Match Document Document Title
8479271 Hosting edge applications at the edge of a mobile data network  
Mobile network services are performed in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio...
8477796 System, method, and computer program product for processing different content each stored in one of a plurality of queues  
A system, method, and computer program product are provided for processing different content each stored in one of a plurality of queues. In use, a plurality of different content is identified for...
8478987 Wireless activation of IP devices  
A method of activating a wireless IP device by providing access to an installer to a customer's personal router or modem/router combination and providing access to the installer to a wireless...
8478981 Method of adding a postscript message to an email  
A system and method providing for appending of a note or instruction to the contents of an email such that the note or instructions is only appended to emails of selected recipients of a group of...
8479190 Management system, management method, terminal device, management server and program  
There is provided a management system having a terminal device and a management server for managing terminal firmware of the terminal device. The terminal device includes: storing means storing...
8473734 Multi-service VPN network client for mobile device having dynamic failover  
An integrated, multi-service network client for cellular mobile devices is described. The multi-service network client can be deployed as a single software package on cellular mobile network...
8474033 Computer or microchip with a master controller connected by a secure control bus to networked microprocessors or cores  
A computer or microchip configured to be securely controlled through a secure control bus, including through a private network. The computer or microchip includes a secure private unit protected...
8468589 Computerized system and method for advanced network content processing  
A computerized system and method for processing network content in accordance with at least one content processing rule. In accordance with the inventive method, the network content is received at...
8468590 Rate limiting data traffic in a network  
A network device coordinates with other devices in a network to create a distributed filtering system. The device detects an attack in the network, such as a distributed denial of service attack,...
8468202 Aggregation system  
An aggregation system including a computer, and networking hardware connecting the computer to a network. The computer is programmed so that the aggregation system presents an interface which is...
8468337 Secure data transfer over a network  
A system and method are described for secure data transfer over a network. According to an exemplary embodiment a system for secure data transfer over a network includes memory and a memory...
8468338 Wireless access point security for multi-hop networks  
Security in wireless communication networks that employ relay stations to facilitate communications between base stations and mobile stations is enhanced. In one embodiment, resource information...
8464043 Information security device and information security system  
Provided is a migration system considering security authentication levels and data protection strength levels of the both security devices between which data is migrated. A first terminal includes...
8464333 System and method for distributed multi-processing security gateway  
A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server, uses the proxy network address to establish a...
8464044 Wireless network probe system and method  
A wireless network probe method intercepts a data packet sent from a certain station, which has established communication with an access point (AP) connected to a wireless network before a service...
8464324 System and method for identity verification on a computer  
A system to verify user identity on a computer uses a server with a set of stored or created images. An image is selected and transmitted over a computer network to the computer whose user...
8464330 Agent device, image-forming-device management system, image-forming-device management method, image-forming-device management program and storage medium  
An agent device is connected with one or more image-forming devices in a local network having a firewall provided therein. A management device carries out remote management of the image-forming...
8464335 Distributed, multi-tenant virtual private network cloud systems and methods for mobile security and policy enforcement  
The present disclosure provides distributed, multi-tenant Virtual Private Network (VPN) cloud systems and methods for mobile security and user based policy enforcement. In an exemplary embodiment,...
8462943 Bandwidth efficient method and system for obscuring the existence of encryption in a communications channel  
A system, method, and network interface obscures the existence of data encryption in a communication network is provided. A set of characters is generated by using a set of encryption keys as an...
8464331 Data transmission management server and method  
A data transmission management server for managing a terminal device to access a network resource providing server by a source gateway in a virtual private network (VPN) obtains current resource...
8458347 Aggregation system  
Machine, method for use and method for making, and corresponding products produced thereby, as well as data structures, computer-readable media tangibly embodying program instructions,...
8458763 Method of automating and personalizing systems to satisfy security requirements in an end-to-end service landscape  
A computer-implemented method of enabling security in network resources provisioned as part of a service landscape instance is provided. The method includes initiating an orchestration process for...
8456653 Data processing apparatus for producing print job data whose authority is managed by external server, and image processing apparatus for printing a print job whose authority is managed by external server  
A data processing apparatus includes a storage unit configured to store electronic data including first data for identifying policy data that is information indicating an authority for handling...
8458099 System and method for online content licensing and distribution  
A system and method for online content licensing and distribution is provided. A central website is accessible by content providers and content licensees via the Internet, and allows content...
8457919 Process for testing the resistance of an integrated circuit to a side channel analysis  
A process for testing an integrated circuit includes collecting a set of points of a physical property while the integrated circuit is executing a multiplication, dividing the set of points into a...
8458786 Automated dynamic tunnel management  
Systems, methods and apparatus for tunneling in a cloud based security system. In an aspect, tunnel session data describing authentication and unauthenticated sessions, and location data...
8458256 Television Aggregator  
An aggregation system, process, article, and necessary intermediates, illustratively the system includes: a device capable of both networking and executing software programs, the device programmed...
8458467 Method and apparatus for adaptive application message payload content transformation in a network infrastructure element  
Application message payload data elements are transformed within a network infrastructure element such as a packet data router or switch. The network element has application message transformation...
8458453 Method and apparatus for securing communication over public network  
A system and method of providing secure communications between two or more hosts connected to a public network, where a secure virtual network (SVN) is established among the two or more hosts.
8458292 Aggregation system  
A computerized aggregation system, the system including: a master server system programmed to receive data from a user computer, to store the received data, and to process the received data to...
8458795 Event detection/anomaly correlation heuristics  
A system for detecting network intrusions and other conditions in a network is described. The system includes a plurality of collector devices that are disposed to collect data and statistical...
8452956 Methods and apparatus for network communications via a transparent security proxy  
A data security device for providing a network transport connection via a transparent network proxy that employs different encryption security mediums along a communications session between two...
8452963 Generating protected access credentials  
A computer-implemented process comprises receiving, at a first computer, a base cryptographic seed through a secure connection to a second computer; generating one or more protected access...
8452955 Method and apparatus for encryption and pass-through handling of confidential information in software applications  
Methods and apparatus for securely transmitting sensitive information to a remote device at the request of an application program are provided. The application program generates a request to a...
8452957 Method and nodes for providing secure access to cloud computing for mobile users  
A mobile node, a gateway node and methods are provided for securely storing a content into a remote node. The mobile node, or a gateway node of a network providing access to the mobile node,...
8453208 Network authentication method, method for client to request authentication, client, and device  
A network authentication method, a method for a client to request authentication, a client, and a device are provided. The method includes: receiving synchronize (SYN) data sent by a client, where...
8446911 System and method for managing communication for component applications  
An application gateway server is provided for managing communication between an application executing in a runtime environment on a device and at least one backend server. The application gateway...
8448240 Role-based access control  
A user interface and a processor coupled to the user interface wherein the processor receives access requests through the user interface and authorizes access through the user interface. The...
8447969 Transfer device for sensitive material such as a cryptographic key  
Mechanisms are provided for transferring sensitive information, such as cryptographic keys, between entities. Particularly, a device is provided with a user input connected directly to a secure...
8443101 Method for identifying and blocking embedded communications  
A method and system for steganography and steganalytic techniques are provided for effecting embedded communications in a variety of communication environments. One aspect may include an embedded...
8443069 Highly scalable architecture for application network appliances  
A highly scalable application network appliance is described herein. According to one embodiment, a network element includes a switch fabric, a first service module coupled to the switch fabric,...
8443186 Method and device of data encryption  
An encryption method and apparatus thereof is disclosed. In one embodiment the method includes (a) receiving the content data via the network, (b) changing a sequence of the received content data...
8443448 System and method for detection of non-compliant software installation  
A system and method for performing a security check may include using at least one processor to periodically check a status of a flag, generate and store a baseline representation of modules...
8438386 System and method for developing a risk profile for an internet service  
A method and system for controlling access to an Internet resource is disclosed herein. When a request for an Internet resource, such as a Web site, is transmitted by an end-user of a LAN, a...
8438630 Data loss prevention system employing encryption detection  
A system and method is disclosed for implementing a data loss prevention (DLP) system capable of detecting transmission attempts involving encrypted data. In response to detecting that the data is...
8438377 Information processing apparatus, method and computer-readable storage medium that encrypts and decrypts data using a value calculated from operating-state data  
An information processing apparatus includes a main memory unit storing while on-power; an auxiliary storage unit functionable even off-power; a control unit performing hibernation of generating...
8438223 Aggregation system error handling  
Aggregation apparatus that comprises a computer, a display controlled by the computer, and networking hardware connecting the computer to a network. The computer is programmed so that the...
8438381 Securing IP traffic  
A method of securing IP traffic sent from a first host to a second host attached respectively to first and second access points. The method comprises establishing a shared secret between said...
8438628 Method and apparatus for split-terminating a secure network connection, with client authentication  
A method and apparatus are provided for split-terminating a secure client-server communication connection, with client authentication. During handshaking between the client and the server,...
8438632 Image processing device  
A low-cost Multi Function Peripheral (MFP) prevents a user from forgetting to cancel an authenticated state. The MFP includes a scanner unit, a printer unit, a touch screen, and a reset key for...