Match Document Document Title
8978102 Network stimulation engine  
Methods, devices, and systems are disclosed for simulating a large, realistic computer network. Virtual actors statistically emulate the behaviors of humans using networked devices or responses...
8978138 TCP validation via systematic transmission regulation and regeneration  
The present invention provides a technique for validating TCP communication between a client requesting resources and a server providing requested resources to protect the specified server from a...
8977843 Geolocating network nodes in attenuated environments for cyber and network security applications  
A system and method for verifying and/or geolocating network nodes in attenuated environments for cyber and network security applications are disclosed. The system involves an origination network...
8978148 ***WITHDRAWN PATENT AS PER THE LATEST USPTO WITHDRAWN LIST***
Communication apparatus that communicate in different security levels and computer-readable media for controlling such apparatus
 
A communication apparatus may include a reception portion, a decision portion, and a transmission portion. The reception portion may receive a first data request transmitted through a first...
8977846 Method and device for the secure transfer of data  
A method for the secure transfer of a digital file from a first computerized system to one second computerized system, the method comprising the following steps: writing the digital file on a...
8977845 Methods and apparatus for access control in service-oriented computing environments  
Improved access control techniques for use in a service-oriented computing environment are disclosed. For example, one method for authenticating a client in a service-oriented environment, wherein...
8972718 System and method for providing load balanced secure media content and data delivery in a distributed computing environment  
A system and method for providing load balanced secure media content and data delivery (10) in a distributed computing environment is disclosed. Media content is segmented and encrypted into a set...
8972716 Wireless internet access module, communication method for host and wireless internet access module, and data card  
A communication method for a host and a wireless Internet access module, and a data card, are provided so that the host implements wireless Internet access with the wireless Internet access module...
8972717 Automatic delivery selection for electronic content  
Computer program products and methods for the secure delivery of a message in a communication system. The method includes identifying a best method for delivery of a message including considering...
8966244 Embedded apparatus, remote-processing method, and computer program product  
A processing unit performs a predetermined process by a remote operation from a client device. A monitoring unit monitors a first port for an unencrypted communication with the processing unit and...
8966580 System and method for copying protected data from one secured storage device to another via a third party  
A third party is configured to establish a virtual secure channel between a source SSD and a destination SSD via which the third party reads protected digital data from the source SSD and writes...
8964978 Method and apparatus for efficiently fixing transformed part of content  
Provided are a method and apparatus for effectively fixing scrambled content. The method includes checking fixing information for a program map table (PMT) packet of packets constituting the...
8965962 Diameter session audits  
Various exemplary embodiments relate to a method and related network node including one or more of the following: determining by the network device that an S9 session should be audited;...
8966609 Authentication method and apparatus for detecting and preventing source address spoofing packets  
An authentication apparatus for detecting and preventing a source address spoofing packet, includes a packet reception unit configured to receive a packet from a previous node or a user host; a...
8966240 Enabling packet handling information in the clear for MACSEC protected frames  
Techniques are provided to append packet handling information “in the clear” ahead of security related information in a packet to be routed over a network to optimize wide area network deployments...
8959610 Security bridging  
A network media gateway is used to bridge trust between a Service Provider network and subscriber devices. The gateway is authenticated by the Service Provider by using knowledge of network...
8959329 System and method for selective inspection of encrypted traffic  
Inspection of encrypted network traffic where multiple network connections are monitored that carry encrypted data, but only a subset of the network connections are decrypted and inspected....
8959333 Method and system for providing a mesh key  
Method for providing a mesh key which can be used to encrypt messages between a first node and a second node of a mesh network, wherein a session key is generated when authenticating the first...
8959614 Apparatus and method for providing virtual private network service based on mutual authentication  
An apparatus and method for providing a virtual private network (VPN) service based on mutual authentication are provided, the apparatus including a storage unit configured to store a first public...
8959650 Validating association of client devices with sessions  
A method is used in validating association of client devices with sessions. Information of a client device executing a user agent is gathered by a server for creating a device identifier for the...
8959180 Proxy for tolerating faults in high-security systems  
One or more requests are received from a first system. The requests are queued in a queue. A serialization group is determined for a request and the request is associated with the determined...
8953801 System and method for multicasting IPSEC protected communications  
A system and method is provided which allows multicast communications encrypted using IPSec protocol to be received by receivers in a network. In order to allow the receivers to receive the...
8954727 Security control in a communication system  
A method includes controlling security in a communication system that involves a node capable of routing traffic according to one or more security algorithms with respective security levels. The...
8954740 Session key proxy decryption method to secure content in a one-to-many relationship  
A server receives identifying information of a user of a client device and data encrypted with a public key of a group, where the encrypted data includes an encrypted session key for secure...
8955093 Cooperative network security inspection  
A network system includes a security device and a network access device. The network access device is to receive a packet from a source node destined to a destination node, and to examine a data...
8955052 System and method for maintaining dual identity in a server process  
A method, system and computer-usable medium are disclosed for managing identity authorizations to access information processing system resources. An application thread requiring access to target...
8955042 Systems and methods for implementing transparent encryption  
A method of providing transparent encryption for a web resource includes a key manager receiving an encryption key policy; receiving user identifiers and resource locators; defining an access...
8949594 System and method for enabling a scalable public-key infrastructure on a smart grid network  
A method for enabling a scalable public-key infrastructure (PKI) comprises invoking a process of receiving a message for a device, identifying an association ID for the device, retrieving...
8948388 Elliptic curve random number generation  
An elliptic curve random number generator avoids escrow keys by choosing a point Q on the elliptic curve as verifiably random. An arbitrary string is chosen and a hash of that string computed. The...
8949967 Information management apparatus, information management method, and non-transitory computer-readable storage medium  
An information management apparatus includes a first control information setting unit that sets first control information for permitting use of information within a destination terminal to the...
8949593 Authentication system for terminal identification information  
An authentication system receives encrypted terminal identification information and terminal identification information, from a transmission terminal, and determines whether decrypted...
8949604 System and method for issuing an authentication key for authenticating a user in a CPNS environment  
The present invention relates to a system and method for issuing an authentication key for authenticating a user in a CPNS environment. The system comprises a user terminal, a gateway and a CPNS...
8949956 Multi-account messaging management  
A system and a computer-implemented methods for email management are disclosed. The method includes storing messages for electronic mail accounts provided by remote electronic mail server systems....
8943577 Distributed multi-processing security gateway  
A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server, uses the proxy network address to establish a...
8943314 System and method for manipulating a computer file and/or program  
A device for manipulating a computer file or program includes a processor. The device includes a network interface which receives commands. The device includes a receiver which receives the...
8943307 System and method for retaining users' anonymity  
A method and a system are provided for generating information that relates to services being utilized by a user, by which: at a user device, retrieving usage information that relates to services...
8943591 Methods, systems, and computer program products for mitigating email address harvest attacks by positively acknowledging email to invalid email addresses  
A method of detecting and responding to an email address harvest attack at an Internet Service Provider (ISP) email system includes counting a number of failed email address look-ups during a...
8938613 Techniques for secure message offloading  
Techniques for secure message offloading are presented. An intermediary is transparently situated between a user's local messaging client and an external and remote messaging client. The user...
8938611 Enterprise cloud security gateway  
A security virtual machine is provided in a network including a resource shared among two or more virtual machines. All data traffic from each virtual machine to or from the shared resource is...
8938793 System and method for secure management of transactions  
Secure management of electronic transactions is provided by a system server that is communicatively coupled to terminals configured as thin client devices (TCD) and to one or more application...
8935741 Policy enforcement in mobile devices  
Systems, methods and computer program products for enabling enforcement of an administrative policy on one or more mobile devices are described herein. In an embodiment, an administrator uses a...
8935765 Method to enable mobile devices to rendezvous in a communication network  
There is provided a method to enable mobile devices to rendezvous on a shared communication service. The method includes steps for creating, via a device, a shared username and a shared password...
8935523 Cryptographic protected communication system with multiplexed cryptographic cryptopipe modules  
An auditable cryptographic protected communication system for connecting an enterprise server to a plurality of industrial devices using messaging protocols for each industrial device enabling the...
8931085 Download optimization in the presence of multicast data  
There is provided a method for optimizing a download of requested data to an electronic data processing unit that is currently receiving unrequested multicast data through a router included in a...
8930660 Shared information distributing device, holding device, certificate authority device, and system  
A distributing device for generating private information correctly even if shared information is destroyed or tampered with. A shared information distributing device for use in a system for...
8930423 Method and system for restoring encrypted files from a virtual machine image  
Various techniques, including a method, system and computer program product for restoring encrypted files are disclosed. The method includes accessing a file table record for an encrypted file....
8931047 System and method for securing virtualized networks  
A method and apparatus that secures a dynamic virtualized network is described. In an exemplary embodiment, a device learns a current network policy of the dynamic virtualized network, where the...
8930688 Apparatus and method for providing security service of user interface  
An apparatus and method for providing a security service for UI applications in a network system. In a network supporting a user interface, encryption-unneeded data is distinguished from data in...
8931046 System and method for securing virtualized networks  
A method and apparatus that secures a dynamic virtualized network is described. In an exemplary embodiment, a device learns a current network policy of the dynamic virtualized network, where the...
8931095 System and method for assessing whether a communication contains an attack  
Communications can be processed with multiple countermeasures to identify attacks. Each countermeasure can compute a probability of a communication containing an attack and an accompanying...