Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Iboss Inc patents (2016 archive)


Recent patent applications related to Iboss Inc. Iboss Inc is listed as an Agent/Assignee. Note: Iboss Inc may have other listings under different names/spellings. We're not affiliated with Iboss Inc, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "I" | Iboss Inc-related inventors


Applying group policies

Information corresponding to a set of signatures is maintained, and for each signature in the set, an associated group policy of a network is maintained. A message from a device on the network is intercepted, and the message includes a header. ... Iboss Inc

Manage encrypted network traffic using spoofed addresses

Methods and systems for managing encrypted network traffic using spoofed addresses. One example method includes receiving a request to resolve a domain name; determining that the domain name is included in a predetermined set of domain names; associating a spoofed address with the domain name; sending a response to the request to resolve the domain name, the response including the spoofed address; receiving a secure request for a resource, the secure request directed to the spoofed address; determining that the secure request is directed to the domain name based on the association between the spoofed address and the domain name; and selectively decrypting the secure request based at least in part on determining that the secure request is directed to the domain name.. ... Iboss Inc

Malicious program identification based on program behavior

An execution of a data object is identified by a computing device. In response to identifying the execution of the data object, it is determined that the data object has requested a sensitive action of the computing device before interacting with a user of the computing device. ... Iboss Inc

Switching between networks

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for switching between parallel networks. One of the methods includes maintaining a plurality of parallel networks including a first network that precludes access to secure resources, and a second network that provides access both to unsecured resources and secured resources, enabling a user device access to connect to the first network, receiving input from the user device seeking access to one or more secured resources, in response to the received input, installing a device management profile on the user device, and causing the user device to switch from the connection to the first network to a connection to the second network.. ... Iboss Inc

Software program identification based on program behavior

Operations performed by a software application instance executed by a computing device are monitored. A determination is made that a particular operation performed matches an application signature representing a particular software application. ... Iboss Inc

Restricting communication over an encrypted network connection to internet domains that share common ip addresses and shared ssl certificates

An apparatus prevents communication by a client device to a domain that cannot be uniquely identified by relocating the dns mapping of the domain to a destination ip address that is uniquely identifiable and that represents a location of an apparatus that provides a data path to the domain.. . ... Iboss Inc

Applying group policies

Information corresponding to a set of signatures is maintained, and for each signature in the set, an associated group policy of a network is maintained. A message from a device on the network is intercepted, and the message includes a header. ... Iboss Inc

Selectively performing man in the middle decryption

An agent on a device within a network receives a request to access a resource outside the network. A first encrypted connection is established between the device and the agent, and a second encrypted connection is established between the agent and the resource, to facilitate encrypted communication traffic between the device and the resource. ... Iboss Inc

Network traffic management using port number redirection

A first request is received from a device over a network. It is determined that the first request should be redirected, based at least in part on information included in the first request. ... Iboss Inc

Applying policies to subnets

Associations are maintained among a plurality of subnets, policies, and client types. Each subnet has an associated client type and policy. ... Iboss Inc

Detecting and managing abnormal data behavior

Methods and systems for providing destination-specific network management are described. One example method includes determining a normal data movement profile for a computing device based on observed normal data transfer behavior by the computing device; identifying a data movement rule associated with the computing device, the data movement rule including a deviation amount, and one or more actions to take when the computing device deviates from the normal data movement profile by more than the deviation amount; detecting a data movement associated with the computing device; determining that the detected data movement exceeds the deviation amount included in the data movement rule relative to the normal data movement profile for the computing device; and performing the one or more actions associated with the data movement rule upon determining that the data movement violates the data movement rule.. ... Iboss Inc

Generating proxy automatic configuration scripts

Methods and systems for generating a proxy automatic configuration (pac) script based on the location of a device. One example method includes receiving a request for a proxy automatic configuration (pac) script from a source address associated with a device; determining, based at least in part on the source address, a location of the device; generating a pac script based at least in part on the determined location of the device; and sending a response to the request for the pac script including the generated pac script.. ... Iboss Inc

Vehicle information delivery and management system and method

A system for vehicle information delivery includes an identification (id) object linked to a vehicle and located proximate to or on the vehicle and configured to transmit a wireless signal to cause vehicle data of the vehicle to which it is linked to be displayed on a client device of an end user, the vehicle data including a vehicle identification number and vehicle specification information. The system further includes a service provider system comprising a processor unit and a memory, the memory having a service management module executable by the processor unit to: receive a first signal indicating that the vehicle data has been displayed to the end user on the client device; determine the vehicle data based on the first signal; determine location data corresponding to the vehicle; and transmit a second signal to a service provider client device with the vehicle data and the location data.. ... Iboss Inc

Web redirection for caching

This specification generally relates to using redirect messages to implement caching. One example method includes receiving from a client a first request for a network resource, the first request including an original location of the network resource; determining that a response to the first request is to be cached; sending a redirect response to the client including a cache location for the network resource; receiving a second request for the network resource from the client, the second request including the cache location; in response to receiving the second request for the network resource from the client: determining that the network resource has not been previously cached; retrieving the network resource from the original location; caching the retrieved network resource in a location associated with the cache location for the network resource; and sending the retrieved network resource to the client.. ... Iboss Inc

02/04/16 / #20160036934

Web redirection for caching

This specification generally relates to using redirect messages to implement caching. One example method includes receiving from a client a first request for a network resource, the first request including an original location of the network resource; determining that a response to the first request is to be cached; sending a redirect response to the client including a cache location for the network resource; receiving a second request for the network resource from the client, the second request including the cache location; in response to receiving the second request for the network resource from the client: determining that the network resource has not been previously cached; retrieving the network resource from the original location; caching the retrieved network resource in a location associated with the cache location for the network resource; and sending the retrieved network resource to the client.. ... Iboss Inc

02/04/16 / #20160036831

Web redirection for content filtering

This specification generally relates to using redirect messages to implement content filtering. One example method includes determining that access to a network resource should be redirected based at least in part on access behavior associated with the network resource; receiving from a client a first request for the network resource, the first request including an original location of the network resource; sending a redirect response to the client including a modified location for the network resource different than the original location; receiving a second request for the network resource from the client including the modified location; retrieving the network resource from the original location; performing at least one action on the retrieved network resource; and selectively sending the retrieved network resource to the client based at least in part on a result associated with the at least one action.. ... Iboss Inc

02/04/16 / #20160036830

Web redirection for content scanning

This specification generally relates to using redirect messages to implement content scanning. One example method includes receiving from a client a first request for a network resource, the first request including an original location of the network resource; determining that a response to the first request is to be analyzed; sending a redirect response to the client including a modified location for the network resource different than the original location; receiving a second request for the network resource from the client, the second request including the modified location; in response to receiving the second request for the network resource from the client: retrieving the network resource from the original location; determining that the retrieved network resource is suitable to send to the client; and in response to determining that the retrieved network resource is suitable, sending the retrieved network resource to the client.. ... Iboss Inc

01/28/16 / #20160026798

Selectively capturing video in a virtual environment based on application behavior

One example method includes executing a software application within the virtual machine environment; during execution of the software application, detecting one or more actions specified by a malicious application policy being performed by the software application within the virtual machine environment, the malicious application policy specifying one or more actions that will trigger video capture in the virtual machine environment executing the software application; and initiating capture of a video signal of the virtual machine environment in response to detecting the one or more actions specified by the malicious application policy. . ... Iboss Inc

01/28/16 / #20160026789

Emulating expected network communications to applications in a virtual machine environment

One example method includes executing a software application within the virtual machine environment; during execution of the software application, detecting a network request sent from the software application within the virtual machine environment, the network request formatted according to a particular network protocol; in response to detecting the network request: determining an expected response to the network request based on at least one of information included in the network request or the particular network protocol; and providing the expected response to the software application within the virtual machine environment.. . ... Iboss Inc

01/28/16 / #20160026788

Selectively introducing security issues in a sandbox environment to elicit malicious application behavior

One example method includes configuring the virtual machine environment to introduce one or more security issues within the virtual machine environment, wherein each security issue elicits a particular malicious application to perform malicious actions when introduced during execution of the particular malicious application; executing a software application within the virtual machine environment; detecting at least one of the malicious actions being performed by the software application during execution within the virtual machine environment; and initiating an analysis action in response to detecting at least one of the malicious actions being performed by the software application.. . ... Iboss Inc

01/07/16 / #20160006624

Maintaining ip tables

Data including a set of one or more resources and one or more associated ip addresses is updated based on monitored dns responses. A request is received from a client device for a resource identified by an ip address. ... Iboss Inc








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Iboss Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Iboss Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###