Match Document Document Title
US20160248817 SYSTEMS AND METHODS FOR SETTING UP A TELEPHONY COMMUNICATION  
When an Internet Protocol (IP) telephony system receives a telephony communication setup request for a user of the IP telephony system, the IP telephony system attempts to setup the new telephony...
US20160248816 COMMUNICATION MEDIATION SYSTEM, COMMUNICATION MEDIATION DEVICE, COMMUNICATION MEDIATION METHOD, AND COMMUNICATION MEDIATION PROGRAM  
A management device connected to the Internet, includes: a first transmitting unit configured to transmit setting information necessary for mediating communication from the Internet to at least...
US20160248815 CONTENT ENABLING SYSTEM  
A system and method for remote acquisition of Internet content in a cyber-physical system. A cyber-physical system can include a multitude of electronic devices that are networked with each other,...
US20160248814 INTER-IMS SERVICE SUPPORT IN TELECOMMUNICATION SYSTEMS  
A first communication provider supports an IP multimedia subsystem (IMS) having a border session control function (BGCF) that receives SIP requests. The SIP requests correspond to different SIP...
US20160248813 METHOD AND SYSTEM FOR PROPAGATING NETWORK POLICY  
A technique for acquiring and disseminating network node characteristics to enable policy decisions including receiving a resolution request from one or more clients in a network environment is...
US20160248812 SECURE AND LIGHTWEIGHT TRAFFIC FORWARDING SYSTEMS AND METHODS TO CLOUD BASED NETWORK SECURITY SYSTEMS  
A method implemented by an agent operating on a mobile device communicating to a cloud-based system includes opening up local listening sockets on the mobile device; redirecting outgoing traffic...
US20160248811 METHOD AND DEVICE FOR CUSTOMIZING SECURITY SERVICE  
The disclosure provides a method for customizing a security service and device, relates to the field of information security and solves the problem of incapability of an undiversified security...
US20160248810 Method and System for Operating and Monitoring Permissions for Applications in a Electronic Device  
A method comprising: receiving a request from a second application to access information from a first application, said first and second applications installed on a user equipment, and in response...
US20160248809 METHODS AND APPARATUS TO PROCESS DATA BASED ON AUTOMATICALLY DETECTING A SECURITY ENVIRONMENT  
Methods and apparatus to process data based on automatically detecting a security environment are disclosed. An example apparatus includes an input device, an environment identifier, a security...
US20160248808 SYSTEMS AND METHODS FOR INHIBITING ATTACKS WITH A NETWORK  
Systems and methods for inhibiting attacks with a network are provided. In some embodiments, methods for inhibiting attacks by forwarding packets through a plurality of intermediate nodes when...
US20160248807 DETECTION AND MITIGATION OF DENIAL-OF-SERVICE ATTACKS IN WIRELESS COMMUNICATION NETWORKS  
A method that incorporates teachings of the subject disclosure may include, for example, obtaining data relating to a set of collision events on a shared channel on a wireless network according to...
US20160248806 MANAGING TRAFFIC CONTROL IN A NETWORK MITIGATING DDOS  
Embodiments are provided for managing routes of data traffic within a network. The management may be performed via a graphical user interface that interacts with a Web server to update a...
US20160248805 NETWORK SECURITY SYSTEM WITH REMEDIATION BASED ON VALUE OF ATTACKED ASSETS  
A data processing method comprising obtaining a plurality of computer network security threat feeds from two or more computer threat detection systems; based upon computer network attack...
US20160248804 SECURITY MANAGEMENT IN A NETWORKED COMPUTING ENVIRONMENT  
An approach for addressing (e.g., preventing) detected network intrusions in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, users may group...
US20160248803 USER INTERFACE FOR EVENT DATA STORE  
A processing device receives a query comprising a first field value and a time period and performs a first search of a data store using the first field value to identify a plurality of events...
US20160248802 SYSTEMS AND METHODS FOR REPORTER-BASED FILTERING OF ELECTRONIC COMMUNICATIONS AND MESSAGES  
Methods and apparatuses for filtering electronic communications in a communication system. The method includes receiving a message report from a user in response to an electronic message received...
US20160248801 NETWORK ACCOUNTABILITY AMONG AUTONOMOUS SYSTEMS  
In one kind of DoS attack, malicious customers may try to send a large number of filter requests against an innocent customer. In one implementation, a Filter Request Server (FRS) may allow a...
US20160248800 Cyber Vulnerability Scan Analyses with Actionable Feedback  
Embodiments of the present technology relate to cyber attack vulnerability analyses. In one embodiment, a method includes determining an external infrastructure of an entity, the external...
US20160248799 Inferential Analysis Using Feedback for Extracting and Combining Cyber Risk Information  
Various embodiments of the present technology include methods of assessing risk of a cyber security failure in a computer network of an entity. Various embodiments also include automatically...
US20160248798 METHOD AND APPARATUS FOR AUTOMATING THREAT MODEL GENERATION AND PATTERN IDENTIFICATION  
A method and system for automating threat model generation and pattern identification for an application includes identifying components of an application, and receiving security information that...
US20160248797 ONLINE PORTAL FOR IMPROVING CYBERSECURITY RISK SCORES  
Determining an entity's cybersecurity risk and benchmarking that risk includes non-intrusively collecting one or more types of data associated with an entity. Embodiments further include...
US20160248796 SYSTEM AND METHOD FOR DISCOVERING OPTIMAL NETWORK ATTACK PATHS  
A computer-implemented method for discovering network attack paths is provided. The method includes a computer generating scoring system results based on analysis of vulnerabilities of nodes in a...
US20160248795 EVALUATING A QUESTIONABLE NETWORK COMMUNICATION  
Techniques for evaluating a questionable network communication are disclosed. In some implementations, an evaluation module determines whether a network communication is allowable based on one or...
US20160248794 METHOD AND APPARATUS FOR DETERMINING A CRITICALITY SURFACE OF ASSETS TO ENHANCE CYBER DEFENSE  
A method and apparatus is provided for determining aggregated value of risk and resilience metrics of critical nodes in a network of computer nodes, comprising determining a status of each node in...
US20160248793 DATA TREND ANALYSIS  
According to an example, a method for data trend analysis may include retrieving data from data sources, associating the data with a time, and identifying co-occurrences of terms and concepts...
US20160248792 EVENT CONTEXT MANAGEMENT SYSTEM  
A processing device receives a plurality of discrete log entries from a first data store and generates an event for each discrete log entry that satisfies a criterion. To generate an event the...
US20160248791 NON-HOMOGENOUS STORAGE OF EVENTS IN EVENT DATA STORE  
A processing device receives a plurality of discrete log entries from a first data store and generates an event for each discrete log entry that satisfies a criterion. To generate an event the...
US20160248790 METHOD AND SYSTEM FOR DETECTING AND MITIGATING ATTACKS PERFORMED USING CRYPTOGRAPHIC PROTOCOLS  
A method and system for detecting attacks performed using a cryptographic protocol are presented. The method includes upon receiving an indication about a potential attack, establishing an...
US20160248789 CALL CONTROL DEVICE, CALL CONTROL METHOD, AND CALL CONTROL SYSTEM  
A call control device including: a memory, and a processor coupled to the memory and configured to: receive a call request from a communication device, a source of the call request being a...
US20160248788 MONITORING APPARATUS AND METHOD  
A monitoring apparatus, includes a memory configured to store history information regarding a login attempt to a system by a communication apparatus in a state in which a first address is set, the...
US20160248787 PROACTIVE EMERGING THREAT DETECTION  
A system creates a dynamic stochastic network using data relating to events. The dynamic stochastic network includes super nodes, local nodes, and agents. Connections among the super nodes and...
US20160248786 Dynamic Remote Malware Scanning  
There are provided measures for enabling dynamic remote malware scanning. Such measures could exemplarily comprise include identification of an electronic file to be scanned for malware,...
US20160248785 SECURE ANALYSIS APPLICATION FOR ACCESSING WEB RESOURCES  
Embodiments described herein may be directed to systems, methods, apparatuses, devices, computer program products, computer-executable instructions, and/or applications for securely and...
US20160248784 AUTHENTICATING APPARATUS, AUTHENTICATING SYSTEM AND STORAGE MEDIUM  
In authentication based on an image region read from a surface of a target object, authentication based on a position corresponding to the image region is executed. An authenticating server 2...
US20160248783 INTELLIGENT NETWORK ACCESS CONTROL  
A method for controlling wireless communication access by wireless devices to wireless communications networks includes establishing, using an intelligent network access controller, one or more...
US20160248782 ACCESS CONTROL USING PORTABLE ELECTRONIC DEVICES  
An access control system is configured to detect the presence of a portable electronic device carried by a user in a first area. The access control system sends an access code to the device. In a...
US20160248781 SELF-SELECTED USER ACCESS BASED ON SPECIFIC AUTHENTICATION TYPES  
Embodiments of the invention are directed to a system, method, and a computer program product self-selected user access based on specific authentication types. The system typically including a...
US20160248780 ACCESSING THIRD-PARTY COMMUNICATION SERVICE VIA A SOCIAL NETWORKING SYSTEM  
A user interface in a social networking system enables users to connect to and interact with each other using a third-party communication service, such as a VoIP or video chat service. A user...
US20160248779 SYSTEM AND METHOD FOR DATA TRANSFER AUTHENTICATION  
A transaction initialization system serving first and second devices, interconnected by a communication network, each having a speaker and a microphone, which wish to perform a transaction, the...
US20160248778 TRUSTED SOCIAL NETWORK  
A trust management engine maintains transferable files in a file data store of a data server accessible to users in a trust list of trusted users authorized to access the transferable files. The...
US20160248777 POLICY ACCESS CONTROL LISTS ATTACHED TO RESOURCES  
Methods, storage systems and computer program products implement embodiments of the present invention that include defining, for an entity, a policy access control list including one or more...
US20160248776 SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR SHARING TENANT INFORMATION UTILIZING A MULTI-TENANT ON-DEMAND DATABASE SERVICE  
In accordance with embodiments, there are provided mechanisms and methods for sharing tenant information utilizing a multi-tenant on-demand database service. These mechanisms and methods for...
US20160248775 PROVIDING SAFE OPERATION OF A SUBSYSTEM WITHIN A SAFETY-CRITICAL SYSTEM  
A safety apparatus for providing a safe operation of a subsystem within a safety critical system, SCS is disclosed herein. The safety apparatus includes: a system communication interface for...
US20160248774 COMMUNICATION DEVICE, COMMUNICATION METHOD, AND COMMUNICATION SYSTEM  
A communication device includes a first communication unit configured to execute radio communication by using a first communication method, the first communication method allowing the radio...
US20160248773 Authorizations For Computing Devices To Access A Protected Resource  
Authorization technology queries a user of an authorizing computing device for permission to allow another user of a requesting computing device to have access to a protected resource of the user....
US20160248772 ACCESS CONTROL INTERFACES FOR ENHANCED WIRELESS ROUTER  
A wireless router provides access control to information resources stored at the wireless router. The wireless router supports user profiles and/or device profiles that respectively enable user...
US20160248771 METHODS, APPARATUS, AND SYSTEMS FOR IDENTITY AUTHENTICATION  
An identity authentication method is provided. The method comprises receiving request information transmitted by an online terminal device for determining neighbor network devices and determining...
US20160248770 NETWORKED DEVICE ACCESS CONTROL  
A computer apparatus is remotely initiated. Confirmation of a detected and authenticated presence of a user remote from the computer apparatus is detected and confirmed via a wireless network....
US20160248769 BIOMETRIC CAPTURE FOR UNAUTHORIZED USER IDENTIFICATION  
A computing device may determine to capture biometric information in response to the occurrence of one or more trigger conditions. The trigger condition may be receipt of one or more instructions...
US20160248768 Joint Speaker Authentication and Key Phrase Identification  
A spoken command analyzer computing system includes technologies configured to analyze information extracted from a speech sample and, using a joint speaker and phonetic content model, both...