Matches 1 - 50 out of 294 1 2 3 4 5 6 >


Match Document Document Title
US20130269023 Cloud Based Firewall System And Service  
A cloud-based firewall system and service is provided to protect customer sites from attacks, leakage of confidential information, and other security threats. In various embodiments, such a...
US20110225647 Cloud Based Firewall System And Service  
A cloud-based firewall system and service is provided to protect customer sites from attacks, leakage of confidential information, and other security threats. In various embodiments, such a...
US20080161753 INFUSION PUMP  
An infusion pump which includes a fingerprint reader to verify that a patient or a user is authorized to activate a patient-controlled analgesic button. The fingerprint reader can be integrated...
US20120222108 SYSTEM AND METHOD FOR AUTOMATICALLY INITIATING AND DYNAMICALLY ESTABLISHING SECURE INTERNET CONNECTIONS BETWEEN A FIRE-WALLED SERVER AND A FIRE-WALLED CLIENT  
A system and method for automatically and dynamically initiating and establishing secure connections between a Server and a Client using a session control server (SCS). Both the Server and the...
US20120117377 Mobile security protocol negotiation  
A security gateway/home agent controller HAC is used to assign one home agent HA from a plurality of HAs and to identify at least one security protocol that is common between a mobile node MN and...
US20110154432 IP Mobility Security Control  
In a non-limiting and exemplary embodiment, a method is provided for adapting security level between a mobile node and a mobility anchor. An IP mobility binding with an indication of a security...
US20130219485 SYSTEM AND METHOD FOR PROVIDING UNIFIED TRANSPORT AND SECURITY PROTOCOLS  
The system and method described herein may provide unified transport and security protocols. In particular, the unified transport and security protocols may include a Secure Frame Layer transport...
US20110099623 SYSTEM AND METHOD FOR PROVIDING UNIFIED TRANSPORT AND SECURITY PROTOCOLS  
The system and method described herein may provide unified transport and security protocols. In particular, the unified transport and security protocols may include a Secure Frame Layer transport...
US20150058921 APPLICATION ACCELERATION AS A SERVICE SYSTEM AND METHOD  
Disclosed are systems and methods to provide application acceleration as a service. In one embodiment, a system includes a head office to serve an enterprise application comprised of a...
US20110321152 TRUSTED INTERMEDIARY FOR NETWORK LAYER CLAIMS-ENABLED ACCESS CONTROL  
Embodiments of the invention provide a trusted intermediary for use in a system in which access control decisions may be based at least in part on information provided in claims. The intermediary...
US20080256624 SYSTEMS AND METHOD FOR DISTRIBUTED NETWORK PROTECTION  
Through the use of an intermediate party, a first party is given the ability to communicate with a second party, with the communication appearing as if it originated with the intermediate party....
US20110013634 Ipsec Encapsulation Mode  
Described are embodiments directed to negotiating an encapsulation mode between an initiator and a responder. As part of the negotiation of the security association, an encapsulation mode is...
US20120324569 RULE COMPILATION IN A FIREWALL  
A firewall system comprises a rule compiler operable to use florets and factoring to produce a rule data structure that enables a rules engine to apply a rule from a rule set in phases, including...
US20110179480 System and method to protect web forms against spam messages using Tokens instead of using CAPTCHAs  
The problem we solve with this system is the spam on website's forms. Until now this problem has been solved with CAPTHCHAs that help to distinguish between the human users and spambots [0003]....
US20120311693 UPDATING FIREWALL RULES  
A host rule mapping module in a firewall server may receive an update notification from a name server. The update notification may indicate a change to an address associated with a host name of a...
US20110179481 NETWORK AWARE FIREWALL  
Among other things, one or more systems and/or methods for a network aware firewall are disclosed. A method comprises accessing a first network connection from a client computer system and...
US20150150114 Method and System for Providing Secure Remote External Client Access to Device or Service on a Remote Network  
In order to provide secure user access to a device or service on a remote network, upon receipt of a request to access the device or service on a portal on a central server, a request is sent to a...
US20110252462 Authenticating a Remote Host to a Firewall  
A computer implemented method, system, and computer program product for authenticating a remote host to a firewall. The illustrative embodiments allow a requesting host separated from a target...
US20130067562 SYSTEM, METHOD AND PROGRAM TO LIMIT RATE OF TRANSFERRING MESSAGES FROM SUSPECTED SPAMMERS  
A system, method and program product for managing e-mails from a source suspected of sending spam. The e-mails are received at a firewall or router en route to a mail server. A determination is...
US20140189846 COST-EFFECTIVE MOBILE CONNECTIVITY PROTOCOLS  
Structures and protocols are presented for signaling a status or decision concerning a wireless service or device within a region to a network participant or other communication device (smartphone...
US20080320586 SECURITY SYSTEM FOR A COMPUTER NETWORK HAVING A SECURITY SUBSYSTEM AND A MASTER SYSTEM WHICH MONITORS THE INTEGRITY OF A SECURITY SUBSYSTEM  
A security system for a computer network that has a plurality of devices connected thereto comprises a security subsystem, a master system and a secure link. The security subsystem is connected to...
US20130152191 TIMING MANAGEMENT IN A LARGE FIREWALL CLUSTER  
A firewall cluster comprises three or more firewall processing nodes, which report primary node status based on the reporting node's membership in a preexisting cluster. A controller uses the...
US20100325357 SYSTEMS AND METHODS FOR INTEGRATION BETWEEN APPLICATION FIREWALL AND CACHING  
The present invention is directed towards systems and methods for integrating cache managing and application firewall processing in a networked system. In various embodiments, an integrated...
US20140075541 SYSTEMS AND METHODS FOR ACCESSING RESOURCES THROUGH A FIREWALL  
Systems, methods, and computer-readable storage media for providing access to a firewalled resource are provided. A system includes a controller configured to be positioned outside of the firewall...
US20140123267 METHOD AND SYSTEM FOR TCP TURN OPERATION BEHIND A RESTRICTIVE FIREWALL  
A method at a computing client located behind a NAT and restrictive-access firewall, including establishing a control connection with a TCP TURN server utilizing a port capable of traversing the...
US20140317720 NEGOTIATION OF SECURITY PROTOCOLS AND PROTOCOL ATTRIBUTES IN SECURE COMMUNICATIONS ENVIRONMENT  
Methods of communicatively connecting first and second endpoints are disclosed. One method includes transmitting from a first endpoint to a second endpoint a connection request, the connection...
US20080313461 SECURITY ASSOCIATION VERIFICATION AND RECOVERY  
Example embodiments herein include a verification process that provides a safe and efficient mechanism for recovering security associations between network devices. More specifically, the...
US20140259147 SMART ROUTER  
An example router device disclosed herein functions as a transport level proxy and application level proxy, is able to host both authenticated user and device sessions with stored session state...
US20110258696 System and Method for Centralized Station Management  
In one embodiment of the invention, a wireless network is adapted with a wireless network switch in communication with a plurality of access points, which are in communication with one or more...
US20080235786 Computer Maintenance Method and System  
Provided is a method of remotely maintaining a computer system connected to a first private network of a first organization from a maintenance computer connected to a second private network of a...
US20080209541 Computer Network Intrusion Detection System and Method  
A method and system for identifying an attacker device attempting an intrusion into a TCP/IP protocol based network that includes a managed device and a security event log. The managed device...
US20140041013 METHOD AND SYSTEM FOR MESSAGING SECURITY  
An e-mail firewall applies policies to e-mail messages transmitted between a first site and a plurality of second sites. The e-mail firewall includes a plurality of mail transfer relay modules for...
US20130198798 E-MAIL FIREWALL WITH POLICY-BASED CRYPTOSECURITY  
An e-mail firewall applies policies to e-mail messages between a first site and second sites in accordance with administrator selectable policies. The firewall includes a simple mail transfer...
US20090205040 COMPUTER DATA PRODUCT LICENSE INSTALLATION / UPDATE CONFIRMATION  
An authenticated digital confirmation of an installation or an update of a licensed computer data product, for providing the licensor with a validation that the installation/update was carried out...
US20150128248 SYSTEM, METHOD, AND COMPUTER PROGRAM FOR PREVENTING INFECTIONS FROM SPREADING IN A NETWORK ENVIRONMENT USING DYNAMIC APPLICATION OF A FIREWALL POLICY  
A method for containing a threat in network environment using dynamic firewall policies is provided. In one example embodiment, the method can include detecting a threat originating from a first...
US20140143853 NETWORK QUARANTINE SYSTEM, NETWORK QUARANTINE METHOD AND PROGRAM THEREFOR  
To isolate a terminal from a network immediately after a quarantine agent is uninstalled therefrom, a policy readout unit reads out a policy from a policy database and a policy check unit...
US20070157306 Network threat detection and mitigation  
A network switch automatically detects undesired network traffic and mirrors the undesired traffic to a security management device. The security management device determines the source of the...
US20110239291 Detecting and Thwarting Browser-Based Network Intrusion Attacks For Intellectual Property Misappropriation System and Method  
Detecting and thwarting browser-based network intrusion attacks for intellectual property misappropriation is provided by enabling a local machine to direct retrieval of resources using uniform...
US20110214175 METHOD FOR MITIGATING ON-PATH ATTACKS IN MOBILE IP NETWORK  
In one aspect of the invention, a mobile node (MN) participates in a first return routability procedure with a home agent (HA) and a correspondent node (CN), including generating a first binding...
US20150052347 FILE-BASED APPLICATION PROGRAMMING INTERFACE PROVIDING SELECTABLE SECURITY FEATURES  
A data communication security system is disclosed that includes a network interface including a first security module implementing a first security architecture, and a second security module...
US20140201829 FILE-BASED APPLICATION PROGRAMMING INTERFACE PROVIDING SELECTABLE SECURITY FEATURES  
A data communication security system is disclosed that includes a network interface including a first security module implementing a first security architecture, and a second security module...
US20130124851 FILE-BASED APPLICATION PROGRAMMING INTERFACE PROVIDING SELECTABLE SECURITY FEATURES  
A data communication security system is disclosed that includes a network interface including a first security module implementing a first security architecture, and a second security module...
US20060282893 Network information security zone joint defense system  
A network information security zone joint defense system is provided, which monitors a network connection status through a network defense appliance. Once the network defense appliance detects a...
US20070157301 State-full perimeter security for data networks  
The described embodiments include a system for controlling communications between a first network and a second network including a plurality of in-line security devices, the in-line security...
US20150229608 METHOD FOR CONFIGURING NETWORK NODES OF A TELECOMMUNICATIONS NETWORK, TELECOMMUNICATIONS NETWORK, PROGRAM AND COMPUTER PROGRAM PRODUCT  
A method for configuring network nodes of a telecommunications network includes configuring a remote network node of a plurality of remote network nodes based on a first set of configuration...
US20090165116 Methods And Systems For Providing A Trust Indicator Associated With Geospatial Information From A Network Entity  
Methods and systems are described for providing a trust indicator associated with geospatial information from a network entity. In one embodiment, first geospatial information identifying a first...
US20120291112 AUTOMATIC ACCESS TO NETWORK DEVICES USING VARIOUS AUTHENTICATION SCHEMES  
An access discovery method and system discovers and stores the proper access protocol for each device on a network. The discovery process includes progressively sequencing through state...
US20090328188 CONTEXT-BASED SEMANTIC FIREWALL FOR THE PROTECTION OF INFORMATION  
A method, information processing system, and network limit access to an electronically available information asset. A request (304) from a source (204) to exchange an electronically available...
US20080115205 Methods, network services, and computer program products for recommending security policies to firewalls  
Recommending a security policy to a firewall, includes receiving a request from a firewall for a recommendation as to whether the firewall should allow or block a detected present communication...
US20140237584 SYSTEM AND METHOD FOR REDIRECTED FIREWALL DISCOVERY IN A NETWORK ENVIRONMENT  
A method is provided in one example embodiment that includes receiving metadata from a host over a metadata channel. The metadata may be correlated with a network flow and a network policy may be...

Matches 1 - 50 out of 294 1 2 3 4 5 6 >