Match Document Document Title
US20110252457 SYSTEM AND METHOD FOR INTERMEDIATING BETWEEN SUBSCRIBER DEVICES AND COMMUNICATION SERVICE PROVIDERS  
A system and method are disclosed which may include receiving an activation request from a first subscriber device at a communication convergence platform; identifying a service provider...
US20140282865 DYNAMIC H-SLP ALLOCATION FOR SET INITIATED SUPL SERVICES  
Methods, systems, computer-readable media, and apparatuses for accessing services from multiple home Secure User Plane Location (SUPL) Platforms.(H-SLP) servers are provided. In one potential...
US20120102546 Method And System For Authenticating Network Device  
The present invention provides a method and system for authenticating a network equipment (NE). When the NE is authenticated, the integrity checking result recorded in the trust environment (TE)...
US20110320955 METHODS AND SYSTEMS FOR ACCESSING A RESOURCE WITH MULTIPLE USER IDENTITIES  
Systems and methods for providing concurrent access to a resource via multiple user identities via a single client entity. The client entity is allowed access to the resource utilizing a first...
US20110076987 METHOD AND SYSTEM FOR CHANGING ACCESS SERVICE NETWORK OF MOBILE STATION IN COMMUNICATION SYSTEM  
A method and a system for relocating an Access Service Network (ASN) of a Mobile Station (MS) in a communication system are provided. In the method, when an MS that operates in an idle mode moves...
US20140090018 Smart Device Lockout  
Methods and systems for operating a Smart Device 102 with a secure communication system. A SPARC Security Device (SSD) 104 is in communication with one or more Smart Devices 102. SSD 104 receives...
US20130152170 Region Access Platform, Mobile Positioning Method and System  
A region access platform is disclosed in the present invention. The region access platform is set to: receive a positioning request from a positioning client; authenticate the positioning client;...
US20070074272 Network security apparatus, network security control method and network security system  
The present invention provides a network security apparatus for monitoring telecommunication information flowing through a network and carrying out detection of, and/or protection from, an...
US20140013390 SYSTEM AND METHOD FOR OUT-OF-BAND APPLICATION AUTHENTICATION  
Application-to-Application authentication features using a second communication channel for out-of-band authentication separate from a communication channel of a request from a client to a server....
US20120317616 NODE DEVICE AND METHOD TO PREVENT OVERFLOW OF PENDING INTEREST TABLE IN NAME BASED NETWORK SYSTEM  
A node device and method are described to prevent overflow of a pending interest table (PIT). When excessive request messages are received through a particular interface, the node device and...
US20140181903 Secure Mobile Information System  
The present invention relates to a method for making specific task information available via a mobile station, preferably comprising a PDA, tablet or a mobile phone, to a user such as personnel on...
US20130036450 AUTOMATIC DISABLING OF ENABLED CONNECTION PROFILE FOR WIRELESS NETWORK  
To reduce automatically a number of enabled connection profiles in a mobile station, for example, while the number of enabled connection profiles is at its maximum, a mobile station automatically...
US20130283345 TECHNIQUES FOR DYNAMIC ENPOINT SECURE LOCATION AWARENESS  
Techniques for dynamic endpoint secure location awareness may include dynamically sending a location query in response to a change in location for a mobile device. A location response may be...
US20110138445 SYSTEMS AND METHODS FOR DYNAMIC ACCESS TO PROGRAM FEATURES  
The multimedia client-server system provides a multimedia client program with a set of features and a server system that creates feature access information that determines which features are to be...
US20130212645 INFORMATION AUTHENTICATION METHOD AND INFORMATION AUTHENTICATION SYSTEM  
At a time of enrollment, a client terminal: generates a feature polynomial from biometric information for enrollment; multiplies the feature polynomial by a prescribed integer; stores a helper...
US20110004921 PERSONALIZED SECURITY MANAGEMENT  
Systems and methods for personalized security management of online applications are provided. A determination may be made that a condition for constructing an increased authentication proposal for...
US20120233460 SERVER-AIDED MULTI-PARTY PROTOCOLS  
The disclosed architecture employs techniques that make secure multi-party computation (MPC) practical and scalable. In support of utilizing cloud computing, for example, for evaluating...
US20110119290 APPARATUSES, METHODS AND SYSTEMS FOR A MOBILE HEALTHCARE MANAGER-BASED VIDEO PRESCRIPTION PROVIDER  
The APPARATUSES, METHODS AND SYSTEMS FOR A MOBILE HEALTHCARE MANAGER (“MHM”) BASED VIDEO PRESCRIPTION PROVIDER may provide an elegant and consistent multimedia interactive reference standard to...
US20120159576 METHOD, APPARATUS AND SYSTEM FOR UPDATING AUTHENTICATION, AUTHORIZATION AND ACCOUNTING SESSION  
The present disclosure relates to a method, an apparatus and a system for updating an Authentication, Authorization and Accounting AAA session. The method includes: receiving an AAA session...
US20140196126 FACILITATING WIRELESS NETWORK ACCESS BY USING A UBIQUITOUS SSID  
The disclosed embodiments provide a system that facilitates wireless network access. The system includes a trusted network access and tunneling service (TNATS) associated with a ubiquitous static...
US20130212644 NETWORK STIMULATION ENGINE  
Methods, devices, and systems are disclosed for simulating a large, realistic computer network. Virtual actors statistically emulate the behaviors of humans using networked devices or responses...
US20120253779 NETWORK STIMULATION ENGINE  
Methods, devices, and systems are disclosed for simulating a large, realistic computer network. Virtual actors statistically emulate the behaviors of humans using networked devices or responses...
US20120158395 NETWORK STIMULATION ENGINE  
Methods, devices, and systems are disclosed for simulating a large, realistic computer network. Virtual actors statistically emulate the behaviors of humans using networked devices or responses...
US20140237549 COLLABORATIVE COMPUTING COMMUNITY ROLE MAPPING SYSTEM AND METHOD  
A role mapping method and system for a collaborative computing environment in provided. A set of permissions defining access to a generic business component for a named permission set is stored in...
US20120240191 WIRELESS DEVICE NEARFIELD SECURITY CONFIGURATION  
A joining device is operable to join a wireless network by establishing a nearfield wireless connection between the joining device and an intermediary device, and exchanging identifying...
US20140143831 COMPUTERIZED METHOD AND SYSTEM FOR MANAGING AMENDMENT VOTING IN A NETWORKED SECURE COLLABORATIVE EXCHANGE ENVIRONMENT  
In embodiments of the present invention improved capabilities are described for managing amendment voting in a networked secure collaborative computer data exchange environment, the method...
US20140189792 METHOD AND SYSTEM FOR ELECTRONIC CONTENT STORAGE AND RETRIEVAL USING GALOIS FIELDS AND INFORMATON ENTROPY ON CLOUD COMPUTING NETWORKS  
A method and system for electronic content storage and retrieval using Galois Fields and information entropy on cloud computing networks. Electronic content is divided into plural portions and...
US20120047558 Method And Apparatus Of Automated Discovery In A Communication Network  
An automated method is provided for mutual discovery between a network entity and a client entity that cooperate for providing a service in a machine-to-machine environment. In an embodiment, the...
US20130133045 Method for directing requests to trusted resources  
The present invention enables an enterprise to move from an implicitly trusted resource pool to an explicitly authenticated resource pool. Trust information is generally conveyed whenever a new...
US20140157367 VERIFICATION METHOD AND NODE FOR BIDIRECTIONAL FORWARDING DETECTION SESSION  
A verification method and node for a BFD session relate to the field of communications technologies. The method includes: adding, by an initiating node, a first random number to a first BFD...
US20130132727 ENHANCED CONTENT MANAGEMENT BASED ON WATERMARK EXTRACTION RECORDS  
Content screening operations are facilitated in devices that receive a content that is subject to screening obligations. When such a content is received at a device, a watermark extraction record...
US20110231910 TECHNIQUES FOR VIRTUAL PRIVATE NETWORK (VPN) ACCESS  
Techniques for virtual private network (VPN) access are provided. A dynamic determination, in response to privileges, is made as to whether a principal and a device of a principal are to receive a...
US20110321128 PUBLIC ACCESS POINT  
The invention instantiates a Personal VLAN bridge, using IEEE Std. 802.11 elements. The result is a bridge, referred to as a public access point, that is better suited for implementing public...
US20140215563 METHOD OF AUTHENTICATING USER, SERVER AND MOBILE TERMINAL PERFORMING THE SAME  
A user authenticating method is performed by a user authenticating server connectable to at least one mobile terminal and a user terminal. The user authenticating method includes: receiving access...
US20150040189 SERVICE PROVISION SYSTEM, SERVICE PROVISION METHOD, AND COMPUTER PROGRAM PRODUCT  
A service provision system that includes: a management information storage unit that stores management information for managing user identification information, device identification information,...
US20100306830 Distributed Hierarchical Identity Management  
A system and methods for identity management and authentication are provided herein. The present invention employs shadow domains to prove entity membership in an identity management system where...
US20140215572 Authenticating Applications to a Network Service  
Authenticating applications to a network service includes authenticating an application with a certificate to access a service provider over a logical connection between the application and the...
US20120216271 SYSTEM AND METHOD FOR INTERLOCKING A HOST AND A GATEWAY  
A method is provided in one example embodiment and includes exchanging a session descriptor associated with a network connection and an application on a host, correlating the session descriptor...
US20140282994 METHOD FOR CALLING UP A CLIENT PROGRAM  
A method for calling up a client program: transmitting a message to a server computer system using an Internet browser, wherein the message contains at least one parameter for communication of the...
US20130061285 METHOD AND SYSTEM FOR PROVIDING BEHAVIORAL BI-DIRECTIONAL AUTHENTICATION  
An approach for authenticating parties engaged in a web-based transaction without compromising the integrity or anonymity of the parties is described. An authentication platform receives, from a...
US20080184339 REMOTE ACCESS OF DIGITAL IDENTITIES  
A system and method for controlling distribution and use of digital identity representations (“DIRs”) increases security, usability, and oversight of DIR use. A DIR stored on a first device may be...
US20130283348 Cooperation Between MoCA Service Provider and Consumer Networks  
Embodiments may be disclosed herein that provide systems, devices, and methods of operating a Multimedia over Coax (MoCA) network. One such embodiment is a method comprising: designating a...
US20150050988 Wagering Technique Based on Projected Performance Benchmarks and Geographically Restricting....  
Disclosed herein are systems and methods for providing access to, while in a predetermined location, information corresponding to a rules-based activity via a computer network. Access may be...
US20110239270 METHOD AND APPARATUS FOR PROVIDING HETEROGENEOUS SECURITY MANAGEMENT  
An approach is provided for providing a heterogeneous security management platform to combine or integrate different applications employing different security requirements. An interface acts on a...
US20140096189 USING TRUSTED DEVICES TO AUGMENT LOCATION-BASED ACCOUNT PROTECTION  
An authentication process receives information identifying a user, a device used by the user and a location in which the device is being used. That authentication process determines whether the...
US20120266216 Registration of Applications and Complimentary Features for Interactive User Interfaces  
An exemplary computer-implementable method includes receiving a call from an application executing on a host computer, the host computer having a collection of graphical user interfaces, and, in...
US20120047559 LICENSE INFORMATION EXCHANGE SYSTEM  
When license information is transferred between a server machine and a client machine, an identifier which is unique to a series of communication sequences is provided. The identifier is sent when...
US20140026189 METHOD, CLIENT, SERVER AND SYSTEM OF LOGIN VERIFICATION  
The present disclosure introduces a method, a client, a server and a system of login verification. When a user logins, the client obtains a login request from the user for logging into an...
US20140181902 AUTHENTICATION IN A WIRELESS ACCESS NETWORK  
To allow devices to authenticate to a wide area mobile network when they temporarily do not have a connection to a SIM card and to authenticate the base station and so protect against false base...
US20140150058 AUTHENTICATION METHOD FOR STATELESS ADDRESS ALLOCATION IN IPV6 NETWORKS  
The authentication method for stateless address allocation in IPv6 networks provides a P2P trust-verification approach for identifying a rogue node. Alternatively, the authentication method...