Match Document Document Title
8321352 Fingerprinting for software license inventory management  
Various techniques for software license inventory and asset management are disclosed. A fingerprint may be generated and associated with various copies of software applications installed on a...
8320558 Encryption of synchronization information  
A computer-implemented method for synchronizing encryption of information is disclosed according to one aspect of the subject technology. The method comprises receiving a selection of one or more...
8321667 Security model for common multiplexed transactional logs  
A security model is provided in a transactional logging infrastructure that is arranged as a protected subsystem built on an underlying secure file system. Files in the underlying file system used...
8321676 Method for establishing a secure ad hoc wireless LAN  
Secure communications on a network. An unauthenticated client on an network sends start packets to locate other clients. The unauthenticated client receives responses to the start packets from...
8316434 Centralized access control system and methods for distributed broadband access points  
In accordance with the teachings herein, a wireless access point module having a plug and play feature and an auto-configuration engine may be used to provide substantial benefits to business...
8316439 Anti-virus and firewall system  
An anti-virus system for enforcing a virus monitoring and scanning process, the anti-virus and firewall system comprises a master CPU card, a plurality of slave CPU cards and a programmable logic....
8316142 Subnet box  
The invention provides an external in-line device (“Subnet Box”) placed between a network and an access point to achieve secure Wi-Fi communications without needing to modify the access point. The...
8316228 Trusted bypass for secure communication  
A device having an encryption module in communication with first and second communication ports may facilitate connecting to an access network, without requiring a non-secure hard drive to...
8312533 Virtual local area network switching device and associated computer system and method  
A virtual local area network switching device and an associated computer system and method are provided to permit operation in accordance with a plurality of different security classifications....
8312261 Method and system for verification of an endpoint security scan  
A method of granting access to resources includes the step of receiving a request from a node to access a resource. A scanning agent is generated to gather information about the node. A key is...
8312279 Secure modem gateway concentrator  
A method and system for secure access to computer equipment. An embodiment includes a secure access controller connected to a link between a transceiver (such as a modem) and the computer...
8312276 Method for sending and receiving an evaluation of reputation in a social network  
A network reputation system and its controlling method are provided. A credential and exchange component permits a user to generate credentials and exchange matching items with those persons...
8312093 E-mail messaging system and method for enhanced rich media delivery  
A multi-user e-mail messaging system is described that is interfaced through the Internet and includes a first user group sharing a first server, which first server is interfaced to the Internet....
8311222 Hardware based multi-dimensional encryption  
A system including a first module and a second module. The first module includes a linear feedback shift register (LFSR) and a permutator circuit. The LFSR outputs a pseudo-random sequence of...
8312286 Wireless network having multiple communication allowances  
Multiple levels of wireless network resource granting. A user who has an authorized key, e.g., an encryption key or a key indicating that they have paid for service, gets a first, better level of...
8312529 Global network computers  
A microchip for a computer configured to connect to a one network of computers, the microchip comprising: a first internal hardware-based firewall, the first internal hardware-based firewall...
8312532 Connection supporting apparatus  
Provided is a connection supporting apparatus for supporting to establish a VPN through an IKE between a client and a gateway, comprising, a mode judging unit receiving authentication information...
8307419 System and method for regulating communications to or from an application  
The flow of information to or from an application on a host machine is regulated by a trusted agent operating in conjunction with at least one security element, such as a firewall or a policy...
8307415 Safe hashing for network traffic  
Secure network communications between a source computer and a destination computer utilizing a firewall. The firewall determines a remote endpoint and the local physical memory address associated...
8307201 Information processing system, service providing apparatus and method, information processing apparatus and method, recording medium, and program  
The present invention is related to an information processing system, a service providing apparatus and method, an information processing apparatus and method, a recording medium, and a program...
8307423 Migrating a network to tunnel-less encryption  
A method comprises, in a network comprising VPN gateway devices configured only for plaintext data communication, configuring a policy server with a security policy including DO NOT ENCRYPT...
8307421 End-to-end authentication of session initiation protocol messages using certificates  
End-to-end authentication capability based on public-key certificates is combined with the Session Initiation Protocol (SIP) to allow a SIP node that receives a SIP request message to authenticate...
8301909 System and method for managing external storage devices  
An apparatus, system, and method enable a new platform storage system to have access to an external storage system having data encrypted thereon by an existing platform storage system. Encryption...
8302174 System, device and method for secure provision of key credential information  
A system for secure provision of key credential information is provided. The system comprises secure logic circuitry for being disposed in a host computer. The secure logic circuitry detects a...
8301875 Network, IPsec setting server apparatus, IPsec processing apparatus, and IPsec setting method used therefor  
There is provided an IPsec setting server apparatus capable of preventing inconsistency of setting among communicating apparatuses. An IPsec processing section subjects a data communication packet...
8302186 System and method for testing network firewall for denial-of-service (DOS) detection and prevention in signaling channel  
A device may measure a first performance, associated with legitimate traffic without attack traffic, of a Session Initiation Protocol (SIP)-based protection device implementing authentication;...
8301895 Identity based network policy enablement  
Enhanced network data transmission security and individualized data transmission processing can be implemented by intermediaries in a communication path between two endpoint peers individually...
8296842 Detecting public network attacks using signatures and fast content analysis  
Network worms or viruses are a growing threat to the security of public and private networks and the individual computers that make up those networks. A content sifting method if provided that...
8296838 Methods, systems, and computer program products for protecting against IP prefix hijacking  
A communication network is operated by identifying at least one potential hijack autonomous system (AS) that can be used to generate a corrupt routing path from a source AS to a destination AS....
8296558 Method and apparatus for securing communication between a mobile node and a network  
In accordance with the teachings of the present invention, a method and apparatus is presented for securely negotiating a session key between a mobile node and a network node, such as a first hop...
8296825 Method and system for a secure connection in communication networks  
A system for enabling a user to communicate on a virtual private network through a public communication network, the possibility of communicating on the private network depending on the...
8296839 VPN discovery server  
Methods and systems for enabling robust routing between protected enclaves over an unsecured network are provided herein. In one aspect, the present invention provides methods and systems for...
8296360 Aggregation system  
An aggregation machine, including: a computer, an output device controlled by the computer, and networking hardware connecting the computer to a network, the computer programmed so that the...
8296560 Method and apparatus for restricting address resolution protocol table updates  
Techniques for restricting Address Resolution Protocol (ARP) table updates to updates originating from authorized subsystems is disclosed. According to an embodiment, an instruction to update an...
8291236 Methods and apparatuses for secondary conditional access server  
Conditional access to media content of primary security systems on a secondary networked environment. In one embodiment, a conditional access server is used to provide services to secondary CA...
8291487 System and method for distributed multi-processing security gateway  
A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server, uses the proxy network address to establish a...
8291089 Image processing device, control method therefor, and program  
An image processing device communicable with an information processing device, includes: a first management unit for managing at least one service provided by the image processing device based on...
8291214 Apparatus and method for secure remote processing  
A method and apparatus for providing on-demand services to an organization. The services are provided by a hosting center. The apparatus comprises an on-premises connectivity agent at the...
8291469 Communication access provider that allows a service provider to control an access interface at a customer premise  
A communication access provider receives an access request from a separate service provider who provides a communication service to a customer. The communication access provider generates an...
8290978 Information processing apparatus, information processing method, program, and storage medium  
This invention has as its object to attain strong security and to implement network solutions with high convenience and simplicity with low cost upon providing Web services. To this end, an...
8291495 Identifying applications for intrusion detection systems  
An intrusion detection system (“IDS”) device is described that includes a flow analysis module to receive a first packet flow from a client and to receive a second packet flow from a server. The...
8291501 Validation of protected intra-system interconnects for digital rights management in electrical computers and digital data processing systems  
Embodiments for validating protected data paths for digital rights management of digital objects are disclosed. Some embodiments disclosed herein may comprise processes or apparatus for...
8291218 Creating and using secure communications channels for virtual universes  
A system and method provides secure channels for communication in a virtual universe by employing a packet interception layer for incoming and outgoing data packets. A data path is defined and is...
8291119 Method and systems for securing remote access to private networks  
A method for securing remote access to private networks includes a receiver intercepting from a data link layer a packet in a first plurality of packets destined for a first system on a private...
8285984 Secure network extension device and method  
A network extension device comprising a CPU, memory, protected I/O connectable to local controls and peripherals, external communications port, a trusted device connected to the CPU such that it...
8285986 Apparatus and method for data packet security in a wireless sensor network  
An apparatus and method for providing data packet security in a wireless sensor network including a plurality of sensor nodes. The apparatus includes a memory unit for storing a plurality of node...
8281123 Apparatus and method for managing and protecting information during use of semi-trusted interfaces  
A system and method for managing private information while using semi-trusted interfaces is described. In an embodiment, an intermediate node may receive a first and second communication between a...
8281392 Methods and systems for wired equivalent privacy and Wi-Fi protected access protection  
Methods and systems for disrupting potential attacks on a wireless network through transmission of random data are disclosed. Specifically, this disclosure relates to systems and methods for...
8281122 Generation and/or reception, at least in part, of packet including encrypted payload  
An embodiment may include circuitry to generate, at least in part, and/or receive, at least in part, a packet. The packet may include at least one field and an encrypted payload. The at least one...
8281147 Image based shared secret proxy for secure password entry  
The claimed subject matter provides systems and/or methods that facilitate utilizing a shared secret to obscure a password within a sequence of characters. The sequence of characters can include...