Match Document Document Title
8812841 Communications hub for use in life critical network  
Secured communications between patient portable communicators (PPC) and a central authority (CA) via an unsecured network are implemented using software implemented by a communications device. The...
8811618 Fast ciphering key search for WLAN receivers  
A ciphering key management technique for use in a WLAN receiver is provided where a hash table is stored that has a first and a second table portion. The first table portion stores transmitter...
8805689 Methods and apparatus to generate and use content-aware watermarks  
Methods and apparatus to generate and use content-aware watermarks are disclosed herein. In a disclosed example method, media composition data is received and at least one word present in an audio...
8806572 Authentication via monitoring  
Systems, methods, and other embodiments associated with authentication via monitoring are described. One example method includes detecting a data flow in which indicia of identity (DFWIOI) travel...
8806189 Apparatus for analyzing traffic  
An apparatus for analyzing traffic is provided. The apparatus may precisely identify and analyze web traffic through 5 tuple-, HTTP-, and request/response pair-based packet analysis by monitoring...
8806190 Method of transmission of encrypted documents from an email application  
The application discloses an improved method of transmitting encrypted emails by prompting the user to select at least one attachment for attaching with the email, prompting the user to select an...
8806191 Policy-based messaging firewall  
An e-mail firewall applies policies to e-mail messages between a first site and second sites in accordance with administrator selectable policies. The firewall includes a simple mail transfer...
8806607 Unauthorized data transfer detection and prevention  
A method includes receiving a policy via a network connection, wherein the policy includes at least one signature. Receiving a data communication message from a processor of a computing device via...
8799643 System and method for monitoring secure data on a network  
A system and method for monitoring secure digital data on a network are provided. An exemplary network monitoring system may include a network device in communication with a user and a network....
8799641 Secure proxying using network intermediaries  
Methods and apparatus for secure proxying using network intermediaries. A system may include one or more servers and a network intermediary. The network intermediary may generate security metadata...
8800001 Network authentication method, method for client to request authentication, client, and device  
A network authentication method, a client and a device are provided. The method includes: receiving SYN data sent by a client, where the SYN data includes a sequence number SEQ1 and a network...
8799637 System, method and software application for secure communication  
The present invention relates generally to systems, methods and software applications for securely transmitting information. More particularly, the present invention relates to providing a system,...
8799985 Automated security classification and propagation of virtualized and physical virtual machines  
Architecture that provides additional data that can be obtained and employed in security models in order to provide security to services over the service lifecycle. The architecture automatically...
8799642 Secure messaging  
A method for secure communication of a message. The method includes providing a message including a plurality of message packets, providing a nodal network including a plurality of nodes, where...
8799649 One time passwords with IPsec and IKE version 1 authentication  
A system adapted to condition access to a network over an IPsec session to clients providing a proper one-time-password, even though the network access control uses IKEv1, which does not support...
8798272 Systems and methods for managing multiple keys for file encryption and decryption  
Systems and methods for managing multiple keys for file encryption and decryption may provide an encrypted list of previously used keys. The list itself may be encrypted using a current key. To...
8800051 System and method for private information communication from a browser to a driver  
Systems and methods for communicating private information from a browser to a driver are presented. The private information communication method can comprise: performing a private information...
8793486 Systems and methods for optimizing SSL handshake processing  
A method for buffering SSL handshake messages prior to computing a message digest for the SSL handshake includes: conducting, by an appliance with a client, an SSL handshake, the SSL handshake...
8793782 Enforcing a health policy in a local area network  
A method for injecting a security token into an authentication protocol response is disclosed. An authentication protocol response from a node requesting access to a network is intercepted. It is...
8793484 Electronic device with message encryption function and message encryption method  
An electronic device with a message encryption function that includes a message processing module for receiving or sending or reading encrypted messages. The message processing module is...
8792646 Systems and methods for group key distribution and management for wireless communications systems  
A novel group key distribution and management scheme for broadcast message security is provided that allows an access terminal to send a single copy of a broadcast message encrypted with a group...
8792416 Mobile communication system, mobile communication method, distribution server, radio network controller and mobile station  
In a mobile communication system, a radio device is configured to transmit notification information transmitted from a distribution server, to a mobile station, by use of broadcast communication....
8787565 Method and apparatus for generating an advanced encryption standard (AES) key schedule  
An Advanced Encryption Standard (AES) key generation assist instruction is provided. The AES key generation assist instruction assists in generating round keys used to perform AES encryption and...
8788805 Application-level service access to encrypted data streams  
Techniques for securely providing cryptographic keys to trusted intermediate nodes or monitoring devices are described so that SSL, TLS, or IPSec communications can be monitored, compressed over a...
8788807 Privacy protection in communication systems  
Methods and apparatus for protecting user privacy in a shared key system. According to one aspect, a user generates a derived identity based on a key and a session variable, and sends the derived...
8788806 General purpose distributed encrypted file system  
A general purpose distributed encrypted file system generates a block key on a client machine. The client machine encrypts a file using the block key. Then, the client encrypts the block key on...
8788811 Server-side key generation for non-token clients  
A method and system for server-side key generation for non-token clients is described.
8782409 Confidential message exchange using benign, context-aware cover message generation  
Systems and methods are disclosed permitting a sender to send a secret and secure message to a recipient. An application on a sender device interfaces with known message generating tools to permit...
8782743 Methods and apparatus for use in a generic bootstrapping architecture  
According to an aspect of the present invention there is provided a method of obtaining authentication information for use in a Generic Bootstrapping Architecture, GBA, employed in a network with...
8782430 Secure external buffer for hard disk drive system on a chip  
A system securely buffers hard disk drive data using a host side eXlusive OR (XOR) encryption engine. A host communicates with an encryption interface interposed between the host and a client....
8782395 Monitoring usage of WAN optimization devices integrated with content delivery networks  
Content delivery networks may associate each WAN optimized network connection with a specific client-to-cloud-service connection using connection identifiers. When an edge node of a content...
8782742 Communication apparatus, authentication apparatus, communication method and authentication method  
A communication apparatus transmits an authentication frame to an authentication apparatus and receives a response frame for response to the authentication frame from the authentication apparatus...
8782414 Mutually authenticated secure channel  
A system and methods for establishing a mutually authenticated secure channel between a client device and remote device through a remote access gateway server. The remote access gateway server...
8782392 Privacy-protective data transfer and storage  
A method is performed at a computer system having one or more processors and memory storing one or more programs executed by the one or more processors. The method includes receiving a first data...
8782394 Centralized authentication system  
Centralized authentication systems are provided. A representative system, among others, includes an authentication registration system, a content provider and an internet server. The mobile...
8775792 Method of and system for encryption and authentication  
The invention provides a method of and system for networked security, involving multiple clients and servers. Rather than relying on single server based authentication and/or single stream based...
8775791 System and method for secure messaging between wireless device and application gateway  
A method and system for secure messaging between a wireless device and an application gateway provides for connecting a device to an application mapping layer via a secure socket and exchanging...
8776208 Incorporating network connection security levels into firewall rules  
Embodiments of the present invention are directed to establishing and/or implementing firewall rules that may employ parameters based on connection security levels for a connection between...
8775790 System and method for providing secure network communications  
A method includes receiving a data message, from a first embedded node, in a first end point device. The first data message is addressed to a second embedded node. The method also includes...
8769639 History-based downgraded network identification  
Some embodiments of the invention are directed to increasing security and lowering risk of attack in connecting automatically to networks by enabling client devices to verify the identity of the...
8768403 Layered control of service interface for a breakout component in a mobile data network  
Mobile network services are performed in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio...
8769267 Geothentication based on new network packet structure  
A system and method for verifying and/or geolocating network nodes in a network in attenuated environments for cyber and network security applications are disclosed. The system involves an...
8769262 VPN connection system and VPN connection method  
For establishing a VPN connection in the call-back type, a VPN server establishes an always-on connection through a unique protocol different from the electronic mail delivery system. A client...
8767958 Secure open-air communication system utilizing multichannel decoyed transmission  
A secure, open-air communication system utilizes a plurality of “decoy” data signals to hide one or more true data signals. The true data signal(s) are channel hopped with the plurality of decoy...
8769654 Counterfeit prevention strategy for pluggable modules  
A method is provided, including (a) upon a standard small form-factor pluggable (SFP) module being inserted into an SFP jack on a network host device, determining if the SFP module is a legacy...
8769260 Messaging system with user-friendly encryption and decryption  
Encryption of message content of an e-mail sent by way of a webmail service may be performed in response to activation of a user interface element. The message content may be encrypted using a...
8769662 Methods, systems, and computer program products for protecting against IP prefix hijacking  
A communication network is operated by identifying at least one potential hijack autonomous system (AS) that can be used to generate a corrupt routing path from a source AS to a destination AS....
8769300 Technique for content management using group rights  
A technique for content management using group rights is described. The technique facilitates a flexible management for a group of content files mainly by effecting a change of group memberships...
8769615 Key storage and retrieval in a breakout component at the edge of a mobile data network  
Mobile network services are performed in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio...
8769664 Security processing in active security devices  
Methods, systems, and apparatus, including computer program products, featuring receiving at a first security device a packet. The first security device determines that the packet is associated...