Match Document Document Title
US20110258682 METHOD, APPARATUS, AND SYSTEM FOR PROCESSING SESSION CONTEXT  
A method, an apparatus, and a system for processing session context are disclosed. The method for processing session context includes: receiving a reset notification message that carries a device...
US20130174226 LEVERAGING A PERSISTENT CONNECTION TO ACCESS A SECURED SERVICE  
Leveraging a persistent connection to provide a client access to a secured service may include establishing a persistent connection with a client in response to a first request from the client,...
US20110246439 AUGMENTED QUERY SEARCH  
A query is annotated with a small sketch (e.g. a Bloom filter) that approximates a set of interest that is related to the query. The query and sketch may be forwarded to index servers that each...
US20150256541 USER AUTHENTICATION  
Providing a user apparatus access to a computer system including services and authentication levels. A service request is determined for at least one of the services from a user apparatus. A...
US20150256539 USER AUTHENTICATION  
Providing a user apparatus access to a computer system including services and authentication levels. A service request is determined for at least one of the services from a user apparatus. A...
US20140289821 SYSTEM AND METHOD FOR LOCATION-BASED AUTHENTICATION  
A system, apparatus, method, and machine readable medium are described for location-aware authentication. For example, one embodiment of a location-aware method for user authentication comprises:...
US20120291097 SYSTEM AND METHOD FOR MULTI-TASKING OF A MEDICAL IMAGING SYSTEM  
A medical imaging system capable of acquiring medical imaging data of a patient includes a console coupled to the system, the console comprising a computer programmed to enable a first user to...
US20090077624 Forming A Security Network Including Integrated Security System Components and Network Devices  
An integrated security system is described that integrates broadband and mobile access and control with conventional security systems and premise devices to provide a tri-mode security network...
US20120210395 NETWORK INFRASTRUCTURE VALIDATION OF NETWORK MANAGEMENT FRAMES  
A detection-based defense to a wireless network. Elements of the infrastructure, e.g., access points or scanning-only access points, detect intruders by detecting spoofed frames, such as from...
US20110041003 METHOD AND APPARATUS FOR H(e)NB INTEGRITY VERIFICATION AND VALIDATION  
An apparatus and method for providing home evolved node-B (H(e)NB) integrity verification and validation using autonomous validation and semi-autonomous validation is disclosed herein.
US20140020062 TECHNIQUES FOR PROTECTING MOBILE APPLICATIONS  
Techniques for protecting mobile applications are presented. A user's mobile device is provisioned and proxied over a cloud environment with enterprise policy enforced in that cloud environment....
US20110047602 End-of-Session Authentication  
Techniques for facilitating an online transaction session with an end-of-session authentication are provided. The techniques include performing a start-of-session authentication to enable an...
US20110314513 ROLE POLICY MANAGEMENT  
In various embodiments, techniques for role management systems/services are provided. According to an embodiment, a method is provided to allow a role management system to be configured, modified,...
US20150012995 System and Method for Providing Single Sign On Interface for Applications on Mobile Devices  
A system for and method of providing a mobile device user with a mobile single sign-on (MSSO) platform that can interface with multiple mobile applications on the mobile device. A user having a...
US20110016199 SYSTEM FOR ELECTRONIC DEVICE MONITORING  
The present invention relates to telemetry methods and systems and more particularly, to telemetry network connectivity systems, devices and methods. In accordance with various embodiments, a...
US20120144450 Authentication Method in Electronic Commerce  
An authentication method in electronic commerce is disclosed. The authentication method includes steps of a first side utilizing a first device to access an interactive interface, and the first...
US20120204230 AUTHENTICATION OF AN END USER  
A method and System for authenticating an end user. A first pattern of colored quadrilaterals is generated. A second pattern of multiple colored nodes that include a first subset of nodes is...
US20140189791 SYSTEM AND METHOD FOR IMPLEMENTING PRIVACY CLASSES WITHIN AN AUTHENTICATION FRAMEWORK  
A system, apparatus, method, and machine readable medium are described for implementing privacy classes within an authentication framework. For example, one embodiment of a method comprises:...
US20110126016 SYSTEM AND METHOD FOR SECURE WIRELESS MULTI-HOP NETWORK FORMATION  
The present invention provides methods and devices for a security architecture for use in wireless multi-hop networks. A method for implementing pair-wise encryption key establishment, network...
US20150244597 MANAGING A HYBRID CLOUD SERVICE  
A technique includes providing a service blueprint to manage the lifecycle of at least one hybrid cloud service and orchestrate application programming interfaces across different cloud technologies.
US20140130129 COUNT VALUES TO DETECT DISCONNECTED CIRCUIT  
A connector including a circuit configured to be coupled to a network and an end device. The circuit configured to transmit count values in a count sequence over the network to detect whether the...
US20110107364 METHODS AND APPARATUS FOR PACKETIZED CONTENT DELIVERY OVER A CONTENT DELIVERY NETWORK  
Methods and apparatus for delivery of packetized content (e.g., video, audio, data, etc.) over a content delivery network. In one embodiment, the content is packetized using an Internet Protocol...
US20130125208 PORTABLE SECURITY DEVICE AND METHODS OF USER AUTHENTICATION  
Disclosed a portable security device and methods for secure user authentication. The security device stores operating system agents that enable communication with user devices that have different...
US20140137187 Scalable and Highly Available Clustering for Large Scale Real-Time Applications  
Scaling and highly available clustering for large scale real-time applications is provided. A ring may be formed which includes multiple nodes for providing a set of services in a system. When a...
US20130333016 WIRELESS SESSION CONFIGURATION PERSISTENCE  
A wireless access point employs a wireless configuration database for retrieving a stored wireless profile corresponding to a subscriber device from a remote location that enables the user to...
US20130160080 APPARATUS AND METHOD FOR VERIFYING APPLICATION USER  
Apparatus and a method for verifying application users includes an application installed in user equipment, a communication unit configured to communicate to verify a user of the application, and...
US20140351596 METHOD, SYSTEM AND APPARATUS FOR AUTHENTICATING USER IDENTITY  
The present invention relates to a method and system for authenticating user identity with a user terminal, authentication front-end computer system, and authentication server. In a first scheme,...
US20120233669 METHOD AND APPARATUS FOR SECURE AUTHORIZATION  
A method for authorizing access to a first computing device is provided. The method comprises the first computing device forming a challenge, encoding the challenge into a symbol, and displaying...
US20140189793 VIRTUAL FILE SYSTEM FOR INTERWORKING BETWEEN CONTENT SERVER AND INFORMATION-CENTRIC NETWORK SERVER AND OPERATING METHOD THEREOF  
Disclosed is a virtual file system for interworking between a content server and an information-centric network server, the system including: a file system function processing unit configured to...
US20150249651 PROVIDING LOCALIZED CONTENT DELIVERY WITH REMOTE TOKEN AUTHENTICATION  
Some embodiments set forth systems and methods enabling a first network to use the resources of various second networks in order to localize delivery of the first network content from the various...
US20140289833 ADVANCED AUTHENTICATION TECHNIQUES AND APPLICATIONS  
A system, apparatus, method, and machine readable medium are described for performing advanced authentication techniques and associated applications. For example, one embodiment of a method...
US20130198804 Peer-to-Peer Service Designer  
A peer-to-peer communication system, including a service manager for managing peer-to-peer services, a zone manager for managing zones, each zone including at least one peer-to-peer service and a...
US20100100936 Secure Wireless Network Using Radiometric Signatures  
A network security system for wireless devices derives a fingerprint from the modulation imperfections of the analog circuitry of the wireless transceivers. These fingerprints may be compared to...
US20050223413 Cross domain security information conversion  
Methods, systems, and computer program products are provided for cross domain security information conversion. Embodiments include receiving from a system entity, in a security service, security...
US20140245390 SYSTEMS AND METHODS FOR PROVIDING SECURE MULTICAST INTRA-CLUSTER COMMUNICATION  
Systems and methods which facilitate secure multicast communications between any valid node of a cluster using authentication between a node joining the cluster and any single node which is...
US20130054966 SYSTEMS AND METHODS FOR PROVIDING SECURE MULTICAST INTRA-CLUSTER COMMUNICATION  
Systems and methods which facilitate secure multicast communications between any valid node of a cluster using authentication between a node joining the cluster and any single node which is...
US20130067544 SYSTEM FOR AUTHENTICATION MANAGEMENT OF A SENSOR NODE HAVING A SUBSCRIPTION PROCESSING FUNCTION, AND A METHOD FOR OPERATING THE SYSTEM  
The present invention relates to a system for authentication management of a sensor node having a subscription processing function, and a method for operating the system. Upon receiving...
US20070192834 Security management method and apparatus in multimedia middleware, and storage medium therefor  
A security management method in multimedia middleware of a terminal that can download a multimedia service provided from an external entity. The security management method includes if there is an...
US20080134289 System And Method For Automation Of Information Or Data Classification For Implementation Of Controls  
A system, method and computer program product are provided for monitoring data traffic on one or more networks, determining the classification of the data based on an organization's classification...
US20130198806 INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, AND AUTHENTICATION METHOD  
An information processing system, which is implemented by one or more information processing apparatuses, includes a first receiving unit configured to receive a first user identifier and a first...
US20120216244 SYSTEM AND METHOD FOR APPLICATION ATTESTATION  
An instrumented machine or platform having a target application thereon is disclosed. An attestation service may generate an application artifact having associated therewith a name and an...
US20120173425 MOBILE DEVICE AND METHOD FOR PROVIDING SECURITY FUNCTION  
A mobile device and a method for enhancing a security function through a password combination by using posture-based passwords as well as number-based passwords are provided. In the method, the...
US20120331522 SYSTEM AND METHOD FOR LOGICAL SEPARATION OF A SERVER BY USING CLIENT VIRTUALIZATION  
A system for logically separating a server using client virtualization includes a client terminal including a virtual environment generation unit for generating a virtual environment, and a...
US20120128158 SYSTEM AND METHOD FOR PROVIDING VARIABLE SECURITY LEVEL IN A WIRELESS COMMUNICATION SYSTEM  
A system and method for providing variable security levels in a wireless communication network. The present invention optimizes the often conflicting demands of highly secure wireless...
US20110214159 COMPUTER SYSTEM  
Provided is a computer system capable of ensuring sufficient security even when a computer resource of a server is dynamically allocated to a thin client. This computer system includes a plurality...
US20130347069 REFERER VERIFICATION APPARATUS AND METHOD  
A referer verification apparatus and method for controlling web traffic having malicious code are provided. In the referer verification method, whether a referer is present in a Hypertext Transfer...
US20130055345 Mobile Application Access Control  
Systems and methods of controlling access to one or more mobile applications are provided. In some examples, a plurality of business groups may be identified. One or more mobile applications may...
US20110307939 ACCOUNT ISSUANCE SYSTEM, ACCOUNT SERVER, SERVICE SERVER, AND ACCOUNT ISSUANCE METHOD  
Provided is an account issuance system that can open an account owner in a service server to the outside without revealing personal information. Terminal 1 transmits joint identification...
US20130276060 METHODS AND SYSTEMS FOR FALLBACK MODES OF OPERATION WITHIN WIRELESS COMPUTER NETWORKS  
Described herein are systems and methods for fallback operation within WLANs that rely on remote authentication procedures. When a primary network node authentication process fails, fallback...
US20150128235 Establishing Historical Usage-Based Hardware Trust  
Establishing trust according to historical usage of selected hardware involves providing a usage history for a selected client device; and extending trust to a selected user based on the user's...