Match
|
Document |
Document Title |
|
US20090265543 |
Home Node B System Architecture with Support for RANAP User Adaptation Protocol
Some embodiments are implemented in a communication system that includes a first communication system comprised of a licensed wireless radio access network and a core network, and a second... |
|
US20090287920 |
METHOD FOR ESTABLISHING BI-DIRECTIONAL MESSAGING COMMUNICATIONS WITH WIRELESS DEVICES AND WITH REMOTE LOCATIONS OVER A NETWORK
A method, server, device and computer readable medium for establishing a bi-directional communication session between a first device and a server is provided. During the method, a first transport... |
|
US20090265542 |
Home Node B System Architecture
Some embodiments provide methods and systems for integrating a first communication system with a core network of a second communication system that has a licensed wireless radio access network.... |
|
US20140223169 |
TCP/IP-BASED COMMUNICATION SYSTEM AND ASSOCIATED METHODOLOGY PROVIDING AN ENHANCED TRANSPORT LAYER PROTOCOL
A more secure TCP/IP protocol stack is provided having an enhanced transport layer. Encryption and decryption logic is arranged on the transmission side and on the reception side for processing a... |
|
US20090132808 |
SYSTEM AND METHOD OF PERFORMING ELECTRONIC TRANSACTIONS
A system and method of performing electronic transactions between a server computer and a client computer. The method implements a communication protocol with encrypted data transmission and... |
|
US20090193248 |
Processing Multiple Wireless Communications Security Policies
A computer program product for processing wireless data packets allows for processing packets to consolidate security processing. Security processing is performed in accordance with multiple... |
|
US20100122078 |
SYSTEMS AND METHODS FOR CREATING A CODE INSPECTION SYSTEM
A code inspection system produces a dynamic decoy machine that closely parallels one or more protected systems. The code inspection system can analyze and monitor one or more protected systems,... |
|
US20070113070 |
SECURE ACTIVE SUSPENSION SYSTEM
Among other things, an active suspension system for a vehicle includes a first component, and a second component in communication with the first component using a network. The first component is... |
|
US20150350247 |
EFFICIENT SECURE INSTANT MESSAGING
A method and apparatus of a device that enables a user to participate in a secure instant messaging session by starting with a low security connection before switching to a high security... |
|
US20050141706 |
System and method for secure ad hoc mobile communications and applications
A mobile agent system bridges applications and communications with next generation wireless and mobile ad hoc network infrastructures. A method utilizing middleware turns traditional applications... |
|
US20170142100 |
SECURE DISTRIBUTION OF SESSION CREDENTIALS FROM CLIENT-SIDE TO SERVER-SIDE TRAFFIC MANAGEMENT DEVICES
A traffic management device (TMD), system, and processor-readable storage medium are directed to securely transferring session credentials from a client-side traffic management device (TMD) to a... |
|
US20050216727 |
Communication stack for network communication and routing
A communication stack enables computers implementing it to send, receive, or route network communications. The communication stack includes a message layer, a communication layer, a security... |
|
US20130227273 |
PRIVACY-PRESERVING PUBLISH-SUBSCRIBE PROTOCOL IN A DISTRIBUTED MODEL
A method and system for providing privacy in a publish-subscribe protocol is provided. A server transmits to a client a public key. The server receives from the client a pseudonym of an interest... |
|
US20100211506 |
MOBILE TRANSACTION SYSTEM AND METHOD
A mobile transaction system and method are carried out by a plurality of remote trading servers, a mobile barcode trading device and a data transmission server. The remote trading server generates... |
|
US20090129597 |
REMOTE PROVISIONING UTILIZING DEVICE IDENTIFIER
Embodiments of the present invention provide for remote provisioning using a device identifier. In some embodiments, a client device may transmit the device identifier to a provisioning server... |
|
US20070101121 |
Secure IP access protocol framework and supporting network architecture
A protocol framework for a Secure IP Access (SIA) method, and supporting components deployed on IP hosts and IP networks. Using this method, an IP host can establish a secure data channel within... |
|
US20110231650 |
USE AND GENERATION OF A SESSION KEY IN A SECURE SOCKET LAYER CONNECTION
The invention describes a method and system for verifying the link between a public key and a server's identity without relying on the trustworthiness of the root certificate of the server's... |
|
US20060174103 |
System and method for integrating PKI and XML-based security mechanisms in SyncML
Additions of extensions to SyncML protocol to incorporate PKI-based and XML-based security mechanisms. The present invention involves the partial incorporation of the PKI based mechanisms present... |
|
US20150082021 |
MOBILE PROXY FOR WEBRTC INTEROPERABILITY
An example method and system for a mobile proxy for WebRTC interoperability is discussed. The method may include receiving a DTLS security handshake from a WebRTC API of a browser endpoint,... |
|
US20130061039 |
METHOD AND SYSTEM FOR SECURING DATA UTILIZING RECONFIGURABLE LOGIC
A method, an article of manufacture, and a process are provided for securing data sets by dynamically hopping amongst a variety of data encryption and/or manipulation protocols. Such dynamic... |
|
US20130042100 |
METHOD AND APPARATUS FOR FORCED PLAYBACK IN HTTP STREAMING
Systems and methods for enforcing playback of a specific portion of the content in an open non-certified media player/renderer are provided. In accordance with such systems and methods, a key is... |
|
US20070074047 |
Key rotation
A system and method for a mechanism is provided for automatically selecting a new encryption key for re-encrypting data in a target database. New initialization vectors may be specified for... |
|
US20050177713 |
Multi-protocol network encryption system
An encryption management system for a network. The system connects between a protected network and an unprotected network, and manages both encryption and decryption of a payload to be sent... |
|
US20090013174 |
METHODS AND SYSTEMS FOR HANDLING DIGITAL RIGHTS MANAGEMENT
Systems and methods according to the present invention address this need and others by providing methods and systems for translating media encrypted by various Digital Rights Management (DRM)... |
|
US20050108518 |
Runtime adaptable security processor
A runtime adaptable security processor is disclosed. The processor architecture provides capabilities to transport and process Internet Protocol (IP) packets from Layer 2 through transport... |
|
US20100318784 |
CLIENT IDENTIFICATION FOR TRANSPORTATION LAYER SECURITY SESSIONS
Systems, methods, and other embodiments associated with client identification for transportation layer security sessions are described. One example method includes monitoring a first... |
|
US20100281250 |
AUTHENTICATION AND ENCRYPTION METHOD AND APPARATUS FOR A WIRELESS LOCAL ACCESS NETWORK
This invention pertains to the field of Wireless Local Area Network (WLAN). This invention allows a secure connection of a user client station to a base unit. The secure connection comprises the... |
|
US20060224883 |
Programming interface for configuring network services in a server
A programming interface for Secure Socket Layer (SSL) abstracts manipulation, e.g., configuration and management, of SSL tables based upon an SSL implementation model. The SSL tables can be... |
|
US20050050316 |
Passive SSL decryption
A method and apparatus for passive probing of forwarded TCP communication sessions between a client and a server. This includes receiving forwarded data packets corresponding to the TCP... |
|
US20120284506 |
METHODS AND APPARATUS FOR PREVENTING CRIMEWARE ATTACKS
A central server configured to mediate communications including establishing secure online sessions between user-controlled devices and 3rd party devices, such as a 3rd party device hosting a... |
|
US20110119534 |
METHOD AND APPARATUS FOR PROCESSING PACKETS
A method and apparatus for processing packets are provided to extend the usage of a Cryptographically Generated Addresses (CGA) protocol. The method includes: receiving an Internet Protocol... |
|
US20060259759 |
Method and apparatus for securely extending a protected network through secure intermediation of AAA information
A method of securely extending a protected network through secure relay of AAA information, when an isolated device lacks Layer 3 connectivity to an AAA infrastructure of the protected network,... |
|
US20090113203 |
Network System
An encryption communication module on the side of a service providing server reports a global IP address allocated to an NAPT router on the service providing server side and a port number of an... |
|
US20050210243 |
System and method for improving client response times using an integrated security and packet optimization framework
A system and method for providing integrated secured and optimized packet messaging is described. A plurality of request packets staged in a packet queue from a requesting client and specifying... |
|
US20150373048 |
Enterprise Mobile Notification Solution
The present invention provides mobile clients that can be easily distributed using any third party MDM (Mobile Device Management) solutions, or mobile app stores. Two operational modes provide... |
|
US20050289337 |
Electronic mail server device and electronic mail processing method
An advantage of the present invention is to prevent a load from being placed on a terminal during a processing at transmission or reception of data and to secure safety in communication. An... |
|
US20050060534 |
Using a random host to tunnel to a remote application
A method for establishing communications between monitoring software located on a monitoring server is disclosed. A remote server includes an SSH server application and a remote application to be... |
|
US20130219166 |
HARDWARE BASED IDENTITY MANAGER
A method for providing authentication credentials to a server over a communications network includes initiating communication with a server over a communications network. The communication is to... |
|
US20060149962 |
Network attached encryption
A method and apparatus are provided for managing cryptographic keys and performing cryptographic services within server or other computing environments. An appliance functions as a cryptographic... |
|
US20070136606 |
Storage system with built-in encryption function
In a plurality of storage systems including data encryption functions, there is a possibility that encryption keys necessary for data encryption and decryption may differ among the storage... |
|
US20160006762 |
METHOD FOR CREATING A PROFILE IN A SECURITY DOMAIN OF A SECURED ELEMENT
Disclosed is a method for creating a profile in a target security domain of a secure element. In various implementations, the method includes a reception operation by said target security domain,... |
|
US20090044006 |
SYSTEM FOR BLOCKING SPAM MAIL AND METHOD OF THE SAME
The present invention generally relates to a system for blocking spam mail and a method of the same, and the system in accordance with the present invention, comprising: a Mail transceiver... |
|
US20060253698 |
Method, system and entities for exchanging content
A method for exchanging content between a server entity (UA-I) and a client entity (UA-II). The method includes establishing a session between the server entity and the client entity based on a... |
|
US20160261632 |
Methods and Arrangements for Cloud Caching
In a method in a primary network node for providing a web-service to clients, performing the steps of verifying (S1) a TCP session with a client node and generating TLS keys for said session.... |
|
US20070107050 |
Simple two-factor authentication
Internet Security is increasingly of concern as more and more cases of identity theft of online data is reported. Simple login and password authentication for access to sensitive websites like... |
|
US20080126795 |
METHOD, SYSTEM, AND APPARATUS FOR TRANSMITTING SYSLOG PROTOCOL MESSAGES
The present invention provides a method, a system and an apparatus for transmitting SYSLOG messages. The method includes: transmitting a secure transmission upgrade indication from a SYSLOG... |
|
US20090271612 |
METHOD, SYSTEM AND DEVICE FOR REALIZING MULTI-PARTY COMMUNICATION SECURITY
A method for realizing multi-party communication security includes: performing identification authentication and negotiating to create an initiation session through running the transport layer... |
|
US20060095767 |
Method for negotiating multiple security associations in advance for usage in future secure communication
The present invention describes a novel security model in which security context is pre-negotiated and is used at future instances to secure messaging between nodes involved in sending and... |
|
US20160050568 |
MACHINE-TO-MACHINE CELLULAR COMMUNICATION SECURITY
Communication between a mobile terminal operating in a cellular network and a server is provided. Communication between the mobile terminal and the server is routed through a Serving GPRS Support... |
|
US20070011448 |
Using non 5-tuple information with IPSec
A method of communicating using IPSec security protocol. Security associations are provided for a connection based on session information that may include user information and/or information... |