Match Document Document Title
US20110066844 METHOD AND SYSTEM FOR DIGITAL RIGHTS MANAGEMENT BROKERING AND DIGITAL ASSET SECURITY TRANSCODING  
A computer-implemented method and system for DRM brokering and digital asset security transcoding comprising utilizing a broker for converting content from one format into one or more alternative...
US20150067322 SYSTEMS AND METHODS FOR MULTI-LEVEL TAGGING OF ENCRYPTED ITEMS FOR ADDITIONAL SECURITY AND EFFICIENT ENCRYPTED ITEM DETERMINATION  
The present disclosure is directed towards systems and methods for performing multi-level tagging of encrypted items for additional security and efficient encrypted item determination. A device...
US20120173870 Systems and Methods for Multi-Level Tagging of Encrypted Items for Additional Security and Efficient Encrypted Item Determination  
The present disclosure is directed towards systems and methods for performing multi-level tagging of encrypted items for additional security and efficient encrypted item determination. A device...
US20130138951 METHOD AND DEVICE FOR AUTOMATICALLY DISTRIBUTING UPDATED KEY MATERIAL  
A method for handling an encrypted message received on an electronic device that has not been encrypted using a current public key. The portable electronic device automatically generates a reply...
US20130238891 Method and System for Encrypting Short Message  
The present invention discloses a method and system for implementing short message encryption. Both the Mobile Station (MS) and the Mobile Switching Center (MSC) are configured with...
US20120137358 POINT-TO-MULTI-POINT/NON-BROADCASTING MULTI-ACCESS VPN TUNNELS  
A system establishes a virtual private network (VPN) tunnel to a destination and determines a next hop for the VPN tunnel. The system inserts the next hop, and an address associated with the...
US20130173908 Hash Table Organization  
Disclosed are various embodiments for improving hash table utilization. A key corresponding to a data item to be inserted into a hash table can be transformed to improve the entropy of the key...
US20150046694 METHOD AND APPARATUS FOR SECURELY ESTABLISHING L3-SVC CONNECTIONS  
A system and method are provided for securely establishing Layer-3 SVCs or SPVCs across an ATM network. An originating multiservice switch that generates the connection setup message for the...
US20130054959 Security Control in a Communication System  
A method includes controlling security in a communication system that involves a node capable of routing traffic according to one or more security algorithms with respective security levels. The...
US20130138948 SYSTEM AND METHOD FOR RETAINING USERS' ANONYMITY  
A method and a system are provided for generating information that relates to services being utilized by a user, by which: at a user device, retrieving usage information that relates to services...
US20150244663 AUTOMATIC DELIVERY SELECTION FOR ELECTRONIC CONTENT  
Computer program products and methods for the secure delivery of a message in a communication system. The method includes identifying a best method for delivery of a message including considering...
US20120324217 SYSTEM AND METHODS FOR FACILITATING SECURE COMMUNICATIONS ON A WEBSITE  
A system and methods for facilitating secure communications on a website are presented. The system comprising a security server configured to receive a secure message from a creator device is...
US20140298007 NETWORK SWITCH CONFIGURATION  
Provided is a method of configuring a network switch. A configuration file is allowed to be edited on a server. The compatibility of the configuration file with a network switch is validated on...
US20120011358 REMOTE ADMINISTRATION AND DELEGATION RIGHTS IN A CLOUD-BASED COMPUTING DEVICE  
Methods and apparatus for providing remote administration and delegation rights for a computing system are disclosed. An example method for facilitating remote administration of a first computing...
US20130124853 DIGITAL RIGHTS MANAGEMENT DISTRIBUTION SYSTEM  
In an example embodiment, a digital content distributor may transmit an unsigned license associated with a protected digital object to a digital rights management provider. The digital rights...
US20130227274 PRIVACY-PRESERVING PUBLISH-SUBSCRIBE PROTOCOL IN A CLOUD-ASSISTED MODEL  
A server receives from a client at least one interest pseudonym produced by a double application of a pseudo random function to at least one interest of the client. The server encrypts an item....
US20130191631 Auditing and policy control at SSH endpoints  
SSH sessions and other protocol sessions (e.g., RDP) may be audited using an interceptor embedded within an SSH server or other protocol server. Operations performed over an SSH connection may be...
US20120117377 Mobile security protocol negotiation  
A security gateway/home agent controller HAC is used to assign one home agent HA from a plurality of HAs and to identify at least one security protocol that is common between a mobile node MN and...
US20140223170 SYSTEM AND METHOD FOR ELECTRONIC SECURE OBFUSCATION NETWORK  
Described are a secure obfuscation network (SON) and ingress nodes, transit nodes and egress nodes used in such a network. Also described is a method for implementing such a network.
US20110107084 SYSTEM FOR AND METHOD FOR RELAYING MESSAGES  
A system for and method of relaying messages is presented. In an exemplary embodiment, the system and method may include receiving a request from a user to transmit a message to an intended...
US20130246784 WIRELESS ACCESS POINT SECURITY FOR MULTI-HOP NETWORKS  
Security in wireless communication networks that employ relay stations to facilitate communications between base stations and mobile stations is enhanced. In one embodiment, resource information...
US20140149733 SYSTEM FOR ENCRYPTING CONTENT NAME  
A system encrypts a name of content stored in a node of a hierarchical structure. A content receiving node encrypts a name of a predetermined node among names of nodes included in a content name,...
US20140304501 Method and System for Establishing a Trusted and Decentralized Peer-to-Peer Network  
The present invention offers a new and improved method and system to establish a trusted and decentralized peer-to-peer network for: the sharing of computer files between and among computing...
US20100152599 ORAL APPLIANCE COMPLIANCE MONITORING SYSTEM  
An oral appliance compliance monitoring system and method comprises an oral appliance suitable for wearing in a patient's oral cavity during sleeping periods, the oral appliance having one or more...
US20140019751 METHOD AND APPARATUS HAVING NULL-ENCRYPTION FOR SIGNALING AND MEDIA PACKETS BETWEEN A MOBILE STATION AND A SECURE GATEWAY  
Disclosed is a method for efficient transport of packets between a mobile station and a secure gateway over a wireless local area network for accessing home services. In the method, a first...
US20150095636 TUNNEL INTERFACE FOR SECURING TRAFFIC OVER A NETWORK  
Methods and systems for a flexible, scalable hardware and software platform that allows a managed security service provider to easily provide security services to multiple customers are provided....
US20110238980 SYSTEM AND METHODS FOR REMOTE MAINTENANCE IN AN ELECTRONIC NETWORK WITH MULTIPLE CLIENTS  
A method for verifying electronic software code integrity may comprise providing a list of encryption keys to a client, encrypting a software code packet using one of the plurality of encryption...
US20080052508 Network security status indicators  
In one embodiment, a method includes an apparatus includes a programmable microprocessor that determines the current security status of a network, generates a signal corresponding to the status,...
US20150237023 SCALABLE NETWORK APPARATUS FOR CONTENT BASED SWITCHING OR VALIDATION ACCELERATION  
A network apparatus is provided that may include one or more security accelerators. The network apparatus also includes a plurality of network units cascaded together. According to one embodiment,...
US20130173907 PKI GATEWAY  
A PKI gateway allows an enterprise to maintain a limited number of PKI protocol interfaces while servicing every standard and proprietary PKI protocol used by a customer of the enterprise. The PKI...
US20150244712 GENERATION AND DISTRIBUTION OF SECURE OR CRYPTOGRAPHIC MATERIAL  
A user having remote device wants to access an application that requires that the user possess a user application cryptographic credential. If the application needs to verify the identity of the...
US20110022835 Secure Communication Using Asymmetric Cryptography and Light-Weight Certificates  
Encrypted communications between servers and client devices over an unsecured channel, such as the Internet, without using a public key infrastructure are disclosed. Messages to a client device...
US20100332629 SECURE CUSTOM APPLICATION CLOUD COMPUTING ARCHITECTURE  
A secure custom application cloud computing architecture which facilitates virtually seamless migration of custom applications to and from a cloud computing environment in response to user needs....
US20140115322 METHOD, APPARATUS AND SYSTEM FOR PERFORMING PROXY TRANSFORMATION  
A method for performing proxy transformation between a user and a server includes: selecting a first proxy relationship between a target user and a first user from a proxy relationship library;...
US20140019750 VIRTUAL GATEWAYS FOR ISOLATING VIRTUAL MACHINES  
Virtual machines in a network may be isolated by encrypting transmissions between the virtual machines with keys possessed only by an intended recipient. Within a network, the virtual machines may...
US20120297183 TECHNIQUES FOR NON REPUDIATION OF STORAGE IN CLOUD OR SHARED STORAGE ENVIRONMENTS  
Techniques for non-repudiation of storage in cloud or shared storage environments are provided. A unique signature is generated within a cloud or shared storage environment for each file of the...
US20100299518 PORTABLE SECURE COMPUTING NETWORK  
As provided herein, when using an untrusted network connection, a secure online environment can be created for a remote machine by connecting to a trusted computer with a trusted network...
US20110264907 SECURING INFORMATION WITHIN A CLOUD COMPUTING ENVIRONMENT  
Embodiments of the invention provide a solution for securing information within a Cloud computing environment. Specifically, an encryption service/gateway is provided to handle...
US20150188699 METHOD AND APPARATUS FOR ESTABLISHING SECURE SESSION BETWEEN CLIENT AND SERVER  
A method of establishing a secure session between a client and a server by a network node accessed by the client and the server includes receiving, by the network node, a client side random number...
US20130024685 PROVISIONING CREDENTIALS FOR EMBEDDED WIRELESS DEVICES  
A system and method are used to connect an installed device to a local premise network, such as a home network provided by a router in the home. A user may use a host device, such as a mobile...
US20120239923 Wireless Activation Of IP Devices  
A method of activating a wireless IP device by providing access to an installer to a customer's personal router or modem/router combination and providing access to the installer to a wireless...
US20130145147 Content Protection Method  
A method for protecting content to be distributed to a pool of receiving terminals connected to a content distribution network and each having a specific security level depending on the technical...
US20150019859 TUNNEL INTERFACE FOR SECURING TRAFFIC OVER A NETWORK  
Methods and systems for a flexible, scalable hardware and software platform that allows a managed security service provider to easily provide security services to multiple customers are provided....
US20110154019 Graceful Conversion of a Security to a Non-security Transparent Proxy  
A graceful conversion of a security to a non-security transparent proxy is performed. A security transparent proxy is an intermediary between two end devices, with an established secure connection...
US20150188887 OPTIMIZING CONNECTIONS OVER VIRTUAL PRIVATE NETWORKS  
The disclosed embodiments provide a system that provides a virtual private network (VPN). The system includes a routing apparatus on a public network. The routing apparatus accepts a first...
US20120324216 TUNNEL INTERFACE FOR SECURING TRAFFIC OVER A NETWORK  
Methods and systems for a flexible, scalable hardware and software platform that allows a managed security service provider to easily provide security services to multiple customers is provided....
US20120216034 METHOD AND SYSTEM FOR SECURING COMMUNICATION ON A HOME GATEWAY IN AN IP CONTENT STREAMING SYSTEM  
A home gateway, which enables communication with a plurality of devices, recovers a root-content key from a key server of a service provider for secure delivery of content requested by a client...
US20110208960 System and Method for Secure Communications  
Encryption of electronic messages may be automatically processed by a messaging system based on keywords or other attributes of the messages. In one example, if the message includes a predefined...
US20100318609 BRIDGING ENTERPRISE NETWORKS INTO CLOUD  
An enterprise namespace may be extended into a cloud of networked resources. A portion of the cloud may be dynamically partitioned, and the extension of the enterprise namespace established within...
US20140122866 Crypto Proxy for Cloud Storage Services  
In one embodiment, a proxy receives, from a client node, a file to be stored by a cloud storage server, where the proxy and the client node are part of a private network that does not include the...