Matches 1 - 50 out of 120 1 2 3 >


Match Document Document Title
US20140122874 Deciphering Internet Protocol (IP) Security in an IP Multimedia Subsystem (IMS) using a Monitoring System  
Systems and methods for deciphering Internet Protocol (IP) security in an IP Multimedia Subsystem (IMS) using a monitoring system are described. In some embodiments, a method may include...
US20140289515 Digital rights management retrieval system  
A digital rights management retrieval system is provided. In some embodiments, a digital rights management system includes receiving a first notification from a first client device of a first...
US20140289516 PORTABLE DIGITAL VAULT AND LENDING OF SAME  
A portable digital vault and related methods are disclosed that can provide a digital equivalent to the physical act of lending copyrighted content (such as a book or CD) while also providing...
US20120110326 ENHANCED CRYPTOGRAPHCIALLY GENERATED ADDRESSES FOR SECURE ROUTE OPTIMIZATION IN MOBILE INTERNET PROTOCOL  
Enhanced cryptographically generated addresses (ECGAs) for MIPv6 incorporate a built-in backward key chain and offer support to bind multiple logically-linked CGAs together. Enhanced CGAs may be...
US20120246462 SYSTEM AND METHODS FOR PROVIDING LIVE STREAMING CONTENT USING DIGITAL RIGHTS MANAGEMENT-BASED KEY MANAGEMENT  
In the present disclosure, a DRM (in this case IPRM) system may be used to deliver media content keys to a player device in a live streaming environment and take advantage of all DRM related...
US20110099370 METHOD, APPARATUS, AND SYSTEM FOR PROCESSING DYNAMIC HOST CONFIGURATION PROTOCOL MESSAGE  
A method, apparatus, and system for processing a Dynamic Host Configuration Protocol (DHCP) message are disclosed. The method includes: receiving a DHCP message, where the source address of the...
US20120124372 Protecting Websites and Website Users By Obscuring URLs  
Websites and website users are subject to an increasing array of online threats and attacks. Disclosed herein are, among other things, approaches for protecting websites and website users from...
US20140325211 METHOD FOR UPDATING A TABLE OF CORRESPONDENCE BETWEEN A LOGICAL ADDRESS AND AN IDENTIFICATION NUMBER  
A method for updating a table of correspondence between a logical address associated to a user unit in a communication network and a unique identification number associated to one of a group of...
US20150237018 METHOD FOR SECURELY CONFIGURING CUSTOMER PREMISE EQUIPMENT  
A method for securely configuring a customer premise equipment in a network. The network including a configuration server, a DHCP server, and the customer premise equipment. The method includes...
US20110161665 METHOD AND SYSTEM FOR RESOLVING CONFLICTS BETWEEN IPSEC AND IPV6 NEIGHBOR SOLICITATION  
A method of enabling host devices having an IPsec policy to communicate with one another via an IPv6 communication network, which includes the following steps: extracting a Media Access Control...
US20110010541 Interoperable keychest for use by service providers  
There is provided a system and method for distributors to use an interoperable key chest. There is provided a method for use by a distributor to obtain content access authorizations from a key...
US20120042332 Method and system for providing encrypted content to a plurality of user devices  
The invention relates to a system and computer-implemented method for providing encrypted content to a particular recipient device of a plurality of recipient devices is disclosed. Copies of one...
US20140344568 SERVER NODE DISCOVERY MECHANISM APPLIED IN CLOUD ENVIONMENT CAPABLE OF SEARCHING SERVER NODE WITHIN CLOUD SERVICE CLUSTER  
A packet sending node is employed in a network segment. The packet sending node includes a packet storage module, a packet sending module and a packet accepting module. The packet storage module...
US20140317404 DYNAMIC ENCRYPTION OF A UNIVERSAL RESOURCE LOCATOR  
A system including a computer and a computer readable hardware storage device containing instructions which, upon being executed by the computer, implements a method for restricting access to...
US20060005013 Call signs  
A method of generating a call sign. A method of generating a call sign comprising determining a distinguished qualifier, finding a distinguished salt, and hashing the distinguished salt with the...
US20120084559 Communications Source Authentication  
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for authenticating a communications source. In one aspect, a method includes decrypting a symbol...
US20110066850 COMMUNICATION USING MULTIPLE APPARATUS IDENTITIES  
A system for broadcasting multiple public identities corresponding to the same apparatus. For example, each public identity may correspond to different operational environments, while none of the...
US20150074391 VERIFICATION OF USER COMMUNICATION ADDRESSES  
Disclosed are various embodiments for performing stateless verification of communication addresses. Encrypted verification data is generated for a user, including a communication address, an...
US20100281254 SYSTEMS AND METHOD FOR SECURE DELIVERY OF FILES TO AUTHORIZED RECIPIENTS  
By asking the recipient of an encrypted received file to read aloud a check text, retrieved from a network server, that address, or URL, is encoded within the file name of the encrypted received...
US20110035585 RE-ESTABLISHMENT OF A SECURITY ASSOCIATION  
According to a first aspect of the present invention there is provided a method of re-establishing a session between first and second IP hosts attached to respective first and second IP access...
US20130166906 Methods and Apparatus for Integrating Digital Rights Management (DRM) Systems with Native HTTP Live Streaming  
Methods and apparatus for integrating digital rights management (DRM) systems with native HTTP live streaming. Several methods for integrating a DRM system with HTTP live streaming on an operating...
US20150215289 METHOD FOR HIDING SERVER ADDRESS  
Provided is a method for hiding a server address including: requesting, by a client, communication with a server to a contact point through a first network path; requesting, by the contact point,...
US20140304504 LOGICAL NETWORK SEPARATION METHOD AND APPARATUS  
Disclosed are a logical network separation method and apparatus. The logical network separation method includes generating a first hash key on the basis of address information included in a...
US20140089661 SYSTEM AND METHOD FOR SECURING NETWORK TRAFFIC  
One variation of a method for selectively filtering internet traffic includes: receiving DNS queries; determining resource access levels for the DNS queries based on an internet resource database,...
US20120311326 APPARATUS AND METHOD FOR PROVIDING PERSONAL INFORMATION SHARING SERVICE USING SIGNED CALLBACK URL MESSAGE  
A mobile terminal provides a personal information sharing service using a signed URL message. The terminal includes; a personal information sharing service module which receives a message that...
US20050091486 Providing a graphical user interface in a system with a high-assurance execution environment  
Techniques are disclosed to provide security for graphical user interface elements being displayed in a system in which a first, host operating system is used along with a second, high assurance...
US20110055551 METHOD AND NETWORK NODES FOR GENERATING CRYPTOGRAPHICALLY GENERATED ADDRESSES IN MOBILE IP NETWORKS  
A method for generating a cryptographically generated address (CGA) comprises steps of: generating, in a network node located on a communication path between a first node and a second node, the...
US20120311325 METHOD FOR SENDING AND RECEIVING AN ENCRYPTED MESSAGE AND A SYSTEM THEREOF  
The present disclosure is directed to a method for sending and receiving an encrypted message and a system thereof. The method includes steps of encrypting a message, transforming the encrypted...
US20070028098 Encrypting units of work based on a trust level  
A method, apparatus, system, and signal-bearing medium that, in an embodiment, determine a cipher strength based on a trust level associated with a request, create a unit of work based on the...
US20120324218 Peer-to-Peer Trusted Network Using Shared Symmetric Keys  
A unique, strong, shared, symmetric network-wide key (or a limited number of group-wide keys) is generated by a central authority and initially provisioned to nodes in a network, which use it for...
US20130061047 SECURE AND EFFICIENT OFFLOADING OF NETWORK POLICIES TO NETWORK INTERFACE CARDS  
Techniques for efficient and secure implementation of network policies in a network interface controller (NIC) in a host computing device operating a virtualized computing environment. In some...
US20090235070 Creation of User Digital Certificate For Portable Consumer Payment Device  
A method for creating a digital certificate for a user issued by a reliant party, where the reliant party relies on an established cryptographic infrastructure by a registration or certificate...
US20120030462 SYSTEM AND DEVICE FOR ENCRYPTING AND DECRYPTING ELECTRONIC FILES AND METHOD THEREOF  
A method for encrypting electronic files includes: receiving a request signal consisting of an IP address of a receiver and information about a desired electronic file; obtaining a function and...
US20100275017 Peer-to-Peer Forwarding for Packet-Switched Traffic  
Establishing peer-to-peer tunnels between clients in a mobility domain. In normal operation, clients attached to a network having access nodes connected to a central controller transfer all...
US20080215880 MULTI-DOMAIN DYNAMIC GROUP VIRTUAL PRIVATE NETWORKS  
Systems and/or methods of secure communication of information between multi-domain virtual private networks (VPNs) are presented. A dynamic group VPN (DGVPN) can reside in one domain and a...
US20100235630 SYSTEM AND METHOD FOR PROVIDING KEY-ENCRYPTED STORAGE IN A CLOUD COMPUTING ENVIRONMENT  
System and method for providing cloud computing services are described. In one embodiment, the system comprises a cloud computing environment comprising resources for supporting cloud workloads,...
US20080109654 System and method for RFID transfer of MAC, keys  
Network registration for a device is achieved by providing the device with an RFID chip bearing a MAC address, cryptographic capabilities and keys, and then disposing the device near a...
US20100122083 METHOD AND APPARATUS FOR SECURELY COMMUNICATING PERSONAL HEALTH INFORMATION  
A method of securely communicating personal health information between a user terminal and a health care server. The method includes receiving an encryption key from a security key issuing device...
US20100115272 COMMUNICATING A PACKET FROM A MESH-ENABLED ACCESS POINT TO A MESH PORTAL IN A MULTI-HOP MESH NETWORK  
Methods are provided for processing a packet received by a mesh-enabled access point (MAP). When a first MAP receives a packet it can determine whether the packet is destined for a mesh portal...
US20090204814 Method and apparatus for communicating information between a security panel and a security server  
A security panel includes a processor, memory, and a network interface having a unique MAC address, and is configured to communicate over a network with a server. A method for registering the...
US20090077376 Method and a system for secure execution of workflow tasks in a distributed workflow management system within a decentralized network system  
There are provided a method, a system and an initiator server for a secure execution of workflow tasks of a workflow to be executed according to a given execution pattern in a distributed workflow...
US20130283046 SERVICE SYSTEM  
Multiple service servers can store identification tags, which identify each user, after associating the identification tags with the identification tags of other users; and can also store...
US20070124586 Dedicated communication system and dedicated communicating method  
The management of a conversion table of the original address and the dedicated address, and the management of the correspondence between a dedicated address and a communication partner are not...
US20060179300 Security enhancement arrangement  
Disclosed herein is a system for enhancing the security of wireless networks. In one aspect, a wireless access point that functions as a bridge between two networks is provided. The wireless...
US20150143110 MANAGE ENCRYPTED NETWORK TRAFFIC USING SPOOFED ADDRESSES  
Methods and systems for managing encrypted network traffic using spoofed addresses. One example method includes receiving a request to resolve a domain name; determining that the domain name is...
US20090055644 ADDRESS LIST MANAGEMENT APPARATUS, ADDRESS LIST MANAGEMENT METHOD, AND STORAGE MEDIUM  
An address list management apparatus stores, for each user of an MFP (Multi Function Peripheral), a different address list that lists address information pieces for transmission of image data by...
US20080019387 Bridge-based radio access station backbone network system and signal processing method therefor  
A bridge-based RAS backbone network system and a signal processing method therefor are provided. In the bridge-based RAS backbone network system, a plurality of BSBs with Layer 2 (L2) switches are...
US20130179683 SECURE REGISTRATION TO A SERVICE PROVIDED BY A WEB SERVER  
To check a secure registration to a service provided by a web server from a communication terminal (TC), the web server (SW) saves a dynamically generated code matching the terminal (TC)'s IP...
US20120117382 SYSTEM AND METHOD EMPLOYING AN AGILE NETWORK PROTOCOL FOR SECURE COMMUNICATIONS USING SECURE DOMAIN NAMES  
A method and system are used to transparently create an encrypted communications channel between a client device and a target device. Audio video communications between the client device and the...
US20090282432 Apparatus and Method for Securely Distributing Contents in a Telecommunication Network  
The invention relates to an apparatus and a method for securely distributing contents in a telecommunication network, where an inventory management unit (1) manages terminals (3) with at least one...

Matches 1 - 50 out of 120 1 2 3 >