At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
DISTRIBUTED DEVICE MANAGEMENT AND DIRECTORY RESOLUTION
Systems and methods for file synchronization using P2P technology are provided. In some embodiments, a method of operating a device associated with a user for...
Controlled Token Distribution to Protect Against Malicious Data and
Techniques are described for controlling data and resource access. For example, methods and systems can facilitate controlled token distribution across systems...
DETERMINING THE REPUTATION OF A DIGITAL CERTIFICATE
Particular embodiments described herein provide for an electronic device that can be configured to identifying a digital certificate associated with data and...
METHODS, SYSTEMS AND APPARATUS TO MANAGE AN AUTHENTICATION SEQUENCE
Methods, apparatus, systems and articles of manufacture are disclosed to manage an authentication sequence. An example disclosed apparatus includes a...
SENDING AUTHENTICATION CODES TO MULTIPLE RECIPIENTS
Systems and methods of the present invention provide for one or more server computers communicatively coupled to a network and configured to: receive a request...
METHOD AND APPARATUS FOR ENABLING A SINGLE SIGN-ON ENABLED APPLICATION TO
ENFORCE AN APPLICATION LOCK
A single sign-on server associated with a single sign-on client authenticates a user of a device. Subsequent to the authenticating, the single sign-on client...
Pass-Thru for Client Authentication
This disclosure pertains generally to client authentication. One aspect of the disclosure relates to a first server for presenting evidence to a Domain...
PERMISSION ARCHITECTURE FOR REMOTE MANAGEMENT AND CAPACITY INSTANCES
When a user inputs an action request, such as a requested command, to be performed on a target machine, a management system receives the request and verifies...
SPACE-TIME SEPARATED AND JOINTLY EVOLVING RELATIONSHIP-BASED NETWORK
ACCESS AND DATA PROTECTION SYSTEM
A network security system that employs space-time separated and jointly-evolving relationships to provide fast network access control, efficient real-time...
METHOD AND DEVICE FOR CONTROLLING WEB PAGE TO INVOKE SYSTEM FUNCTION, AND
STORAGE MEDIUM THEREOF
The disclosure discloses a method and device for controlling a web page to invoke a system function, and storage medium thereof. the method includes: parsing,...
AUTHENTICATION-FREE CONFIGURATION FOR SERVICE CONTROLLERS
Embodiments generally relate to out-of-band management of a computing system. The present technology discloses enable a primary service controller to provide a...
INFORMATION RECORDING APPARATUS
An information recording apparatus has a drive unit to record digital information including digital contents; and a host unit to control reading and writing of...
APPARATUS AND METHOD FOR CONTROLLING DISPLAY IN ELECTRONIC DEVICE HAVING
The present disclosure relates to a sensor network and Internet of Things (IoT) as applied to intelligent services based technologies such as smart home, smart...
METHOD FOR AUTHENTICATING A DEVICE
Present system relates to a method for authenticating a first device, the method being executed by a second device, the second device comprising a database,...
SYSTEMS AND METHODS OF GEO-LOCATION BASED COMMUNITY OF INTEREST
The embodiments described herein recite a geo-location based community of interest (CIO) system and method that add the capability to configure Network Connect...
NO PASSWORD USER ACCOUNT ACCESS
Various embodiments of the present technology enable users to sign in to an account without a password. For example, when receiving a request to register a...
COMMUNICATION DEVICE AND SYSTEM, DATA PROCESSING METHOD AND METHOD FOR
SECURE DATA EXCHANGE
The present invention relates to a method for processing data in a communication device comprising a host and a security module associated with this host. This...
DEVICES AND METHOD FOR MTC GROUP KEY MANAGEMENT
In order to improve security upon distributing a group key, there is provided a gateway (20) to a core network for a group of MTC devices (10_1-10_n)...
INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND
To be capable of guaranteeing security without dependency on a distance of wireless communication while maintaining convenience of a key apparatus, there is...
LOW-COST AUTHENTICATED SIGNING DELEGATION IN CONTENT CENTRIC NETWORKING
One embodiment provides a system that delegates signature production in a CCN. During operation, a first content producing device monitors content objects...
SECONDARY COMMUNICATIONS CHANNEL FACILITATING DOCUMENT SECURITY
Disclosed are various embodiments for facilitating the sharing of files or documents on behalf of a sending user to a recipient user. A secured file is...
MULTI-FACETED COMPUTE INSTANCE IDENTITY
A compute instance of a virtual computing service (VCS) is assigned first and second cryptographically verifiable identities (CVIs) within respective...
Binding White-Box Implementation To Reduced Secure Element
A non-transitory machine-readable storage medium encoded with instructions for a keyed cryptographic operation having a first and second portion for execution...
NETWORK SECURITY BROKER
Certain methods and systems are described to provide security for sending and receiving data over unsecured networks. In an example a security broker (260) is...
Data Security Operations With Expectations
A cryptography service allows for management of cryptographic keys and for the evaluation of security expectations when processing incoming requests. In some...
Information Handling System Secure RF Wireless Communication Management
with Out-of-Band Encryption Information...
A server information handling system baseboard management controller (BMC) includes an NFC transceiver that communicates NFC signals through an NFC antenna...
SYSTEM AND METHOD FOR SECURE TRANSMISSION OF MEDIA CONTENT
A system that incorporates teachings of the present disclosure may include, for example, a gateway comprising a controller to receive from a communication...
ADJUSTABLE PROXY RE-ENCRYPTION
Methods, systems, and computer-readable storage media for proxy re-encryption of encrypted data stored in a first database of a first server and a second...
TransDRM for Streaming Media
A method for trans-muxing media content into various consumption formats in a content delivery network, the method comprising the steps of reading a server...
Client-side encryption with DRM
A technique for extending security to a data object (e.g., a document, a file, a message, etc.) once it has been shared and during collaboration with others...
TECHNIQUES FOR SECURING DELIVERY OF AN AUDIO MESSAGE
Techniques for securing the delivery of an audio message on a device are described. A method may include receiving a message encrypted with a public key from a...
SECURE COMMUNICATION DEVICE AND METHOD
A security enhancement to IPSec processing is achieved by changing the algorithms used at each re-key after expiration or termination of a Security Association...
DATA VIEW BASED ON CONTEXT
In an implementation, a view of a set of data may be based on a context. The context may include an attribute associated with an attribute list. A set of...
TECHNIQUE FOR SECURELY COMMUNICATING AND STORING PROGRAMMING MATERIAL IN A
A "trusted domain" is established within which content received from a communications network, e.g., a cable TV network, is protected from unauthorized copying...
RECOVERY FROM DECRYPTION ERRORS IN A SEQUENCE OF COMMUNICATION PACKETS
A method in a receiver includes receiving from a transmitter a sequence of communication packets, which carry data encrypted with an encryption scheme. The...
SYSTEM AND METHOD FOR SECURELY CONNECTING NETWORK DEVICES
A platform, apparatus and method for Internet of Things Implementations. For example, one embodiment of a system comprises: an Internet of Things (IoT) hub...
END-TO-END SECURITY FOR VIRTUAL PRIVATE SERVICE CHAINS
A first virtual machine is established in a virtual private service chain to provide a first network service to virtual private service chain traffic. A second...
PROVIDING SECURE COMMUNICATION AND/OR SHARING OF PERSONAL DATA VIA A
A broadband gateway may manage confidential data associated with users in a home network managed and/or serviced by the broadband gateway. The broadband...
System and Method to Associate a Private User Identity with a Public User
The inventive system includes a host, a network including a security gateway, and a public application. Established are an access session between the network...
METHOD AND APPARATUS FOR THREAT ISOLATION AND REMOTE RESOLUTION FOR
A method and system providing remote access for threat removal to a computer system. A remote virtual private network (VPN) connection is established to an...
Real-Time Reconfigurable Web Application Firewall For a Distributed
Some embodiments provide reconfigurable web application firewall (WAF) functionality across a distributed platform. Specifically, the WAF function at each...
Anti-Replay Method and Apparatus
An anti-replay method and apparatus are provided. The same maximum agreed value is set at a transmit end and a receive end. The receive end receives an...
SYSTEMS AND METHODS OF GEO-LOCATION BASED COMMUNITY OF INTEREST
The embodiments described herein recite a geo-location based community of interest (COI) system and method which add the capability to configure Network...
DYNAMIC RE-ORDERING OF SCANNING MODULES IN SECURITY DEVICES
A method and apparatus are provided for preserving bandwidth of a security gateway by dynamically placing a module with a highest ratio of block rate to...
LOAD BALANCING IN A NETWORK WITH SESSION INFORMATION
Methods and systems for balancing load among firewall security devices (FSDs) are provided. According to one embodiment, session data, including session...
SYSTEM AND METHOD FOR N PORT ID VIRTUALIZATION (NPIV) LOGIN LIMIT
INTIMATION TO CONVERGED NETWORK ADAPTOR (CNA)...
Aspects of the present invention include an NPG system that can stop the CNA from requesting a login if the system has reached the ACL login limit. In...
SCANNER ENABLED WITH A SECURE INPUT/OUTPUT (I/O) MODULE (SIOM)
A scanner is enabled for communication with a Secure Input/Output (I/O) Module (SIOM) using a secure communication protocol. The SIOM is provisioned with a...
ASSIGNMENT OF TENANCY TO DEVICES
A method of assigning tenancy to a device during bootstrapping between a device and a server in a network includes transmitting a device identifier to a...
Method and system for resolving Internet of Things heterogeneous
The present invention relates to a method and system for resolving Internet of Things heterogeneous identifiers. The method provides a special description...
MOBILE CELLULAR NETWORK BACKHAUL
A mobile cellular network (MCN) communication system can provide an independent mobile cellular network to devices within a covered area. In addition, the MCN...