Match Document Document Title
US20180159909 Self-adaptive streaming medium processing method and apparatus  
A media processing method and apparatus for adaptive streaming are provided. In the method, a Media Presentation (MP) timeline alignment event message carried in a media segment is acquired; an...
US20180159908 DISTRIBUTION APPARATUS, DISTRIBUTION CONTROL METHOD, AND DISTRIBUTION SYSTEM  
A network system includes a server, and the server distributes content and its presentation schedule to a content presentation apparatus at a distribution destination in accordance with an...
US20180159907 SENDING SNIPPETS OF MEDIA CONTENT TO A COMPUTING DEVICE  
Techniques include: providing media content to a computing device; waiting a period of time; determining that the media content has not been used; sending a snippet to the computing device, where...
US20180159906 Framework and method for realizing multimedia communication, fusion equipment and UE  
Disclosed are a framework and method for realizing multimedia communication, fusion equipment and a UE. The method comprises: a first communication terminal utilizes obtained media description to...
US20180159905 EXTENDING COMMUNICATION SERVICES TO A CONSUMPTION DEVICE USING A PROXY DEVICE  
A system for data communications comprising a handset having a processor, a wireless communications device, a speaker and a microphone and one or more software applications operating on the...
US20180159904 REMOTE LIVE SUPPORT TOOL  
To facilitate remote support, a live remote support tool providing versatile information exchange between an apparatus at a site and another apparatus in a remote support site is disclosed.
US20180159903 COGNITIVE RESOURCE SELECTION  
The patterns of usage, participation, and/or item sharing by the participants in a conference call are correlated, recognized, and used to select a data centers. This selection can be done both...
US20180159902 ACCESS TO DATA ON A REMOTE DEVICE  
A first device may receive connection requests to establish communications between a second device located behind a firewall and a third device located outside of the firewall. The first device...
US20180159901 METHOD FOR SETTING UP A WebRTC SESSION  
Some embodiments relate to a method implemented by a first terminal for setting up a session with a second terminal. An identifier of a session server is obtained at least from a subscriber device...
US20180159900 DATA PROCESSING SYSTEMS AND METHODS FOR PERFORMING PRIVACY ASSESSMENTS AND MONITORING OF NEW VERSIONS OF COMPUTER CODE FOR PRIVACY COMPLIANCE  
In various embodiments, a data map generation system is configured to: (1) enable a user to specify one or more criteria; (2) identify one or more data flows based at least in part on the one or...
US20180159899 USER INTERFACE FOR LOW-TOUCH SECURITY POLICY PROVISIONING  
In one embodiment, a system includes a processor, and a memory to store data used by the processor, the processor being operative to prepare a first user interface including a security policy...
US20180159898 ANALYSIS OF NETWORK TRAFFIC RULES AT A NETWORK VISIBILITY NODE  
Techniques are disclosed for monitoring usage of network traffic rules applied by devices on a computer network. Operations in accordance with the disclosed techniques can be performed at one or...
US20180159897 SECURITY SYSTEM, SECURITY METHOD, AND RECORDING MEDIUM FOR STORING PROGRAM  
Provided is a security system or the like with which security can be improved. A security system according to one embodiment of the present invention is provided with: a packet reception means...
US20180159896 ENHANCED COMPUTING SYSTEM SECURITY USING A SECURE BROWSER  
Described herein are systems, methods, and software to provide secure browsers to end user devices. In one implementation, a secure browsing service receives, over a network, a request for an...
US20180159895 Method, Apparatus and System for Quantifying Defense Result  
A method including acquiring a suspect data traffic set, the suspect data traffic set including data traffic corresponding to each suspect IP address in a suspect IP address set included in...
US20180159894 AUTOMATIC THRESHOLD LIMIT CONFIGURATION FOR INTERNET OF THINGS DEVICES  
Presented herein are techniques for mitigating a distributed denial of service attack. A method includes, at a network security device, such as a firewall, monitoring network traffic, flowing...
US20180159893 CLASSIFYING KILL-CHAINS FOR SECURITY INCIDENTS  
Systems, methods, and software described herein provide security actions based on the current state of a security threat. In one example, a method of operating an advisement system in a computing...
US20180159892 RUNTIME PROTECTION OF WEB SERVICES  
Protecting a runtime Web service application. A web service application is instrumented to log its operation and allow recreation of its execution trace. Trace point vulnerabilities are identified...
US20180159891 THREAT DETECTION AND MITIGATION THROUGH RUN-TIME INTROSPECTION AND INSTRUMENTATION  
A graph of a plurality of resources in a computing environment is generated, with the graph associating a first resource of the plurality with a second resource of the plurality. Based at least in...
US20180159890 MODELING OF ATTACKS ON CYBER-PHYSICAL SYSTEMSCYBER-PHYSICAL SYSTEMS  
Techniques of preventing sabotage attacks in cyber-physical systems involve automatically identifying links between nodes of a graph representing cyber-physical systems as vulnerable to sabotage...
US20180159889 SYSTEMS AND METHODS FOR AN ARTIFICIAL INTELLIGENCE DRIVEN SMART TEMPLATE  
The present disclosure describes systems and methods for determining a subsequent action of a simulated phishing campaign. A campaign controller identifies a starting action for a simulated...
US20180159888 SYSTEMS AND METHODS FOR AN ARTIFICIAL INTELLIGENCE DRIVEN SMART TEMPLATE  
The present disclosure describes systems and methods for using a template for a simulated phishing campaign, A database includes a plurality of templates for simulated phishing campaigns, each...
US20180159887 ENTERPRISE LEVEL CYBERSECURITY AUTOMATIC REMEDIATION  
Automatic detection and remediation of cybersecurity threats to an information technology installation is disclosed. An information technology installation receives at an orchestration system a...
US20180159886 SYSTEM AND METHOD FOR ANALYZING FORENSIC DATA IN A CLOUD SYSTEM  
Disclosed is a system for the analysis of forensic data, wherein the forensic data is present in a cloud system. The system has an analysis unit for analysing the forensic data, wherein the...
US20180159885 Identifying Matching Event Data from Disparate Data Sources  
Methods and apparatus consistent with the invention provide the ability to organize and build understandings of machine data generated by a variety of information-processing environments. Machine...
US20180159884 DTAT STREAM SURVEILLANCE, INTELLIGENCE AND REPORTING  
A method for monitoring and securing interprogram communications between a plurality of business applications in a network includes gathering, using a computing device, information regarding...
US20180159883 RULE-BASED NETWORK-THREAT DETECTION  
A packet-filtering device may receive packet-filtering rules configured to cause the packet-filtering device to identify packets corresponding to network-threat indicators. The packet-filtering...
US20180159882 SYSTEM AND METHODS TO PREVENT SECURITY BREACHING BY AUTHORIZED USERS IN A CLOUD ENVIRONMENT  
A system to facilitate preventing security breach of internal organizational resources by authorized system users. Resource access analysis prevents breaching sensitive organizational information...
US20180159881 AUTOMATED CYBER PHYSICAL THREAT CAMPAIGN ANALYSIS AND ATTRIBUTION  
A system for automated cyber physical threat campaign analysis and attribution, comprising a multi-dimensional time series and graph hybrid data server, an automated planning service module, and a...
US20180159880 TECHNOLOGIES FOR SECURE PERSONALIZATION OF A SECURITY MONITORING VIRTUAL NETWORK FUNCTION  
Technologies for secure personalization of a security monitoring virtual network function (VNF) in a network functions virtualization (NFV) architecture include various security monitoring...
US20180159879 SYSTEMS AND METHODS FOR CYBER-ATTACK DETECTION AT SAMPLE SPEED  
A threat detection model creation computer receives normal monitoring node values and abnormal monitoring node values. At least some received monitoring node values may be processed with a deep...
US20180159878 ATTACKING NODE DETECTION APPARATUS, METHOD, AND NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM THEREOF  
An attacking node detection apparatus, method, and computer program product thereof are provided. The attacking node detection apparatus is stored with a plurality of access records of an...
US20180159877 MULTI-MODE BOUNDARY SELECTION FOR THREAT DETECTION IN INDUSTRIAL ASSET CONTROL SYSTEM  
According to some embodiments, streams of monitoring node signal values may be received over time that represent a current operation of an industrial asset control system. A current operating mode...
US20180159876 Consolidating structured and unstructured security and threat intelligence with knowledge graphs  
An automated method for processing security events. It begins by building an initial version of a knowledge graph based on security information received from structured data sources. Using...
US20180159875 Using electronic game as means of data acquisition  
Special electronic cyber security simulator game with programmable real-life situations will allow collection of sufficient quantity of controlled attacker behavior data as well as complete...
US20180159874 UNWANTED TUNNELING ALERT SYSTEM  
Various systems and methods are provided that detect malicious network tunneling. For example, VPN logs and data connection logs may be accessed. The VPN logs may list client IP addresses that...
US20180159873 PUSH NOTIFICATIONS OF SYSTEM EVENTS IN A RESTRICTED NETWORK  
Methods, computing systems and computer program products implement embodiments of the present invention that include associating a token with a computing device, defining preferences for the...
US20180159872 Systems and Methods of Viral Enablement of Features by Peer-to-Peer Connection  
The technology disclosed relates to identifying and notifying a user of nearby attendees at a mega attendance event who are in user's social graph by comparing the user's social graph to a list of...
US20180159871 Machine Learning Based Malware Detection System  
There are provided measures for machine learning based malware detection systems. Such measures exemplarily include analyzing a set of training data, said set of training data comprising a...
US20180159870 COMMUNICATION METHOD, PROGRAM AND COMMUNICATION DEVICE USING SAME  
A communication device includes: a communication section that transmits and receives a message in a network; an acquisition unit that acquires state information on a state of an object for which...
US20180159869 Method, Mobile Switching Centre, MSC, and a Computer Program Product for Detecting Interconnect Bypass  
A method for detecting interconnect bypass by a subscription identity in a telecommunication network, said telecommunication network comprising at least a mobile switching centre, MSC, serving a...
US20180159868 NETWORK ATTACK PATTERN DETERMINATION APPARATUS, DETERMINATION METHOD, AND NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM THEREOF  
A network attack pattern determination apparatus, method, and non-transitory computer readable storage medium thereof are provided. The apparatus is stored with several attack patterns and access...
US20180159867 DATA PROTECTION METHOD AND DATA PROTECTION SYSTEM  
A data protection method includes: detecting whether a web transmission behavior occurs or not; analyzing a transmitter and a first file of the web transmission behavior, wherein the transmitter...
US20180159866 Computer Malware Detection  
According to the presently disclosed subject matter, malware induced data compression is harnessed for detecting infection of a host computer by the malicious software, which caused data...
US20180159865 SYSTEM AND METHOD FOR MESSAGE RECIPIENT VERIFICATION  
An electronic device includes a communication interface and at least one processor configured for: transmitting to or receiving from a second electronic device over proximity-based communication...
US20180159864 DOUBLE WRITE DATA EXCHANGE IN A DEAD DROP NETWORK ARCHITECTURE  
A sender uses a double-write protocol to pass data to a recipient using a dead drop network architecture. The sender sends, to a dead drop domain, a data payload to store at the dead drop domain,...
US20180159863 TECHNIQUES FOR DYNAMIC ENPOINT SECURE LOCATION AWARENESS  
Techniques for dynamic endpoint secure location awareness may include determining that a mobile device changed locations. A platform security engine in the mobile device may dynamically send a...
US20180159862 CBR-Based Negotiation RBAC Method for Enhancing Ubiquitous Resources Management  
A CBR-based negotiation RBAC method for ubiquitous resources management is described. The method, which is applicable to serving servers, includes steps of inquiring for a similar case in a case...
US20180159861 ACCESS GUARDS FOR MULTI-TENANT LOGGING  
A multi-tenant logging system that allows a user to have an individual profile that controls the user's access to tenant logs is provided. The system includes a plugin that adds features of an...
US20180159860 PACKET VALIDATION IN VIRTUAL NETWORK INTERFACE ARCHITECTURE  
Roughly described, a network interface device receiving data packets from a computing device for transmission onto a network, the data packets having a certain characteristic, transmits the packet...