Match Document Document Title
9332005 System and method for providing switch based subnet management packet (SMP) traffic protection in a middleware machine environment  
A system and method can provide switch based subnet management packet (SMP) traffic protection in a middleware machine environment. The middleware machine environment includes a network switch...
9124552 Filtering network data transfers  
Aspects of this disclosure relate to filtering network data transfers. In some variations, multiple packets may be received. A determination may be made that a portion of the packets have packet...
9043909 System and method for incorporating quality-of-service and reputation in an intrusion detection and prevention system  
An intrusion prevention system includes a processor, processing engines, buffers that are associated with a different range of reputation scores, and a storage device having a database and an...
9038178 Detection of malware beaconing activities  
Malware beaconing activity detection is disclosed, including: monitoring a plurality of conversations between an internal device and one or more external destinations; extracting feature sets...
9038161 Exploit nonspecific host intrusion prevention/detection methods and systems and smart filters therefor  
Exploit nonspecific host intrusion prevention/detection methods, systems and smart filters are described. Portion of network traffic is captured and searched for a network traffic pattern,...
9038170 Logging access system events  
A system is disclosed that logs access system events. When an access system event occurs, a log entry is created for the access system event. Information from an identity profile is stored in the...
9032503 Diversity string based pattern matching  
Diversity string based pattern matching is disclosed. In one embodiment, a method for inspecting multiple data patterns in a data block includes scanning the data block for a diversity string of...
9032215 Management of access control in wireless networks  
Management of access control in wireless networks known as smart spaces includes a framework that presents non-expert users with a consistent and intuitive interaction mechanism to manage access...
9032504 System and methods for an alternative to network controller sideband interface (NC-SI) used in out of band management  
A system and a method for operating a plurality of information handling systems forming a network are provided. The system includes a host computer processing unit (CPU); a band management...
9027138 Identification of infected devices in broadband environments  
Novel solutions for detecting and/or treating malware on a subscriber's premise network. Such solutions can include, but are not limited to, tools and techniques that can detect, and/or enable the...
9021251 Methods, systems, and computer program products for providing a virtual private gateway between user devices and various networks  
A communication network is operated by receiving traffic from a user device at a gateway device associated with a gateway service provider, which manages gateways to both secure and insecure...
9021272 Systems and methods for managing cryptographic keys in a secure microcontroller  
The present invention relates to key management in a secure microcontroller, and more particularly, to systems, devices and methods of automatically and transparently employing logic or physical...
9021090 Network access firewall  
The communications management systems manage access to a local area network or network content by external users, applications, and devices. The systems and methods are implemented on a network...
9021575 Selectively performing man in the middle decryption  
An agent on a device within a network receives a request to access a resource outside the network. A first encrypted connection is established between the device and the agent, and a second...
9015822 Automatic invocation of DTN bundle protocol  
A system and method for providing DTN services to legacy applications is provided. According to one example, a method for providing delay tolerant networking (DTN) services to legacy applications...
9015823 Firewalls in logical networks  
Some embodiments provide a method for configuring a logical firewall in a hosting system that includes a set of nodes. The logical firewall is part of a logical network that includes a set of...
9007929 Correlating communication transactions across communication networks  
A system for correlating communication packets across different communication networks includes a first monitoring agent in a first network for collecting local identifying information of a...
9009461 Selectively performing man in the middle decryption  
A HTTP request addressed to a first resource on a second device outside the network is received from a first device within the network. The HTTP request is redirected to a third device within the...
9003509 Security for WAP servers  
A method and system for improving the security and control of internet/network web application processes, such as web applications. The invention enables validation of requests from web clients...
9003511 Polymorphic security policy action  
In one embodiment, a method of improving the security of a computing device comprises using a computing device that has received one or more messages that have been determined as unauthorized,...
8997203 Filtering network packets in multiple forwarding information base systems  
In some implementations, a method for routing communication includes determining a binding interface for a communication session based on a forwarding information base (FIB) and a destination for...
8996618 System and method for providing sequenced anonymous communication sessions over a network  
A method for facilitating a sequenced, anonymous communications session in a communications environment is provided in one example that includes receiving, from a first endpoint, an anonymous,...
8996855 HTTP layer countermeasures against blockwise chosen boundary attack  
A client application, when executed by a processor, is operative to create a HyperText Transfer Protocol (HTTP) request containing a target header that includes a confidential value. The HTTP...
8997204 Efficient modification of packet filters in a wireless communication network  
Techniques for modifying packet filters in a wireless communication network are described. In one scheme, packet filters may be performed with multiple operations, if needed. The operation(s) to...
8995271 Communications flow analysis  
In one implementation, a communications flow analysis system determines whether a communications flow between a source and a destination should be retained. If the communications flow should be...
8997200 Electronic device for communication in a data network including a protective circuit for identifying unwanted data  
An electronic device for communication in a data network including a communication circuit adapted for performing the network communication, which communication includes controlling a plurality of...
8990938 Analyzing response traffic to detect a malicious source  
A system and method are provided to receive mirrored versions of transmissions sent by a node in response to initiating transmissions received by the node over a network. At least one mirrored...
8990610 Preferred resource selector  
A computer implemented method, and computer program product for requesting resources. The computer receives an assignment of an Internet protocol address. The computer compares a computer context...
8984620 Identity and policy-based network security and management system and method  
A system and method for providing security for a network connecting a source and a destination. The system and method provide a security and management system between the source and the...
8984618 System for managing virtual private network and method thereof  
Disclosed are a system for managing virtual private networks (VPNs) includes: terminals configured to transmit user data; a manager configured to transmit information for concealing networks and...
8984640 Anti-phishing  
In some embodiments, techniques for computer security comprise receiving a message, receiving a user-originated request for an action, wherein the action is associated with the message,...
8984619 Methods, systems, and computer readable media for adaptive assignment of an active security association instance in a redundant gateway configuration  
According to one aspect, the subject matter described herein includes a method for communicating an encrypted data packet. The method includes steps occurring at a first gateway node. The method...
8984157 Network analysis in a file transfer system  
Aspects of the invention are directed to a method and system for discovering business content transfer paths in a network using file transfer information, and for calculating business risk per...
8984273 Method to provide secure multimedia messaging between peer systems  
A lightweight solution enables the exchange of multimedia information in a secure manner. Exchanged cryptographic material can be used to encipher multimedia message-oriented communications...
8984627 Network security management  
A method may include receiving session control messages and counting the session control messages of a same type having a same transaction identifier (ID). The method may further include blocking...
8976647 Hardware-based dynamic load balancing that avoids flow packet reordering statistically  
A network component comprising a hash generator configured to generate a first hash value using a first hash function and a packet, and generate a second hash value using a second hash function...
8978136 Systems and methods for detection and suppression of abnormal conditions within a networked environment  
Systems and methods are provided for handling a malicious computer-related security event that occurs at central network access points of the Internet involving networks of autonomous and...
8973125 Application layer authentication in packet networks  
In a communication network, assume a first computing device is an end user device, a second computing device is a gateway server, and a third computing device is an application server. A method...
8973098 System and method for virtualized resource configuration  
A system and method for configuring client access to a network includes at a first port, accessing a first server on a first local area network associated with the first port. An authorized local...
8972508 Methods and systems for managing email configuration  
A computer-implemented method for managing email configuration may include receiving a first email message from a first device, identifying device-type information in the first email message,...
8964978 Method and apparatus for efficiently fixing transformed part of content  
Provided are a method and apparatus for effectively fixing scrambled content. The method includes checking fixing information for a program map table (PMT) packet of packets constituting the...
8966608 Preventing spoofing  
A method and access node for preventing spoofing while connecting subscribers to an Ethernet network. The access node includes a filter mechanism for filtering packets destined to subscribers...
8966609 Authentication method and apparatus for detecting and preventing source address spoofing packets  
An authentication apparatus for detecting and preventing a source address spoofing packet, includes a packet reception unit configured to receive a packet from a previous node or a user host; a...
8966607 Device programmable network based packet filter  
A method is provided for filtering unwanted packets in a communication system. The communication system includes a first network, a wireless network and at least one wireless communication device....
8966627 Method and apparatus for defending distributed denial-of-service (DDoS) attack through abnormally terminated session  
There are provided a method and apparatus for defending a Distributed Denial-of-Service (DDoS) attack through abnormally terminated sessions. The DDoS attack defending apparatus includes: a...
8964763 Inter-router communication method and module  
A system and method of inter-router communication is described. The system and method include a routing protocol communication, configured to be sent between a plurality of routers on a network,...
8959611 Secure packet management for bare metal access  
Secure networking processes, such as packet encapsulation and decapsulation, can be executed upstream of a user or guest operating system provisioned on a host machine, where the user has...
8959612 Secure system for interconnection between two public networks  
A secure interconnection system between two public networks comprises at least one first router, a first firewall, a second router, a second firewall and a blade server, and a first virtual local...
8955090 Session initiation protocol (SIP) firewall for IP multimedia subsystem (IMS) core  
A SIP firewall defends an IMS network against SIP registration-based DoS/DDoS attacks by issuing fake authentication challenges when suspiciously high registration traffic is present. The fake...
8955089 “Push” keep-alive mechanism for SIP user agents located behind NATS/firewalls  
A user equipment (UE) and method is provided having one or more components configured to receive a non-session initiation protocol (SIP) notification from a SIP entity and in response to send a...