AcclaimIP-ad

Match Document Document Title
8645348 Method and system for securing user identities and creating virtual users to enhance privacy on a communication network  
A method of enabling a real entity to access a service on a communication network using a virtual entity, the method including the steps of establishing a user account including at least first...
8645682 Methods and apparatus for sharing real-time user context information  
Improved systems and techniques for secure delivery of data. One or more data providers deliver encrypted data to a storage entity. For each of one or more authorized recipients of data delivered...
8638942 Method and system for managing shared random numbers in secret communication network  
A method for managing shared random numbers in a secret communication network including at least one center node and a plurality of remote nodes connected to the center node, includes: sharing...
8640236 Performing a defensive procedure in response to certain path advertisements  
In certain embodiments, performing a defensive procedure involves receiving at a first speaker of a first autonomous system a path advertisement from a second speaker of a second autonomous...
8640223 Auxiliary display system, device and method  
The present invention provides an auxiliary display system, device and method. The auxiliary display system includes a client and a server. The client includes an auxiliary display unit which...
8640234 Method and apparatus for predictive and actual intrusion detection on a network  
A method of managing network usage by defining a set of linguistic patterns, where each linguistic pattern is associated with a condition that is to be monitored. Network packets are captured...
8639921 Storage gateway security model  
Methods, apparatus, and computer-accessible storage media for implementing a gateway to a remote service provider according to a security model. The gateway serves as an interface between...
8640191 Inspecting code and reducing code size associated to a target  
Code is associated to a target based on an inspection of the code. A target may be a device or a user. A number of code components may be inspected at one time and then transferred or otherwise...
8635666 Anti-phishing system  
The present invention provides both method and apparatus for enhancing a user's network security. For example, it may be used to prevent phishing attacks being effected via the internet. A number...
8635440 Proxy with layer 3 security  
A proxy system may use Layer 3 security mechanisms to establish secure communications between two devices. Each device may establish a secure session with the proxy using the same or a different...
8635441 Encryption-based control of network traffic  
A computer-implemented method for protecting a computer network (22) includes receiving at a gateway (24) data transmitted from a source address for delivery to a destination on the computer...
8635352 System and method for symmetric receive-side scaling (RSS)  
A method for symmetric receive-side scaling (RSS) in a network device having an ingress side RRS router and an egress side RSS router and a plurality of queues for handling packets. The method...
8635693 System and method for testing network firewall for denial-of-service (DoS) detection and prevention in signaling channel  
A device may measure a first performance, associated with legitimate traffic without attack traffic, of a Session Initiation Protocol (SIP)-based protection device implementing authentication;...
8635670 Secure centralized backup using locally derived authentication model  
A system and method for performing backup operations is provided. Mechanisms facilitate a secure centralized backup system with a locally derived authentication model. A local centralized storage...
8635284 Method and apparatus for defending against denial of service attacks  
A method for processing packets that includes receiving a packet from a network, analyzing the packet to obtain packet information used to determine to which temporary data structure to forward...
8631230 Differential client-side encryption of information originating from a client  
A method may include allocating a number of public keys, where each respective public key is allocated to a respective entity of a number of entities; storing a number of private keys, where each...
8631484 Systems and methods for inhibiting attacks with a network  
Systems and methods for inhibiting attacks with a network are provided. In some embodiments, methods for inhibiting attacks by forwarding packets through a plurality of intermediate nodes when...
8631460 Systems and methods for implementing transparent encryption  
A method of providing transparent encryption for a web resource includes a key manager receiving an encryption key policy; receiving user identifiers and resource locators; defining an access...
8631234 Apparatus and method for establishing encryption information common to a plurality of communication paths coupling two apparatuses  
An apparatus includes a plurality of connection-source terminating units. Each of the plurality of connection-source terminating units constitutes an independent communication path coupled to a...
8631509 Content transmitting method, content transmitting apparatus, and content receiving apparatus  
In a content transmitting method in a content transmitting apparatus, wherein the content transmitting apparatus adds copy control information for indicating to execute a recoding control with...
8631229 Differential client-side encryption of information originating from a client  
A method may include allocating a number of public keys, where each respective public key is allocated to a respective entity of a number of entities; storing a number of private keys, where each...
8630415 Method and apparatus for authentication service application processes during service reallocation in high availability clusters  
A method and communication node for providing secure communications and services in a High Availability (HA) cluster. The communication node comprises an Operating System (OS) that detects an...
8631228 Hitless manual cryptographic key refresh in secure packet networks  
In a hitless manual cryptographic key refresh scheme, a state machine is independently maintained at each network node. The state machine includes a first state, a second state, and a third state....
8631227 Processing encrypted electronic documents  
Electronic document processing logic coupled to a computer and to a quarantine is operable to identify an encrypted electronic document received at the computer; determine whether the key server...
8631124 Network analysis system and method utilizing collected metadata  
A system, method and computer program product are provided for analyzing network traffic associated with network services. Initially, network traffic and metadata are collected from a network....
8626929 Scalable session management using an encrypted session key  
Scalable session management is achieved by generating a cookie that includes an encrypted session key and encrypted cookie data. The cookie data is encrypted using the session key. The session key...
8625610 System and method for improving spoke to spoke communication in a computer network  
Various embodiments of the disclosed subject matter provide methods and systems for improved efficiency in spoke-to-spoke network communication. Embodiments provide systems and methods for...
8627085 Customizable public key infrastructure and development tool for same  
A public key infrastructure comprises a client side to request and utilize certificates in communication across a network and a server side to administer issuance and maintenance of said...
8626930 Multimedia content filtering  
Methods and apparatuses to filter multimedia content are described. The multimedia content in one embodiment is analyzed for one or more parameters. The multimedia content in one embodiment is...
8627061 Method and system for employing a fixed IP address based encryption device in a dynamic IP address based network  
A network operations center (130) provides secure communication between fixed IP address based encryption devices (114,154) in an enclave (110) and on a handheld communication device (150)...
8627060 Trusted network interface  
Systems and methods for combating and thwarting attacks by cybercriminals are provided. Network security appliances interposed between computer systems and public networks, such as the Internet,...
8626122 Un-ciphered network operation solution  
The present invention relates to a solution for handling security issues of non access stratum (NAS) signaling in a telecommunications network (100) The NAS signaling is performed between a user...
8627423 Authorizing remote access points  
Authorizing remote access points for use in a network: After the remote access point is provisioned to communicate securely to a controller using its TCP/IP address provided by a user, the remote...
8621199 Secured presentation layer virtualization for wireless handheld communication device having endpoint independence  
The connectivity and security of wireless handheld devices (HDs) can he leveraged to provide a presentation appliance (PA) (e.g. a laptop) with an ability to securely communicate with an...
8621618 System and method for assessing whether a communication contains an attack  
Communications can be processed with multiple countermeasures to identify attacks. Each countermeasure can compute a probability of a communication containing an attack and an accompanying...
8615652 System and method for providing load balanced secure media content and data delivery in a distributed computing environment  
A system and method for providing load balanced secure media content and data delivery (10) in a distributed computing environment is disclosed. Media content is segmented and encrypted into a set...
8615654 Systems and methods for optimizing SSL handshake processing  
A method for enabling efficient SSL handshakes through pre-computing of handshake messages, the method includes: receiving, by an appliance, a server certificate identifying a server; generating,...
8615562 Proxy for tolerating faults in high-security systems  
One or more requests are received from a first system. The requests are queued in a queue. A serialization group is determined for a request and the request is associated with the determined...
8615658 Dynamic foreign agent—home agent security association allocation for IP mobility systems  
Utilizing the AAA infrastructure to dynamically allocate the various parameters needed to establish the security association between the Foreign Agent and the Home Agent. The present invention...
8615791 Multi-domain login and messaging  
A method, a computer readable medium and a system of multi-domain login and messaging are provided. The method for multi-domain login comprises inputting a local password by an agent, accessing a...
8612750 Creating and using secure communications channels for virtual universes  
A system and method provides secure channels for communication in a virtual universe by employing a packet interception layer for incoming and outgoing data packets. A data path is defined and is...
8612744 Distributed firewall architecture using virtual machines  
A distributed firewall of a gateway device includes at least one IO module for performing IO functionality of the distributed firewall, at least one security processing module for performing...
8611540 System and method for secure messaging in a hybrid peer-to-peer network  
An improved system and method are disclosed for peer-to-peer communications. In one example, the method enables endpoints to securely send and receive messages to one another within a hybrid...
8612743 Wireless network security  
A method includes identifying a suspect node of a network that includes multiple nodes in wireless communication. The method also includes initiating formation of a sub-network of the network in...
8612774 Secure OTP using external memory  
A set-top-box has on-chip OTP memory emulated using an external flash memory and a series of on-chip fuses. The external memory is comprised of one or more regions, each having its own unique...
8612752 Communicating a packet from a mesh-enabled access point to a mesh portal in a multi-hop mesh network  
Methods are provided for processing a packet received by a mesh-enabled access point (MAP). When a first MAP receives a packet it can determine whether the packet is destined for a mesh portal...
8613071 Split termination for secure communication protocols  
Transaction accelerators can be configured to terminate secure connections. A server-side accelerator intercepts a secure connection request that is from a client and that is directed to a server....
8613053 System and method for authorizing a portable communication device  
Systems and methods of authorizing a portable communication device to access a network resource. In an embodiment, a request to access a network resource is received from a portable communication...
8613104 Protected and virtual interfaces for COM aggregation  
An outer COM object can be provided with privileged access to protected functionality in an inner COM object. An inner COM object can offer a custom protected interface to an outer COM object by...
8607324 Untrusted gaming system access to online gaming service  
Systems, methods and computer readable media are disclosed for a trusted proxy to intercept communications between an untrusted computerized gaming system and an online multi-player gaming service...