AcclaimIP-ad

Match Document Document Title
US20160219079 AUTONOMOUS CONTROL SYSTEMS AND METHODS FOR PROTECTING INFRASTRUCTURE  
A system for autonomous enforcement of rules may comprise a protected system, including infrastructure, operative in response to input signals and an autonomous control system. The autonomous...
US20160219078 MULTIMODAL HELP AGENT FOR NETWORK ADMINISTRATOR  
Network management technology as disclosed herein generates and dynamically updates an intuitive, interactive visualization of a computer network in live operation. The network management...
US20160219077 INTEGRATED SECURITY MANAGEMENT  
A system for configuring a plurality of security devices is provided. The system is configured to automatically generate one or more policy definition files and use the files to integrally control...
US20160219076 HARDWARE TRUST FOR INTEGRATED NETWORK FUNCTION VIRTUALIZATION (NFV) AND SOFTWARE DEFINED NETWORK (SDN) SYSTEMS  
A data communication system has data processing circuitry to transfer data communications. Trust modules establish and maintain network trust of the data processing circuitry. A Network Function...
US20160219075 POLICY CONFLICT RESOLUTION ENGINE FOR MOBILE APPLICATION MANAGEMENT  
A method includes performing operations as follows on a processor: receiving a notification from a mobile application management server in an enterprise through which mobile device usage policies...
US20160219074 SHARED MAC BLOCKING  
For enhancing security in a complex network by a computer processor device, a processor collaborates with at least one additional processor device in a higher hierarchical order in the complex...
US20160219073 ENCRYPTION LEVELS FOR SECURE APPLICATION CONTAINERS  
Systems, methods, and software described herein provide encryption configurations for secure application containers. In one example, a method of operating a management system to provide encryption...
US20160219072 NETWORK ATTACK DETECTION ON A MOBILE API OF A WEB SERVICE  
Techniques to validate web service requests from applications executing on wireless communication devices are disclosed herein. In at least one implementation, an application that generates a web...
US20160219071 DATA VISUALIZATION IN SELF LEARNING NETWORKS  
In one embodiment, a first device in a network maintains raw traffic flow information for the network. The first device provides a compressed summary of the raw traffic flow information to a...
US20160219070 ANOMALY DETECTION USING NETWORK TRAFFIC DATA  
In one embodiment, a device in a network receives traffic metrics for a plurality of applications in the network. The device populates a feature space for a machine learning-based anomaly...
US20160219069 METHOD FOR DETECTING ANOMALIES IN NETWORK TRAFFIC  
The invention concerns a method for detecting anomalies in network traffic, said traffic being transmitted by a server (10) in response to requests from at least one client device (11), the method...
US20160219068 METHOD AND APPARATUS FOR AUTOMATICALLY IDENTIFYING SIGNATURE OF MALICIOUS TRAFFIC USING LATENT DIRICHLET ALLOCATION  
A method and apparatus for automatically identifying the signature of malicious traffic using latent Dirichlet allocation. A signature identification apparatus generates one or more network flows...
US20160219067 METHOD OF DETECTING ANOMALIES SUSPECTED OF ATTACK, BASED ON TIME SERIES STATISTICS  
Disclosed is a method of detecting anomalies suspected of an attack based on time series statistics according to the present invention. The method of detecting anomalies suspected of an attack...
US20160219066 EVENT CORRELATION IN A NETWORK MERGING LOCAL GRAPH MODELS FROM DISTRIBUTED NODES  
In one embodiment, a device in a network receives an indication of a network anomaly detected by a first graph-based anomaly detection model hosted by a first node in the network. The device...
US20160219065 PACKET CAPTURE FOR ANOMALOUS TRAFFIC FLOWS  
In one embodiment, a first device in a network identifies an anomalous traffic flow in the network. The first device reports the anomalous traffic flow to a supervisory device in the network. The...
US20160219064 Method and Product for Providing a Predictive Security Product and Evaluating Existing Security Products  
A method, product and computer program product for building a malware detector, the method including the steps of: receiving at least one characteristic for each of a plurality of malware...
US20160219063 CONTEXT-AWARE NETWORK ON A DATA EXCHANGE LAYER  
In an example, a context-aware network is disclosed, including threat intelligence services provided over a data exchange layer (DXL). The data exchange layer may be provided on an enterprise...
US20160219062 ANTI-MALWARE DETECTION AND REMOVAL SYSTEMS AND METHODS  
An anti-malware system including at least one database, remote from a plurality of computers to be protected, which stores identification of computer applications resident on the computers to be...
US20160219061 CONDITIONAL PROXIMITY BASED EQUIPMENT AUTHORIZATION KEY  
An device for conditional, proximity based authorization for the use of equipment. The apparatus can comprise a key device capable of determining a position of the key device, identifying a user,...
US20160219060 IDENTITY PROXY TO PROVIDE ACCESS CONTROL AND SINGLE SIGN ON  
Techniques to provide secure access to a cloud-based service are disclosed. In various embodiments, a request is received from a client app on a device to connect to a security proxy associated...
US20160219059 METHOD OF PROVIDING TELEMATICS SERVICE AND REGISTERING VEHICLE AND APPARATUS THEREFOR  
A method of providing a telematics service and registering a vehicle may acquire member information, create an account using the member information, log in to a telematics system using the created...
US20160219058 SYSTEM AND METHOD FOR FILE SHARING  
A file sharing system may comprise a server configured to store a sharing file having one or more versions and an identifier of the sharing file, receive the sharing file and the identifier of the...
US20160219057 PRIVACY CONTROLLED NETWORK MEDIA SHARING  
A Privacy Controlled Social Network including a first device that shares content with a second device through at least one network, where content is “encoded” or “locked” at the first device by...
US20160219056 METHODS, APPARATUS, AND SYSTEMS FOR RESOURCE ACCESS PERMISSION MANAGEMENT  
A resource permission management method is disclosed. The method includes monitoring, by a processor, a sensitivity of a target resource, and when the sensitivity of the target resource changes,...
US20160219055 AUTHORIZING ACCESS TO AN APPLICATION LIBRARY  
To prevent malicious code from accessing security sensitive functions implemented in a private portion of an application, accesses to the private portion are performed using a secure session...
US20160219054 PROGRAMMABLE DISPLAY  
A programmable display for connection to a control device includes: a user management unit configured to identify a user accessing the programmable display; a generation unit configured to...
US20160219053 INTELLIGENT TERMINAL AND INTERACTIVE CONTROL SYSTEM AND INTERACTIVE CONTROL METHOD USING SAME  
An interactive control method is provided. The method is applied to an intelligent terminal. The intelligent terminal includes a storage unit. The method includes the following. The intelligent...
US20160219052 PROXY AUTHENTICATION FOR A MULTIPLE CORE NETWORK DEVICE  
The present invention is generally related to a network computing device including a first processor communicating with a second processor as a proxy for a client device when authenticating access...
US20160219051 RELAY APPARATUS, TERMINAL APPARATUS, AND COMMUNICATION METHOD  
In a communication system in which a relay apparatus, a terminal apparatus, and other apparatuses, which can communicate with an authentication apparatus, are coupled through a communication path,...
US20160219050 DYNAMICALLY GENERATED SSID  
A plurality of beacons that do not include any service set identifiers may be broadcast from an access point. A request concerning association with the access point may be sent wirelessly from a...
US20160219049 User Authentication for Social Networks  
Systems and methods are provided for social networks that can verify that enrolled users are not misrepresenting facts about themselves such as age and gender. Verification can be performed, for...
US20160219048 NATURAL LANGUAGE DIALOG-BASED SECURITY HELP AGENT FOR NETWORK ADMINISTRATOR  
Network management technology as disclosed herein conducts conversational natural language dialog with a user to facilitate the user's analysis of network activity and the implementation of...
US20160219047 SECURE DATA COMMUNICATION  
A system and a method for secure data communication over a network are described. In one embodiment, a method comprises generating a visual flashing code containing encrypted data, wherein the...
US20160219046 SYSTEM AND METHOD FOR MULTI-MODAL BIOMETRIC IDENTITY VERIFICATION  
In one example of a system and method for multi-modal biometric identity verification, a system receives a request from a device to verify a user's identity. The request includes a payload...
US20160219045 Method and System for Authenticating a User of a Device  
A method for authenticating a user of a device may utilize standard HTTP authentication challenge methods in combination with standard encryption algorithms to arrive at a new challenge response...
US20160219044 SECURE ACCESS TO CLOUD-BASED SERVICES  
Techniques to provide secure mobile access to a cloud-based service are disclosed. In various embodiments, a request to access the cloud-based service is received from a mobile device. A security...
US20160219043 SYSTEM AND METHOD FOR ESTABLISHING TRUST USING SECURE TRANSMISSION PROTOCOLS  
A system, apparatus, method, and machine readable medium are described for establishing trust using secure communication protocols. For example, one embodiment of a method comprises: generating a...
US20160219042 METHOD AND APPARATUS FOR PROVIDING AUTHENTICATION SESSION SHARING  
An approach is provided for providing authentication session sharing between browsers and run time environments in network communication. An interface receives an authentication context associated...
US20160219041 SHARING USB KEY BY MULTIPLE VIRTUAL MACHINES LOCATED AT DIFFERENT HOSTS  
A system for sharing a USB Key by multiple virtual machines located at different hosts including at least two virtual machine managers, each virtual machine manager including a virtual machine...
US20160219040 SINGLE SIGN-ON BETWEEN MULTIPLE DATA CENTERS  
Systems and methods are disclosed for a single sign-on (SSO) enterprise system with multiple data centers that use a lightweight cookie on a user's client device. The lightweight cookie includes a...
US20160219039 Mobile Authentication Method and System for Providing Authenticated Access to Internet-Sukpported Services and Applications  
This invention relates to a system comprising a unified identity management system (2) for the users (3) within a certain area on which it is centered intended to create a unified identity means...
US20160219038 Secure Network Access Using Credentials  
Example embodiments include systems and methods for establishing secure wireless communications, including receive from a mobile user equipment (UE), via the access point (AP), a request to access...
US20160219037 SECURE DATA ENTRY VIA AUDIO TONES  
In one embodiment, a cloud client device identifies one or more devices within a predetermined range of the cloud client device operable to communicate with the cloud client device. The cloud...
US20160219036 SYSTEM AND METHOD FOR IMAGE BASED LOCATION SPECIFIC PASSWORD CONSTRUCTION AND AUTHENTICATION  
A computer implemented system and method for image based location specific password construction and authentication is provided. The system helps users to recognize the password in terms of...
US20160219035 METHODS FOR PROVIDING SECURE ACCESS TO NETWORK RESOURCES AND DEVICES THEREOF  
A method, non-transitory computer readable medium, and network traffic management apparatus that receives an authentication request from a user of a client computing device, the request comprising...
US20160219034 PROVIDING DATA SECURITY WITH A TOKEN DEVICE  
A computer-implemented method for providing security to access and store data may include transferring first information for display from a token device having a memory to a first computing device...
US20160219033 PROVIDING DATA SECURITY WITH A TOKEN DEVICE  
A computer-implemented method for providing security to access and store data may include transferring first information for display from a token device having a memory to a first computing device...
US20160219032 METHOD AND APPARATUS FOR CONTROLLING ACCESS TO SURVEILLANCE VIDEO  
A method and an apparatus for controlling access to a surveillance video are provided. The method includes: acquiring from a user account a view request for viewing a surveillance video file, the...
US20160219031 SYSTEMS AND METHODS FOR AUTHENTICATING AN AVATAR  
Systems and methods for authenticating an avatar are provided. This system is useful with an avatar having an identifier, virtual environments, and a user who uses the avatar in the virtual...
US20160219030 Service Request Authentication Method and Apparatus  
Methods and apparatuses for service request authentication are disclosed to prevent a terminal or a first server that does not sign an agreement with a gateway from bypassing the gateway to...