Matches 1 - 50 out of 227 1 2 3 4 5 >


Match Document Document Title
US20060220875 Apparatus for and method of using an intelligent network and RFID signal router  
Apparatuses, systems for, and methods of transporting digital signals and radio-frequency (“RF”) signals are disclosed. In accordance with a preferred embodiment of the invention, an intelligent...
US20060220873 Apparatus for and method of using an intelligent network and RFID signal router  
Apparatuses, systems for, and methods of transporting digital signals and radio-frequency (“RF”) signals are disclosed. In accordance with a preferred embodiment of the invention, an intelligent...
US20060220874 Apparatus for and method of using an intelligent network and RFID signal router  
Apparatuses, systems for, and methods of transporting digital signals and radio-frequency (“RF”) signals are disclosed. In accordance with a preferred embodiment of the invention, an intelligent...
US20120004960 METHOD AND SYSTEM FOR EFFICIENT STREAMING VIDEO DYNAMIC RATE ADAPTATION  
A streaming media system employs dynamic rate adaptation. The method includes a file format compatible with legacy HTTP infrastructure to deliver media over a persistent connection. The method...
US20110185169 Agile Network Protocol For Secure Communications With Assured System Availability.  
A plurality of computer nodes communicate using seemingly random Internet Protocol source and destination addresses. Data packets matching criteria defined by a moving window of valid addresses...
US20160182457 PROVIDING SECURE COMMUNICATION AND/OR SHARING OF PERSONAL DATA VIA A BROADBAND GATEWAY  
A broadband gateway may manage confidential data associated with users in a home network managed and/or serviced by the broadband gateway. The broadband gateway may store the user confidential...
US20050210236 Digital rights management structure, portable storage device, and contents management method using the portable storage device  
A digital rights management (DRM) structure, a portable storage device, and a contents management method using the portable storage device are provided to facilitate the move of a rights object or...
US20140149733 SYSTEM FOR ENCRYPTING CONTENT NAME  
A system encrypts a name of content stored in a node of a hierarchical structure. A content receiving node encrypts a name of a predetermined node among names of nodes included in a content name,...
US20130191630 Auditing and controlling encrypted communications  
Use of one or more computer systems may be audited by performing a man-in-the-middle attack against a cryptographic protocol (e.g., SSH) at one or more interceptors, transmitting audit data to a...
US20100058052 METHODS, SYSTEMS AND DEVICES FOR SECURING SUPERVISORY CONTROL AND DATA ACQUISITION (SCADA) COMMUNICATIONS  
A secure supervisory control and data acquisition (SCADA) system includes a SCADA control host system and any number of remote terminal unit (RTU) systems. Each RTU system includes an RTU...
US20090119185 SYSTEM OF COLLABORATIVE COMPUTING RESOURCES FOR FULFILLMENT OF DIGITAL IMAGE PROCESSING  
System of collaborative computing resources for fulfillment of digital image processing is disclosed. Embodiments of the present disclosure include a system comprising a network of computing...
US20110231654 METHOD, SYSTEM AND APPARATUS PROVIDING SECURE INFRASTRUCTURE  
Methods and apparatus for automatically providing secure network infrastructure over non-secure network infrastructure such as by automatically generating IPSec tunnels through non-secure...
US20090276619 PARALLEL DISTRIBUTION AND FINGERPRINTING OF DIGITAL CONTENT  
Distributing information, including the steps of watermarking the digital content, distributing the digital content using a multi-source system, and partially fingerprinting digital content at...
US20090094453 Interoperable systems and methods for peer-to-peer service orchestration  
Systems and methods are described for performing policy-managed, peer-to-peer service orchestration in a manner that supports the formation of self-organizing service networks that enable rich...
US20170048232 SECURE ELEMENT AUTHENTICATION  
Secure element authentication techniques are described. In implementations, a confirmation is received that an identity of a user has been physically verified using one or more physical documents....
US20110238980 SYSTEM AND METHODS FOR REMOTE MAINTENANCE IN AN ELECTRONIC NETWORK WITH MULTIPLE CLIENTS  
A method for verifying electronic software code integrity may comprise providing a list of encryption keys to a client, encrypting a software code packet using one of the plurality of encryption...
US20100161963 TRUSTED AND SECURE TECHNIQUES FOR ITEM DELIVERY AND EXECUTION  
Documents and other items can be delivered electronically from sender to recipient with a level of trustedness approaching or exceeding that provided by a personal document courier. A trusted...
US20070094491 Systems and methods for dynamically learning network environments to achieve adaptive security  
Systems and methods for dynamically learning network environments to achieve adaptive security are described. One described method for setting an adaptive threshold for a node includes: monitoring...
US20100333116 CLOUD GATEWAY SYSTEM FOR MANAGING DATA STORAGE TO CLOUD STORAGE SITES  
Systems and methods are disclosed for performing data storage operations, including content-indexing, containerized deduplication, and policy-driven storage, within a cloud environment. The...
US20070271453 Identity based flow control of IP traffic  
Authentication information of a first node is received which are used for verification of remote nodes' authentication attempts, and a token is received from at least one remote node....
US20120159151 Evolved Packet System Non Access Stratum Deciphering Using Real-Time LTE Monitoring  
A monitoring system is coupled to interfaces in an LTE network and passively captures packets from the network interfaces. First data packets associated with an authentication and key agreement...
US20120131330 System and Method for Processing Secure Transmissions  
Secured transmissions between a client and a server are detected, a policy formulated whether encrypted material needs to be decrypted, and if content is to be decrypted it is, using decrypting...
US20110307693 Agile Network Protocol For Secure Communications With Assured System Availability  
A plurality of computer nodes communicates using seemingly random IP source and destination addresses and (optionally) a seemingly random discriminator field. Data packets matching criteria...
US20090193248 Processing Multiple Wireless Communications Security Policies  
A computer program product for processing wireless data packets allows for processing packets to consolidate security processing. Security processing is performed in accordance with multiple...
US20070118731 Encrypting File System  
A method of decrypting documents is disclosed. A plurality of document may be stored on a file server. A client computer is connected to the file server by a network. A first table contains the...
US20050216731 Content distribution apparatus, content receiving apparatus, and content distribution method  
A content distribution apparatus for implementing copy protection when distributing digital content as a real-time stream on the Internet is provided. This apparatus encrypts content and...
US20120137358 POINT-TO-MULTI-POINT/NON-BROADCASTING MULTI-ACCESS VPN TUNNELS  
A system establishes a virtual private network (VPN) tunnel to a destination and determines a next hop for the VPN tunnel. The system inserts the next hop, and an address associated with the...
US20110302408 Secure Communication Systems, Methods, and Devices  
In par, the invention relates to a secure communication system. The system includes a voice call processing server; a user database in communication with the server; and a security gateway in...
US20090216592 System And Method For Identifying Network Click  
The present invention discloses a system for identifying a network click. The system includes: a parsing server, adapted to provide, after a page is impressed, impression information of the...
US20170180117 ONE-TIME PAD COMMUNICATIONS NETWORK  
A system and method for providing secure and anonymous communication between a plurality of individuals relying on the cryptographic method of the one-time pad (OTP) is described. Unique, randomly...
US20150334094 DISTRIBUTED COMPUTING SERVICE PLATFORM FOR MOBILE NETWORK TRAFFIC  
Described herein are systems, methods, and apparatus for processing network packet data in a distributed computing platform, such as a content delivery network, to provide services to mobile...
US20070101122 Method and apparatus for securely generating application session keys  
An approach is provided for securely generating application session keys within a secure module of a user terminal. The secure module includes a secure memory and a secure processor configured to...
US20060143439 Method and system for sensor data management  
Methods and systems for real-time management of sensor data, based on application level logic made available at the edge of the enterprise are disclosed. According to an embodiment of the...
US20050216727 Communication stack for network communication and routing  
A communication stack enables computers implementing it to send, receive, or route network communications. The communication stack includes a message layer, a communication layer, a security...
US20090119504 INTERCEPTING AND SPLIT-TERMINATING AUTHENTICATED COMMUNICATION CONNECTIONS  
Systems and methods are provided for enabling optimization of communications within a networked computing environment requiring secure, authenticated client-server communication connections....
US20070248232 CRYPTOGRAPHIC KEY SHARING METHOD  
A system for sharing secure keying information with a new device not of a secure wireless network. The keying information may be used for encryption and provided to the new device in a manner...
US20060248337 Establishment of a secure communication  
There is proposed a mechanism for establishing a secure communication between network elements in a communication network. The network nodes execute an authentication procedure with an...
US20100332629 SECURE CUSTOM APPLICATION CLOUD COMPUTING ARCHITECTURE  
A secure custom application cloud computing architecture which facilitates virtually seamless migration of custom applications to and from a cloud computing environment in response to user needs....
US20080301433 Secure Communications  
The subject matter of this specification can be embodied in, among other things, an apparatus that includes a verification module to provide information used to identify a user of the apparatus, a...
US20080072035 Securing multicast data  
Systems and methods for securing multicast data are described. Data of a multicast, is protected through the use of at least double encryption keys, such as a community-of-interest key and session...
US20060294363 System and method for tunnel management over a 3G-WLAN interworking system  
Method and system for facilitating tunnel management in the 3G-WLAN interworking systems providing dynamic configuration of maximum number of IP Security Protocol (IPsec) tunnels allowed per...
US20140359275 Method And Apparatus Securing Traffic Over MPLS Networks  
Multi-protocol label switching (MPLS) data is typically sent non-encrypted over MPLS-based networks. If encryption is applied to MPLS data frames and MPLS labels are encrypted, each node receiving...
US20110055552 PRIVATE, ACCOUNTABLE, AND PERSONALIZED INFORMATION DELIVERY IN A NETWORKED SYSTEM  
A client receives a notification of a user interaction with an information item and creates a record describing this interaction. The client encrypts the record using an encryption key associated...
US20160277933 Secure Data Communication system between IoT smart devices and a Network gateway under Internet of Thing environment  
It is secure to send/receive data with encrypted in IoT circumstance. This invention disclosure describes protocols that guarantees a secure communication and even, secure decoding even inside a...
US20160269440 SYSTEM AND METHOD FOR MANAGING EMAIL AND EMAIL SECURITY  
A recipient-centric gateway sits at the corporate network perimeter, retaining all outgoing e-mail, organizing the e-mail by recipient so that senders or other designated individuals can view the...
US20090292914 NODES AND SYSTEMS AND METHODS FOR DISTRIBUTING GROUP KEY CONTROL MESSAGE  
Nodes, systems and methods for distributing a group key control message are disclosed. The system mainly includes a root node and child nodes. The apparatus includes a distribution tree...
US20050228984 Web service gateway filtering  
A firewall device implements policies for a destination web service, where the policies determine the access rights of clients and other web services to services that are available at the...
US20110258434 ONLINE SECURE DEVICE PROVISIONING WITH UPDATED OFFLINE IDENTITY DATA GENERATION AND OFFLINE DEVICE BINDING  
A system for generating new identity data for network-enabled devices includes a whitelist reader configured to extract attributes from a whitelist. The whitelist includes, for each device...
US20110022835 Secure Communication Using Asymmetric Cryptography and Light-Weight Certificates  
Encrypted communications between servers and client devices over an unsecured channel, such as the Internet, without using a public key infrastructure are disclosed. Messages to a client device...
US20100125730 BLOCK-LEVEL DATA STORAGE SECURITY SYSTEM  
A secure storage appliance is disclosed, along with methods of storing and reading data in a secure storage network. The secure storage appliance is configured to present to a client a virtual...

Matches 1 - 50 out of 227 1 2 3 4 5 >