Patent application number | Description | Published |
20130160119 | SYSTEM SECURITY MONITORING - A computing device may receive netflow data that includes information corresponding to network-side activity associated with a target device. The computing device may evaluate the netflow data based on a netflow signature to identify potentially malicious activity. The netflow signature may include information corresponding to two or more network events occurring in a particular order. The computing device may report, to another computing device, that potentially malicious activity, corresponding to the network data, has been detected based on the evaluation of the netflow data. | 06-20-2013 |
20130160129 | SYSTEM SECURITY EVALUATION - A computing device may receive external activity data corresponding to a target system. The external activity data may include information corresponding to network-side information relating to the target system. The computing device may identify suspicious external activity, corresponding to the external activity data, based on an activity watchlist. The activity watchlist may include information corresponding to external activity systems associated with known sources of malicious activity. The computing device may generate a system security report based on the suspicious external activity identified. | 06-20-2013 |
20130318614 | MOBILE APPLICATION SECURITY ASSESSMENT - The security of mobile applications may be assessed and used to enhance the security of mobile devices. In one example, a method may include determining security scores of one or more mobile applications, the security scores defining a level of security risk corresponding to the one or more mobile applications. The method may further include receiving a policy relating to mobile applications that are permitted to be used by the mobile device, the policy including a threshold security score value; and receiving the requested security scores. The method may further include restricting use of selected ones of the one or more mobile applications when a security score corresponding to the one or more mobile applications is below the threshold security score value. | 11-28-2013 |
20140380413 | MOBILE APPLICATION SECURITY ASSESSMENT - The security of mobile applications may be assessed and used to enhance the security of mobile devices. In one example, a method may include determining security scores of one or more mobile applications, the security scores defining a level of security risk corresponding to the one or more mobile applications. The method may further include receiving a policy relating to mobile applications that are permitted to be used by the mobile device, the policy including a threshold security score value; and receiving the requested security scores. The method may further include restricting use of selected ones of the one or more mobile applications when a security score corresponding to the one or more mobile applications is below the threshold security score value. | 12-25-2014 |
Patent application number | Description | Published |
20100322393 | VOICEMAIL NOTIFICATION SERVER LOAD BALANCING - A device receives, from a management server, an optimal number of threads, generates a dynamic thread based on the optimal number of threads, and retrieves, from a message store, a message based on the dynamic thread and when the message store is not empty. The device receives a binding from a voicemail server associated with a voicemail user, generates a notification based on the retrieved message and based on the binding, and provides the notification to a user device associated with the voicemail user. | 12-23-2010 |
20110038467 | VOICEMAIL SERVER MONITORING/REPORTING VIA AGGREGATED DATA - A device receives, from a voicemail server, log information associated with voicemail transactions performed by the voicemail server, and determines data elements, of the log information, to be aggregated. The device also aggregates the determined data elements of the log information, determines a time period to provide the aggregated log information to a database for storage, and provides the aggregated log information to the database at the determined time period. | 02-17-2011 |