Patent application number | Description | Published |
20080307222 | Verifying authenticity of webpages - A certificate registry system is configured to issue authentication certificates issued to each one of a plurality of information providers and to maintain a root certificate corresponding to all of the authentication certificates. Each one of the authentication certificates links respective authentication information thereof to identification information of a corresponding one of the information providers. Each one of the authentication certificates is devoid of linkage between the corresponding one of the information providers and domain name information thereof. The authentication certificates of the certificate registry are associated in a manner at least partially dependent upon at least one of a particular type of information that the information providers provide, a particular organization that the information providers are associated with, a particular type profession in which the information providers are engaged and a particular geographical region in which the information providers are located. | 12-11-2008 |
20080307226 | Verifying authenticity of e-mail messages - A certificate registry system configured to issue authentication certificates to each one of a plurality of information providers and to maintain a root certificate corresponding to all of the authentication certificates, wherein each one of the authentication certificates links respective authentication information thereof to identification information of a corresponding one of the information providers, wherein each one of the authentication certificates is devoid of linkage between the corresponding one of the information providers and e-mail address information thereof, and wherein the authentication certificates of the certificate registry are associated in a manner at least partially dependent upon at least one of a particular type of information that the information providers provide, a particular organization that the information providers are associated with, a particular type profession in which the information providers are engaged and a particular geographical region in which the information providers are located. | 12-11-2008 |
20080307513 | Verifying authenticity of instant messaging messages - A certificate registry system is configured to issue authentication certificates to each one of a plurality of information providers and to maintain a root certificate corresponding to all of the authentication certificates. Each one of the authentication certificates links respective authentication information thereof to identification information of a corresponding one of the information providers. Each one of the authentication certificates includes a respective Instant Messaging (IM) screen name information of the information provider. The authentication certificates of the certificate registry are associated in a manner at least partially dependent upon at least one of a particular type of information that the information providers provide, a particular organization that the information providers are associated with, a particular type profession in which the information providers are engaged and a particular geographical region in which the information providers are located. | 12-11-2008 |
20090222663 | System and Method for Authenticating the Identity of a Remote Fax Machine - A system and method of authenticating the identity of a remote fax machine during a faxing operation is provided. An X.509-type Certificate received from the remote fax machine is validated to affirm it can be properly associated with the remote machine. The Certificate's public key is used to verify the remote fax machine has the corresponding private key. A Certificate's Common Name then compared to an Expected Name to authenticate the identity of the remote fax machine prior to sending a fax to prevent an unwanted misdirection of faxed information and to screen incoming faxes for unwanted spam. | 09-03-2009 |
20090222920 | MALWARE DETECTION SYSTEM AND METHOD - Methods and systems are presented for detection of malware such as worms in which a network switch entices the malware into sending scan packets by allocating one or more ports as bait addresses, sending outgoing bait packets, and identifying compromised hosts that send unexpected incoming packets to a bait address. | 09-03-2009 |
20090293122 | METHOD AND SYSTEM FOR IDENTIFYING ENTERPRISE NETWORK HOSTS INFECTED WITH SLOW AND/OR DISTRIBUTED SCANNING MALWARE - Malware detection systems are presented in which a list is constructed of enterprise hosts to or from which each given enterprise network host sends or receives packets within a current measurement period and statistics are accumulated based on two or more measurement period lists, with a count value being derived from the statistics to indicate the number of other hosts to or from which each monitored host sent or received packets, and one or more monitored hosts may be identified as suspected of being infected with slow and/or distributed scanning malware for which the count value exceeds a threshold value. | 11-26-2009 |
20090328220 | MALWARE DETECTION METHODS AND SYSTEMS FOR MULTIPLE USERS SHARING COMMON ACCESS SWITCH - Malware detection systems and methods are presented in which header data of protocol data units (PDUs) are examined at a wireless access switch shared by multiple clients, and the PDU type and client are used to establish counters, with the count values being analyzed to identify clients suspected of being infected with malware. | 12-31-2009 |
20100054433 | Verifying authenticity of voice mail participants in telephony networks - A method includes receiving an authentication certificate of a voice mail account holder and/or an authentication certificate of a caller wanting to leave a voice mail message the holders' voice mail account. A voice mail apparatus that provides voice mail service for the voice mail account holder performs such receiving. The account holder and/or the caller are authenticated after receiving the authentication certificate of the party being authenticated. Authenticating the account holder and/or the caller is performed using authentication information contained within the respective certificate. After such authentication is successfully performed, a voice mail message record can be created in the account of the account holder. Such creating includes allowing the caller to store the message in the account of the account holder in addition to associating authenticated identification information of the caller with the message and/or providing authenticated identification of the account holder to the caller. | 03-04-2010 |
20100058479 | Method and system for combating malware with keystroke logging functionality - A method is carried out by a computer system for combating malicious keystroke-logging activities thereon. An operation is performed for generating a plurality of fake keystroke datasets that are each configured to resemble a keystroke dataset generated by keystrokes made on an input device of the computer system while entering sensitive information of a prescribed configuration. An operation is performed for receiving an instance of the sensitive information instance of the prescribed configuration concurrently with generating the fake keystroke datasets. Receiving the sensitive information instance includes a user of the computer system entering the sensitive information instance by performing keystrokes on the input device of the computer system such that a real keystroke dataset corresponding to the sensitive information instance is generated. An operation is performed for embedding the real keystroke dataset within at least a portion of the fake keystroke datasets after receiving the sensitive information instance. | 03-04-2010 |
20100070771 | AUTHENTICATION OF ACCESS POINTS IN WIRELESS LOCAL AREA NETWORKS - A method is provided for authenticating an identity of an operator ( | 03-18-2010 |
20110047032 | PRIVACY-COUNSCIOUS ADVERTISING - Various exemplary embodiments relate to a method and related network element including one or more of the following: receiving a plurality of advertisement messages via the communications network, each advertisement message of the plurality of advertisement messages including a set of meta-information which describes the content of an advertisement associated with the advertisement message; determining whether each advertisement message is relevant to the user by comparing the set of meta-information to a set of user preferences associated with the user, the set of user preferences stored locally on the user node; when an advertisement message is determined to not be relevant to the user, discarding the advertisement message; and when an advertisement message is determined to be relevant to the user, providing the user with access to the advertisement associated with the advertisement message. | 02-24-2011 |
20110096941 | SELF-STEERING DIRECTIONAL LOUDSPEAKERS AND A METHOD OF OPERATION THEREOF - A directional sound system, a method of transmitting sound to a spatial location determined by the gaze of a user and a directional communication system are disclosed. In one embodiment, the directional sound system includes: (1) a direction sensor configured to produce data for determining a direction in which attention of a user is directed, (2) a microphone configured to generate output signals indicative of sound received thereat, (3) loudspeakers configured to convert directed sound signals into directed sound and (4) an acoustic processor configured to be coupled to the direction sensor, the microphone, and the loudspeakers, the acoustic processor configured to convert the output signals to the directed sound signals and employ the loudspeakers to transmit the directed sound to a spatial location associated with the direction. | 04-28-2011 |
20110258700 | VERIFYING AUTHENTICITY OF INSTANT MESSAGING MESSAGES - A method comprises performing verification of an IM message sent using a specified Instant Messaging (IM) screen name and received by an information recipient after successful verification of authenticity of an authentication certificate received by the information recipient from the specified IM screen name. Verifying the IM message includes successfully verifying authenticity of the IM message using authentication information contained in the received authentication certificate. The IM message includes an encoded checksum for designated parts of the IM message. Performing verification of the IM message includes verifying authenticity of the encoded checksum. | 10-20-2011 |
20120117653 | MALWARE DETECTION SYSTEM AND METHOD - Methods and systems are presented for detection of malware such as worms in which a network switch entices the malware into sending scan packets by allocating one or more ports as bait addresses, sending outgoing bait packets, and identifying compromised hosts that send unexpected incoming packets to a bait address. | 05-10-2012 |