Match Document Document Title
US20160315957 SAFE CODE FOR SIGNATURE UPDATES IN AN INTRUSION PREVENTION SYSTEM  
Described is a technology by which a signature used by network traffic intrusion prevention/detection systems includes logic that helps a prevention/detection engine detect that signature. A...
US20160315956 DETECTING MAN-IN-THE-MIDDLE ATTACKS IN ADAPTIVE STREAMING  
Systems and methods for adaptively streaming video content to a wireless transmit/receive unit (WTRU) or wired transmit/receive unit may comprise obtaining a media presentation description that...
US20160315955 Network Security Analysis for Smart Appliances  
A method and system for detecting malicious behavior from smart appliances within a network. Smart appliances have a certain level of intelligence that allows them to perform a specific role more...
US20160315954 DETECTING SHARED OR COMPROMISED CREDENTIALS THROUGH ANALYSIS OF SIMULTANEOUS ACTIONS  
A privileged account management system can detect when credentials used to access one or more servers have been shared or otherwise compromised. This detection can occur through analysis of...
US20160315953 SYSTEMS AND METHODS FOR SECURING REMOTE CONFIGURATION  
A system and method for securing remote configurations. The system and method can include, at a monitoring device, connecting to a messaging service for at most a determined connection period. The...
US20160315952 Detecting Network Address Translation Devices In A Network Based On Network Traffic Logs  
Network traffic logs of network traffic to and from host devices connected to a network that were collected over time are accessed. For each host device identified in the logs, a set of network...
US20160315951 SYSTEM AND METHOD FOR DETECTING A COMPROMISED COMPUTING SYSTEM  
A digital security threat management system is disclosed. The system detects the presence of a computing system, on a network, that has been compromised by an undetected and/or unknown digital...
US20160315950 Apparatus and Method for Enabling Safe Handling of Malware  
An apparatus for rendering malware files safe for handling may include processing circuitry configured to receive a executable object, divide the executable object into a plurality of segments,...
US20160315949 APPARATUS AND METHOD FOR TRANSMITTING DATA  
A method and an apparatus for transmitting data from a transmitter in a first communication network (21) to a receiver in a second, safety-critical application network (22) comprises an input...
US20160315948 METHOD AND SYSTEM FOR IDENTIFYING A HUMAN OR MACHINE  
Identifying a human or machine is disclosed including sending a currently-triggered human or machine identification request to a server, receiving a first operation rendered by the server in...
US20160315947 DYNAMIC ENTERPRISE SECURITY CONTROL BASED ON USER RISK FACTORS  
Aspects dynamically set enterprise-level security rules. Risk values representing likelihoods of loss of enterprise secure data are determined for different attributes of a user, and added...
US20160315946 SYSTEM AND METHOD FOR ACCESS CONTROL USING NETWORK VERIFICATION  
A system for controlling access includes a computing device, configured to: determine a first identifier associated with a first access point being used by the computing device to access a...
US20160315945 SECURITY TRACKING OF COMPUTER RESOURCES  
An allocation system that tracks allocation of computer resources is provided. The allocation system allocates a number of user-periods to an organization for accessing a computer resource. The...
US20160315944 SYSTEM AND METHOD FOR DYNAMIC NETWORK DATA VALIDATION  
In general, certain embodiments of the present disclosure provide systems and methods for dynamic network data validation. In various embodiments, a system is provided comprising a content server...
US20160315943 TECHNIQUES FOR FINE GRAINED PROTECTION OF RESOURCES IN AN ACCESS MANAGEMENT ENVIRONMENT  
In certain embodiments, techniques are provided (e.g., a method, a system, non-transitory computer-readable medium storing code or instructions executable by one or more processors) to provide...
US20160315942 ELECTRONIC DEVICE WITH ADDICTION-PREVENTION FUNCTION AND METHOD THEREOF  
An addiction-prevention method, includes steps: generating a prompt signal to prompt a user to input a biological feature again every a first predetermined time after the user is logged in a...
US20160315941 ACCESS CONTROL FOR A DOCUMENT MANAGEMENT AND COLLABORATION SYSTEM  
A method and apparatus for controlling access to documents retained by a document management and collaboration system is disclosed. The document management and collaboration system may generate...
US20160315940 SYSTEM AND METHOD FOR CONTROLLING ACCESS  
Systems and methods for controlling access to multiple applications on a computing device are provided. One embodiment of a system includes an access device configured to: receive a request to...
US20160315939 METHOD, APPARATUS AND COMPUTER PROGRAM  
An approach is provided for enabling access to content in a network service. Location information is received, at a server, relating to a first remote apparatus and another remote apparatus. The...
US20160315938 APPARATUS, SYSTEM AND METHOD FOR webRTC  
There is provided a solution as to how the authentication and thus the authorization of the webRTC IMS Client can be achieved in the IMS of the mobile network operator. The WIC (20) is using an ID...
US20160315937 Method and System for Securing Data Communicated in a Network  
According to a first aspect of the present disclosure, a method is conceived for securing data communicated in a network, the method comprising: receiving, by a destination node in the network, at...
US20160315936 METHOD FOR BIOMETRIC RECOGNITION OF A USER AMONGST A PLURALITY OF REGISTERED USERS TO A SERVICE, EMPLOYING USER LOCALIZATION INFORMATION  
A method for recognizing a person by identification codes derivable from biometric data includes registering a user, and recognizing a registered user, among registered users, through a...
US20160315935 IMAGING PROCESSING SYSTEM AND ELECTRONIC BLACKBOARD  
An image processing system includes an electronic blackboard and a data server connected via a network. The electronic blackboard is configured to generate a code including identification...
US20160315934 MANAGING SERVERS BASED ON PAIRING KEYS TO IMPLEMENT AN ADMINISTRATIVE DOMAIN-WIDE POLICY  
A server is paired. A pairing request that includes a pairing key is received from an unpaired server. A determination is made regarding whether to approve or reject the pairing request. Making...
US20160315933 WEB BASED SYSTEM THAT ALLOWS USERS TO LOG INTO WEBSITES WITHOUT ENTERING USERNAME AND PASSWORD INFORMATION  
Internet user passwords are securely managed. A formation component can enable a user to create a master account on a web server, the master account comprising a master username and password. An...
US20160315932 METHOD AND SYSTEM FOR AUTHENTICATING SERVICE  
Embodiments of the present application relate to a method, a system, and a computer program product for authenticating a service. A method for authenticating a service is provided. The method...
US20160315931 COMMUNICATIONS DEVICE, SYSTEM AND METHOD  
A contactless communications device (10) comprises one or more near-field communication (NFC) chips (28) each configured to store information and be read by a corresponding NFC reader. The device...
US20160315930 CLOUD DATA DISCOVERY METHOD AND SYSTEM FOR PRIVATE INFORMATION PROTECTION AND DATA LOSS PREVENTION IN ENTERPRISE CLOUD SERVICE ENVIRONMENT  
Provided is a cloud data discovery method which includes storing cloud application program interface (API) authentication information for each cloud service and accessing user data stored in a...
US20160315929 SYSTEM AND METHOD FOR ENHANCED CHALLENGE-RESPONSE AUTHENTICATION  
Approaches presented herein enable challenge-response authentication of a user based on information captured by a personal internet of things (IoT) device set associated with the user....
US20160315928 IDENTITY DATA BASED ON AGGREGATING INPUT DATA  
A computing device, a system, and a method are provided to receive a number of inputs associated with one or more sensors of the computing device. One or more processors are configured to...
US20160315927 METHOD AND SYSTEM FOR ESTABLISHING AND MANAGING PERSONAL BLACK BOX (PBB) IN VIRTUALLY-NETWORKED BIG-DATA (VNBD) ENVIRONMENT  
A Personal Black Box (PBB) of data (and information) in a network (e.g., the Internet) is established and managed. The PBB can utilize both Personally Identifiable Information (PII) and other...
US20160315926 TECHNIQUES FOR SECURITY ARTIFACTS MANAGEMENT  
Techniques are provided to manage security artifacts. Specifically, a security management system is disclosed for implementing security artifact archives to manage security artifacts. A security...
US20160315925 METHOD AND SYSTEM FOR DYNAMIC DE-IDENTIFICATION OF DATA SETS  
A method for combining disparate data sets using dynamic de-identifiers includes: receiving a first data set from a first external entity, the data set including first data entries including...
US20160315924 FACSIMILE DEVICE, FACSIMILE COMMUNICATION SYSTEM, AND FACSIMILE DEVICE CONTROL METHOD  
A facsimile device includes: an operation part; a storage part for storing therein the same common key as in a reception-side facsimile device; a transmission data generation part for generating...
US20160315923 SECURE COMMUNICATION CHANNELS  
A method and system for negotiating a secure device-to-device communications channel between a first computing device and a second computing device, wherein the first computing device is...
US20160315922 TECHNOLOGIES FOR SECURE EXTENSIBLE INTER-DEVICE I/O REDIRECTION ACROSS A NETWORK  
Technologies for secure I/O redirection include a provider device, a consumer device, an authentication server, and a messaging server. The provider device and the consumer device establish an...
US20160315921 CUMULATIVE SCHEMES FOR NETWORK PATH PROOF OF TRANSIT  
A system and methods are provided for verifying proof of transit of network traffic through a plurality of network nodes in a network. In one embodiment, each network node reads a first value and...
US20160315920 METHOD AND APPARATUS FOR AVOIDING DOUBLE-ENCRYPTION IN SITE-TO-SITE IPSEC VPN CONNECTIONS  
A system and a method are described that reduce or eliminate inefficiencies caused by double encryption in network tunnel communications. In particular, a set of virtual tunnels may be established...
US20160315919 MANAGE ENCRYPTED NETWORK TRAFFIC USING SPOOFED ADDRESSES  
Methods and systems for managing encrypted network traffic using spoofed addresses. One example method includes receiving a request to resolve a domain name; determining that the domain name is...
US20160315918 SYSTEM AND METHOD FOR ENHANCED DATA PROTECTION  
In one embodiment, a method of secure network transmission is performed by a computer system. The method includes encrypting a payload via a first symmetric key and encrypting the first symmetric...
US20160315917 METHODS AND APPARATUS TO SECURELY SHARE DATA  
Methods and apparatus to securely share data are disclosed. An example includes retrieving, by executing an instruction with a processor at a first computing device associated with a first user of...
US20160315916 SECURE COMMUNICATION SECRET SHARING  
Embodiments are directed to sharing secure communication secrets with a network monitoring device (NMD). The NMD may passively monitor network packets communicated between client computers and...
US20160315915 METHOD FOR ACCESSING A DATA MEMORY OF A CLOUD COMPUTER SYSTEM USING A MODIFIED DOMAIN NAME SYSTEM (DNS)  
The invention relates to a process for accessing a data storage device (128) of a cloud computer system (102) through a gateway computer system (100) which is connected with the cloud computer...
US20160315914 METHOD FOR HIDING RECEIVER'S ADDRESS FOR LINK LAYER IN GROUP COMMUNICATION  
The present invention relates to a receiver information hiding method of hiding receiver information of a message in a system including a transmitting terminal broadcasting the message and a...
US20160315913 Scalable Intermediate Network Device Leveraging SSL Session Ticket Extension  
An intermediary network device receives a request for a secure communication session between an endpoint server and an endpoint client through the network device. The secure session between the...
US20160315912 METHOD AND SYSTEM OF ESTABLISHING A VIRTUAL PRIVATE NETWORK IN A CLOUD SERVICE FOR BRANCH NETWORKING  
In one aspect, a computerized system useful for implementing a virtual private network (VPN) including an edge device that automatically establishes an Internet Protocol Security (IPsec) tunnel...
US20160315911 INTELLIGENT FIREWALL ACCESS RULES  
A firewall provides improved network security by allowing the use of dynamic objects in firewall rules, where the dynamic objects evaluate to a variable set of devices. The dynamic objects may be...
US20160315910 Persistent Uniform Resource Locators (URLs) for Client Applications acting as Web Services  
Techniques to provide persistent uniform resource locators (URLs) for client applications acting as web services are described herein. In one or more implementations, the techniques utilize...
US20160315909 NETWORK SECURITY ANALYSIS FOR SMART APPLIANCES  
A method and system for detecting malicious behavior from smart appliances within a network. Smart appliances have a certain level of intelligence that allows them to perform a specific role more...
US20160315908 Method and Apparatus for Managing MAC Address Generation for Virtualized Environments  
MAC addresses are flexibly and dynamically allocated across groups of devices that need MAC addresses. MAC address pools are defined for the groups by non-overlapping ranges of MAC addresses. The...