At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
METHOD FOR ESTABLISHING CONNECTION BETWEEN DEVICES
A method performed by a first network device for communicating over a network, the method includes receiving, at the first network device, a request to connect...
TERMINAL ROBOT SECURITY SYSTEM AND OPERATING METHOD THEREOF
The present invention provides a terminal robot security system and an operation method thereof. The security system comprises a terminal robot (3), a...
ADDRESS VALIDATION USING SIGNATURES
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for generating signed addresses. One of the methods includes...
SYSTEM AND METHOD FOR AUTHENTICATING USERS ACROSS DEVICES
Disclosed are systems and methods for improving interactions with and between computers in an authentication system supported by or configured with personal...
TECHNOLOGIES FOR GEOLOCATION ATTESTATION OF COMPUTING DEVICES IN A NETWORK
Technologies for geolocation attestation of computing devices in a network path include a verification device to generate a secure trace packet such that the...
SYSTEM AND METHOD FOR ISSUING OTP APPLICATION IN FACE-TO-FACE CONFIRMATION
The present invention relates to a system and method for issuing an OTP application in a face-to-face confirmation manner, and the system includes at least one...
CHARACTERIZING A CLIENT APPARATUS ON AT LEAST ONE SERVER APPARATUS
Systems and methods for characterizing a client apparatus on at least one server apparatus are provided. A first certificate is received in the event of a...
Techniques for Securely Receiving Critical Communication Content
Associated with a Critical Communication Service
Examples may include techniques for securely receiving critical communication content associated with a critical communication service. Examples may include a...
A method for the exchange between two computer systems, without prior exchange of any material or prior third-party endorsement, of key-pairs and signed...
ENCRYPTION/DECRYPTION IN A CLOUD STORAGE SOLUTION
The disclosure generally describes computer-implemented methods, software, and systems, including a method for decryption of data stored in the cloud. A record...
User Authentication in a Mobile Environment
A data channel transmission can be used to authenticate a voice channel transmission. An authentication server can authenticate the identity of one or more...
SYSTEM AND METHOD FOR PROVIDING LIMITED ACCESS TO DATA
A system and computer-implemented method for providing access to data of a first party including receiving information for identifying the first party,...
SYSTEM, METHOD, AND DEVICE FOR DELIVERING COMMUNICATIONS AND STORING AND
A system, method, and device includes a platform data storage that stores a wrap that secures an executable controller and executable sensors. The wrap is...
SECURE AND CONFIDENTIAL SHARING OF DIGITAL CONTENT
A method of sharing confidential digital content among a plurality of participants, each utilizing one or more digital communication devices connected to a...
INTER-APPLICATION MANAGEMENT OF USER CREDENTIAL DATA
A system and apparatus for enhancing the functionality and utility of an authentication process for web applications is disclosed.
System and Method for Organizing a Plurality of Local Meeting Groups
A system and method for facilitating supervisory control of localized meeting groups is provided. A method includes the steps of generating a master meeting...
COMMUNICATING BETWEEN A CLUSTER AND A NODE EXTERNAL TO THE CLUSTER
A technique includes, in response to receiving an inquiry from a first node external to a cluster in a server node of a cluster, communicating server...
Implicit Challenge Authentication Process
A challenge value is received at a network connected device from a first server. A secure communication channel is established with the first server based on...
Network Device and Method for Processing a Session Using a Packet
A method processes a session having a first session packet received by a current node in an IP network having a plurality of nodes. The plurality of nodes...
KEY DISTRIBUTION IN A WIRELESS SYSTEM
Distribution of a key in a wireless system comprising at least one mobile device is disclosed. Data regarding relative rotation between devices in optical data...
GROUP MEMBER RECOVERY TECHNIQUES
Techniques are presented for optimizing secure communications in a network. As disclosed herein, a key server is configured to provision a plurality of routers...
Terminal Pairing Method and Pairing Terminal
A terminal pairing method and a pairing terminal includes acquiring, when a terminal detects a preset pairing trigger event, a pairing hidden value that is of...
POLICY BASED CRYPTOGRAPHIC KEY DISTRIBUTION FOR NETWORK GROUP ENCRYPTION
Various embodiments include a method for managing a group of devices in communication with each other and sharing a set of keys. The method may include opening...
SECURE PAIRING OF A PROCESSOR AND A SECURE ELEMENT OF AN ELECTRONIC DEVICE
Systems, methods, and computer-readable media for securely pairing a secure element and a processor of an electronic device are provided. In one example...
SYSTEM AND METHOD FOR AUTHENTICATING AND ENABLING AN ELECTRONIC DEVICE IN
AN ELECTRONIC SYSTEM
A system and method for authenticating and enabling an electronic device in an electronic system are disclosed. A particular embodiment includes: an electronic...
CRYPTOGRAPHIC SYSTEM, RE-ENCRYPTION KEY GENERATION DEVICE, RE-ENCRYPTION
DEVICE, AND CRYPTOGRAPHIC COMPUTER...
An encryption device (200) outputs a ciphertext ct.sub.0 in which is set one of attribute information x.sub.0 and attribute information v.sub.0 corresponding...
ENCRYPTED QUERY-BASED ACCESS TO DATA
A query-based system for sharing encrypted data, comprising at least one hardware processor; and at least one non-transitory memory device having embodied...
Low-Latency Secure Segment Encryption and Authentication Interface
An apparatus comprising a memory, a processor coupled to the memory and configured to obtain a Dynamic Adaptive Streaming over Hypertext Transfer Protocol...
METHOD AND UPDATE GATEWAY FOR UPDATING AN EMBEDDED CONTROL UNIT
A method for updating an embedded electronic control unit, including an update gateway requests from a hardware security module an update request destined for...
METHOD AND DECISION GATEWAY FOR AUTHORIZING A FUNCTION OF AN EMBEDDED
A method for authorizing a function of an embedded electronic control unit, including: a decision gateway requests from a hardware security module a function...
CONTROLLER AREA NETWORK (CAN) DEVICE AND METHOD FOR OPERATING A CAN DEVICE
Embodiments of a device and method are disclosed. In an embodiment, a Controller Area Network (CAN) device includes a security module connected between a CAN...
METHOD FOR ANONYMISATION BY TRANSMITTING DATA SET BETWEEN DIFFERENT
The present invention refers to a method for anonymisation by transmitting an event data set from at least one data supplying entity supplying the event data...
SYSTEMS AND METHODS FOR A TWO-WAY COMMON POOL PROXY TO OBSCURE
Method and system is disclosed for obscuring a message origin. The method includes provisioning a first alias address of the finite plurality of alias...
SYSTEM AND METHOD FOR RECEPTION AND TRANSMISSION OPTIMIZATION OF SECURED
VIDEO, IMAGE, AUDIO, AND OTHER MEDIA...
A proxy server may receive from a user endpoint, a secure connection request to a second server. The secure connection request may be matched to a globally...
Secure Auto-Provisioning Device Network
A system comprising a gateway capable of connecting to an Internet router, and at least one Internet-connected device, said Internet-connected device...
DATA LEAK PROTECTION IN UPPER LAYER PROTOCOLS
Methods and systems for Data Leak Prevention (DLP) in a private network are provided. According to one embodiment, a packet is received by a network security...
INTRA-TERM LOGICAL OR OPERATION IN A NETWORK FILTER
A network filter is implemented so that filter terms that include intra-term OR conditions and converted to sub-terms that include only logical AND conditions....
FIREWALL POLICY MANAGEMENT
Methods and systems are provided for creation and implementation of firewall policies. According to one embodiment, a firewall maintains a log of observed...
Device for Interconnecting Communication Networks with Controlled Security
The invention relates to a device for interconnecting at least two data-communication networks, connecting a first network qualified as a high-security network...
INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND COMPUTER
An information processing system includes a receiving unit and a determining unit. The receiving unit receives an application request to request an application...
ENDPOINT DEVICE IDENTIFICATION BASED ON DETERMINED NETWORK BEHAVIOR
In one embodiment, a method comprises detecting, by a network device, an endpoint device attempting to access a data network via a data link; and generating,...
SYSTEMS AND METHODS FOR RESOLUTION OF UNIFORM RESOURCE LOCATORS IN A LOCAL
In accordance with embodiments of the present disclosure, a method for resolving a uniform resource locator may include receiving, at a router, a uniform...
PACKET TRANSMISSION SYSTEM, PACKET TRANSMISSION APPARATUS, AND PACKET
Disclosed are a packet transmission apparatus and so on that can suppress transmission delays caused by packet integrations and that can perform the...
CLUSTERED SERVER SHARING
A method and a system environment are disclosed that allow for installation of an application into excess capacity of an existing server and that allows the...
Network Management of Devices Residing Behind a Network Device
Network device management may be provided. By utilizing a network ID tag (i.e., a switch identifier) corresponding to a network switch, a network management...
Communicating via IPv6-only Networks Using IPv4 Literal Identifiers
Techniques are disclosed relating to communicating, via IPv6-only networks, with devices on IPv4 networks. In some embodiments, a mobile device stores program...
MULTI-TENANT AWARE DYNAMIC HOST CONFIGURATION PROTOCOL (DHCP) MECHANISM
FOR CLOUD NETWORKING
An approach includes providing support multi-tenancy support on a DHCP protocol. The approach includes receiving a dynamic host configuration protocol (DHCP)...
Method for Initiating Local Routing Communication, Base Station Apparatus,
and Terminal Apparatus
A method includes initiating, by a base station, a local routing service start notification. The local routing service start notification is used for notifying...
IP-BASED SATELLITE COMMAND, CONTROL, AND DATA TRANSFER
A method and system for satellite control in space using an IP-based satellite bus and all-IP compliant subsystems and payload(s) and a corresponding T&C...
SYSTEM AND METHOD FOR MAINTAINING COHERENCE OF ASSOCATION ACROSS A NETWORK
ADDRESS CHANGE OR REASSIGNMENT
Network address date groups are defined that are associated with a group of electronic objects. Where network address date groups appear to relate to the same...