Match Document Document Title
US20090328188 CONTEXT-BASED SEMANTIC FIREWALL FOR THE PROTECTION OF INFORMATION  
A method, information processing system, and network limit access to an electronically available information asset. A request (304) from a source (204) to exchange an electronically available...
US20090319884 ANNOTATION BASED NAVIGATION OF MULTIMEDIA CONTENT  
A disclosed service for enabling enhanced navigation of a program of multimedia content includes enabling a user to access annotation data associated with the program. The annotation data is...
US20140096192 PUTTING IN PLACE A SECURITY ASSOCIATION OF GBA TYPE FOR A TERMINAL IN A MOBILE TELECOMMUNICATIONS NETWORK  
A method is provided for putting in place a security association of GBA type for a terminal. The method includes the following steps, executed in a network access server, following the receipt of...
US20140189810 NETWORK SECURITY AS A SERVICE USING VIRTUAL SECURE CHANNELS  
Disclosed are methods, devices, and systems to provide an end-to-end secure transaction over a network. In one embodiment, a machine-implemented method comprises opening an in-band channel or an...
US20090172779 MANAGEMENT OF SPLIT AUDIO/VIDEO STREAMS  
Described herein is a method that includes receiving multiple requests for access to an exposed media object, wherein the exposed media object represents a live media stream that is being...
US20150215299 PROXIMITY-BASED AUTHENTICATION  
A first device requests a protected resource (managed by a second device). A first authentication is performed by the second device upon receipt of the request. The second device provides an audio...
US20130167197 Methods, Systems, and Computer Program Products for Invoking Trust-Controlled Services Via Application Programming Interfaces (APIs) Respectively Associated Therewith  
A trust evaluation may be obtained for a network element in a communication network. Based on this trust evaluation, one or more services may be invoked to address the risk that a potentially...
US20150033291 MULTI-ISSUER SECURE ELEMENT PARTITION ARCHITECTURE FOR NFC ENABLED DEVICES  
A method for providing secure element partitions for an NFC enabled device for a plurality of card issuers, the method comprising creating in a secure element of the NFC enabled device a plurality...
US20140259108 DEVICES FOR PROVIDING SECURE REMOTE ACCESS  
A method for providing secure remote access by a controller is described. The method includes sending one or more endpoint requests. The method also includes receiving authentication service...
US20120174190 System and Methods for Network Authentication  
Exemplary systems and methods for network authentication are provided. Exemplary systems include an application program interface configured for receiving a request for an authentication code, a...
US20150052133 LOCATION-BASED SECURITY SYSTEM FOR PORTABLE ELECTRONIC DEVICE  
A location-dependent security method and system for a portable electronic device is disclosed. Without requiring that the user enter any location information, the system determines one or more...
US20110197261 SERVICE ACTIVATION METHOD, SERVICE PROVIDING METHOD, TERMINAL DEVICE, AND SERVER  
A method for providing a mobile advertising (MobAd) service includes: receiving a MobAd service activation request sent by a terminal, where the MobAd service activation request includes collected...
US20120291090 ACCESS MANAGEMENT ARCHITECTURE  
An access management system architecture is provided. In one embodiment, the architecture comprises modular and decoupled components, which allow composability of heterogeneous solutions.
US20110067089 METHOD FOR SWITCHING A MOBILE TERMINAL FROM A FIRST ACCESS ROUTER TO A SECOND ACCESS ROUTER  
A method of switching a mobile terminal from a first access router to a second access router, the terminal having previously set up a secure connection with the first access router with which is...
US20120023552 METHOD FOR DETECTION OF A ROGUE WIRELESS ACCESS POINT  
A method for processing a packet is described herein. The packet is received by a network device of a wired network. The packet is filtered if a field in the packet matches a marker designated for...
US20110055561 ACCESS AUTHENTICATION METHOD SUITABLE FOR THE WIRE-LINE AND WIRELESS NETWORK  
An access authentication method includes pre-establishing a security channel between the authentication server of the access point and the authentication server of the user terminal and performing...
US20070011722 Automated asymmetric threat detection using backward tracking and behavioral analysis  
A method and system of predictive threat detection is provided which utilizes data collected via a ubiquitous sensor network spread over a plurality of sites in an urban environment. The method...
US20130014220 Method and system for processing authenticator relocation request  
The disclosure provides a method and a system for processing an authenticator relocation request. When detecting that initial authentication, re-authentication or authenticator relocation is being...
US20140289799 COMMUNICATION APPARATUS, AUTHENTICATION SYSTEM AND AUTHENTICATION METHOD  
A communication apparatus transmits an authentication frame to an authentication apparatus and receiving a response frame for response to the authentication frame from the authentication apparatus...
US20150264024 SYSTEM AND METHOD FOR CONFIDENTIAL REMOTE COMPUTING  
A system, method, device and protocols are disclosed. Each and combined they protect computation and data hosted on remote computing resources from first party attacks. First party attacks refer...
US20150040191 SYSTEM AND METHOD OF FACILITATING THE IDENTIFICATION OF A COMPUTER ON A NETWORK  
A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to...
US20140013393 SYSTEM AND METHOD OF FACILITATING THE IDENTIFICATION OF A COMPUTER ON A NETWORK  
A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to...
US20080276303 Network Type Advertising  
A technique for network type awareness involves providing network type information associated with a wireless network to stations. The stations, or users of the stations, can then select which...
US20130031608 METHODS AND APPARATUS TO TRANSFER MANAGEMENT CONTROL OF A CLIENT BETWEEN SERVERS  
An example network device includes a processor configured to execute an Open Mobile Alliance (OMA) Device Management (DM) server, the OMA DM server to perform operations of: participating in...
US20120222091 METHODS AND APPARATUS FOR USE IN A GENERIC BOOTSTRAPPING ARCHITECTURE  
According to an aspect of the present invention there is provided a method of obtaining authentication information for use in a Generic Bootstrapping Architecture, GBA, employed in a network with...
US20080005784 PROACTIVE NETWORK SECURITY SYSTEMS TO PROTECT AGAINST HACKERS  
A proactive network security system to protect against hackers for the proactive automated defense against hackers by automatically finding, reporting, communicating with countermeasures about and...
US20090110196 Key management system and method for wireless networks  
A key management method for wireless networks is disclosed. Before a mobile station residing in a first ASN switches to a neighboring second ASN, an authentication process between the mobile...
US20120084836 Providing access levels to services based on mobile device security state  
A mobile device's level of access to services provided by a service provider is based on a current security state assessment of the mobile device. Mobile devices are granted different access...
US20150067776 METHOD AND APPARATUS FOR COMPILATION OF FINITE AUTOMATA  
A method and corresponding apparatus are provided implementing run time processing using Deterministic Finite Automata (DFA) and Non-Deterministic Finite Automata (NFA) to find the existence of a...
US20120096517 SYSTEM AND METHOD FOR PROVIDING A SECURE CONNECTION BETWEEN NETWORKED COMPUTERS  
Embodiments disclosed herein provide a system, method, and computer program product for obtaining secure connectivity between networked computing devices. The invention comprises utilizing a...
US20140245391 Authentication Method  
A method of authenticating a user to a transaction at a terminal (10), wherein a user identification is transmitted from the terminal (10) to a transaction partner (12) via a first communication...
US20070098225 Age verification method for website access  
A method of verifying the age of a user desiring to access an age-controlled website includes the steps of: providing a live image of a user to an age-verification site; providing an image of an...
US20120266211 TRANSPARENT DATABASE CONNECTION RECONNECT  
A first computer establishes a logical connection to a second computer for requesting and/or receiving data from a database. A logical connection is independent of the underlying physical network...
US20130086639 MOBILE APPLICATION, IDENTITY INTERFACE  
Techniques for managing identities are provided. In some examples, identity management, authentication, authorization, and token exchange frameworks may be provided for use with mobile devices,...
US20150195270 PRIVATE AND SECURE COMMUNICATION ARCHITECTURE WITHOUT UTILIZING A PUBLIC CLOUD BASED ROUTING SERVER  
A method for use with a public cloud network is disclosed. The method includes setting up a private cloud routing server and a smart device client in a client server relationship. The private...
US20150163213 PRIVATE AND SECURE COMMUNICATION ARCHITECTURE WITHOUT UTILIZING A PUBLIC CLOUD BASED ROUTING SERVER  
A method for use with a public cloud network is disclosed. The method includes setting up a private cloud routing server and a smart device client in a client server relationship. The private...
US20090177514 SERVICES USING GLOBALLY DISTRIBUTED INFRASTRUCTURE FOR SECURE CONTENT MANAGEMENT  
Secure content management is enabled as a cloud-based service through which security protection and policy enforcement may be implemented for both on-premise network users and roaming users. The...
US20130091537 RESTRICTING NETWORK AND DEVICE ACCESS BASED ON PRESENCE DETECTION  
In an example embodiment, a technique that applies a network policy responsive to specified events, or triggers, to a networked device. If a specified event occurs, the network policy may restrict...
US20090288145 INTERACTIVE CLIENT MANAGEMENT OF A WHITE LIST  
System(s) and method(s) provide access management to femtocell service through access control list(s) (e.g., white list(s)). Such white list(s) can be configured via a networked interface which...
US20110154443 SYSTEMS AND METHODS FOR AAA-TRAFFIC MANAGEMENT INFORMATION SHARING ACROSS CORES IN A MULTI-CORE SYSTEM  
A method for propagating authentication session information to a plurality of cores of a multi-core device includes establishing, by an authentication virtual server executing on a first core of a...
US20120060204 Methods and Apparatus for Scalable Secure Remote Desktop Access  
The invention provides scalable, secure, and easily administerable methods and systems for providing remote access to networked resources by combing aspects of physical access limitation measures...
US20130152186 FILTERING KERNEL-MODE NETWORK COMMUNICATIONS  
Some embodiments of the invention are directed to techniques for determining whether a process on a computer system that is sending or receiving data, or is attempting to send or receive data,...
US20110078549 DECOUPLING OF MEASURING THE RESPONSE TIME OF A TRANSPONDER AND ITS AUTHENTICATION  
Reader (420) for determining the validity of a connection to a transponder (440), designed to measure a response time of a transponder (440) and to authenticate the transponder (440) in two...
US20150067774 AUTOMATED METHOD FOR INCREASING AND MAINTAINING THE NUMBER OF SOCIAL MEDIA FOLLOWERS  
An automated method, which acts on increasing and maintaining the number of social media followers of a particular identification (ID) on social media, is proposed. The proposed method may operate...
US20130042298 SYSTEM AND METHOD FOR GENERATING TRUST AMONG DATA NETWORK USERS  
A system and a method in which a user makes a service request with a service provider through a data network. The service provider receives from trust generating equipment, located in an access...
US20140082696 DISTANCE BOUNDING PROTOCOL WITH MINIMAL VARIANCE PROCESSING  
The method for communicating between a first device and a second device, the first and second devices being structured and configured for communicating via a communication channel by exchanging...
US20140282869 CERTIFICATE BASED PROFILE CONFIRMATION  
Disclosed are various embodiments for controlling access to resources in a network environment. Methods may include installing a profile on the device and installing a certificate included in or...
US20120185696 DEVICE INTRODUCTION AND ACCESS CONTROL FRAMEWORK  
In an embodiment, a method includes registering applications and network services for notification of an out-of-band introduction, and using the out-of-band introduction to bootstrap secure...
US20120042358 Proctoring System  
A computer implemented method and system is provided for authenticating and monitoring an examination environment of a user. A proctoring software provided on a user's computing device...
US20100023774 INFORMATION SECURITY DEVICE  
An information security device is provided that, when information is circulated through a chain, permits changing of a usage rule for the information or collection (deletion) of the information...