Match Document Document Title
US20140068707 Internetwork Authentication  
A technique for network authentication interoperability involves initiating an authentication procedure on a first network, authenticating on a second network, and allowing access at the first...
US20140289820 SYSTEM AND METHOD FOR ADAPTIVE USER AUTHENTICATION  
A system, apparatus, method, and machine readable medium are described for adaptive authentication. For example, one embodiment of an apparatus comprises: an adaptive authentication module to...
US20110088078 Authentication Failure in a Wireless Local Area Network  
In the event of an authentication process failure, a mobile station bans a connection profile storing the credentials provided by the mobile station when initiating the failed authentication...
US20140259109 EDGE SERVER SELECTION FOR ENHANCED SERVICES NETWORK  
An enhanced services network provides enhanced privacy and/or security over public networks to client subscribers of the service. Client devices access the enhanced services network over a public...
US20140090021 COMPREHENSIVE AUTHENTICATION AND IDENTITY SYSTEM AND METHOD  
A comprehensive authentication and identity system and method are disclosed. A central profile is created for a user which includes user information that can be passed back or otherwise utilized...
US20150150087 DYNAMIC EXPRESSION EVALUATION BASED GROUPING OF VM OBJECTS FOR NETWORKING AND SECURITY SERVICES IN A VIRTUALIZED COMPUTING SYSTEM  
Techniques for grouping virtual machine (VM) objects for networking and security services in a virtualized computing system are described. In one example embodiment. VM attributes and identity...
US20150229663 NETWORK INFRASTRUCTURE OBFUSCATION  
A shadow network, which can be a virtual reproduction of a real, physical, base computer network, is described. Shadow networks duplicate the topology, services, host, and network traffic of the...
US20150074759 APPLICATION TRUST-LISTING SECURITY SERVICE  
Provided are techniques for controlling access to computing resources comprising generating a first fingerprint corresponding to a first executable file; storing the fingerprint in a...
US20130198808 Integrated Security Platform  
An integrated security platform that enables a wide variety of network security elements to share security information in a comprehensive manner so as to provide automation of policy and security...
US20140130132 FEATURE SET DIFFERENTIATION BY TENANT AND USER  
A system for online collaboration includes an application for online collaboration, the application including an application feature set, a control module programmed to receive a request from a...
US20140282864 THROTTLING AND LIMITING THE SCOPE OF NEIGHBOR SOLICITATION (NS) TRAFFIC  
In one embodiment, a switch in a computer network may receive a neighbor solicitation (NS) message for a target node for which no neighbor authentication (NA) reply has been received at the...
US20140101720 CONFIGURING INITIAL SETTINGS OF A NETWORK SECURITY DEVICE VIA A HAND-HELD COMPUTING DEVICE  
Process, equipment, and computer program product code for configuring a network security device using a hand-held computing device are provided. Default initial settings for a network security...
US20130185767 CLUSTERED AAA REDUNDANCY SUPPORT WITHIN A RADIUS SERVER  
In general, techniques are described for supporting interchassis redundancy (ICR) by a plurality of network access servers (NASes) that are members of an ICR. For example, techniques may be used...
US20110004926 Automatically Handling Proxy Server and Web Server Authentication  
A mechanism is provided for automatically handling server authentication. Responsive to receiving a response to a synthetic transaction from a server, a determination is made as to whether the...
US20120116590 RACK-LEVEL MODULAR SERVER AND STORAGE FRAMEWORK  
A modular rack-level server and storage framework is disclosed. The modular rack system includes a plurality of chassis placed in one or more racks and a plurality of sleds placed in each chassis....
US20120005726 TRANSACTIONAL SERVICES  
Methods and systems are provided for supporting electronic transactions, including transactions that are provided with per-user, per-device and per-domain security across domains of multiple...
US20120005725 TRANSACTIONAL SERVICES  
Methods and systems are provided for supporting electronic transactions, including transactions that are provided with per-user, per-device and per-domain security across domains of multiple...
US20110321127 TRANSACTIONAL SERVICES  
Methods and systems are provided for supporting electronic transactions, including transactions that are provided with per-user, per-device and per-domain security across domains of multiple...
US20120054829 HOST USABILITY AND SECURITY VIA AN ISOLATED ENVIRONMENT  
Architecture that addresses security concerns while still providing transparent user experience with ability to perform tasks. When a user machine is considered incompliant or compromised due to,...
US20140082693 UPDATING SECURITY BINDINGS IN A NETWORK DEVICE  
A network device includes a security binding table. The network device is configured to couple to a network and configured to receive security information from a source device. A processor is...
US20140165142 INTERACTIVE CLOUD COMMUNICATION SYSTEM  
An interactive cloud communication system includes at least a client end and a cloud. The client end includes a browser. The cloud includes a cloud server module and a server module connected to...
US20130104194 METHOD AND SYSTEM FOR GRANT MANAGEMENT AND DEVELOPMENT CYCLE OPTIMIZATION  
An apparatus, method, and system for federating grant management, project management, and funding in a web-based environment are disclosed. The apparatus, method, and system may include a module...
US20140237544 AUTHENTICATION METHOD, TRANSFER APPARATUS, AND AUTHENTICATION SERVER  
It is provided an authentication method for realizing a network authentication function for an authentication system, the authentication system including an authentication server for...
US20110209076 SYSTEM AND METHOD FOR MONITORING HUMAN INTERACTION  
A method & system for human interactive proof (HIP) is provided. A user is provided to respond a query linked to a logical captcha object or an analytical captcha object. Upon receiving inputs...
US20130263216 PARTICIPANT AUTHENTICATION AND AUTHORIZATION FOR JOINING A PRIVATE CONFERENCE EVENT VIA A CONFERENCE EVENT ENVIRONMENT SYSTEM  
Concepts and technologies are described herein for a mechanism by which participants who have been invited to attend a conference event and who are physically present within a conference event...
US20140033273 AUTOMATING CALLS BETWEEN SEPARATE AND DISTINCT APPLICATIONS FOR INVOKING AN IDENTITY VERIFICATION FUNCTION  
A method, software and system allows for the novel and seamless integration between disparate hardware and software systems to facilitate strong authentication and identity assertion of an...
US20100306821 ACCOUNT-RECOVERY TECHNIQUE  
Embodiments of a computer system, a method, and a computer-program product (e.g., software) for use with the computer system are described. These embodiments may be used to evaluate a user request...
US20150201334 WIRELESS LOCAL AREA NETWORK ACCESS METHOD, BASE STATION CONTROLLER, AND USER EQUIPMENT  
The present application provides a method for accessing a wireless local area network, a base station controller, and a user equipment. The method includes: determining, by a base station...
US20140164421 METHOD AND SYSTEM FOR CONTENT CATEGORIZATION  
Embodiments of the present invention disclose a method for content categorization, where the method comprises transmitting, by a content categorization request entity, a categorization ability...
US20150067777 SYSTEMS AND METHODS FOR AUTHENTICATING NODES  
To authenticate nodes, a connection between a first node and a second node may be identified. A first set of nodes having connections with the first node and assigned to a first plurality of...
US20110154441 ONLINE DEVELOPMENT ENVIRONMENT SERVER, ONLINE MARKETPLACE SERVER, ONLINE DEVELOPMENT ENVIRONMENT CONSTITUTING METHOD, AND DEVELOPED APPLICATION PROVIDING METHOD  
An online development environment server, online marketplace server, an online development environment configuring method, and a developed application providing method are provided. The online...
US20110078762 MOBILE OR USER DEVICE AUTHENTICATION AND TRACKING  
A system and method, according to one or more embodiments, includes a server computing device configured to communicate with a network-based device via a network; a visitor identification, in...
US20110113473 METHOD OF ACCESSING APPLICATIONS IN A SECURE MOBILE ENVIRONMENT  
A method of accessing in a mobile communication device (4) an application (5, 14, 26), the application (5, 14, 26) being issued by a Service Provider (2), from a trusted application, also known as...
US20120278856 METHOD, DEVICE, AND SYSTEM FOR SERVICE PRESENTATION  
A method, device and system for service presentation, which includes: receiving a presentation request message; acquiring presentation information from the presentation request message; storing...
US20110126264 SYSTEM AND METHOD FOR PROVIDING A SECURE NETWORK ON ANOTHER SECURE NETWORK  
The present invention provides a system and method for providing a closed or secure network” on another closed or secure network. The system enables linking at least one acquirer network operating...
US20120331528 APPARATUS, SYSTEMS AND METHODS FOR SECURE AND SELECTIVE ACCESS TO SERVICES IN HYBRID PUBLIC-PRIVATE INFRASTRUCTURES  
Embodiments of apparatus, systems and methods facilitate deployment of distributed computing applications on hybrid public-private infrastructures by facilitating secure access to selected...
US20130276073 Systems and Methods for Providing Secure Communications for Transactions  
Embodiments of the present invention provide systems and methods for providing secure communications. One aspect of an embodiment of the invention creates a virtual private connection to a remote...
US20120317633 System and method to control display of a realm name  
A method for dynamically assigning a displayable realm name begins upon receipt of an authentication request to an application, such as a web application, being executed by an application server....
US20110093740 Distributed Intelligent Virtual Server  
A intelligent distributed virtual server for providing distributed services to a plurality of clients, including one or more servers units, each server units storing data and providing service for...
US20110145888 ELECTRONIC MONITORING SYSTEM AND METHOD  
An electronic monitoring system located in a second service area when an electronic monitoring target has moved from a first service area having a first authority to the second service area having...
US20100185463 System of Providing an Internet Web Site that Assists Medical Professionals Draft a Letter of Medical Necessity or Other Documentation for Transmission to a Third Party Payer on Behalf of a Patient and Method of use  
The systems disclosed is an internet based application that allows clinical professionals to write letters of medical necessity to justify therapeutic services and devices recommended by...
US20140236542 INTERIOR SPACES IN A GEO-SPATIAL ENVIRONMENT  
A method, apparatus, and system of interior spaces in a geo-spatial environment are disclosed. In one embodiment, the method includes providing a plurality of user profiles, each user profile in...
US20130086636 SYSTEM AND METHOD FOR RESTRICTING PATHWAYS TO HARMFUL HOSTS IN COMPUTER NETWORKS  
System and methods for restricting accessibility to harmful content on a computer network. Network pathways are explored to study a plurality of investigated hosts from a plurality of diverse...
US20150150084 SYSTEM AND METHODS FOR REMOTE SOFTWARE AUTHENTICATION OF A COMPUTING DEVICE  
The current disclosure relates to techniques for system and methods for software-based management of remote software authentication of at least one entity machine, addressing various...
US20070022470 Universal security management system, device and method for network management  
The present invention relates to network management technologies for communication systems, and discloses a security management system, device and method for network management of communication...
US20110145889 SYSTEM AND METHOD FOR VERIFYING DELIVERY AND INTEGRITY OF ELECTRONIC MESSAGES  
In order to provide third party verification of the content and delivery of an electronic message such as an e-snail, a server receives the e-mail intended to be sent or forwarded to a specified...
US20130047211 METHOD AND APPARATUS FOR NETWORK SESSION VALIDATION  
According to one embodiment, an apparatus may store a plurality of token-based rules. A token-based rule facilitates access to a resource. The apparatus may further store a plurality of tokens....
US20120131638 PROCESSING PERFORMANCE OF REPEATED DEVICE COMPLIANCE UPDATE MESSAGES  
A message comprising an indication of a management key block and an indication of an authorization table is received at a first network device from a second network device. The indication of the...
US20140215580 AUTONOMIC NETWORK PROTECTION BASED ON NEIGHBOR DISCOVERY  
In one implementation, security configuration is automated based on information gathered using autonomic neighbor discovery. The neighbor discovery establishes a realm of trust between neighbors,...
US20140020061 AUTOMATIC PROVISIONING IN MOBILE TO MOBILE PLATFORMS  
Systems and methods for automatically provisioning devices that do not include or cannot provide a unique hardware identifier over a machine-to-machine network. A device or application may provide...