Patent application number | Description | Published |
20140006374 | METHOD AND APPARATUS FOR DERIVING AND USING TRUSTFUL APPLICATION METADATA | 01-02-2014 |
20140006375 | METHOD AND APPARATUS FOR ROBUST MOBILE APPLICATION FINGERPRINTING | 01-02-2014 |
20140006418 | METHOD AND APPARATUS FOR RANKING APPS IN THE WIDE-OPEN INTERNET | 01-02-2014 |
20140006440 | METHOD AND APPARATUS FOR SEARCHING FOR SOFTWARE APPLICATIONS | 01-02-2014 |
20140259112 | Verificaiton Service - Concepts and technologies are disclosed herein for verifying sender information. According to various embodiments of the concepts and technologies disclosed herein, a verification service can determine, receive a request, or receive a call to verify sender information associated with data. The server computer generates and delivers a verification message to a sender device in response to determining that sender information verification is to be provided. The server computer receives a response indicating if the data was sent by the sender device. If the response indicates that the sender device did not send the data, the server computer can block delivery of the data, generate alarms or alerts, take other actions, and/or take no action. If the response indicates that the sender device sent the data, the server computer can deliver the data, provide a verification response to the recipient device, take no action, and/or take other actions. | 09-11-2014 |
20150150075 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR VERIFYING USER DATA ACCESS POLICIES WHEN SERVER AND/OR USER ARE NOT TRUSTED - To verify compliance with a data access policy, a query result including data specified by a requesting entity and a representation of a data access policy is received from a database. Based on the representation of the data access policy included in the query result, it is verified whether the requesting entity is permitted to access the data included in the query result. Transmission of the data included in the query result to the requesting entity is controlled responsive to the verification. Related methods, systems, and computer program products are also discussed. | 05-28-2015 |
20150150129 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR PROTECTING A COMMUNICATION NETWORK AGAINST INTERNET ENABLED CYBER ATTACKS THROUGH USE OF SCREEN REPLICATION FROM CONTROLLED INTERNET ACCESS POINTS - A method includes receiving from a client device at a client interface application a request to access an application, determining whether the application is external to a communication network, redirecting the request to an external communication server when the application is external to the communication network, sending the request from the external communication server to the application that is external to the communication network, receiving information from the application that is external to the communication network at the external communication server responsive to sending the request, and replicating a screen of the external communication server containing the information received from the application for display at the client interface application. | 05-28-2015 |
20150156203 | Secure Browsing Via A Transparent Network Proxy - A system for providing secure browsing via a transparent network proxy is disclosed. The system may receive, from a client, a request to access a resource. The request may include an identifier that may be utilized to locate the resource. Once the request is received, the system may determine if the resource is not trusted, such as if the identifier is determined to be unknown or suspicious. If the resource is determined to not be trusted by the system, the system may forward the request to a virtual machine manager that may select a browser virtual machine from a pool of browser virtual machines. After the browser virtual machine is selected, the browser virtual machine may stream a rendering of the resource to the client based on the request. The rendering of the resource may be provided in lieu of the actual resource. | 06-04-2015 |