Match Document Document Title
US20170302708 METHODS AND SYSTEMS FOR COLLABORATIVE REMOTE APPLICATION SHARING AND CONFERENCING  
Systems and method for providing a collaborative conferencing capability to an application remotely-accessed by client computing devices. A client media sharing application is provided in a client...
US20170302707 JOINING EXECUTABLE COMPONENT TO ONLINE CONFERENCE  
Online conferencing involving video and audio in which automatic actions such as recording and broadcasting is performed by adding a visualized representation of the action into the online...
US20170302706 ACCESS CHANGE FOR RE-ROUTING A CONNECTION  
There is proposed a method and corresponding apparatuses allowing a change from a packet switched communication domain to a circuit switched communication domain. When a user equipment as a...
US20170302705 COMPUTERIZED SYSTEM AND METHOD FOR ADVANCED NETWORK CONTENT PROCESSING  
A computerized system and method for processing network content in accordance with at least one content processing rule is provided. According to one embodiment, the network content is received at...
US20170302704 METHODS AND APPARATUS TO FACILITATE END-USER DEFINED POLICY MANAGEMENT  
Methods, apparatus, systems and articles of manufacture are disclosed to facilitate end-user defined policy management. An example apparatus includes an edge node interface to detect addition of a...
US20170302703 DESTINATION DOMAIN EXTRACTION FOR SECURE PROTOCOLS  
Techniques for destination domain extraction for secure protocols are disclosed. In some embodiments, destination domain extraction for secure protocols includes monitoring network communications...
US20170302702 ROTATION OF AUTHORIZATION RULES IN MEMORY OF AUTHORIZATION SYSTEM  
Embodiments of the invention generally relate to methods and systems for operating authorization rules. An authorization rule has conditions that may be satisfied by an authorization request. A...
US20170302701 INTEGRATED APPLICATION SCANNING AND MOBILE ENTERPRISE COMPUTING MANAGEMENT SYSTEM  
Disclosed are various approaches for integrating application scanning into a mobile enterprise computing management system. A management service can add a first command to a command queue...
US20170302700 Providing forward secrecy in a terminating TLS connection proxy  
An infrastructure delivery platform provides a RSA proxy service as an enhancement to the TLS/SSL protocol to off-load, from an edge server to an external cryptographic server, the decryption of...
US20170302699 LIMITING THE EFFICACY OF A DENIAL OF SERVICE ATTACK BY INCREASING CLIENT RESOURCE DEMANDS  
A device may detect an attack. The device may receive, from a client device, a request for a resource. The device may determine, based on detecting the attack, a computationally expensive problem...
US20170302698 SCALABLE INLINE BEHAVIORAL DDOS ATTACK MITIGATION  
Methods and systems for a scalable solution to behavioral Distributed Denial of Service (DDoS) attacks targeting a network are provided. According to one embodiment, a method to determine the...
US20170302697 Method And System For Dynamic Platform Security In A Device Operating System  
A system and method is provided for implementing platform security on a consumer electronic device having an open development platform. The device is of the type which includes an abstraction...
US20170302696 INTERMEDIATE ENCRYPTION FOR EXPOSED CONTENT  
An endpoint encrypts local files with a key to protect file contents. If the endpoint or processes on the endpoint becomes exposed to potentially harmful locations or resources, the key can be...
US20170302695 Automatic Detection and Mitigation of Security Weaknesses With a Self-Configuring Firewall  
Some embodiments provide a self-configuring firewall for automatic detection and mitigation of security weaknesses. The self-configuring firewall performs passive and active vulnerability...
US20170302694 Discovering and provisioning Computing devices in a security enhanced environment  
Systems and methods for discovering and provisioning computing devices within a computing environment. An example method may comprise: loading a first kernel from a removable storage, wherein the...
US20170302693 REWRITE DETECTION SYSTEM AND INFORMATION PROCESSING DEVICE  
Provided are a rewrite detection system and an information processing device capable of reducing communication traffic between devices and processing time in each device. A rewrite detecting...
US20170302692 METHODS AND APPARATUS FOR APPLICATION ISOLATION  
Processor(s) for detecting malicious software. A hardware virtual machine monitor (HVMM) operates under a host OS. Container(s) initialized with network application template(s) operate under a...
US20170302691 Systems and Methods for Detecting and Tracking Adversary Trajectory  
This disclosure is related to using network flow information of a network to determine the trajectory of an attack. In some examples, an adjacency data structure is generated for a network. The...
US20170302690 Method and Apparatus for Improving Network Security  
A method and an apparatus for improving network security. The method includes obtaining, by a control node, alarm information, where the alarm information includes address information of an attack...
US20170302689 Network Security Protection Method and Apparatus  
A network security protection method and apparatus are provided. The method is executed by a network security protection device, and includes obtaining at least one of network environment data or...
US20170302688 METHOD FOR PROCESSING AN INTRUSION INTO A WIRELESS COMMUNICATION NETWORK, RELATED DEVICE AND COMPUTER PROGRAM  
A method for processing an intrusion in a communication network including a plurality of node equipment, including a current node, which: discovers of a neighbourhood of the current node,...
US20170302687 CELL CONTROL DEVICE THAT CONTROLS MANUFACTURING CELL IN RESPONSE TO COMMAND FROM PRODUCTION MANAGEMENT DEVICE  
A cell control device able to prevent unauthorized communication in which a third party makes an unauthorized access to the apparatus. The cell control device includes a communication section that...
US20170302686 SYSTEM AND METHOD FOR REAL-TIME TUNING OF INFERENCE SYSTEMS  
A system and method for real-time tuning of inference systems based on quality of incoming data. The method comprises: periodically receiving traffic data collected by a plurality of collectors...
US20170302685 FORENSIC ANALYSIS OF COMPUTING ACTIVITY  
A data recorder stores endpoint activity on an ongoing basis as sequences of events that causally relate computer objects such as processes and files. When a security event is detected, an event...
US20170302684 SECURITY ARCHITECTURE FOR THE CONNECTED AIRCRAFT  
Systems and methods of a security architecture for a connected aircraft are disclosed. In at least one embodiment, an avionics server comprises a plurality of device ports, wherein each of the...
US20170302683 ATTACK OBSERVATION APPARATUS AND ATTACK OBSERVATION METHOD  
The present invention relates to an attack observation apparatus being a simulation environment where a malicious program such as malware created by an attacker is run, the simulation environment...
US20170302682 DEVICE AND METHOD FOR ANALYZING MALWARE  
A device for analyzing malware includes a memory and a processor coupled to the memory. The memory is configured to store therein an instruction assumed to be transmitted to an operating system...
US20170302681 SYSTEM AND METHOD FOR PARALLEL SECURE CONTENT BOOTSTRAPPING IN CONTENT-CENTRIC NETWORKS  
One embodiment of the present invention provides a system for retrieving a content collection over a network. During operation, the system determines additional information associated with the...
US20170302680 LOCAL AUTHENTICATION  
In accordance with an example aspect of the present invention, there is provided an apparatus comprising at least one processing core and at least one memory including computer program code, the...
US20170302679 METHODS AND SYSTEMS OF DUAL-LAYER COMPUTER-SYSTEM SECURITY  
In one aspect, a computerized method for implementing dual-layer computer-system security in a private enterprise computer network includes the step of generating a user profile, wherein the user...
US20170302678 METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR PROVIDING SECURITY AND RESPONSIVENESS IN CLOUD BASED DATA STORAGE AND APPLICATION EXECUTION  
A storage controller that is coupled to a plurality of storage clouds is maintained. The storage controller determines security requirements for performing a selected operation in the plurality of...
US20170302677 TENANT LOCKBOX  
Tenant approval for operator access to tenant data is provided. In order to grant service personnel operators access to a tenant's data for performing a requested action, a lockbox determines a...
US20170302676 Resource Feature Transfer  
Resource feature transfer is described. In one or more embodiments, information is collected about interaction of an unauthenticated user of a computing device with a resource, such as content...
US20170302675 ENABLER FOR EDITING A PREVIOUSLY RATIFIED TRANSMISSION  
Methods for editing a previously approved transmission are provided. Methods may include allocating a portion of memory on a first platform. The allocating may include allocating a details...
US20170302674 MANAGING SECURITY RESTRICTIONS ON A RESOURCE IN A DEFINED ENVIRONMENT  
Approaches described herein manage security restrictions on a resource in a defined environment to provide authorization and access. Specifically, a security system maintains a security...
US20170302673 SYSTEM AND METHOD FOR PROVIDING AN INTEGRATED FIREWALL FOR SECURE NETWORK COMMUNICATION IN A MULTI-TENANT ENVIRONMENT  
An integrated firewall provides security in a multi-tenant environment having a connection-based switched fabric directly connecting database servers which provide a plurality of database services...
US20170302672 SANDBOX TECHNOLOGY BASED WEBPAGE BROWSING METHOD AND DEVICE  
The disclosure includes a sandbox technology based webpage browsing method and device. A method comprises receiving an instruction for webpage browsing in a sandbox. Upon receiving the...
US20170302671 TECHNOLOGY FOR MANAGING ELECTRONIC COMMUNICATIONS HAVING CERTAIN DESIGNATIONS  
Systems and methods for managing and storing electronic communications are disclosed. According to certain aspects, the systems and methods may receive an electronic communication intended for a...
US20170302670 METHOD, DEVICE, AND SYSTEM FOR EXECUTING NETWORK SERVICE  
A method for executing a network service includes: receiving a network service request sent by a first terminal, the network service request including a target identification; determining a second...
US20170302669 USING MOBILE DEVICES AS GATEWAYS FOR INTERNET OF THINGS DEVICES  
A mobile device may include first and second communication interfaces. The mobile device may receive, from another device, a dispatch message to receive data from an Internet of Things (IoT)...
US20170302668 MODEL FRAMEWORK AND SYSTEM FOR CYBER SECURITY SERVICES  
Systems, computer program products, and methods are described herein for a model framework and system for cyber security services. The present invention is configured to determine one or more...
US20170302667 SECURITY ARCHITECTURE FOR AUTHENTICATION AND AUDIT  
A mechanism for consolidating communications between a computer tenant and a web services layer is provided. The mechanism may include a web services layer. The web services layer may be...
US20170302666 ESTABLISHING TRUST BETWEEN TWO DEVICES  
Techniques described herein leverage a trusted entity within a domain to enable devices to establish trust with one another so they can securely discover each other and connect to one another. In...
US20170302665 NETWORK HOLOGRAM FOR ENTERPRISE SECURITY  
The disclosed teachings include a computer-implemented method for discovering and building relationships between users, user devices, software applications, and data of a computer network in...
US20170302664 USING CLOCK DRIFT, CLOCK SKEW, AND NETWORK LATENCY TO ENHANCE MACHINE IDENTIFICATION  
Methods and systems for authenticating a user device employ a database of global network latencies categorized and searchable by location and calendar date-time of day usage, providing network...
US20170302663 BLOCK CHAIN BASED IoT DEVICE IDENTITY VERIFICATION AND ANOMALY DETECTION  
In one embodiment, a device in a network receives a network registration request from a particular node. The network registration request comprises information about the particular node. The...
US20170302662 ACCOUNT INFORMATION OBTAINING METHOD, TERMINAL, SERVER AND SYSTEM  
An account information obtaining method performed at a terminal includes the following steps: in response to a request of a current user of the terminal, invoking a social networking application...
US20170302661 ANONYMIZING BIOMETRIC DATA FOR USE IN A SECURITY SYSTEM  
An anonymized biometric representation of a target individual is used in a computer based security system. A detailed input biometric signal associated with a target individual is obtained. A...
US20170302660 FORWARDING METHOD, FORWARDING APPARATUS, AND FORWARDER FOR AUTHENTICATION INFORMATION IN INTERNET OF THINGS  
Embodiments of the present application disclose a forwarding method, a forwarding apparatus, and a forwarder for authentication information in the Internet of Things. The method is applied to a...
US20170302659 TWO-FACTOR AUTHENTICATION  
Systems, methods, and computer-readable storage media are provided for authenticating users to secure services or apps utilizing reversed, hands-free and/or continuous two-factor authentication....