Matches 1 - 50 out of 111 1 2 3 >


Match Document Document Title
US20150026454 CHUNK-LEVEL CLIENT SIDE ENCRYPTION IN HIERARCHICAL CONTENT ADDRESSABLE STORAGE SYSTEMS  
Techniques for chunk-level client side encryption are provided. In a content addressable storage system, a plurality of chunks is used to implement a hierarchical file system. The hierarchical...
US20120011357 SYSTEM AND METHOD FOR PROVIDING SECURITY VIA A TOP LEVEL DOMAIN  
A system and method is disclosed for providing end-to-end security for communications between registered clients of a top level domain without the need for further encryption/decryption protocols...
US20130305038 NETWORK SECURITY LOAD BALANCING  
A website hosting system includes a request routing node and a plurality of security termination nodes coupled to the request routing node. Each security termination node is configured to secure...
US20150033009 Method and System for Authenticating a User by an Application  
The invention relates to a method for authenticating a user by an application by means of a challenge-response method. In this case, the challenge (5) is displayed in the form of a barcode on a...
US20100299518 PORTABLE SECURE COMPUTING NETWORK  
As provided herein, when using an untrusted network connection, a secure online environment can be created for a remote machine by connecting to a trusted computer with a trusted network...
US20140208094 CONTROL PLANE ENCRYPTION IN IP/MPLS NETWORKS  
A method for providing control plane encryption in layer 3 networks is disclosed. The method for providing control plane encryption in layer 3 networks includes for a network having a subset of...
US20110238978 COMMUNICATING CONFIDENTIAL INFORMATION BETWEEN AN APPLICATION AND A DATABASE  
Disclosed is a system and method for communicating confidential information in a resource friendly manner between an application and a database using an application programming interface, API. The...
US20110035582 NETWORK AUTHENTICATION SERVICE SYSTEM AND METHOD  
A network authentication service system and method are provided. The network authentication service system is applied to a network application layer and includes: a Web service security device,...
US20130151843 CRYPTOGRAPHY FOR SECURE SHELL IN EMULATED ENVIRONMENTS  
Calls from an application in an emulated environment to a module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing the module. An...
US20110213956 TECHNIQUES FOR MANAGING A SECURE COMMUNICATION SESSION  
Techniques for managing a secure communication session are provided. A non-browser application utilizes a browser to establish a secure communication session with a server. The session cookie set...
US20110131407 USING A PKCS MODULE FOR OPENING MULTIPLE DATABASES  
A security initialization system obtains load data that identifies a first database storing security data to be opened. The initialization system determines that a PKCS-based module for opening...
US20150134948 SYSTEM AND METHOD OF DELIVERING CONFIDENTIAL ELECTRONIC FILES  
A sending computer (sender) delivers private messages over a network via dynamically established encrypted channels where no copies of the message are persisted on third party computers. Private...
US20150121061 SYSTEMS AND METHODS FOR MANAGING A GUEST VIRTUAL MACHINE EXECUTING WITHIN A VIRTUALIZED ENVIRONMENT  
The present disclosure relates to methods and systems for managing a guest virtual machine executing within a virtualized environment. A daemon is established on a guest virtual machine executing...
US20140041013 METHOD AND SYSTEM FOR MESSAGING SECURITY  
An e-mail firewall applies policies to e-mail messages transmitted between a first site and a plurality of second sites. The e-mail firewall includes a plurality of mail transfer relay modules for...
US20130179679 Methods And Apparatuses For Secure Information Sharing In Social Networks Using Randomly-Generated Keys  
There can be problems with the security of social networking communications. For example, there may be occasions when a number of friends wish to communicate securely through a social network...
US20120110322 SYSTEM AND METHOD OF DELIVERING CONFIDENTIAL ELECTRONIC FILES  
A private document delivery system and method includes a sending computer configured to transmit an electronic document over a computer network, a dynamically established encrypted line to...
US20110231651 STRONG SSL PROXY AUTHENTICATION WITH FORCED SSL RENEGOTIATION AGAINST A TARGET SERVER  
Embodiments are directed towards establishing an encrypted session between a client device and a target server device when the client device initiates network connections through a proxy device....
US20110296168 DIGITAL IDENTITY DEVICE  
A digital identity device for uniquely identifying legal entities. The digital identity device is used for secure electronic communications.
US20130103939 Securing Communications of a Wireless Access Point and a Mobile Device  
In one or more embodiments, a network provider can receive a request to access a public network via a wireless network implemented via one or more wireless access points. The network provider can...
US20110296167 Selecting a Security Format Conversion for Wired and Wireless Devices  
A selection system and method to receive an indication of a security format from a network and to select one of a plurality of security format conversions based on the received indication is...
US20070204145 Data transfer between networks operating at different security levels  
A secure network server wherein both the forwarding process and the receiving process are created upon connection initialization, and the receiving process is held off from communicating with the...
US20070136606 Storage system with built-in encryption function  
In a plurality of storage systems including data encryption functions, there is a possibility that encryption keys necessary for data encryption and decryption may differ among the storage...
US20140208095 MANAGED REAL-TIME COMMUNICATIONS BETWEEN USER DEVICES  
Managed real-time communications between user devices may be provided. Upon receiving a request to instantiate a communication connection from an application, a secure session may be established...
US20140331040 Systems and Methods for Controlling Email Access  
Embodiments of the disclosure relate to proxying one or more email resources in transit to the client devices from the email services, removing one or more email attachments from the email...
US20140164759 Systems and Methods for Controlling Email Access  
Embodiments of the disclosure relate to proxying one or more email resources in transit to the client devices from the email services, removing one or more email attachments from the email...
US20090099882 Enhanced Security Framework for Composite Applications  
Automatic secure application composition, in applying a security framework is applied to a business process. An external policy negotiation is conducted to specify a common policy between the...
US20100011206 EMBEDDED APPARATUS, REMOTE-PROCESSING METHOD, AND COMPUTER PROGRAM PRODUCT  
A processing unit performs a predetermined process by a remote operation from a client device. A monitoring unit monitors a first port for an unencrypted communication with the processing unit and...
US20100146259 MULTI FACTOR AUTHORISATIONS UTILISING A CLOSED LOOP INFORMATION MANAGEMENT SYSTEM  
Methods and Apparatus are disclosed for a multi-factor authentication service which permits customers and account holders to provide secure instructions to entities via their Internet enabled...
US20110110524 SYSTEM FOR ON-LINE AND OFF-LINE DECRYPTION  
A secure communication system wherein message decryption may be performed while off-line, or optionally while on-line. A sender encrypts a message based on the message key and sends it to the...
US20090132807 Renegotiating SSL/TLS connections with client certificates on post requests  
A method and apparatus for providing securing a connection with a (Secure Sockets Layer) SSL/TLS-enabled server. In one embodiment, a web client establishes a new connection by initiating a...
US20110035581 SYSTEM FOR MANAGEMENT AND PROCESSING OF ELECTRONIC VENDOR MAIL  
A computer-implemented system processes secure electronic documents from one or more content providers in accordance with subscriber instructions has a processor and modules operative within the...
US20100146250 DYNAMIC UPDATING OF TRUSTED CERTIFICATES AND CERTIFICATE REVOCATION LISTS IN A COMPUTING SYSTEM  
This application generally describes techniques for dynamically updating trusted certificates and CRLs, generally referred to herein as certificate information. That is, techniques are described...
US20100070754 PAYMENT ENCRYPTION ACCELERATOR  
Embodiments of the invention provide a system for encrypting web session data which may include a session management module adapted to receive data from a web application module and provide a...
US20050102499 Apparatus for proving original document of electronic mail  
An authenticity assurance apparatus for e-mail documents which preserves a transmitted e-mail includes a unit to add a digital signature to an e-mail document and a file attached to it at time of...
US20070050616 Device, program, and method for transmitting or receiving an image through electronic mail  
A scanned image transmitting device has an instruction-creating section that creates an instruction describing a process instruction in relation to a scanned image; an electronic mail creating...
US20050120227 Method and system for secure filtering of users of a public transport network  
According to the process, a preparatory stage to transport for enrolling (10, 100) users is planned, to form a set of approved users (90), excluding people to be refused (75), and an initial stage...
US20110202756 SECURE ENCRYPTED EMAIL SERVER  
A computing system utilizing a local or remote secure email server that intercepts secure message that include an identifying domain extension provides secure data transmissions between internet...
US20070240202 AUTHENTICATION SERVICE FOR FACILITATING ACCESS TO SERVICES  
Authenticating a third party client system prior to providing Internet access via an Internet access point. In a distributed computing system including an Internet access point, an authentication...
US20130031357 METHOD FOR SECURE TRANSFER OF AN APPLICATION FROM A SERVER INTO A READING DEVICE UNIT  
A method and a system for secure transfer of an application from a server (S) into a reading device unit (2) with authentication of a user with a data carrier unit (1), the server (S) making...
US20100268934 METHOD AND SYSTEM FOR SECURE DOCUMENT EXCHANGE  
A document management (DM), data leak prevention (DLP) or similar application in a data processing system is instrumented with a document protection service provider interface (SPI). The service...
US20140337614 SELECTIVE MODIFICATION OF ENCRYPTED APPLICATION LAYER DATA IN A TRANSPARENT SECURITY GATEWAY  
According to one embodiment, a transparent security gateway is coupled between a client end station (CES) and a web application server (WAS). The security gateway monitors an encryption protocol...
US20140195797 EFFICIENT FORWARDING OF ENCRYPTED TCP RETRANSMISSIONS  
A network device receives TCP segments of a flow via a first SSL session and transmits TCP segments via a second SSL session. Once a TCP segment has been transmitted, the TCP payload need no...
US20070113274 Anonymous peer-to-peer communication  
An anonymous peer-to-peer network has a security protocol that allows hosts in the network to determine whether data received from the network is valid. The requesting host can explicitly...
US20050172115 System and method for gathering exhibited behaviors of a .NET executable module in a secure manner  
A system and method for gathering exhibited behaviors of a .NET executable module in a secure manner is presented. In operation, a .NET behavior evaluation module presents a virtual .NET...
US20100241847 ENCRYPTED EMAIL BASED UPON TRUSTED OVERLAYS  
Sending and receiving encrypted emails. At a web browser, user input is received requesting a compose email page user interface for a web-based email system. The compose email page user interface...
US20100250920 TECHNIQUES FOR PACKET PROCESSING WITH REMOVAL OF IP LAYER ROUTING DEPENDENCIES  
Techniques for packet processing with removal of Internet Protocol (IP) layer routing dependencies are presented. Encrypted packets associated with network communications occurring via a VPN and...
US20060161768 Method of managing software components that are integrated into an embedded system  
The invention relates to a method of managing an embedded system comprising at least one original code which is associated with a computer device, at least one embedded code which is associated...
US20130311767 SYSTEM AND METHOD EMPLOYING AN AGILE NETWORK PROTOCOL FOR SECURE COMMUNICATIONS USING SECURE DOMAIN NAMES  
A method and system are used to transparently create an encrypted communications channel between a client device and a target device. Audio video communications between the client device and the...
US20100161960 Secure Remote Access Public Communication Environment  
A method and system provide a user device with secure access to an enterprise application in an enterprise network through VPN. The enterprise application is accessed from a user device such that...
US20080077788 Secure Tunnel Over HTTPS Connection  
Many secure tunnels require protocols that require special handling, authorization or security certificates, such as L2TP and PPTP. This often eliminates them for use between a corporate or agency...

Matches 1 - 50 out of 111 1 2 3 >