AUTHENTICATION USING CREDENTIALS SUBMITTED VIA A USER PREMISES DEVICE

    公开(公告)号:US20180241750A1

    公开(公告)日:2018-08-23

    申请号:US15436731

    申请日:2017-02-17

    Abstract: An authentication system can be operable to receive from a user premises device credentials associated with a user identity, wherein the user premises device can also be operable to monitor and control a premise of the user identity. The authentication system can process the credentials and transmit an authentication verification to an on-line system to enable access to the on-line system by a user equipment of the user identity. The authentication system can be used as a factor (or additional factor) of authentication, for example, to gain sooner access to an on-line system that has locked out a user identity in response to a personal denial of service (PDoS) attack.

    Methods, Systems, Devices, and Products for Peer Recommendations
    82.
    发明申请
    Methods, Systems, Devices, and Products for Peer Recommendations 审中-公开
    方法,系统,设备和同行推荐产品

    公开(公告)号:US20170034262A1

    公开(公告)日:2017-02-02

    申请号:US15294733

    申请日:2016-10-16

    Abstract: A recommendation for a user is generated in response to a user request. The recommendation can pertain to whether a user should download and install a mobile device application and is based on a number of responses received from other mobile devices within a specified distance from the mobile device at which the recommendation was requested. Recommendations can also be requested and generated by various other devices in machine-to-machine networks. Recommendations can pertain to policy enforcement and device component performance or operation.

    Abstract translation: 响应于用户请求生成针对用户的推荐。 该建议可以涉及用户是否应该下载和安装移动设备应用,并且基于从与请求推荐的移动设备在指定距离内的其他移动设备接收的多个响应。 建议也可以由机器到机器网络中的各种其他设备请求和生成。 建议可以涉及到策略执行和设备组件的性能或操作。

    Devices, systems, and methods for detecting proximity-based mobile malware propagation
    83.
    发明授权
    Devices, systems, and methods for detecting proximity-based mobile malware propagation 有权
    用于检测基于邻近度的移动恶意软件传播的设备,系统和方法

    公开(公告)号:US09553890B2

    公开(公告)日:2017-01-24

    申请号:US14886421

    申请日:2015-10-19

    Abstract: Devices, systems, and methods are disclosed. An agent resides in a mobile communication device. The agent detects Proximity-based Mobile Malware Propagation. The agent injects one or more trigger network connections in the candidate connection list. These connections appear as legitimate networks and devices, but instead trigger connection to an agent server on a service provider's network. By attempting to connect through the trigger network connection, the malware reveals itself. The system helps collect the malware signature within a short period of time after the malware outbreak in local areas, though such attacks typically bypass network based security inspection in the network.

    Abstract translation: 公开了设备,系统和方法。 代理驻留在移动通信设备中。 代理检测基于邻近的移动恶意软件传播。 代理在候选连接列表中注入一个或多个触发网络连接。 这些连接显示为合法的网络和设备,而是触发与服务提供商网络上的代理服务器的连接。 通过尝试通过触发网络连接进行连接,恶意软件显示本身。 该系统在局部恶意软件爆发后,可以在短时间内收集恶意软件签名,但这种攻击通常会绕过网络中的网络安全检查。

    Local peer-to-peer network for providing recommendations and enforcing security policies
    84.
    发明授权
    Local peer-to-peer network for providing recommendations and enforcing security policies 有权
    本地对等网络,用于提供建议和实施安全策略

    公开(公告)号:US09485615B2

    公开(公告)日:2016-11-01

    申请号:US14497477

    申请日:2014-09-26

    Abstract: A recommendation for a user is generated in response to a user request. The recommendation can pertain to whether a user should download and install a mobile device application and is based on a number of responses received from other mobile devices within a specified distance from the mobile device at which the recommendation was requested. Recommendations can also be requested and generated by various other devices in machine-to-machine networks. Recommendations can pertain to policy enforcement and device component performance or operation.

    Abstract translation: 响应于用户请求生成针对用户的推荐。 该建议可以涉及用户是否应该下载和安装移动设备应用,并且基于从与请求推荐的移动设备在指定距离内的其他移动设备接收的多个响应。 建议也可以由机器到机器网络中的各种其他设备请求和生成。 建议可以涉及到策略执行和设备组件的性能或操作。

    Local Peer-to-Peer Network for Providing Recommendations and Enforcing Security Policies
    85.
    发明申请
    Local Peer-to-Peer Network for Providing Recommendations and Enforcing Security Policies 有权
    本地对等网络提供建议和执行安全策略

    公开(公告)号:US20160094937A1

    公开(公告)日:2016-03-31

    申请号:US14497477

    申请日:2014-09-26

    Abstract: A recommendation for a user is generated in response to a user request. The recommendation can pertain to whether a user should download and install a mobile device application and is based on a number of responses received from other mobile devices within a specified distance from the mobile device at which the recommendation was requested. Recommendations can also be requested and generated by various other devices in machine-to-machine networks. Recommendations can pertain to policy enforcement and device component performance or operation.

    Abstract translation: 响应于用户请求生成针对用户的推荐。 该建议可以涉及用户是否应该下载和安装移动设备应用,并且基于从与请求推荐的移动设备在指定距离内的其他移动设备接收的多个响应。 建议也可以由机器到机器网络中的各种其他设备请求和生成。 建议可以涉及到策略执行和设备组件的性能或操作。

    Detecting altered applications using network traffic data

    公开(公告)号:US09300685B2

    公开(公告)日:2016-03-29

    申请号:US14635636

    申请日:2015-03-02

    CPC classification number: H04L63/1441 H04L63/1416

    Abstract: A method, computer readable medium and apparatus for detecting an altered application are disclosed. Network traffic data is obtained for a number of endpoint devices to determine a network traffic signature for a first application. The signature comprises a set of flows within a time window. Network traffic data is monitored to determine a network traffic signature for a second application. The signature for the second application comprises the network traffic signature of the first application plus a flow to an additional address. The method determines a ratio of endpoint devices having network traffic data that matches the signature for the second application as compared to a percentage of endpoint devices having network traffic data that matches the signature for the first application. When the percentage satisfies a threshold, the method determines that the second application is the altered application comprising an altered version of the first application.

    SECURITY NETWORK BUFFER DEVICE
    88.
    发明申请
    SECURITY NETWORK BUFFER DEVICE 有权
    安全网络缓冲器设备

    公开(公告)号:US20150281270A1

    公开(公告)日:2015-10-01

    申请号:US14231588

    申请日:2014-03-31

    CPC classification number: H04L63/1441 H04L63/1416

    Abstract: A secure connection is facilitated between a device and a network. A security buffer device is used to determine an available network and connect to the network. The security buffer device can then allow the device to connect to the network via the security buffer device. The security buffer device can monitor any security breaches from the network and perform an action based on the indication of a security breach.

    Abstract translation: 在设备和网络之间便利安全连接。 安全缓冲设备用于确定可用网络并连接到网络。 安全缓冲设备然后可以允许设备经由安全缓冲设备连接到网络。 安全缓冲设备可以监视来自网络的任何安全漏洞,并根据安全漏洞的指示执行操作。

    Verificaiton Service
    89.
    发明申请
    Verificaiton Service 有权
    验证服务

    公开(公告)号:US20140259112A1

    公开(公告)日:2014-09-11

    申请号:US14283250

    申请日:2014-05-21

    CPC classification number: H04L63/08 H04L63/10 H04L63/126

    Abstract: Concepts and technologies are disclosed herein for verifying sender information. According to various embodiments of the concepts and technologies disclosed herein, a verification service can determine, receive a request, or receive a call to verify sender information associated with data. The server computer generates and delivers a verification message to a sender device in response to determining that sender information verification is to be provided. The server computer receives a response indicating if the data was sent by the sender device. If the response indicates that the sender device did not send the data, the server computer can block delivery of the data, generate alarms or alerts, take other actions, and/or take no action. If the response indicates that the sender device sent the data, the server computer can deliver the data, provide a verification response to the recipient device, take no action, and/or take other actions.

    Abstract translation: 这里公开了用于验证发送者信息的概念和技术。 根据本文公开的概念和技术的各种实施例,验证服务可以确定,接收请求或接收呼叫以验证与数据相关联的发送者信息。 响应于确定要提供发送者信息验证,服务器计算机生成并向发送者设备递送验证消息。 服务器计算机接收到指示数据是否由发送方设备发送的响应。 如果响应表示发件人设备没有发送数据,则服务器计算机可以阻止数据的传送,产生警报或警报,采取其他操作和/或不执行任何操作。 如果响应指示发送方设备发送数据,则服务器计算机可以传送数据,向接收方设备提供验证响应,不采取任何行动和/或采取其他操作。

Patent Agency Ranking