Matches 1 - 50 out of 335 1 2 3 4 5 6 7 >


Match Document Document Title
US20130085880 IMPLEMENTATION OF SECURE COMMUNICATIONS IN A SUPPORT SYSTEM  
A support system negotiates secure connections on behalf of multiple guest systems using a set of credentials associated with the guest systems. The operation of the secure connection may be...
US20120159150 SYSTEM AND METHOD FOR IMPLEMENTING AN ENHANCED TRANSPORT LAYER SECURITY PROTOCOL  
A system and method for implementing an enhanced transport layer security (ETLS) protocol is provided. The system includes a primary server, an ETLS servlet and an ETLS software module. The...
US20120023324 INSIDER THREAT CORRELATION TOOL  
Systems and methods for calculating threat scores for individuals within an organization or domain are provided. Aspects of the invention relate to computer-implemented methods that form a...
US20140108781 Method and System for Negotiation Based on IKE Messages  
The present invention provides a method and a system for negotiation based on IKE messages. A standby device updates a value of a stored third identity according to an update notification of an...
US20140032897 SECURELY ESTABLISHING A COMMUNICATION CHANNEL BETWEEN A SWITCH AND A NETWORK-BASED APPLICATION USING A UNIQUE IDENTIFIER FOR THE NETWORK-BASED APPLICATION  
A network-based application can establish a secure network connection to a switch. A unique identifier (UID) is generated for the network-based application, and a secure authentication request is...
US20110087878 ENABLING QoS FOR MACsec PROTECTED FRAMES  
Embodiments associated with enabling Quality of Service (QoS) for MACsec protected frames are described. One example method includes identifying a security indicator in an encrypted network...
US20100318784 CLIENT IDENTIFICATION FOR TRANSPORTATION LAYER SECURITY SESSIONS  
Systems, methods, and other embodiments associated with client identification for transportation layer security sessions are described. One example method includes monitoring a first...
US20130061038 Proxy Apparatus for Certificate Authority Reputation Enforcement in the Middle  
Network security administrators are enabled with their customizable certificate authority reputation policy store which is informed by an independent certificate authority reputation server. The...
US20120246462 SYSTEM AND METHODS FOR PROVIDING LIVE STREAMING CONTENT USING DIGITAL RIGHTS MANAGEMENT-BASED KEY MANAGEMENT  
In the present disclosure, a DRM (in this case IPRM) system may be used to deliver media content keys to a player device in a live streaming environment and take advantage of all DRM related...
US20110154017 SYSTEMS AND METHODS FOR EVALUATING AND PRIORITIZING RESPONSES FROM MULTIPLE OCSP RESPONDERS  
The present invention is directed towards systems and methods for determining a status of a client certificate from a plurality of responses for an Online Certificate Status Protocol (OCSP)...
US20150113264 INLINE INSPECTION OF SECURITY PROTOCOLS  
Systems and methods for inline security protocol inspection are provided. According to one embodiment, a security device receives an encrypted raw packet from a first network appliance and buffers...
US20100325418 SYSTEMS AND METHODS FOR SSL SESSION CLONING - TRANSFER AND REGENERATION OF SSL SECURITY PARAMETERS ACROSS CORES, HOMOGENOUS SYSTEM OR HETEROGENEOUS SYSTEMS  
The present invention is directed towards systems and methods for managing SSL session persistence and reuse in a multi-core system. A first core may indicate that an SSL session established by...
US20130019090 Method and apparatus for certificate-based cookie security  
A new cookie attribute is defined for use during secure HTTP transport sessions. This attribute is referred to herein as a “certificate attribute” or “server certificate attribute,” or servcertid....
US20140304499 SYSTEMS AND METHODS FOR SSL SESSION MANAGEMENT IN A CLUSTER SYSTEM  
The present invention is directed towards systems and methods for managing one or more SSL sessions. A first node from a cluster of nodes intermediary between a client and a server may receive a...
US20090254745 EFFICIENT SECURITY FOR MASHUPS  
The present invention provides a method that facilitates secure cross domain mashups in an efficient fashion. The invention allows a first entity, the Masher, to establish at a second entity, the...
US20130311766 ESTABLISHING NETWORK SECURITY USING INTERNET PROTOCOL SECURITY POLICIES  
Techniques for configuring network security include obtaining non-packet flow information, evaluating a policy rule based on the obtained information, and proposing a security arrangement based on...
US20140281480 SYSTEMS AND METHODS FOR PROVIDING SECURE COMMUNICATION  
A client includes a security agent configured to create a client certificate that corresponds to one or more client identifiers. A server includes a server certificate and is in communication with...
US20120210122 PERSONAL ENCRYPTION DEVICE  
A method and system for securing a handheld computing device is described. A personal encryption device may be physically connected to a handheld computing device. Responsive to the connection, a...
US20150237009 Secure Network Tunnel Between A Computing Device And An Endpoint  
The present disclosure presents a system, method and apparatus herein enabling secure coupling of a computing device, such as a mobile device with an endpoint, such as an application server. The...
US20140310512 SECURE NETWORK TUNNEL BETWEEN A COMPUTING DEVICE AND AN ENDPOINT  
The present disclosure presents a system, method and apparatus herein enabling secure coupling of a computing device, such as a mobile device with an endpoint, such as an application server. The...
US20120042160 SYSTEM AND METHOD FOR COGNIZANT TRANSPORT LAYER SECURITY (CTLS)  
A method of authentication and authorization over a communications system is provided. Disclosed herein are systems and methods for creating a cryptographic evidence, called...
US20110289311 METHOD OF PERFORMANCE-AWARE SECURITY OF UNICAST COMMUNICATION IN HYBRID SATELLITE NETWORKS  
A method and apparatus utilizes Layered IPSEC (LES) protocol as an alternative to IPSEC for network-layer security including a modification to the Internet Key Exchange protocol. For...
US20140372747 SYSTEM AND METHOD FOR MANAGING TLS CONNECTIONS AMONG SEPARATE APPLICATIONS WITHIN A NETWORK OF COMPUTING SYSTEMS  
An approach for reutilizing transport layer security (TLS) connections among separate application is provided. In one aspect, a computing system establishes a a transmission control...
US20130198509 SYSTEM AND METHOD FOR INNOVATIVE MANAGEMENT OF TRANSPORT LAYER SECURITY SESSION TICKETS IN A NETWORK ENVIRONMENT  
An example method includes identifying a transport layer security (TLS) session between a client and a server, parsing one or more TLS messages to identify a session ticket associated with the...
US20140068245 SYSTEMS AND METHODS FOR HANDLING SSL SESSION NOT REUSABLE ACROSS MULTIPLE CORES  
The present invention is directed towards systems and methods for managing SSL session persistence and reuse in a multi-core system. A first core may indicate that an SSL session established by...
US20100325420 SYSTEMS AND METHODS FOR HANDLING SSL SESSION NOT REUSABLE ACROSS MULTIPLE CORES  
The present invention is directed towards systems and methods for managing SSL session persistence and reuse in a multi-core system. A first core may indicate that an SSL session established by...
US20130166904 MULTIMEDIA PRIVACY ENHANCER  
The disclosure relates to a method and a system for protecting private multimedia content which comprises a central server in communication with a client application, characterized in that a user...
US20110276797 AUTHENTICATION AND AUTHORIZATION FOR INTERNET VIDEO CLIENT  
A device is enabled to display Internet TV by accessing a management server with a secret unique ID and receiving back from the server, assuming the ID is approved, a user token and a service list...
US20110208959 METHOD AND SYSTEM FOR REDUCING PACKET OVERHEAD FOR AN LTE ARCHITECTURE WHILE SECURING TRAFFIC IN AN UNSECURED ENVIRONMENT  
A first packet is received at a network element from an E-UTRAN Node B (eNB) of an E-UTRAN access network via a secured communications tunnel of a secured connection, where the first packet...
US20100306525 EFFICIENT DISTRIBUTION OF COMPUTATION IN KEY AGREEMENT  
In Transport Layer Security (TLS) or other communication protocols, the load on the server may be lowered by reducing the number of expensive decryption operations that the server has to perform....
US20130227273 PRIVACY-PRESERVING PUBLISH-SUBSCRIBE PROTOCOL IN A DISTRIBUTED MODEL  
A method and system for providing privacy in a publish-subscribe protocol is provided. A server transmits to a client a public key. The server receives from the client a pseudonym of an interest...
US20110231650 USE AND GENERATION OF A SESSION KEY IN A SECURE SOCKET LAYER CONNECTION  
The invention describes a method and system for verifying the link between a public key and a server's identity without relying on the trustworthiness of the root certificate of the server's...
US20090313464 MIXED MODE SECURITY FOR MESH NETWORKS  
Mixed mode security is provided for a mesh network comprising a plurality of open mesh points and at least one secure mesh point that is capable of sending and receiving encrypted traffic. Aspects...
US20140281481 DLNA/DTCP STREAM CONVERSION FOR SECURE MEDIA PLAYBACK  
A process for converting a DTCP-IP transport stream into HLS format, comprising receiving an encrypted DTCP-IP transport stream comprising DTCP frames at a secondary device from a source device,...
US20100325419 SYSTEMS AND METHODS FOR ENCODING THE CORE IDENTIFIER IN THE SESSION IDENTIFIER  
The present invention is directed towards systems and methods for managing SSL session persistence and reuse in a multi-core system. A first core may indicate that an SSL session established by...
US20130227272 Dynamic Selection of Security Protocol  
Techniques described herein enable a client to store information indicating whether various hosts (e.g., servers, web domains) support a preferred security protocol, such as a False Start-modified...
US20110283101 System to Enable Detecting Attacks Within Encrypted Traffic  
A system and method for detecting network attacks within encrypted network traffic received by a protected network includes a decryption module and an adaptor module. This system and method can be...
US20120089828 SECURE TUNNEL OVER HTTPS CONNECTION  
Many secure tunnels require protocols that require special handling, authorization or security certificates, such as L2TP and PPTP. This often eliminates them for use between a corporate or agency...
US20050102498 Data storage and/or retrieval  
Embodiments of methods, devices and/or systems for data storage and/or retrieval are described.
US20150052347 FILE-BASED APPLICATION PROGRAMMING INTERFACE PROVIDING SELECTABLE SECURITY FEATURES  
A data communication security system is disclosed that includes a network interface including a first security module implementing a first security architecture, and a second security module...
US20130124851 FILE-BASED APPLICATION PROGRAMMING INTERFACE PROVIDING SELECTABLE SECURITY FEATURES  
A data communication security system is disclosed that includes a network interface including a first security module implementing a first security architecture, and a second security module...
US20110231651 STRONG SSL PROXY AUTHENTICATION WITH FORCED SSL RENEGOTIATION AGAINST A TARGET SERVER  
Embodiments are directed towards establishing an encrypted session between a client device and a target server device when the client device initiates network connections through a proxy device....
US20140122865 SYSTEMS AND METHODS FOR SPLIT PROXYING OF SSL VIA WAN APPLIANCES  
The present invention is directed towards systems and methods for split proxying Secure Socket Layer (SSL) communications via intermediaries deployed between a client and a server. The method...
US20110264905 SYSTEMS AND METHODS FOR SPLIT PROXYING OF SSL VIA WAN APPLIANCES  
The present invention is directed towards systems and methods for split proxying Secure Socket Layer (SSL) communications via intermediaries deployed between a client and a server. The method...
US20120131329 Method and System for Accessing 3rd Generation Network  
A for accessing a 3G network. includes: a terminal accessing a wireless local area network by adopting a WAPI protocol, and notifying an AAA server of a 3G network through an AP of the wireless...
US20130031356 SUPPORTING SECURE SESSIONS IN A CLOUD-BASED PROXY SERVICE  
A proxy server in a cloud-based proxy service receives a secure session request from a client device for a secure session. The secure session request is received at the proxy server as a result of...
US20130305036 TLS ABBREVIATED SESSION IDENTIFIER PROTOCOL  
A method, system and computer program product related to an authentication security protocol, which associates a unique Abbreviated Session Identifier (ASI) with some application data packets...
US20120159149 METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR DESIGNATING A SECURITY LEVEL FOR A COMMUNICATIONS LINK BETWEEN WIRELESS DEVICES  
A content issuer entity designates a transport security level for each of a plurality of electronic certificates and provides the electronic certificates to a first wireless device. A second...
US20120284506 METHODS AND APPARATUS FOR PREVENTING CRIMEWARE ATTACKS  
A central server configured to mediate communications including establishing secure online sessions between user-controlled devices and 3rd party devices, such as a 3rd party device hosting a...
US20120110320 Automatic Secure Client Access  
Providing secure network access in a networked client device. A client device is provided with a secure connection adapter. In operation, the secure connection adapter detects the network...

Matches 1 - 50 out of 335 1 2 3 4 5 6 7 >