Matches 1 - 50 out of 92 1 2 >


Match Document Document Title
US20090028337 Method and Apparatus for Providing Security in a Radio Frequency Identification System  
A method and apparatus involve storing in a tag a selected digital certificate that permits secure access to said tag from externally thereof.
US20160173450 Systems And Methods For Automatic Device Detection, Device Management, And Remote Assistance  
In some embodiments, a network regulator device protects a local network of client systems (e.g. Internet-of-things devices such as smartphones, home appliances, wearables, etc.) against computer...
US20070209070 Integrated network intrusion detection  
Intrusion preludes may be detected (including detection using fabricated responses to blocked network requests), and particular sources of network communications may be singled out for greater...
US20060085850 System and methods for providing network quarantine using IPsec  
A system and method for ensuring that machines having invalid or corrupt states are restricted from accessing host resources are provided. A quarantine agent (QA) located on a client machine...
US20090044266 SYSTEM AND METHOD FOR PROVIDING TRANSACTIONAL SECURITY FOR AN END-USER DEVICE  
A network system comprises a transaction network operative to provide a transaction with an end user; a trusted source of a security mechanism (e.g., a start/stop trigger module, an application...
US20080295164 MASHUP COMPONENT ISOLATION VIA SERVER-SIDE ANALYSIS AND INSTRUMENTATION  
A method, system, and computer program storage device are disclosed for providing security in a mashup comprised of an agglomeration of a plurality of portlets. These portlets are sent from one or...
US20120240216 Method for Lawfully Intercepting Communication IP Packets Exchanged Between Terminals  
A method for lawfully intercepting communication IP packets exchanged between terminals is provided. The method involves assigning an IP address associated with a telecommunication service...
US20070094722 Detecting networks attacks  
Described is a technique for detecting attacks on a data communications network having a plurality of addresses for assignment to data processing systems in the network. The technique involves...
US20080028458 CLIENT SERVER DISTRIBUTED SYSTEM, CLIENT APPARATUS, SERVER APPARATUS, AND MUTUAL AUTHENTICATION METHOD USED THEREIN  
In a client-server distributed system including an SIP-protocol-coping server apparatus and an SIP-protocol-coping client apparatus, client authentication of the SIP-protocol-coping client...
US20050229245 Inter-device authentication system, inter-device authentication method, communication device, and computer program  
Providing a function of isolating a home network from an external network for a router or a gateway, which are interposed between the home network and the external network, so as to isolate or...
US20070022475 Transmission of packet data over a network with a security protocol  
A method, device, system and computer program for providing a transport distribution scheme for a security protocol are disclosed. A first packet data connection is established to a remote node...
US20080010677 Apparatus, method and computer program product providing improved sequence number handling in networks  
The exemplary embodiments of the invention provide apparatus, methods and computer program products that enable improved sequence number handling in networks, such as an evolved universal...
US20070157307 Secure communication control technique  
This invention is to improve security in a network. A communication control method for controlling communications in a network including a plurality of secure network devices having one or more...
US20070006295 Adaptive IPsec processing in mobile-enhanced virtual private networks  
Disclosed is a method providing secure mobility for a terminal in a mobile system comprising at least two IP based sub-networks. The method comprises to detect a change of the IP based sub-network...
US20080301433 Secure Communications  
The subject matter of this specification can be embodied in, among other things, an apparatus that includes a verification module to provide information used to identify a user of the apparatus, a...
US20080052770 METHOD AND SYSTEM OF PROVIDING SECURITY SERVICES USING A SECURE DEVICE  
A secure portable electronic device for providing secure services when used in conjunction with a host computer. The secure portable device includes a read-only memory partition, a read/write...
US20070186281 Securing network traffic using distributed key generation and dissemination over secure tunnels  
A technique for securing message traffic in a data network using a protocol such as IPsec, and more particularly various methods for distributing security keys where key generation, key...
US20060282893 Network information security zone joint defense system  
A network information security zone joint defense system is provided, which monitors a network connection status through a network defense appliance. Once the network defense appliance detects a...
US20060070122 Method and apparatus for a distributed firewall  
A method and apparatus for implementing a distributed firewall is described. A packet filter processor receives a packet sent from a first device to a second device. The packet filter processor...
US20100017870 MULTI-AGENT, DISTRIBUTED, PRIVACY-PRESERVING DATA MANAGEMENT AND DATA MINING TECHNIQUES TO DETECT CROSS-DOMAIN NETWORK ATTACKS  
The present invention is a method and a system that uses privacy-preserving distributed data stream mining algorithms for mining continuously generated data from different network sensors used to...
US20090328189 SECURE WIRELESS COMMUNICATION INITIALIZATION SYSTEM AND METHOD  
A wireless communication system for use with a vehicle is disclosed. The communication system comprises a portable wireless device comprising a first manual interface device, the portable wireless...
US20080072309 NETWORK SECURITY AND APPLICATIONS TO THE FABRIC ENVIRONMENT  
A method and apparatus for securing networks, focusing on application in Fibre Channel networks. A combination of unique security techniques are combined to provide overall network security....
US20070074282 Distributed SSL processing  
Methods and systems for communicating data between a server and a remote client computer through a secure socket layer (“SSL”). In accordance with the present invention, server-side SSL functions...
US20070028291 Parametric content control in a network security system  
A security system provides a defense from known and unknown viruses, worms, spyware, hackers, and social engineering attacks. The system can implement centralized policies that allow an...
US20160014149 Network Security System and Method  
The invention provides a network security method and system for use in a communications network, said network comprising a plurality of devices adapted to communicate over the network, at least...
US20100071054 NETWORK SECURITY APPLIANCE  
Systems and methods for combating and thwarting attacks by cybercriminals are provided. Network security appliances interposed between computer systems and public networks, such as the Internet,...
US20090138960 Control access rule conflict detection  
Methods and systems for access control systems such as firewalls. The system detects conflicts between two access control rules by finding all common variables between the two rules and...
US20090064311 SECURE WEB INTERACTIONS USING A DESKTOP AGENT  
An application server enables a secure network interaction. The application server receives a request for the secure network interaction from a third-party server. In response, the application...
US20070127444 METHOD OF MANAGING INTERWORKING BETWEEN AT LEAST ONE WIRELESS LOCAL AREA NETWORK AND ONE MOBILE NETWORK, CORRESPONDING MOBILE STATION, SGSN NODE AND TTG GATEWAY  
The invention concerns a method of management of interworking between at least one wireless local area network and one mobile network comprising the following steps: in the case of a first...
US20150365379 SYSTEM AND METHOD FOR MANAGING, CONTROLLING AND CONFIGURING AN INTELLIGENT PARENTAL CONTROL FILTER  
A system and a method for intelligently learning a list of allowed IP content at one or more internet connected devices by implementing an intelligent parental control means is provided. The means...
US20110239291 Detecting and Thwarting Browser-Based Network Intrusion Attacks For Intellectual Property Misappropriation System and Method  
Detecting and thwarting browser-based network intrusion attacks for intellectual property misappropriation is provided by enabling a local machine to direct retrieval of resources using uniform...
US20110154476 SYSTEM AND METHOD FOR COLLECTING AND VALIDATING INTELLECTUAL PROPERTY ASSET DATA  
A comprehensive platform for merchandising intellectual property (IP) and conducting IP transactions is disclosed. A standardized data collection method enables IP assets to be characterized,...
US20070136804 METHOD AND APPARATUS FOR LOGIN LOCAL MACHINE  
An information processing system 10 comprising a plurality of information processing apparatuses 300, a management server 100, and a plurality of terminals 200, wherein: the management server 100...
US20060031930 Dynamically configurable service oriented architecture  
A system, method and media for a service oriented architecture. This on is not intended to be a complete description of, or limit the scope of, the Other features, aspects and objects of the...
US20070294759 Wireless network control and protection system  
A local area network and method for operating the same is disclosed. The local computer network is connected to a wide area network by a node that receives network communications from computers on...
US20060041938 Method of supporting SSL/TLS protocols in a resource-constrained device  
System and method for secure communication between a resource constrained device and a remote node over a computer network. The system and method according to the invention supports an SSL/TLS...
US20090328190 METHOD AND APPARATUS TO PERFORM SECURITY AND VULNERABILITY TESTING OF PROTOCOLS  
Flaws in information security infest modern software, and pervasive computing has made network systems vulnerable. Information security is constantly endangered by errors in protocol...
US20070083924 System and method for multi-stage packet filtering on a networked-enabled device  
A multi-stage packet filtering method and system. The multi-stage packet filtering according to the invention applies a set of filtering rules early in the processing of incoming communications...
US20070006294 Secure flow control for a data flow in a computer and data flow in a computer network  
Systems and methods of the present invention manage data flow of a computer and computer network in a secure domain. The system includes an administration module and a management module. The...
US20090178110 Communication Control Device, Communication Control System, Communication Control Method, and Communication Control Program  
The communication control device of the present invention includes: a communication parameter acquisition means (105) for acquiring communication parameters that specify the transmission origin of...
US20070101422 Automated network blocking method and system  
A method and system for logically disconnecting a host computer from a network and for reconnecting it in the same manner, such that physical rewiring is not required. The method and system...
US20050229246 Programmable context aware firewall with integrated intrusion detection system  
A context-aware firewall and intrusion detection system receives a definition of a Protocol State Machine (PSM) that defines the expected behavior of any protocol (FTP, HTTP, etc.). The PSM...
US20080301570 SPACIOTEMPORAL GRAPHICAL USER INTERFACE FOR COLLABORATIVE AND SECURE INFORMATION SHARING  
A collaborative information sharing system as described herein employs a graphical user interface (GUI) that displays a spaciotemporal rendering along with icons that represent items of interest,...
US20080256624 SYSTEMS AND METHOD FOR DISTRIBUTED NETWORK PROTECTION  
Through the use of an intermediate party, a first party is given the ability to communicate with a second party, with the communication appearing as if it originated with the intermediate party....
US20140351920 Method and Apparatus for Dynamic Tunneling  
Method and Apparatus for rapid scalable unified infrastructure system management platform are disclosed by discovery of compute nodes, network components across data centers, both public and...
US20070209069 PUSH-TO-ASK PROTOCOL LAYER PROVISIONING AND USAGE METHOD  
Generally speaking, pursuant to these various embodiments, one provides (101) a push-to-ask protocol layer that comprises, at least in part, a question receiving function, an answer receiving...
US20050108563 Protocol for controlling the mode of accessing data transmitted in point-to-point or point-to-multipoint mode  
The invention relates to a protocol for controlling the mode of access to data on the basis of rights, access criteria and electronic token carriers. Each access right and electronic token carrier...
US20170149743 COMMUNICATION APPARATUS AND METHOD FOR DETECTING ABNORMALITY OF ENCRYPTION COMMUNICATION  
A communication apparatus includes: a memory configured to store negotiation information used to negotiate a path of encryption communication established with a opposite apparatus; and a processor...
US20060191004 Secured one-way interconnection system  
A secured one-way interconnection system comprises at least one system A with a security level NA and one system B with a security level NB, the two systems exchanging information through a...
US20100138910 METHODS FOR ENCRYPTED-TRAFFIC URL FILTERING USING ADDRESS-MAPPING INTERCEPTION  
The present invention discloses methods, media, and perimeter gateways for encrypted-traffic URL filtering using address-mapping interception, methods including the steps of: providing a client...

Matches 1 - 50 out of 92 1 2 >