18th week of 2018 patent applcation highlights part 80 |
Patent application number | Title | Published |
20180124011 | Generating System Port Identity | 2018-05-03 |
20180124012 | DOMAIN NAME SYSTEM (DNS) RESOLUTION PROCESSING METHOD AND DEVICE | 2018-05-03 |
20180124013 | ENFORCING PRIVACY ADDRESSING | 2018-05-03 |
20180124014 | SECURITY INFORMATION AND EVENT MANAGEMENT | 2018-05-03 |
20180124015 | Transparent Traffic Control Device and Method | 2018-05-03 |
20180124016 | WALLED GARDEN SYSTEM WITH CLEARED IPS LIST AUTOMATICALLY GENERATED FROM DNS QUERIES | 2018-05-03 |
20180124017 | FILTERING HIDDEN DATA EMBEDDED IN MEDIA FILES | 2018-05-03 |
20180124018 | COORDINATED APPLICATION FIREWALL | 2018-05-03 |
20180124019 | METHOD AND SYSTEM FOR ANALYZING A DATA FLOW | 2018-05-03 |
20180124020 | FEATURE-BASED CLASSIFICATION OF INDIVIDUAL DOMAIN QUERIES | 2018-05-03 |
20180124021 | CLOUD BASED LOGGING SERVICE | 2018-05-03 |
20180124022 | Anonymous Sharing of Microblog Publication | 2018-05-03 |
20180124023 | METHOD, SYSTEM AND APPARATUS FOR STORING WEBSITE PRIVATE KEY PLAINTEXT | 2018-05-03 |
20180124024 | SECURE MOBILE AFFIRMATIVE CONSENT MANAGEMENT | 2018-05-03 |
20180124025 | PROVIDING VISIBILITY INTO ENCRYPTED TRAFFIC WITHOUT REQUIRING ACCESS TO THE PRIVATE KEY | 2018-05-03 |
20180124026 | SEARCHABLE ENCRYPTION ENABLING ENCRYPTED SEARCH BASED ON DOCUMENT TYPE | 2018-05-03 |
20180124027 | FACILITATING ENCRYPTED PERSISTENT STORAGE IN BROWSERS | 2018-05-03 |
20180124028 | APPARATUS AUTHENTICATION SYSTEM, MANAGEMENT DEVICE, AND APPARATUS AUTHENTICATION METHOD | 2018-05-03 |
20180124029 | Device and Method for Providing User-Configured Trust Domains | 2018-05-03 |
20180124030 | Need Based Controller Area Network Bus Authentication | 2018-05-03 |
20180124031 | FLEXIBLE FRAMEWORK FOR SECURE SEARCH | 2018-05-03 |
20180124032 | METHOD FOR AUTHENTICATING INTERNET USERS | 2018-05-03 |
20180124033 | AUTHENTICATING IDENTITY FOR PASSWORD CHANGES | 2018-05-03 |
20180124034 | IMAGE BASED METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT TO AUTHENTICATE USER IDENTITY | 2018-05-03 |
20180124035 | SECURE PASSCODE PROCESSING DEVICE | 2018-05-03 |
20180124036 | FACILITATING USERS TO OBFUSCATE USER CREDENTIALS IN CREDENTIAL RESPONSES FOR USER AUTHENTICATION | 2018-05-03 |
20180124037 | IDENTIFICATION OF A RELATED COMPUTING DEVICE FOR AUTOMATIC ACCOUNT LOGIN | 2018-05-03 |
20180124038 | SYSTEM AND METHOD TO SHARE A RESOURCE OR A CAPABILITY OF A DEVICE | 2018-05-03 |
20180124039 | DEVICE FINGERPRINT BASED AUTHENTICATION | 2018-05-03 |
20180124040 | METHODS AND SYSTEMS FOR REMOTE ACCESS TO A TRANSPORATION VEHICLE SYSTEM | 2018-05-03 |
20180124041 | DYNAMIC CERTIFICATE GENERATION ON A CERTIFICATE AUTHORITY CLOUD | 2018-05-03 |
20180124042 | ACCELERATING OCSP RESPONSES VIA CONTENT DELIVERY NETWORK COLLABORATION | 2018-05-03 |
20180124043 | SYSTEM AND METHOD FOR AUTHENTICATING THE LEGITIMACY OF A REQUEST FOR A RESOURCE BY A USER | 2018-05-03 |
20180124044 | DEVICE REGISTRATION, AUTHENTICATION, AND AUTHORIZATION SYSTEM AND METHOD | 2018-05-03 |
20180124045 | CAPTCHA SYSTEMS AND METHODS | 2018-05-03 |
20180124046 | METHODS PROVIDING AUTHENTICATION DURING A SESSION USING IMAGE DATA AND RELATED DEVICES AND COMPUTER PROGRAM PRODUCTS | 2018-05-03 |
20180124047 | High Assurance Remote Identity Proofing | 2018-05-03 |
20180124048 | DATA TRANSMISSION METHOD, AUTHENTICATION METHOD, AND SERVER | 2018-05-03 |
20180124049 | METHOD AND DEVICE FOR AUTHENTICATING BASED ON AUTHENTICATING DEVICE | 2018-05-03 |
20180124050 | COMMUNICATION SYSTEM AND COMPUTER READABLE STORAGE MEDIUM | 2018-05-03 |
20180124051 | Response Method and System in Virtual Network Computing Authentication, and Proxy Server | 2018-05-03 |
20180124052 | FACILITATING SECURE NETWORK TRAFFIC BY AN APPLICATION DELIVERY CONTROLLER | 2018-05-03 |
20180124053 | AUTHENTICATED ACCESS TO CACHEABLE SENSOR INFORMATION IN INFORMATION CENTRIC DATA NETWORK | 2018-05-03 |
20180124054 | PARAMETER BASED DATA ACCESS ON A SECURITY INFORMATION SHARING PLATFORM | 2018-05-03 |
20180124055 | DECOUPLING CONTAINER IMAGE LAYERS TO PRESERVE PRIVACY | 2018-05-03 |
20180124056 | IMMEDIATE POLlCY EFFECTIVENESS IN EVENTUALLY CONSISTENT SYSTEMS | 2018-05-03 |
20180124057 | DIFFERENTIATED CONTAINERIZATION AND EXECUTION OF WEB CONTENT BASED ON TRUST LEVEL AND OTHER ATTRIBUTES | 2018-05-03 |
20180124058 | SECURITY BYPASS ENVIRONMENT FOR CIRCUMVENTING A SECURITY APPLICATION IN A COMPUTING ENVIRONMENT | 2018-05-03 |
20180124059 | Device authentication of aircrew mobile devices on board aircraft | 2018-05-03 |
20180124060 | METHOD TO NOTIFY ENTITIES TO PRESERVE PRIVACY AND TRACK COMPLIANCE | 2018-05-03 |
20180124061 | PERFORMING SERVICES ON A HOST | 2018-05-03 |
20180124062 | System And Method For Controlling Access Of Users To Sensitive Information Content In An Organization | 2018-05-03 |
20180124063 | COMPOSITE SECURITY IDENTIFIER | 2018-05-03 |
20180124064 | SEPARATED APPLICATION SECURITY MANAGEMENT | 2018-05-03 |
20180124065 | Detecting Impossible Travel in the On-Premise Settings | 2018-05-03 |
20180124066 | GEOFENCING OF DATA IN A CLOUD-BASED ENVIRONMENT | 2018-05-03 |
20180124067 | DATA ACCESS MANAGEMENT | 2018-05-03 |
20180124068 | PROTOCOLS FOR ACCESSING HOSTS | 2018-05-03 |
20180124069 | DYNAMIC SELECTION AND GENERATION OF A VIRTUAL CLONE FOR DETONATION OF SUSPICIOUS CONTENT WITHIN A HONEY NETWORK | 2018-05-03 |
20180124070 | CLOUD-BASED MALWARE DETECTION | 2018-05-03 |
20180124071 | COLLABORATIVE CONTENT EVALUATION | 2018-05-03 |
20180124072 | SYSTEMS AND METHODS FOR COMPUTER ENVIRONMENT SITUATIONAL AWARENESS | 2018-05-03 |
20180124073 | NETWORK ATTACK DETECTION | 2018-05-03 |
20180124074 | PROBE COUNTER STATE FOR NEIGHBOR DISCOVERY | 2018-05-03 |
20180124075 | AVIONIC EQUIPMENT WITH SINGLE USE SIGNING OF A TRANSMITTED MESSAGE AND ASSOCIATED AVIONIC SYSTEM, TRANSMISSION METHOD AND COMPUTER PROGRAM | 2018-05-03 |
20180124076 | METHOD FOR TRANSMITTING DATA | 2018-05-03 |
20180124077 | INCIDENT TRIAGE SCORING ENGINE | 2018-05-03 |
20180124078 | Dynamic Reputation Indicator For Optimizing Computer Security Operations | 2018-05-03 |
20180124079 | SYSTEMS AND METHODS FOR PROCESSING HYPERVISOR-GENERATED EVENT DATA | 2018-05-03 |
20180124080 | Methods and Systems for Anomaly Detection Using Functional Specifications Derived from Server Input/Output (I/O) Behavior | 2018-05-03 |
20180124081 | SYSTEM AND METHODS FOR DETECTING MALICIOUS EMAIL TRANSMISSION | 2018-05-03 |
20180124082 | CLASSIFYING LOGINS, FOR EXAMPLE AS BENIGN OR MALICIOUS LOGINS, IN PRIVATE NETWORKS SUCH AS ENTERPRISE NETWORKS FOR EXAMPLE | 2018-05-03 |
20180124083 | LOG ANALYZING SYSTEM AND METHOD | 2018-05-03 |
20180124084 | NETWORK MONITORING DEVICE AND METHOD | 2018-05-03 |
20180124085 | Extracting Encryption Metadata and Terminating Malicious Connections Using Machine Learning | 2018-05-03 |
20180124086 | COLD START MECHANISM TO PREVENT COMPROMISE OF AUTOMATIC ANOMALY DETECTION SYSTEMS | 2018-05-03 |
20180124087 | METHOD, APPARATUS, AND SYSTEM FOR DETECTING TERMINAL DEVICE ANOMALY | 2018-05-03 |
20180124088 | SECURE DIGITAL TRAFFIC ANALYSIS | 2018-05-03 |
20180124089 | SECURE DIGITAL TRAFFIC ANALYSIS | 2018-05-03 |
20180124090 | NETWORK-BASED PERIMETER DEFENSE SYSTEM AND METHOD | 2018-05-03 |
20180124091 | Method for the Continuous Calculation of a Cyber Security Risk Index | 2018-05-03 |
20180124092 | IDENTIFYING A VULNERABILITY OF AN ASSET OF A NETWORK INFRASTRUCTURE TO MITIGATE | 2018-05-03 |
20180124093 | DETECTION OF VULNERABLE WIRELESS NETWORKS | 2018-05-03 |
20180124094 | METHODS AND SYSTEMS FOR RANKING, FILTERING AND PATCHING DETECTED VULNERABILITIES IN A NETWORKED SYSTEM | 2018-05-03 |
20180124095 | SYSTEMS AND METHODS FOR MULTI-TIER CACHE VISUAL SYSTEM AND VISUAL MODES | 2018-05-03 |
20180124096 | DETECTION OF VULNERABLE DEVICES IN WIRELESS NETWORKS | 2018-05-03 |
20180124097 | NETWORK DEVICE VULNERABILITY PREDICTION | 2018-05-03 |
20180124098 | Incident Triage Scoring Engine | 2018-05-03 |
20180124099 | SYSTEM AND METHOD FOR SCALED MANAGEMENT OF THREAT DATA | 2018-05-03 |
20180124100 | MANAGING WORKFLOWS UPON A SECURITY INCIDENT | 2018-05-03 |
20180124101 | Combination of Remote Triggered Source and Destination Blackhole Filtering | 2018-05-03 |
20180124102 | METHOD AND SYSTEM FOR SECURE DELIVERY OF INFORMATION TO COMPUTING ENVIRONMENTS | 2018-05-03 |
20180124103 | CLOUD CHECKING AND KILLING METHOD, DEVICE AND SYSTEM FOR COMBATING ANTI-ANTIVIRUS TEST | 2018-05-03 |
20180124104 | HEALTH MONITOR BASED DISTRIBUTED DENIAL OF SERVICE ATTACK MITIGATION | 2018-05-03 |
20180124105 | DETECTION OF FRAUDULENT ACCOUNT USAGE IN DISTRIBUTED COMPUTING SYSTEMS | 2018-05-03 |
20180124106 | DETECTING "MAN-IN-THE-MIDDLE' ATTACKS | 2018-05-03 |
20180124107 | IDENTIFYING AN IMPOSTER ACCOUNT IN A SOCIAL NETWORK | 2018-05-03 |
20180124108 | SYSTEMS AND METHODS FOR AN ARTIFICIAL INTELLIGENCE DRIVEN AGENT | 2018-05-03 |
20180124109 | TECHNIQUES FOR CLASSIFYING A WEB PAGE BASED UPON FUNCTIONS USED TO RENDER THE WEB PAGE | 2018-05-03 |
20180124110 | TECHNIQUES FOR DETECTING MALICIOUS BEHAVIOR USING AN ACCOMPLICE MODEL | 2018-05-03 |