Matches 1 - 50 out of 389 1 2 3 4 5 6 7 8 >


Match Document Document Title
US20120137358 POINT-TO-MULTI-POINT/NON-BROADCASTING MULTI-ACCESS VPN TUNNELS  
A system establishes a virtual private network (VPN) tunnel to a destination and determines a next hop for the VPN tunnel. The system inserts the next hop, and an address associated with the...
US20110078784 VPN SYSTEM AND METHOD OF CONTROLLING OPERATION OF SAME  
A VPN management server transmits a seed to a client computer and VPN server. The client computer generates a VPN password from the seed using a prescribed algorithm and transmits the generated...
US20120311694 SECURITY SYSTEM FOR A COMPUTER NETWORK HAVING A SECURITY SUBSYSTEM AND A MASTER SYSTEM WHICH MONITORS THE INTEGRITY OF A SECURITY SUBSYSTEM  
A security system for a computer network that has a plurality of devices connected thereto comprises a security subsystem, a master system and a secure link. The security subsystem is implemented...
US20120180122 IMPLEMENTATION METHOD AND SYSTEM OF VIRTUAL PRIVATE NETWORK  
An implementation method and system of a virtual private network (VPN) are provided in the invention, wherein, the VPN dedicated mapping table of the VPN is stored in the mapping plane in the...
US20100064362 SYSTEMS AND METHODS FOR VOIP NETWORK SECURITY  
According to an aspect of the present invention there is provided a VoIP asset discovery system for discovering and identifying VoIP assets on a VoIP network, the asset discovery system comprising...
US20060130135 Virtual private network connection methods and systems  
A method and system for connecting a customer equipment (CE) communication device to a virtual private network (VPN) is provided. A virtual private network membership signal is generated at the...
US20110179415 ENABLEMENT AND ACCELERATION OF LIVE AND NEAR-LIVE MIGRATION OF VIRTUAL MACHINES AND THEIR ASSOCIATED STORAGE ACROSS NETWORKS  
A virtual machine is migrated between a source cloud and a destination cloud. A temporary storage is mounted to a partition management firmware of the source cloud and to a partition management...
US20150074793 PLACING A VIRTUAL EDGE GATEWAY APPLIANCE ON A HOST COMPUTING SYSTEM  
Techniques for placing a virtual edge gateway appliance on at least one host computing system are described. In one embodiment, a virtual switch assigned to a tenant for creating virtual networks...
US20110107414 System and Method for Location Assisted Virtual Private Networks  
A system and method for location assisted virtual private networks (VPNs). Users can create location uncertainty by logging into a VPN server that geographically remote from the present location....
US20140123269 FILTERING OF APPLICATIONS FOR ACCESS TO AN ENTERPRISE NETWORK  
A computer-readable storage medium has embedded thereon non-transient computer-readable code for controlling access to a protected computer network, by intercepting packets that are being...
US20140109214 SECURITY DEVICE BANK AND A SYSTEM INCLUDING THE AND SD SECURITY DEVICE BANK  
In some embodiments, a system includes a trusted network, an untrusted network, on-board equipment on-board a moving object, one or more first security devices on-board the moving object and...
US20120331545 METHODS AND APPARATUS TO CONFIGURE VIRTUAL PRIVATE MOBILE NETWORKS FOR SECURITY  
Methods and apparatus to configure virtual private mobile networks for security are disclosed. A disclosed example method includes identifying, in a wireless network, a communication from a user...
US20150189511 SYSTEM AND METHOD FOR SECURITY AND QUALITY ASSESSMENT OF WIRELESS ACCESS POINTS  
A computer-implemented method for security risk assessment of wireless access point devices, the computer-implemented method comprising: receiving signals from one or more wireless access points...
US20150188940 SYSTEM AND METHOD FOR SECURITY AND QUALITY ASSESSMENT OF WIRELESS ACCESS POINTS  
A computer-implemented method for security risk assessment of wireless access point devices, the computer-implemented method comprising: receiving signals from one or more wireless access points...
US20110214176 TECHNIQUES FOR SECURE ACCESS MANAGEMENT IN VIRTUAL ENVIRONMENTS  
Techniques for secure access management to virtual environments are provided. A user authenticates to a portal for purposes of establishing a virtual machine (VM). The portal interacts with a...
US20140380461 ESTABLISHING SECURE REMOTE ACCESS TO PRIVATE COMPUTER NETWORKS  
Techniques are described for providing users with access to computer networks, such as to enable users to interact with a remote configurable network service to create and configure computer...
US20150249644 CLOUD-BASED SECURITY POLICY CONFIGURATION  
Systems and methods for configuring security policies based on security parameters stored in a public or private cloud infrastructure are provided. According to one embodiment, security parameters...
US20120180121 PROVISIONING/CONFIGURATION SYSTEMS FOR VPN TO VPN BRIDGING FOR IP VIDEO CONFERENCING  
Internet Protocol (IP) video conferencing bridging provisioning/configuration systems receive a service order associated with a customer, where the service order requests enrollment of the...
US20110131647 Virtual Endpoint Solution  
A virtual endpoint solution to provides secure connectivity between a service provider network and the client network over the public Internet. This virtual private network (VPN) connection is...
US20140075542 SNIPPET MATCHING IN FILE SHARING NETWORKS  
Techniques for matching information representing private files against files obtained from a public network.
US20120159607 MULTI-SERVICE VPN NETWORK CLIENT FOR MOBILE DEVICE  
An integrated, multi-service network client for cellular mobile devices is described. The multi-service network client can be deployed as a single software package on cellular mobile network...
US20120002813 MULTI-SERVICE VPN NETWORK CLIENT FOR MOBILE DEVICE  
An integrated, multi-service network client for cellular mobile devices is described. The multi-service network client can be deployed as a single software package on cellular mobile network...
US20080134316 PRIVATE NETWORK SYSTEM AND METHOD  
A method for forming a secure virtual private network (VPN) is described. The secure virtual private network consists of two or more linked entities having internet connectability where each...
US20100325719 System and Method for Redundancy in a Communication Network  
A network fail-over system provides redundant first and second secure proxy servers, first and second authentication servers each communicatively coupled to the proxy servers, first and second...
US20110225060 Mobility Network Operator Service Delivery Hub  
A service delivery hub controlled by a network operator includes an access controller; a network services gateway in communication with the access controller and in communication with external...
US20150082419 FORCING ALL MOBILE NETWORK TRAFFIC OVER A SECURE TUNNEL CONNECTION  
A process is disclosed in which all network traffic between a mobile device and an untrusted network arriving before the establishment of a VPN tunnel are dropped in response to rules imposed by...
US20110231910 TECHNIQUES FOR VIRTUAL PRIVATE NETWORK (VPN) ACCESS  
Techniques for virtual private network (VPN) access are provided. A dynamic determination, in response to privileges, is made as to whether a principal and a device of a principal are to receive a...
US20140337966 PUBLIC ACCESS POINT  
The invention instantiates a Personal VLAN bridge, using IEEE Std. 802.11 elements. The result is a bridge, referred to as a public access point, that is better suited for implementing public...
US20120278878 SYSTEMS AND METHODS FOR ESTABLISHING SECURE VIRTUAL PRIVATE NETWORK COMMUNICATIONS USING NON-PRIVILEGED VPN CLIENT  
Systems and methods are provided for establishing secure VPN communications using processes executing in unprivileged user space. For example, systems and methods for establishing secure VPN...
US20140298446 METHOD AND EQUIPMENT FOR ESTABLISHING A CONNECTION THROUGH A VIRTUAL PRIVATE NETWORK  
Embodiments of the present invention refer to a method for establishing a connection through a virtual private network “VPN” (9) between a first (1) and a second (3) entities of a transport...
US20140337965 Method and System for Access to Development Environment of Another with Access to Intranet Data  
A method for secure external access to a collaborative design system is provided that includes establishing a virtual private network (VPN) tunnel between an engagement virtual machine and an...
US20140096229 VIRTUAL HONEYPOT  
A virtual honeypot is configured within a security appliance by configuring one or more network addresses associated with the virtual honeypot. The security appliance receives network traffic...
US20150019859 TUNNEL INTERFACE FOR SECURING TRAFFIC OVER A NETWORK  
Methods and systems for a flexible, scalable hardware and software platform that allows a managed security service provider to easily provide security services to multiple customers are provided....
US20140007220 USE OF TELEPHONY FEATURES AND PHONES TO ENABLE AND DISABLE SECURE REMOTE ACCESS  
System and method to control a virtual private network (VPN) connection, including the steps of: establishing a VPN connection between a VPN client associated with a communication terminal of an...
US20130074177 ROUTING DEVICE HAVING INTEGRATED MPLS-AWARE FIREWALL  
An MPLS-aware firewall allows firewall security policies to be applied to MPLS traffic. The firewall, which may be integrated within a routing device, can be configured into multiple virtual...
US20110023090 INTEGRATING SERVICE INSERTION ARCHITECTURE AND VIRTUAL PRIVATE NETWORK  
Apparatus, methods, and other embodiments associated with providing service insertion architecture (SIA) differentiated services in a virtual private network (VPN) environment are described....
US20110154477 DYNAMIC CONTENT-BASED ROUTING  
Systems and methods for redirecting network traffic include a policy server configured to be in communication with a policy database and a client disposed on a remote device. The policy server is...
US20130191906 APPARATUS AND METHOD FOR SUPPORTING PORTABLE MOBILE VIRTUAL PRIVATE NETWORK SERVICE  
An apparatus and method for supporting a portable mobile VPN service are provided. The method accesses a public network to generate a security tunnel, maps the generated security tunnel and a VPN...
US20080320586 SECURITY SYSTEM FOR A COMPUTER NETWORK HAVING A SECURITY SUBSYSTEM AND A MASTER SYSTEM WHICH MONITORS THE INTEGRITY OF A SECURITY SUBSYSTEM  
A security system for a computer network that has a plurality of devices connected thereto comprises a security subsystem, a master system and a secure link. The security subsystem is connected to...
US20120110319 FAILURE RECOGNITION  
A system and method for failure recognition is disclosed. The technology initially establishes a security association (SA) between a client and a first server on a network. In addition, an active...
US20150264013 METHOD AND APPARATUS FOR PROVIDING SECURITY IN AN INTRANET NETWORK  
A method and an apparatus for providing security in an intranet network are disclosed. For example, the method receives a packet at a customer edge router, and applies an inbound access control...
US20140245426 METHOD AND APPARATUS FOR PROVIDING SECURITY IN AN INTRANET NETWORK  
A method and an apparatus for providing security in an intranet network are disclosed. For example, the method receives a packet at a customer edge router, and applies an inbound access control...
US20100023600 DEVELOPMENT, TEST, AND DEMONSTRATION OF AUTOMATION SOLUTIONS USING WEB-BASED VIRTUAL COMPUTERS AND VPN TUNNELING  
The present invention relates generally to an Internet based management of software and/or hardware. More particularly, the invention encompasses the development, test, and demonstration of...
US20110238582 Service Method For Customer Self-Service And Rapid On-Boarding For Remote Information Technology Infrastructure Monitoring And Management  
In accordance with one aspect of the embodiments of this invention there is a method to initiate remote managed infrastructure services for a customer infrastructure site. The method includes, in...
US20120005745 VPN NETWORK CLIENT FOR MOBILE DEVICE HAVING DYNAMICALLY TRANSLATED USER HOME PAGE  
A virtual private network (VPN) client for cellular mobile devices is described. The VPN network client processes network packets for securely tunneling the network packets between the cellular...
US20140068750 ESTABLISHING AN IPSEC (INTERNET PROTOCOL SECURITY) VPN (VIRTUAL PRIVATE NETWORK) TUNNEL  
Systems, methods and apparatuses of establishing an IPsec (Internet Protocol Security) VPN (Virtual Private Network) tunnel are disclosed. One method includes receiving, by a wireless mesh network...
US20090313368 CROSS-ENTERPRISE WALLPLUG FOR CONNECTING INTERNAL HOSPITAL/CLINIC IMAGING SYSTEMS TO EXTERNAL STORAGE AND RETRIEVAL SYSTEMS  
A WallPlug (interface) connects DICOM devices located at a hospital to external storage and retrieval systems. The external storage and retrieval systems can be part of the National Digital...
US20120291117 COMPUTERIZED SYSTEM AND METHOD FOR HANDLING NETWORK TRAFFIC  
Methods and systems for processing network content associated with multiple virtual domains are provided. According to one embodiment, content processing of network traffic associated with...
US20150074769 METHOD OF ACCESSING A NETWORK SECURELY FROM A PERSONAL DEVICE, A PERSONAL DEVICE, A NETWORK SERVER AND AN ACCESS POINT  
A method of accessing a network securely using a personal device which can only access the network via one or more authorized access points, the method including establishing a connection between...
US20080163358 INITIATOR AND TARGET FIREWALLS  
A system comprising a first logic adapted to use qualifiers received from a component to determine which of a plurality of storages matches the qualifiers, the first logic generates a first signal...

Matches 1 - 50 out of 389 1 2 3 4 5 6 7 8 >