At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Reverse prefix delegation
Prefix delegation for Internet protocol (IP) prefixes or other types of prefixes. The prefix delegation resulting in multiple prefixes being delegated to...
Multi-access gateway for direct to residence communication services
Different residences can be communicatively linked to a communication backbone via a multi-access gateway, where each residence comprises an adapter through...
Selectively multiplexing incoming WebRTC traffic and/or de-multiplexing
outgoing WebRTC traffic by a...
In an embodiment, a first WebRTC proxy module on a first UE receives a multiplexed stream from a first WebRTC multimedia client application on the first UE. The...
User aliases in a communication system
A technique is disclosed in the context of a communications system whereby parties accessible through the system may be referenced by multiple alternative...
Overlay management protocol for secure routing based on an overlay network
A method for creating a secure network is provided. The method comprises establishing an overlay domain to control routing between overlay edge routers based on...
Method and system for automatically managing secrets in multiple data
security jurisdiction zones
Data security jurisdiction zones are identified and data security policy data for the data security jurisdiction zones is obtained. The data security policy...
Context aware microsegmentation
Context aware microservice networks and contextual security policies for microservice networks are provided herein. In some embodiments, a system includes a...
Secure mobile framework
Systems and methods for a secure mobile framework to securely connect applications running on mobile devices to services within an enterprise are provided....
Conjuring and providing profiles that manage execution of mobile
Various aspects of the disclosure relate to configuring and providing policies that manage execution of mobile applications. In some embodiments, a user...
System and method for compact form exhaustive analysis of security
A system is described that analyzes and validates network security policies associated with network devices. The system includes a compiler and a security...
Controlling access to a software application
A method for controlling access to a software application includes generating a policy machine template based on at least one role and at least one permission...
Encrypted communication apparatus and control method therefor
An encrypted communication apparatus determines a security protocol in IPsec to be applied to an IP packet, and calculates, based on the determined security...
System and method for local protection against malicious software
A method in one example implementation includes intercepting a network access attempt on a computing device and determining a software program file associated...
Server with mechanism for changing treatment of client connections
determined to be related to attacks
According to certain non-limiting embodiments disclosed herein, the functionality of a server is extended with a mechanism for identifying connections with...
Detection of privilege escalation vulnerabilities using bag of words
A method for detecting a privilege escalation vulnerability comprises selecting an address identifier of a web address with secure content. A first response to...
Certification of correct behavior of cloud services using shadow rank
Determining potential harm associated with a network endpoint external to an enterprise includes receiving information about a network-based communication by a...
Systems and methods of risk based rules for application control
In various embodiments, an agent on a digital device may comprise a monitor module, an application identification module, a vulnerability module, a rules...
System and method for correlating log data to discover network
vulnerabilities and assets
The disclosure relates to a log correlation engine that may cross-reference or otherwise leverage existing vulnerability data in an extensible manner to support...
System and method for assessing vulnerability of a mobile device
A system and method for assessing vulnerability of a mobile device including at a remote analysis cloud service, receiving at least one vulnerability assessment...
Traffic anomaly analysis for the detection of aberrant network code
A method for detecting nodes in an enterprise network infected with aberrant code is presented in which traffic conversation information representative of...
Countering security threats with the domain name system
Described herein are methods, systems, and apparatus in which the functionality of a DNS server is modified to take into account security intelligence when...
Modularized database architecture using vertical partitioning for a state
A modularized architecture using vertical partitioning of a database is configured to store object metadata and processing results of one or more objects...
System and method for detection of rogue routers in a computing network
A method and apparatus for detecting the presence of a rogue router in a computer network is described. The method may include transmitting a router...
System and method for providing selective access to a redirected device
In one embodiment, a method includes, by a computing device, receiving identifiers of one or more sessions, users, or groups selected to have access to a...
Identity management and authentication system for resource access
A system that authorizes access to a resource by a client validates the client and generates a Security Assertion Markup Language ("SAML") assertion for the...
Single login authentication for users with multiple IPv4/IPv6 addresses
Disclosed in the authentication and authorization of a client device to access a plurality of resources, requiring a user of a client device to enter only one...
Systems for network risk assessment including processing of user access
rights associated with a network of devices
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for network risk assessment. One of the methods includes...
Systems and methods for network filtering in VPN
Described are systems and methods for managing network packet traffic between a client device and an enterprise server. A list of enterprise-authorized...
Network access and control for mobile devices
Systems, methods, and devices of the various embodiments enable content controls to be implemented by a modem of a mobile device to ensure the controls are...
Transferring services in a networked environment
The computer transitions services from a first user to a second user by receiving a notification of transition of job function from a first user to a second...
Generic proactively-secure secret-sharing protocol from any suitable
honest-majority secret-sharing protocol
Described is system for transforming a SHARE protocol into a proactively secure secret sharing (PSS) protocol. A PREFRESH protocol is performed that includes...
Data driven schema for patient data exchange system
A patient data exchange system comprises at least one device. Each of the devices implements an interface. When a device in the patient data exchange system...
Method for protection of data shared between devices connected in a
network and corresponding apparatus
The invention proposes a method and device for protection of data for devices connected in a network such as a local area network or LAN. The method and device...
Consigning authentication method
A method for sharing content between clients at a common trust level in a trust hierarchy associated with a network implementing policy-based management...
Network access method, authentication method, communications system and
A network access method, an authentication method, a communications system, and relevant devices are provided. The authentication method includes: receiving a...
Runtime API framework for client-server communication
In particular embodiments, a method includes receiving, by a computing device including an import/export framework, encoded client data. The client data may be...
Systems and methods for group authentication
The field of the invention relates to network connected authentication systems, and more particularly to systems and methods that enable authentication of one...
Network resource management system utilizing physical network
identification for privileged network access
The disclosed network resource management system employs a hardware configuration management (HCM) information handling system (IHS) that may couple to a single...
Authentication utilizing a dynamic passcode from a user-defined formula
based on a changing parameter value
An authentication system utilizes dynamic passcode from a user-defined formula based on a changing parameter value. The changing parameter is publicly...
Automated step-up digital certificate installation process
Techniques are disclosed for rapidly securing a server in response to request for a high-assurance digital certificate. As described, a CA may issue a basic...
Secure service delegator
Systems and methods for a secure service delegator. In some embodiments, an Information Handling System (IHS) operated by a manufacturer of a client device...
Method and apparatus for providing an authentication context-based session
An approach is provided for providing separation of authentication protocols and/or authentication contexts for client-server and server-server communication in...
Access control method, access control system, communication terminal, and
An access control method including: receiving a log information item indicating use history of electrical equipment that is used together with an intended...
Information processing system, apparatus, and method
An information processing system, which includes one or more computers, includes a reception part configured to receive a request addressed to a predetermined...
Flexible authentication framework
A flexible and extensible architecture allows for secure searching across an enterprise. Such an architecture can provide a simple Internet-like search...
Captcha systems and methods
Systems and methods for verifying human users through cognitive processes that computers cannot imitate are described herein. Human cognitive language...
Electronic message threat protection system for authorized users
An electronic message threat protection system that incorporates user authorization to ensure that only authorized users receive the benefits of the system's...
Document rendering service
Disclosed are some examples of systems, methods and storage media for generating a platform-independent document. In some implementations, a system is capable...
Authentication of warning messages in a network
There is described herein a device (101) for communicating with a network. The device (101) comprises a communications unit for receiving data, a notification...
Method and device for generating local interface key
A method, a terminal and a communication system are provided for generating a local interface key. In the disclosure, the terminal generates a variable...