AcclaimIP-ad

Match Document Document Title
8694769 System and method for controlling data communications between a server and a client device  
A system and method for controlling data communications between a server and a client device, such as a mobile device. Embodiments relate generally to a technique where stop data is provided to...
8695063 Authentication failure in a wireless local area network  
In the event of an authentication process failure, a mobile station bans a connection profile storing the credentials provided by the mobile station when initiating the failed authentication...
8694707 Memory data transfer method and system  
A method and apparatus are disclosed for providing a DMA process. Accordingly, a DMA process is initiated for moving data from contiguous first locations to contiguous second locations and to a...
8687803 Operational mode for block ciphers  
In the field of computer enabled cryptography, such as a keyed block cipher having a plurality of sequenced rounds, the cipher is hardened against attack by a protection process. The protection...
8688971 Remote access method  
All operations available on an intranet are securely performed from an outside of the intranet without taking out a file on the intranet from the intranet. A file on the intranet is not taken out,...
8689334 Security protection for a customer programmable platform  
A method of preventing a customer programmable device from causing security threats to itself or to a communication system is provided. The method includes establishing one or more thresholds by...
8688972 Secure service oriented architecture  
A system, method and media for a service oriented architecture. This description is not intended to be a complete description of, or limit the scope of, the invention. Other features, aspects and...
8689332 Information processing apparatus cooperating with virus management function device, and anti-virus method  
An information processing apparatus provided with a first information processing unit and a second information processing unit, wherein the first information processing unit infected by a virus is...
8689317 Providing SIP signaling data for third party surveillance  
A method for facilitating surveillance of a targeted user participating in communication sessions conducted over a communications network, such as a voice over Internet protocol (VoIP) network,...
8689353 Management of access rights  
A system for management of access rights to operating data and/or control data of buildings or building complexes can include a communications release service running on a first server. This...
8688970 Access-network to core-network trust relationship detection for a mobile node  
The invention provides a method for trust relationship detection between a core and access network for a user equipment. The gist is that a security tunnel establishment procedure is used so one...
8682979 Secure electronic mail system  
An e-mail system is disclosed that overcomes many deficiencies of, but is backward compatible with, existing e-mail systems. Embodiments of the system may include various features, including but...
8683548 Computing with policy engine for multiple virtual machines  
An improved technique for delegating computing actions among different machines includes a policy engine that receives inputs specifying computing actions to be performed and automatically selects...
8683193 Strict communications transport security  
Strict transport security controls are arranged to detect a first navigation command of a network-enabled application to navigate from a secure connection established with a first network address...
8683571 System and method for authentication of users in a secure computer system  
A system and method for authenticating a user in a secure computer system. A client computer transmits a request for a sign-on page, the secure computer system responds by transmitting a prompt...
8683192 Methods and apparatus for use in quantum key distribution  
Methods and apparatus for use in quantum key distribution (QKD) are described. A quantum QKD signal is generated at a source and transmitted through a fiber optic network to an endpoint, a key...
8677114 Application steering and application blocking over a secure tunnel  
Techniques are provided for enabling application steering/blocking in a secure network which includes a network entity, and a first tunnel endpoint coupled to the network entity over an encrypted...
8675873 Method of making secure a link between a data terminal and a data processing local area network, and a data terminal for implementing the method  
This method makes secure a link, for example a radio link, between a data terminal (PDA2) and a data processing local area network (WLAN2) that is coupled to a mobile telephone network (PLMN2)...
8677471 Port allocation in a firewall cluster  
A firewall cluster having three or more firewall processing nodes sharing the same shared IP address. Port numbers are assigned to the firewall processing nodes within the cluster and are used to...
8677464 Systems and methods for managing secure communication sessions with remote devices  
According to various embodiments, a session manager generates, stores, and periodically updates the login credentials for each of a plurality of connected IEDs. An operator, possibly via an access...
8677127 Method and apparatus for secure setup of an encrypted connection between two communication devices  
An electronic device includes a first connection interface and a second connection interface. The first connection interface is operable to exchange security information with another electronic...
8677469 Firewall device  
In a firewall device protecting a specific network against an attack from an external network, a filtering object identifying portion identifies whether or not received data includes filtering...
8677489 Methods and apparatus for managing network traffic  
Methods, apparatus, and computer readable storage media reduce or eliminate network traffic meeting criteria. In some aspects, network traffic transmitted by one or more source nodes to one or...
8670565 Encrypted packet communication system  
The communications between terminals are encrypted, and even a gateway device is permitted to analyze the encrypted communications, thereby to incarnate censorship for the prevention of...
8671273 Method of performance-aware security of unicast communication in hybrid satellite networks  
A method and apparatus utilizes Layered IPSEC (LES) protocol as an alternative to IPSEC for network-layer security including a modification to the Internet Key Exchange protocol. For...
8667599 Image forming apparatus having a function that is validated by installing a license and method therefor  
A multifunction peripheral is disclosed as an example of an image forming apparatus. The multifunction peripheral determines whether a license corresponding to a license identifier is present...
8667110 Method and apparatus for providing a remotely managed expandable computer system  
A remotely managed expandable multi-user computer system is provided. The computer system includes a removable compute cartridge and a removable storage cartridge allowing easy upgrade of the...
8667268 Scalable distributed web-based authentication  
Web-based authentication includes receiving a packet in a network switch having at least one associative store configured to forward packet traffic to a first one or more processors of the switch...
8667267 System and method for communicating with a key management system  
A method for providing authenticated access to an encrypted file system includes generating a first seed; providing a request for a key to a key server, the request including at least a first seed...
8665887 Number automatic routing method, updating method, withdrawing method, router and device  
A number automatic routing method, an updating method, a withdrawing method, a router and a device is provided wherein the number automatic routing method includes: converting to-be-distributed...
8667304 Methods and apparatuses for secondary conditional access server  
Conditional access to media content of primary security systems on a secondary networked environment. In one embodiment, a conditional access server is used to provide services to secondary CA...
8661267 System and method for processing encoded messages  
Systems and methods for processing encoded messages at a message receiver. A received encoded message is decoded and stored in a memory. The stored decoded message can subsequently be displayed or...
8661243 Storing and forwarding media data  
A method apparatus for storing and forwarding media data in a communication network. An intermediate node disposed between a media data source node and a client node receives encrypted media data...
8661244 Method and apparatus for establishing secured link between devices  
A method and apparatus for establishing a secured link between devices. In the establishing of the secured link, a coordinator respectively receives from the first and second devices first pairing...
8661242 Autonomous password update in SNMPv3 computer network  
A network running SNMPv3 includes conventional managed devices and a control provided with timed updating of the authentication and privacy password set. The timed updating function maintains...
8661521 Controlling a network connection using dual-switching  
Embodiments of the invention are generally directed to systems, methods, and apparatuses for controlling a network connection based, at least in part, on dual-switching. In an embodiment, a tunnel...
8661500 Method and apparatus for providing end-to-end privacy for distributed computations  
An approach is provided for providing end-to-end privacy in multi-level distributed computations. A distributed computation privacy platform determines one or more privacy policies associated with...
8656146 Computer system comprising a secure boot mechanism  
A secure boot processing may be accomplished on the basis of a non-volatile memory that is an integral part of the CPU and which may not be modified once a pre-boot information may be programmed...
8656152 Image forming apparatus, host apparatus and encryption method of job object document thereof  
An image forming apparatus, a host apparatus, and an encryption method for print data, the method of encrypting the print data of the host apparatus connected to the image forming apparatus...
8656482 Secure communication using a trusted virtual machine  
A client system, such as a computer or a smartphone, securely exchanges sensitive information with a remote service provider computer system such as a bank or an online retailer. The client system...
8650390 Tunnel interface for securing traffic over a network  
Methods and systems for a flexible, scalable hardware and software platform that allows a managed security service provider to easily provide security services to multiple customers is provided....
8650623 Risk adaptive information flow based access control  
Systems and methods are provided to manage risk associated with access to information within a given organization. The overall risk tolerance for the organization is determined and allocated among...
8650643 Method and apparatus for providing adaptive self-synchronized dynamic address translation as an intrusion detection sensor  
A translator is provided for translating predetermined portions of packet header information including an address of a data packet according to a cipher algorithm keyed by a cipher key derived by...
8650295 Managing network security  
Technology for network security is disclosed. In one embodiment, a method of managing network security includes receiving sampled packets. The sampled packets represent packets being sampled from...
8650389 Secure sockets layer protocol handshake mirroring  
A traffic manager system comprises communications servers, including one or more active and backup servers. At least one of the communications servers mirrors the communications of the other...
8650657 Storing encrypted objects  
A resource in unencrypted form and a wrapped key are received in a request from an application server system and at a key server system. The wrapped key includes a resource encryption key and a...
8645680 Sending media data via an intermediate node  
A method and apparatus for sending protected media data from a data source node to a client node via an intermediate node. The data source node establishes a first hop-by-hop key to be shared with...
8644506 Location-based security rules  
Location based security rules are provided for preventing unauthorized access to a device, application, system, content, and/or network, etc. The location-based security rules enable a user,...
8646066 Security protocol control apparatus and security protocol control method  
A security protocol control apparatus includes a communication unit configured to perform a communication with a communication partner via a network, and a setting information generation unit...
8645681 Techniques for distributing secure communication secrets  
Techniques are described for establishing a secure communication channel between a server computer and a client computer. A method includes (a) at the server computer, receiving a command from a...