Match
|
Document |
Document Title |
|
US20120137358 |
POINT-TO-MULTI-POINT/NON-BROADCASTING MULTI-ACCESS VPN TUNNELS
A system establishes a virtual private network (VPN) tunnel to a destination and determines a next hop for the VPN tunnel. The system inserts the next hop, and an address associated with the... |
|
US20110078784 |
VPN SYSTEM AND METHOD OF CONTROLLING OPERATION OF SAME
A VPN management server transmits a seed to a client computer and VPN server. The client computer generates a VPN password from the seed using a prescribed algorithm and transmits the generated... |
|
US20120311694 |
SECURITY SYSTEM FOR A COMPUTER NETWORK HAVING A SECURITY SUBSYSTEM AND A MASTER SYSTEM WHICH MONITORS THE INTEGRITY OF A SECURITY SUBSYSTEM
A security system for a computer network that has a plurality of devices connected thereto comprises a security subsystem, a master system and a secure link. The security subsystem is implemented... |
|
US20120180122 |
IMPLEMENTATION METHOD AND SYSTEM OF VIRTUAL PRIVATE NETWORK
An implementation method and system of a virtual private network (VPN) are provided in the invention, wherein, the VPN dedicated mapping table of the VPN is stored in the mapping plane in the... |
|
US20100064362 |
SYSTEMS AND METHODS FOR VOIP NETWORK SECURITY
According to an aspect of the present invention there is provided a VoIP asset discovery system for discovering and identifying VoIP assets on a VoIP network, the asset discovery system comprising... |
|
US20060130135 |
Virtual private network connection methods and systems
A method and system for connecting a customer equipment (CE) communication device to a virtual private network (VPN) is provided. A virtual private network membership signal is generated at the... |
|
US20110179415 |
ENABLEMENT AND ACCELERATION OF LIVE AND NEAR-LIVE MIGRATION OF VIRTUAL MACHINES AND THEIR ASSOCIATED STORAGE ACROSS NETWORKS
A virtual machine is migrated between a source cloud and a destination cloud. A temporary storage is mounted to a partition management firmware of the source cloud and to a partition management... |
|
US20150074793 |
PLACING A VIRTUAL EDGE GATEWAY APPLIANCE ON A HOST COMPUTING SYSTEM
Techniques for placing a virtual edge gateway appliance on at least one host computing system are described. In one embodiment, a virtual switch assigned to a tenant for creating virtual networks... |
|
US20110107414 |
System and Method for Location Assisted Virtual Private Networks
A system and method for location assisted virtual private networks (VPNs). Users can create location uncertainty by logging into a VPN server that geographically remote from the present location.... |
|
US20140123269 |
FILTERING OF APPLICATIONS FOR ACCESS TO AN ENTERPRISE NETWORK
A computer-readable storage medium has embedded thereon non-transient computer-readable code for controlling access to a protected computer network, by intercepting packets that are being... |
|
US20140109214 |
SECURITY DEVICE BANK AND A SYSTEM INCLUDING THE AND SD SECURITY DEVICE BANK
In some embodiments, a system includes a trusted network, an untrusted network, on-board equipment on-board a moving object, one or more first security devices on-board the moving object and... |
|
US20120331545 |
METHODS AND APPARATUS TO CONFIGURE VIRTUAL PRIVATE MOBILE NETWORKS FOR SECURITY
Methods and apparatus to configure virtual private mobile networks for security are disclosed. A disclosed example method includes identifying, in a wireless network, a communication from a user... |
|
US20150189511 |
SYSTEM AND METHOD FOR SECURITY AND QUALITY ASSESSMENT OF WIRELESS ACCESS POINTS
A computer-implemented method for security risk assessment of wireless access point devices, the computer-implemented method comprising: receiving signals from one or more wireless access points... |
|
US20150188940 |
SYSTEM AND METHOD FOR SECURITY AND QUALITY ASSESSMENT OF WIRELESS ACCESS POINTS
A computer-implemented method for security risk assessment of wireless access point devices, the computer-implemented method comprising: receiving signals from one or more wireless access points... |
|
US20110214176 |
TECHNIQUES FOR SECURE ACCESS MANAGEMENT IN VIRTUAL ENVIRONMENTS
Techniques for secure access management to virtual environments are provided. A user authenticates to a portal for purposes of establishing a virtual machine (VM). The portal interacts with a... |
|
US20140380461 |
ESTABLISHING SECURE REMOTE ACCESS TO PRIVATE COMPUTER NETWORKS
Techniques are described for providing users with access to computer networks, such as to enable users to interact with a remote configurable network service to create and configure computer... |
|
US20150249644 |
CLOUD-BASED SECURITY POLICY CONFIGURATION
Systems and methods for configuring security policies based on security parameters stored in a public or private cloud infrastructure are provided. According to one embodiment, security parameters... |
|
US20120180121 |
PROVISIONING/CONFIGURATION SYSTEMS FOR VPN TO VPN BRIDGING FOR IP VIDEO CONFERENCING
Internet Protocol (IP) video conferencing bridging provisioning/configuration systems receive a service order associated with a customer, where the service order requests enrollment of the... |
|
US20110131647 |
Virtual Endpoint Solution
A virtual endpoint solution to provides secure connectivity between a service provider network and the client network over the public Internet. This virtual private network (VPN) connection is... |
|
US20140075542 |
SNIPPET MATCHING IN FILE SHARING NETWORKS
Techniques for matching information representing private files against files obtained from a public network. |
|
US20120159607 |
MULTI-SERVICE VPN NETWORK CLIENT FOR MOBILE DEVICE
An integrated, multi-service network client for cellular mobile devices is described. The multi-service network client can be deployed as a single software package on cellular mobile network... |
|
US20120002813 |
MULTI-SERVICE VPN NETWORK CLIENT FOR MOBILE DEVICE
An integrated, multi-service network client for cellular mobile devices is described. The multi-service network client can be deployed as a single software package on cellular mobile network... |
|
US20080134316 |
PRIVATE NETWORK SYSTEM AND METHOD
A method for forming a secure virtual private network (VPN) is described. The secure virtual private network consists of two or more linked entities having internet connectability where each... |
|
US20100325719 |
System and Method for Redundancy in a Communication Network
A network fail-over system provides redundant first and second secure proxy servers, first and second authentication servers each communicatively coupled to the proxy servers, first and second... |
|
US20110225060 |
Mobility Network Operator Service Delivery Hub
A service delivery hub controlled by a network operator includes an access controller; a network services gateway in communication with the access controller and in communication with external... |
|
US20150082419 |
FORCING ALL MOBILE NETWORK TRAFFIC OVER A SECURE TUNNEL CONNECTION
A process is disclosed in which all network traffic between a mobile device and an untrusted network arriving before the establishment of a VPN tunnel are dropped in response to rules imposed by... |
|
US20110231910 |
TECHNIQUES FOR VIRTUAL PRIVATE NETWORK (VPN) ACCESS
Techniques for virtual private network (VPN) access are provided. A dynamic determination, in response to privileges, is made as to whether a principal and a device of a principal are to receive a... |
|
US20140337966 |
PUBLIC ACCESS POINT
The invention instantiates a Personal VLAN bridge, using IEEE Std. 802.11 elements. The result is a bridge, referred to as a public access point, that is better suited for implementing public... |
|
US20120278878 |
SYSTEMS AND METHODS FOR ESTABLISHING SECURE VIRTUAL PRIVATE NETWORK COMMUNICATIONS USING NON-PRIVILEGED VPN CLIENT
Systems and methods are provided for establishing secure VPN communications using processes executing in unprivileged user space. For example, systems and methods for establishing secure VPN... |
|
US20140298446 |
METHOD AND EQUIPMENT FOR ESTABLISHING A CONNECTION THROUGH A VIRTUAL PRIVATE NETWORK
Embodiments of the present invention refer to a method for establishing a connection through a virtual private network “VPN” (9) between a first (1) and a second (3) entities of a transport... |
|
US20140337965 |
Method and System for Access to Development Environment of Another with Access to Intranet Data
A method for secure external access to a collaborative design system is provided that includes establishing a virtual private network (VPN) tunnel between an engagement virtual machine and an... |
|
US20140096229 |
VIRTUAL HONEYPOT
A virtual honeypot is configured within a security appliance by configuring one or more network addresses associated with the virtual honeypot. The security appliance receives network traffic... |
|
US20150019859 |
TUNNEL INTERFACE FOR SECURING TRAFFIC OVER A NETWORK
Methods and systems for a flexible, scalable hardware and software platform that allows a managed security service provider to easily provide security services to multiple customers are provided.... |
|
US20140007220 |
USE OF TELEPHONY FEATURES AND PHONES TO ENABLE AND DISABLE SECURE REMOTE ACCESS
System and method to control a virtual private network (VPN) connection, including the steps of: establishing a VPN connection between a VPN client associated with a communication terminal of an... |
|
US20130074177 |
ROUTING DEVICE HAVING INTEGRATED MPLS-AWARE FIREWALL
An MPLS-aware firewall allows firewall security policies to be applied to MPLS traffic. The firewall, which may be integrated within a routing device, can be configured into multiple virtual... |
|
US20110023090 |
INTEGRATING SERVICE INSERTION ARCHITECTURE AND VIRTUAL PRIVATE NETWORK
Apparatus, methods, and other embodiments associated with providing service insertion architecture (SIA) differentiated services in a virtual private network (VPN) environment are described.... |
|
US20110154477 |
DYNAMIC CONTENT-BASED ROUTING
Systems and methods for redirecting network traffic include a policy server configured to be in communication with a policy database and a client disposed on a remote device. The policy server is... |
|
US20130191906 |
APPARATUS AND METHOD FOR SUPPORTING PORTABLE MOBILE VIRTUAL PRIVATE NETWORK SERVICE
An apparatus and method for supporting a portable mobile VPN service are provided. The method accesses a public network to generate a security tunnel, maps the generated security tunnel and a VPN... |
|
US20080320586 |
SECURITY SYSTEM FOR A COMPUTER NETWORK HAVING A SECURITY SUBSYSTEM AND A MASTER SYSTEM WHICH MONITORS THE INTEGRITY OF A SECURITY SUBSYSTEM
A security system for a computer network that has a plurality of devices connected thereto comprises a security subsystem, a master system and a secure link. The security subsystem is connected to... |
|
US20120110319 |
FAILURE RECOGNITION
A system and method for failure recognition is disclosed. The technology initially establishes a security association (SA) between a client and a first server on a network. In addition, an active... |
|
US20150264013 |
METHOD AND APPARATUS FOR PROVIDING SECURITY IN AN INTRANET NETWORK
A method and an apparatus for providing security in an intranet network are disclosed. For example, the method receives a packet at a customer edge router, and applies an inbound access control... |
|
US20140245426 |
METHOD AND APPARATUS FOR PROVIDING SECURITY IN AN INTRANET NETWORK
A method and an apparatus for providing security in an intranet network are disclosed. For example, the method receives a packet at a customer edge router, and applies an inbound access control... |
|
US20100023600 |
DEVELOPMENT, TEST, AND DEMONSTRATION OF AUTOMATION SOLUTIONS USING WEB-BASED VIRTUAL COMPUTERS AND VPN TUNNELING
The present invention relates generally to an Internet based management of software and/or hardware. More particularly, the invention encompasses the development, test, and demonstration of... |
|
US20110238582 |
Service Method For Customer Self-Service And Rapid On-Boarding For Remote Information Technology Infrastructure Monitoring And Management
In accordance with one aspect of the embodiments of this invention there is a method to initiate remote managed infrastructure services for a customer infrastructure site. The method includes, in... |
|
US20120005745 |
VPN NETWORK CLIENT FOR MOBILE DEVICE HAVING DYNAMICALLY TRANSLATED USER HOME PAGE
A virtual private network (VPN) client for cellular mobile devices is described. The VPN network client processes network packets for securely tunneling the network packets between the cellular... |
|
US20140068750 |
ESTABLISHING AN IPSEC (INTERNET PROTOCOL SECURITY) VPN (VIRTUAL PRIVATE NETWORK) TUNNEL
Systems, methods and apparatuses of establishing an IPsec (Internet Protocol Security) VPN (Virtual Private Network) tunnel are disclosed. One method includes receiving, by a wireless mesh network... |
|
US20090313368 |
CROSS-ENTERPRISE WALLPLUG FOR CONNECTING INTERNAL HOSPITAL/CLINIC IMAGING SYSTEMS TO EXTERNAL STORAGE AND RETRIEVAL SYSTEMS
A WallPlug (interface) connects DICOM devices located at a hospital to external storage and retrieval systems. The external storage and retrieval systems can be part of the National Digital... |
|
US20120291117 |
COMPUTERIZED SYSTEM AND METHOD FOR HANDLING NETWORK TRAFFIC
Methods and systems for processing network content associated with multiple virtual domains are provided. According to one embodiment, content processing of network traffic associated with... |
|
US20150074769 |
METHOD OF ACCESSING A NETWORK SECURELY FROM A PERSONAL DEVICE, A PERSONAL DEVICE, A NETWORK SERVER AND AN ACCESS POINT
A method of accessing a network securely using a personal device which can only access the network via one or more authorized access points, the method including establishing a connection between... |
|
US20080163358 |
INITIATOR AND TARGET FIREWALLS
A system comprising a first logic adapted to use qualifiers received from a component to determine which of a plurality of storages matches the qualifiers, the first logic generates a first signal... |