Match Document Document Title
8528099 Policy based management of content rights in enterprise/cross enterprise collaboration  
Systems, methods and apparatuses (i.e., utilities) for use in managing access to and use of artifacts (e.g., word or pdf documents, jpegs, and the like) and any copies thereof in an...
8528041 Out-of-band network security management  
A computer-implemented method, network management system, and network clients are provided for out-of-band network security management. The network management system includes routers, firewalls,...
8520527 Identifying cloned devices  
Methods and apparatuses for locating cloned CPEs in a communication system are provided. A clone detector receives from each access router in a communication system the MAC addresses of CPEs...
8522360 Posted move in anchor point-based digital rights management  
An anchor-point based digital rights management provides for a posted move of one or more digital rights between two devices. By executing a posted move, a user (1) disables a binding record of a...
8522009 Device management system, site monitoring apparatus and method  
A server certificate and root certificate for performing secure communication with monitoring target devices are issued in a site monitoring apparatus. Using a secret key that is paired with a...
8520856 Controlling the validity period of a decryption key  
The invention provides a method and a system for allowing access to a digital broadcast stream on a client device in a conditional access system, wherein the start time and end time of events in...
8522336 Gateway device and method for using the same to prevent phishing attacks  
A gateway device that is in electronic connection with at least one client computer, a first domain name system (DNS) server located in a first communication network, and a second DNS server...
8522318 Enabling dynamic authentication with different protocols on the same port for a switch  
The invention enables a client device that does not support IEEE 802.1X authentication to access at least some resources provided through a switch that supports 802.1X authentication by using...
8516241 Zone-based firewall policy model for a virtualized data center  
Techniques are provided for implementing a zone-based firewall policy. At a virtual network device, information is defined and stored that represents a security management zone for a virtual...
8516243 Host identity protocol method and apparatus  
A method and apparatus of at least partially securing communications between first and second hosts using the Host Identity Protocol (HIP) is provided. The first host is not HIP enabled and the...
8515066 Method, apparatus and program for establishing encrypted communication channel between apparatuses  
A method for establishing an encrypted communication channel between a first apparatus and a second apparatus by using a session management apparatus. The method includes: establishing a first...
8516539 System and method for inferring access policies from access event records  
A method of security gateway policy definition to quickly infer a new policy based on event data extracted and analyzed using business logic and workflow from a gateway event log or behavior log....
8516240 WAN secured VDI traffic for WAN optimization without required user configuration  
In order for intermediary WAAS devices to process and accelerate ICA traffic, they must decrypt the ICA traffic in order to examine it. Disclosed is a mechanism by which the ICA traffic may be...
8516586 Classification of unknown computer network traffic  
A network application control system is employed to classify unknown computer network traffic. The system includes a firewall computer with a network filter that filters network traffic generated...
8510851 Method and apparatus for accessing content protected media streams  
A method and apparatus for recovering a content signal from media stream protected by a digital rights management (DRM) system. A content access device includes a network interface configured to...
8509753 Transfer of data-intensive content between portable devices  
Described herein are technologies that facilitate transfer of data-intensive content between portable telephones. Phones are configured to transmit data indicative of phone location to a proxy...
8510833 Connection-rate filtering using ARP requests  
One embodiment relates to a method of connection-rate filtering by a network device. Address resolution protocol (ARP) request packets received from a sub-network are monitored, and a copy of the...
8510550 Method for managing data in a wireless sensor network  
A method for managing data in a preferably non real-time sensor network, wherein the network comprises a multitude of sensor nodes to sense data, wherein the network is divided into clusters with...
8509443 Rekey index generation method and rekey index generation apparatus  
A rekey index generation method and a rekey index generation apparatus are provided. The rekey index generation method includes inserting join information to a first field of a rekey index when...
8510792 Gated network service  
A method includes identifying at a gateway device of a network a plurality of devices connected to the network. The method includes monitoring network traffic at the gateway device and determining...
8504819 Wireless LAN relay device, wireless communication system, and method for controlling wireless LAN relay device  
A wireless LAN relay device connecting an outer device to a network includes a communication section for controlling wired communication and wireless communication performed between the wireless...
8504998 Extracting training scenarios from test cases for user-interface component recognition  
In one embodiment, a method includes accessing a set of use cases of a software application and selecting, from the set of use cases, a subset of use cases that has a goodness-to-cost ratio that...
8504830 Transfer data management system for internet backup  
Erroneous deletion of data due to a collision of digest information during data de-duplication using digest information is prevented. When backup data is stored on a backup server 1100, digest...
8505072 Network apparatus, assessment method, program, and integrated circuit  
A network device restricts functions thereof in a special case such as theft, and comprises: an acquisition unit for acquiring one or more identification information pieces corresponding to one or...
8503014 Gateway  
A gateway converts a signal between a transmitting terminal capable of transmitting printable print contents in accordance with a FAX protocol and a receiving terminal capable of receiving the...
8504821 Encrypted optoelectronic module  
Methods and systems for encrypting and decrypting data are described. An exemplary system includes an optical transceiver that includes at least one of an encryption block and a decryption block....
8499146 Method and device for preventing network attacks  
A method for preventing network attacks is provided, which includes: obtaining a data packet, where a source address of the data packet is a cryptographically generated address (CGA); determining...
8499145 Apparatus, system, and method of setting a device  
A device setting apparatus performs setting operation with respect to a counterpart apparatus using secure communication even when the counterpart apparatus is not previously provided with...
8499061 Method for inserting a new device in a community of devices  
The invention relates to a method for inserting a new device in a community of devices wherein each device of the community is able to store insertion requests received from at least one new...
8499045 Systems and methods for protecting header fields in a message  
Embodiments of the systems and methods described herein facilitate the transmitting, receiving, and processing of encoded messages wherein the header fields in the message header are protected. In...
8495359 System and method for securing an electronic communication  
A system for securing an electronic communication comprises a gateway server configured to receive and store a device identifier and a network address from a first computing device. The device...
8495392 Systems and methods for securely deduplicating data owned by multiple entities  
A computer-implemented method for securely deduplicating data owned by multiple entities may include 1) identifying a first data segment to store on a third-party storage system, 2) identifying a...
8495358 Software based multi-channel polymorphic data obfuscation  
A method and system for providing secure communication between a server and a remote client utilizing a polymorphic software platform. In various embodiments, the system provides mixed mode data...
8495709 Method, system, and storage medium for secure communication utilizing social networking sites  
Embodiments disclosed herein provide a system, method, and computer readable storage medium storing computer instructions for secure communication among enterprise users who are members of social...
8495753 Electronic meeting management system for mobile wireless devices  
A device management system includes a meeting support system that is configured to generate and transmit a plurality of electronic meeting invitations to a plurality of mobile wireless devices...
8495035 Systems and methods for providing data integrity protection in a storage medium  
A method for data integrity protection includes arranging data in a plurality of data blocks. A respective block signature is computed over each of the data blocks, thereby generating multiple...
8495357 Data security policy enforcement  
A method for data security policy enforcement including inspecting incoming and outgoing data packets from a server computing device for attributes in accordance with a data security policy,...
8490189 Using chipset-based protected firmware for host software tamper detection and protection  
A method, system, and computer program product for a host software tamper detection and protection service. A secure partition that is isolated from a host operating system of the host system,...
8489875 Method, system and apparatus for transmitting DHCP messages  
Methods, systems and devices for transmitting DHCP message are provided according to the present invention so that encrypted transmission of user sensitive information is achieved. The method...
8490172 Methods, systems, and computer readable media for adaptive assignment of an active security association instance in a redundant gateway configuration  
According to one aspect, the subject matter described herein includes a method for communicating an encrypted data packet. The method includes steps occurring at a first gateway node. The method...
8490154 Method and system for authentication by defining a demanded level of security  
There is provided a computer-implemented method for authentication, the method comprising: defining a demanded level of security in an authorization service of a server;providing at least one...
8489548 Method, system, and device for data synchronization  
A method for data synchronization (DS) is provided, which includes comparing data fingerprints in databases of two parties in need of DS, determining data that needs to be synchronized, and DS is...
8484458 System and method for secure transmission of media content  
A system that incorporates teachings of the present disclosure may include, for example, a gateway comprising a controller to receive from a communication device a request for media content,...
8484457 Method of securely pairing devices with an access point for an IP-based wireless network  
A wireless access point and method of using a wireless access point to allow a user to use a pre-determined security key provided with the access point or a personal security key that is provided...
8484459 Secure transfer of information  
Disclosed is a method for secure transfer of information through a centralized system. The method comprising: maintaining user account information, a user account of a certain user comprising at...
8484456 Trusted electronic messaging system  
An electronic messaging system, including: a first message transfer server for receiving a message for a party, mapping the destination address of the message to a trusted address for the party,...
8478984 Data encryption apparatus, data decryption apparatus, data encryption method, data decryption method, and data relay apparatus  
A RAID system includes a RAID controller that sends to a disc apparatus data to be encrypted by a data relay apparatus connected to the RAID controller and the disk apparatus. When receiving a...
8478985 Determining whether to encrypt outbound traffic  
An improved method, apparatus, and computer instructions for processing outbound traffic passing through a port. This port is for a server and receives a request from a client. The request...
8478986 Reducing latency of split-terminated secure communication protocol sessions  
A method is provided for establishing a split-terminated secure communication connection between a client and a server. A first network intermediary intercepts a secure communication connection...
8478997 Multi-level security software architecture  
A multi-level security software architecture includes various components configured to provide full data separation across multiple processors while limiting the number and size of high assurance...