Match Document Document Title
US20160261647 METHOD, SYSTEM AND APPARATUS FOR INVITING USERS TO PARTICIPATE IN AN INTERACTIVE SESSION  
A method for inviting users to participate in an interactive session comprises receiving a request, from a client device, wherein the request specifies information regarding one or more invitees,...
US20160261646 System and method for communications  
A system, tool, device, method, are provided to allow for two parties to communicate with a third party observing. A communication with a specific entity is offered for sale or for auction via a...
US20160261645 MOBILE APPLICATION LOCAL TIME ZONE SHIFTING  
Systems, methods, and devices of the various embodiments enable a distributed activity reporting system, such as a billing system, with geographically separated computing devices operating in...
US20160261644 Performing an Action on Certain Media Streams in a Multimedia Communications Network  
The invention proposes controlling a media session involving a plurality of media streams within a communications network, wherein the communications network comprises a media resource node (106)...
US20160261643 SIGNALLING ASSYMETRIC MEDIA CAPABILITIES  
There are provided mechanisms for signalling asymmetric media capabilities using session description protocol, SDP, signalling. Media capabilities for at least one of sending media streams and...
US20160261642 Applying a Network Traffic Policy to an Application Session  
Embodiments of the present technology relate to a method for applying a security policy to an application session, comprising: determining, by a security gateway, a first user identity and a...
US20160261641 INDUSTRIAL NETWORK SECURITY  
A private overlay network is introduced into an existing core network infrastructure to control information flow between private secure environments. Such a scheme can be used to connect a factory...
US20160261640 SECURITY THREAT INFORMATION ANALYSIS  
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for analyzing data that includes security threat information. One of the methods includes...
US20160261639 CLOUD-BASED SECURITY POLICY CONFIGURATION  
Systems and methods for configuring security policies based on security parameters stored in a public or private cloud infrastructure are provided. According to one embodiment, security parameters...
US20160261638 Network Security Method and Device  
A network security method and a device relating to the field of network communication where the method includes, recording a correspondence between an Internet Protocol (IP) address and an...
US20160261637 End-To-End Secure Cloud Computing  
A method includes receiving, at a control node of a cloud computing network, a first enterprise policy specific to the first enterprise and a second enterprise policy specific to the second...
US20160261636 DEVICE MANAGEMENT APPARATUS, DEVICE MANAGEMENT SYSTEM, AND SECURITY SETTING METHOD  
A device management apparatus includes a setting information acquisition unit that acquires setting information of one or more security setting items from a device; a policy information...
US20160261635 TRIGGER EVENTS AND CONFIRMATION IN DIGITAL ASSET MANAGEMENT  
Trigger events and confirmation in digital asset management are provided. A service such as a management service monitors digital assets of an asset owner and content associated with the asset...
US20160261634 SECURE CONTROL OF INSECURE DEVICE  
A computer system for securely controlling an insecure computer is provided. The system comprises an insecure computer, a secure computer and a unidirectional dataflow enforcer. The insecure...
US20160261633 ENHANCED THREAD HANDLING IN SECURITY HANDSHAKING  
Disclosed herein are methods, systems, and software for handling threaded processes in security handshaking between end users and content delivery nodes are presented. In one example, a method of...
US20160261632 Methods and Arrangements for Cloud Caching  
In a method in a primary network node for providing a web-service to clients, performing the steps of verifying (S1) a TCP session with a client node and generating TLS keys for said session....
US20160261631 EMULATING SHELLCODE ATTACKS  
A system includes one or more “BotMagnet” modules that are exposed to infection by malicious code. The BotMagnets may include one or more virtual machines hosing operating systems in which...
US20160261630 System and Method for Anti-Phishing Authentication  
A method and system for providing security against phishing attacks. The method can include receiving a login ID from a client, and providing an encrypted commitment to the client. The method can...
US20160261629 INTERCEPTING AND SUPERVISING CALLS TO TRANSFORMED OPERATIONS AND OBJECTS  
In an embodiment, a method comprises intercepting a first set of instructions from a server computer that define one or more objects and one or more original operations that are based, at least in...
US20160261628 SYSTEM AND METHOD THEREOF FOR MULTI-TIERED MITIGATION OF CYBER-ATTACKS  
A method and system for controlling multi-tiered mitigation of cyber-attacks. The method comprises monitoring at least availability and load of each protection resource in a multi-tiered...
US20160261627 METHOD AND SYSTEM FOR PROCESSING NOTIFICATION MESSAGES OF A WEBSITE  
A method and system for secure notification message presentation are disclosed. A device with one or more processors and memory detects a trigger to display a notification message and, in response...
US20160261626 IDENTIFYING MALICIOUS WEB INFRASTRUCTURES  
Identifying malicious servers is provided. Malicious edges between server vertices corresponding to visible servers and invisible servers involved in network traffic redirection chains are...
US20160261625 ZERO DAY THREAT DETECTION BASED ON FAST FLUX DETECTION AND AGGREGATION  
A method in a cloud-based security system includes operating a Domain Name System (DNS) resolution service, proxy, or monitor in the cloud-based security system; receiving DNS records with...
US20160261624 Computer Implemented Techniques for Detecting, Investigating and Remediating Security Violations to IT Infrastructure  
A method includes collecting system calls and call parameters invoked by monitored applications for target computer systems. The system calls and call parameters are received from operating system...
US20160261623 Detecting Malware In Content Items  
Disclosed are various systems, methods, and other embodiments directed to detection of malware in content items. To detect the malware, for example, one or more content items are identified in...
US20160261622 ANOMALY DETECTION BASED ON CLUSTER TRANSITIONS  
Systems and methods may include receiving first data of components, which may represent performance characteristics of the components at a first time. The systems and methods may include...
US20160261621 NETWORK THREAT DETECTION AND MANAGEMENT SYSTEM BASED ON USER BEHAVIOR INFORMATION  
A device may receive behavior information that identifies a first user, of a first set of users, in association with a behavior. The behavior may relate to one or more requests, from a client...
US20160261620 SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR DYNAMICALLY CONFIGURING A VIRTUAL ENVIRONMENT FOR IDENTIFYING UNWANTED DATA  
A system, method, and computer program product are provided for dynamically configuring a virtual environment for identifying unwanted data. In use, a virtual environment located on a first device...
US20160261619 SHIP GATEWAY APPARATUS AND STATUS INFORMATION DISPLAYING METHOD THEREOF  
Provided are a ship gateway apparatus and a status information displaying method thereof. The ship gateway apparatus includes a network interface configured to provide an interface with an...
US20160261618 SYSTEM AND METHOD FOR SELECTIVELY EVOLVING PHISHING DETECTION RULES  
System and method for automatically developing phishing detection rules. Based on detected phishing indicia, a quantitative score is computed for each of a plurality of predefined parameters, with...
US20160261617 Protection Method and Computer System thereof for Network Interface Controller System  
A protection method, which releases an attack of a malware to a network interface controller (NIC) system, includes processing a microbatching operation in a plurality of session channels at at...
US20160261616 DATA ACCESS VERIFICATION FOR ENTERPRISE RESOURCES  
According to one embodiment, a method in a computing device for responding to a determination that a verification with a user is desired responsive to detection of activity indicative of a...
US20160261615 CROSS-LAYER CORRELATION IN SECURE COGNITIVE NETWORK  
A communication network is defended using a distributed infrastructure that leverages coordination across disparate abstraction levels. At each node computing device comprising a communication...
US20160261614 NEUTRALIZING PROPAGATION OF MALICIOUS INFORMATION  
One embodiment provides a method including identifying malicious information spreading in an information-exchange network; classifying at least one topic of the malicious information; determining...
US20160261613 REAL-TIME ASYNCHRONOUS EVENT AGGREGATION SYSTEMS  
A real-time asynchronous event aggregation system, method, and network device are configured to capture real-time asynchronous events, and to pass them as input to one or more aggregation engines...
US20160261612 FUZZY HASH OF BEHAVIORAL RESULTS  
A computerized method for classifying objects in a malware system is described. The method includes detecting behaviors of an object for classification after processing of the object has begun....
US20160261611 IDENTIFYING MALWARE-INFECTED NETWORK DEVICES THROUGH TRAFFIC MONITORING  
The present invention generally relates to detecting malicious network activity coming from network devices such as routers and firewalls. Specifically, embodiments of the present invention...
US20160261610 METHOD AND DEVICE FOR TRANSMITTING AND RECEIVING INSTRUCTION INFORMATION  
The present application discloses a method and device for transmitting and receiving instruction information. The method for transmitting instruction information includes: acquiring a first audio...
US20160261609 SYSTEM AND A METHOD FOR INTELLIGENT VERIFICATION MANAGEMENT  
The invention relates to a computer-implemented system and a corresponding method for intelligent verification management between a browser and a web server. The system comprises a web server,...
US20160261608 IDENTIFYING MALICIOUS WEB INFRASTRUCTURES  
Identifying malicious servers is provided. Malicious edges between server vertices corresponding to visible servers and invisible servers involved in network traffic redirection chains are...
US20160261607 TECHNIQUES FOR IDENTITY-ENABLED INTERFACE DEPLOYMENT  
Techniques for providing identity-enabled interfaces for deployment are presented. Specifically, an agent of an enterprise infrastructure authenticates and acquires an agent identity for...
US20160261606 LOCATION-BASED NETWORK SECURITY  
Methods and systems for a location-aware network security device are provided. According to one embodiment, a resource access request is received at a network security device of a protected...
US20160261605 LOCATION SENSITIVE SOLID STATE DRIVE  
A data storage system including a SSD includes a capability to detect whether its location is acceptable for function, and a capability to self-disable in the event the location of the device is...
US20160261604 PASSWORD AUTHENTICATION  
A user credential comprising a user password and a one-time password (OTP) may be provided to access a computing system. The user password is authenticated and the network connection status of the...
US20160261603 CONTENT FILTERING FOR PERSONAL PRODUCTIVITY APPLICATIONS  
A set of context profiles containing profile content rules for filtering which content within a set of personal productivity applications (such as e-mail, chat, calendar, and contacts...
US20160261602 Device-to-Device Network Membership Confirmation  
An electronic device k a device-to-device network of a user of tire electronic device communicates with a group of one or more other instances of the electronic via dynamic connections that are...
US20160261601 WIRELESS ROUTER, FAST ACCESS CONTROL METHOD AND AUTHENTICATION CONNECTION METHOD OF WIRELESS ROUTERS  
The present provides a fast access control method of a wireless router based on a message authentication code (MAC) white list, which includes following steps: the wireless router entering into a...
US20160261600 METHOD AND APPARATUS FOR MULTI-USERS REGISTERING HOME NETWORK SUPPORTING APPLICATION BASED DEVICE  
Provide is a device and a method for registering the device supporting home networking, by a server. The method includes receiving a registration request for the device from a user and determining...
US20160261599 DIGITAL MANAGEMENT OF CONTENT ASSETS IN THE CLOUD  
Aspects of the present disclosure relate to systems and methods for sharing assets of applications between users. A user may share an application or certain features within an application via the...
US20160261598 METHOD AND SYSTEM FOR ALLOWING INCOMING EMERGENCY COMMUNICATIONS ON A DISABLED DEVICE  
A system and method to allow a disabled device to receive an incoming communication after the termination of an emergency communication session with a service provider. A disabled device is a...