Match Document Document Title
9042549 Apparatus and method for address privacy protection in receiver oriented channels  
Disclosed is a method for address privacy protection for a first wireless device sharing a privacy key with a second wireless device. In the method, a first resolution tag is generated at the...
9043593 Session attribute propagation through secure database server tiers  
Mechanisms are provided for handling a database client request. An encrypted database client request (DCR) is received, by an unsecure access local agent, from a client computing device as part of...
9030946 Method of securing network access radio systems  
A method of providing security for network access radio systems and associated access radio security systems used with the systems. The method includes connecting an access radio having a radio...
9027136 Automatic generation of attribute values for rules of a web application layer attack detector  
According to one embodiment, a web application layer attack detector (AD) is coupled between an HTTP client and a web application server. Responsive to receipt of a set of packets from the HTTP...
9021272 Systems and methods for managing cryptographic keys in a secure microcontroller  
The present invention relates to key management in a secure microcontroller, and more particularly, to systems, devices and methods of automatically and transparently employing logic or physical...
9009467 Power-line communications with communication channel to and/or from endpoint circuits with authentication methodology  
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for authenticating a communications source. In one aspect, a method includes decrypting a symbol...
9009474 Method and system for detecting data modification within computing device  
A method and apparatus for detecting data modification in a layered operating system is disclosed. Outbound content indicators at different layers are compared to detect potential outbound data...
8983061 Method and apparatus for cryptographically processing data  
A method and apparatus cryptographically process data including a plurality of data segments. The cryptographic process includes (a) receiving a plurality of data segments, (b) selecting, for each...
8983072 Portable data carrier featuring secure data processing  
Disclosed is a method for securely processing data in a portable data carrier. Said method is characterized by the following steps: a) the data to be processed is requested; b) the data to be...
8977847 Distributed challenge-response authentication  
A distributed challenge-response protocol is carried out between a verifier and a prover. The verifier comprises servers storing respective shares of a set of challenge-response pairs. A...
8972737 Unauthorized contents detection system  
A data processing device for playing back a digital work reduces the processing load involved in verification by using only a predetermined number of encrypted units selected randomly from...
8959338 Remote access manager for virtual computing services  
A remote access manager in a virtual computing services environment negotiates a time limited NAT routing rule to establish a connection between a remote device and virtual desktop resource...
8949964 Security key entry using ancillary input device  
A physical, non-human readable representation of a digital key may be in a physical key article. The key article may enable a person to generate a signal representing the digital key from a user...
8943313 Fine-grained security in federated data sets  
A data processing system, a server such as a federated server, a computer system, and like devices, and associated operating methods can be configured to support fine-grained security including...
8938075 Method and device for establishing a communication session  
Devices are provided with secret information to indicate which other devices are eligible to establish communication sessions. Information leaks about the eligibility of devices are prevented when...
8934626 Method to manage revocations in a group of terminals  
The present invention concerns the field of broadcast encryptionmethod, i.e. a method to organize the distribution of keys into a group of users so that it is possible to manage the revocation of...
8931098 Detecting method and device  
A method includes: generating object information that indicates an object designated from among a header item, text, and attached information of a received email, or feature amount information...
8930687 Secure distributed deduplication in encrypted data storage  
In an encrypted storage system employing data deduplication, encrypted data units are stored with the respective keyed data digests. A secure equivalence process is performed to determine whether...
8930690 Offloading packet processing for networking device virtualization  
The present invention extends to methods, systems, and computer program products for offloading packet processing for networking device virtualization. A host maintains rule set(s) for a virtual...
8924719 Mechanism for efficient private bulk messaging  
Secure bulk messaging mechanism in which, roughly described, a sender first encrypts a message once. The message can be decrypted with a message decryption key. These can be symmetric or...
8910304 Information processing device and multifunction peripheral  
A control API controls secret data to be stored in a secret data storage area which is accessible only to the control API. Moreover, the control API controls the file information storing part in...
8909967 Technique for secure computation  
A technique for secure computation obfuscates program execution such that observers cannot detect what instructions are being run at any given time. Rather, program execution and memory access...
8897445 Combination-based broadcast encryption method  
A combination-based broadcast encryption method includes: assigning by a server a base group of different combinations to each user; producing and sending secret information for each user by using...
8892873 Verification of user communication addresses  
Disclosed are various embodiments for performing stateless verification of communication addresses. Encrypted verification data is generated for a user, including a communication address, an...
8893256 System and method for protecting CPU against remote access attacks  
A system and method that provides for protection of a CPU of a router, by establishing a management port on a router. Hosts which are connected to a non-management ports of the router are denied...
8891764 Quarantine method for sellable virtual goods  
A method is disclosed for quarantining digital content data for a service in a terminal device. In an embodiment, the method includes creating a digital content data item, e.g. a digital still...
8886930 DNS flood protection platform for a network  
Embodiments are directed towards providing protection to DNS servers against DNS flood attacks by causing a requesting device to perform multiple DNS lookup requests for resolving a resource...
8880901 Secure address handling in a processor  
An embodiment generally pertains to a method of secure address handling in a processor. The method includes detecting an instruction that implicitly designates a target address and retrieving an...
8862692 Method for providing/accessing data on the internet and a respective client, server, and system  
A method for providing data on the Internet, comprising calculating, using a microprocessor, a value of a predetermined function for said data, wherein the value depends on the data, determining,...
8856518 Secure and efficient offloading of network policies to network interface cards  
Techniques for efficient and secure implementation of network policies in a network interface controller (NIC) in a host computing device operating a virtualized computing environment. In some...
8843769 Microcontroller with embedded secure feature  
A secure environment is established within a system on a chip (SoC) without the use of a memory management unit. A set of security parameters is produced by a configuration program executed by a...
8838963 Security enhancement arrangement  
Disclosed herein is a system for enhancing the security of wireless networks. In one aspect, a wireless access point that functions as a bridge between two networks is provided. The wireless...
8832433 Methods and systems for registering a packet-based address for a mobile device using a fully-qualified domain name (FQDN) for the device in a mobile communication network  
A mobile communication device registers for data communication through a mobile communication network with a packet-based network. The device may or may not have a mobile device number, and...
8826384 Assent to conditions for network access  
A device that includes a first processor, a second processor, and an encryption module in communication with the first processor and the second processor may be used to accept conditions for...
8824345 Wake-up apparatus and wake-up method for low power sensor node  
Provided are a wake-up apparatus and wake-up method for a low power sensor node, and more particularly, to a wake-up apparatus and wake-up method for a low power sensor node, which can extend the...
8825996 Platform that facilitates preservation of user privacy  
Described herein are technologies pertaining to preserving privacy of users of mobile computing devices. Two users of two mobile computing devices share a quantization scheme for quantizing...
8826012 Communication apparatus, control method thereof, and program  
A communication apparatus transmits data to a plurality of destinations. The apparatus includes a first input unit that inputs an individual setting as to whether the data is encrypted for each of...
8826001 Securing information within a cloud computing environment  
Embodiments of the invention provide a solution for securing information within a Cloud computing environment. Specifically, an encryption service/gateway is provided to handle...
8819410 Private electronic information exchange  
Methods and apparatuses for private electronic information exchange are described herein. In one embodiment, when electronic information is received to be delivered to a recipient, the electronic...
8819419 Method and system for dynamic encryption of a URL  
The present invention provides a dynamic, easily configurable system, which can be used to encrypt or otherwise hide the internal structure of a network. The present invention protects access to...
8819361 Retaining verifiability of extracted data from signed archives  
The objects of an archive may be verified with a cryptographic signature stored in the archive. However, when an object is extracted, the authentication involves re-authenticating the entire...
8813243 Reducing a size of a security-related data object stored on a token  
Embodiments of the present invention provide a method and system, including a client and security token, for reducing a size of a security-related object stored in the token. The object is stored...
8798270 Communication system and communication method  
To improve a communication system including two communication apparatuses in order to reduce a possibility of having communication thereof decrypted by a third party. The communication system...
8793777 Verification and authentication systems and methods  
Embodiments of the present invention provide verification and/or authentication service engines that provide a customizable solution that can be “dialed” based on the risk level assigned to...
8793488 Detection of embedded resource location data  
Systems, methods and apparatus for a distributed security that detects embedded resource request identifiers. The system can identify requests, such as HTTP requests, and can identify encoded...
8793483 Computer-based, automated workflow system for sending secure reports  
Computer-based systems and method for automating the workflow for generating and sending e-mails with attached reports to external recipients in order to reduce security breaches in certain...
8793792 Time-key hopping  
In certain embodiments, a first network device stores a security key associated with a second network device. The first network device computes access information according to the security key and...
8788826 Method and apparatus for dynamically allocating a mobile network prefix to a mobile terminal  
A method and apparatus for dynamically allocating a mobile network prefix to a mobile terminal, in which the mobile terminal is associated with a user equipment. The method includes sending a...
8782402 System and method for secure communications  
Encryption of electronic messages may be automatically processed by a messaging system based on keywords or other attributes of the messages. In one example, if the message includes a predefined...
8776220 Phishing detecting system and method operative to compare web page images to a snapshot of a requested web page  
A phishing detecting method includes: a web-page accessing request for accessing a target web page at a target address is received; the target web page from the target address is obtained; the...