09th week of 2017 patent applcation highlights part 85 |
Patent application number | Title | Published |
20170063835 | CONTROL APPARATUS AND CONTROL APPARATUS SYSTEM | 2017-03-02 |
20170063836 | METHOD, DEVICE, AND SYSTEM FOR ACCESS CONTROL OF A CLOUD HOSTING SERVICE | 2017-03-02 |
20170063837 | PASSWORD CHECKING METHOD BASED ON RANDOM SEQUENCE | 2017-03-02 |
20170063838 | VISP AUTHENTICATION SERVICE FOR THIRD PARTY APPLICATIONS | 2017-03-02 |
20170063839 | Providing Virtualized Private Network Tunnels | 2017-03-02 |
20170063840 | OPTIMIZING TOKENS FOR IDENTITY PLATFORMS | 2017-03-02 |
20170063841 | TRUSTING INTERMEDIATE CERTIFICATE AUTHORITIES | 2017-03-02 |
20170063842 | METHOD FOR CONTROLLING VEHICLE SECURITY ACCESS BASED ON CERTIFICATE | 2017-03-02 |
20170063843 | Authentication of Networked Devices Having Low Computational Capacity | 2017-03-02 |
20170063844 | AUTOMATIC ELECTRONIC CERTIFICATION TRADING SYSTEM | 2017-03-02 |
20170063845 | PUSH NOTIFICATION FOR APPLICATION UPDATES | 2017-03-02 |
20170063846 | RULE BASED DEVICE ENROLLMENT | 2017-03-02 |
20170063847 | Certificate Validation and Channel Binding | 2017-03-02 |
20170063848 | METHOD AND SYSTEM FOR ENHANCED VALIDATION OF CRYPTOGRAMS IN CLOUD-BASED SYSTEMS | 2017-03-02 |
20170063849 | STAMPER, TERMINAL, AND METHOD FOR OPERATING THE SAME | 2017-03-02 |
20170063850 | Nullifying Biometrics | 2017-03-02 |
20170063851 | METHOD AND APPARATUS FOR AUTHENTICATION BASED ON FINGERPRINT RECOGNITION | 2017-03-02 |
20170063852 | SYSTEM AND METHOD FOR PROVIDING SECURE ACCESS TO AN ELECTRONIC DEVICE USING MULTIFACTOR AUTHENTICATION | 2017-03-02 |
20170063853 | DATA CIPHER AND DECIPHER BASED ON DEVICE AND DATA AUTHENTICATION | 2017-03-02 |
20170063854 | RESTRICTING ACCESS TO CONTENT BASED ON MEASUREMENTS OF USER TERMINAL OPERATIONAL PERFORMANCE | 2017-03-02 |
20170063855 | PROTOCOL INDEPENDENT WAY TO SELECTIVELY RESTRICT WRITE-ACCESS FOR REDIRECTED USB MASS STORAGE DEVICES | 2017-03-02 |
20170063856 | COMPUTING SYSTEM RECORD SECURITY ARCHITECTURE | 2017-03-02 |
20170063857 | PROVIDING ACCESS TO APPLICATIONS WITH VARYING ENROLLMENT LEVELS | 2017-03-02 |
20170063858 | Alertness Based Authorization | 2017-03-02 |
20170063859 | SYSTEM AND METHOD FOR NETWORK ACCESS CONTROL | 2017-03-02 |
20170063860 | NETWORK EQUIPMENT AND NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM | 2017-03-02 |
20170063861 | COMMUNICATION APPARATUS | 2017-03-02 |
20170063862 | SYSTEM AND METHOD FOR AUTHENTICATION | 2017-03-02 |
20170063863 | Access Control Device and Authentication Control Method | 2017-03-02 |
20170063864 | RESPONSE TO A MACHININE-READABLE LINK | 2017-03-02 |
20170063865 | Determining Access Requirements for Online Accounts Based on Characteristics of User Devices | 2017-03-02 |
20170063866 | Configuring Access to Online Accounts for Third Parties Not Associated with the Online Account | 2017-03-02 |
20170063867 | SECURE COMPUTING SYSTEM RECORD ACCESS CONTROL | 2017-03-02 |
20170063868 | Electronic Device and Control Method Thereof | 2017-03-02 |
20170063869 | SYSTEM AND METHOD FOR PROTECTING AGAINST E-MAIL-BASED CYBERATTACKS | 2017-03-02 |
20170063870 | Controlling Access to Ideograms | 2017-03-02 |
20170063871 | INFORMATION PROCESSING SYSTEM, SERVER DEVICE, AND METHOD FOR PROCESSING INFORMATION | 2017-03-02 |
20170063872 | Quantitatively measuring recertification campaign effectiveness | 2017-03-02 |
20170063873 | Reducing risks associated with recertification of dormant accounts | 2017-03-02 |
20170063874 | PERMISSIVE ACCESS CONTROL FOR MODULAR REFLECTION | 2017-03-02 |
20170063875 | INFORMATION PROCESSING SYSTEM AND INFORMATION PROCESSING APPARATUS | 2017-03-02 |
20170063876 | SYSTEMS AND METHODS FOR PROTECTING MESSAGES UTILIZING A HIDDEN RESTRICTION MECHANISM | 2017-03-02 |
20170063877 | HACKING-RESISTANT COMPUTER DESIGN | 2017-03-02 |
20170063878 | SECURITY AWARE EMAIL SERVER | 2017-03-02 |
20170063879 | SYSTEM AND METHOD FOR THE PROTECTION OF COMPUTERS AND COMPUTER NETWORKS AGAINST CYBER THREATS | 2017-03-02 |
20170063880 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR CONDUCTING MALICIOUS MESSAGE DETECTION WITHOUT REVEALING MESSAGE CONTENT | 2017-03-02 |
20170063881 | METHOD AND SYSTEM TO DETECT AND INTERRUPT A ROBOT DATA AGGREGATOR ABILITY TO ACCESS A WEBSITE | 2017-03-02 |
20170063882 | MONITORING THE LIFE CYCLE OF A COMPUTER NETWORK CONNECTION | 2017-03-02 |
20170063883 | METADATA INFORMATION BASED FILE PROCESSING | 2017-03-02 |
20170063884 | CORRELATING EVENT LOGS TO IDENTIFY A POTENTIAL SECURITY BREACH | 2017-03-02 |
20170063885 | Predicting Account Takeover Tsunami Using Dump Quakes | 2017-03-02 |
20170063886 | MODULAR MODEL WORKFLOW IN A DISTRIBUTED COMPUTATION SYSTEM | 2017-03-02 |
20170063887 | PROBABILISTIC SUFFIX TREES FOR NETWORK SECURITY ANALYSIS | 2017-03-02 |
20170063888 | MALWARE COMMUNICATIONS DETECTION | 2017-03-02 |
20170063889 | MACHINE-GENERATED TRAFFIC DETECTION (BEACONING) | 2017-03-02 |
20170063890 | RARITY ANALYSIS IN NETWORK SECURITY ANOMALY/THREAT DETECTION | 2017-03-02 |
20170063891 | Dual-Path Distributed Architecture for Network Security Analysis | 2017-03-02 |
20170063892 | ROBUST REPRESENTATION OF NETWORK TRAFFIC FOR DETECTING MALWARE VARIATIONS | 2017-03-02 |
20170063893 | LEARNING DETECTOR OF MALICIOUS NETWORK TRAFFIC FROM WEAK LABELS | 2017-03-02 |
20170063894 | Network Security Threat Detection by User/User-Entity Behavioral Analysis | 2017-03-02 |
20170063895 | SECURITY MANAGEMENT IN A NETWORKED COMPUTING ENVIRONMENT | 2017-03-02 |
20170063896 | Network Security System | 2017-03-02 |
20170063897 | Interface Providing An Interactive Timeline For Evaluating Instances Of Potential Network Compromise | 2017-03-02 |
20170063898 | Method And System For Generating A Kill Chain For Monitoring Computer Network Security | 2017-03-02 |
20170063899 | Interactive Threat Geo-Map for Monitoring Computer Network Security | 2017-03-02 |
20170063900 | Method And System For Monitoring Entity Activity On An Organization's Computer Network | 2017-03-02 |
20170063901 | Method And System For Reviewing Identified Threats For Performing Computer Security Monitoring | 2017-03-02 |
20170063902 | Interface Having Selectable, Interactive Views For Evaluating Potential Network Compromise | 2017-03-02 |
20170063903 | EVENT VIEWS IN DATA INTAKE STAGE OF MACHINE DATA PROCESSING PLATFORM | 2017-03-02 |
20170063904 | IDENTITY RESOLUTION IN DATA INTAKE STAGE OF MACHINE DATA PROCESSING PLATFORM | 2017-03-02 |
20170063905 | DETECTION OF ANOMALIES, THREAT INDICATORS, AND THREATS TO NETWORK SECURITY | 2017-03-02 |
20170063906 | COMPLEX EVENT PROCESSING OF COMPUTER NETWORK DATA | 2017-03-02 |
20170063907 | Multi-Stage Network Security Threat Detection | 2017-03-02 |
20170063908 | Sharing Model State Between Real-Time and Batch Paths in Network Security Anomaly Detection | 2017-03-02 |
20170063909 | Detection of Clustering in Graphs in Network Security Analysis | 2017-03-02 |
20170063910 | ENTERPRISE SECURITY GRAPH | 2017-03-02 |
20170063911 | Lateral Movement Detection for Network Security Analysis | 2017-03-02 |
20170063912 | EVENT MINI-GRAPHS IN DATA INTAKE STAGE OF MACHINE DATA PROCESSING PLATFORM | 2017-03-02 |
20170063913 | METHOD, APPARATUS AND SYSTEM FOR DETECTING FRAUDULANT SOFTWARE PROMOTION | 2017-03-02 |
20170063914 | VERIFYING TEMPLATES FOR DYNAMICALLY GENERATED WEB PAGES | 2017-03-02 |
20170063915 | LEVERAGING PERSISTENT IDENTITIES IN WEBSITE TESTING | 2017-03-02 |
20170063916 | SYSTEM AND METHOD FOR AUTOMATICALLY IDENTIFYING BROKEN AUTHENTICATION AND OTHER RELATED VULNERABILITIES IN WEB SERVICES | 2017-03-02 |
20170063917 | RISK-CHAIN GENERATION OF CYBER-THREATS | 2017-03-02 |
20170063918 | SYSTEM AND METHOD OF ARCHITECTURAL SECURITY AND RESILIENCE FOR MICROGRID SYSTEMS | 2017-03-02 |
20170063919 | SECURITY AWARE EMAIL SERVER | 2017-03-02 |
20170063920 | DYNAMIC ADAPTIVE DEFENSE FOR CYBER-SECURITY THREATS | 2017-03-02 |
20170063921 | BOTNET BEACONING DETECTION AND MITIGATION | 2017-03-02 |
20170063922 | IDENTIFYING MALICIOUS DEVICES WITHIN A COMPUTER NETWORK | 2017-03-02 |
20170063923 | Polymorphic Obfuscation of Executable Code | 2017-03-02 |
20170063924 | FACILITATING REMOTE ACCESS OF DEVICES IN A SECURE ENVIRONMENT | 2017-03-02 |
20170063925 | User-Configured Restrictions for Accessing Online Accounts Via Different Access Methods | 2017-03-02 |
20170063926 | Incident Response Bus for Data Security Incidents | 2017-03-02 |
20170063927 | User-Aware Datacenter Security Policies | 2017-03-02 |
20170063928 | Defining Network Rules Based on Remote Device Management Attributes | 2017-03-02 |
20170063929 | METHODS, APPARATUS AND SYSTEMS FOR PROCESSING SERVICE REQUESTS | 2017-03-02 |
20170063930 | GENERATION OF CYBER-ATTACKS INVESTIGATION POLICIES | 2017-03-02 |
20170063931 | Service Layer Dynamic Authorization | 2017-03-02 |
20170063932 | SYSTEMS AND METHODS FOR MONITORING COMPUTER AUTHENTICATION PROCEDURES | 2017-03-02 |
20170063933 | CONTEXT AWARE MICROSEGMENTATION | 2017-03-02 |
20170063934 | COMMUNICATION MANAGEMENT AND POLICY-BASED DATA ROUTING | 2017-03-02 |