AcclaimIP-ad

Match Document Document Title
8929942 Wireless communication device  
According to an aspect of the present invention, there is provided a wireless communication device including: a cable port to which an external device is connected; a reading unit that reads...
8924709 Print release with end to end encryption and print tracking  
A method for encrypting print jobs that includes receiving output data, encrypting the output data with a randomly-generated symmetric session key, generating a session key header by encrypting...
8924738 Information processing device, content processing system, and computer readable medium having content processing program  
An information processing device and method include storing encrypted content, storing a key for decrypting the encrypted content stored, decrypting the encrypted content stored using the key,...
8925065 Computerized system and method for advanced network content processing  
A computerized system and method for processing network content in accordance with at least one content processing rule. In accordance with the inventive method, the network content is received at...
8918635 Apparatus and method for access control of content in distributed environment network  
An apparatus for generating a key for access control of content in a distributed environment network is provided. The apparatus includes a first key distributor configured to generate first...
8917177 Security structure of composite material having embedded security elements  
An apparatus is disclosed including one or more security structures. The one or more security structures includes: a weldable frame; a plurality of composite panels, each panel securable to the...
8918857 Distributed multi-processing security gateway  
A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server, uses the proxy network address to establish a...
8918633 Information processing device, information processing system, and program  
The present invention provides an information processing device, an information processing system, and a program capable of improving security and convenience. An information processing system (1)...
8918634 Network node with network-attached stateless security offload device employing out-of-band processing  
A network node for communicating data packets secured with a security protocol over a communications network includes a host information handling system (IHS) and one or more external security...
8914871 Distributed multi-processing security gateway  
A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server, uses the proxy network address to establish a...
8914543 Method and system for prioritizing network services  
A method, system and computer program product of prioritizing network services is provided. Such prioritization may comprise a better level of service, more timely system response and/or...
8914841 Method and system for mapping between connectivity requests and a security rule set  
A system capable of automated mapping between a connectivity request and an ordered security rule-set and a method of operating thereof. The system includes an interface operable to obtain data...
8909967 Technique for secure computation  
A technique for secure computation obfuscates program execution such that observers cannot detect what instructions are being run at any given time. Rather, program execution and memory access...
8910237 Trusted query network systems and methods  
Systems and methods are disclosed with which queries can be sent to various clients of a trusted query network in a trusted query network message. In one embodiment, each registered client...
8910296 Data privacy for smart services  
Techniques are disclosed for hiding sensitive information from a provider of support services. In one embodiment, a first network device determines that network device information includes...
8904478 Inspecting code and reducing code size associated to a target  
Code is associated to a target based on an inspection of the code. A target may be a device or a user. A number of code components may be inspected at one time and then transferred or otherwise...
8904036 System and method for electronic secure geo-location obscurity network  
Described are a secure geo-location obscurity network and ingress nodes, transit nodes and egress nodes used in such a network. In particular, a novel device is provided and comprises: a node for...
8904558 Detecting web browser based attacks using browser digest compute tests using digest code provided by a remote source  
The detection of web browser-based attacks using browser tests launched from a remote source is described. In one example, a digest is computed based on the content of an HTTP response message....
8904512 Distributed multi-processing security gateway  
A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server, uses the proxy network address to establish a...
8904503 Systems and methods for providing access to data accounts within user profiles via cloud-based storage services  
A computer-implemented method for providing access to data accounts within user profiles via cloud-based storage services may include (1) identifying a user profile associated with a user of a...
8904167 Method and apparatus for securing wireless relay nodes  
In order to mitigate the security risk posed by the insertion of a relay node within a communication network, both device authentication and subscriber authentication are performed on the relay...
8904516 System and method employing an agile network protocol for secure communications using secure domain names  
A system for connecting a first network device and a second network device includes one or more servers. The servers are configured to: (a) receive, from the first network device, a request to...
8898768 Computer or microchip with a secure control bus connecting a central controller to volatile RAM and the volatile RAM to a network-connected microprocessor  
A computer or microchip comprising a central controller that connected by a secure control bus with the other parts of the computer or microchip, including a volatile random access memory (RAM)...
8898452 Protocol translation  
A system and method for securing data by receiving encrypted data at a security appliance transmitted from a client, wherein at least a portion of the encrypted data is encrypted according to a...
8898780 Encoding labels in values to capture information flows  
Methods, servers, and systems for encoding security labels in a dynamic language value to allow cross script communications within client application while limiting the types of information that...
8893259 Systems and methods for fine grain policy driven clientless SSL VPN access  
The present disclosure provides solutions that may enable an enterprise providing services to a number of clients to determine whether to establish a client based SSL VPN session or a clientless...
8892778 Method and systems for securing remote access to private networks  
A method for securing remote access to private networks includes a receiver intercepting from a data link layer a packet in a first plurality of packets destined for a first system on a private...
8892868 Hardening tokenization security and key rotation  
A method of using a hardware security module and an adjunct application programming interface to harden tokenization security and encryption key rotation is disclosed. In various embodiments, the...
8891772 Cloud key escrow system  
Embodiments are directed to allowing a user to store encrypted, third-party-accessible data in a data store and to providing third party data access to a user's encrypted data according to a...
8892877 Method and device for accessing files of a secure file server  
A method and a device are provided for accessing data files of a secure file server, wherein a user or a process is authenticated; wherein access to the data files of the secure file server takes...
8893290 Methods and systems for detecting anomalies within voluminous private data  
A method and a system for detecting anomalies within a voluminous private data are provided. The voluminous private data, including sensitive information corresponding to one or more objects...
8887293 Method, system, and storage medium for secure communication utilizing social networking sites  
Embodiments disclosed herein provide secure communication among enterprise users utilizing social networking sites. A server computer may encrypt a post intended for a social networking site and...
8886954 Biometric personal data key (PDK) authentication  
Systems and methods verifying a user during authentication of an integrated device. In one embodiment, the system includes an integrated device and an authentication unit. The integrated device...
8887251 Handover method of mobile terminal between heterogeneous networks  
A handover method of a mobile terminal between heterogeneous networks for facilitating the handover with pre-authentication procedure is provided. A handover method between heterogeneous networks...
8885557 Dynamic selection among algorithms for generating fillers for security of data communications  
To reduce the effectiveness of eavesdropping attacks, a filler such as one utilized in a data frame for link-layer LAPDm signaling may be dynamically selected to utilize a first bit pattern (first...
8885823 Method and apparatus for delivering encrypted on-demand content without use of an application defined protocol  
A method for delivering encrypted content to a subscriber terminal on-demand through a communication network is provided. The method begins when SRM receives a request for content from the...
8880870 Bridging system, bridge, and bridging method  
Bridges 30, 40 are interposed between a server 10 or a client 20 having two channels 2ch, one of the two channels making a LAN connection to either the server or the client and the other channel...
8880905 Methods for processing private metadata  
According to one aspect of the invention, a file received from a first user is stored in a storage device, where the file includes private metadata encrypted by a secret key associated with a...
8880871 Hash table organization  
Disclosed are various embodiments for improving hash table utilization. A key corresponding to a data item to be inserted into a hash table can be transformed to improve the entropy of the key...
8881238 Authentication failure in a wireless local area network  
In the event of an authentication process failure, a mobile station bans a connection profile storing the credentials provided by the mobile station when initiating the failed authentication...
8881277 Method and systems for collecting addresses for remotely accessible information sources  
A method and system are described for collecting addresses for remotely accessible information sources. Messages, such as emails, carried by a messaging network (N1) are intercepted before...
8875218 Deploying policies and allowing off-line policy evaluations  
In an information management system, policies are deployed to targets and targets can evaluate the policies whether they are connected or disconnected to the system. The policies may be...
8874544 System and method for exposing internal search indices to internet search engines  
A system and method for exposing internal search indices to Internet search engines. The internal search indices are exposed to external search engines in such a way that the data may be...
8874898 Power line based theft protection of electronic devices  
Technologies for establishing and managing a connection with a power line communication network include establishing a communication connection between an electronic device and a security server....
8874897 System and methods for facilitating secure communications on a website  
A system and methods for facilitating secure communications on a website are presented. The system comprising a security server configured to receive a secure message from a creator device is...
8874685 Compliance protocol and architecture  
A process for centrally managing a large number of computers from a central location when technical expertise is not available at each end point nor can other remote management techniques be...
8874922 Systems and methods for multi-layered authentication/verification of trusted platform updates  
In accordance with the present disclosure, a system and method for multilayered authentication of trusted platform updates is described. The method may include storing first cryptographic data in...
8869260 Computer or microchip with a master controller connected by a secure control bus to networked microprocessors or cores  
A computer or microchip securely controlled through a private network including a connection to a network of computers including the Internet; a separate connection to at least a private network...
8869236 Automatic configuration of a network device  
One embodiment includes a non-transitory computer readable medium having instructions executable by a processor to implement a method. The method includes receiving user configuration data for a...
8869276 Method and apparatus for whole-network anomaly diagnosis and method to detect and classify network anomalies using traffic feature distributions  
To improve network reliability and management in today's high-speed communication networks, we propose an intelligent system using adaptive statistical approaches. The system learns the normal...