At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method and system for generating and authorizing dynamic password
A method and system for generating and authorizing a dynamic password, which relate to the field of identity authentication. The method comprises: a token...
System and a method for validating an identification token
An Identification Device for providing validation information. The Identification Device includes a Token and a Validator. The display is adapted to display,...
Recovery from rolling security token loss
An aspect of recovery from rolling security token loss includes storing, in a memory device accessible by a server computer, a token pair (B) transmitted to a...
Enabling access to a secured wireless local network without user input of
a network password
A method includes identifying, at a security device of a secured wireless network, a wireless-enabled device that is not authorized to access the secured...
Authentication server system for performing control of notifications
during service use, control method, and...
When authentication processing is performed without requesting a user to input authentication information and receiving the authentication information in...
Determination and classification of defense measures in web applications
Techniques for determining classifications of defense measures as described herein. Security tokens are identified to be used to test defense measures of a web...
Authentication of an end user
A method and system for authenticating an end user. A selected subset of root nodes of a set of root nodes in a server mask is received, the selected subset of...
Air interface security method and device
Provided is an air interface security method. In the process of protocol transmission, the method executes: 1) a short-range coupling device sending a security...
Delegation of authorizations from one device to another device is contemplated. The contemplated capabilities may enable an authenticated device to confer...
Device, information processing terminal, information processing system,
display control method, and recording...
A device includes an operation unit; a first processing unit sending a display request; a detection unit detecting a change of an authentication state of a...
Using representational state transfer (REST) for consent management
A framework, which conforms to the OAuth standard, involves a generic OAuth authorization server that can be used by multiple resource servers in order to...
Location service for user authentication
A method and apparatus for location authentication of the user are disclosed. In the method and apparatus, the location of the user is authenticated if one or...
System and method for authentication of a communication device
A system and method for authentication of a communication device is disclosed. A system that incorporates teachings of the present disclosure may include, for...
Methods and apparatus for network communications via a transparent
A data security device for providing a network transport connection via a transparent network proxy that employs different encryption security mediums along a...
Data encryption at the client and server level
Embodiments of the present invention include a computer system and computer program product for implementing encryption of data. A computer system determines...
System and method for encrypting traffic on a network
According to embodiments of the present invention a system and method for encrypting traffic on a network is disclosed. Encrypted data is transmitted between a...
Packet analysis apparatus and method and virtual private network server
A packet analysis apparatus and method and a VPN server, which secure evidence against a situation in which a hacker disguises a packet as a normal packet to...
Data transmission method, system, and apparatus
A data transmission method is applied in a virtual private network (VPN) and includes: querying, by an initiating client, a VPN server for external network...
Intelligent, cloud-based global virtual private network systems and
A method includes connecting to a client at a Virtual Private Network (VPN) device in a cloud system; forwarding requests from the client for the Internet or...
Synchronizing a routing-plane and crypto-plane for routers in virtual
Techniques are presented herein for optimizing secure communications in a network. A router in a virtual private network determines whether or not it has...
System and method for providing secured access to services
A system and method for providing authenticated access to an initiating terminal in relation to the services provided by a terminating terminal via a...
System and method for detecting a compromised computing system
A digital security threat management system is disclosed. The system detects the presence of a computing system, on a network, that has been compromised by an...
Network traffic data scrubbing with services offered via anycasted
Novel tools and techniques for filtering network traffic in an anycasting environment includes receiving network traffic addressed to a plurality of anycasted...
Methods and systems for providing a token-based application firewall
Token-based firewall functionality. A request is received for access to a resource from a remote user device, the request received by an application firewall. A...
Provisioning network access through a firewall
A method may include determining one or more rules and communicating the one or more rules to a firewall, where the firewall receives a data unit and...
Enforcement of network-wide context aware policies
A method implemented in an edge router, the method comprising receiving an authentication request from a device, forwarding the authentication request to an...
Virtual insertion into a network
A network appliance is virtually inserted in a data path within a network. Packet data that matches a criteria is intercepted at a logical point within the data...
Method and apparatus for extending remote network visibility of the push
An approach is provided for extending remote network visibility for push functionality. An application is transmitted, via a push agent, from a first network to...
Watermark generator, watermark decoder, method for providing a watermark
signal in dependence on binary message...
A watermark generator for providing a watermark signal in dependence on binary message data includes an information processor configured to provide, in...
Scalable NAT traversal
A system and method for traversing a firewall for a voice-over-IP session or other communication session uses four main components: a relay agent, and NAT...
Computer program product and system for double IP address recovery
A computer program product and computer system for double IP address recovery. Double IP address is a situation of a same IP address for different hosts in a...
Providing network addresses for network nodes
Methods, systems, and apparatus for providing network addresses are disclosed. In one aspect, a network element device in a telecommunication network includes a...
Handling NAT in logical L3 routing
A non-transitory machine readable medium storing a program that configures first and second managed forwarding elements to perform logical L2 switching and L3...
Method for transferring and storing CPM service message and service
A method is described for transferring a converged IP messaging (CPM) service based message using a server. The server transmits one or more messages via a...
Method and apparatus for propagating address change in an email
There is provided a system, method and computer program product for managing an email comprising a plurality of email boxes with corresponding email addresses;...
Method and apparatus for cross device notifications
A method and apparatus for providing cross device notifications. A cross notification component is provided in multiple devices. In some devices, the cross...
Integration of email and persistent conversations
Systems, methods and computer readable media for persistent conversation and email integration are described. Some implementations can include a method...
Information processing system, linkage server, and information processing
An information processing system 1 includes an acquiring unit 20 that acquires business-operation information in response to a request from a mobile terminal...
User perception of electronic messaging
Determining user use context for electronic messaging and disseminating a subset of the user use context to recipients and/or senders of such electronic message...
Systems and methods for protecting header fields in a message
Embodiments of the systems and methods described herein facilitate the transmitting, receiving, and processing of encoded messages wherein the header fields in...
Fatigue control-based message float-out method, system and instant
Embodiments of the present application relate to a method of controlling float-out messages, a system for controlling float-out messages, an instant messaging...
Instant messaging transcript sharing for added participants to an instant
Embodiments of the present invention address deficiencies of the art in respect to instant messaging and provide a method, system and computer program product...
Data access device and method for communication system
A data access device for a communication system includes: a write controller controlled by the host and outputting a write pointer; a read controller controlled...
Network switch connected to a sensor
A system comprises a rack and a network switch contained in the rack. The switch comprises a plurality of ports. The system further comprises a movable access...
Packet network routing
A line card for use in a router or packet switch is disclosed. A problem with conventional routers or packet switches is that they can take over a second to...
Reliable bulk data dissemination using rateless codes
In one embodiment, an aggregating node receives feedback messages from one or more destination nodes in the network. The destination nodes are designated to...
Compute instance migrations across availability zones of a provider
A provider network may implement compute instance migrations across availability zones. Compute instances may be located in a particular availability zone of...
System and method for distributed management of cloud resources in a
Some embodiments provide a method of managing cloud resources on several of nodes of a hosting system. The method receives a cloud resource configuration. The...
Protection switching over a virtual link aggregation
One embodiment of the present invention provides a switch. The switch comprises one or more ports and a link management module. The link management module...
Sequence number retrieval for voice data with redundancy
A sequence number is used to indicate where a payload of a voice data packet should fit in a data stream and a technique is described for retrieving the...