Match Document Document Title
US20160330248 COMMUNICATING STATUS REGARDING APPLICATION OF COMPLIANCE POLICY UPDATES  
A set of compliance policy updates are received. The compliance policy updates are sent to workloads for application. A status of the application of the compliance policies to the workloads is...
US20160330247 Enforcing Policy-based Application and Access Control in an Information Management System  
A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central rule database via a rule server....
US20160330246 SECURITY FOR NETWORK DELIVERED SERVICES  
A computer-implemented method for accessing a hosted service on client devices is described. The client devices include client software that uses a remotely delivered policy to redirect network...
US20160330245 SYSTEMS AND METHODS FOR PERFORMING TARGETED SCANNING OF A TARGET RANGE OF IP ADDRESSES TO VERIFY SECURITY CERTIFICATES  
The present disclosure is directed towards systems and methods for scanning of a target range of IP addresses to verify security certificates associated with the target range of IP addresses....
US20160330244 Secure Storage of Data Among Multiple Devices  
Described herein is a computer implemented method for securely storing a record. Record storage criteria and record access criteria are received and the record is processed according to the record...
US20160330243 Hybrid Engine for Generating a Recommended Security Tier  
A computer-implemented method, including receiving, by one or more computer systems, customer characteristic information for a user; applying, by the one or more computer systems, one or more...
US20160330242 INLINE ARINC DATA AUTHENTICITY INSPECTION MODULE, METHOD AND COMPUTER PROGRAM PRODUCT  
An inline ARINC data authenticity inspection module, method and computer program product are provided. In the context of a method, ARINC data that is transmitted via an ARINC bus is received into...
US20160330241 REMOTE PASSWORD MANAGEMENT USING LOCAL SECURITY POLICIES  
Disclosed are various examples for remotely managing passwords using local security policies. A computing device enrolls a client device. The computing device then identifies a setting of a local...
US20160330240 BLOCKING VIA AN UNSOLVABLE CAPTCHA  
A security device may receive a request from an attacker device and intended for a server device. The security device may identify the request as being associated with a malicious activity. The...
US20160330239 HACKING PREVENTION SYSTEM FOR MOBILE TERMINAL AND METHOD THEREFOR  
The present invention is for preventing a mobile terminal from being hacked and relates to a system and method for identifying whether link information is safe. A system including a mobile...
US20160330238 Phishing-as-a-Service (PHaas) Used To Increase Corporate Security Awareness  
An enhanced system is provided through a network such as the Internet that provides integrated network security (phishing) testing and training. The current system increases corporate security of...
US20160330237 System and Method for Blocking Internet Data Brokers and Networks  
The Data Traffic Controller is a system and method that provides users with the ability to view, control and protect themselves during their online browsing. Most websites come with an array of...
US20160330236 COMBINING INTERNET ROUTING INFORMATION WITH ACCESS LOGS TO ASSESS RISK OF USER EXPOSURE  
The present disclosure is directed towards systems and methods for evaluating or mitigating a network attack. A device determines one or more client internet protocol addresses associated with the...
US20160330235 INTEGRATED BOT AND CAPTCHA TECHNIQUES  
Integrated techniques for computer bot detection and human user based access include determining if a client device has been identified as a computer bot based upon, client information extracted...
US20160330234 Secure Coding Framework Based on Cyber Security through Lexical and Symbolic Proxy Technology  
The Secure Coding Framework (“SCF”) is a class library that wraps and replaces cyber-vulnerable primitives and operators of the underlying programming language used by the developer with secure...
US20160330233 Systems and Methods for Detecting and Reacting to Malicious Activity in Computer Networks  
Described herein are systems and methods for performing detection operations on secure ticket data to detect potentially malicious activity. Embodiments may involve obtaining encrypted data from...
US20160330232 MALICIOUS AUTHORIZED ACCESS PREVENTION APPARATUS AND METHOD OF USE THEREOF  
The invention comprises a predictive security system apparatus and method of use thereof for predicting a threat level of illicit activity of an actor, the actor using authorized access to company...
US20160330231 SECURITY RISK MANAGEMENT  
Among other things, traces are received of activities of an online user who is associated with an entity. By analysis of the traces a security state of the entity is inferred. Also, a map is...
US20160330230 SYSTEMS AND METHODS FOR IMPROVING SECURITY OF SECURE SOCKET LAYER (SSL) COMMUNICATIONS  
The disclosure is directed to a system for improving security of SSL communications. The system can include an device intermediary between one or more servers, one or more clients, a plurality of...
US20160330229 IDENTIFYING AND DISABLING A ROGUE ACCESS POINT IN A PUBLIC WIRELESS ENVIRONMENT  
A system for identifying a wireless security threat on a vehicle. The system includes a broadband controller including a data processor and memory in which the broadband controller provides a...
US20160330228 APPARATUS AND METHOD FOR ASSIGNING CYBER-SECURITY RISK CONSEQUENCES IN INDUSTRIAL PROCESS CONTROL ENVIRONMENTS  
A method includes identifying multiple devices or groups of devices in an industrial process control and automation system. The method also includes, for each device or group of devices, (i)...
US20160330227 CONNECTION GATEWAY FOR COMMUNICATING MONITORING AND CONTROL INFORMATION BETWEEN A REMOTELY LOCATED MOBILE DEVICE AND PREMISES DEVICES/APPLIANCES ON A PREMISES NETWORK  
A home security and control system for monitoring and controlling an external environment such as a home environment comprising: an Internet browser connectable to an extranet; an extranet located...
US20160330226 Graph-based Instrusion Detection Using Process Traces  
Methods and systems for detecting malicious processes include modeling system data as a graph comprising vertices that represent system entities and edges that represent events between respective...
US20160330225 Systems, Methods, and Devices for Detecting Anomalies in an Industrial Control System  
A method of detecting anomalies in an industrial control system includes analyzing data of correct operational parameters from at least one input device and storing the correct operational...
US20160330224 APPARATUS METHOD AND MEDIUM FOR DETECTING PAYLOAD ANOMALY USING N-GRAM DISTRIBUTION OF NORMAL DATA  
A method, apparatus and medium are provided for detecting anomalous payloads transmitted through a network. The system receives payloads within the network and determines a length for data...
US20160330223 Methods and Systems for Using Causal Analysis for Boosted Decision Stumps to Identify and Respond to Non-Benign Behaviors  
A computing device processor may be configured with processor-executable instructions to implement methods of detecting and responding non-benign behaviors of the computing device. The processor...
US20160330222 SYSTEM AND METHODOLOGY PROVIDING AUTOMATION SECURITY ANALYSIS AND NETWORK INTRUSION PROTECTION IN AN INDUSTRIAL ENVIRONMENT  
Automation security in a networked-based industrial controller environment is implemented. Various components, systems and methodologies are provided to facilitate varying levels of automation...
US20160330221 Systems and Methods for Detecting and Reacting to Malicious Activity in Computer Networks  
Described herein are systems and methods for performing operations responsive to potentially malicious activity. Embodiments may include receiving an indication of the potentially malicious...
US20160330220 Systems and Methods for Detecting and Reacting to Malicious Activity in Computer Networks  
Described herein are systems and methods for performing potentially malicious activity detection operations. Embodiments may include receiving data associated with a plurality of authentication...
US20160330219 METHOD AND DEVICE FOR MANAGING SECURITY IN A COMPUTER NETWORK  
Method and device for managing security in a computer network include algorithms of iterative intelligence growth, iterative evolution, and evolution pathways; sub-algorithms of information type...
US20160330218 METHOD AND SYSTEM TO PROTECT SOFTWARE-BASED NETWORK-CONNECTED DEVICES FROM ADVANCED PERSISTENT THREAT  
A method of protecting a network-connected device from an advanced persistent threat cyber-attack is provided. A network-connected device having an operating system, a memory, memory instructions...
US20160330217 SECURITY BREACH PREDICTION BASED ON EMOTIONAL ANALYSIS  
Various embodiments of the invention allow to detect and protect against a security breach on a computing system carried out by insiders. In certain embodiments, protection is provided by a...
US20160330216 ATTACK DETECTION THROUGH SIGNAL DELAY MONITORING  
The present disclosure is directed to attack detection through signal delay monitoring. An example system may comprise at least one device including a physical interface. At least one signal delay...
US20160330215 DETECTION OF POTENTIALLY MALICIOUS WEB CONTENT BY EMULATING USER BEHAVIOR AND USER ENVIRONMENT  
Methods and systems for the detection of receipt of potentially malicious web content by a web clients are disclosed. These methods and systems comprise elements of hardware and software for...
US20160330214 DATA INTEGRITY VERIFICATION  
A system performs cryptographic operations utilizing information usable to verify validity of plaintext. To prevent providing information about a plaintext by providing the information usable to...
US20160330213 Power Line Communication (PLC) Network Nodes Using Cipher Then Segment Security  
Embodiments of the invention provide systems and methods for a cipher then segment approach in a Power Line Communication (PLC). A node or device generates frames to be transmitted to a...
US20160330212 SYSTEM FOR SECURE DATA VALIDATION  
A network connected secure system for validating electronic certificate codes. The network connected secure computing system is coupled to a network for access by a plurality of users at a...
US20160330211 VERIFICATION TECHNIQUES FOR ENHANCED SECURITY  
In an example, an apparatus includes a biological analysis component and a control component. The biological analysis component is configured to obtain an expected biological sample value. The...
US20160330210 Systems and Methods for Security Verification in Electronic Learning Systems and Other Systems  
The embodiments described herein relate to security verification systems and methods. In some aspects, there is provided a security verification server comprising a server processor. The server...
US20160330209 A DATA SECURING SYSTEM AND METHOD  
Embodiments of the present invention provide data securing methods, systems, and computer program products for controlling data distribution in a distributed computing system comprising a set of...
US20160330208 METHOD AND APPARATUS FOR IMPLEMENTING DOCUMENT SHARING BETWEEN USER GROUPS  
Disclosed are a method and an apparatus for implementing document sharing between user groups. The method comprises: receiving document sharing request information sent by a user in a first user...
US20160330207 AUTHENTICATING A REQUEST FOR AN ELECTRONIC TRANSACTION  
In an approach for authenticating a request for an electronic transaction, a computer determines whether a request from a user for an electronic transaction is suspicious. The computer determines...
US20160330206 METHOD, DEVICE AND SERVER FOR MANAGING USER LOGIN SESSIONS  
The present disclosure provides a method, device and server for managing user login sessions. A session cache list is queried, using a user ID and after a user has successfully logged in with the...
US20160330205 VIRTUAL MACHINE ACCESS CONTROL  
A system is provided and includes a broadcasting device configured to emit a beacon signal over a predefined range and a mobile computing device. The mobile computing device is configured to run a...
US20160330204 METHOD AND DEVICE FOR ACTIVATING FUNCTIONS OF A CONTROL DEVICE  
A method for activating at least one function of a control device of a motor vehicle, which includes the steps: a) generating a random value in the control device; b) calculating a reference value...
US20160330203 Bi-directional communication over a one-way link  
Apparatus for communication includes a single one-way link, which is physically capable of carrying the communication signals in one direction and incapable of carrying the communication signals...
US20160330202 ACCESS CONTROL DEVICE, COMMUNICATION SYSTEM, PROGRAM, AND METHOD FOR CONTROLLING ACCESS  
An access control device for controlling an access by a communication terminal to an application includes an authentication method management means configured to manage each of the application in...
US20160330201 Systems and Methods for Controlling Access to a Computer Device  
A method and system for controlling access to a computer device. The method and system involves operating a computer device to control access to the computer device by a host system. The method...
US20160330200 MULTI-SERVICES APPLICATION GATEWAY AND SYSTEM EMPLOYING THE SAME  
An intelligent gateway device provided at a premise (home or business) for providing and managing application services associated with use and support of a plurality of digital endpoint devices...
US20160330199 FALLBACK IDENTITY AUTHENTICATION TECHNIQUES  
The presently disclosed subject matter includes a system, a method and a non-transitory program storage device configured for authorizing access of a user device to a service provider server....