AcclaimIP-ad

Match Document Document Title
US20160241600 LAWFUL INTERCEPTION IN A WI-FI / PACKET CORE NETWORK ACCESS  
A method, by an authentication unit of a wireless access network, allows anchoring of a data packet session of a user entity connected to the wireless access network to a packet core network of a...
US20160241599 Providing A Managed Browser  
Methods, systems, computer-readable media, and apparatuses for providing a managed browser are presented. In various embodiments, a computing device may load a managed browser. The managed browser...
US20160241598 Method to Modify Android Application Life Cycle to Control Its Execution in a Containerized Workspace Environment  
Methods, devices, and systems are described to modify the life cycle of a Google Android® application, in its application manifest file and byte code, such that the execution of the application...
US20160241597 ADAPTATION OF ACCESS RULES FOR A DATA INTERCHANGE BETWEEN A FIRST NETWORK AND A SECOND NETWORK  
Adapting access rules for a data interchange between a first network and a second network by the second network is provided based on a service-specific integrity information item of the first...
US20160241596 Enabling an on-premises resource to be exposed to a public cloud application securely and seamlessly  
An application deployed in a public cloud is enabled to access an on-premises resource securely and without requiring additional ports on a firewall. A pair of security gateways is instantiated,...
US20160241595 Advanced asset tracking and correlation  
A security management system may be remotely deployed (e.g., using a cloud-based architecture) to add security to an enterprise network. For example, the security management system may scan assets...
US20160241594 INTELLIGENT CONTENT GHOSTING ON MOBILE DEVICES  
A method includes performing operations as follows on a processor: receiving a request for a content item from a mobile device, determining that the content item is protected by a security policy,...
US20160241593 DYNAMIC PROVISIONING OF PROTECTION SOFTWARE IN A HOST INTRUSION PREVENTION SYSTEM  
Methods and apparatus for optimizing security configurations of a set of computers are disclosed. A set of local servers, each functioning as a deep-security manager supporting a respective subset...
US20160241592 IDENTIFICATION OF TRUSTED WEBSITES  
This document describes techniques for identifying trusted websites. In one embodiment, a computer system can receive a request from user to access a website and a private image and a public image...
US20160241591 System and Method for Identification and Blocking of Unwanted Network Traffic  
Network traffic can be prevented from entering a protected network. An alert can be received that can be triggered by network traffic that matches at least one signature that is associated with...
US20160241590 Network Traffic Data Scrubbing With Services Offered via Anycasted Addresses  
Novel tools and techniques for filtering network traffic in an anycasting environment includes receiving network traffic addressed to a plurality of anycasted servers at an edge router, the...
US20160241589 METHOD AND APPARATUS FOR IDENTIFYING MALICIOUS WEBSITE  
Disclosed are a method and an apparatus for identifying a malicious website, the method including: acquiring uniform resource locators (URLs) of websites determined as malicious websites and URLs...
US20160241588 METHODS FOR DETERMINING CROSS-SITE SCRIPTING AND RELATED VULNERABILITIES IN APPLICATIONS  
The invention provides computer-implemented methods and computer systems for testing applications such as web-based (HTTP) applications for cross-site scripting (XSS) and related security...
US20160241587 Monitoring and Managing User Privacy Levels  
Various embodiments pertain to techniques for measuring a user's privacy level as a user interacts with various web services. In various embodiments, entities with which the user interacts are...
US20160241586 SYSTEM AND METHOD FOR MONITORING NETWORK TRAFFIC  
Described is a method of assigning a network address to a trap, the network address being a dark address of a virtual private network. The network traffic destined for the network address is...
US20160241585 ANALYZE CODE THAT USES WEB FRAMEWORK USING LOCAL PARAMETER MODEL  
Example embodiments disclosed herein relate to analyze code of a web application associated with a framework. The code is loaded. Data objects of the framework that are used by the code are...
US20160241584 METHOD AND SYSTEM FOR IDENTIFYING A THREATENING NETWORK  
A system and method for identifying a threatening network is provided. The system comprises a network movement before/after algorithm that provides a graphical plot of changes in networks'...
US20160241583 RISK MANAGEMENT IN AN AIR-GAPPED ENVIRONMENT  
This disclosure provides for risk management in an air-gapped environment. A method includes collecting data, by a risk manager system, from a plurality of computing devices in an air-gapped...
US20160241582 SECURITY SCANNER  
Systems and methods for automated selection of payloads for use in a security scan of a web application by a security scanner are described herein. More specifically, the systems and methods test...
US20160241581 System and Method of Cyber Threat Intensity Determination and Application to Cyber Threat Mitigation  
A security system comprising a computer, a memory, a data store comprising a plurality of consensus evaluations and a plurality of cyber threat analyst ratings, and an application stored in the...
US20160241580 System and Method of Cyber Threat Structure Mapping and Application to Cyber Threat Mitigation  
A security system comprising a computer, a memory, a data store comprising a cyber threat intent dictionary and a technology dictionary; and an application stored in the memory. When executed by...
US20160241579 APPARATUS AND METHODS FOR DATA COLLECTION, ANALYSIS AND SERVICE MODIFICATION BASED ON ONLINE ACTIVITY  
Methods and apparatus for evaluating collected data relating to online activity, and modification of services within a service provider network. In one embodiment, a service provider collects data...
US20160241578 VOLUMETRIC EVENT FORECASTING TOOL  
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for forecasting event volumes. One of the methods includes receiving activity data associated with...
US20160241577 METHODS FOR ENHANCING RAPID DATA ANALYSIS  
A method for enhancing rapid data analysis includes receiving a set of data; storing the set of data in a first set of data shards sharded by a first field; and identifying anomalous data from the...
US20160241576 DETECTION OF ANOMALOUS NETWORK ACTIVITY  
Access to web services is managed. Metrics associated with accesses to a service are collected, and the metrics include activities associated with a user. A profile associated with the user is...
US20160241575 INFORMATION PROCESSING SYSTEM AND INFORMATION PROCESSING METHOD  
An information processing system includes circuitry configured to request a mail server to provide mail data addressed to a user, extract link data included in the mail data obtained from the mail...
US20160241574 SYSTEMS AND METHODS FOR DETERMINING TRUSTWORTHINESS OF THE SIGNALING AND DATA EXCHANGE BETWEEN NETWORK SYSTEMS  
A method of determining real-time operational integrity of an application or service operating on a computing device, the method including inspecting network traffic sent or received by the...
US20160241573 SECURITY EVENT DETECTION THROUGH VIRTUAL MACHINE INTROSPECTION  
Methods and apparatus are disclosed for security event detection through virtual machine introspection. Example methods involve monitoring usage of a plurality of resources by a first virtual...
US20160241572 MAINTAINING DYNAMIC CONFIGURATION INFORMATION OF A MULTI-HOST OFF-CLUSTER SERVICE ON A CLUSTER  
Techniques for maintaining dynamic configuration information of a multi-host off-cluster service on a cluster are described. An apparatus may comprise a dynamic configuration validation service...
US20160241571 SYSTEM AND METHOD FOR AUTHENTICATION OF A COMMUNICATION DEVICE  
A system and method for authentication of a communication device is disclosed. A system that incorporates teachings of the present disclosure may include, for example, an authentication system can...
US20160241570 DECODING OF ENCRYPTED FILE  
A method and system for decoding an encrypted file. A recipient computer of a recipient: extracts an encoded address from a filename of the encrypted file, wherein the encoded address identifies...
US20160241569 INFORMATION SHARING FOR THIRD PARTY APPLICATIONS IN CELLULAR TELECOMMUNICATION INFRASTRUCTURES  
A method, system and computer program product are disclosed for providing content to a communications device. In an embodiment of the invention, a communications network receives a first content...
US20160241568 VALIDATION OF A LOCATION RESOURCE BASED ON RECIPIENT ACCESS  
Aspects of the present disclosure relate to a method, a system, and a computer program product for validating a location resource, e.g., a hyperlink, embedded in a message for one or more...
US20160241567 CONTROLLING OPERATION OF A MACHINE AND DESCRIBING ACTIONS PERFORMED BY THE MACHINE THROUGH A SOCIAL NETWORKING SYSTEM  
A social networking system includes information identifying a machine (e.g., a robot, a drone, a computer, a thermostat, etc.) and a connection between the machine and an owner of the machine,...
US20160241566 SYSTEM OF THIRD PARTY CONTROL OF NETWORK CONNECTED DEVICES  
A system of controlling one or more building control devices. The system may incorporate receiving from a third party a request for access to a user account at a manufacturer of building control...
US20160241565 CONVEYING REQUESTS TO SERVICE PERSONS USING AVATARS ACTING AS PROXIES  
In accordance with an exemplary embodiment of the present invention, an avatar object is presented which is well-suited for the NewWave service platform. An avatar is a virtual representation of...
US20160241564 DEVICE WITH EMBEDDED NETWORK SUBSCRIPTION AND METHODS  
An electronic device with a network subscription is provided. The device comprises an embedded secure element including a subscription identification code for identifying the subscriber, a unique...
US20160241563 MANAGING LIMITED NETWORK ACCESS CONFIGURATION  
A system, a method, and a computer program product for managing network configuration by a controller. A request to connect a device to a network is received. The network is accessed by the device...
US20160241562 PORTABLE ELECTRONIC DEVICE WITH USER-CONFIGURABLE API DATA ENDPOINT  
In various example embodiments, systems, devices, methods, and media for configurable data endpoints are presented. In one example, a system comprises a module, executing on at least one processor...
US20160241561 Identifying a Measure of Online Security  
A computer-implemented method includes retrieving, by one or more processing devices and from one or more data repositories, user information; generating, based on the retrieved user information,...
US20160241560 CLIENT-SITE DOM API ACCESS CONTROL  
A method of restricting usage of a Document Object Model (DOM) application programming interfaces (API) is disclosed. A DOM virtualization layer intercepts a usage of a DOM API associated with one...
US20160241559 Method and System for Credential Management  
A security system comprises an access control node broadcasting a beacon including a time stamp and user devices generating replies to the beacon that are based on credential information for the...
US20160241558 Automatic Key Management Using Enterprise User Identity Management  
A method forms a key pair for a user. The key pair has a public key and a private key that is unique to the user and that is encrypted using a passphrase formed from an enterprise password of the...
US20160241557 METHOD FOR SECURED COMMUNICATION BETWEEN AN OPERATING SYSTEM OF A TERMINAL AND A DEVICE DISTINCT FROM THE TERMINAL  
Disclosed are methods, systems, and devices for secure communication between an operating system of a terminal and a device distinct from the terminal, the terminal further including a reliable...
US20160241556 MUTUAL AUTHENTICATION WITH INTEGRATED USER MUSCLE MEMORY  
A method for mutual authentication between a client device and authentication server is provided whereby an account identifier is sent from the client device to the authentication server, and the...
US20160241555 TOGGLING BIOMETRIC AUTHENTICATION  
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for receiving user input indicating a first user selection of a first form of biometric...
US20160241554 LOCAL USER AUTHENTICATION WITH NEURO AND NEURO-MECHANICAL FINGERPRINTS  
In accordance with one embodiment, a method for locally verifying the identification of a user with an electronic device is disclosed. The method includes regenerating a neuro-mechanical...
US20160241553 WEARABLE DEVICE AND OPERATING METHOD THEREOF  
A wearable device is provided. The wearable device including a sensor configured to detect a wearing state of the wearable device and to obtain authentication information of a user and at least...
US20160241552 SYSTEM AND METHOD FOR BIOMETRIC AUTHENTICATION WITH DEVICE ATTESTATION  
A system, apparatus, method, and machine readable medium are described for biometric device attestation. For example, one embodiment of an apparatus includes: a biometric device to read biometric...
US20160241551 SYSTEM AND A METHOD FOR VALIDATING AN IDENTIFICATION TOKEN  
An Identification Device (10) for providing validation information comprising: a Token (11) anda Validator (20);wherein the display (17) is adapted to display, during an Operational Phase, a first...