Match Document Document Title
US20160344783 CONTENT PROVISION SYSTEM, INFORMATION PROCESSING APPARATUS AND CONTENT REPRODUCTION METHOD  
There is provided a content provision system including an information processing apparatus and a terminal device wherein the information processing apparatus provides a content that includes...
US20160344782 UNICAST SUPPORT IN PROSE DIRECT DEVICE-TO-DEVICE COMMUNICATION  
The present disclosure enables a multicast and/or unicast transmitting UE to configure a multicast device-to-device communication and/or the unicast device-to-device communication such that UE may...
US20160344781 PROCESSING OF LIVE MULTIMEDIA CONTENT AND/OR DATA STREAMS OVER A COMMUNICATION NETWORK  
A method and associated device for streaming multimedia data over a communication network. Data associated with live multimedia content is received. Portions of the data are processed into data...
US20160344780 METHOD AND SYSTEM FOR CONTROLLING COMMUNICATIONS FOR VIDEO/AUDIO-CONFERENCING  
The present invention relates to a method for controlling communications for an online meeting. The method includes, at each of a plurality of user devices, receiving audio from one of a plurality...
US20160344779 Dynamic Personalized Content Presentation To Re-engage Users During Online Sessions  
Users can participate in various different types of online sessions, such as webinars, massive open online courses (MOOCs), social learning sessions, and so forth. A record of interactions that...
US20160344778 REROUTING DATA OF A STREAMING APPLICATION  
A streams manager monitors performance of a streaming application and determines if operators are underperforming according to a threshold. When the performance needs to be improved, the streams...
US20160344777 SYSTEM AND METHOD FOR PROVIDING A MEDIA COMMUNICATION CONVERSATION SERVICE  
A system and method comprising configuring a conversation resource for an account within a communication platform; registering a set of endpoints as participants of the conversation resource;...
US20160344776 END USER CONTROLLED MULTI-SERVICE DEVICE PRIORITY SETTING  
A communication network allows an end user to dynamically select a user device among user devices associated with the user's subscription as the primary user device by defining a primary...
US20160344775 SYSTEM AND METHOD OF LAWFUL ACCESS TO SECURE COMMUNICATIONS  
The present disclosure relates to systems and methods for secure communications. In some aspects, a method of signalling an interception time period is described. At least one keying information...
US20160344774 METHODS AND NODES SUPPORTING LAWFUL INTERCEPT  
The following invention relates to methods and nodes for performing Lawful Intercept, LI, when service related content is stored in a Radio Access Network, RAN or a wireless User Equipment, UE,...
US20160344773 Integrated Development Environment (IDE) for Network Security Configuration Files  
An integrated development environment (IDE) preprocesses a configuration file including security rules. The preprocessing maps object names in the security rules to associated object values based...
US20160344772 MODELLING NETWORK TO ASSESS SECURITY PROPERTIES  
A method of assessing a network uses a model (450) having nodes (100, 110) to represent parts of the network infrastructure and the application services, and having links to represent how the...
US20160344771 MANAGED APPLICATIONS  
Embodiments relate to a system that includes a computing device and a managed application executable by the computing device. The managed application initiates an execution of a target...
US20160344770 Automatic Phishing Email Detection Based on Natural Language Processing Techniques  
A comprehensive scheme to detect phishing emails using features that are invariant and fundamentally characterize phishing. Multiple embodiments are described herein based on combinations of text...
US20160344769 SECURITY SYSTEMS FOR MITIGATING ATTACKS FROM A HEADLESS BROWSER EXECUTING ON A CLIENT COMPUTER  
Computer systems and methods in various embodiments are configured for improving the security and efficiency of server computers interacting through an intermediary computer with client computers...
US20160344768 INTRUSION DETECTION TO PREVENT IMPERSONATION ATTACKS IN COMPUTER NETWORKS  
In an embodiment, a central computer performs a data processing method. The central computer receives telemetry data from intrusion sensors. The central computer stores authentication records in a...
US20160344767 Preventing Spoofing Attacks for Bone Conduction Applications  
Concepts and technologies are disclosed herein for preventing spoofing attacks for bone conduction applications. According to one aspect, a device can receive an authentication signal that has...
US20160344766 SPOOFING DETECTION  
A method for preventing spoofing in an automotive network, the method comprising storing at least one address of a first vehicle electronic control unit and detecting at least one message from a...
US20160344765 Unobtrusive and Dynamic DDoS Mitigation  
Some embodiments provide techniques for mitigating against layer 7 distributed denial of service attacks. Some embodiments submit a computational intensive problem, also referred to as a bot...
US20160344764 NETWORK DEVICE AND NETWORK SYSTEM  
A network device connected via a bus with a plurality of network devices includes: an authentication unit that executes authentication based upon message authentication information included in...
US20160344763 FUZZING SERVER RESPONSES TO MALICIOUS CLIENT DEVICES  
A security device may receive a request, from a client device and intended for a server device, to provide a resource. The resource may be associated with information stored by the server device....
US20160344762 METHOD AND SYSTEM FOR AGGREGATING AND RANKING OF SECURITY EVENT-BASED DATA  
The present invention provides a method of identifying aggregating and mathematically ranking security alert data having the steps of identifying a plurality of alerts, selecting a subset of the...
US20160344761 System, Method And Apparatus To Visually Configure An Analysis Of A Program  
A method extracts views from an application program, where at least some extracted views include at least one view component, and presenting the extracted views to a user. In response to the user...
US20160344760 DYNAMICALLY-ADAPTIVE-RESILIENT MEASURED CYBER PERFORMANCE AND EFFECTS THROUGH COMMAND AND CONTROL INTEGRATION OF FULL SPECTRUM CAPABILITIES  
System-of-systems architectures and methods for dynamically and adaptively managing and executing a command and control system across a global cyber enterprise are provided. The system-of-systems...
US20160344759 METHOD FOR PATTERN PROCESSING  
The invention relates to a method for pattern processing on a processor platform, the method comprising: compiling a plurality of patterns into a plurality of data structures using the first...
US20160344758 EXTERNAL MALWARE DATA ITEM CLUSTERING AND ANALYSIS  
Embodiments of the present disclosure relate to a data analysis system that may automatically generate memory-efficient clustered data structures, automatically analyze those clustered data...
US20160344757 GLOBAL CLUSTERING OF INCIDENTS BASED ON MALWARE SIMILARITY AND ONLINE TRUSTFULNESS  
In an embodiment, a method, performed by processors of a computing device for creating and storing clusters of incident data records based on behavioral characteristic values in the records and...
US20160344756 UNWANTED TUNNELING ALERT SYSTEM  
Various systems and methods are provided that detect malicious network tunneling. For example, VPN logs and data connection logs may be accessed. The VPN logs may list client IP addresses that...
US20160344755 COMMUNICATION CHIPSET AND APPARATUS SECURE FROM INTERNET ATTACK  
A communication chipset and a communication apparatus are disclosed. A register map establishes a communication channel with a plurality of apparatuses, a first data link module sends/receives...
US20160344754 Configurable Robustness Agent in a Plant Security System  
A communications network security system includes a robustness agent that operates within a communications interface of a device at one or more nodes of the network to analyze and filter messages...
US20160344753 METHOD FOR INSTRUCTION SET MORPHING TO INHIBIT MALICIOUS CODE INJECTION  
A method for improving the reliability and security of computer-based processing by providing instruction set morphing to inhibit malicious software code injection into computer based systems....
US20160344752 BRUTE FORCE ATTACK PREVENTION SYSTEM  
A system for preventing a brute force attack includes an output interface, an input interface, and a processor. An output interface is to provide a workfactor, a challenge token, and a login page...
US20160344751 CUSTOMIZED RECORD HANDLING IN A CONTENT DELIVERY NETWORK  
Systems, methods, apparatus and software for customized record handling in a content delivery network are disclosed. In one implementation, a user request received by the content delivery network...
US20160344750 Apparatus and Method for Characterizing the Risk of a User Contracting Malicious Software  
A non-transitory computer readable storage medium includes executable instructions to identify specified network interactions initiated by a client machine. The specified network interactions are...
US20160344749 METHOD AND APPARATUS FOR PROTECTING COMPUTER FILES FROM CPU RESIDENT MALWARE  
Apparatus for use with a computer to secure the computer's stored data against malware in the computer's central processing unit (CPU). The apparatus comprises a keyboard and display. The keyboard...
US20160344748 DISTRIBUTED TOPOLOGY ENABLER FOR IDENTITY MANAGER  
Provided are techniques for combining existing identity management information from multiple Identity Manager (IM) nodes. The combined information from the multiple IM nodes is presented. A...
US20160344747 METHOD AND SYSTEM FOR SECURELY AND AUTOMATICALLY OBTAINING SERVICES FROM A MACHINE DEVICE SERVICES SERVER  
A vehicle processing device authenticates that an authorized user has requested an action by the vehicle, and generates an authentication acknowledgement message. At least two security devices...
US20160344746 TAINT MECHANISM FOR MESSAGING SYSTEM  
A method for managing a plurality of messages associated with an online messaging system is provided. The method may include receiving a message from a messaging source. The method may also...
US20160344745 METHOD AND PROTOCOL FOR SECURE DEVICE DEPLOYMENT USING A PARTIALLY-ENCRYPTED PROVISIONING FILE  
A method, system, and computer program product for Internet-connected device deployment, and to techniques for secure device deployment using a partially-encrypted provisioning file.
US20160344744 APPLICATION PROTOCOL QUERY FOR SECURING GBA USAGE  
A network element provides an application service to a device over a network. Using a shared key generated according to the Generic Bootstrapping Architecture (GBA), the network element...
US20160344743 User Interface Driven Translation, Comparison, Unification, and Deployment of Device Neutral Network Security Policies  
A method is performed at a management device to manage multiple network security devices over a network. The security devices are configured to control access to network accessible resources. A...
US20160344742 Method and Apparatus for Providing an Adaptable Security Level in an Electronic Communication  
A method of communicating in a secure communication system, comprises the steps of assembling a message at a sender, then determining a security level, and including an indication of the security...
US20160344741 Integration User for Analytical Access To Read Only Data Stores Generated From Transactional Systems  
The technology disclosed preserves the tenant specificity and user specificity of the tenant data by associating user IDs to complementary special IDs referred to as the integration user(s). In...
US20160344740 SYSTEM AND METHOD FOR ACCESS AND MANAGEMENT OF THINGS OVER A COMMUNICATION NETWORK RELATED THERETO  
The system and method of the present invention to provide at least one cloud-based things access and management system (things-system) for things lifecycle management, for a plurality of things'...
US20160344739 METHOD FOR CONTROLLING, CHARGING, AND POSITIONING A UE IN A SMALL CELL SYSTEM  
A method for controlling, charging and positioning a UE is disclosed, which includes: a master base station sending closed subscriber group (CSG) member status of the UE in a secondary cell to a...
US20160344738 Determining Similarity Between Security Rules Based On Weighted Comparisons Of Their Rule Parameters  
First and second security rules are accessed in a configuration file. Comparison points for comparing the first and second security rules are determined. Each comparison point identifies...
US20160344737 UNIQUENESS AND AUDITING OF A DATA RESOURCE THROUGH AN IMMUTABLE RECORD OF TRANSACTIONS IN A HASH HISTORY  
Disclosed is a method, a device, and/or a system of uniqueness and auditing of a data resource through an immutable record of transactions in a hash history. In one embodiment, a method includes...
US20160344736 SECURED ACCESS CONTROL TO CLOUD-BASED APPLICATIONS  
A method and proxy device for securing an access to a cloud-based application are presented. The method includes receiving an authentication token, wherein the authentication token includes an...
US20160344735 SYSTEM AND METHOD FOR DELEGATION OF PERMISSIONS TO A THIRD PARTY  
A system and method for delegating permissions to a third party are presented. A request to access a first computing resource of a computer server is received from a first user. The first user is...
US20160344734 SYSTEM FOR PREVENTING UNAUTHORIZED ACCESS TO OPERATIONAL AIRCRAFT DATA  
Embodiments of the present invention provide improved systems and methods for a programmable portable electronic device for airborne operational communications. In one embodiment, a system for...