2017
|
Invention
|
Optical feedback for visual recognition authentication. Providing optical watermark signals for a... |
|
Invention
|
Proximity-based radio advertising activation. Pairing two devices includes detecting, by a first ... |
|
Invention
|
Distributed authentication with thresholds in iot devices. Managing authentication of a child dev... |
|
Invention
|
Detection of return oriented programming attacks in a processor. In an embodiment, a processor fo... |
|
Invention
|
Dynamically identifying criticality of services and data sources. A method, a computer-readable m... |
|
Invention
|
Device-driven auto-recovery using multiple recovery sources. Updating computer program(s) install... |
|
Invention
|
Networks that use opportunistic devices to offload services. Dynamically identifying and utilizin... |
|
Invention
|
Graymail filtering based on user preferences. A graymail detection and filtering system predicts ... |
|
Invention
|
Technologies for distributed acting and knowledge for the internet of things. Technologies for a ... |
|
Invention
|
Drone assisted mesh network for first responders. A flock of drones provide a drone-assisted mesh... |
|
Invention
|
Ransomware protection for cloud file storage. A cloud storage server-based approach allows detect... |
|
Invention
|
Cloud assisted behavioral automated testing. A computer readable storage medium, system and metho... |
|
Invention
|
Discovery of malicious strings.
Particular embodiments described herein provide for an electroni... |
|
Invention
|
Server-assisted anti-malware client.
A host-based antimalware client can interface with a server... |
|
Invention
|
Personalization of delivery of notifications. Particular embodiments described herein provide for... |
|
Invention
|
Iot and pos anti-malware strategy. Providing security to a device includes detecting, in a first ... |
|
Invention
|
Content classification. Particular embodiments described herein provide for an electronic device ... |
2016
|
Invention
|
Safer password manager, trusted services, and anti-phishing process. Preventing anomalous connect... |
|
Invention
|
Enhanced secure boot. A pre-boot initialization technique for a computing system allows for encry... |
|
Invention
|
Method and apparatus to detect security vulnerabilities in web application. An improved anti-malw... |
|
Invention
|
Secure distributed backup for personal device and cloud data. Securely distributing a backup file... |
|
Invention
|
System and method to mitigate malware. Particular embodiments described herein provide for an ele... |
2015
|
Invention
|
Encryption key retrieval. Particular embodiments described herein provide for an electronic devic... |
|
Invention
|
Trusted updates. In an example, a system and method are described for providing trusted updaters ... |
|
Invention
|
Predictive user authentication. In an example, a system and method for predictive user authentica... |
|
Invention
|
Binary translation of a trusted binary with input tagging. In an example, a computing device incl... |
|
Invention
|
Real-time mobile security posture. In an example, a system and method for real-time mobile securi... |
|
Invention
|
Outbreak pathology inference. In an example, a system and method for outbreak pathology inference... |
|
Invention
|
Trusted binary translation. In an example, a computing device may include a trusted execution env... |
|
Invention
|
Memory access protection using processor transactional memory support. Technologies for detecting... |
|
Invention
|
Message sender authenticity validation. In an example, a system and method are provided for valid... |
|
Invention
|
Digital heritage notary. In an example, a DHN (DHN) is provided for enabling grantees to access d... |
|
Invention
|
Execution profiling detection of malicious objects. In an example, there is provided a system and... |
|
Invention
|
Input verification. In an example, a computing device may have an input verification engine (IVE)... |
|
Invention
|
Determining the reputation of a digital certificate. Particular embodiments described herein prov... |
|
Invention
|
Determining a reputation through network characteristics. Particular embodiments described herein... |
|
Invention
|
Portable secure storage. Particular embodiments described herein provide for a portable electroni... |
|
Invention
|
Identification of malicious execution of a process. Particular embodiments described herein provi... |
|
Invention
|
Determining a reputation for a process. Particular embodiments described herein provide for an el... |
|
Invention
|
System and method to combine multiple reputations. Particular embodiments described herein provid... |
|
Invention
|
Systems and methods for real-time user verification in online education. Systems and methods for ... |
|
Invention
|
Incident response tool using a data exchange layer system. This disclosure describes systems, met... |
|
Invention
|
Pairing of external device with random user action. Certain embodiments herein relate to pairing ... |
|
Invention
|
Detection of a malicious peripheral. Particular embodiments described herein provide for an elect... |
|
Invention
|
Trust establishment between a trusted execution environment and peripheral devices. Technologies ... |
|
Invention
|
Mechanism for automatic creation and access to favorite personal cloud data. Distributed favorite... |
|
Invention
|
Account recovery protocol. The present disclosure relates to receiving a request for recovery of ... |
|
Invention
|
Security orchestration framework. In an example, there is disclosed a computing apparatus, includ... |
|
Invention
|
Conditional login promotion. The present disclosure relates to a system and method for providing ... |
|
Invention
|
Detection of malicious invocation of application program interface calls. Particular embodiments ... |