At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Systems and methods of identity and access management
The present disclosure generally provides systems and methods of providing identification and access management. The system could include a network security...
Methods and systems for providing comprehensive cyber-security protection
using an open application programming...
Methods of providing cyber-security services to a plurality of customers include providing a platform that includes a software program that is configured to run...
Systems and methods for inhibiting attacks on applications
In accordance with some embodiments of the present invention, systems and methods that protect an application from attacks are provided. In some embodiments of...
Methods and apparatuses for avoiding damage in network attacks
Methods and apparatuses in a client terminal and a web server for enabling safe communication between said terminal and server. When the terminal obtains a web...
Enhanced IPsec anti-replay/anti-DDOS performance
A method for authenticating an Internet Protocol Security (IPsec) packet, wherein the method comprises, receiving the IPsec packet via an input port, performing...
Method and apparatus for controlling access to resources
An approach is provided for controlling access to resources according to social connections and/or characteristics of the resources. An access control platform...
On board vehicle media controller
The present disclosure describes a microprocessor executable media controller operable to receive a media stream from a remote node, the received media stream...
System for managing resources accessible to a mobile device server
A system that incorporates teachings of the present disclosure may include, for example, a non-transitory computer-readable storage medium operating in a mobile...
Method and device for controlling digital living network alliance contents
The present document provides a method and apparatus for controlling digital living network alliance contents. One Media Access Control (MAC) recording unit is...
Self-service terminal (SST) thin client
Self-Service Terminal (SST) thin clients and operation thereof are provided. A SST includes an operating system (OS), and authorized thin-client application,...
System and method for a single request and single response authentication
Various embodiments of a system and method for a single request and single response authentication protocol are described. A client may send to an...
Common internet file system proxy authentication of multiple servers
Techniques are described for a proxy system to provide a client device with transparent access to multiple network file servers. The proxy system may appear to...
Two-way authentication using two-dimensional codes
A system for two-way authentication using two-dimensional codes is provided herein. The system includes a memory and a processor coupled to the memory. The...
Method using a single authentication device to authenticate a user to a
service provider among a plurality of...
A method for authenticating a user to a provider, among a plurality of providers. The method uses an authentication device comprising, for each of provider, a...
CAPTCHA challenge incorporating obfuscated characters
A method for determining if a user of a computer system is a human. A processor receives an indication that a computer security program is needed and acquires...
System and method for biometric protocol standards
An initial certificate is provided that enables an initial two-way secured communication session between a user computing device and a trusted server. An...
Certificate checkin service
A method and system for a content provider to enable the consumption of content by properly entitled consumers (e.g., end-users, clients, customers) within a...
Method and apparatus for sharing wireless network subscription services
A method, apparatus and computer program product are provided for enabling multiple mobile terminals to access a subscription service. The method may further...
System and method for secure content sharing and synchronization
A flexible content sharing system may comprise a network based application built on a client device using information from dissociated user experience component...
In one implementation, a server system receives, from a device of a user, a request to add a credential issued by an organization and authentication information...
System and method for integrating two-factor authentication in a device
A system and method for providing secondary-factor authentication with a third party application that can include enrolling a device application instance of an...
Security device provisioning
The provisioning of a security token object to a user is disclosed. The security token object is used for accessing a computing resource through a mobile...
Authentication apparatus, authentication method, and non-transitory
computer readable medium storing program
An authentication apparatus includes a detection unit that detects whether or not communication with a portable storage medium storing identification...
Secure distribution of non-privileged authentication credentials
An authentication credentials push service (ACPS) that securely pushes non-privileged authentication credentials to registered client entities. The ACPS...
Personal control of personal information
A personal information server provides personal information about an individual to a third-party only when authorized by the individual through use of a...
Method and device for controlling the execution of at least one function
in a short range wireless...
A method and device for controlling the execution of at least one function in a short-range wireless communication module of a mobile apparatus adapted for...
Methods of content-centric networking, a client, a server and a non-transitory computer-readable storage device storing a computer program product are...
DLNA/DTCP stream conversion for secure media playback
A process for converting a DTCP-IP transport stream into HLS format, comprising receiving an encrypted DTCP-IP transport stream comprising DTCP frames at a...
Secure distributed information and password management
A method, performed by a computer device, may include receiving an indication that a first user has acquired rights to access a digital content; generating a...
Secure communication secret sharing
Embodiments are directed to sharing secure communication secrets with a network monitoring device (NMD). The NMD may passively monitor network packets...
Method and apparatus for monitoring transmission characteristics in a
A method for monitoring transmission characteristics in a network including a media client, a media server, and a data processor, the method including...
Security patch without changing the key
A method of patching a cryptographic implementation without changing a key in a cryptographic system, including: sending a message from a first message set to...
System and method for operating on streaming encrypted data
Method for data privacy in a distributed communication system includes: receiving first and second encrypted data from first and second client terminals, each...
Stateless web content anti-automation
A computer-implemented method for coordinating content transformation includes receiving, at a computer server subsystem and from a web server system, computer...
Method for verifying the security of a device that generates private and
public cryptographic keys
A method for verifying the security of a device for generating private and public cryptographic keys. Such a method includes generating at least one pair of...
Embedded module system with encrypted token authentication system
Method and systems for accessing and providing protected content are disclosed herein. An example system includes a client configured to access a third-party...
Secure data parser method and system
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data...
System, apparatus and method for encryption and decryption of data
transmitted over a network
A method and system for securing data transmitted between a client device and a server by obtaining input text at an intermediate module, processing the input...
Method for hiding source of wireless sensor network and node
A method for hiding a source of a wireless sensor network and a node are provided. The method comprises: determining a first node having a shortest distance...
System and methods for protecting confidential data in wireless networks
Systems and methods can detect the unintended transfer of confidential data or confidential information over wireless networks. Further, systems and methods can...
Security key generation for simultaneous multiple cell connections for
A first security context is established between a given user computing device and a first network computing device associated with a first network cell of a...
Device, system and method of maintaining connectivity over a virtual
private network (VPN)
Some demonstrative embodiments include devices, systems and/or methods of maintaining connectivity over a Virtual-Private-Network (VPN). For example, a system...
Firewall policy management
Methods and systems are provided for creation and implementation of firewall policies. Method of the present invention includes enabling a firewall device to...
Locating optimum security gateway
A method, system, and medium are provided for locating an optimal security gateway. A default gateway receives a request to access a macrocell. The default...
Providing notification of spam avatars
Provided are approaches for monitoring activities, movements, and other behavior patterns necessary to determine whether an avatar is a spam advertisement. A...
Information processing apparatus, control method for information
processing apparatus, and storage medium
An information processing apparatus including a network controller which controls communication with an apparatus on a network includes a storage unit...
Apparatus and method to register Wi-Fi clients on a Wi-Fi network
Techniques are provided to enable the registration of an embedded device with a wireless network, such as a Wi-Fi network. An established client of the wireless...
Remote user computer control and monitoring
A computer-implemented monitoring method includes electronically determining destination naming conventions of packets passing out of a first computing device...
Controlling the status of network address space
Methods, computer systems, and computer readable media provide for automated control of the status of network address space. Blocks of networking address space...
Browser based hostname resolution for non-DNS (domain name service) and/or
different DNS environments
Communication between (at least) two domains where domain name resolution for the first domain is not going to be available to clients in the second domain "as...