AcclaimIP-ad

Match Document Document Title
9043894 Malicious software detection in a computing system  
A computer system identifies malicious Uniform Resource Locator (URL) data items from a plurality of unscreened data items that have not been previously identified as associated with malicious...
9043461 Firewall event reduction for rule use counting  
An illustrative embodiment of a method for firewall rule use counting receives log messages comprising one or more log data sets from each firewall rule in a particular network whose counts are to...
9042252 Inter-packet interval prediction learning algorithm  
An appliance receives packets that are part of a flow pair, each packet sharing an application protocol. The appliance determines the application protocol of the packets by performing deep packet...
9043909 System and method for incorporating quality-of-service and reputation in an intrusion detection and prevention system  
An intrusion prevention system includes a processor, processing engines, buffers that are associated with a different range of reputation scores, and a storage device having a database and an...
9043589 System and method for safeguarding and processing confidential information  
One aspect of the invention is a method for providing restricted access to confidential services without impacting the security of a network. The method includes using a gateway to isolate one or...
9043893 System and method for web application firewall tunneling  
Systems and methods for web application firewall tunneling are disclosed. In one embodiment, the method may include (1) receiving a plurality of characters entered by a user into a field of a HTML...
9038178 Detection of malware beaconing activities  
Malware beaconing activity detection is disclosed, including: monitoring a plurality of conversations between an internal device and one or more external destinations; extracting feature sets...
9038160 Use of data links for aeronautical purposes without compromising safety and security  
A method of ensuring secure and cost effective communication of aeronautical data to and from an aircraft is provided. The method includes uplinking air-ground aircraft data communications via an...
9038170 Logging access system events  
A system is disclosed that logs access system events. When an access system event occurs, a log entry is created for the access system event. Information from an identity profile is stored in the...
9038187 Insider threat correlation tool  
Systems and methods for calculating threat scores for individuals within an organization or domain are provided. Aspects of the invention relate to computer-implemented methods that form a...
9030993 Communication device, connection method and storage medium  
In order that even a wireless terminal whose an unique ID is not registered in the filter list can use simply the access point without a prior setting task by user, a communication device includes...
9032502 System and method for distributed multi-processing security gateway  
A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server based on network information, and using the...
9025185 Information processing apparatus for processing a management setting, information processing method, and computer readable medium  
An information processing apparatus includes a first receiving unit, a registering unit, a requiring unit, a second receiving unit, and a transmitting unit. The first receiving unit receives a...
9027138 Identification of infected devices in broadband environments  
Novel solutions for detecting and/or treating malware on a subscriber's premise network. Such solutions can include, but are not limited to, tools and techniques that can detect, and/or enable the...
9027112 Mobile device management  
Methods and apparatuses that enroll a wireless device into an enterprise service with a management server addressed in a management profile are described. The enrollment may grant a control of...
9021574 Configuration management for network activity detectors  
Network activity detectors, such as firewalls, communicate with one another to form a Unified Threat Management System. A first network activity detector sends a request for configuration settings...
9021272 Systems and methods for managing cryptographic keys in a secure microcontroller  
The present invention relates to key management in a secure microcontroller, and more particularly, to systems, devices and methods of automatically and transparently employing logic or physical...
9021090 Network access firewall  
The communications management systems manage access to a local area network or network content by external users, applications, and devices. The systems and methods are implemented on a network...
9021545 Method and system to secure a computing device  
In one embodiment, a first instruction prescribing a setting for a feature is defined. A second instruction prescribing a first action is defined. A third instruction prescribing a second action...
9021573 Control of security application in a LAN from outside the LAN  
A method and a system are disclosed that enable an address at the edge router to be used to establish a multi-pipe virtual private network (MVPN) connecting controllers to multiple web enabled end...
9015823 Firewalls in logical networks  
Some embodiments provide a method for configuring a logical firewall in a hosting system that includes a set of nodes. The logical firewall is part of a logical network that includes a set of...
9009809 Computer or microchip with a secure system BIOS and a secure control bus connecting a central controller to many network-connected microprocessors and volatile RAM  
A computer or microchip including a system BIOS located in flash memory which is located in a portion of the computer or microchip protected by an inner hardware-based access barrier or firewall,...
9009461 Selectively performing man in the middle decryption  
A HTTP request addressed to a first resource on a second device outside the network is received from a first device within the network. The HTTP request is redirected to a third device within the...
9003509 Security for WAP servers  
A method and system for improving the security and control of internet/network web application processes, such as web applications. The invention enables validation of requests from web clients...
9003510 Computer or microchip with a secure system bios having a separate private network connection to a separate private network  
A computer or microchip including a network connection for connection to a public network of computers including the Internet, the network connection being located in a public unit; and an...
9003361 Generating a restful web service software development kit client  
A computer system receives user input indicating uniform resource identifiers (URIs) for a RESTful web service. The computer system identifies a programming language for a RESTful web service...
9003530 Information processing method, device, and server  
Embodiments of the present invention provide an information processing method, device, and server, relating to the technical field of communications, and solving the problem that a user...
8997201 Integrity monitoring to detect changes at network device for use in secure network access  
In one embodiment, a method includes initiating integrity monitoring at a network device, continuously monitoring the network device to detect changes at the network device over a period of time,...
8996865 Systems and methods for implementing computer security  
A computer system includes memory storing an operating system. An agent executive runs within the operating system. The agent executive receives an agent identity token from a grid computer...
8997076 Auto-updating an application without requiring repeated user authorization  
A loader application and an associated dynamic link library are installed on a client system. Upon a first execution of the loader application, a user authorization to communicate with locations...
8997202 System for secure transfer of information from an industrial control system network  
A system for securely transferring information from an industrial control system network, including, within the secure domain, one or more remote terminal units coupled by a first network, one or...
8997200 Electronic device for communication in a data network including a protective circuit for identifying unwanted data  
An electronic device for communication in a data network including a communication circuit adapted for performing the network communication, which communication includes controlling a plurality of...
8990885 Zone-based firewall policy model for a virtualized data center  
Techniques are provided for implementing a zone-based firewall policy. At a virtual network device, information is defined and stored that represents a security management zone for a virtual...
8990886 Techniques of transforming policies to enforce control in an information management system  
In an information management system, policies are deployed to targets and targets can evaluate the policies whether they are connected or disconnected to the system. The policies may be...
8990915 Local data appliance for collecting and storing remote sensor data  
A system for providing local access by means of a local data appliance to data collected from remote monitors and sensors is described. The system includes a plurality of remote monitors and...
8990387 Automatic completeness checks of network device infrastructure configurations during enterprise information technology transformation  
A system and an article of manufacture for automatically determining configuration completeness during information technology (IT) transformation from a pre-transformation source environment to a...
8990917 Authentication of applications that access web services  
Systems and methods for authenticating applications that access web services. In one embodiment, a web service gateway intercepts a request for a web service from an application, and determines if...
8981895 Method and system for intrusion detection in networked control systems  
A method and system for detection of intrusion in networked control systems, is provided. The method includes generating an operating model of a system being controlled. The operating model of the...
8984618 System for managing virtual private network and method thereof  
Disclosed are a system for managing virtual private networks (VPNs) includes: terminals configured to transmit user data; a manager configured to transmit information for concealing networks and...
8984272 Information processing apparatus, secure module, information processing method, and computer product  
An information processing apparatus securely stores a program group comprising one or more programs and includes a first detector that detects an execution waiting state of a given program among...
8984585 Recording activity-triggered computer video output  
An application that is capable of monitoring Internet or network traffic and performing recordings of computer video output based on one or more violations of network activity policies. The...
8984614 Socks tunneling for firewall traversal  
The present invention provides a unique way of implementing the SOCKS protocol for establishing connections through a firewall. In general, instead of having a SOCKS server implemented entirely in...
8983866 Automated encoding of delta operators  
In one example, a method includes: receiving a first input value associated with a first data field; responsive to determining the first data field is associated with a delta operation, selecting...
8977691 Implementation of an extranet server from within an intranet  
A request for information or services available on an intranet may be made by users on an extranet outside the intranet. An email is generated in an external server on the extranet in response to...
8978138 TCP validation via systematic transmission regulation and regeneration  
The present invention provides a technique for validating TCP communication between a client requesting resources and a server providing requested resources to protect the specified server from a...
8976963 IPv6-over-IPv4 architecture  
Mobile clients can execute IPv6 applications in an IPv4 environment without the need for any specialized IPv6 hardware or upgrades to the network infrastructure. The architecture provides a...
8977746 Systems and methods for scalable network monitoring  
A network security device may gather a large amount of metadata pertaining to the connections being managed thereby. A refinement module may filter and/or aggregate the connection metadata. The...
8978104 Access control center workflow and approval  
Methods and systems are disclosed for providing indirect and temporary access to a company's IT infrastructure and business applications. The methods/systems involve establishing an access control...
8966594 Proxy authentication  
A first application that is hosted by a first machine receives a login request from a user. The first application requests authentication verification from a second application that is hosted by a...
8966625 Identification of malware sites using unknown URL sites and newly registered DNS addresses  
In some embodiments, identification of malware sites using unknown URL sites and newly registered DNS addresses includes performing a heuristic analysis for information associated with a network...