Match Document Document Title
8433895 Methods and systems for securely managing multimedia data captured by mobile computing devices  
A computer-implemented method for securely managing multimedia data captured by a mobile computing device is disclosed. The method may comprise: 1) identifying multimedia data captured by the...
8434143 Firewall interface configuration to enable bi-directional VoIP traversal communications  
Methods and systems for an intelligent network protection gateway (NPG) and network architecture are provided. According to one embodiment, a firewall provides network-layer protection to internal...
8428256 Method and apparatus for efficiently fixing transformed part of content  
Provided are a method and apparatus for effectively fixing scrambled content. The method includes checking fixing information for a program map table (PMT) packet of packets constituting the...
8429400 VPN processing via service insertion architecture  
In one embodiment, a method can include: (i) sending a request to join a group to a service broker; (ii) receiving from the service broker a list of key servers servicing the group; and (iii)...
8429426 Secure pipeline manager  
A method for data storage includes supplying data to and from a host to a storage memory via a secure data path. A first CPU is employed to control operation of the storage memory, and a second...
8429708 Method and system for assessing cumulative access entitlements of an entity in a system  
A method and system is provided for assessing the cumulative set of access entitlements to which an entity, of an information system, may be implicitly or explicitly authorized, by virtue of the...
8423760 Method and system for reducing packet overhead for an LTE architecture while securing traffic in an unsecured environment  
A first packet is received at a network element from an E-UTRAN Node B (eNB) of an E-UTRAN access network via a secured communications tunnel of a secured connection, where the first packet...
8424053 Method of dynamically updating network security policy rules when new network resources are provisioned in a service landscape  
A computer-implemented method is provided for updating network security policy rules when network resources are provisioned in a service landscape instance. The method includes categorizing...
8423763 System and method for supporting multiple certificate status providers on a mobile communication device  
A method and system for supporting multiple digital certificate status information providers are disclosed. An initial service request is prepared at a proxy system client module and sent to a...
8422953 Center device  
To provide a center device for accommodating a variety of situations which may occur when a home-use game machine, or the like, is used, in which a plurality of users use their own controller...
8418244 Instant communication with TLS VPN tunnel management  
Techniques are provided for securing instant communications, such as text, audio, and video. A tunnel management module is included in an instant communication suite that comprises one or more...
8417940 System and device for parallelized processing  
The invention relates to a system for processing data that can be exchanged between at least a first domain having a security level A and a second domain having a security level B, A being...
8417941 Apparatus and method to prevent man in the middle attack  
A system, peripheral device, and method for authenticating an encryption key before transmitting encrypted messages containing sensitive information are provided. Authentication of a client device...
8418233 Rule based extensible authentication  
A system, apparatus, and method are directed to managing access to a resource using rule-based deep packet extractions of a credential. A network device, such as a traffic management device, is...
8417939 Method and apparatus for file sharing between a group of user devices with encryption-decryption information sent via satellite and the content sent separately  
A communication system 100 includes a group of user devices 110, a first satellite 106 and a content delivery network 120 in communication with the group of user devices 110. The content delivery...
8416949 Actor node, sensor node, coverage block change method, parameter change method, program, and information processing system  
An actor node according to the present invention includes a dynamic change unit for temporarily changing a coverage block in which data are obtained from a sensor node and temporarily causing...
8411858 Dynamic foreign agent-home agent security association allocation for IP mobility systems  
The present invention utilizes the AAA infrastructure to dynamically allocate the various parameters needed to establish the security association between the Foreign Agent and the Home Agent. The...
8413216 Network stimulation engine  
Methods, devices, and systems are disclosed for simulating a large, realistic computer network. Virtual actors statistically emulate the behaviors of humans using networked devices or responses...
8413213 System, method and device for secure wireless communication  
Embodiments of the present invention provide a method, apparatus and system for selecting a wireless communication device for establishing a connection. The method according to some exemplary...
8412838 Method of and system for analyzing the content of resource requests  
Systems and methods are described for analyzing the content of resource requests. A tokenizer parses the resource request and derives a key therefrom. A database associates values of the key with...
8412942 Method and system for seamless SSID creation, authentication and encryption  
Using an identifier generation algorithm, a device coupled to a communication network generates an SSID and associated encryption key for a mobile device using its unique identifier. The...
8407462 Method, system and server for implementing security access control by enforcing security policies  
A method for implementing network security access control is provided, including: receiving and decrypting terminal identity information that is encrypted in a bi-directional encryption mode and...
8407780 Method and system for messaging security  
An e-mail firewall applies policies to e-mail messages transmitted between a first site and a plurality of second sites. The e-mail firewall includes a plurality of mail transfer relay modules for...
8407757 Specifying and enforcing run-time policies for application processes being executed on a computer  
The present invention provides a method and system of specifying and enforcing at least one run-time policy for at least one computer process executing on a computer system, where the computer...
8402538 Method and system for detecting and responding to harmful traffic  
There is provided a method and system for detecting and responding to harmful traffic. The system includes a router determining whether or not received data is harmful traffic, by using a dynamic...
8402264 Method for securing an interaction between nodes and related nodes  
The invention proposes a method for securing an interaction between a first node and a second node, wherein a security algorithm belonging to both a first set of security algorithms held by the...
8396985 Packet sequence number tracking for an anti-replay window  
Described embodiments provide a network processor that includes a security sub-processor to prevent replay attacks on the network processor. A memory stores an anti-replay window corresponding to...
8397299 Method and system for enhancing flow of behavior metrics and evaluation of security of a node  
A method and system for enhancing flow of behavior metrics and evaluating security of a node are described. Instead of sending behavior metrics from a trustee node to a trustor node, the trustor...
8397287 Method and system for authorizing a level of access of a client to a virtual private network connection, based on a client-side attribute  
An appliance and method for authorizing a level of access of a client to a virtual private network connection, based on a client-side attribute includes the step of establishing, by an appliance,...
8392707 Gaming network  
The gaming network described herein includes network security features, host security features, audit protocols, and design architecture approaches to reduce the possibility of network attacks....
8393000 Method, apparatus, and system for enabling a secure location-aware platform  
A method, apparatus, and system enable a secure location-aware platform. Specifically, embodiments of the present invention may utilize a secure processing partition on the platform to determine a...
8392701 Method and apparatus for ensuring packet transmission security  
An apparatus and method for ensuring distributed packet transmission security are provided. In an embodiment of the present invention, a main control board allocates SA information to multiple...
8392716 Communication apparatus, digital signature issuance method and apparatus, and digital signature transmission method  
An initiator shares y_ir with a responder, calculates HASH_I on the basis of y_ir, and sends HASH_I to an IKE proxy server. The initiator receives a digital signature SIG_S generated for HASH_I...
8392984 Provisioning/configuration systems for VPN to VPN bridging for IP video conferencing  
Internet Protocol (IP) video conferencing bridging provisioning/configuration systems receive a service order associated with a customer, where the service order requests enrollment of the...
8386372 System, method and computer program product for compiling golden copy of securities pricing  
Systems, methods, and computer program products include a golden copy application for compiling golden copies of securities pricing according to a set of securities rules established by a...
8386770 Authentication method without credential duplication for users belonging to different organizations  
The present invention relates to a method for allowing a user to access the Internet. A user sends an Internet access request through a first Organization's gateway and supplies to the latter some...
8386777 Method and equipment for controlling access to multicast IP flows  
The invention relates to a method of controlling access to multicast IP flows. Following connection to a collection equipment by a user terminal, the method consists in: transmitting an access...
8387128 System and method for distributed multi-processing security gateway  
A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server, uses the proxy network address to establish a...
8387130 Authenticated service virtualization  
Virtualizing a service is disclosed. A request to access a service from a first server is received from a client. A secret data associated with the first server is used to process the received...
8386771 Process and streaming server for encrypting a data stream with bandwidth based variation  
There is disclosed a process for encrypting a data stream to secure the data stream for single viewing and to protect copyrights of the data stream. Specifically, there is disclosed a process for...
8386768 High performance data encryption server and method for transparently encrypting/decrypting data  
High-performance data encryption/decryption server and method for transparently encrypting/decrypting data. System and method for encryption and/or decryption cryptographic services that have...
8386769 Apparatus, and an associated method, for providing and using opaque presence indications in a presence service  
An apparatus, and an associated method, enables presence information of a presentity to be retrieved by a watcher. Elements, or portions, of the presence information may be made selectively opaque...
8380978 Electrical system of a motor vehicle with a master security module  
The invention relates to an electrical system of a motor vehicle with control apparatuses, which communicate with one another by means of a data bus. To recognize manipulations to the electrical...
8375225 Memory protection  
Data storage devices having one or more data security features are provided according to various embodiments of the present invention. In one embodiment, a data storage device comprises buffer and...
8374354 System and method to pass a private encryption key  
A method includes receiving, via a network, a request to provision and provide a private key, the private key being for use with a public and private key system. The method further includes...
8375205 Techniques for communicating information over management channels  
Techniques for communicating information over management channels are described. An apparatus may comprise a classifier module operative to classify management information for a wireless...
8370917 Security bridging  
A network media gateway is used to bridge trust between a Service Provider network and subscriber devices. The gateway is authenticated by the Service Provider by using knowledge of network...
8370630 Client device, mail system, program, and recording medium  
A mail system having high security is realized by mounting TCP2 for mail communication between client apparatuses. The present invention relates to a mail communication system which is connected...
8370641 Initialization of a microprocessor providing for execution of secure code  
An apparatus including a microprocessor and a secure non-volatile memory. The microprocessor executes non-secure application programs and a secure application program. The microprocessor has...
8370954 Content management systems and methods including content usage restrictions  
Key data is generated that contains a decryption key that decrypts an encrypted content, and a policy that defines the usage restrictions on the content. Binder data is then generated, which...