Match Document Document Title
8363246 Communication control apparatus communicatable with an external apparatus and a controller, and a method of controlling the communication control apparatus  
Address information is requested of a data processing apparatus upon receiving, from the data processing apparatus, data to be transmitted to a network in order to confirm whether an external...
8365287 Anti-malware system and operating method thereof  
An anti-malware device and an operating method thereof are provided. The operating method includes: filtering by a first logic unit of the processor, input data based on a rule; and scanning by a...
8364948 System and method for supporting secured communication by an aliased cluster  
Cluster aliasing is implemented for a cluster of a plurality of computer-based members. The aliased cluster supports secured communication with a non-member node. The cluster aliasing provides an...
8363836 Using authentication tokens to authorize a firewall to open a pinhole  
Techniques are described for the use of a cryptographic token to authorize a firewall to open a pinhole which permits certain network traffic to traverse firewalls. An initiating endpoint requests...
8364949 Authentication for TCP-based routing and management protocols  
A new Transmission Control Protocol (TCP) Enhanced Authentication Option is described. An administrator configures sending and receiving devices to maintain lists of authentication elements for...
8365284 Method for protecting a packet-based network from attacks, and security border node  
The invention relates to a security border node (2a) for protecting a packet-based network from attacks, comprising: an anomaly detection unit (10) for performing an anomaly detection, in...
8365271 Controlling access of a client system to access protected remote resources supporting relative URLs  
A client system is controlled for accessing protected remote resources via a Web Application using a rewriter proxy that supports relative URLs. In one configuration, the Web application can be a...
8365306 Platform and service for management and multi-channel delivery of multi-types of contents  
A platform for managing delivery of content originating from one or more content providers to users is provided. The platform includes a portal that is configured to support access through a...
8364772 System, device and method for dynamically securing instant messages  
An Instant Messaging security system that encrypts Instant Messages sent by a Instant Messaging user to an Instant Messaging server by intercepting the messages, negotiating a preferred security...
8365270 Proxy server  
A proxy server for downloading a data file for a client, such as an email client or web browser, including: a external proxy for downloading the data file for the client from an external server...
8365269 Embedded communication terminal  
An embedded communication terminal equipped with an interface device which performs security tasks, driver tasks, power management tasks and handover tasks, and thus relieves the application...
8364950 Auditable cryptographic protected communication system  
An auditable cryptographic protected communication system for connecting an enterprise server to a plurality of industrial devices using messaging protocols for each industrial device enabling the...
8359464 Quarantine method and system  
A quarantine method and system for allowing a client terminal to connect to a user network. An authentication apparatus recognizes that a communication means of the client terminal has been...
8359357 Secure E-mail messaging system  
According to one embodiment, a secure e-mail messaging system includes an e-mail relay server coupled to a secure client configured on a secure domain and an external client configured on an...
8359474 Method and system for secure authentication  
A system and method configured to provide secure Personal Identification Number (PIN) based authentication is disclosed. A passcode or PIN associated with a customer value card can be securely...
8356343 Session continuity on reauthentication  
A method, system, and computer-readable medium are provided for maintaining a network session between a network element and a network despite the need to reauthenticate the network element. A...
8356169 Encryption communication system, apparatus and method for allowing direct encryption communication with a plurality of nodes  
If the communication partner of a client node (A1a) is an encryption communication target node (C1), a DNS Proxy unit (A12a) in the client node rewrites a response to a name resolution request for...
8356332 Extensible protocol validation  
A method comprises operations for receiving a binary data structure including a portion representing a protocol validation specification expressed in a respective protocol validation specification...
8353024 Method of transmitting information effectively in server/client network and server and client apparatuses using the same  
A method for transmitting information effectively in a server/client network system is provided, the network system including a client placed behind a firewall and a server that provides the...
8352726 Data storage and/or retrieval  
A system and method comprises receiving a write request from a client to store data at first and second non-sequential locations of a storage medium. The data of the write request is recognized as...
8352729 Secure application routing  
Disclosed is a computer implemented method and apparatus to secure a routing path. A local node receives a request for secure route identification from an upstream node. Responsive to receiving a...
8352728 Systems and methods for bulk encryption and decryption of transmitted data  
A method for using a network appliance to efficiently buffer and encrypt data for transmission includes: receiving, by an appliance via a connection, two or more SSL records comprising encrypted...
8352584 System for hosting customized computing clusters  
A computer system for hosting computing clusters for clients. The system includes clusters each including a set of computing resources and each implemented in custom or differing configurations....
8353041 Secure application streaming  
A server includes a scanning module for determining whether an application is free of malware, a module for packaging the application into blocks for delivery via application streaming, a module...
8347074 System and method for bend-in-the-wire adjacency management  
A method for translating network data transmissions begins with a data transmission received at a router. An interface identifier is prepended before a first field of the data transmission,...
8347073 Inspection and rewriting of cryptographically protected data from group VPNs  
Systems, methods, and other embodiments associated with processing secure network traffic are described. One example method includes determining whether a device is a preconfigured member of a...
8344885 Container with interior enclosure of composite material having embedded security element  
An apparatus is disclosed including one or more security structures. The one or more security structures includes: a weldable frame; a plurality of composite panels, each panel securable to the...
8347375 System and method for dynamic distribution of intrusion signatures  
The intrusion detection function monitors for and reports detected intrusion signatures. The dynamic intrusion signatures function determines whether reported intrusion signatures exist in a...
8346960 Systems, methods, and devices for defending a network  
Certain exemplary embodiments comprise a method comprising: within a backbone network: for backbone network traffic addressed to a particular target and comprising attack traffic and non-attack...
8341739 Managing network security  
Technology for network security is disclosed. In one embodiment, a method of managing network security includes receiving sampled packets. The sampled packets represent packets being sampled from...
8340298 Key management and user authentication for quantum cryptography networks  
Key management and user authentication systems and methods for quantum cryptography networks that allow for users securely communicate over a traditional communication link (TC-link). The method...
8341720 Information protection applied by an intermediary device  
Methods, systems, and computer-readable media are disclosed for applying information protection. A particular method includes receiving a data file at a gateway coupled to a network. The data file...
8340809 Intelligent shelving system and dividing element  
An intelligent shelving system and associated dividing element. One or more dividing elements are arranged to communicate with a controller, each of the one or more dividing elements including an...
8341396 Dynamic selection and insertion of signature blocks during message transmission  
A method is provided for inserting signature blocks into a message being transmitted along a communication path between a first client station and a second client station. The method includes a...
8335917 System for binding a device to a gateway to regulate service theft through cloning  
In one example, a Cable Modem Termination System (CMTS) combines a value identifying itself with a cable modem Media Access Control (MAC) address stored in a provisioning request. The CMTS then...
8336100 Systems and methods for using reputation data to detect packed malware  
A computer-implemented method for using reputation data to detect packed malware may include: 1) identifying a file downloaded from a portal, 2) determining that the file has been packed, 3)...
8335314 Adaptive and secure modular connection  
A method and system to increase the security of messages transmitted over an otherwise unsecured network. A secure channel is established in a normal manner over the network. A demodularization...
8336087 Robust digest authentication method  
The present invention relates to a method of authenticating a user in a communication system comprising a user terminal and an authentication server which is capable of storing two types of nonce...
8332924 Microchips with multiple internal hardware-based firewalls and dies  
A microchip comprising a first internal hardware-based firewall configured to deny access to a first portion of the microchip from a network; a general purpose microprocessor including two general...
8332626 Method and apparatus for authentication token-based service redirection  
A method, apparatus, and computer readable medium is provided. According to an embodiment, a method includes, receiving a message from a client. The method further includes, forwarding the message...
8332639 Data encryption over a plurality of MPLS networks  
A network device negotiates an encryption protocol with another network device, receives data from a trusted client device, encrypts the received data with the negotiated encryption protocol, and...
8332925 System and method for distributed multi-processing security gateway  
A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server based on network information, and using the...
8327129 Method, apparatus and system for internet key exchange negotiation  
The present invention discloses a method, an apparatus, and a system for IKE negotiation. One method comprises: upon receiving a data packet, selecting one of multiple service cards according to a...
8327135 Native WI-FI architecture for 802.11 networks  
A software based wireless infrastructure system is provided. The system has a driver that communicates with the network stack and a network interface card (NIC), a station server in communication...
8327430 Firewall control via remote system information  
Generally speaking, systems, methods and media for implementing a firewall control system responsive to remote system information are disclosed. Embodiments of a method may include receiving a...
8327434 System and method for implementing a proxy authentication server to provide authentication for resources not located behind the proxy authentication server  
Networked resources that are not located behind a proxy authentication server may be enabled to use the proxy authentication server for authentication. This may provide one or more of the features...
8327431 Managing configurations of a firewall  
A method for processing packets in a computer undergoing transitioning from a first configuration of a firewall to a second configuration of the firewall is disclosed. Packets arriving in the...
8327435 Techniques for managing security in next generation communication networks  
Disclosed techniques provide enhanced security for a communications network. Access terminal devices intended for operation via the network are expected to have security agent functionality, e.g....
8327128 Supporting secure sessions in a cloud-based proxy service  
A proxy server in a cloud-based proxy service receives a secure session request from a client device as a result of a Domain Name System (DNS) request for a domain resolving to the proxy server....
8327432 Self-initiated end-to-end monitoring of an authentication gateway  
An example embodiment of the present invention provides processes relating to self-initiated end-to-end monitoring for an authentication gateway. In one particular implementation, the...