Match Document Document Title
US20160134651 DETECTION OF BEACONING BEHAVIOR IN NETWORK TRAFFIC  
A method for detecting beaconing behavior includes preprocessing network records to identify candidate source and destination pairs for detecting beaconing behavior, where each source and...
US20160134650 SYSTEM, METHOD, AND APPARTUS FOR PROACTIVE CYBERSECURITY  
The present disclosure describes a device, software package, method and system for active scanning, testing, and risk assessment of networks. The present disclosure describes a device that may be...
US20160134649 Cognitive Detection of Malicious Documents  
An approach is provided in which a knowledge manager identifies document command statements in a document that correspond to requests included in the document. The knowledge manager compares the...
US20160134648 DETECTING COMPUTER SECURITY THREATS IN ELECTRONIC DOCUMENTS BASED ON STRUCTURE  
In an embodiment, a data processing method providing an improvement in computer security comprises selecting, from a queue identifying a plurality of web pages, a particular web page to retrieve...
US20160134647 Cognitive Detection of Malicious Documents  
An approach is provided in which a knowledge manager identifies document command statements in a document that correspond to requests included in the document. The knowledge manager compares the...
US20160134646 METHOD AND APPARATUS FOR DETECTING MALICIOUS SOFTWARE USING HANDSHAKE INFORMATION  
In one embodiment, a method includes identifying unusual behavior with respect to a handshake between a first endpoint and a second endpoint that are included in a network, and determining whether...
US20160134645 IDENTIFYING AN IMPOSTER ACCOUNT IN A SOCIAL NETWORK  
A method for identifying an imposter account in a social network includes a monitoring engine to monitor user accounts of a social network, an identifying engine to identify attributes associated...
US20160134644 GEOLOCATION SAFETY AWARENESS  
A method and/or technique for geolocation safety awareness is provided herein. When a user, having a client device, travels to a location, threats associated with that location may not be known to...
US20160134643 Network Protection from Cyber Attacks  
Electronic screen shots protect against cyber attacks. When any webpage is received, a screen shot of the webpage may be generated. Should the webpage be from an untrusted source, the screen shot...
US20160134642 SECURE CONTENT AND ENCRYPTION METHODS AND TECHNIQUES  
In order to capture electronic information provided by a user to another user different third parties seek to download tracking software, viruses etc. to the user's computer systems. These may...
US20160134641 DETECTION OF BEACONING BEHAVIOR IN NETWORK TRAFFIC  
A method for detecting beaconing behavior includes preprocessing network records to identify candidate source and destination pairs for detecting beaconing behavior, where each source and...
US20160134640 SYSTEMS AND METHODS TO SECURELY INSTALL NETWORK CONTROLLERS  
Multi-network systems and methods to securely install communication information on a network controller for communications between the network controller and an intelligent device over a control...
US20160134639 METHOD FOR USER AUTHENTICATION USING DNSSEC  
This invention leverages DNSSEC to makes post-password technologies work against endpoints across the globe, rather than solely within company walls. It describes a system by which DS records are...
US20160134638 SYSTEMS AND METHODS FOR CONSUMER DIGITAL PRIVILEGES  
Systems and methods are described for limiting access to digital content based on a privileged access model. In one implementation, a consumer identification is received based on a request by the...
US20160134637 SYSTEMS AND METHODS FOR ENABLING COLLABORATION AND COORDINATION OF SUPPORT  
The present invention relates to systems and methods for enabling collaboration and coordination of support within a controlled electronic environment. In particular, embodiments of the present...
US20160134636 Remote trust attestation and geo-location of servers and clients in cloud computing environments  
Methods and systems may provide for selecting a hypervisor protocol from a plurality of hypervisor protocols based on a communication associated with a remote agent. The selected hypervisor...
US20160134635 SYSTEMS, COMMUNICATION ENDPOINTS, AND RELATED METHODS FOR DISTRIBUTING IMAGES CORRESPONDING TO COMMUNICATION ENDPOINTS  
Systems and methods are disclosed for distributing images corresponding to communication endpoints. A system includes one or more servers configured to determine whether image privacy settings...
US20160134634 METHOD AND SYSTEM PROTECTING AGAINST IDENTITY THEFT OR REPLICATION ABUSE  
A method, implemented by a computer-implemented authentication system, for authenticating a user attempting to access a target component of a computer system, the method comprising: a) receiving,...
US20160134633 MECHANISM FOR REPUTATION FEEDBACK BASED ON REAL TIME INTERACTION  
A method for confirming that a user interacted with a resource provider before allowing the user to submit feedback associated with the resource provider is disclosed. A social network provider...
US20160134632 SECURE INSTALLATION OF NETWORK DEVICES USING BEACONING SYSTEMS AND METHODS  
Secure installation of a new device onto a home-control network uses pairing with an intelligent device. An intelligent device, such as a smartphone, receives a notification, such as optical...
US20160134631 ENABLING ENFORCEMENT OF LICENSING TERMS IN DISTRIBUTING CONTENT IN CONTAINERS BY INCLUDING A KEY IN THE CONTAINER CONTAINING THE PERTINENT LICENSING TERMS  
A method, system and computer program product for enforcing licensing terms when distributing content via a container image running in a container. Upon receiving a request for a service from the...
US20160134630 OPEN CONNECTION MANAGER VIRTUALIZATION AT SYSTEM-ON-CHIP  
Resource and memory use by applications used by user equipment (UE) can be adaptively controlled. A UE comprises a connection-manager kernel (CMKC) that can be embedded at the SOC level to...
US20160134629 BINDING MOBILE DEVICE SECURE SOFTWARE COMPONENTS TO THE SIM  
Various embodiments include a method for binding a secure software application to a mobile device wherein the mobile device includes a processor and a subscriber identity module (SIM) card,...
US20160134628 INTEGRITY PROTECTION FOR DATA STORAGE  
A system for protecting the integrity of a memory system maintains an age counter and an opportunity counter for each of multiple memory blocks; maintains an epoch counter for the memory system;...
US20160134627 SYSTEM FOR ESTABLISHING OWNERSHIP OF A SECURE WORKSPACE  
The present application is directed to establishing ownership of a secure workspace (SW). A client device may provide a SW data structure (SWDS) to a SW configurator. A SWDS may comprise a hash of...
US20160134626 DEVICE NOTARIZATION  
Methods and systems for device notarization and verification are provided. In one implementation, various integrity values are concatenated to generate a concatenated value that is used to...
US20160134625 METHOD AND APPARATUS FOR CONTROLLING COMMUNICATIONS TERMINAL AND CORRESPONDING COMMUNICATIONS TERMINAL  
Embodiments of the present invention disclose a method and an apparatus for controlling a communications terminal and a corresponding communications terminal, including: setting, in a...
US20160134624 MOBILE AUTHENTICATION IN MOBILE VIRTUAL NETWORK  
Systems, methods, and non-transitory computer-readable storage media for using mobile network authentication factors to authenticate a mobile device.
US20160134623 SECURE EXECUTION ENVIRONMENT SERVICES  
Techniques for managing secure execution environments provided as a service to computing resource service provider customers are described herein. A request to launch a secure execution...
US20160134622 Restricted Certificate Enrollment For Unknown Devices In Hotspot Networks  
A network access system, e.g. a network hotspot, requires a mobile network access device, e.g. a smart phone or WiFi only device, to provide a network access standard designation and/or a device...
US20160134621 CERTIFICATE PROVISIONING FOR AUTHENTICATION TO A NETWORK  
A method for authenticating a device to a network using a device certificate is described. The method includes generating a private-public key pair on a system-on-chip (SoC) of the device. The...
US20160134620 LOADING USER DEVICES WITH LISTS OF PROXIMATELY LOCATED BROADCAST BEACONS AND ASSOCIATED SERVICE IDENTIFIERS  
A user device transmits a location update message, indicating a location of the user device, to a network server. Responsive to the location update message, the user device receives from the...
US20160134619 System and Method for Single Sign-On Technical Support Access to Tenant Accounts and Data in a Multi-Tenant Platform  
Shown is single sign-on support access to tenant accounts in a multi-tenant service platform involving a proxy user account in an identity provider for a tenant account on the service platform...
US20160134618 ANTICIPATORY SINGLE SIGN-ON (SSO) FOR PROXIED WEB APPLICATIONS  
One embodiment provides a method, including: receiving, from an end user device, authentication data of a user of a web service; storing, in a single sign-on service, data for authenticating the...
US20160134617 SENDING SESSION TOKENS THROUGH PASSIVE CLIENTS  
A session token can be requested to be sent to a first computing service from a second computing service, and a first computing service can receive the requested session token from the second...
US20160134616 DESKTOP APPLICATION FULFILLMENT PLATFORM WITH MULTIPLE AUTHENTICATION MECHANISMS  
A service provider system may include an application fulfillment platform that delivers desktop applications to desktops on physical computing devices or virtual desktop instances. A computing...
US20160134615 Computer-Implemented Method for Mobile Authentication and Corresponding Computer System  
In one embodiment of the present invention a computerized method includes receiving at a personal-mobile device a first communication, which includes information for requesting user verification...
US20160134614 USER AUTHENTICATION BASED ON OTHER APPLICATIONS  
The present invention includes a system for authenticating a second action based on a first action, wherein the system is configured to: receive a first request to execute a first action...
US20160134613 Wireless Local Area Network WLAN Access Method, Terminal, and Server  
A wireless local area network (WLAN) access method, a terminal, and a server implement intelligentization and simplify a user operation. The method includes sending, by the terminal, a request for...
US20160134612 User Authentication  
A user may be authenticated using credentials associated with online retailers. A username and password associated with an online retailer, for example, may be submitted to a different online...
US20160134611 SKILL-BASED SECURE DYNAMIC CONTACT CENTER AGENT ACCESS  
Methods, systems and computer readable media for providing skill-based, secure and dynamic contact center agent network access are described.
US20160134610 PRIVACY DURING RE-AUTHENTICATION OF A WIRELESS STATION WITH AN AUTHENTICATION SERVER  
Methods, systems, apparatuses, and devices are described for privacy during re-authentication of a wireless station with an authentication server. The wireless station may derive a first...
US20160134609 USER AUTHENTICATION CONFIDENCE BASED ON MULTIPLE DEVICES  
The present application is directed to user authentication confidence based on multiple devices. A user may possess at least one device. The device may determine a device confidence level that the...
US20160134608 NODAL RANDOM AUTHENTICATION  
Systems, methods, and computer program products related to transaction application security are disclosed. In a particular embodiment, application nodes are randomly selected for requiring...
US20160134607 METHOD OF RSVP AUTHENTICATION WITH NON-DIRECTLY CONNECTED NEIGHBOR  
A method is executed by a network device for authenticating resource reservation protocol (RSVP) messages between a sending node and a receiving node where the sending node and receiving node are...
US20160134606 CHANGING GROUP MEMBER REACHABILITY INFORMATION  
In an embodiment, a method comprises obtaining a second network address at a computer node, which has been already associated with a first network address and provided first keying information;...
US20160134605 SYSTEMS AND METHODS TO SECURELY INSTALL NETWORK DEVICES USING PHYSICAL CONFIRMATION  
A cloud server communicates with a network controller over communication channels of a communication network to securely install a new device having a unique identifier and a device key onto a...
US20160134604 SYSTEMS AND METHODS TO SECURELY INSTALL NETWORK DEVICES USING INSTALLED NETWORK DEVICES  
Secure installation of a new device onto a home-control network uses pairing with an existing network device. The new device receives a private key for secure communications on the home-control...
US20160134603 INSTALLATION OF NETWORK DEVICES USING SECURE BROADCASTING SYSTEMS AND METHODS FROM REMOTE INTELLIGENT DEVICES  
Secure installation of a new device onto a home-control network uses pairing with an intelligent device. The new device receives a private key for secure communications on the home-control network...
US20160134602 SECURE SHARING OF USER ANNOTATED SUBSCRIPTION MEDIA WITH TRUSTED DEVICES  
Generally, this disclosure provides systems, methods and computer readable media for secure sharing of user annotated subscription media content with trusted devices. The shared content may...