Match Document Document Title
9043456 Identity data management system for high volume production of product-specific identity data  
A method and apparatus is provided for maintaining inventory levels of identity data to be provisioned in electronic devices. The method includes monitoring over a communications network inventory...
9043588 Method and apparatus for accelerating connections in a cloud network  
Various embodiments provide a method and apparatus of providing accelerated encrypted connections in a cloud network supporting transmission of data including per-user encrypted data. Transmission...
9043587 Computer security threat data collection and aggregation with user privacy protection  
An endpoint computer in an enterprise network is configured to detect computer security threat events, such as presence of a computer virus. Upon detection of a threat event, the endpoint computer...
9042598 Methods and apparatus to generate and use content-aware watermarks  
Methods and apparatus to generate and use content-aware watermarks are disclosed herein. In a disclosed example method, media composition data is received and at least one word present in an audio...
9043589 System and method for safeguarding and processing confidential information  
One aspect of the invention is a method for providing restricted access to confidential services without impacting the security of a network. The method includes using a gateway to isolate one or...
9038178 Detection of malware beaconing activities  
Malware beaconing activity detection is disclosed, including: monitoring a plurality of conversations between an internal device and one or more external destinations; extracting feature sets...
9037656 Method and system for facilitating interaction with multiple content provider websites  
A method and system for facilitating interaction between an electronic device and a plurality of content provider websites are disclosed. In one embodiment, the method includes receiving at a...
9037846 Encoded database management system, client and server, natural joining method and program  
An encrypted database management system includes: a client terminal which includes a column encrypting unit that uses an encrypting key and a group generator to encrypt data of columns indicated...
9038190 Communication apparatus that communicate in different security levels and computer-readable media for controlling such apparatus  
A communication apparatus may include a reception portion, a decision portion, and a transmission portion. The reception portion may receive a first data request transmitted through a first...
9037845 System and method for obtaining certificate status of subkeys  
Systems and methods for updating status of digital certificate subkeys. A request is made to a key server to verify if a given key is revoked. If it is not, then the key with its subkeys is...
9038170 Logging access system events  
A system is disclosed that logs access system events. When an access system event occurs, a log entry is created for the access system event. Information from an identity profile is stored in the...
9036820 System and methods for UICC-based secure communication  
A system that incorporates the subject disclosure may include, for example, instructions which when executed cause a device processor to perform operations comprising sending a service request to...
9037844 System and method for securely communicating with electronic meters  
An infrastructure for securely communicating with electronic meters is described, which enables secure communication between a utility and a meter located at a customer, over a communication link...
9032473 Migration of credentials and/or domains between trusted hardware subscription modules  
Systems, methods, and instrumentalities are disclosed that allow a user to initiate migration of a credential from one domain to another domain. A request to initiate a migration of credentials...
9032219 Securing speech recognition data  
Methods and apparatus for reducing security vulnerabilities in a client/server speech recognition system including one or more client computers and one or more server computers connected via a...
9032203 Key setting method, node, server, and network system  
A key setting method executed by a node within communication ranges of multiple ad-hoc networks, includes receiving encrypted packets encrypted by respective keys specific to gateways and...
9032202 Privacy-preserving publish-subscribe protocol in a cloud-assisted model  
A server receives from a client at least one interest pseudonym produced by a double application of a pseudo random function to at least one interest of the client. The server encrypts an item....
9032534 Setting in wireless communication device for encrypted communication  
A system administrator of a wireless LAN 100 manipulates a personal computer PC1 to change a WEP key. The personal computer PC1 authenticates a memory card MC as genuine under management of the...
9026627 Method and system for switching between remote console sessions  
Logging into a remote computer by way of a management processor to initiate a remote console session and switching between a default remote console session and a non-default remote console session.
9021251 Methods, systems, and computer program products for providing a virtual private gateway between user devices and various networks  
A communication network is operated by receiving traffic from a user device at a gateway device associated with a gateway service provider, which manages gateways to both secure and insecure...
9021252 Encrypted-traffic discrimination device and encrypted-traffic discrimination system  
An encrypted-traffic discrimination device includes an input interface, a flow discrimination section, a data accumulation section, a selective data calculation section, a calculation result...
9021253 Quarantine method and system  
A quarantine method and system for allowing a client terminal to connect to a user network. An authentication apparatus recognizes that a communication means of the client terminal has been...
9021574 Configuration management for network activity detectors  
Network activity detectors, such as firewalls, communicate with one another to form a Unified Threat Management System. A first network activity detector sends a request for configuration settings...
9021250 Security enforcement point inspection of encrypted data in an encrypted end-to end communications path  
Embodiments of the present invention address deficiencies of the art in respect to security function processing of encrypted data in a security enforcement point and provide a method, system and...
9021272 Systems and methods for managing cryptographic keys in a secure microcontroller  
The present invention relates to key management in a secure microcontroller, and more particularly, to systems, devices and methods of automatically and transparently employing logic or physical...
9021575 Selectively performing man in the middle decryption  
An agent on a device within a network receives a request to access a resource outside the network. A first encrypted connection is established between the device and the agent, and a second...
9015469 Supporting secure sessions in a cloud-based proxy service  
A proxy server in a cloud-based proxy service receives a secure session request from a client device for a secure session. The secure session request is received at the proxy server as a result of...
9015470 Adaptive video server with fast initialization and methods for use therewith  
A streaming video server includes a virtual file system that stores playlist data corresponding to a plurality of video programs available from at least one video source and that stores at least...
9015488 Secure indirect addressing  
An efficient solution for secure implementation of indirect addressing (IA) is described. IA may be used, for example, in networks of which the routing algorithms are not capable of multicast but...
9015467 Tagging mechanism for data path security processing  
Methods and associated systems are disclosed for providing secured data transmission over a data network. Data to be encrypted and encryption information may be sent to a security processor via a...
9015471 Inter-autonomous networking involving multiple service providers  
A wide area network using the internet as a backbone utilizing specially selected ISX/ISP providers whose routers route packets of said wide area network along private tunnels through the internet...
9009809 Computer or microchip with a secure system BIOS and a secure control bus connecting a central controller to many network-connected microprocessors and volatile RAM  
A computer or microchip including a system BIOS located in flash memory which is located in a portion of the computer or microchip protected by an inner hardware-based access barrier or firewall,...
9009460 Node computing data encryption method  
A data encryption method, adapted to a node computing device in a cloud server system comprises following steps. A primary data is received. A dimension of an encrypted matrix is computed. An...
9009462 Differential client-side encryption of information originating from a client  
A method may include allocating a number of public keys, where each respective public key is allocated to a respective entity of a number of entities; storing a number of private keys, where each...
9009459 Systems and methods for neutralizing file-format-specific exploits included within files contained within electronic communications  
A computer-implemented method for neutralizing file-format-specific exploits contained within electronic communications may include (1) identifying an electronic communication, (2) identifying at...
9009461 Selectively performing man in the middle decryption  
A HTTP request addressed to a first resource on a second device outside the network is received from a first device within the network. The HTTP request is redirected to a third device within the...
9003179 Wireless internet access module, communication method for host and wireless internet access module, and data card  
A communication method for a host and a wireless Internet access module, and a data card, are provided so that the host implements wireless Internet access with the wireless Internet access module...
9003180 Data encryption and decryption  
Systems and methods for data encryption and decryption are provided. Packets of a streaming video from a video source are received. A first packet of the streaming video is encrypted with a...
9003510 Computer or microchip with a secure system bios having a separate private network connection to a separate private network  
A computer or microchip including a network connection for connection to a public network of computers including the Internet, the network connection being located in a public unit; and an...
9003188 Recording medium device, terminal device, distribution device, control method, and program recording medium  
When the terminal device attempts to use a special content, which has an attribute including information distinguishing the special content from regular contents and is stored in the recording...
9003481 Out-of band network security management  
A computer-implemented method, network management system, and network clients are provided for out-of-band network security management. The network management system includes routers, firewalls,...
9002010 Secure communication of information over a wireless link  
Secure communication of information over a wireless link with apparatus including a blade management module and a plurality of blade servers, the blade servers connected for data communications...
8997238 Management device of hardware resources  
A management device for managing states of components. The management device includes a reading unit to read management information from each of plural components; a determining unit to refer to...
8997201 Integrity monitoring to detect changes at network device for use in secure network access  
In one embodiment, a method includes initiating integrity monitoring at a network device, continuously monitoring the network device to detect changes at the network device over a period of time,...
8996858 Systems and methods for utilizing IMS data security mechanisms in a circuit switched network  
Aspects of the present invention provide a mechanism to utilize IMS media security mechanisms in a CS network and, thereby, provide end-to-end media security in the case where the media traffic...
8996860 Tolerance factor-based secret decay  
Session-specific information stored to a cookie or other secure token can be selected and/or caused to vary over time, such that older copies will become less useful over time. Such an approach...
8996857 Single sign-on method in multi-application framework  
A method and system for allowing a single-sign on to access independently purveyed applications with a highly secure single-sign methodology which permits wide area public access, such as through...
8997202 System for secure transfer of information from an industrial control system network  
A system for securely transferring information from an industrial control system network, including, within the secure domain, one or more remote terminal units coupled by a first network, one or...
8990908 Multi-domain login and messaging  
A method, a computer readable medium and a system of multi-domain login and messaging are provided. The method for multi-domain login comprises inputting a local password by an agent, accessing a...
8990553 Perimeter encryption method and system  
A method and system for consistent format preserving encryption (C-FPE) are provided to protect data while the data is in a domain while allowing encrypted data to be treated inside the domain as...