Matches 1 - 50 out of 95 1 2 >

AcclaimIP-ad

Match Document Document Title
US20090265543 Home Node B System Architecture with Support for RANAP User Adaptation Protocol  
Some embodiments are implemented in a communication system that includes a first communication system comprised of a licensed wireless radio access network and a core network, and a second...
US20090287920 METHOD FOR ESTABLISHING BI-DIRECTIONAL MESSAGING COMMUNICATIONS WITH WIRELESS DEVICES AND WITH REMOTE LOCATIONS OVER A NETWORK  
A method, server, device and computer readable medium for establishing a bi-directional communication session between a first device and a server is provided. During the method, a first transport...
US20090265542 Home Node B System Architecture  
Some embodiments provide methods and systems for integrating a first communication system with a core network of a second communication system that has a licensed wireless radio access network....
US20140223169 TCP/IP-BASED COMMUNICATION SYSTEM AND ASSOCIATED METHODOLOGY PROVIDING AN ENHANCED TRANSPORT LAYER PROTOCOL  
A more secure TCP/IP protocol stack is provided having an enhanced transport layer. Encryption and decryption logic is arranged on the transmission side and on the reception side for processing a...
US20090132808 SYSTEM AND METHOD OF PERFORMING ELECTRONIC TRANSACTIONS  
A system and method of performing electronic transactions between a server computer and a client computer. The method implements a communication protocol with encrypted data transmission and...
US20090193248 Processing Multiple Wireless Communications Security Policies  
A computer program product for processing wireless data packets allows for processing packets to consolidate security processing. Security processing is performed in accordance with multiple...
US20100122078 SYSTEMS AND METHODS FOR CREATING A CODE INSPECTION SYSTEM  
A code inspection system produces a dynamic decoy machine that closely parallels one or more protected systems. The code inspection system can analyze and monitor one or more protected systems,...
US20070113070 SECURE ACTIVE SUSPENSION SYSTEM  
Among other things, an active suspension system for a vehicle includes a first component, and a second component in communication with the first component using a network. The first component is...
US20150350247 EFFICIENT SECURE INSTANT MESSAGING  
A method and apparatus of a device that enables a user to participate in a secure instant messaging session by starting with a low security connection before switching to a high security...
US20050141706 System and method for secure ad hoc mobile communications and applications  
A mobile agent system bridges applications and communications with next generation wireless and mobile ad hoc network infrastructures. A method utilizing middleware turns traditional applications...
US20170142100 SECURE DISTRIBUTION OF SESSION CREDENTIALS FROM CLIENT-SIDE TO SERVER-SIDE TRAFFIC MANAGEMENT DEVICES  
A traffic management device (TMD), system, and processor-readable storage medium are directed to securely transferring session credentials from a client-side traffic management device (TMD) to a...
US20050216727 Communication stack for network communication and routing  
A communication stack enables computers implementing it to send, receive, or route network communications. The communication stack includes a message layer, a communication layer, a security...
US20130227273 PRIVACY-PRESERVING PUBLISH-SUBSCRIBE PROTOCOL IN A DISTRIBUTED MODEL  
A method and system for providing privacy in a publish-subscribe protocol is provided. A server transmits to a client a public key. The server receives from the client a pseudonym of an interest...
US20100211506 MOBILE TRANSACTION SYSTEM AND METHOD  
A mobile transaction system and method are carried out by a plurality of remote trading servers, a mobile barcode trading device and a data transmission server. The remote trading server generates...
US20090129597 REMOTE PROVISIONING UTILIZING DEVICE IDENTIFIER  
Embodiments of the present invention provide for remote provisioning using a device identifier. In some embodiments, a client device may transmit the device identifier to a provisioning server...
US20070101121 Secure IP access protocol framework and supporting network architecture  
A protocol framework for a Secure IP Access (SIA) method, and supporting components deployed on IP hosts and IP networks. Using this method, an IP host can establish a secure data channel within...
US20110231650 USE AND GENERATION OF A SESSION KEY IN A SECURE SOCKET LAYER CONNECTION  
The invention describes a method and system for verifying the link between a public key and a server's identity without relying on the trustworthiness of the root certificate of the server's...
US20060174103 System and method for integrating PKI and XML-based security mechanisms in SyncML  
Additions of extensions to SyncML protocol to incorporate PKI-based and XML-based security mechanisms. The present invention involves the partial incorporation of the PKI based mechanisms present...
US20150082021 MOBILE PROXY FOR WEBRTC INTEROPERABILITY  
An example method and system for a mobile proxy for WebRTC interoperability is discussed. The method may include receiving a DTLS security handshake from a WebRTC API of a browser endpoint,...
US20130061039 METHOD AND SYSTEM FOR SECURING DATA UTILIZING RECONFIGURABLE LOGIC  
A method, an article of manufacture, and a process are provided for securing data sets by dynamically hopping amongst a variety of data encryption and/or manipulation protocols. Such dynamic...
US20130042100 METHOD AND APPARATUS FOR FORCED PLAYBACK IN HTTP STREAMING  
Systems and methods for enforcing playback of a specific portion of the content in an open non-certified media player/renderer are provided. In accordance with such systems and methods, a key is...
US20070074047 Key rotation  
A system and method for a mechanism is provided for automatically selecting a new encryption key for re-encrypting data in a target database. New initialization vectors may be specified for...
US20050177713 Multi-protocol network encryption system  
An encryption management system for a network. The system connects between a protected network and an unprotected network, and manages both encryption and decryption of a payload to be sent...
US20090013174 METHODS AND SYSTEMS FOR HANDLING DIGITAL RIGHTS MANAGEMENT  
Systems and methods according to the present invention address this need and others by providing methods and systems for translating media encrypted by various Digital Rights Management (DRM)...
US20050108518 Runtime adaptable security processor  
A runtime adaptable security processor is disclosed. The processor architecture provides capabilities to transport and process Internet Protocol (IP) packets from Layer 2 through transport...
US20100318784 CLIENT IDENTIFICATION FOR TRANSPORTATION LAYER SECURITY SESSIONS  
Systems, methods, and other embodiments associated with client identification for transportation layer security sessions are described. One example method includes monitoring a first...
US20100281250 AUTHENTICATION AND ENCRYPTION METHOD AND APPARATUS FOR A WIRELESS LOCAL ACCESS NETWORK  
This invention pertains to the field of Wireless Local Area Network (WLAN). This invention allows a secure connection of a user client station to a base unit. The secure connection comprises the...
US20060224883 Programming interface for configuring network services in a server  
A programming interface for Secure Socket Layer (SSL) abstracts manipulation, e.g., configuration and management, of SSL tables based upon an SSL implementation model. The SSL tables can be...
US20050050316 Passive SSL decryption  
A method and apparatus for passive probing of forwarded TCP communication sessions between a client and a server. This includes receiving forwarded data packets corresponding to the TCP...
US20120284506 METHODS AND APPARATUS FOR PREVENTING CRIMEWARE ATTACKS  
A central server configured to mediate communications including establishing secure online sessions between user-controlled devices and 3rd party devices, such as a 3rd party device hosting a...
US20110119534 METHOD AND APPARATUS FOR PROCESSING PACKETS  
A method and apparatus for processing packets are provided to extend the usage of a Cryptographically Generated Addresses (CGA) protocol. The method includes: receiving an Internet Protocol...
US20060259759 Method and apparatus for securely extending a protected network through secure intermediation of AAA information  
A method of securely extending a protected network through secure relay of AAA information, when an isolated device lacks Layer 3 connectivity to an AAA infrastructure of the protected network,...
US20090113203 Network System  
An encryption communication module on the side of a service providing server reports a global IP address allocated to an NAPT router on the service providing server side and a port number of an...
US20050210243 System and method for improving client response times using an integrated security and packet optimization framework  
A system and method for providing integrated secured and optimized packet messaging is described. A plurality of request packets staged in a packet queue from a requesting client and specifying...
US20150373048 Enterprise Mobile Notification Solution  
The present invention provides mobile clients that can be easily distributed using any third party MDM (Mobile Device Management) solutions, or mobile app stores. Two operational modes provide...
US20050289337 Electronic mail server device and electronic mail processing method  
An advantage of the present invention is to prevent a load from being placed on a terminal during a processing at transmission or reception of data and to secure safety in communication. An...
US20050060534 Using a random host to tunnel to a remote application  
A method for establishing communications between monitoring software located on a monitoring server is disclosed. A remote server includes an SSH server application and a remote application to be...
US20130219166 HARDWARE BASED IDENTITY MANAGER  
A method for providing authentication credentials to a server over a communications network includes initiating communication with a server over a communications network. The communication is to...
US20060149962 Network attached encryption  
A method and apparatus are provided for managing cryptographic keys and performing cryptographic services within server or other computing environments. An appliance functions as a cryptographic...
US20070136606 Storage system with built-in encryption function  
In a plurality of storage systems including data encryption functions, there is a possibility that encryption keys necessary for data encryption and decryption may differ among the storage...
US20160006762 METHOD FOR CREATING A PROFILE IN A SECURITY DOMAIN OF A SECURED ELEMENT  
Disclosed is a method for creating a profile in a target security domain of a secure element. In various implementations, the method includes a reception operation by said target security domain,...
US20090044006 SYSTEM FOR BLOCKING SPAM MAIL AND METHOD OF THE SAME  
The present invention generally relates to a system for blocking spam mail and a method of the same, and the system in accordance with the present invention, comprising: a Mail transceiver...
US20060253698 Method, system and entities for exchanging content  
A method for exchanging content between a server entity (UA-I) and a client entity (UA-II). The method includes establishing a session between the server entity and the client entity based on a...
US20160261632 Methods and Arrangements for Cloud Caching  
In a method in a primary network node for providing a web-service to clients, performing the steps of verifying (S1) a TCP session with a client node and generating TLS keys for said session....
US20070107050 Simple two-factor authentication  
Internet Security is increasingly of concern as more and more cases of identity theft of online data is reported. Simple login and password authentication for access to sensitive websites like...
US20080126795 METHOD, SYSTEM, AND APPARATUS FOR TRANSMITTING SYSLOG PROTOCOL MESSAGES  
The present invention provides a method, a system and an apparatus for transmitting SYSLOG messages. The method includes: transmitting a secure transmission upgrade indication from a SYSLOG...
US20090271612 METHOD, SYSTEM AND DEVICE FOR REALIZING MULTI-PARTY COMMUNICATION SECURITY  
A method for realizing multi-party communication security includes: performing identification authentication and negotiating to create an initiation session through running the transport layer...
US20060095767 Method for negotiating multiple security associations in advance for usage in future secure communication  
The present invention describes a novel security model in which security context is pre-negotiated and is used at future instances to secure messaging between nodes involved in sending and...
US20160050568 MACHINE-TO-MACHINE CELLULAR COMMUNICATION SECURITY  
Communication between a mobile terminal operating in a cellular network and a server is provided. Communication between the mobile terminal and the server is routed through a Serving GPRS Support...
US20070011448 Using non 5-tuple information with IPSec  
A method of communicating using IPSec security protocol. Security associations are provided for a connection based on session information that may include user information and/or information...
Matches 1 - 50 out of 95 1 2 >