Matches 1 - 50 out of 207 1 2 3 4 5 >


Match Document Document Title
US20100325430 GLOBALLY UNIQUE IDENTIFICATION IN COMMUNICATIONS PROTOCOLS AND DATABASES  
A globally unique identification system for a communications protocol and database is disclosed. A method for generating the globally unique identification code and for generating a compressed...
US20140122874 Deciphering Internet Protocol (IP) Security in an IP Multimedia Subsystem (IMS) using a Monitoring System  
Systems and methods for deciphering Internet Protocol (IP) security in an IP Multimedia Subsystem (IMS) using a monitoring system are described. In some embodiments, a method may include...
US20140201521 Method and Apparatus for Providing an Adaptable Security Level in an Electronic Communication  
A method of communicating in a secure communication system, comprises the steps of assembling a message at a sender, then determining a frame type, and including an indication of the frame type in...
US20130103940 METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR PERFORMING ENCAPSULATING SECURITY PAYLOAD (ESP) REHASHING  
Methods, systems, and computer readable media for accelerating stateless IPsec traffic generation by performing ESP rehashing of ESP packets are disclosed. A first ESP packet is generated by...
US20110087878 ENABLING QoS FOR MACsec PROTECTED FRAMES  
Embodiments associated with enabling Quality of Service (QoS) for MACsec protected frames are described. One example method includes identifying a security indicator in an encrypted network...
US20120151208 METHOD FOR PROCESSING SECURE PROGRAM USING KEY DISTRIBUTION PROTOCOL IN SERVER/CLIENT  
Disclosed are a server and a client processing a security program by using a real-time distribution method and method of controlling the server and the client. A method of controlling a server...
US20140236839 USER-MEDIATOR MONITORING AND CONTROLLING ACCESS TO ELECTRONIC CONTENT  
Methods, systems and apparatuses for a user-mediator controlling access to an electronic content, are disclosed. One method includes receiving, by a user-mediator server of the user-mediator, a...
US20120066494 Controlling Download and Playback of Media Content  
Systems and methods provide for controlling download and playback of media content. A system includes a client, which can play content, and a server. The server includes a permission system that...
US20150195260 System and Method for Dynamically Allocating Stream Identifiers in a Multi-Encryption Transport System  
The present invention is suitable for use in a multi-encrypted system that dynamically allocates stream identifiers in a second stream depending upon the identifiers in a first stream. The first...
US20110145572 Apparatus and method for protecting packet-switched networks from unauthorized traffic  
An apparatus and method for protecting packet-switched network links, intermediate nodes, and/or end nodes from unauthorized traffic identifies authorized traffic via a signature contained in each...
US20120096258 SERVICE SYSTEM  
A service server can: associate identification tags which identify users, with other-user identification tags, and store said identification tags; and associate the identification tags with...
US20120221853 EFFICIENT KEY HIERARCHY FOR DELIVERY OF MULTIMEDIA CONTENT  
A Digital Rights Management (DRM) system provides a lightweight layering of encryption and decryption of keys that allows efficient use of different cryptographic techniques to effect the secure...
US20140317402 METHOD OF PROCESSING PACKET IN BELOW BINARY STACK STRUCTURE  
Disclosed is a packet processing method in a below binary stack (BBS) structure. A transmission packet processing method includes receiving a packet from a network layer, reassembling a packet for...
US20080168269 E-MAIL UTILITY TO LOCK REPLY RECIPIENTS FIELD  
Methods and systems are provided for locking the reply recipients field of an e-mail to ensure that reply e-mails or forwarded e-mails include the original recipients of the e-mail. In some...
US20110252231 REKEY SCHEME ON HIGH SPEED LINKS  
In one embodiment, apparatus and methods for a rekey process are disclosed. In certain rekey embodiments, when a key-generation protocol exchange is executed, instead of generating a single new...
US20050144441 Presence validation to assist in protecting against Denial of Service (DOS) attacks  
In order to prevent, or at least reduce, attacks on a computing device, such as denial of service attacks against a computer, or other attempts to compromise computing device security, when...
US20130061044 SYSTEM AND METHOD FOR INDEPENDENT CONTROL OF FOR-HIRE VEHICLES  
A computer system storing parameters pertaining to the regulatory restrictions placed on a for-hire vehicle compares the parameters to a current operating environment of the for-hire vehicle. In...
US20110161664 MEANS OF MITIGATING DENIAL OF SERVICE ATTACKS ON IP FRAGMENTATION IN HIGH PERFORMANCE IPSEC GATEWAYS  
Embodiments of the invention reduce the probability of success of a DOS attack on a node receiving packets by decreasing the probability of random collisions of packets sent by a malicious user...
US20070130475 Method of embedding information in internet transmissions  
A method is provided for passing control messages and other information through a SIP network by embedding the information in SIP messages. The information is sent from one SIP agent to another by...
US20110258436 System and Method for Providing Searchable Data Transport Stream Encryption  
A packetized transport stream for protecting viewing content from unauthorized access and methods for manufacturing and using same. The transport stream includes a plurality of content frames,...
US20090144543 SECRET SHARING DEVICE, METHOD, AND PROGRAM  
A secret sharing device of (k, n) threshold scheme creates a generator matrix G, first divided secret data, and random number data, calculates shared partial data based on the product of matrices...
US20050283604 Security association configuration in virtual private networks  
A solution is provided which eliminates the limitation of a single rule for multiple security associations by providing granularity in the configuration of selector fields for better control of...
US20110055558 GALOIS/COUNTER MODE ENCRYPTION IN A WIRELESS NETWORK  
A system includes a temporal key module, a nonce module, and a security module. The temporal key module is configured to generate a first temporal key. The first temporal key is to be used to...
US20120060029 METHOD AND SYSTEM FOR DYNAMIC SECURED GROUP COMMUNICATION  
A system and method directed to carrying out dynamic secured group communication is provided. The method includes: obtaining a first packet that includes a first header; forming a frame that...
US20080141028 Secure single sign-on authentication between WSRP consumers and producers  
One embodiment of the present invention provides a system that facilitates secure single sign-on (SSO) authentication for web-services communications. During operation, the system receives a Web...
US20090295537 VEHICLE TRANSFER PROCESS  
A method of tracking a vehicle during a transfer process that includes one or more stages. The method involves utilising a tag having a tag data store, and uses a tag reader to determine an...
US20120324219 Method and System for Resolving a Naming Conflict  
A method and a system for naming-conflict-free integration of software components originating from software component manufacturers (OEM), comprising software development devices from different...
US20130191628 Media Path Monitoring Over a Secure Network  
Techniques are provided for obtaining header information from a packet configured for real-time communications transport over a network. The header information is used to monitor network...
US20090094454 SYSTEMS FOR PROTECTING SUBSCRIBER IDENTIFICATION BETWEEN SERVICE AND CONTENT PROVIDERS  
A method and systems for protecting the identification of a subscriber when a service provider transmits a subscriber request to a content provider in a distributed network environment, such as...
US20090055643 SYSTEM AND METHOD FOR DISPLAYING A SECURITY ENCODING INDICATOR ASSOCIATED WITH A MESSAGE ATTACHMENT  
An apparatus and method of displaying a message on a display of a computing device. The message comprises at least a first attachment. At least a portion of the message is displayed to a user. The...
US20080229099 METHOD FOR GENERATING STANDARD FILE BASED ON STEGANOGRAPHY TECHNOLOGY AND APPARATUS AND METHOD FOR VALIDATING INTEGRITY OF METADATA IN THE STANDARD FILE  
An apparatus for validating integrity of metadata in a standard file includes: a metadata acquiring unit for acquiring metadata from a protected file; an integrity evidence value acquiring unit...
US20090089576 TECHNIQUES FOR COMMUNICATING INFORMATION OVER MANAGEMENT CHANNELS  
Techniques for communicating information over management channels are described. An apparatus may comprise a classifier module operative to classify management information for a wireless...
US20050038992 Method for sending multiple ephemeral terminations in a single service change message  
The present invention provides a method for taking multiple ephemeral terminations out of service or restored into service utilizing a single service change command. A group of termination IDs is...
US20100174901 IMPLEMENTING IEEE 802.1AE AND 802.1af SECURITY IN EPON (1GEPON AND 10GEPON) NETWORKS  
A method and system is provided for securing communication on an EPON. Particularly different types of encrypted messages, each with a respective short MAC SegTAG, may be sent from the OLT to an...
US20140337620 System and Method for Local Generation of Streaming Content with a Hint Track  
Embodiments of a system and method for local generation of streaming content with a hint track are described. Embodiments may include receiving a first version of encrypted content comprising...
US20140040612 SYSTEM AND METHOD FOR LOCAL GENERATION OF STREAMING CONTENT WITH A HINT TRACK  
Embodiments of a system and method for local generation of streaming content with a hint track are described. Embodiments may include receiving a first version of encrypted content comprising...
US20060282665 MPEG-4 ENCRYPTION ENABLING TRANSCODING WITHOUT DECRYPTION  
A method and system for encrypting a video compressed with MPEG-4 FGS compression with minimal overhead is provided. The encryption system encrypts the video into independently encrypted segments...
US20110314274 METHOD AND APPARATUS FOR SECURITY ENCAPSULATING IP DATAGRAMS  
A method and corresponding apparatus are provided to security encapsulate an original IP datagram received from a network. It is first determined whether an IP payload of the original IP datagram...
US20050177718 Systems and methods for video transport service  
The invention relates to systems and methods for traversing a firewall with real-time audio, video or data communication over a packet-based network. The video transport service solution of the...
US20090172394 Assigning nonces for security keys  
Secure communications may be implemented by transmitting packet data units with information sufficient to enable a receiving entity to reconstruct a nonce. That is, rather than transmitting all of...
US20130227278 GENERATION OF RELATIVE PRIME NUMBERS FOR USE IN CRYPTOGRAPHY  
The disclosed technology generates two relative prime numbers and, then, using the relative prime numbers converts a super-increasing (SI) knapsack into a non-super increasing (NSI) knapsack. The...
US20130179682 GENERATION OF RELATIVE PRIME NUMBERS FOR USE IN CRYPTOGRAPHY  
The disclosed technology generates two relative prime numbers and, then, using the relative prime numbers converts a super-increasing (SI) knapsack into a non-super-increasing (NSI) knapsack. The...
US20130061045 Systems and Methods for Playing Back Alternative Streams of Protected Content Protected Using Common Cryptographic Information  
Systems and methods for performing adaptive bitrate streaming using alternative streams of protected content in accordance with embodiments of the invention are described. One embodiment of the...
US20050050362 Content inspection in secure networks  
A secure access system is used to connect an internal network, such as a private LAN, to an external network, such as the Internet. The system is provided with internal and external gateways, for...
US20090089577 MAC FRAME PROVISION METHOD AND APPARATUS CAPABLE OF ESTABLISHING SECURITY IN IEEE 802.15.4 NETWORK  
A medium access control (MAC) frame provision method establishes security in an IEEE 802.15.4 network. A MAC frame is generated, which includes a MAC header, a payload field, and a frame check...
US20050157688 Compatibility between various w-lan standards  
A method of performing selective filtering, a network comprising a station, an AP and a PAC, whereby synchronisation between the AP and the PAC is performed in order to allow filtering of messages...
US20110119487 System and method for encryption rekeying  
Disclosed is a system and method for maintaining a secure, encrypted networking session across a communications network by dynamically replacing encryption keys during the networking session and...
US20060174108 Deciphering encapsulated and enciphered UDP datagrams  
Deciphering and verification of the checksum of enciphered and encapsulated UDP datagrams, particularly those which enclose a tunnelling protocol such as L2TP, are achieved by the provision of a...
US20080052511 Network cryptography system and method  
A system for and method of providing encrypted network communications is presented. The system and method involve creating encrypted frames used for secure communications between cooperating peers...
US20080072033 Re-encrypting policy enforcement point  
Providing end-to-end security poses many challenges to security solutions. In Internet Security (IPsec), securing data locally and remotely, as well as reducing the number of security associations...

Matches 1 - 50 out of 207 1 2 3 4 5 >