Match Document Document Title
US20120222090 METHOD OF COMMUNICATIONS AND COMMUNICATION NETWORK INTRUSION PROTECTION METHODS AND INTRUSION ATTEMPT DETECTION SYSTEM  
A method, system and computer readable medium for protecting a communications device connected to a communications system against an unauthorized intrusion, including providing a variable...
US20110271323 Image forming apparatus, authentication method, and recording medium  
An image forming apparatus is configured to receive user authentication information and perform image formation based on an image formation request and is connected to an external authentication...
US20100299219 Configuration and Management of Add-ons to Digital Application Programs for Network-Based Distribution  
An improved system and method for configuring, submitting, distributing and/or managing add-ons for digital products previously submitted to a product distribution site are disclosed. The add-ons...
US20120096519 Methods and Apparatuses for Avoiding Denial of Service Attacks By Rogue Access Points  
Methods and apparatuses are provided for avoiding denial of service attacks by rogue access points. A method may include attempting to verify activation of access stratum security by an access...
US20100332340 METHOD AND SYSTEM TO FACILITATE ON-LINE TRADING  
A method and system to facilitate on-line transactions is presented. An example system, in one embodiment, comprises a content scanner, a security symbol resolver, a web page manipulator, an event...
US20130014217 Adapting Extensible Authentication Protocol for Layer 3 Mesh Networks  
Techniques are provided for adaptive routing of authentication packets in a network, such as a wireless mesh network. At an authenticated device in the network, an authentication packet is...
US20120291098 Multimode Authentication  
Assigning clients to VLANs on a digital network. A client attaching to a digital network through a network device is initially assigned to a first VLAN. This VLAN may have restricted access and is...
US20140007193 RULES BASED DETECTION AND CORRECTION OF PROBLEMS ON MOBILE DEVICES OF ENTERPRISE USERS  
A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application servers, etc.) using their mobile...
US20150249630 Method and System for Controlling Message of Mobile Terminal and Mobile Terminal  
A method and system for controlling a message of a mobile terminal and the mobile terminal including an application platform for receiving a message to be processed of the mobile terminal, which...
US20130079032 SYSTEMS FOR FASTER ACCESS AND DOWNLOAD OF DIGITAL CONTENT IN MOBILE WIRELESS DEVICES USING WIRELLESS DEVICE BROWSER  
A handheld wireless device makes a request for service from a server of a business on a global network, the request originating from the wireless device is automatically routed to the closest...
US20120159574 METHOD AND SYSTEM FOR PROVIDING INFORMATION SHARING SERVICE FOR NETWORK ATTACKS  
A system is provided to provide an information sharing service for network attacks. The system includes a service provider configured to collect and analyse information on detection and response...
US20100251144 THIRD-PARTY-SECURED ZONES ON WEB PAGES  
A computer-implemented method is provided, including storing, in an authentication server system, unique identification codes assigned to respective entities. Secure zone HTML code elements are...
US20150113597 Human Verification by Contextually Iconic Visual Public Turing Test  
There is provided a system and method for human verification by a contextually iconic visual public Turing test. There is provided a method comprising receiving a request to verify whether a...
US20140289797 Networked Security System with Translating Router  
A system and method for protocol translation between security devices in a security network using a transforming router. The router utilizes protocol templates to identify the protocols that...
US20130097688 SERVICE ORIENTED SECURE COLLABORATIVE SYSTEM FOR COMPARTMENTED NETWORKS  
A system receives a request to store a document in a database, receives a user security token, analyzes the document to determine an adjudicated security level for the document, compares the user...
US20130205370 MOBILE HUMAN CHALLENGE-RESPONSE TEST  
Methods and systems for verifying whether a user requesting an online account is likely a human or an automated program are described. A request for an online account may be received from a mobile...
US20110113480 CARRIER-GRADE PEER-TO-PEER (P2P) NETWORK, SYSTEM AND METHOD  
A computing network, including: a plurality of peer computing devices including code, which when executed by a peer computing device causes the executing peer computing device to cooperate with at...
US20140033293 SECURE TELEMATICS  
A telematics system that includes a security controller is provided. The security controller is responsible for ensuring secure access to and controlled use of resources in the vehicle. The...
US20120131642 Identity management trust establishment method, identity provider and service provider  
A method for establishing an identity management trust, and an IDentification Provider (IDP) and a Service Provider (SP) are provided in the present disclosure. The method comprises: after...
US20140007192 PROVIDING SECURE MOBILE DEVICE ACCESS TO ENTERPRISE RESOURCES USING APPLICATION TUNNELS  
A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application servers, etc.) using their mobile...
US20110296493 MOBILE TERMINAL AND CONTROL METHOD THEREOF  
A mobile terminal and a control method thereof are provided. The mobile terminal selects a method of interfacing an identification device with the mobile terminal according to whether the mobile...
US20150195289 MOBILE HUMAN CHALLENGE-RESPONSE TEST  
Methods and systems for verifying whether a submission of a request is likely from a human user or an automated program are described. A request may be received from a user device. A human...
US20130061310 SECURITY SERVER FOR CLOUD COMPUTING  
A system, method, and server improving the security of accessing Internetworked computer resources, especially over public access connections, without requiring additional servers from either the...
US20100325695 CONTENT DELIVERY SERVER, CONTENT PROVIDING SERVER, CONTENT DELIVERY SYSTEM, CONTENT DELIVERY METHOD, CONTENT PROVIDING METHOD, TERMINAL DEVICE, CONTROL PROGRAM, AND COMPUTER-READABLE STORAGE MEDIUM  
A foreign gateway (FGW) (105) of the present invention obtains, via a terminal device (107), authentication information which proves access authority with respect to a home gateway (HGW) (104). In...
US20150163672 MOBILE TERMINAL, DEVICE AND CONTROL METHOD THEREOF  
A device includes: a short-range communicator which is configured to communicate with at least one mobile terminal by a short-range communication method; and a controller which is configured to...
US20110231904 Automatic Notification System and Process  
Receiving a notification message by a mobile subscriber can include establishing a session with a notification service; maintaining a persistent communication connection with the notification...
US20140297412 Mobile Media Device User Interface  
A mobile media device user interface is described. In one or more implementations, output of a plurality of audio content is monitored by a mobile media device. Each of the audio content was...
US20150128205 METHODS AND SYSTEMS FOR SECURE NETWORK CONNECTIONS  
Context information associated with a mobile communications device and a network connection for the mobile communications device is collected. A security policy is applied to determine whether the...
US20130340040 METHOD AND APPARATUS OF CONSTRUCTING SECURE INFRA-STRUCTURE FOR USING EMBEDDED UNIVERSAL INTEGRATED CIRCUIT CARD  
Provided are a method and device for building a security-based environment that uses an eUICC. A method of building a trust relationship in an eUICC environment includes transmitting, by a trust...
US20130097669 Behavioral fingerprint controlled theft detection and recovery  
A computationally implemented method includes, but is not limited to: determining a behavioral fingerprint associated with a network accessible user of one or more devices, the behavioral...
US20150058931 System and Method for Identity Management  
Some implementations may provide a machine-assisted that includes: receiving, from a participant entity, a request to determine a trustworthiness of a transaction request, the transaction request...
US20130305325 Methods for Thwarting Man-In-The-Middle Authentication Hacking  
Methods for user authentication over unsecured networks are provided. Such methods rely on the user having one or two electronic devices, comprising two unique network addresses, and the methods...
US20100313240 AUTHENTICATION SYSTEM AND METHOD BETWEEN SERVER AND CLIENT  
The present invention relates to an authentication system and method between a server and a client. The same authentication method is provided regardless of authentication media or authentication...
US20150089585 Scored Factor-Based Authentication  
Concepts and technologies are disclosed herein for scored factor-based authentication. A verification service can receive an authentication request from a requestor, wherein the authentication...
US20130074150 Presenting Visual Challenges for Verifying Human Interaction  
A computing device-implemented method includes providing a presentable visual challenge for determining if access should be granted. The visual challenge includes presenting obscured text wherein...
US20130086635 SYSTEM AND METHOD FOR COMMUNICATION IN A NETWORK  
A method for providing secure communication in an electrical power distribution network includes detecting an enhanced threat level in the electrical power distribution network. A plurality of...
US20140237547 SPECTRUM ACCESS SYSTEM  
A method for dynamically managing spectrum access and supporting multiple tiers of users is provided. A spectrum access server receives a request from a device to access a segment of spectrum, and...
US20140137193 COMMUNICATION SYSTEM, METHOD FOR PERFORMING THE SAME AND COMPUTER READABLE MEDIUM  
A communication system including: a first acquiring unit configured to obtain start request information for specifying whether participation in the session of a terminal is limited or not, and...
US20110055894 Firewall and NAT Traversal for Social Networking and/or Content Sharing On Mobile Devices  
A method for facilitating firewall and NAT traversal during social networking and/or content sharing via a mobile device uses an instant message protocol to establish a near real-time...
US20150052582 SECURE AREA FOR APPS  
Privacy and restricted access are provided for functions, applications, and services on a computing device. An area accessible to a user interface is provided. A request from a user is accepted,...
US20130014221 SECURITY ARRANGEMENTS FOR EXTENDED USB PROTOCOL STACK OF A USB HOST SYSTEM  
Security arrangements for a universal serial bus (USB) protocol stack of a USB host system are provided. The security arrangements prevent an unauthorized or suspicious USB device from...
US20140310644 MULTI-MODE USER INTERFACE  
An approach is provided to display a grid user-interface on a display. The grid user-interface includes a number of medium-sized windows that are displayed in a grid format. Each of the...
US20130073463 ISSUER TRUSTED PARTY SYSTEM  
Embodiments of the invention are directed to an authentication platform capable of storing authentication data received from an issuer access control server. The authentication platform can...
US20150135287 AUTOMATED SDK INGESTION  
In an assessment or audit of a computer system, an auditing subsystem will parse software development kit (“SDK”) interfaces and obtain customer usage, configuration and security information by...
US20150058929 SYSTEM AND METHOD FOR TRUSTED MOBILE COMMUNICATIONS  
Systems and methods for trusted mobile communications are described. A network system provisions a mobile client system with a collection of security parameters on a per application basis and a...
US20140282878 METHODS, APPARATUSES AND SYSTEMS FOR PROVIDING USER AUTHENTICATION  
The methods, apparatuses and systems described herein provide a system for authenticating users, authorization or information during secure transactions. The system may include a transaction...
US20120227087 CROSS PLATFORM SOCIAL NETWORKING AUTHENTICATION SYSTEM  
Disclosed in one example is a method of authenticating with multiple social network services. The method may include storing first authentication information associated with a user for a first...
US20090049520 METHOD OF CONTROLLING A CONFERENCE SYSTEM, PROGRAM PRODUCT, AND STORAGE MEDIUM  
A conference system includes a storage unit configured to store electronic data used as conference material, a display unit configured to display electronic data stored in the storage unit, an...
US20140351897 APPARATUS AND METHODS FOR DEVICE AUTHORIZATION IN A PREMISES NETWORK  
Apparatus and methods for enabling protected premises networking capabilities. In one embodiment, a white list of devices authorized to access a premises network and a black list of device not...
US20110093790 PREEMPTIVE CACHING FOR WEB-BASED SYSTEMS  
The present invention provides a system and methods for pre-fetching of customized web content associated with a user profile in a cache upon receiving user identification, but before the user...