Web activity concealment
    3.
    发明授权

    公开(公告)号:US11470050B2

    公开(公告)日:2022-10-11

    申请号:US16516442

    申请日:2019-07-19

    Abstract: Concepts and technologies are disclosed herein for web activity concealment. A system can include a memory storing instructions that, upon execution by a processor, cause the processor to perform operations. The system can be communicatively coupled to a network. The operations can include detecting a network message that is directed to a target source, where the network message is generated by a client application of a machine-to-machine device. The operations can include identifying, based on the network message, a client action that is associated with the client application. The operations can include counterpoising the client action by generating a supplemental action command. The operations can include providing the supplemental action command to the machine-to-machine device.

    Web Activity Concealment
    6.
    发明申请

    公开(公告)号:US20210021574A1

    公开(公告)日:2021-01-21

    申请号:US16516442

    申请日:2019-07-19

    Abstract: Concepts and technologies are disclosed herein for web activity concealment. A system can include a memory storing instructions that, upon execution by a processor, cause the processor to perform operations. The system can be communicatively coupled to a network. The operations can include detecting a network message that is directed to a target source, where the network message is generated by a client application of a machine-to-machine device. The operations can include identifying, based on the network message, a client action that is associated with the client application. The operations can include counterpoising the client action by generating a supplemental action command. The operations can include providing the supplemental action command to the machine-to-machine device.

    Methods, Systems and Products for Authentication

    公开(公告)号:US20170286960A1

    公开(公告)日:2017-10-05

    申请号:US15631008

    申请日:2017-06-23

    Abstract: Multiple authentication procedures enhance security of Internet transactions. For example, a request is received from a customer to access a service. A first authentication request is sent to the customer for first authentication information. A second authentication request may be sent to the customer for second authentication information. The method then enables the customer to proceed with accessing the service if the second authentication information is received.

Patent Agency Ranking