Match Document Document Title
8769629 User sensitive filtering of network application layer  
In one embodiment, a method includes receiving authorization data at a local node of a network. The authorization data indicates a particular network address of a different node in the network and...
8761827 Layered control of service interface for a breakout component in a mobile data network  
Mobile network services are performed in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio...
8761396 System and method for securing data for redirecting and transporting over a wireless network  
A system and method for securing data for redirecting and transporting over a wireless network are generally described herein. In accordance with some embodiments, when it is determined that an...
8762725 Secure machine-to-machine communication protocol  
A task list server supports secure asynchronous communications between both a workstation and one or more machines. The task list server stores requests and responses initiated by either side and...
8762706 Computer systems, methods and program product for multi-level communications  
Systems, methods and a computer program product for facilitating multi-level communications within a computer system provide for generating while using a first network component a network data...
8763147 Data security in a multi-nodal environment  
A data security manager in a multi-nodal environment enforces processing constraints stored as security relationships that control how different pieces of a multi-nodal application (called...
8756689 Method, system, and device for securely handling virtual function driver communications with a physical function driver  
In an input/output virtualization-enabled computing environment, a device, method, and system for securely handling virtual function driver communications with a physical function driver of a...
8756337 Network packet inspection flow management  
Deep packet inspection is performed on packets in a network intrusion prevention system. A processing priority may be assigned to a packet based on characteristics such as the protocol type of the...
8756412 Gateway supporting transparent redundancy in process control systems and other systems and related method  
A method includes synchronizing a first gateway with information from a second gateway. The second gateway operates in a primary role with at least one primary network address. The second gateway...
8755522 System and method for interleaving information into slices of a data packet, differentially encrypting the slices, and obfuscating information in the data packet  
Approaches for combining different information to be transmitted into different slices of a data packet and/or encrypting the slices using different cryptographic schemes for secure transmission...
8751789 General purpose distributed encrypted file system  
A general purpose distributed encrypted file system generates a block key on a client machine. The client machine encrypts a file using the block key. Then, the client encrypts the block key on...
8751799 Method and apparatus for providing content  
Methods and systems for enabling content to be securely and conveniently distributed to authorized users are provided. More particularly, content is maintained in encrypted form on sending and...
8752175 Method and apparatus for network intrusion detection  
The current invention discloses a method and apparatus to detect and mitigate network intrusion by collecting a first log of wireless network traffic in the vicinity of an area and a second log of...
8751790 Secure data exchange based on request destination  
A data transfer method performed at a proxy server includes intercepting a data request from a client computer that is directed to a target server, encrypting profile information, augmenting the...
8752208 Detecting web browser based attacks using browser digest compute tests launched from a remote source  
The detection of web browser-based attacks using browser tests launched from a remote source is described. In one example, a digest is computed based on the content of an HTTP response message....
8751806 Method and apparatus to provide public key authentication with low complexity devices  
A method and apparatus to authenticate limited processing-power systems (LPPS) using elliptic cryptography within a well known elliptic curve E, over a well known finite field F ((E(F)). The...
8750511 Root node and a computer readable medium  
A wireless mesh network includes a plurality of nodes to which a device key is assigned. The device key belongs to one of a plurality of groups. In a root node, a correspondence relationship...
8745728 Creating federated associate identifiers to positively identify associates interfacing across multiple business applications  
Methods, apparatus, systems and computer program products are described and claimed that provide for automatically and positively determining that an associate accessing a business...
8745374 Sending protected data in a communication network  
A method of sending protected data from a sender unit to a receiver unit via an intermediate unit. The intermediate unit stores information associated with a certificate belonging to the receiver...
8745373 Systems and methods for applying encryption to network traffic on the basis of policy  
An information handling system including a receiver for inbound data destined for delivery to a network node, an encryption recognition engine operable to identify whether the inbound data...
8738532 System and method for securing data through a PDA portal  
Consumers may utilize computing devices to assist in the purchase and/or loyalty process, and in particular, the consumer may utilize a PDA to facilitate the purchase and/or loyalty process....
8732452 Secure message delivery using a trust broker  
An email security system is described that allows users within different organizations to securely send email to one another. The email security system provides a federation server on the Internet...
8732453 Secure acknowledgment device for one-way data transfer system  
An apparatus for relaying a hashed message from a first node to a second node, comprising an inlet interface for receiving a message from the first node, a hash number calculator for hashing the...
8732451 Portable secure computing network  
As provided herein, when using an untrusted network connection, a secure online environment can be created for a remote machine by connecting to a trusted computer with a trusted network...
8732454 Key setting method, node, and network system  
A key setting method executed by a node transmitting and receiving a packet through multi-hop communication in an ad-hoc network among ad-hoc networks, includes receiving a packet encrypted using...
8726008 Network security smart load balancing  
A system and method for protecting data communications in a system including a load-balancer connected to a cluster of security network components, e.g. firewall node. The load-balancer transfers...
8726015 Methods and apparatus for secure content routing  
Systems and methods are described which provide handling and secure routing of an article of content in accordance with a code or instruction set identifier embedded in or associated with the...
8726382 Methods and systems for automated detection and tracking of network attacks  
Methods for tracking attacking nodes are described and include extracting, from a database, an instance of each unique packet header associated with IP-to-IP packets transmitted over a time...
8726384 Apparatus, and system for determining and cautioning users of internet connected clients of potentially malicious software and method for operating such  
A system at a central server and at a plurality of web filters is installed to observe traffic and to protect users from attempting connection to suspicious, malicious, and/or infectious targets....
8719564 Method for sharing secret values between sensor nodes in multi-hop wireless communication network  
A method for sharing a secret key between a source node and a destination node includes (a) adding, at each forward intermediate node, a secret key between the forward intermediate node and a node...
8719563 Key setting method, node, and network system  
A key setting method executed by a node transmitting and receiving data through multi-hop communication in an ad-hoc network among multiple ad-hoc networks, includes detecting connection with a...
8719562 Secure service network and user gateway  
A secure service network (SSN) comprising an IP network infrastructure wherein the access of one participant to another participant in the network is controlled by a secure service gateway (SSG)...
8712917 Software execution management apparatus, method, and computer-readable medium thereof  
Even if the process for permitting execution of software is enabled in accordance with first license information, upon transmitting an invalidation signal from the invalidation signal transmitter...
8713641 Systems and methods for authorizing, authenticating and accounting users having transparent computer access to a network using a gateway device  
A system and method for authorizing, authenticating and accounting users having transparent access to a destination network, wherein the users otherwise have access to a home network through home...
8711751 Methods and apparatus for dynamic identification (ID) assignment in wireless networks  
Methods and apparatus that reduce user identification overhead for communications. In one aspect of the invention, a reciprocal transmission channel characteristic (e.g., the channel impulse...
8713659 Method and apparatus for allocating and obtaining IP address  
A switch sends an authentication request message to a client at intervals of a preset duration. A response message sent by the client is received. The response message carries authentication...
8713307 Computer system and volume migration control method using the same  
A computer system regarding which there is no possibility that data loss or data leakage will occur caused by volume migration is provided. The computer system includes: a memory resource to be...
8712455 Proximity-based mobile message delivery  
Proximity-based mobile message delivery is described. In an embodiment, a first user stores a message intended for a second user on a first mobile terminal, while the first mobile terminal is...
8713305 Packet transmission method, apparatus, and network system  
Embodiment of the present invention provides a packet transmission method. The method includes: receiving an encrypted packet sent by a client by using a virtual private network (VPN) tunnel,...
8713665 Systems, methods, and media for firewall control via remote system information  
A method and system for controlling a firewall for a user computer system. One or more processors of the user computer system receive a control request to control a program of the user computer...
8713304 Method and system for controlled media sharing in a network  
A method for controlling media sharing among a plurality of nodes in a network. The present method is comprised of availing to the network an instance of media content for sharing among the...
8713301 Device in a system operating with CAN-protocol and in a control and/or supervision system  
A control or supervision system incorporates a digital serial communication and modules which are mutually communicable to this and operate with CAN-protocol. A control desk can be wirelessly...
8705738 Selective security termination in next generation mobile networks  
Systems and/or methods of selectively terminating security in mobile networks are presented. User equipment (UE) can specify cipher termination location capabilities for encrypting/decrypting data...
8707023 Secure transfer of business data to a hosted system  
A system and method for uploading data from a customer system to a hosted system is disclosed. A stub is integrated with a firewall between the customer system and the hosted system. The stub...
8707440 System and method for passively identifying encrypted and interactive network sessions  
The system and method for passively identifying encrypted and interactive network sessions described herein may distribute a passive vulnerability scanner in a network, wherein the passive...
8707043 Split termination of secure communication sessions with mutual certificate-based authentication  
A method and apparatus are provided for split-terminating a secure client-server communication connection when the client and server perform mutual authentication by exchanging certificates, such...
8700891 Preserving security association in MACsec protected network through VLAN mapping  
According to one general aspect, a method of using a network device may include receiving, via an ingress port, a data packet that includes a payload portion, a source network address and a...
8701175 Methods, devices, systems and computer program products for providing secure communications between managed devices in firewall protected areas and networks segregated therefrom  
Methods, devices, systems and computer program products for providing secure communications between managed devices in a firewall protected area defined by a firewall and a network management...
8700892 Proxy SSL authentication in split SSL for client-side proxy agent resources with content insertion  
A traffic management device (TMD), system, and processor-readable storage medium are directed to determining that an end-to-end encrypted session has been established between a client and an...
8694770 Auditable cryptographic protected cloud computing communication system  
An auditable cryptographic protected cloud computing communication system, wherein the system can include a plurality of industrial devices. Each industrial device can have an individualized...