Match Document Document Title
8869235 Secure mobile browser for protecting enterprise data  
A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application servers, etc.) using their mobile...
8862869 Method and apparatus for providing network initiated session encryption  
A network system and method capable of implementing network initiated packet data protocol (“PDP”) context to enhance security of network communications are disclosed. An activation and/or...
8862870 Systems and methods for multi-level tagging of encrypted items for additional security and efficient encrypted item determination  
The present disclosure is directed towards systems and methods for performing multi-level tagging of encrypted items for additional security and efficient encrypted item determination. A device...
8863270 User interface for providing voice communications over a multi-level secure network  
According to one embodiment, a computer system executing a computer program is coupled to multiple secure network domains configured in a multi-level security architecture. The computer program...
8862866 Method and apparatus for providing an adaptable security level in an electronic communication  
A method of communicating in a secure communication system, comprises the steps of assembling a message at a sender, then determining a security level, and including an indication of the security...
8862879 Method and apparatus for efficient and secure creating, transferring, and revealing of messages over a network  
An encryption based method of enabling a plurality of parties to share, create, hide, or reveal message or token information over a network includes a commutative group cipher (CGC), where the...
8855302 Apparatus and method for Skein hashing  
Described herein are an apparatus and method for Skein hashing. The apparatus comprises a block cipher operable to receive an input data and to generate a hashed output data by applying Unique...
8856510 Method for joining user domain and method for exchanging information in user domain  
A method for joining a user domain based on digital right management (DRM), a method for exchanging information between a user device and a domain enforcement agent, and a method for exchanging...
8856911 Methods, network services, and computer program products for recommending security policies to firewalls  
Recommending a security policy to a firewall, includes receiving a request from a firewall for a recommendation as to whether the firewall should allow or block a detected present communication...
8856507 Secure identity and personal information storage and transfer  
The invention presented herein consists of systems and methods of secure storage for sensitive and confidential data, such as personal identity data, along with methods of securely accessing that...
8855306 Node distributed with group key and group key updating  
According to one embodiment, a node that is a root node of a network forming a directed acyclic graph topology, which is composed of plural nodes including the node serving as the root node and...
8856910 Detecting encrypted tunneling traffic  
Techniques for detecting encrypted tunneling traffic are disclosed. In some embodiments, detecting encrypted tunneling traffic includes monitoring encrypted network communications between a client...
8856920 System and method of securely processing lawfully intercepted network traffic  
A system and method are provided for supporting storage and analysis by law enforcement agency premises equipment of intercepted network traffic. The system and method provide integrity of the...
8856900 Method for authorising a connection between a computer terminal and a source server  
The disclosure relates to a method and a system for authorising a connection between a computer terminal and a source server, including an initialization phase wherein: the terminal connects to a...
8856863 Method and system for rapid accreditation/re-accreditation of agile IT environments, for example service oriented architecture (SOA)  
A system and method for managing and analyzing security requirements in reusable models. At least one functional model, at least one security implementation model, at least one requirement model,...
8850553 Service binding  
Embodiments for performing service binding between a client and a target server are disclosed. In accordance with one embodiment, a clear text client service binding value is received from a...
8850578 Network intrusion detection  
A method of detecting network communications includes monitoring network devices for communication data; generating an output file including the communication data correlated with a communication...
8850183 Interconnect device to enable compliance with rights management restrictions  
The present invention provides an interconnect device that connects a source device to a destination device, and allows the source device's non-compliant rights management (RM) interface to...
8850076 Modular device component  
A component of an electronic device comprises a network connection processor, which comprises a physical network connection block to receive data from and transmit data to a network and a first...
8850184 Transmission management apparatus, program, transmission management system, and transmission management method  
A transmission management apparatus includes a receiving unit that receives, from a first transmission terminal 10, a communication request for a communication with a second transmission terminal...
8843994 Method and system for assessing cumulative access entitlements of an entity in a system  
A method and system is provided for assessing the cumulative set of access entitlements to which an entity, of an information system, may be implicitly or explicitly authorized, by virtue of the...
8844040 Systems and methods for using end point auditing in connection with traffic management  
The present invention provides a system and method of managing traffic traversing an intermediary based on a result of end point auditing. An authentication virtual server of an intermediary may...
8842834 Robust delivery of packet based secure voice  
A method is provided for transmitting voice data in a secure communication system. The method includes: transmitting voice data using a plurality of data packets; embedding a cryptographic message...
8844018 Methods and apparatus to enhance security in residential networks  
Example methods and apparatus to enhance security in residential networks and residential gateways are disclosed. A disclosed example apparatus includes a transceiver to receive an Internet...
8839408 Integration of cloud management systems with on-premise systems  
A check in communication is received from an agent running inside a firewall via a permitted firewall communication channel. The check in communication is received via the permitted firewall...
8837726 Content protection key encryptor for security providers  
Techniques are provided to receive at an encryption device from a control device an encryption request comprising a message and an identifier for a device. The control device and the device are...
8839359 Data processing device and data processing method  
A data encryption device is connected between an HDD and an HDD controller that controls the HDD. The data encryption device encrypts data that is stored from the HDD controller to the HDD, and...
8838958 Systems and methods for bulk encryption and decryption of transmitted data  
A method for using a network appliance to efficiently buffer and encrypt data for transmission includes: receiving, by an appliance via a connection, two or more SSL records comprising encrypted...
8837722 Secure content distribution with distributed hardware  
This document describes tools capable of securely distributing entertainment content among and using distributed hardware. These tools may do so robustly by rebinding entertainment content between...
8839366 Vehicular communication system, mobile communication terminal, and vehicular apparatus  
A vehicular communication system includes a mobile communication terminal, an in-vehicle apparatus, and a distribution center to distribute a content. The mobile communication terminal includes a...
8832820 Isolation and security hardening among workloads in a multi-tenant networked environment  
A method and associated systems for enhanced isolation and security hardening among multi-tenant workloads. An agent running on a processor of a networked computer system on which multicast and...
8831224 Method and apparatus for secure pairing of mobile devices with vehicles using telematics system  
A method for establishing secure wireless communications between a mobile device and a vehicle, where a user is not required to enter a password, but instead the telematics system is used to...
8832428 System and method for securely communicating across multiple networks using a single radio  
A communications module for facilitating secure communications on a first network and a second network includes: a single transceiver for receiving and transmitting first network messages from and...
8832842 Storage area network external security device  
An external security device is provided in the communication path between devices of different security levels. A higher security device needs only to trust the security of the external device,...
8832259 Virtual service mode methods for network remote monitoring and managing system  
A computer-implemented method for remote monitoring and managing of network devices. The method comprises generating a list of managed devices on a user interface in a central management system,...
8832429 Smart grid and method for operating a smart grid  
Method for operating a smart grid including a plurality of smart meters configured to monitor at least one physical measured quantity and to provide measurement results of the at least one...
8826451 Mechanism for facilitating communication authentication between cloud applications and on-premise applications  
In accordance with embodiments, there are provided methods and systems for providing communication authentication between cloud applications and on-premise applications. A method of embodiments...
8825998 Security control in a communication system  
A method includes controlling security in a communication system that involves a node capable of routing traffic according to one or more security algorithms with respective security levels. The...
8826384 Assent to conditions for network access  
A device that includes a first processor, a second processor, and an encryption module in communication with the first processor and the second processor may be used to accept conditions for...
8825812 Method and system for peer-to-peer image streaming  
A peer-to-peer image streaming system including a sharer computer including a transmitter for sending a message including a web address, a peer-to-peer image streamer for streaming image data over...
8825999 Extending encrypting web service  
A data encryption service is provided over the Internet. Users specifying only authorized users' identity information can share encrypted information without sharing passwords or accessing public...
8826003 Network node with network-attached stateless security offload device employing out-of-band processing  
A network node for communicating data packets secured with a security protocol over a communications network includes a host information handling system (IHS) and one or more external security...
8826000 Method and apparatus for supporting cryptographic-related activities in a public key infrastructure  
In a node (110) communicating with other nodes in a network (150), a system and method for performing cryptographic-related functions is provided. The node (110) receives and transmits inputs and...
8826001 Securing information within a cloud computing environment  
Embodiments of the invention provide a solution for securing information within a Cloud computing environment. Specifically, an encryption service/gateway is provided to handle...
8826369 Terminal, communication system, data management method, server and storage medium  
A terminal includes an acquisition unit to acquire sensor data, a storage unit to store a policy table which defines a management policy for each sensor data or each service using the sensor data,...
8826002 System and methods for facilitating secure communications on a website  
A system and methods for facilitating secure communications on a website are presented. The system comprising a security server configured to receive a secure message from a creator device is...
8819410 Private electronic information exchange  
Methods and apparatuses for private electronic information exchange are described herein. In one embodiment, when electronic information is received to be delivered to a recipient, the electronic...
8819788 Method and system for providing security data to security stations  
There is provided a system and method of selectively directing collected security data that may be displayed concurrently at a first security station and at a supervisor station, and providing a...
8813212 Computer or microchip with a master controller connected by a secure control bus to networked microprocessors or cores  
A computer or microchip securely controlled-through a private network and including a secure private unit that is protected by an inner hardware-based access barrier or firewall that denies access...
8813191 Method and apparatus for controlling the number of devices installed in an authorized domain  
The number of devices installed in an Authorized Domain is controlled by a master device functionality. This master devices stores ceiling values for the total number Totaljimit of devices to be...