Match Document Document Title
9043897 Payment card industry (PCI) compliant architecture and associated methodology of managing a service infrastructure  
A system to ensure compliance with data security standards includes a security appliance to perform multiple security functions, with the security appliance including an initial configuration. The...
9043868 Network security appliance  
Methods, devices, and systems that may be used to secure networked devices are provided. One method includes receiving, at a security device, encrypted configuration data from a management server...
9043896 Device certificate based appliance configuration  
Embodiments of the present invention address deficiencies of the art in respect to configuring a computing appliance and provide a method, system and computer program product for device...
9036470 System and method for virtual private application networks  
A system and method for virtual private application networks includes receiving a first packet associated with a first network flow at a network device, determining one or more first...
9038163 Systems and methods for connecting network devices over communication network  
Systems and methods for connecting a first network device and a second network device over a communication network are disclosed. An exemplary method includes receiving, from the first network...
9032506 Multiple application containerization in a single container  
Described in an example embodiment herein is a Multiple Application Container. Various embodiments of the Multiple Application Container may include, but are not limited to: (1) managed intranet...
9027086 Securing organizational computing assets over a network using virtual domains  
A method for connecting to a trust broker system is disclosed. The electronic device stores encrypted identifying information for a plurality of client systems authorized to interact with the...
9027138 Identification of infected devices in broadband environments  
Novel solutions for detecting and/or treating malware on a subscriber's premise network. Such solutions can include, but are not limited to, tools and techniques that can detect, and/or enable the...
9027116 Dynamic VPN address allocation  
Methods and related systems are presented that relate to automatically avoiding address conflicts when establishing a secure communications link over a public network between a local computer,...
9026918 Enabling a user device to access enterprise data  
A method, system and graphical user interface for enabling a user to access enterprise data and interact with enterprise applications generating the enterprise data using a portable electronic...
9021578 Systems and methods for securing internet access on restricted mobile platforms  
A computer-implemented method for securing Internet access on restricted mobile platforms may include identifying an attempt by a mobile computing system to establish a virtual private network...
9021272 Systems and methods for managing cryptographic keys in a secure microcontroller  
The present invention relates to key management in a secure microcontroller, and more particularly, to systems, devices and methods of automatically and transparently employing logic or physical...
9021573 Control of security application in a LAN from outside the LAN  
A method and a system are disclosed that enable an address at the edge router to be used to establish a multi-pipe virtual private network (MVPN) connecting controllers to multiple web enabled end...
9015824 Allowing a client computing device to securely interact with a private network  
Systems and methods for allowing client computing device to securely interact with private network are provided. Method includes initiating virtual private network connection. Method also includes...
9015823 Firewalls in logical networks  
Some embodiments provide a method for configuring a logical firewall in a hosting system that includes a set of nodes. The logical firewall is part of a logical network that includes a set of...
9015825 Method and device for network communication management  
Method and device for managing one or more secure gateway virtual private network, VPN, devices (104, 105) in a secure VPN for cryptographically separated and tunnelled VPN communication. VPN...
9009813 Policy driven fine grain URL encoding mechanism for SSL VPN clientless access  
The present disclosure presents methods, systems and intermediaries which determine an encoding scheme of a uniform resource location (URL) from a plurality of encoding schemes for a clientless...
9009812 System, method and apparatus that employ virtual private networks to resist IP QoS denial of service attacks  
An approach provides a communication network that supports one or more network-based Virtual Private Networks (VPNs) to resist Denial of Service (DoS) attacks. A first boundary router is...
9003509 Security for WAP servers  
A method and system for improving the security and control of internet/network web application processes, such as web applications. The invention enables validation of requests from web clients...
9003514 System and method to troubleshoot a defect in operation of a machine  
A system and method to troubleshoot a defect in at least one machine is provided. The system includes a portable device having a tracking system to detect when within a threshold proximity of a...
8997208 Gateway device for terminating a large volume of VPN connections  
A VPN gateway device is able to assign, manage, and terminate a large volume of connections from apps executing on devices, enabling a large scale per-app VPN mobile environment. When a mobile...
8997206 Peer-to-peer network over a virtual private network  
The present invention provides a new network topology. More specifically, a peer-to-peer network is defined on a virtual private network. The peer-to-peer network comprises a set of specified...
8997207 Modular secure data transfer  
A method and system that modularizes a message by separating the message definition data from the message data. The message definition data and message data are transmitted over a secure channel...
8990920 Creating a virtual private network (VPN) for a single app on an internet-enabled device or system  
An Internet-enabled device, such as a smartphone, tablet, PC, wearable sensor, or household appliance, executes an application (or “app”) has its own VPN connection with a VPN gateway device. The...
8984618 System for managing virtual private network and method thereof  
Disclosed are a system for managing virtual private networks (VPNs) includes: terminals configured to transmit user data; a manager configured to transmit information for concealing networks and...
8984619 Methods, systems, and computer readable media for adaptive assignment of an active security association instance in a redundant gateway configuration  
According to one aspect, the subject matter described herein includes a method for communicating an encrypted data packet. The method includes steps occurring at a first gateway node. The method...
8983074 Input content data managing system and method of managing input content data  
An input content data managing system, includes a first electronic storing apparatus that stores encoded content data generated by encoding content data with a cryptographic key; a electronic...
8984621 Techniques for secure access management in virtual environments  
Techniques for secure access management to virtual environments are provided. A user authenticates to a portal for purposes of establishing a virtual machine (VM). The portal interacts with a...
8976798 Method and system for communicating over a segmented virtual private network (VPN)  
An approach for providing secure communication services is disclosed. A secure (e.g., a Virtual Private Network (VPN)) tunnel from a source node over an access network, such as a satellite...
8978104 Access control center workflow and approval  
Methods and systems are disclosed for providing indirect and temporary access to a company's IT infrastructure and business applications. The methods/systems involve establishing an access control...
8977775 Techniques for identity and policy based routing  
Techniques for identity and policy based routing are presented. A resource is initiated on a device with a resource identity and role assignments along with policies are obtained for the resource....
8972475 Network secure communications in a cluster computing environment  
Secure communications are provided over a network in a distributed workload environment having target hosts which are accessed through a distribution processor by a common network address. Secure...
8966611 Method and apparatus for local area networks  
A mechanism for segregating traffic amongst STAs that are associated with a bridge, referred to herein as the personal virtual bridged local area network (personal VLAN), is based upon the use of...
8958292 Network control apparatus and method with port security controls  
Port security in some embodiments is a technique to apply to a particular port of a logical switching element such that the network data entering and existing the logical switching element through...
8959614 Apparatus and method for providing virtual private network service based on mutual authentication  
An apparatus and method for providing a virtual private network (VPN) service based on mutual authentication are provided, the apparatus including a storage unit configured to store a first public...
8955100 Routing device having integrated MPLS-aware firewall  
An MPLS-aware firewall allows firewall security policies to be applied to MPLS traffic. The firewall, which may be integrated within a routing device, can be configured into multiple virtual...
8954964 System and method for isolated virtual image and appliance communication within a cloud environment  
Provided herein are systems and methods for providing isolated virtual image communication in a virtual computing environment. Initially, a guest virtual machine that is activated in a virtual...
8955093 Cooperative network security inspection  
A network system includes a security device and a network access device. The network access device is to receive a packet from a source node destined to a destination node, and to examine a data...
8955150 Apparatus and method for managing digital rights using virtualization technique  
The present invention relates to an apparatus and a method for managing digital rights using virtualization technique, and more particularly to an apparatus and a method for enabling a user to...
8955099 Distributing and sharing licenses across network devices in a virtual private network (VPN)  
A device creates a pool of available licenses for secure network resources, and receives an unused license from a network device. The device also provides the unused license in the pool of...
8949929 Method and apparatus for providing a secure virtual environment on a mobile device  
Methods and devices provide a secure virtual environment within a mobile device for processing documents and conducting secure activities. The methods and devices create a secure application...
8949968 Multi-service VPN network client for mobile device  
An integrated, multi-service network client for cellular mobile devices is described. The multi-service network client can be deployed as a single software package on cellular mobile network...
8949969 Payment card industry (PCI) compliant architecture and associated methodology of managing a service infrastructure  
A system to ensure compliance with data security standards. The system including a security appliance to perform multiple security functions, the security appliance in communication with a...
8943596 System and method for improving the efficiency of application emulation acceleration  
An improved emulator for analyzing software code, and associated method. The emulator includes a virtual execution environment in which a series of virtual processing states are represented during...
8943304 Systems and methods for using an HTTP-aware client agent  
Systems and methods are described for using a client agent operating in a virtual private network environment to intercept HTTP communications. Methods include: intercepting at the network layer,...
8931047 System and method for securing virtualized networks  
A method and apparatus that secures a dynamic virtualized network is described. In an exemplary embodiment, a device learns a current network policy of the dynamic virtualized network, where the...
8931077 Security system for a computer network having a security subsystem and a master system which monitors the integrity of a security subsystem  
A security system for a computer network that has a plurality of devices connected thereto comprises a security subsystem, a master system and a secure link. The security subsystem is implemented...
8931078 Providing virtualized private network tunnels  
Various aspects of the disclosure relate to providing a per-application policy-controlled virtual private network (VPN) tunnel. In some embodiments, tickets may be used to provide access to an...
8931046 System and method for securing virtualized networks  
A method and apparatus that secures a dynamic virtualized network is described. In an exemplary embodiment, a device learns a current network policy of the dynamic virtualized network, where the...
8929546 Motion-based authentication for a gesture-based computing device  
A motion-based authentication method is operative in a mobile computing device having a display interface and that includes an accelerometer. Normally, the device software includes a locking...