Match Document Document Title
US20160197968 Private Interaction Hubs  
A mobile device has memory storage to maintain hub data that is associated with a private interaction hub, where the hub data includes multiple types of displayable data that is editable by...
US20160197967 DISCOVERY PLAYLIST CREATION  
One embodiment provides a non-transitory medium containing computer program code that performs an operation that includes retrieving, for each of two or more identified users, a respective musical...
US20160197966 VIRTUAL PRIVATE MEETING ROOM  
A conference session is established. Different unique identifications and persistent dedicated virtual private network conference rooms are assigned to different recipients. A conference session...
US20160197965 METHOD AND ARRANGEMENT FOR MANAGING SECURITY RECONFIGURATION IN A CELLULAR COMMUNICATION SYSTEM  
Methods are discussed of managing security reconfiguration and cell update procedures in a user equipment and in a node in a cellular communication system and a user equipment and a node in the...
US20160197964 System and Method of Generating Verification Code  
The present disclosure provides techniques for redrawing a new diagram authentication code. An existing diagram authentication code and a rendering style configuration file are retrieved, and a...
US20160197963 APPLICATION LAYER-BASED SINGLE SIGN ON  
Methods and systems are provided for implementing application layer security. According to one embodiment, security rules applicable to end users of a private IP network and particular resources...
US20160197962 Network Access Control with Compliance Policy Check  
Embodiments of the present invention include methods involving an authentication application, a client application, or a combination of a network access control server with the authentication...
US20160197961 INTER-DOMAIN REPLICATION OF SERVICE INFORMATION  
An automated conversion of service information that includes endpoint addresses of service providers and security policies between independent enterprise information technology (IT) management...
US20160197960 IC CHIP, INFORMATION PROCESSING APPARATUS, SYSTEM, METHOD, AND PROGRAM  
An IC chip, an information processing apparatus, system, method, and program are provided. An IC chip includes an authentication control unit configured to authenticate a request using...
US20160197959 ASSURED FEDERATED RECORDS MANAGEMENT  
A record is managed by obtaining from an external system on which a stored object comprising the record is stored a property of the stored object as stored on the external system. A stored...
US20160197958 ISSUING SECURITY COMMANDS TO A CLIENT DEVICE  
Disclosed are various embodiments for ensuring a client device complies with a compliance rule. An application executed by the client device can receive a request to communicate with a mail...
US20160197957 APPARATUS FOR MEASURING SIMILARITY BETWEEN INTRUSION DETECTION RULES AND METHOD THEREFOR  
The present invention relates to an apparatus and method that check similarity between intrusion detection rules used by an Intrusion Detection System. The apparatus for measuring similarity...
US20160197956 APPLYING GROUP POLICIES  
Information corresponding to a set of signatures is maintained, and for each signature in the set, an associated group policy of a network is maintained. A message from a device on the network is...
US20160197955 System and Method for Automatic Detection of Attempted Virtual Function Table or Virtual Function Table Pointer Overwrite Attack  
System, method and media are shown for automatically detecting an attempted V-table exploit based attack involving receiving crash dump data relating to a fault event, identifying code...
US20160197954 DEFENDING AGAINST FLOW ATTACKS  
A network device maintains a sharing token bucket for all sessions in a semi-connection state; a packet is received by the network device; a flow control for the packet is performed by using the...
US20160197953 Apparatus and method for assessing financial loss from cyber threats capable of affecting at least one computer network  
Apparatus and method for assessing financial loss posed by cyber threats capable of affecting at least one computer network in which a plurality of systems operate based on statistical modelling...
US20160197952 LOG ANALYSIS SYSTEM  
A log analysis system for analyze a detection log detected in a monitoring target system includes an acquisition device for detecting detection target processes performed in the monitoring target...
US20160197951 METHOD AND SYSTEM FOR VIRTUAL ASSET ASSISTED EXTRUSION AND INTRUSION DETECTION AND THREAT SCORING IN A CLOUD COMPUTING ENVIRONMENT  
An analysis trigger monitoring system is provided in one or more virtual assets. One or more analysis trigger parameters, including security threat patterns, are defined and analysis trigger data...
US20160197950 DETECTION SYSTEM AND METHOD FOR STATICALLY DETECTING APPLICATIONS  
Disclosed is a method for statically detecting applications, the method including: intercepting, by an acquisition device of the detection system, at least one module file header byte code, at...
US20160197949 SECURE DIGITAL TRAFFIC ANALYSIS  
A network monitoring “sensor” is built on initial startup by checking the integrity of the bootstrap system and, if it passes, downloading information from which it builds the full system...
US20160197948 SYSTEM FOR DETECTING ABNORMAL BEHAVIOR BY ANALYZING PERSONALIZED INITIAL USE BEHAVIOR PATTERN  
An abnormal behavior detection system includes a context information reception unit receiving a variety of types of context information from a context information collection system, a context...
US20160197947 SYSTEM FOR DETECTING ABNORMAL BEHAVIOR BY ANALYZING PERSONALIZED USE BEHAVIOR PATTERN DURING ENTIRE ACCESS PERIOD  
An abnormal behavior detection system includes a context information reception unit receiving a variety of types of context information from a context information collection system, a context...
US20160197946 System and Method for Monitoring a Computer System Using Machine Interpretable Code  
A computer implemented method of monitoring a collector computer system includes receiving machine interpretable code that is configured for interpretation by the interpreter that includes:...
US20160197945 PROTECTING AGAINST THE INTRODUCTION OF ALIEN CONTENT  
In one implementation, a computer-implemented method can identify abnormal computer behavior. The method can receive, at a computer server subsystem and from a web server system, computer code to...
US20160197944 CONTROLLER AREA NETWORK BUS MONITOR  
Techniques for monitoring a controller area network bus are described herein. In one example, a system comprises a processor that is to detect a message from a source electronic control unit in a...
US20160197943 System and Method for Profiling System Attacker  
Systems, methods and media are shown for generating a profile score for an attacker involving a detection unit configured to identify one or more malicious code elements in a payload, a weighting...
US20160197942 COLLABORATIVE CONTENT EVALUATION  
In an example embodiment, a system for evaluating published content is provided. The system includes at least one processor and a plurality of components including instructions executable by the...
US20160197941 THREAT INTELLIGENCE ON A DATA EXCHANGE LAYER  
In an example, a threat intelligence controller is configured to operate on a data exchange layer (DXL). The threat intelligence controller acts as a DXL consumer of reputation data for a network...
US20160197940 MULTI-NETWORK VIRUS IMMUNIZATION  
An apparatus, device, methods, computer program product, and system are described that determine a virus associated with a communications network, and distribute an anti-viral agent onto the...
US20160197939 Segment Authentication for Dynamic Adaptive Streaming  
A method including generating a segment signature for a segment of a media content based on the segment, trusted information contained in a media presentation description (MPD), and a signature...
US20160197938 Systems and Methods for Authenticating Digital Content  
A digital marking module in a first computer memory receives a data file including original media content. The digital marking module accesses, from a second computer memory, identifying...
US20160197937 HARDWARE SECRET USAGE LIMITS  
A hardware secret is securely maintained in a computing device. The device operates in accordance with a usage limit corresponding to a limited number of operations using the hardware secret that...
US20160197936 POLICY TRACKING IN A NETWORK THAT INCLUDES VIRTUAL DEVICES  
A method performed by a network device includes: receiving an input indicating a change in an auxiliary network from a first configuration to a second configuration, wherein the auxiliary network...
US20160197935 SYSTEM FOR AUTHORIZING ELECTRONIC COMMUNICATION OF CONFIDENTIAL OR PROPRIETARY DATA TO EXTERNAL ENTITIES  
A platform for providing authorization of electronic communication of secure data to external entities, e.g., vendors, third parties or the like based on an assessment of the data risk associated...
US20160197934 SECURE DATA MANAGEMENT TECHNIQUES  
The present disclosure relates generally to secure data management techniques. Techniques are described for pairing devices and using the pairing information for granting or denying requests...
US20160197933 SECURE PERSONAL SERVER SYSTEM AND METHOD  
A provider computer announces content to the provider computer and establishes a secure connection to a VPN server. Requests for the content are received in one protocol (HTTPS) from the consumer...
US20160197932 VEHICLE MODULE UPDATE, PROTECTION AND DIAGNOSTICS  
Updating, protecting, diagnosing and/or otherwise managing a server, module or other analogous device(s) included on a vehicle for the purposes of facilitating a vehicle related operation is...
US20160197931 Using a File Whitelist  
A method and/or system for using a file whitelist may include receiving a request to approve an application for release in an application store. The request may comprise application data. The...
US20160197930 CENTRALIZED SELECTIVE APPLICATION APPROVAL FOR MOBILE DEVICES  
A system and method for confirming an application change event associated with a device infrastructure of a mobile device, the method comprising: identifying an application change event processed...
US20160197929 AUTHENTICATED INFORMATION EXCHANGE  
An authenticated information exchange for creating value in an agricultural producers' information, the exchange including an electronic information storage vault, an authentication protocol, at...
US20160197928 Seamless Wi-Fi Subscription Remediation  
The exemplary embodiments include a method to perform, based on at least one of hypertext transport protocol and non-hypertext transport protocol traffic tests failing, sending an hypertext...
US20160197927 NETWORK ACCESS METHOD, PROXIMITY COMMUNICATIONS SERVER, RELAY TERMINAL AND TERMINAL  
Embodiments of the present invention provide a network access method, a proximity communications server, a relay terminal, and a terminal. The method includes: receiving a relay access...
US20160197926 MULTI-TENANCY GOVERNANCE IN A CLOUD COMPUTING ENVIRONMENT  
A cloud computing system includes a plurality of tenants that are permitted to access cloud hosted applications. The system includes an input governance layer associated with each application, and...
US20160197925 INFORMATION PROCESSING APPARATUS AND METHOD, AND PROGRAM  
A system includes circuitry that receives a request for, and generates, individual terminal identification information. The individual terminal identification information identifies a terminal...
US20160197924 SECURE PERSONAL SERVER SYSTEM AND METHOD  
A provider computer announces content to the provider computer and establishes a secure connection to a VPN server. Requests for the content are received in one protocol (HTTPS) from the consumer...
US20160197923 SECURE, UNINTERRUPTED OPERATION OF MOBILE DEVICES  
The disclosed embodiments relate to a system and method for secure, uninterrupted operation of a mobile device. The method includes identifying, at repeated intervals, a voice of a device...
US20160197922 METHOD AND APPARATUS FOR PROVIDING BOOTSTRAPPING PROCEDURES IN A COMMUNICATION NETWORK  
An approach is provided for performing authentication in a communication system. In one embodiment, a key is established with a terminal in a communication network according to a key agreement...
US20160197921 Secure Data Transmission System  
A secure messaging system that requires pairing of second and receiving devices via user identification credentials and the associated media access control addresses (MAC addresses) of the paired...
US20160197920 SCALABLE FULL SPECTRUM CYBER DETERMINING MACHINE  
A scalable universal full spectrum cyber determining machine for accurately and reliably determining and reporting any cyber determination from a full spectrum of possible cyber determinations....
US20160197919 REAL IDENTITY AUTHENTICATION  
A real identity biometric authentication device includes a USB thumb drive form factor, with a biometric sensor and designated device processor and stored instructions in firmware which perform...