Patent application number | Description | Published |
20080318548 | METHOD OF AND SYSTEM FOR STRONG AUTHENTICATION AND DEFENSE AGAINST MAN-IN-THE-MIDDLE ATTACKS - A man-in-the-middle attack resistant method of and system for controlling access of a user to a restricted item receives a request from a user of a first device for access to a restricted item. The system determines the physical location of the first device. The system provides a token to the user and prompts the user to send the token to a recipient using a second device. The system denies the user access to the restricted item if the token is sent from a physical location not matching the physical location of the first device. | 12-25-2008 |
20100269151 | MIGRATION ACROSS AUTHENTICATION SYSTEMS - A system, method, program product and a method for deploying a system for providing migration across authentication systems are disclosed. A system is provided that includes a login system that collects information from a user during a login process, a migration list check system that compares the information to a migration list to determine if the user is selected for migration, and a migration logic system that migrates the user from the existing authentication system to the new authentication system during the login process if the user is selected. | 10-21-2010 |
20100269162 | WEBSITE AUTHENTICATION - Embodiments of website authentication including receiving a request from a user to view a website within a graphical user interface (GUI); generating a one time password (OTP); storing the generated OTP in a database; displaying the generated OTP on the GUI; verifying an identity of the user by receiving an identification datum from a communication device; receiving an entered OTP from the user; comparing the entered OTP with the generated OTP; and communicating whether the website is authenticated. | 10-21-2010 |
20110138483 | MOBILE PHONE AND IP ADDRESS CORRELATION SERVICE - A system, method and program product for controlling access to a restricted item. A method is provided that includes: receiving a request for access to a restricted item at a computer system associated with a provider, said request originating from a client system; determining an IP address of the client system; determining a mobile phone number of a mobile phone associated with the requester; transmitting to a third party service provider the IP address and mobile phone number; and receiving back from the third party service provider a confirmation message indicating whether or not the IP address and mobile phone are located within an acceptable range of each other. | 06-09-2011 |
20120185938 | DETECTING AND DEFENDING AGAINST MAN-IN-THE-MIDDLE ATTACKS - A system, method and program product for defending against man in the middle (MITM) attacks directed at a target server. A system is provided that includes an activity recording system that records an incoming IP address, userid, and time of each session occurring with the target server; an activity analysis system that identifies suspect IP addresses by determining if an unacceptable number of sessions are occurring from a single incoming IP address during a predefined time period; and a countermeasure system for taking action against suspect IP addresses. | 07-19-2012 |
20120264405 | VERIFICATION OF TRANSACTIONAL INTEGRITY - Aspects of the present invention provide a solution for verifying the integrity of a transaction. In response to receipt of a confirmed electronic transaction from a user, a one time password is forwarded to the user. The user then initiates a telephonic communication with a verifier on the user's wireless device and provides the one time password to the verifier. The verifier authenticates the mobile telephonic device based on the device's caller identification number and determines whether the one time password provided by the user matches the one forwarded to the user. After the user is authenticated, the verifier communicates the details of the transaction that were received and the user confirms whether the details match those originally entered. | 10-18-2012 |
20130007866 | MIGRATION ACROSS AUTHENTICATION SYSTEMS - A system, method, program product and a method for deploying a system for providing migration across authentication systems are disclosed. A system is provided that includes a login system that collects information from a user during a login process, a migration list check system that compares the information to a migration list to determine if the user is selected for migration, and a migration logic system that migrates the user from the existing authentication system to the new authentication system during the login process if the user is selected. | 01-03-2013 |
20130318170 | SYSTEM FOR DETECTING THE PRESENCE OF ROGUE DOMAIN NAME SERVICE PROVIDERS THROUGH PASSIVE MONITORING - A method, system, and computer program product embodied in a computer readable storage medium are disclosed for identifying a rogue domain name service (DNS) server. Embodiments include passively monitoring traffic on a target network; and identifying a DNS resolution response in the traffic on the network. The DNS resolution response includes a mapping of a domain to an internet protocol (IP) address. The DNS resolution response is compared with a preconfigured list of known mappings of domains to IP addresses. Based on the results of the comparison, it can be determined whether the DNS resolution response is correct. In cases where the DNS resolution response is incorrect, the provider of the DNS resolution response is a rogue DNS server. | 11-28-2013 |
20130318605 | SYSTEM FOR DETECTING ROGUE NETWORK PROTOCOL SERVICE PROVIDERS - A method, system, and computer program product embodied in a computer readable storage medium are disclosed for identifying a rogue network protocol service provider. Embodiments include passively monitoring traffic on a target network, and identifying a response to a network protocol request in the traffic on the network. The source of the response to a network protocol request is compared with a preconfigured list of authorized servers. Based on the results of the comparison, it can be determined whether the source of the response is an authorized server. In cases in which the source is a server on the preconfigured list of authorized servers, the source is deemed an authorized server. In cases in which the source is not a server on the preconfigured list of authorized servers, the source is deemed to be an unauthorized, or rogue, network protocol service provider. | 11-28-2013 |
20140037074 | DETECTING MAN-IN-THE-MIDDLE ATTACKS IN ELECTRONIC TRANSACTIONS USING PROMPTS - Aspects of the invention provide a solution for detecting man-in-the-middle attacks in electronic transactions using prompts. One embodiment includes a method for authenticating an electronic transaction. The method includes: receiving an electronic transaction request from a user, determining an IP address associated with a client system from which the electronic transaction request originates, providing the user with a password associated with the electronic transaction request, receiving a telephonic communication from a telephonic device associated with the user, prompting the user, via a voice response unit, to input the password using the telephonic device, authenticating the user by comparing the inputted password and the provided password, determining a probable location of the user based on the determined IP address of the client system, communicating to the user the probable location of the user based on the determined IP address, and prompting the user to confirm the probable location of the user. | 02-06-2014 |
20150072646 | MOBILE DEVICE PASSWORD RESET - The disclosure is directed to a mobile device password reset. A method in accordance with an embodiment includes: receiving a phone call at a locked mobile device from a phone having a privileged phone number; initiating a password reset in response to the receipt of the phone call from the privileged phone number and the phone call exceeding a predetermined time duration threshold by: terminating, by the locked mobile device, the phone call from the phone having the privileged phone number; generating, by the locked mobile device, a temporary password; establishing, by the locked mobile device, a connection to the phone having the privileged phone number; displaying, by the locked mobile device, a password entry field; communicating, by the locked mobile device, the temporary password via the connection to the phone having the privileged phone number; and unlocking the locked mobile device upon successful entry of the temporary password in the password entry field displayed by the locked mobile device. | 03-12-2015 |
20150072648 | MOBILE DEVICE PASSWORD RESET - The disclosure is directed to a device password reset. A method in accordance with an embodiment includes: receiving a phone call at a locked mobile device from a phone having a privileged phone number; initiating a password reset in response to the receipt of the phone call from the privileged phone number and the phone call exceeding a predetermined time duration threshold by: terminating, by the locked mobile device, the phone call from the phone having the privileged phone number; generating, by the locked mobile device, a temporary password; establishing, by the locked mobile device, a connection to the phone having the privileged phone number; displaying, by the locked mobile device, a password entry field; communicating, by the locked mobile device, the temporary password via the connection to the phone having the privileged phone number; and unlocking the locked mobile device upon successful entry of the temporary password in the password entry field displayed by the locked mobile device. | 03-12-2015 |
20150304435 | EXPECTED LOCATION-BASED ACCESS CONTROL - In an approach for authenticating a user attempting to access to a resource, a processor receives an indication of a user attempting to access a resource within a timeframe, wherein the indication includes a location of the user. A processor identifies a location requirement for the user attempting to access the resource, wherein the location requirement originates from an entry indicating an expected location of the user within the timeframe, and wherein the entry is unmodifiable by the user. A processor determines whether the expected location of the user matches, within a threshold, the received location of the user attempting to access the resource. | 10-22-2015 |
20160036845 | SYSTEM FOR DETECTING THE PRESENCE OF ROGUE DOMAIN NAME SERVICE PROVIDERS THROUGH PASSIVE MONITORING - A method, system, computer program product embodied in a computer readable storage medium, and computer system are disclosed for identifying a rogue domain name service (DNS) server. Embodiments include passively monitoring traffic on a target network; and identifying a DNS resolution response in the traffic on the network. The DNS resolution response includes a mapping of a domain to an internet protocol (IP) address. The DNS resolution response is compared with a preconfigured list of known mappings of domains to IP addresses. Based on the results of the comparison, it can be determined whether the DNS resolution response is correct. In cases where the DNS resolution response is incorrect, the provider of the DNS resolution response is a rogue DNS server. | 02-04-2016 |
Patent application number | Description | Published |
20120010230 | METHODS AND COMPOSITIONS FOR IDENTIFICATION, ASSESSMENT AND TREATMENT OF CANCERS ASSOCIATED WITH HEDGEHOG SIGNALING - Provided herein are methods, assays and kits for evaluating a sample, e.g., a sample obtained from a cancer patient, to detect one or more hedgehog biomarkers and/or one or more cilium markers. Thus, the invention can be used, inter alia, as a means to identify patients likely to benefit from administration of one or more hedgehog inhibitors, alone or in combination with therapeutic agents; to predict a time course of disease or a probability of a significant event in the disease of a cancer patient; to stratify patient populations; and/or to more effectively treat or prevent a cancer or a tumor associated with hedgehog signaling. | 01-12-2012 |
20130011409 | Compositions, Kits, and Methods for the Diagnosis, Prognosis, Monitoring, Treatment and Modulation of Post-Transplant Lymphoproliferative Disorders and Hypoxia Associated Angiogenesis Disorders Using Galectin-1 - The present invention is based, in part, on the discovery that galectin-1 (Gal1) plays a role in viral-associated PTLD, e.g., EBV-associated PTLD and hypoxia associated angiogenesis disorders. Accordingly, the invention relates to compositions, kits, and methods for diagnosing, prognosing, monitoring, treating and modulating viral-associated PTLD, e.g., EBV-associated PTLD and hypoxia associated angiogenesis disorders. | 01-10-2013 |
20140120083 | TREATMENT OF CANCERS USING PI3 KINASE ISOFORM MODULATORS - Provided herein are methods, kits, and pharmaceutical compositions that include a PI3 kinase inhibitor for treating cancers or hematologic disorders. | 05-01-2014 |
20140377258 | Treatment Of Cancers Using PI3 Kinase Isoform Modulators - Provided herein are methods, kits, and pharmaceutical compositions that include a PI3 kinase inhibitor for treating cancers or hematologic disorders. | 12-25-2014 |
20150025012 | METHODS AND COMPOSITIONS FOR IDENTIFICATION, ASSESSMENT AND TREATMENT OF CANCERS ASSOCIATED WITH HEDGEHOG SIGNALING - Provided herein are methods, assays and kits for evaluating a sample, e.g., a sample obtained from a cancer patient, to detect one or more hedgehog biomarkers and/or one or more cilium markers. Thus, the invention can be used, inter alia, as a means to identify patients likely to benefit from administration of one or more hedgehog inhibitors, alone or in combination with therapeutic agents; to predict a time course of disease or a probability of a significant event in the disease of a cancer patient; to stratify patient populations; and/or to more effectively treat or prevent a cancer or a tumor associated with hedgehog signaling. | 01-22-2015 |
20150191536 | Compositions, Kits, and Methods for the Diagnosis, Prognosis, Monitoring, Treatment and Modulation of Post-Transplant Lymphoproliferative Disorders and Hypoxia Associated Angiogenesis Disorders Using Galectin-1 - The present invention is based, in part, on the discovery that galectin-1 (Gal1) plays a role in viral-associated PTLD, e.g., EBV-associated PTLD and hypoxia associated angiogenesis disorders. Accordingly, the invention relates to compositions, kits, and method for diagnosing, prognosing, monitoring, treating and modulating viral-associated PTLD, e.g., EBV-associated PTLD and hypoxia associated angiogenesis disorders. | 07-09-2015 |
20150283142 | TREATMENT OF CANCERS USING PI3 KINASE ISOFORM MODULATORS - Provided herein are methods, kits, and pharmaceutical compositions that include a PI3 kinase inhibitor for treating cancers or hematologic disorders. | 10-08-2015 |
20150290207 | HETEROCYCLIC COMPOUNDS AND USES THEREOF - Compounds and pharmaceutical compositions that modulate kinase activity, including PI3 kinase activity, and compounds, pharmaceutical compositions, and methods of treatment of diseases and conditions associated with kinase activity, including PI3 kinase activity, are described herein. | 10-15-2015 |
20150320754 | COMBINATION THERAPIES - Provided herein are pharmaceutical compositions comprising a phosphatidylinositol 3-kinase inhibitor, or pharmaceutically acceptable form thereof, in combination with a second agent, or a pharmaceutically acceptable form thereof, wherein the second agent is chosen from one or more of 1) a CDK4/6 inhibitor, 2) an HDAC inhibitor, 3) a MEK inhibitor, 4) a mTOR inhibitor, 5) an AKT inhibitor, 6) a proteasome inhibitor, 7) an immunomodulator, 8) a glucocorticosteroid, 9) a BET inhibitor, 10) an epigenetic inhibitor, 11) a PI3K alpha inhibitor, 12) a topoisomerase inhibitor, or 13) an ERK inhibitor. Also provided herein are methods of treatment comprising administration of the compositions, and uses of the compositions, e.g., for treatment of cancer. | 11-12-2015 |
20150320755 | COMBINATION THERAPIES - Provided herein are pharmaceutical compositions comprising a phosphatidylinositol 3-kinase inhibitor or a pharmaceutically acceptable form thereof, and a Bcl-2 inhibitor or a pharmaceutically acceptable form thereof. Also provided herein are methods for treating cancer comprising administration the compositions, and uses of the compositions, e.g., for the treatment of cancer. | 11-12-2015 |
20160022692 | TREATMENT OF RHEUMATOID ARTHRITIS AND ASTHMA USING PI3 KINASE INHIBITORS - Provided herein are methods, kits, and pharmaceutical compositions that include a PI3 kinase inhibitor for treating rheumatoid arthritis or asthma. | 01-28-2016 |
20160113932 | TREATMENT OF CANCERS USING PI3 KINASE ISOFORM MODULATORS - Provided herein are methods, kits, and pharmaceutical compositions that include a PI3 kinase inhibitor for treating cancers or hematologic disorders. Provided herein are methods, compositions, and kits for treating or preventing cancers or diseases, such as hematologic malignancies, which have a high expression level of one or more isoform (s) of PI3K (e.g., PI3K-δ and/or PI3K-γ). In one embodiment, the methods, compositions, and kits provided herein relate to administering an isoform-selective PI3K modulator. | 04-28-2016 |
Patent application number | Description | Published |
20090317587 | REINFORCED STIFFENERS AND METHOD FOR MAKING THE SAME - A composite stiffener is fabricated using preforms of laminated, unidirectional composite tape. The stiffener includes a void that is reinforced by a filler wrapped with a structural adhesive. The surfaces of the preforms surrounding the void include a layer of composite fabric which is bonded to the filler by the adhesive, thereby increasing the toughness of stiffeners around the void and improving pull-off strength of the stiffener. | 12-24-2009 |
20140102578 | Thermoplastic Composite Tubular Structures and Methods of Fabricating the Same - A method of fabricating a thermoplastic composite tubular structure provides a mandrel of a soluble, expandable material. The method overbraids the mandrel with a continuous fiber thermoplastic composite material to form an overbraided mandrel. The method installs the overbraided mandrel into a matched tooling assembly. The method heats in a heating apparatus the matched tooling assembly with the installed overbraided mandrel at a specified heating profile in order to consolidate the thermoplastic composite material and form a thermoplastic composite tubular structure. The method cools the matched tooling assembly with the formed thermoplastic composite tubular structure at a specified cooling profile. The method removes the formed thermoplastic composite tubular structure from the matched tooling assembly. The method solubilizes the mandrel to permanently remove the mandrel from the formed thermoplastic composite tubular structure. | 04-17-2014 |
20140209744 | Box Structures for Carrying Loads and Methods of Making the Same - There is provided a box structure for carrying load having upper and lower composite integrated sandwich panels. The panels have facesheets sandwiching one or more core portions and adjacent dense packs oriented in an axial direction. The box structure further has a plurality of spars. Each spar has a web and web attachments and has a spar length in the axial direction. The plurality of spars are connected to the panels with the web attachments located at the dense packs. The facesheets are configured to carry primarily torsion and pressure loads in shear and no significant axial loads. The dense packs are configured to carry all significant box bending in axial tension and compression loads. | 07-31-2014 |
20140360654 | Stabilizer Torque Box Assembly and Method - In an embodiment of the disclosure, there is provided a method of fabricating a thermoplastic torque box assembly. The method includes providing a plurality of braided thermoplastic tubular spar caps, connecting one or more connector elements to one or more of the braided thermoplastic tubular spar caps, and laying up an inner thermoplastic facesheet in a continuous manner around the one or more braided thermoplastic tubular spar caps. The method further includes attaching a plurality of skin panel stabilization elements to the inner thermoplastic facesheet to define four torque box side portions, laying up and attaching an outer thermoplastic facesheet in a continuous manner around the plurality of skin panel stabilization elements, and heating at an effective temperature and an effective pressure the thermoplastic torque box assembly. | 12-11-2014 |
20150217508 | RADIUS FILLER AND METHOD OF MANUFACTURING SAME - A method of manufacturing a radius filler may include providing a plurality of fibers, braiding the plurality of fibers into a braided preform, shaping the braided preform into a braided radius filler, and cutting the braided radius filler to a desired length. | 08-06-2015 |
20160003280 | ASSEMBLIES INCLUDING SHAPE MEMORY ALLOY FITTINGS AND COMPOSITE STRUCTURAL MEMBERS - Provided are assemblies having composite structures interlocked with shape memory alloy structures and methods of fabricating such assemblies. Interlocking may involve inserting an interlocking protrusion of a shape memory alloy structure into an interlocking opening of a composite structure and heating at least this protrusion of the shape memory alloy structure to activate the alloy and change the shape of the protrusion. This shape change engages the protrusion in the opening such that the protrusion cannot be removed from the opening. The shape memory alloy structure may be specifically trained prior to forming an assembly using a combination of thermal cycling and deformation to achieve specific pre-activation and post-activation shapes. The pre-activation shape allows inserting the interlocking protrusion into the opening, while the post-activation shape engages the interlocking protrusion within the opening. As such, activation of the shape memory alloy interlocks the two structures. | 01-07-2016 |