At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Management of certificate authority (CA) certificates
Systems and methods for automatically installing CA certificates received from a network security appliance by a client security manager to make the CA...
System and method for establishing trust using secure transmission
A system, apparatus, method, and machine readable medium are described for establishing trust using secure communication protocols. For example, one embodiment...
System and method to enable PKI- and PMI- based distributed locking of
content and distributed unlocking of...
A central server configured with an Attribute Authority ("AA") acting as a Trusted Third Party mediating service provider and using X.509-compatible PKI and...
Remote management interface using credentials associated with respective
access control intervals
A processing device comprises a processor coupled to a memory and is configured to obtain a credential associated with a particular access control interval, to...
Multi-factor secure appliance decommissioning
A network-based appliance includes a mechanism to erase data on the appliance's local storage. The appliance's normal system reset operation is overridden to...
Techniques for managing credentials in a distributed computing environment
Systems and methods for managing credentials distribute the credentials to subsets of a set of collectively managed computing resources. The collectively...
Method and system for determining value of an account
A system determines a value of an online account, and uses that value to identify a security-related mechanism for the account. The system determines the...
Secure storage and retrieval of data in a database with multiple data
classes and multiple data identifiers
Secure storage and retrieval of data is provided with multiple data classes and data identifiers. Data values of a client are stored by receiving one or more...
Provisioning a mobile device with a security application on the fly
A technique provisions a mobile device (e.g., a smart phone, a tablet, a personal digital assistant, etc.) with a security application on the fly. The technique...
Method for using a remote secure device to authenticate a client device to
access a remote service
The invention relates to a method for a client device (2) to access to remote secure data on a remote secure device (1), said secure data being associated to a...
Information processing system, information processing apparatus, and
An information processing system, which is implemented by one or more information processing apparatuses, includes a first receiving unit configured to receive...
Providing enhanced access to remote services
Techniques are described for providing client computing nodes with enhanced access to remote network-accessible services, such as by providing local...
Protection of a secret on a mobile device using a secret-splitting
technique with a fixed user share
A method includes (1) receiving, by a mobile computing device (MCD), user-specific data from a user, (2) processing (a) a user share of a cryptographic key, the...
Load balancing hash computation for network switches
Techniques to avoid polarization in a communication network include a network switch or device having a first interface to receive a data unit or packet, and a...
Load balancing hash computation for network switches
A data unit is received at a network device associated with a link aggregate group. An initial key is determined based on information included in the data unit....
Secure and rapid networking configuration of information handling systems
A near field communication device, such as an RFID wand, transmits network configuration information to non-volatile memory of a networking device while the...
Guest WiFi authentication based on physical proximity
The present disclosure discloses a system and method for providing guest WiFi authentication based on physical proximity to a dedicated access point in a guest...
Long term encrypted storage and key management
An encryption key not accessible outside a data storage device can be used to encrypt data stored in that device. The received data may have been encrypted...
Protecting memory interface
An apparatus includes an interface and logic circuitry. The interface is configured to communicate over a communication link. The logic circuitry is configured...
System, method and apparatus for securely distributing content
System, method and apparatus for securely distributing content via an encrypted file wherein a Publisher Key (PK) associated with an authorized publisher...
Secure application delivery system with dynamic stitching of network
connections in the cloud
A system is provided to deliver an application, hosted by a private application provider, over a network to a user device comprising: an application delivery...
Method of connecting security gateway to mesh network
In this invention we disclose methods for incorporating a security gateway within a wireless mesh network. In one embodiment, the wireless mesh network is a...
Credentials management in large scale virtual private network deployment
Techniques for credentials management in large scale virtual private network (VPN) deployment are disclosed. In some embodiments, credentials management in...
Map sharing for a switch device
A method of implementing map sharing for a network switch appliance, the network switch appliance having a plurality of network ports and a plurality of...
Load balancing in a network with session information
Methods and systems for balancing load among firewall security devices (FSDs) are provided. According to one embodiment, session data, including session entries...
Customizable storage controller with integrated F+ storage firewall
A Customizable Storage Controller (CSC) is a software defined storage device controller, a replacement for the ASIC storage controller approach that has been...
Remote diagnosis system and method and printing machine having the system
A system and a method initiate a data transmission from a first computer to at least a second computer or approve access to the data on a first computer by a...
Router chip and method of selectively blocking network traffic in a router
A router chip is proposed which comprises a central processing unit, a plurality of network interface circuitry, and a firewall circuitry coupled between the...
Method for setting functional module name of mobile terminal, and mobile
The embodiment of the present document discloses a method for setting functional module names of a mobile terminal, which includes: setting the name of a mobile...
Apparatus and method for web forwarding
An apparatus and method for forwarding a web address to another web address is presented. A web forwarder receives a request destined to a first web address...
System and method for implementing traffic optimization for overlay
A proxy apparatus includes a processor and a memory storing instructions executed by the processor to determine whether a received packet has a corresponding...
Method for processing telephony sessions of a network
A method for processing telephony sessions of a network including at least one application server and a call router, the method including the steps of assigning...
Reducing proliferation of network-to-link-layer address resolution
In one embodiment, the processing by a packet switching device of a received network-to-link-layer address resolution request message (e.g., Address Resolution...
Apparatus and method of enabling to transceive data using a plurality of
heterogeneous networks selectively...
The mobile communication terminal capable of accessing to a plurality of heterogeneous networks selectively, according to the present invention, comprises a...
Server for providing unified communications
A unified communication server or Client Application Server (CAS) comprises a client communication module, a status determination module, an operation...
Aggregating likes to a main page
In one embodiment, a method includes accessing a social graph of a social-networking system, and determining, from the social graph, that a user "likes" a first...
Reply email clarification
A method and system for clarifying reply communications is provided. The method includes receiving an email comprising first data and generating a reply email...
Systems and methods for message collection
The invention provides systems and methods for processing communication content from a user device. The method performed by a computer and comprising inputting...
Conversation timeline for heterogeneous messaging system
A conversation timeline for a heterogeneous messaging system. In one embodiment, a method performed by one or more computing devices comprises: maintaining a...
System and method for detecting unwanted content
A system and method for detecting unwanted electronic content, such as spam. As a user operates an application to send messages, several metrics are tracked to...
Information processing apparatus and information processing method
An information processing apparatus includes a generating unit configured to generate a message log including a plurality of messages sent from a device, a...
Most recently used list for attaching files to messages
A user may select an attachment for an electronic message from a most recently used (MRU) list of files. For example, when a user is composing an electronic...
Streaming methods and systems for network devices
A system and method are disclosed for processing commands to network target devices through a SCSI router in a Fiber Channel network having a plurality of Fiber...
Distributed packet switch having a wireless control plane
A packet network device such as a network switch includes a number of functional cards or chassis modules at least some of which are connected to both an...
Network relay device
A network relay device capable of shortening retrieval time for an address table or reducing a capacity of the address table is provided. When a...
Remote port mirroring
A switch that facilitates remote port mirroring is described. The switch can include an encapsulation mechanism and a forwarding mechanism. The encapsulation...
Forwarding inter-switch connection (ISC) frames in a network-to-network
Systems, mechanisms, apparatuses, and methods are disclosed for forwarding Inter-Switch Connection (ISC) frames in a Network-to-Network Interconnect (NNI)...
Flexible deterministic binary scheduler
A method for allocating port assignments for transmitting a reserved network stream across a network node comprises determining a cycle time associated with a...
Conflict detection and resolution in an ABR network using client
A scheme for managing conflict resolution in an ABR streaming environment with respect to a bandwidth pipe serving a customer premises. In one aspect, when a...
Load balancing between processors
Disclosed are various embodiments for facilitating load balancing between a first processor and a second processor in at least one computing device. A request...