Match
|
Document |
Document Title |
|
US20160248817 |
SYSTEMS AND METHODS FOR SETTING UP A TELEPHONY COMMUNICATION
When an Internet Protocol (IP) telephony system receives a telephony communication setup request for a user of the IP telephony system, the IP telephony system attempts to setup the new telephony... |
|
US20160248816 |
COMMUNICATION MEDIATION SYSTEM, COMMUNICATION MEDIATION DEVICE, COMMUNICATION MEDIATION METHOD, AND COMMUNICATION MEDIATION PROGRAM
A management device connected to the Internet, includes: a first transmitting unit configured to transmit setting information necessary for mediating communication from the Internet to at least... |
|
US20160248815 |
CONTENT ENABLING SYSTEM
A system and method for remote acquisition of Internet content in a cyber-physical system. A cyber-physical system can include a multitude of electronic devices that are networked with each other,... |
|
US20160248814 |
INTER-IMS SERVICE SUPPORT IN TELECOMMUNICATION SYSTEMS
A first communication provider supports an IP multimedia subsystem (IMS) having a border session control function (BGCF) that receives SIP requests. The SIP requests correspond to different SIP... |
|
US20160248813 |
METHOD AND SYSTEM FOR PROPAGATING NETWORK POLICY
A technique for acquiring and disseminating network node characteristics to enable policy decisions including receiving a resolution request from one or more clients in a network environment is... |
|
US20160248812 |
SECURE AND LIGHTWEIGHT TRAFFIC FORWARDING SYSTEMS AND METHODS TO CLOUD BASED NETWORK SECURITY SYSTEMS
A method implemented by an agent operating on a mobile device communicating to a cloud-based system includes opening up local listening sockets on the mobile device; redirecting outgoing traffic... |
|
US20160248811 |
METHOD AND DEVICE FOR CUSTOMIZING SECURITY SERVICE
The disclosure provides a method for customizing a security service and device, relates to the field of information security and solves the problem of incapability of an undiversified security... |
|
US20160248810 |
Method and System for Operating and Monitoring Permissions for Applications in a Electronic Device
A method comprising: receiving a request from a second application to access information from a first application, said first and second applications installed on a user equipment, and in response... |
|
US20160248809 |
METHODS AND APPARATUS TO PROCESS DATA BASED ON AUTOMATICALLY DETECTING A SECURITY ENVIRONMENT
Methods and apparatus to process data based on automatically detecting a security environment are disclosed. An example apparatus includes an input device, an environment identifier, a security... |
|
US20160248808 |
SYSTEMS AND METHODS FOR INHIBITING ATTACKS WITH A NETWORK
Systems and methods for inhibiting attacks with a network are provided. In some embodiments, methods for inhibiting attacks by forwarding packets through a plurality of intermediate nodes when... |
|
US20160248807 |
DETECTION AND MITIGATION OF DENIAL-OF-SERVICE ATTACKS IN WIRELESS COMMUNICATION NETWORKS
A method that incorporates teachings of the subject disclosure may include, for example, obtaining data relating to a set of collision events on a shared channel on a wireless network according to... |
|
US20160248806 |
MANAGING TRAFFIC CONTROL IN A NETWORK MITIGATING DDOS
Embodiments are provided for managing routes of data traffic within a network. The management may be performed via a graphical user interface that interacts with a Web server to update a... |
|
US20160248805 |
NETWORK SECURITY SYSTEM WITH REMEDIATION BASED ON VALUE OF ATTACKED ASSETS
A data processing method comprising obtaining a plurality of computer network security threat feeds from two or more computer threat detection systems; based upon computer network attack... |
|
US20160248804 |
SECURITY MANAGEMENT IN A NETWORKED COMPUTING ENVIRONMENT
An approach for addressing (e.g., preventing) detected network intrusions in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, users may group... |
|
US20160248803 |
USER INTERFACE FOR EVENT DATA STORE
A processing device receives a query comprising a first field value and a time period and performs a first search of a data store using the first field value to identify a plurality of events... |
|
US20160248802 |
SYSTEMS AND METHODS FOR REPORTER-BASED FILTERING OF ELECTRONIC COMMUNICATIONS AND MESSAGES
Methods and apparatuses for filtering electronic communications in a communication system. The method includes receiving a message report from a user in response to an electronic message received... |
|
US20160248801 |
NETWORK ACCOUNTABILITY AMONG AUTONOMOUS SYSTEMS
In one kind of DoS attack, malicious customers may try to send a large number of filter requests against an innocent customer. In one implementation, a Filter Request Server (FRS) may allow a... |
|
US20160248800 |
Cyber Vulnerability Scan Analyses with Actionable Feedback
Embodiments of the present technology relate to cyber attack vulnerability analyses. In one embodiment, a method includes determining an external infrastructure of an entity, the external... |
|
US20160248799 |
Inferential Analysis Using Feedback for Extracting and Combining Cyber Risk Information
Various embodiments of the present technology include methods of assessing risk of a cyber security failure in a computer network of an entity. Various embodiments also include automatically... |
|
US20160248798 |
METHOD AND APPARATUS FOR AUTOMATING THREAT MODEL GENERATION AND PATTERN IDENTIFICATION
A method and system for automating threat model generation and pattern identification for an application includes identifying components of an application, and receiving security information that... |
|
US20160248797 |
ONLINE PORTAL FOR IMPROVING CYBERSECURITY RISK SCORES
Determining an entity's cybersecurity risk and benchmarking that risk includes non-intrusively collecting one or more types of data associated with an entity. Embodiments further include... |
|
US20160248796 |
SYSTEM AND METHOD FOR DISCOVERING OPTIMAL NETWORK ATTACK PATHS
A computer-implemented method for discovering network attack paths is provided. The method includes a computer generating scoring system results based on analysis of vulnerabilities of nodes in a... |
|
US20160248795 |
EVALUATING A QUESTIONABLE NETWORK COMMUNICATION
Techniques for evaluating a questionable network communication are disclosed. In some implementations, an evaluation module determines whether a network communication is allowable based on one or... |
|
US20160248794 |
METHOD AND APPARATUS FOR DETERMINING A CRITICALITY SURFACE OF ASSETS TO ENHANCE CYBER DEFENSE
A method and apparatus is provided for determining aggregated value of risk and resilience metrics of critical nodes in a network of computer nodes, comprising determining a status of each node in... |
|
US20160248793 |
DATA TREND ANALYSIS
According to an example, a method for data trend analysis may include retrieving data from data sources, associating the data with a time, and identifying co-occurrences of terms and concepts... |
|
US20160248792 |
EVENT CONTEXT MANAGEMENT SYSTEM
A processing device receives a plurality of discrete log entries from a first data store and generates an event for each discrete log entry that satisfies a criterion. To generate an event the... |
|
US20160248791 |
NON-HOMOGENOUS STORAGE OF EVENTS IN EVENT DATA STORE
A processing device receives a plurality of discrete log entries from a first data store and generates an event for each discrete log entry that satisfies a criterion. To generate an event the... |
|
US20160248790 |
METHOD AND SYSTEM FOR DETECTING AND MITIGATING ATTACKS PERFORMED USING CRYPTOGRAPHIC PROTOCOLS
A method and system for detecting attacks performed using a cryptographic protocol are presented. The method includes upon receiving an indication about a potential attack, establishing an... |
|
US20160248789 |
CALL CONTROL DEVICE, CALL CONTROL METHOD, AND CALL CONTROL SYSTEM
A call control device including: a memory, and a processor coupled to the memory and configured to: receive a call request from a communication device, a source of the call request being a... |
|
US20160248788 |
MONITORING APPARATUS AND METHOD
A monitoring apparatus, includes a memory configured to store history information regarding a login attempt to a system by a communication apparatus in a state in which a first address is set, the... |
|
US20160248787 |
PROACTIVE EMERGING THREAT DETECTION
A system creates a dynamic stochastic network using data relating to events. The dynamic stochastic network includes super nodes, local nodes, and agents. Connections among the super nodes and... |
|
US20160248786 |
Dynamic Remote Malware Scanning
There are provided measures for enabling dynamic remote malware scanning. Such measures could exemplarily comprise include identification of an electronic file to be scanned for malware,... |
|
US20160248785 |
SECURE ANALYSIS APPLICATION FOR ACCESSING WEB RESOURCES
Embodiments described herein may be directed to systems, methods, apparatuses, devices, computer program products, computer-executable instructions, and/or applications for securely and... |
|
US20160248784 |
AUTHENTICATING APPARATUS, AUTHENTICATING SYSTEM AND STORAGE MEDIUM
In authentication based on an image region read from a surface of a target object, authentication based on a position corresponding to the image region is executed. An authenticating server 2... |
|
US20160248783 |
INTELLIGENT NETWORK ACCESS CONTROL
A method for controlling wireless communication access by wireless devices to wireless communications networks includes establishing, using an intelligent network access controller, one or more... |
|
US20160248782 |
ACCESS CONTROL USING PORTABLE ELECTRONIC DEVICES
An access control system is configured to detect the presence of a portable electronic device carried by a user in a first area. The access control system sends an access code to the device. In a... |
|
US20160248781 |
SELF-SELECTED USER ACCESS BASED ON SPECIFIC AUTHENTICATION TYPES
Embodiments of the invention are directed to a system, method, and a computer program product self-selected user access based on specific authentication types. The system typically including a... |
|
US20160248780 |
ACCESSING THIRD-PARTY COMMUNICATION SERVICE VIA A SOCIAL NETWORKING SYSTEM
A user interface in a social networking system enables users to connect to and interact with each other using a third-party communication service, such as a VoIP or video chat service. A user... |
|
US20160248779 |
SYSTEM AND METHOD FOR DATA TRANSFER AUTHENTICATION
A transaction initialization system serving first and second devices, interconnected by a communication network, each having a speaker and a microphone, which wish to perform a transaction, the... |
|
US20160248778 |
TRUSTED SOCIAL NETWORK
A trust management engine maintains transferable files in a file data store of a data server accessible to users in a trust list of trusted users authorized to access the transferable files. The... |
|
US20160248777 |
POLICY ACCESS CONTROL LISTS ATTACHED TO RESOURCES
Methods, storage systems and computer program products implement embodiments of the present invention that include defining, for an entity, a policy access control list including one or more... |
|
US20160248776 |
SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR SHARING TENANT INFORMATION UTILIZING A MULTI-TENANT ON-DEMAND DATABASE SERVICE
In accordance with embodiments, there are provided mechanisms and methods for sharing tenant information utilizing a multi-tenant on-demand database service. These mechanisms and methods for... |
|
US20160248775 |
PROVIDING SAFE OPERATION OF A SUBSYSTEM WITHIN A SAFETY-CRITICAL SYSTEM
A safety apparatus for providing a safe operation of a subsystem within a safety critical system, SCS is disclosed herein. The safety apparatus includes: a system communication interface for... |
|
US20160248774 |
COMMUNICATION DEVICE, COMMUNICATION METHOD, AND COMMUNICATION SYSTEM
A communication device includes a first communication unit configured to execute radio communication by using a first communication method, the first communication method allowing the radio... |
|
US20160248773 |
Authorizations For Computing Devices To Access A Protected Resource
Authorization technology queries a user of an authorizing computing device for permission to allow another user of a requesting computing device to have access to a protected resource of the user.... |
|
US20160248772 |
ACCESS CONTROL INTERFACES FOR ENHANCED WIRELESS ROUTER
A wireless router provides access control to information resources stored at the wireless router. The wireless router supports user profiles and/or device profiles that respectively enable user... |
|
US20160248771 |
METHODS, APPARATUS, AND SYSTEMS FOR IDENTITY AUTHENTICATION
An identity authentication method is provided. The method comprises receiving request information transmitted by an online terminal device for determining neighbor network devices and determining... |
|
US20160248770 |
NETWORKED DEVICE ACCESS CONTROL
A computer apparatus is remotely initiated. Confirmation of a detected and authenticated presence of a user remote from the computer apparatus is detected and confirmed via a wireless network.... |
|
US20160248769 |
BIOMETRIC CAPTURE FOR UNAUTHORIZED USER IDENTIFICATION
A computing device may determine to capture biometric information in response to the occurrence of one or more trigger conditions. The trigger condition may be receipt of one or more instructions... |
|
US20160248768 |
Joint Speaker Authentication and Key Phrase Identification
A spoken command analyzer computing system includes technologies configured to analyze information extracted from a speech sample and, using a joint speaker and phonetic content model, both... |