Match Document Document Title
US20150312274 METHOD AND SYSTEM FOR ENSURING AN APPLICATION CONFORMS WITH SECURITY AND REGULATORY CONTROLS PRIOR TO DEPLOYMENT  
Asset security compliance data ensuring defined asset security policies are applied to the creation and/or operation of assets to be used to implement an application and application deployment...
US20150312273 METHODS AND SYSTEMS FOR DETECTING AND MITIGATING A HIGH-RATE DISTRIBUTED DENIAL OF SERVICE (DDoS) ATTACK  
Methods and systems for detecting and mitigating high-rate Distributed Denial of Service (DDoS) attacks are herein described. The present invention contemplates a variety of improved techniques...
US20150312272 PROTECTING COMPUTING ASSETS FROM RESOURCE INTENSIVE QUERYING ATTACKS  
A method and system for managing data traffic and protecting computing assets. The method and system includes intercepting queries and messages, such as EDNS0 queries, and sending probe queries...
US20150312271 Application Spam Detector  
A method for performing an application search. The method includes receiving a search query from a remote device and determining a consideration set of applications based on the search query. The...
US20150312270 SECURITY CONTROLS  
A network of computers has a network management system which stores metadata comprising at least the identities of software present on computers of the network. A computer of the network runs a...
US20150312269 METHODS AND APPARATUS TO IDENTIFY AN INTERNET PROTOCOL ADDRESS BLACKLIST BOUNDARY  
Methods, apparatus, systems and articles of manufacture are disclosed to identify candidate boundaries of Internet protocol addresses associated with a malicious Internet protocol address. An...
US20150312268 INTRUSION DETECTION USING A HEARTBEAT  
A variety of techniques are disclosed for detection of advanced persistent threats and similar malware. In one aspect, the detection of certain network traffic at a gateway is used to trigger a...
US20150312267 USING REPUTATION TO AVOID FALSE MALWARE DETECTIONS  
A variety of techniques are disclosed for detection of advanced persistent threats and similar malware. In one aspect, the detection of certain network traffic at a gateway is used to trigger a...
US20150312266 ADVANCED PERSISTENT THREAT DETECTION  
A variety of techniques are disclosed for detection of advanced persistent threats and similar malware. In one aspect, the detection of certain network traffic at a gateway is used to trigger a...
US20150312265 Method for Verifying Sensitive Operations, Terminal Device, Server, and Verification System  
The disclosure, pertaining, to the field of network technologies, discloses a method for verifying sensitive operations, a terminal device, a server, and a verification system. The method...
US20150312264 METHOD, SYSTEM AND SERVER FOR AUTHORIZING COMPUTING DEVICES FOR RECEIPT OF VENUE-BASED DATA BASED ON THE GEOGRAPHIC LOCATION OF A USER  
Methods, systems and servers are disclosed for authorizing access by a user of a service associated with an event at a venue and provided via a computer network based on a determined geographic...
US20150312263 SOCIAL NETWORK PRIVACY AUDITOR  
A privacy auditor determines discrepancies between user privacy settings in a social network and installed applications. The privacy auditor can employ a privacy determinator that tests an...
US20150312262 DETERMINATION OF USER REPUTATION REGARDING DATA OBJECT EXPOSURE IN CLOUD COMPUTING ENVIRONMENTS  
Embodiments disclosed herein provide systems, methods, and computer readable media for determining user reputation regarding data object exposure in a cloud computing environment. In a particular...
US20150312261 VISUALLY REPRESENTING AND MANAGING ACCESS CONTROL OF RESOURCES  
An approach is provided for controlling access to a resource. Visual representations of the resource and an entity and a second entity are included in a display. In the display, a movement of the...
US20150312260 METHODS OF PROVIDING SOCIAL NETWORK SERVICE AND SERVER PERFORMING THE SAME  
Methods and apparatuses for sharing content through a chatting space of a social networking service (SNS) are provided. The method includes detecting an access of a plurality of users to the...
US20150312259 Searching Private Content and Public Content  
A method performed by one or more processing devices includes receiving, from a client device controlled by a user, a search query including one or more search terms and user information of the...
US20150312258 ACCESS RIGHT SETTING METHOD AND ACCESS RIGHT SETTING SYSTEM FOR USE IN AREA NETWORK  
An access right setting method for use in an area network is provided. During the process of establishing a network connection between an active control device and a server-side device, a media...
US20150312257 FACILITATING USER-CENTRIC IDENTITY MANAGEMENT  
Embodiments of the present invention provide systems, methods, and computer storage media for facilitating user-centric identity management. In this regard, various aspects of identity management...
US20150312256 Inter-Application Delegated Authentication  
Disclosed is a system for delegating authentication of an untrusted application executing on a client device. For delegated authentication, an untrusted application relies on a trusted application...
US20150312255 ENCRYPTING A UNIQUE IDENTIFICATION HEADER TO CREATE DIFFERENT TRANSACTIONAL IDENTIFIERS  
A system may receive a content request associated with a user device. The content request may include information that identifies a subscriber associated with the user device and information that...
US20150312254 Concurrent, Diverse Party Multi-processor Wireless Quality Metric Collection Circuits and Method of Operation  
A system includes a bidirectional signal bus controlled by an M×S master/slave bridge circuit. An application processor having at least one core is communicatively coupled by the bidirectional...
US20150312253 Secure Computer Architectures, Systems, and Applications  
Secure computer architectures, systems, and applications are provided herein. An exemplary computing system may include a trusted environment having a trusted processor and memory that provides a...
US20150312252 METHOD OF ALLOWING ESTABLISHMENT OF A SECURE SESSION BETWEEN A DEVICE AND A SERVER  
The invention is a method for allowing a user to establish a secure session between a device and a server by using a username/password associated with the user. The user provides the username for...
US20150312251 ENSURING THE SECURITY OF A DATA TRANSMISSION  
Ensuring the security of a data transmission by verifying an identity of a user, comprising: a prior step of enrolling a terminal of the user, comprising: an association of a authentic identity...
US20150312250 SOFT TOKEN SYSTEM  
Systems and methods for a secure soft token solution applicable to multiple platforms and usage scenarios are provided. According to one embodiment a unique device ID of a mobile device is...
US20150312249 PASSWORD RETRIEVAL SYSTEM AND METHOD INVOLVING TOKEN USAGE WITHOUT PRIOR KNOWLEDGE OF THE PASSWORD  
A method for managing a master password on a network device, the method stored as a set of instructions executable by a computer processor to: store the master password in a first file in a memory...
US20150312248 IDENTITY AUTHENTICATION  
A system for authenticating a mobile user's identity is disclosed. The user may be required to log in upon first launching a mobile application. Subsequent launches of the mobile application may...
US20150312247 OBJECT DELIVERY AUTHENTICATION  
A method and system for authenticating delivery including the steps of receiving by a receiver a delivery information package from a deliverer over a network during a communication between the...
US20150312246 TOKENIZATION IN A CENTRALIZED TOKENIZATION ENVIRONMENT  
Data can be protected in a centralized tokenization environment. A request to tokenize sensitive data is received by an endpoint. A token for use in tokenizing the sensitive data is identified. A...
US20150312245 IDENTIFICATION FOR APPARATUSES  
It is inter alia disclosed to provide first identity data stored in an apparatus, the first identity data comprising an identifier and a first certificate, and to provide second identity data...
US20150312244 INFORMATION INPUT DEVICE, INFORMATION OUTPUT DEVICE, INFORMATION PROCESSING SYSTEM, AND COMPUTER-READABLE RECORDING MEDIUM  
The present invention is concerning to an information processing system includes an information input device and an information output device. The information input device includes a communication...
US20150312243 STORAGE SYSTEM AND METHOD OF STORING AND MANAGING DATA  
A system for and method of storing and managing data comprising: encoding a file into a plurality of fragments; retrieving storage configuration data from a data management store; retrieving...
US20150312242 USER AUTHENTICATION METHOD, SYSTEM FOR IMPLEMENTING THE SAME, AND INFORMATION COMMUNICATION TERMINAL USED IN THE SAME  
[Problem] To provide a user authentication technology whereby hacking of a system by a third party is effectively prevented. [Solution] The present invention is a user authentication method and...
US20150312241 IDENTITY BASED TICKETING  
A system for identity based ticketing is provided, wherein a user device sends a challenge to a terminal; the terminal updates a filter based on the challenge and sends the contents of the filter...
US20150312240 WIRELESS AUTOMATIC PAIRING METHOD, METHOD OF ESTABLISHING CONNECTION, AND WIRELESS ACCESS POINT DEVICE  
The present disclosure illustrates a wireless automatic pairing method, a method of establishing connection, and a wireless access point device which enable an electronic device to connect with a...
US20150312239 METHODS, DEVICES, AND COMPUTER READABLE STORAGE DEVICES FOR SHARING SENSITIVE CONTENT SECURELY  
Sensitive content is securely shared. A request is received from a first communication device to share sensitive content. The first communication device is associated with an account for a...
US20150312238 METHOD FOR UPDATING A TABLE OF CORRESPONDENCE BETWEEN A LOGICAL ADDRESS AND AN IDENTIFICATION NUMBER  
This invention relates to a Method for updating a table of correspondence between a logical address associated to a user unit in a communication network and a unique identification number...
US20150312237 System and Method to Associate a Private User Identity with a Public User Identity  
The inventive system includes a host, a network including a security gateway, and a public application. Established are an access session between the network and the host and an application...
US20150312236 AUTHENTICATION MECHANISM  
A system and method including: receiving, from a client device, an authorization request originating from an authorization module of an application executing on the client device, where the...
US20150312235 METHODS FOR GENERATING AND PUBLISHING A WEB SITE BASED ON SELECTED ITEMS AND DEVICES THEREOF  
A method, non-transitory computer readable medium, and web content management server computing device that receives, from a client device, requested data comprising at least a template identifier,...
US20150312234 Authenticating a Device When Connecting it to a Service  
There is provided a method and apparatus for authenticating user equipment access to a device over a communications network. The method comprises: sending a first message to the user equipment,...
US20150312233 System and Method to Enable PKI- and PMI- Based Distributed Locking of Content and Distributed Unlocking of Protected Content and/or Scoring of Users and/or Scoring of End-Entity Access Means - Added  
A central server configured with an Attribute Authority (“AA”) acting as a Trusted Third Party mediating service provider and using X.509-compatible PKI and PMI, VPN technology, device-side thin...
US20150312232 METHOD AND APPARATUS FOR HANDLING KEYS USED FOR ENCRYPTION AND INTEGRITY  
A method and an arrangement for providing keys for protecting communication between a terminal (300) and service points in a communication network. A basic key (Ik) is first established with a...
US20150312231 SECURELY CONNECTING CONTROL DEVICE TO TARGET DEVICE  
In an approach, a target computing device receives a pairing request from a controller computing device, the pairing request including controller credentials that were previously received by the...
US20150312230 APPARATUS AND METHOD FOR TRANSFERRING NETWORK ACCESS INFORMATION OF SMART HOUSEHOLD APPLIANCES  
An apparatus and method for transferring network access information of smart household appliances are provided. The apparatus includes a detection unit for detecting whether a public IP address of...
US20150312229 STREAMING SYSTEM AND METHOD  
A streaming system includes an authoring unit, a stream server and a client terminal. The authoring unit generates a file composed of encrypted contents data and the ancillary information at least...
US20150312228 REMOTE STATION FOR DERIVING A DERIVATIVE KEY IN A SYSTEM-ON-A-CHIP DEVICE  
An integrated circuit may comprise a processor configured to: receive a delegate certificate, wherein the delegate certificate includes a first public key; validate a digital signature of the...
US20150312227 PRIVACY PRESERVING ELECTRONIC DOCUMENT SIGNATURE SERVICE  
An electronic document signature system preserves the security of an electronic document while tracking a signature process corresponding to the electronic document. In particular, using a client...
US20150312226 METHOD FOR INCLUDING AN IMPLICIT INTEGRITY OR AUTHENTICITY CHECK INTO A WHITE-BOX IMPLEMENTATION  
A method of performing a cryptographic operation using a cryptographic implementation in a cryptographic system, including: receiving, by the cryptographic system, an identifying string value;...
US20150312225 SECURITY PATCH WITHOUT CHANGING THE KEY  
A method of patching a cryptographic implementation without changing a key in a cryptographic system, including: sending a message from a first message set to the cryptographic implementation,...