure session may be established...
US20160105462 Systems and Methods for Rule-Based Anomaly Detection on IP Network Flow  
A system to detect anomalies in internet protocol (IP) flows uses a set of machine-learning (ML) rules that can be applied in real time at the IP flow level. A communication network has a large...
US20160105461 INFORMATION PROCESSING APPARATUS AND CONTROL METHOD FOR INFORMATION PROCESSING APPARATUS  
In an information processing apparatus that communicates with a printing control apparatus, whether the printing control apparatus is connected is determined in a case where a security policy is...
US20160105460 SYSTEM AND METHOD FOR PROVIDING USER WITH SERVICES  
Improper communication using modified software is inhibited without checking game data itself. A system according to one embodiment realizes provision of an online game to a login user with HTTP...
US20160105459 SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR SHARING CONTENT VIA LINKS  
In accordance with embodiments, there are provided mechanisms and methods for sharing content via links. These mechanisms and methods for sharing content via links can enable customizable features...
US20160105458 DETECTING AND BREAKING CAPTCHA AUTOMATION SCRIPTS AND PREVENTING IMAGE SCRAPING  
A security device may receive a request from a client device and intended for a server device. The security device may identify the request as being associated with a malicious activity. The...
US20160105457 Risk Identification  
Systems, methods and apparatuses for analyzing a string of terms (e.g., a search query, text of an email, and the like) are provided. In some examples, a determination is made as to whether one or...
US20160105456 VIRTUAL MACHINE COMPLIANCE CHECKING IN CLOUD ENVIRONMENTS  
One or more examples provide a method of transferring a virtual machine between a virtualized computing system and a cloud computing system that includes: establishing connection between a first...
US20160105455 EXPOSURE OF AN APPARATUS TO A TECHNICAL HAZARD  
Embodiments of the invention are directed to systems, methods and computer program products for determining exposure of an apparatus to a technical hazard and prioritizing technical hazards. An...
US20160105454 DIFFERENTIAL DEPENDENCY TRACKING FOR ATTACK FORENSICS  
Methods and systems for intrusion attack recovery include monitoring two or more hosts in a network to generate audit logs of system events. One or more dependency graphs (DGraphs) is generated...
US20160105453 NETWORK ATTACK DETECTION METHOD  
It is described a network attack detection method. A topology analysis on network is conducted to obtain a probing path set containing at least one probing path. A first probing path contained in...
US20160105452 Filtering Network Traffic Using Protected Filtering Mechanisms  
Concepts and technologies are disclosed herein for filtering network traffic using protected filtering mechanisms. An indication that traffic is to be filtered can be received, and a hash key, a...
US20160105451 INFORMATION PROCESSING APPARATUS, SECURITY MANAGEMENT METHOD AND INFORMATION PROCESSING SYSTEM  
When security software is activated, it is determined whether the mode is a safe mode or a normal mode. And the security software switches a monitor in accordance with the mode.
US20160105450 PREVENTING EXECUTION OF TASK SCHEDULED MALWARE  
A method for preventing malware attacks includes the steps of detecting an attempt on an electronic device to access a task scheduler, determining an entity associated with the attempt to access...
US20160105449 RELIABLE USER-DEVICE CONTENT AND MEDIA DELIVERY APPARATUSES, METHODS AND SYSTEMS  
The RELIABLE USER-DEVICE CONTENT AND MEDIA DELIVERY APPARATUSES, METHODS AND SYSTEMS (“SEME”) can allow for the delivery of electronic content in malware and security-comprised user-device...
US20160105448 Method, Apparatus, and Computer Program Product for Privacy Management  
An apparatus for privacy management may include a processor. The processor may be configured to access one or more privacy options. In this regard, each privacy option may be configured to provide...
US20160105447 TIME-BASED CONFIGURATION PROFILE TOGGLING  
Time-based configuration profile toggling of a client device can be provided. A computing device in data communication with a client device over a network can be configured to identify an...
US20160105446 APPLYING FORWARDING POLICY TO AN APPLICATION SESSION  
A method for applying a security policy to an application session, includes recognizing the application session between a network and an application via a security gateway; determining by the...
US20160105445 COMMUNICATIONS SYSTEM, MANAGEMENT SERVER, AND COMMUNICATIONS METHOD  
A communications system includes communications terminals connected to a management server. The management server includes a terminal manager managing data center identification...
US20160105444 ENFORCING ALIGNMENT OF APPROVED CHANGES AND DEPLOYED CHANGES IN THE SOFTWARE CHANGE LIFE-CYCLE  
On a host, host content change requests are intercepted in real-time. In a tracking mode, the change requests are logged and allowed to take effect on the host. In an enforcement mode, the change...
US20160105443 RESOURCE ACCESS  
An example method for accessing a target resource in accordance with aspects of the present disclosure includes retrieving a configuration from a local profile associated with a user on a device,...
US20160105442 SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR SHARING FILES BASED ON USER PROFILE VISIBILITY  
In accordance with embodiments, there are provided mechanisms and methods for sharing files based on user profile visibility. These mechanisms and methods for sharing files based on user profile...
US20160105441 Providing Restricted Access to Given Devices by Constructing Abstract Devices  
Methods, systems, and computer program products for providing restricted access to given devices by constructing abstract devices are provided herein. A method includes generating a virtual device...
US20160105440 METHOD AND SYSTEM FOR DATA SESSION ESTABLISHMENT  
A method and system for data session establishment from a mobile device in a multiple networks scenario, the method including, checking whether an identifier for an first network is on a blacklist...
US20160105439 Anti-Hacking System for Quantum Communication  
A method and apparatus for reducing unauthorized access of an information stream. The information stream is received at a node along a path to a destination node. The information stream comprises...
US20160105438 SYSTEM, METHOD, AND APPARATUS FOR AUTHENTICATION  
An authentication apparatus updates a first execution information entry corresponding to a first identification information entry of an authentication target having undergone authentication...
US20160105437 DEVICE AND AUTHENTICATION SYSTEM  
A device includes a storage unit that stores generated challenges which are challenges previously generated, a determination unit that determines whether a newly generated challenge matches any of...
US20160105436 SECURITY VERIFICATION METHOD, APPARATUS AND TERMINAL  
Disclosed are a security verification method, apparatus, and terminal. The method includes: acquiring a first verification code and prompting the first verification code, the content of the first...
US20160105435 SYSTEMS AND METHODS TO AUTHENTICATE IDENTITY FOR SELECTIVE ACCESS TO INFORMATION RELATING TO PROPERTY  
Credential and/or location data included in data received by a networked system from a device that communicated the data to the networked system may be processed to determine if the credential...
US20160105434 SECURE TWO-WAY AUTHENTICATION USING ENCODED MOBILE IMAGE  
A digital authentication method, system, and related devices/media, the authentication method comprising displaying a web page comprising one or more website features on a first computing device,...
US20160105433 INFORMATION PROCESSING DEVICE, WIRELESS COMMUNICATION SYSTEM, INFORMATION PROCESSING METHOD, AND PROGRAM  
[Object] To propose an information processing device, wireless communication system, information processing method, and storage medium which can mutually authenticate communication partners simply...
US20160105432 SYSTEM AND METHOD TO PROVIDE INTERACTIVE, USER-CUSTOMIZED CONTENT TO TOUCH-FREE TERMINALS  
A method of displaying content to a user within a managed space comprised of one or more touch-free interactive kiosks includes collecting user data about the user. In addition, the plurality of...
US20160105431 METHOD OF PROVIDING SNS-GROUP INVITING SERVICE AND SNS SERVER THEREFOR  
A method for registering a device to a server is provided. The method includes connecting a first device to a second device, the first device having been registered to the server; receiving, by...
US20160105430 SYSTEMS AND METHODS FOR DISTRIBUTED TRUST COMPUTING AND KEY MANAGEMENT  
Devices, systems, and methods for conducting trusted computing tasks on a distributed computer system are described. In some embodiments, a client device initiates a trusted task for execution...
US20160105429 CONTROLLED USE OF A HARDWARE SECURITY MODULE  
Methods are provided for using a hardware module connectable to multiple computer systems, where the multiple computer systems are connectable to a server within a common network. The method...
US20160105428 AUTHENTICATION FOR OVER THE TOP BROADCAST STREAMING USING AUTOMATED CONTENT RECOGNITION  
An authenticator in a second user device captures a media sample comprising at least one of an audio portion, a video portion or an image portion. The media sample is played on a first user...
US20160105427 Attesting Authenticity of Infrastructure Modules  
A user device is provided that includes an authentication application that runs on the user device. A calibration device is also provided that includes authentication algorithm configuration...
US20160105426 SYSTEM AND METHOD FOR ONE TIME PASSWORD-BASED AUTHENTICATION  
Disclosed are a system and a method for one-time password (OTP)-based authentication. The system for OTP-based authentication includes a transceiver module configured to receive an authentication...
US20160105425 BIDIRECTIONAL AUTHENTICATION  
Systems, methods, and other embodiments associated with bidirectional authentication are described herein. According to one embodiment, a method includes a user receiving a communication from an...
US20160105424 NETWORK-ASSISTED FABRIC PAIRING  
Systems and methods for joining a device to a fabric using an assisting device include an indication to add a joining device to a fabric. If the joining device supports network-assisted fabric...
US20160105423 CERTIFICATES FOR LOW-POWER OR LOW-MEMORY DEVICES  
Methods and systems for generating or validating compact certificates include receiving a first format of the certificate. Moreover, obtain a signature for the certificate in the first format. For...
US20160105422 LATE BINDING AUTHENTICATION  
A late-binding token (LBT) is securely generated and provided to a device application. When the LBT is presented and validated, a resource associated with the presentation is bound to the LBT and...
US20160105421 SYSTEM AND METHOD INVOKING SECURITY AND PROFILE UTILITIES FOR GLOBAL ACCOUNT REGISTRATION  
Systems and methods are disclosed herein for managing electronic access from remote devices to a plurality of back-end computer platforms. The system includes a front-end computing system...
US20160105420 Identity and Access Management  
An access management account that includes an access identifier may be used to control access to telecommunications services or applications. An access identifier is designated for obtaining...
US20160105419 METHOD FOR LOGGING OF A REMOTE CONTROL SESSION  
A method for logging of a remote control session, for use in a remote control system comprising a session initiator operable to initiate a remote control session having a session identifier...