Match Document Document Title
8607326 Message-handling server and method for handling secure message attachments for a mobile device  
A secure message that includes an attachment is received at a server. The secure message may have a secure layer that indicates that the secure message is at least digitally signed. The secure...
8607358 Storing encrypted objects  
A seed value is received and a resource encryption key is generated from the seed value. The resource encryption key may be sent to an application server such that the application server system is...
8607041 Perimeter encryption method and system  
A method and system for consistent format preserving encryption (C-FPE) are provided to protect sensitive data while the sensitive data is in a domain while allowing encrypted sensitive data to be...
8606764 Write failure protection for hierarchical integrity schemes  
A method for data integrity protection includes arranging in an integrity hierarchy a plurality of data blocks, which contain data. The integrity hierarchy includes multiple levels of signature...
8607323 Method for providing media communication across firewalls  
The present invention supports a method for transmitting information packets across network firewalls. A trusted entity is provisioned with an address designation for a pinhole through the...
8601601 Method and apparatus for controlling access restrictions for media playback  
A method and apparatus for controlling access restrictions for media resource playback may include defining a user-specific content control profile authorizing one or more classes of content to be...
8601258 Method for configuring centralized encryption policies for devices  
A data encryption engine and method for using to selectively encrypt communications. Data is received from a source device into the data encryption engine. The data encryption engine determines...
8601600 Storing encrypted objects  
Authentication credentials are received at a key server system. A service associated with the wrapped key is identified. A master key is accessed based on the identified service, the master key...
8601598 Off-premise encryption of data storage  
A system that enables a cloud-based data repository to function as a secure ‘drop-box’ for data that corresponds to a user is provided. The ‘drop box’ can be facilitated through the use of...
8601257 Method, cluster system and computer-readable medium for distributing data packets  
A method, a cluster system, and a computer-readable medium for distributing data packets addressed to at least one virtual address over a communication network using a protocol, which allows for...
8601259 Securing data in a dispersed storage network using security sentinel value  
A sentinel value is combined with a data segment, and encrypted. A digest of the encrypted combined data segment is calculated, and used in conjunction with an encryption key to generate a masked...
8594327 Device, program, and method for transmitting or receiving an image through electronic mail  
A scanned image transmitting device has an instruction-creating section that creates an instruction describing a process instruction in relation to a scanned image; an electronic mail creating...
8594335 Key verification system and method  
A method, computer program product, and data storage system for associating an encryption key with each of a plurality of storage objects within a data storage system, thus defining a plurality of...
8595819 System and method for distributed multi-processing security gateway  
A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server based on network information, and using the...
8595814 TLS encryption in a managed e-mail service environment  
Disclosed are systems and methods for providing transport layer encryption with an intermediate electronic message managing service interposed in a message path of an electronic message to be sent...
8595481 Method, manufacture, and apparatus for centralized wifi encryption for guest  
An Access Point receives an encrypted data frame from a client device, and determines whether the encrypted data frame is a guest frame. If it determined that the frame is a guest frame, the...
8595495 System and method for secure communications  
A method for secure data communications in fax transmissions and computer network communications comprising a. Allowing the sender to receive confirmation that the receiver received the message...
8595479 Aggregation of cryptography engines  
Systems, methods, and other embodiments associated with aggregation of cryptography engines are described. One example method includes receiving an outbound data packet on an outbound side of a...
8595478 Wide area network with high quality of service  
A wide area network using the internet as a backbone utilizing specially selected ISX/ISP providers whose routers route packets of said wide area network along private tunnels through the internet...
8595480 Distributed computing network using multiple local virtual machines  
A distributed computer system is disclosed in which computers co-operate with one another by sending messages over a network such as the Internet in order to perform a distributed application. In...
8595817 Dynamic authenticated perimeter defense  
Techniques for dynamically configuring security mechanisms in a network can construct security perimeters that satisfy security needs at any given time while also efficiently spreading security...
8589678 Managing status and access for a variable source content stream  
In one embodiment, a method can include: receiving rules in an interoperability server, the rules being related to access control for an endpoint coupled to a variable source content stream via a...
8590034 Method, system and apparatus for providing stateful information redaction  
A system (101) for implementing redaction rules in compliance with an organization's privacy policy, where the system intercepts messages between an information source (103) and an information...
8590009 Computer system for port forwarding  
A computer system includes multiple computer modules each including at least a calculator and a storing unit. A first computer module of the computer modules includes: a storing unit that stores...
8590031 Methods, systems, and computer program products for access control services using a transparent firewall in conjunction with an authentication server  
Access control methods include receiving an access authorization message from an authentication server computer at a blocking device that connects a first network to a second network, modifying...
8588746 Technique for bypassing an IP PBX  
A method for establishing communication via a VoIP network bypasses the IP PBX component conventionally used to obtain address information. Instead of obtaining the IP address from a location...
8590013 Method of managing and communicating data pertaining to software applications for processor-based devices comprising wireless communication circuitry  
In one embodiment, a system processes access decisions for individuals where the system includes a portable handheld housing for the processor, display, internal memory, and card reader of the...
8583809 Destroying a secure session maintained by a server on behalf of a connection owner  
A method and system for establishing a secure over-the-air (OTA) connection between a connection owner and a server, the connection owner being associated with a wireless device connected to the...
8583910 Method and apparatus for device detection and multi-mode security in a control network  
A method and apparatus for device discovery and multi-mode security in a wired and/or wireless control network are described. A controlled device is configured with discovery-level instructions...
8584223 Method of protecting access to data on a network  
The invention is a method of managing access to a plurality of data from a server by a client through a point-to-point link. Each of the data is reachable through a set of URIs that belongs to an...
8583914 Reducing processing load in proxies for secure communications  
In one embodiment, a method for providing secure communications using a proxy is provided. The proxy negotiates with a client and a server to determine a session key to use with communications...
8583913 Securely determining internet connectivity between networks  
External network connectivity of an internal host can be measured by giving an external computer a payload identifying the internal host and instructions to deliver the payload to an external...
8582767 Cryptographic device sharing among a plurality of communication links  
A self-synchronizing cryptographic device can be shared among a plurality of communications links. Blocks of data can be transferred to the cryptographic device, wherein each block of data...
8583935 Wireless network having multiple communication allowances  
Multiple levels of wireless network resource granting. A user who has an authorized key, e.g., an encryption key or a key indicating that they have paid for service, gets a first, better level of...
8584227 Firewall with policy hints  
A firewall helps a user make a decision regarding network access for an application executing on a computing device by providing “hints” to the user about an appropriate network access policy. If...
8584255 Networked conditional access module  
A networked Conditional Access Module provided on an IEEE 1394 network, by defining a Conditional Access Module as a Conditional Access Subunit of the IEEE 1394 network. There is provided an AV/C...
8577953 System and method for providing multimedia services  
A system and method are disclosed for session continuity in multimedia services. A system that incorporates teachings of the present disclosure may include, for example, a multimedia services...
8578149 TCP communication scheme  
A TCP communication scheme which ensures safe communication up to the communication path near a terminal and eliminates direct attacks from hackers, etc. A terminal (A) and terminal (B) are...
8572719 Firewall proxy systems and methods in a backup environment  
According to certain aspects, a method for performing remote backup operations is provided that includes receiving a first unidirectional connection request from a media agent module to a proxy...
8571956 System architecture and methods for composing and directing participant experiences  
The present invention contemplates a variety of improved methods and systems for providing an experience platform, as well as sentio or experience codecs, and experience agents for supporting the...
8572372 Method for selectively enabling access to file systems of mobile terminals  
Users of mobile terminals in a communication network are provided controlled access to files in a file system through the steps of configuring the files as a file body containing a file content...
8572718 Method, device, and computer program product for differentiated treatment of emails based on network classification  
Method, device, and computer program product are provided for differentiated treatment of incoming and outgoing emails based on a network server. A server receives a query from a gateway, and the...
8566578 Method and system for ensuring compliance in public clouds using fine-grained data ownership based encryption  
A method and system for ensuring compliance in public clouds using fine-grained encryption based on data ownership that includes a process for ensuring compliance in public clouds using...
8566612 System and method for a secure I/O interface  
A security processor performs all or substantially all security and network processing to provide a secure I/O interface system to protect computing hardware from unauthorized access or attack....
8565420 Source centric sanction server and methods for use therewith  
A sanction server includes a network interface that receives proxy data from a content source that includes cryptographic parameters that are based on a scrambling control word used to scramble...
8559628 Sanctioned client device and methods for use therewith  
A client device includes a network interface that transmits a request for the media content to the sanction server, receives second sanction data from the sanction server, transmits second...
8560835 Method and apparatus for machine-to-machine communication  
According to a first aspect of the present invention there is provided a method of at least partly delegating processing of data in a machine-to-machine system to reduce computational load on a...
8559921 Management of security features in a communication network  
A method of operation for managing network security features is disclosed. A communication device such as a mobile telephone or a modem can establish a position as a communications intermediary...
8561155 Systems and methods for using a client agent to manage HTTP authentication cookies  
Systems and methods are described for using a client agent to manage HTTP authentication cookies. One method includes intercepting, by a client agent executing on a client, a connection request...
8561147 Method and apparatus for controlling of remote access to a local network  
The present invention is to ensure security of a local network, e.g., a home network from remote access while allowing remote access. In a method of the present invention, if a device on the local...