25th week of 2016 patent applcation highlights part 81 |
Patent application number | Title | Published |
20160182473 | MULTI-FACETED COMPUTE INSTANCE IDENTITY | 2016-06-23 |
20160182474 | SECONDARY COMMUNICATIONS CHANNEL FACILITATING DOCUMENT SECURITY | 2016-06-23 |
20160182475 | LOW-COST AUTHENTICATED SIGNING DELEGATION IN CONTENT CENTRIC NETWORKING | 2016-06-23 |
20160182476 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM | 2016-06-23 |
20160182477 | DEVICES AND METHOD FOR MTC GROUP KEY MANAGEMENT | 2016-06-23 |
20160182478 | COMMUNICATION DEVICE AND SYSTEM, DATA PROCESSING METHOD AND METHOD FOR SECURE DATA EXCHANGE | 2016-06-23 |
20160182479 | NO PASSWORD USER ACCOUNT ACCESS | 2016-06-23 |
20160182480 | SYSTEMS AND METHODS OF GEO-LOCATION BASED COMMUNITY OF INTEREST | 2016-06-23 |
20160182481 | METHOD FOR AUTHENTICATING A DEVICE | 2016-06-23 |
20160182482 | APPARATUS AND METHOD FOR CONTROLLING DISPLAY IN ELECTRONIC DEVICE HAVING PROCESSORS | 2016-06-23 |
20160182483 | INFORMATION RECORDING APPARATUS | 2016-06-23 |
20160182484 | AUTHENTICATION-FREE CONFIGURATION FOR SERVICE CONTROLLERS | 2016-06-23 |
20160182485 | METHOD AND DEVICE FOR CONTROLLING WEB PAGE TO INVOKE SYSTEM FUNCTION, AND STORAGE MEDIUM THEREOF | 2016-06-23 |
20160182486 | SPACE-TIME SEPARATED AND JOINTLY EVOLVING RELATIONSHIP-BASED NETWORK ACCESS AND DATA PROTECTION SYSTEM | 2016-06-23 |
20160182487 | PERMISSION ARCHITECTURE FOR REMOTE MANAGEMENT AND CAPACITY INSTANCES | 2016-06-23 |
20160182488 | Pass-Thru for Client Authentication | 2016-06-23 |
20160182489 | METHOD AND APPARATUS FOR ENABLING A SINGLE SIGN-ON ENABLED APPLICATION TO ENFORCE AN APPLICATION LOCK | 2016-06-23 |
20160182490 | SENDING AUTHENTICATION CODES TO MULTIPLE RECIPIENTS | 2016-06-23 |
20160182491 | METHODS, SYSTEMS AND APPARATUS TO MANAGE AN AUTHENTICATION SEQUENCE | 2016-06-23 |
20160182492 | DETERMINING THE REPUTATION OF A DIGITAL CERTIFICATE | 2016-06-23 |
20160182493 | Controlled Token Distribution to Protect Against Malicious Data and Resource Access | 2016-06-23 |
20160182494 | DISTRIBUTED DEVICE MANAGEMENT AND DIRECTORY RESOLUTION | 2016-06-23 |
20160182495 | AUTHENTICATOR DEVICE FACILITATING FILE SECURITY | 2016-06-23 |
20160182496 | EXTENSION OF TRUST IN A BODY AREA NETWORK | 2016-06-23 |
20160182497 | TRUSTED EPHEMERAL IDENTIFIER TO CREATE A GROUP FOR A SERIVCE AND/OR TO PROVIDE THE SERVICE | 2016-06-23 |
20160182498 | SEPARATED USE MOBILE DEVICES | 2016-06-23 |
20160182499 | TRUST ESTABLISHMENT BETWEEN A TRUSTED EXECUTION ENVIRONMENT AND PERIPHERAL DEVICES | 2016-06-23 |
20160182500 | SYSTEMS AND METHODS FOR ANONYMOUS AUTHENTICATION USING MULTIPLE DEVICES | 2016-06-23 |
20160182501 | MOBILE USER INTERFACE SYSTEM AND METHODS THEREFOR | 2016-06-23 |
20160182502 | USER PROFILE SELECTION USING CONTEXTUAL AUTHENTICATION | 2016-06-23 |
20160182503 | CONTINUOUS AUTHENTICATION OF MOBILE DEVICE USERS | 2016-06-23 |
20160182504 | METHOD AND APPARATUS FOR PROCESSING A RTCWEB AUTHENTICATION | 2016-06-23 |
20160182505 | SYSTEM AND METHOD FOR DETERMINING LIVENESS | 2016-06-23 |
20160182506 | SYSTEM AND METHOD FOR GENERATING A BIOMETRIC IDENTIFIER | 2016-06-23 |
20160182507 | Wireless Pairing and Communication Between Devices Using Biometric Data | 2016-06-23 |
20160182508 | IDENTITY ATTESTATION OF A MINOR VIA A PARENT | 2016-06-23 |
20160182509 | TECHNIQUES FOR LOAD BALANCING IN A PACKET DISTRIBUTION SYSTEM | 2016-06-23 |
20160182510 | APPARATUS MANAGEMENT SYSTEM, APPARATUS MANAGEMENT METHOD, AND PROGRAM | 2016-06-23 |
20160182511 | AUTOMATED SECURITY TOKEN ADMINISTRATIVE SERVICES | 2016-06-23 |
20160182512 | APPARATUS AND METHOD FOR SECURE PROVISIONING OF A COMMUNICATION DEVICE | 2016-06-23 |
20160182513 | Automatic Configuration of Household Playback Devices | 2016-06-23 |
20160182514 | WLAN AUTHENTICATION ACCESS CONTROL | 2016-06-23 |
20160182515 | MULTI-SOURCE CONTENT GENERATION | 2016-06-23 |
20160182516 | PRESENTING AUTHORIZED DATA TO A TARGET SYSTEM | 2016-06-23 |
20160182517 | WEB FORM PROTECTION | 2016-06-23 |
20160182518 | Self-Organizing Trusted Networks | 2016-06-23 |
20160182519 | METHOD AND SYSTEM RELATED TO AUTHENTICATION OF USERS FOR ACCESSING DATA NETWORKS | 2016-06-23 |
20160182520 | METHOD, APPARATUS AND SYSTEM FOR CLIENT ACCESSING AUTHENTICATED WEB ADDRESS | 2016-06-23 |
20160182521 | System and Method for Associating a Universal User Identification and a Domain Specific User Identification | 2016-06-23 |
20160182522 | CLOUD-BASED DATA PROVIDING METHOD AND SYSTEM | 2016-06-23 |
20160182523 | UNIFIED IDENTITY VERIFICATION | 2016-06-23 |
20160182524 | SYSTEM PLATFORM FOR CONTEXT-BASED CONFIGURATION OF COMMUNICATION CHANNELS | 2016-06-23 |
20160182525 | SECURITY AND PERMISSION ARCHITECTURE | 2016-06-23 |
20160182526 | Social network privacy management systems and methods | 2016-06-23 |
20160182527 | METHOD AND SYSTEM FOR PROVIDING PERMISSIONS MANAGEMENT | 2016-06-23 |
20160182528 | SYSTEMS AND METHODS OF GEO-LOCATION BASED COMMUNITY OF INTEREST | 2016-06-23 |
20160182529 | SYSTEMS AND METHODS FOR SECURE LOCATION-BASED DOCUMENT VIEWING | 2016-06-23 |
20160182530 | Application with Multiple Operation Modes | 2016-06-23 |
20160182531 | INPUT VERIFICATION | 2016-06-23 |
20160182532 | SYSTEMS AND METHODS FOR STERILIZING EMAIL ATTACHMENTS AND OTHER COMMUNICATIONS DELIVERED BY EMAIL | 2016-06-23 |
20160182533 | COMPUTER DEFENSES AND COUNTERATTACKS | 2016-06-23 |
20160182534 | RELIABLE SELECTION OF SECURITY COUNTERMEASURES | 2016-06-23 |
20160182535 | Equipment And Network Health Monitoring Using Security Systems | 2016-06-23 |
20160182536 | ADAPTING USER TERMINAL APPLICATION OPERATION RESPONSIVE TO MEASURED USER BEHAVIOR | 2016-06-23 |
20160182537 | HTML SECURITY GATEWAY | 2016-06-23 |
20160182538 | DETERMINING A REPUTATION THROUGH NETWORK CHARACTERISTICS | 2016-06-23 |
20160182539 | DETECTION OF A MALICIOUS PERIPHERAL | 2016-06-23 |
20160182540 | METHODS AND APPARATUS FOR APPLICATION ISOLATION | 2016-06-23 |
20160182541 | METHOD FOR DETECTING INTRUSION IN NETWORK | 2016-06-23 |
20160182542 | DENIAL OF SERVICE AND OTHER RESOURCE EXHAUSTION DEFENSE AND MITIGATION USING TRANSITION TRACKING | 2016-06-23 |
20160182543 | SOFTWARE TAMPERING DETECTION AND REPORTING PROCESS | 2016-06-23 |
20160182544 | METHOD OF PROTECTING A NETWORK COMPUTER SYSTEM FROM THE MALICIOUS ACTS OF HACKERS AND ITS OWN SYSTEM ADMINISTRATORS | 2016-06-23 |
20160182545 | METHODS, SYSTEMS, AND MEDIA FOR MASQUERADE ATTACK DETECTION BY MONITORING COMPUTER USER BEHAVIOR | 2016-06-23 |
20160182546 | Identifying Possible Security Threats Using Event Group Summaries | 2016-06-23 |
20160182547 | REAL-TIME NETWORK ATTACK DETECTION AND MITIGATION INFRASTRUCTURE | 2016-06-23 |
20160182548 | Apparatus and Method for Detecting Location of Wireless Device to Prevent Relay Attack | 2016-06-23 |
20160182549 | PROCESS SECURITY VALIDATION | 2016-06-23 |
20160182550 | DETERMINING A REPUTATION FOR A PROCESS | 2016-06-23 |
20160182551 | Automated Security Analytics Platform with Multi-Level Representation Conversion for Space Efficiency and Incremental Persistence | 2016-06-23 |
20160182552 | Modeling and Outlier Detection in Threat Management System Data | 2016-06-23 |
20160182553 | Auto-tuning program analysis tools based on user feedback | 2016-06-23 |
20160182554 | METHODS, SYSTEMS, AND DEVICES FOR DETECTING AND ISOLATING DEVICE POSING SECURITY THREAT | 2016-06-23 |
20160182555 | MULTI-DIMENSIONAL GEOMETRY FOR ENHANCEMENT OF SIMULATIONS OF NETWORK DEVICES | 2016-06-23 |
20160182556 | SECURITY RISK SCORE DETERMINATION FOR FRAUD DETECTION AND REPUTATION IMPROVEMENT | 2016-06-23 |
20160182557 | MULTI-DIMENSIONAL GEOMETRY FOR ENHANCEMENT OF SIMULATIONS OF NETWORK DEVICES | 2016-06-23 |
20160182558 | Auto-tuning program analysis tools using machine learning | 2016-06-23 |
20160182559 | POLICY-BASED NETWORK SECURITY | 2016-06-23 |
20160182560 | SYSTEMS AND METHODS FOR PROTECTING AN ONLINE SERVICE AGAINST A NETWORK-BASED ATTACK | 2016-06-23 |
20160182561 | ROUTE MONITORING SYSTEM FOR A COMMUNICATION NETWORK | 2016-06-23 |
20160182562 | TIME BASED AUTHENTICATION CODES | 2016-06-23 |
20160182563 | EMBEDDED SCRIPT SECURITY USING SCRIPT SIGNATURE VALIDATION | 2016-06-23 |
20160182564 | DOMAIN NAME HIJACK PROTECTION | 2016-06-23 |
20160182565 | LOCATION-BASED NETWORK SECURITY | 2016-06-23 |
20160182566 | INCIDENT RESPONSE TOOL USING A DATA EXCHANGE LAYER SYSTEM | 2016-06-23 |
20160182567 | Techniques to Deliver Security and Network Policies to a Virtual Network Function | 2016-06-23 |
20160182568 | METHOD AND SYSTEM FOR PORTING GATEWAY FUNCTIONALITY ASSOCIATED WITH A USER FROM A FIRST GATEWAY TO ONE OR MORE OTHER GATEWAYS | 2016-06-23 |
20160182569 | Real-Time Module Protection | 2016-06-23 |
20160182570 | SYSTEM AND METHOD FOR IMPLEMENTING DATA MIGRATION WHILE PRESERVING SECURITY POLICIES OF A SOURCE FILER | 2016-06-23 |
20160182571 | Lawful Interception and Security for Proximity Service | 2016-06-23 |
20160182572 | METHOD, DEVICE, AND SYSTEM FOR IMPLEMENTING PROMPTING AND COLLECTING USER INFORMATION | 2016-06-23 |