At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
METHOD, SYSTEM, AND PROGRAM PRODUCT FOR REMOTELY ATTESTING TO A STATE OF A
A method, system, and program product for remotely attesting to a state of computing system is provided. Specifically, the present invention allows a remote...
DISTRIBUTING AN AUTHENTICATION KEY TO AN APPLICATION INSTALLATION
Disclosed are various examples for facilitating distribution of an authentication code to installation of managed applications. An identity certificate is sent...
TECHNOLOGIES FOR VIRTUALIZED ACCESS TO SECURITY SERVICES PROVIDED BY A
CONVERGED MANAGEABILITY AND SECURITY ENGINE
Technologies for secure access to platform security services include a computing device having a processor and a security engine. The computing device...
CERTIFICATION MANAGEMENT SYSTEM
A certification management system helps an organization develop and maintain a repository of current certification status of employees. The system may...
UNIVERSAL ENROLLMENT USING BIOMETRIC PKI
A system may obtain identification information for a user for obtaining a form of access using universal enrollment. The system may obtain a digital...
SECUREDINTER-APPLICATION COMMUNICATION IN MOBILE DEVICES
This disclosure describes a method for accessing network resources which includes receiving by a first application in a mobile computing device sign-in...
METHOD AND APPARATUS FOR IDENTITY AUTHENTICATION BETWEEN SYSTEMS
Embodiments of the disclosure provide a method and apparatus for identity authentication between systems. The method includes: determining, by an authorization...
SESSION ACTIVITY TRACKING FOR SESSION ADOPTION ACROSS MULTIPLE DATA
Techniques are disclosed for managing session activity of SSO access across multiple data centers. Session activity of SSO access is managed across multiple...
User Identifier Based Device, Identity and Activity Management System
The present disclosure generally relates to user and device Authentication. More specifically, the present disclosure relates to a technique of single sign-on...
TOKENIZATION USING MULTIPLE REVERSIBLE TRANSFORMATIONS
Technologies for tokenizing data including a computing device to extract plaintext data from an input file to be tokenized. The computing device performs data...
The present invention relates to a computer network that provides secure authentication. The computer network comprises a server operable to generate a token...
METHOD AND SYSTEM FOR DETERMINING VALUE OF AN ACCOUNT
A method for protecting stored account data from unauthorized access includes receiving data elements corresponding to an account of a user, identifying a...
ELECTRONIC DEVICE THAT EXECUTES OPERATION CORRESPONDING TO REQUEST FROM
REMOTE LOCATION, ELECTRONIC DEVICE...
An electronic device includes an operating device, a communication device, and a control section. The control section includes a login control section and an...
SYSTEMS AND METHODS FOR AUTHENTICATING USING AIR-BLOW BY USER
The disclosure related generally to systems and methods for authenticating using air-blow by user. At least one input device receives one or more air-blows...
AUTHENTICATION APPARATUS THAT AUTHENTICATES USER
Provided is an authentication apparatus that performs user authentication, using a wearable terminal worn by a user, whereby allowing a high security to be...
AUTHENTICATION SPECIFIC DATA
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium for managing authentications and processing authenitcation...
SERVER CAPABLE OF PERFORMING AUTHENTICATION WITH SIMPLIFIED AND SECURE
SCHEME THAT USERS WHO OPERATE TERMINALS...
A server which can communicate with a plurality of terminals includes an information obtaining unit obtaining position information of each terminal and...
Electronic Discovery Insight Tool
An electronic discovery insight tool is presented. The tool is implemented in an apparatus comprising one or more processors, one or more memories...
LEARNED ROVING AUTHENTICATION PROFILES
Disclosed herein are systems and methods for determining learned associations between authentication credentials and network contextual data, such as may be...
System and Method for Centralized Configuration and Authentication
A system and method for efficiently obtaining user configuration information for a given device. Multiple devices are deployed in an environment and may be...
PROTECTING SENSITIVE DATA IN A SECURITY AREA
Managing data security on a mobile device. Data associated with a mobile device is received; the data includes an identification (ID) of the mobile device and...
COMMUNICATING PRIVATE DATA AND DATA OBJECTS
In some implementations, a method includes establishing a communication channel with a server via an internet protocol (IP) network interface. The method also...
BINDING A TRUSTED INPUT SESSION TO A TRUSTED OUTPUT SESSION
According to an embodiment provided herein, there is provided a system that binds a trusted output session to a trusted input session. The system includes a...
SECURED NETWORKS AND ENDPOINTS APPLYING INTERNET PROTOCOL SECURITY
A method of managing secure communications states in an endpoint within a secure network is disclosed. The method includes, in a disconnected state,...
SYSTEM, APPARATUS AND METHOD FOR ENCRYPTION AND DECRYPTION OF DATA
TRANSMITTED OVER A NETWORK
A method and system for securing data transmitted between a client device and a server by obtaining input text at an intermediate module, processing the input...
Tokenization of Structured Data
Structured data, such as email addresses, social security numbers, and the like is accessed for encoding. A set of encoding rules including one or more...
REMOTE MONITORING AND MANAGEMENT OF AN INSTANT ISSUANCE SYSTEM
A system and method for remote monitoring and management of an instant issuance system is provided. The embodiments provide secure communication between...
METHOD FOR TRANSMITTING ENCRYPTED DATA, METHOD FOR RECEIVING,
CORRESPONDING DEVICES AND COMPUTER PROGRAMS
The invention relates to a method for transmitting data from a first terminal, called a sender terminal (TermE), to a second terminal, called a receiver...
DISTRIBUTED COMPUTING UTILIZING HOMOMORPHIC ENCRYPTION
A method for determining a compute amount contributed by a device is provided. The method comprises receiving encrypted data from a processor of a customer...
MENTION IDENTIFICATION FOR UNTRUSTED CONTENT
In some embodiments of the invention a method provides for processing a mention in textual content being input to a content provider. The method can include...
ENTERPRISE REPUTATIONS FOR UNIFORM RESOURCE LOCATORS
There is disclosed in an example a computing apparatus configured to operate as an enterprise threat intelligence server, and including: a network interface...
Single Solution for User Asset Control
A system provides a way for a person to control access to digital assets, including financial accounts, through a common gateway that can interact on the...
Domain Name Service Redirection for a Content Delivery Network with
Security as a Service
In one implementation, a cloud connector obtains location information for a proxy server of a security as a service (SecaaS) function. The cloud connector...
BROADBAND ACCESS FOR VIRTUAL PRIVATE NETWORKS
An apparatus receives an upper layer packet that includes data from a source device, a virtual private network (VPN) identification, a destination address, and...
VIRTUAL ROUTING AND FORWARDING (VRF) FOR ASYMMETRICAL VIRTUAL SERVICE
PROVIDER (VSP) TUNNELS
In one embodiment, a device in a network maintains first and second routing tables associated with a virtual private network (VPN) tunnel. The first and second...
METHOD AND APPARATUS FOR APPLICATION AWARENESS IN A NETWORK
A method for enforcing a network policy is described herein. In the method, a network socket event request from an application executing in a first context is...
REAL-TIME AGREEMENT ANALYSIS
Techniques for informing a user about an agreement including agreement terms and trustworthiness of data source are described herein. In some examples, a...
CONTROLLING THE SPREAD OF INTERESTS AND CONTENT IN A CONTENT CENTRIC
One embodiment of the present invention provides a system for controlling the spread of interests and content in a content centric network (CCN). During...
SYSTEMS AND METHODS FOR DETECTING UNDESIRABLE NETWORK TRAFFIC CONTENT
A method of detecting a content desired to be detected includes receiving electronic data at a first host, determining a checksum value using the received...
GENERATING NETWORK DEVICE NAMES
A method for naming devices in a network is described herein. The method includes receiving, via a processor, device information associated with a device, a...
A media session is established between a first endpoint and a second endpoint, by transmitting the following messages from the first endpoint in parallel: to...
Media Relay Server
An input of a media relay server is configured to receive multiple media streams from a network via the same port simultaneously, each stream being directed to...
System and Method For Logging Communications
A method for logging communication includes determining when a target user is active and identifying an access device and private Internet Protocol (IP)...
NETWORK TRANSMISSION METHOD AND NETWORK TRANSMISSION SYSTEM FOR A
MULTI-LAYER NETWORK ADDRESS TRANSLATOR STRUCTURE
A peer-to-peer server sends a first internal internet protocol (IP) address and a first internal port number of a first node to a second node, and sends a...
Method and Device for Processing IPv6 Address, and DHCPv6 Relay Equipment
Provided are a method and device for processing an IPv6 address, DHCPv6 relay equipment and a DHCPv6 server. The method includes that: an IPv4 information...
WIRELESS ACCESS GATEWAY
A wireless network including a wireless access gateway (WAG) and methods are provided for routing traffic between non-cellular and cellular networks. The WAG...
ENHANCED CACHING OF DOMAIN NAME SYSTEM (DNS) AND REVERSE DNS QUERIES FOR
TRAFFIC MANAGEMENT FOR SIGNALING...
Methods, systems, and non-transitory computer readable media for enhanced domain name system (DNS) caching are disclosed. According to one aspect, a method for...
ENHANCED INTER-NETWORK MONITORING AND ADAPTIVE MANAGEMENT OF DNS TRAFFIC
Systems and methods for enhanced monitoring and adaptive management of inter-network Domain Name System ("DNS") traffic include an information capture device...
COMMUNICATION MESSAGE CONSOLIDATION WITH CONTENT DIFFERENCE FOMATTING
A set of similar messages addressed to a user is detected. Redundantly similar portions of the set of similar messages and a progressive set of differences...
Device and Method for Temporal Correlation of Communication Types
A device and method temporally correlates communication types. The method performed by a first electronic device includes receiving a first message in a first...