Patent application number | Description | Published |
20080256624 | SYSTEMS AND METHOD FOR DISTRIBUTED NETWORK PROTECTION - Through the use of an intermediate party, a first party is given the ability to communicate with a second party, with the communication appearing as if it originated with the intermediate party. Specifically, in a protected network system, the protected network is capable of acting as a conduit through which an entity, such as law enforcement, can communicate with an entity attempting an unauthorized access attempt unbeknownst to the entity attempting the unauthorized access attempt. This allows, for example, the detection and identification of the entity attempting the unauthorized access attempt. | 10-16-2008 |
20080307497 | Method And System For Preventing Malicious Code From Being Introduced Into A Protected Network - A method, system, and device for secure communications are provided, including at least one of means for configuring two or more computer devices as a single computer device; and means for separating the two or more computer devices from one or more computer networks. | 12-11-2008 |
20090320132 | SYSTEMS AND METHODS FOR DISTRIBUTED NETWORK PROTECTION - By distributing various information and monitoring centers that monitor distributed networks and unauthorized access attempts, it is possible to, for example, more quickly defend against an unauthorized access attempts. For example, a Level 1 monitoring center could monitor a predetermined geographical area serving, for example, a wide variety of commercial and public sites, an organizational structure, or the like, for alarms. Upon analyzing an alarm for various characteristics, the Level 1 monitoring center can refer the unauthorized access attempt to an appropriate Level 2 center for, for example, possible retaliatory and/or legal action. Then, a Level 3 monitoring center can record and maintain an overall picture of the security of one or more networks, the plurality of monitoring centers and information about one or more hacking attempts. | 12-24-2009 |
20100042513 | METHOD AND COMMUNICATIONS AND COMMUNICATION NETWORK INTRUSION PROTECTION METHODS AND INTERUSION ATTEMPT DETECTION SYSTEM - A method, system and computer readable medium for secure e-commerce communications, including an e-commerce system, including a private system for maintaining confidential information; and a public system for maintaining non-confidential information. The private system provides variable cyber coordinates to authorized parties for secure communications with the private system, and the public system provides cyber coordinates to the general public for communications with the public system. | 02-18-2010 |
20100050268 | PASSWORD PROTECTION SYSTEM AND METHOD - A method, system, and device for password protection for a computer or other electronic device are provided, including providing one or more false passwords that outwardly cause the computer or other electronic device to behave as if a correct password was entered and that inwardly cause the computer or other electronic device to behave differently than as if the correct password was entered; and taking a predetermined action when one of the false passwords is entered. | 02-25-2010 |
20100115280 | METHOD OF COMMUNICATIONS AND COMMUNICATION NETWORK INTRUSION PROTECTION METHODS AND INTRUSION ATTEMPT DETECTION SYSTEM - A method, system and computer readable medium for protecting a communications device connected to a communications system against an unauthorized intrusion, including providing a variable identifier to the communications device and entities authorized access thereto. The variable identifier is provided to a user address book and assigned with a permanent identifier and the permanent identifier, but not the variable identifier, is available to a user. The presence or absence of the correct variable identifier is sensed during an attempt to access the communications device for granting or denying access to the communications device. A new variable identifier is periodically provided to the communications device and to the authorized entities and to the user address book and assigned with the permanent identifier, wherein the permanent identifier, but not the new variable identifier, is available to the user. | 05-06-2010 |
20100122078 | SYSTEMS AND METHODS FOR CREATING A CODE INSPECTION SYSTEM - A code inspection system produces a dynamic decoy machine that closely parallels one or more protected systems. The code inspection system can analyze and monitor one or more protected systems, and as those protected systems are updated, altered or modified, the dynamic decoy machine, in which potentially malicious code is tested, can also be updated. Thus, the dynamic decoy machine can accurately reflect the current state of the one or more protected systems such that the potentially destructive nature, if any, of suspicious code can be evaluated as if it were in the actual environment of the protected system, without jeopardizing the security of the protected system. | 05-13-2010 |
20100146595 | NETWORKING COMPUTERS ACCESS CONTROL SYSTEM AND METHOD - A method, system, and device for controlling access for networking computers or devices, including a controller ( | 06-10-2010 |
20100175131 | METHOD AND SYSTEM FOR NETWORK PROTECTION AGAINST CYBER ATTACKS - A method, system, and device for protecting networking computers or devices from cyber attacks, including periodically changing cyber coordinates of a communications network or system; communicating the changed cyber coordinates to corresponding or reciprocal networks and/or devices so they can maintain communications; detecting a cyber attack or receiving notification from the corresponding or reciprocal networks and/or devices of a cyber attack; and changing the cyber coordinates of the network or system upon such detection or notification and communicating the changed cyber coordinates to the corresponding or reciprocal networks and/or devices. | 07-08-2010 |
20110016129 | METHOD AND SYSTEM FOR VARIABLE OR DYNAMIC CLASSIFICATION - A method, system and device for variable or dynamic classification of users, devices, computers, systems, or information are provided, including at least one of means for sensing one or more inputs, including at least one of an event, a parameter, and time; and means for generating a classification or policy for allowing access to information based on one or more of the sensed inputs. | 01-20-2011 |
20110035484 | METHOD AND SYSTEM FOR CREATING AND MANAGING A VARIABLE NUMBER OF VISIBLE INTERNET PROTOCOL (IP) ADDRESSES - A method, system and device for creating and managing a variable number of visible cyber coordinates, including at least one of means for generating a random or deterministic number; means for generating variable visible cyber coordinates based on the generated number; and means for employing the variable visible cyber coordinates during communications. | 02-10-2011 |
20110041188 | METHOD AND SYSTEM FOR PROTECTION OF COMPUTER APPLICATIONS AND SOFTWARE PRODUCTS AGAINST UNAUTHORIZED COPYING - A method, system, and computer program product for protection of an application or program, including making secret a command or commands that are normally fixed in an operating system (OS) and/or a Basic Input/Output System (BIOS); generating values or names for the command or commands; providing legitimate users and/or devices with the generated values or names for the command or commands for enabling receiving services from the kernel, OS, and/or the BIOS; translating the generated values or names for the command or commands via a translation mechanism provided between an application or program and the kernel, OS, and/or BIOS for enabling receiving services from the kernel, OS, and/SEND or the BIOS; and modifying, changing, and/or replacing the generated values or names employed for the command or commands in the kernel, OS, and/or BIOS. | 02-17-2011 |
20110047627 | METHOD AND SYSTEM FOR SECURE DATA EXFILTRATION FROM A CLOSED NETWORK OR SYSTEM - A method, system, and device for secure data exfiltration from a closed communications network or system, including at least one of means for data exfiltration from one or more of computers or computing devices of a closed communications network or system to one or more of computers or computing devices on another communications network or system; and means for internal or external secure data storage coupled to the exfiltration means and the other communications network or system and configured to receive the data for exfiltration based on control from the exfiltration means. | 02-24-2011 |
20110081886 | SYSTEMS AND METHODS FOR COMMUNICATION PROTECTION - A communications system and method is provided to reliably protect communication systems, such as mobile phone systems, from unauthorized use, as well as to make the interception of wireless communication more difficult. Specifically, the static wireless phone number or other similar identifiers are not used for identification and authorization during communication between the mobile unit and a base station. Instead, a set of private identifiers is determined and is known only to the phone company and the base stations controlling the mobile phone calls. These private identifiers allow dynamic and continual updating of the mobile phone and base station directories with current valid identifiers that are used for communication between the devices. | 04-07-2011 |
20120060220 | SYSTEMS AND METHODS FOR COMPUTER SECURITY EMPLOYING VIRTUAL COMPUTER SYSTEMS - A method, system, and computer program product for computer protection, including a protected computer having a protected operating system; and a secure operating system having a first virtual copy of at least a portion of the protected operating system and one or more security mechanisms configured to analyze potentially malicious code before the code is used by the protected computer. | 03-08-2012 |
20120137345 | SYSTEM AND METHOD FOR CYBER OBJECT PROTECTION USING VARIABLE CYBER COORDINATES (VCC) - A method, system, and computer program product for cyber protection using variable cyber coordinates (VCC), including a variable cyber coordinates (VCC) controller unit configured to generate cyber coordinates based on a VCC protocol for respective control circuits (CC) of one or more protected routers; and the VCC controller unit configured to communicate the generated cyber coordinates to the protected routers with or without encryption and/or authentication. At a predetermined time interval or based on a command from the VCC controller unit, the routers and their respective control units (CU) are configured to change their cyber coordinates together or separately, to cyber coordinates newly generated by the VCC controller unit according to the VCC protocol. | 05-31-2012 |
20120216288 | METHOD AND SYSTEMS FOR SECURE DISTRIBUTION OF CONTENT OVER AN INSECURE MEDIUM - A method, system, and computer program product for secure distribution of content over an insecure medium, including a recipient device configured to receive content; and a sender device configured to request from the recipient device a unique identification associated with the recipient device, before sending to the recipient device, the content and a unique key associated with the content for use of the content by the recipient device. The sender device is configured to request the unique identification associated with the recipient device from the recipient device during a predetermined time interval after sending the key, and after verification of the unique identification, send a new key associated with the content to the recipient device for further use of the content by the recipient device. | 08-23-2012 |
20120222090 | METHOD OF COMMUNICATIONS AND COMMUNICATION NETWORK INTRUSION PROTECTION METHODS AND INTRUSION ATTEMPT DETECTION SYSTEM - A method, system and computer readable medium for protecting a communications device connected to a communications system against an unauthorized intrusion, including providing a variable identifier to the communications device and entities authorized access thereto. The variable identifier is provided to a user address book and assigned with a permanent identifier and the permanent identifier, but not the variable identifier, is available to a user. The presence or absence of the correct variable identifier is sensed during an attempt to access the communications device for granting or denying access to the communications device. A new variable identifier is periodically provided to the communications device and to the authorized entities and to the user address book and assigned with the permanent identifier, wherein the permanent identifier, but not the new variable identifier, is available to the user. | 08-30-2012 |
20120246724 | SYSTEM AND METHOD FOR DETECTING AND DISPLAYING CYBER ATTACKS - A method, system, and computer program product for displaying detected cyber attacks over communications networks, including a radar type display section including one or more icons representing detected cyber attacks; an activity tracking display section including information regarding the detected cyber attacks represented by the icons; and an application information display section including at least one of system user information, session information, and statistics information regarding the cyber attacks. | 09-27-2012 |