Match Document Document Title
9043590 Reducing peak current in memory systems  
A memory device includes a plurality of memory cells, a token input interface, a token output interface and control circuitry. The control circuitry is configured to accept a storage command, to...
9038178 Detection of malware beaconing activities  
Malware beaconing activity detection is disclosed, including: monitoring a plurality of conversations between an internal device and one or more external destinations; extracting feature sets...
9037846 Encoded database management system, client and server, natural joining method and program  
An encrypted database management system includes: a client terminal which includes a column encrypting unit that uses an encrypting key and a group generator to encrypt data of columns indicated...
9032534 Setting in wireless communication device for encrypted communication  
A system administrator of a wireless LAN 100 manipulates a personal computer PC1 to change a WEP key. The personal computer PC1 authenticates a memory card MC as genuine under management of the...
9027120 Hierarchical architecture in a network security system  
A network security system having a hierarchical configuration is provided. In one embodiment the present invention includes a plurality of subsystems, where each subsystem includes a plurality of...
9021272 Systems and methods for managing cryptographic keys in a secure microcontroller  
The present invention relates to key management in a secure microcontroller, and more particularly, to systems, devices and methods of automatically and transparently employing logic or physical...
9015812 Transparent control of access invoking real-time analysis of the query history  
The invention relates to a method for granting an inquirer querying a repository access to the repository, a communication protocol between a client and a server, and a system for controlling...
9009809 Computer or microchip with a secure system BIOS and a secure control bus connecting a central controller to many network-connected microprocessors and volatile RAM  
A computer or microchip including a system BIOS located in flash memory which is located in a portion of the computer or microchip protected by an inner hardware-based access barrier or firewall,...
9003510 Computer or microchip with a secure system bios having a separate private network connection to a separate private network  
A computer or microchip including a network connection for connection to a public network of computers including the Internet, the network connection being located in a public unit; and an...
9002016 Rekey scheme on high speed links  
In one embodiment, apparatus and methods for a rekey process are disclosed. In certain rekey embodiments, when a key-generation protocol exchange is executed, instead of generating a single new...
9001182 Efficient and on demand convergence of audio and non-audio portions of a communication session for phones  
In one embodiment, source data for a communication session may be split into an audio portion for transmission on a phone channel and a non-audio portion for transmission on a data channel. A...
9003481 Out-of band network security management  
A computer-implemented method, network management system, and network clients are provided for out-of-band network security management. The network management system includes routers, firewalls,...
8997202 System for secure transfer of information from an industrial control system network  
A system for securely transferring information from an industrial control system network, including, within the secure domain, one or more remote terminal units coupled by a first network, one or...
8984619 Methods, systems, and computer readable media for adaptive assignment of an active security association instance in a redundant gateway configuration  
According to one aspect, the subject matter described herein includes a method for communicating an encrypted data packet. The method includes steps occurring at a first gateway node. The method...
8984275 Virtual air gap—VAG system  
This invention consists of a virtual air gap—VAG system developed in order to provide Internet and computer security. The virtual air gap system developed in this invention is characterized by the...
8978138 TCP validation via systematic transmission regulation and regeneration  
The present invention provides a technique for validating TCP communication between a client requesting resources and a server providing requested resources to protect the specified server from a...
8978140 System and method of analyzing web content  
A system and method are provided for identifying inappropriate content in websites on a network. Unrecognized uniform resource locators (URLs) or other web content are accessed by workstations and...
8966244 Embedded apparatus, remote-processing method, and computer program product  
A processing unit performs a predetermined process by a remote operation from a client device. A monitoring unit monitors a first port for an unencrypted communication with the processing unit and...
8959216 Channel manager for accessing elements for a secure web page through a non-secure channel  
Particular embodiments generally relate to allowing access of non-secure elements through a non-secure channel when a top-level page was accessed through a secure connection. In one embodiment, a...
8959329 System and method for selective inspection of encrypted traffic  
Inspection of encrypted network traffic where multiple network connections are monitored that carry encrypted data, but only a subset of the network connections are decrypted and inspected....
8959334 Secure network architecture  
The present invention provides a star-connected network (C1-C4, P1-P8) having a number of peripheral nodes (P1-P8) and a central control arrangement (C1-C4). Each peripheral node has means for...
8959333 Method and system for providing a mesh key  
Method for providing a mesh key which can be used to encrypt messages between a first node and a second node of a mesh network, wherein a session key is generated when authenticating the first...
8958089 Facsimile apparatus and control method therefor  
The present invention provides a facsimile apparatus which provides a facsimile function to a cooperative image forming apparatus connected to a network, the facsimile apparatus comprising a...
8954740 Session key proxy decryption method to secure content in a one-to-many relationship  
A server receives identifying information of a user of a client device and data encrypted with a public key of a group, where the encrypted data includes an encrypted session key for secure...
8949967 Information management apparatus, information management method, and non-transitory computer-readable storage medium  
An information management apparatus includes a first control information setting unit that sets first control information for permitting use of information within a destination terminal to the...
8949945 Distributed network management hierarchy in a multi-station communication network  
The invention relates to a network and to a method of operating a network. The network comprises a plurality of stations each able to transmit and receive data so that the network can transmit...
8949977 Look ahead of links/alter links  
A computationally-implemented method comprises obtaining at least a portion of data from a data source, determining a content of the data, determining an acceptability of an effect of content of...
8943308 Method and system for filtering communication  
An e-mail relay provides message filtering services to an e-mail network. The e-mail relay monitors incoming communication and intercepts e-mail messages. The e-mail relay compares attributes of...
8943591 Methods, systems, and computer program products for mitigating email address harvest attacks by positively acknowledging email to invalid email addresses  
A method of detecting and responding to an email address harvest attack at an Internet Service Provider (ISP) email system includes counting a number of failed email address look-ups during a...
8935801 Software code analysis and classification system and method  
Methods for scanning software for the existence of a licensing condition. Software may be uploaded, scanned and compared against known software stored in a datastore. If the uploaded software...
8930689 Securing email conversations  
At least a portion of a transmission of an outgoing first email from a first email account to at least a second email account is encrypted. Second email address data is changed corresponding to...
8930688 Apparatus and method for providing security service of user interface  
An apparatus and method for providing a security service for UI applications in a network system. In a network supporting a user interface, encryption-unneeded data is distinguished from data in...
8931084 Methods and systems for scripting defense  
Methods and systems for cross-site scripting (XSS) defense are described herein. An embodiment includes, embedding one or more tags in content at a server to identify executable and non-executable...
8930638 Method and apparatus for supporting target-side security in a cache coherent system  
A cache coherency controller, a system comprising such, and a method of its operation are disclosed. The coherency controller ensures that target-side security checking rules are not violated by...
8914841 Method and system for mapping between connectivity requests and a security rule set  
A system capable of automated mapping between a connectivity request and an ordered security rule-set and a method of operating thereof. The system includes an interface operable to obtain data...
8909967 Technique for secure computation  
A technique for secure computation obfuscates program execution such that observers cannot detect what instructions are being run at any given time. Rather, program execution and memory access...
8910296 Data privacy for smart services  
Techniques are disclosed for hiding sensitive information from a provider of support services. In one embodiment, a first network device determines that network device information includes...
8904514 Implementing a host security service by delegating enforcement to a network device  
A method for applying a host security service to a network is described herein. The network may include a host device and a network device. The network device may receive a request for...
8898768 Computer or microchip with a secure control bus connecting a central controller to volatile RAM and the volatile RAM to a network-connected microprocessor  
A computer or microchip comprising a central controller that connected by a secure control bus with the other parts of the computer or microchip, including a volatile random access memory (RAM)...
8893233 Referer verification apparatus and method  
A referer verification apparatus and method for controlling web traffic having malicious code are provided. In the referer verification method, whether a referer is present in a Hypertext Transfer...
8892778 Method and systems for securing remote access to private networks  
A method for securing remote access to private networks includes a receiver intercepting from a data link layer a packet in a first plurality of packets destined for a first system on a private...
8893252 Wireless communication selective barrier  
A selective barrier prevents undesired communication between a protected region and an unprotected region. Wireless communication is allowed within the protected region, while wireless...
8893256 System and method for protecting CPU against remote access attacks  
A system and method that provides for protection of a CPU of a router, by establishing a management port on a router. Hosts which are connected to a non-management ports of the router are denied...
8885823 Method and apparatus for delivering encrypted on-demand content without use of an application defined protocol  
A method for delivering encrypted content to a subscriber terminal on-demand through a communication network is provided. The method begins when SRM receives a request for content from the...
8881277 Method and systems for collecting addresses for remotely accessible information sources  
A method and system are described for collecting addresses for remotely accessible information sources. Messages, such as emails, carried by a messaging network (N1) are intercepted before...
8869260 Computer or microchip with a master controller connected by a secure control bus to networked microprocessors or cores  
A computer or microchip securely controlled through a private network including a connection to a network of computers including the Internet; a separate connection to at least a private network...
8869283 Resisting the spread of unwanted code and data  
A method or system of receiving an electronic file containing content data in a predetermined data format, the method comprising the steps of: receiving the electronic file, determining the data...
8869304 Digital rights management based content access mediation  
Computer implemented methods and systems are provided for mediating access to content based on digital rights management. A request is received from a mobile device for a unit of content. A...
8869235 Secure mobile browser for protecting enterprise data  
A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application servers, etc.) using their mobile...
8862880 Two-stage anonymization of mobile network subscriber personal information  
A two-stage anonymization process is applied to monitored network traffic in which unique user identifiers, such as the MSISDN (Mobile Station International Subscriber Directory Number), are...