At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
System and method for a storage area network virtualization optimization
A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming...
Hardware identification through cookies
Multiple cookies of a client device are used to form an identifier of the client device such that a change in one or even several browser cookies does not...
Discovery of familiar claims providers
Aspects of the subject matter described herein relate to identity technology. In aspects, profile data is mined to determine claims providers with which a user...
Method and system for distinguishing humans from machines
A method and an apparatus for distinguishing humans from computers. During user registration, a computer prompts a human user to provide a spoken response to...
System and method for performing commands from a remote source
According to one embodiment of the invention, a method for secured execution of commands is described. Initially, a second electronic device authenticates a...
Adaptive timeouts for security credentials
Session-specific information stored to a cookie or other secure token can be selected and/or caused to vary over time, such that older copies will become less...
Systems and methods for providing a covert password manager
The present invention relates to an application that is configured to provide secure access to confidential information. To protect the confidential...
System and method for authentication
The purpose of the invention is to provide a password with lower cost but higher safety used in an authentication system, and users may choose one specific...
Spatial and temporal verification of users and/or user devices
Approaches for facilitating spatial and temporal verification of users and/or user devices are disclosed. In some implementations, a user device may be detected...
Device certificate based appliance configuration
Embodiments of the present invention address deficiencies of the art in respect to configuring a computing appliance and provide a method, system and computer...
Multi user device management system
Disclosed is a personal device container system. The personal device container system typically includes a processor, a memory, and an access management module...
Secure on-line sign-up and provisioning for Wi-Fi hotspots using a device
Embodiments of a mobile device and method for secure on-line sign-up and provisioning of credentials for Wi-Fi hotspots are generally described herein. In some...
Once only distribution of secrets
A secret distribution system may disclose a secret once to a client computing resource while maintaining the privacy of the message and allowing for recovery...
Authentication methods and apparatus
Methods and apparatus for authenticating a user equipment device (UE) requesting services through a session border controller (SBC) are described. In some...
Role-based access control using dynamically shared cloud accounts
A server computer system within a network of an organization receives a request from a user to access a cloud account. The request includes a user identifier....
Conditional request processing
A method and system for processing a request is provided. An example system includes a security module that authenticates a request from a client. The system...
Mechanism for facilitating remote access of user and device credentials
for remoting device activities between...
A mechanism is described for facilitating remote access of device and user credentials for at computing devices according to one embodiment of the invention. A...
Multi-platform single sign-on database driver
Systems and methods of performing single sign-on authentication from multiple platforms when establishing a connection to a database are described. An...
Call encryption systems and methods
Techniques described herein may be used to encrypt a telephone call between users. User devices (e.g., smart phones) may be connected to encryption relay...
Method for providing a service based on tag information, and corresponding
tag and tag reading device
A method for providing a service by a server to a reader device is disclosed, the provision being based on the readout information of a readout operation by the...
Early content engine receiver synchronization
An HDCP receiver device that receives frames from an HDCP transmitter device. The receiver device has a frame counter that is updated for each frame that is...
Establishing an initial root of trust for individual components of a
distributed security infrastructure
The embodiments described herein describe technologies for a device definition process to establish a unique identity and a root of trust of a cryptographic...
System and method of encrypted transmission of web pages
Disclosed are systems and method for encrypted transmission of web pages. One exemplary method comprises: receiving, by a proxy server, a web page requested by...
Communication system, management server, server, concentrator, and
encryption setting method
After an IP address of a concentrator is changed by a management server (management platform), a server and the concentrator acquire the changed IP address of...
Computer implemented system and method for ahead-of-time delivery of
A computer implemented system, method and a computer program product for ahead of time delivery of electronic content, have been provided. A file policy...
Encoding data using a variable number of pixels and bits based on entropy
Electronic information is encoded and transmitted by comparing values of adjacent pixels in an electronic image, determining an amount of entropy present in...
Information management system, information processing device, and
non-transitory computer readable medium
An information management system includes an information processing device, and an information management device that prepares log information indicating a...
Security verification by message interception and modification
Data security is enhanced by injecting insecurity into communications between two computer systems to test one of the computer systems. The insecurity is...
Network-enabled device provisioning
Systems, devices, and techniques for network-enabled device provisioning are disclosed herein. In some embodiments, a network-enabled device may include: a...
Policy-based access control in content networks
Systems and techniques for policy-based access control in content networks are herein described. Content and metadata describing the content may be encrypted by...
Extensible personality-based messaging system in a distributed
computerized infrastructure for establishing a...
An extensible personality-based secure messaging infrastructure deployed in a computerized system comprising at least one central processing unit, a memory, a...
Adaptive communication anonymization
A method identifies anonymized parties in a transmitted communication. A sender replaces one or more communication party identifiers in control data within a...
Adaptive communication anonymization
A system and computer program product identifies anonymized parties in a transmitted communication. A sender replaces one or more communication party...
Synchronizing a routing-plane and crypto-plane for routers in virtual
Techniques are presented herein for optimizing secure communications in a network. A router in a virtual private network determines whether or not it has...
Anti-replay mechanism for group virtual private networks
A virtual private network (VPN) device is described that provides a strict anti-replay mechanism for packets in a group VPN. An example first VPN device...
Dynamically defined virtual private network tunnels in hybrid cloud
A plurality of virtual private network (VPN) tunnels between a first cloud and a second cloud in a hybrid cloud environment are managed by a VPN Manager. A...
Systems and methods for fine grain policy driven clientless SSL VPN access
The present disclosure provides solutions that may enable an enterprise providing services to a number of clients to determine whether to establish a client...
Remote credential management for hybrid clouds with enterprise networks
A system and method of initializing a virtual machine within a secure hybrid cloud is disclosed. One method includes transmitting service mode credentials to a...
Dynamic re-ordering of scanning modules in security devices
A method and apparatus are provided for preserving bandwidth of a security gateway by dynamically placing a module with a highest ratio of block rate to...
Kernel-level security agent
A kernel-level security agent is described herein. The kernel-level security agent is configured to observe events, filter the observed events using...
Deploying a security policy based on domain names
A firewall uses a variety of techniques to obtain a useful domain name from a network request, that is, a domain name that facilitates the accurate enforcement...
Creating network isolation between virtual machines
A method, system, and program product for creating network isolation between virtual machines is provided, including receiving, by a security virtual machine...
Detecting and correcting network interruptions using network address
Embodiments provide a network address translation (NAT) service for network devices. A network connection from at least one private network device to the NAT...
Technique for operating a vehicle effectively and safely
A control system is employed in a vehicle to assist a user to operate the vehicle effectively and safely. In accordance with the invention, the system provides...
Address assignment protocol
Exemplary embodiments of the present invention provide a method comprising receiving, at a node, an address assignment message, allocating, by the node, a...
System and method for accessing information
A mobile terminal accesses global DNS server using a URI of a resource in an intranet. The global DNS server returns an IP address of an intranet domain access...
Messaging media to go viral
Systems and techniques are disclosed for transmitting a message via one or more platforms, the messages being associated with media content and/or related media...
Unified messaging system and method with integrated communication
applications and interactive voice recognition
A method and apparatus for a computer and telecommunication network which can receive, send and manage information from or to a subscriber of the network, based...
Building a proximate social networking database based on relative distance
profiling of two or more operably...
Computer systems and methods for generating a social network of users based on the users' devices being operably coupled are discussed herein. Specifically,...
Mobile device message enabled on-line community bulletin board
A community information sharing system, method and program product therefore. A communications network with connected communications devices serves community...