СПИСОК патентов США - подгруппа МПК16 H04L12/22
|
|
| № п/п | Номер патента | Название патента | |||
2017 | |||||
| 1 | 9602481 | Generation of short key for communications | |||
| 2 | 9594895 | Information processing system and authentication information providing method for providing authentication information of an external service | |||
| 3 | 9559820 | Feedback reporting based on channel state information reference signal (CSI-RS) groups | |||
| 4 | 9548935 | Systems and methods for providing content and services on a network system | |||
| 5 | 9537910 | Communication and action approval system and method | |||
| 6 | 9537828 | Secure mobile communication relay having firewall function | |||
2016 | |||||
| 7 | 9516048 | Contagion isolation and inoculation via quarantine | |||
| 8 | 9512659 | Code hopping based system with increased security | |||
| 9 | 9478112 | Video monitoring and alarm verification technology | |||
| 10 | 9455955 | Customizable storage controller with integrated F+ storage firewall protection | |||
| 11 | 9414225 | User equipment having web real time communication architecture | |||
| 12 | 9386004 | Peer based authentication | |||
| 13 | 9374278 | Graphic user interface based network management system to define and execute troubleshooting procedure | |||
| 14 | 9276904 | Specifying point of enforcement in a firewall rule | |||
| 15 | 9264402 | Systems involving firewall of virtual machine traffic and methods of processing information associated with same | |||
| 16 | 9240935 | Communication system | |||
| 17 | 9237139 | Controlling access to a secure resource based on user credentials and location | |||
2015 | |||||
| 18 | 9143531 | Method and apparatus for a master privacy policy mechanism in a communications network | |||
| 19 | 9124581 | Industrial automation system and method for safeguarding the system | |||
| 20 | 9124502 | Method and apparatus of determining blocking in ring network | |||
| 21 | 9104488 | Support server for redirecting task results to a wake-up server | |||
| 22 | 9083683 | Encryption/decryption device for secure communications between a protected network and an unprotected network and associated methods | |||
| 23 | 9064394 | Virtual sensors | |||
| 24 | 9049023 | Outsourcing the decryption of functional encryption ciphertexts | |||
| 25 | 8973151 | Portable security device and methods for secure communication | |||
| 26 | 8972736 | Fully authenticated content transmission from a provider to a recipient device via an intermediary device | |||
| 27 | 8948001 | Service plane triggered fast reroute protection | |||
| 28 | 8938784 | Authorization of server operations | |||
| 29 | 8937661 | Video monitoring and alarm verification technology | |||
| 30 | 8935777 | Login using QR code | |||
2014 | |||||
| 31 | 8918632 | Methods for analyzing application privacy and devices thereof | |||
| 32 | 8893252 | Wireless communication selective barrier | |||
| 33 | 8863284 | System and method for determining a security status of potentially malicious files | |||
| 34 | 8844057 | Analyte data retriever | |||
| 35 | 8813236 | Detecting malicious endpoints using network connectivity and flow information | |||
| 36 | 8810657 | Video monitoring and alarm verification technology | |||
| 37 | 8793489 | Method and system for controlling data access to organizational data maintained in hierarchical | |||
| 38 | 8776242 | Providing a malware analysis using a secure malware detection process | |||
| 39 | 8752200 | Devices, systems and methods for security using magnetic field based identification | |||
| 40 | 8745722 | Managing remote network addresses in communications | |||
| 41 | 8745387 | Security management for an integrated console for applications associated with multiple user registries | |||
| 42 | 8689350 | Behavioral fingerprint controlled theft detection and recovery | |||
| 43 | 8683200 | Method and apparatus for implementing digital rights management | |||
| 44 | 8675071 | Video monitoring and alarm verification technology | |||
| 45 | 8667276 | Method and apparatus for article authentication | |||
| 46 | 8656482 | Secure communication using a trusted virtual machine | |||
| 47 | 8646030 | Method and apparatus for master privacy policy mechanism in a communications network | |||
| 48 | 8640255 | Authorization of server operations | |||
| 49 | 8640229 | Token-based security for links to media streams | |||
| 50 | 8630413 | Digital contents reproducing terminal and method for supporting digital contents transmission/reception between terminals according to personal use scope | |||
2013 | |||||
| 51 | 8615809 | System and method for website authentication using a shared secret | |||
| 52 | 8613089 | Identifying a denial-of-service attack in a cloud-based proxy service | |||
| 53 | 8578468 | Multi-factor client authentication | |||
| 54 | 8572366 | Authenticating clients | |||
| 55 | 8526614 | Method to manage members of at least one group of decoders having access to broadcast data | |||
| 56 | 8520072 | Video monitoring and alarm verification technology | |||
| 57 | 8458461 | Methods and apparatus for performing authentication and decryption | |||
| 58 | 8442232 | Deleting confidential information used to secure a communication link | |||
| 59 | 8429719 | Interworking between first and second authentication domains | |||
| 60 | 8418242 | Method, system, and device for negotiating SA on IPv6 network | |||
| 61 | 8411861 | Apparatus, systems, and methods for checking if a receiver is on a revocation list based on SRMs of DVDs | |||
| 62 | 8381282 | Portable security device and methods for maintenance of authentication information | |||
| 63 | 8353022 | Bilateral communication using multiple one-way data links | |||
| 64 | 8345872 | Digital local network, notably digital home network, and method for creating and updating such a network | |||
2012 | |||||
| 65 | 8336111 | Communication device and method for securing data | |||
| 66 | 8266422 | Network security processing method and system for selecting one of software and hardware cryptographic modules by means of multimedia session information | |||
| 67 | 8165020 | Network interface system with filtering function | |||
| 68 | 8130964 | Systems and methods for identity-based encryption and related cryptographic techniques | |||
2011 | |||||
| 69 | 8068414 | Arrangement for tracking IP address usage based on authenticated link identifier | |||
| 70 | 8065723 | Network communication device | |||
2010 | |||||
| 71 | 7852756 | Network interface system with filtering function | |||
| 72 | 7848286 | Wireless local area network (WLAN) and channel selection method of WLAN station | |||
| 73 | 7814531 | Detection of network environment for network access control | |||
| 74 | 7797754 | Dynamic control of authorization to access internet services | |||
| 75 | 7739747 | Dynamic control of authorization to access internet services | |||
| 76 | 7739738 | Enabling clean file cache persistence using dual-boot detection | |||
| 77 | 7725947 | Methods and systems for providing benchmark information under controlled access | |||
| 78 | 7649995 | Method and device for authenticating MS that has an R-UIM by using CAVE algorithm | |||
| 79 | 7647622 | Dynamic security policy through use of empirical security events | |||
2009 | |||||
| 80 | 7617400 | Storage partitioning | |||
| 81 | 7567510 | Security groups | |||
| 82 | 7565686 | Preventing unauthorized loading of late binding code into a process | |||
| 83 | 7555773 | Methods and apparatus to provide a platform-level network security framework | |||
2008 | |||||
| 84 | 7457278 | Terminal connection device, connection control device, and multi-function telephone terminal | |||
| 85 | 7451486 | Stateful and cross-protocol intrusion detection for voice over IP | |||
| 86 | 7437556 | Global visibility controls for operating system partitions | |||
| 87 | 7411981 | Matching of radius request and response packets during high traffic volume | |||
| 88 | 7370365 | Dynamic control of authorization to access internet services | |||
| 89 | 7367045 | Trusted communications system | |||
| 90 | 7353385 | Authentication system, authentication method, authentication apparatus, and authentication method therefor | |||
| 91 | 7349340 | System and method of monitoring e-service Quality of Service at a transaction level | |||
2007 | |||||
| 92 | 7313092 | Apparatus and method for an overload control procedure against denial of service attack | |||
| 93 | 7302567 | Technical facility having software stored on a computer of the technical facility | |||
| 94 | 7266118 | Packet receiving apparatus and packet transmission method | |||
| 95 | 7243235 | Mandatory access control (MAC) method | |||
| 96 | 7236460 | Detecting a counterfeit access point in a wireless local area network | |||
| 97 | 7228412 | Bufferless secure sockets layer architecture | |||
| 98 | 7227840 | High performance probabilistic rate policer | |||
| 99 | 7218613 | Method and apparatus for in context mediating common channel signaling messages between networks | |||
| 100 | 7174461 | Information providing system, apparatus and method, and program storing medium | |||
| 101 | 7158521 | Synchronization system and synchronization method of multisystem control apparatus | |||
2006 | |||||
| 102 | 7139644 | Process and system for transmitting information on an aircraft | |||
| 103 | 7123604 | Mobile IP communication scheme incorporating individual user authentication | |||
| 104 | 7085235 | Method and apparatus for constructing and searching IP address | |||
| 105 | 7069451 | Systems and methods for secure transaction management and electronic rights protection | |||
| 106 | 7062781 | Method for providing simultaneous parallel secure command execution on multiple remote hosts | |||
2005 | |||||
| 107 | 6901051 | Server-based network performance metrics generation system and method | |||
2004 | |||||
| 108 | 6678828 | Secure network file access control system | |||
2003 | |||||
| 109 | 6539482 | Network access authentication system | |||
| 110 | 6532406 | Vehicle computer system | |||
2002 | |||||
| 111 | 6487657 | Data communication network | |||
| 112 | 6484258 | Access control using attributes contained within public key certificates | |||
| 113 | 6385729 | Secure token device access to services provided by an internet service provider (ISP) | |||
2001 | |||||
| 114 | 6297729 | Method and apparatus for securing communications along ac power lines | |||
| 115 | 6272640 | Method and apparatus employing an invalid symbol security jam for communications network security | |||
| 116 | 6199165 | Method and apparatus for secure data communication | |||
2000 | |||||
| 117 | 6055634 | Secure internal communication system | |||
| 118 | 6014569 | Mobile interactive radio | |||
1999 | |||||
| 119 | 6006330 | Security device for ring network | |||
| 120 | 5961646 | Method and apparatus employing an invalid symbol security jam for communications network security | |||
| 121 | 5870479 | Device for processing data packets | |||
| 122 | 5867776 | Receiver for receiving text-based multiplex broadcasts | |||
1998 | |||||
| 123 | 5822433 | Method, system and subscriber facility for manipulation-proof separation of message streams | |||
| 124 | 5757922 | Method and system for packet scrambling communication with reduced processing overhead | |||
| 125 | 5754525 | Programmable delay of disrupt for secure networks | |||
1997 | |||||
| 126 | 5699426 | Video data bus communication system and method | |||
| 127 | 5661807 | Authentication system using one-time passwords | |||
| 128 | 5654985 | Address tracking over repeater based networks | |||
| 129 | 5640393 | Multiple address security architecture | |||
| 130 | 5602916 | Method and apparatus for preventing unauthorized monitoring of wireless data transmissions | |||
| 131 | 5592553 | Authentication system using one-time passwords | |||
1996 | |||||
| 132 | 5581559 | Inverse packet disrupt for secure networks | |||
| 133 | 5559883 | Method and apparatus for secure data packet bus communication | |||
| 134 | 5548646 | System for signatureless transmission and reception of data packets between computer networks | |||
| 135 | 5539737 | Programmable disrupt of multicast packets for secure networks | |||
| 136 | 5537099 | Receiving port security in a network concentrator | |||
| 137 | 5489896 | Network with a security capability | |||
1995 | |||||
| 138 | 5471459 | Method and apparatus for supervising access and protecting against unauthorized access in a communication metwork | |||
| 139 | 5457737 | Methods and apparatus to verify the identity of a cellular mobile phone | |||
| 140 | 5455828 | Carrier sensing multiple access/collision detection local area networks | |||
| 141 | 5440618 | System for checking the access to the data of a data unit | |||
| 142 | 5400334 | Message security on token ring networks | |||
| 143 | 5386470 | Repeaters for secure local area networks | |||
1994 | |||||
| 144 | 5353353 | Repeater security system | |||
| 145 | 5321747 | Method and apparatus for preventing extraneous detection of signal information | |||
1993 | |||||
| 146 | 5216713 | Method and apparatus for preventing extraneous detection of signal information | |||
| 147 | 5199072 | Method and apparatus for restricting access within a wireless local area network | |||
| 148 | 5181238 | Authenticated communications access service | |||
1992 | |||||
| 149 | 5161192 | Repeaters for secure local area networks | |||
| 150 | 5124984 | Access controller for local area network | |||
1991 | |||||
| 151 | 5001750 | Secret communication control apparatus | |||
| 152 | 4982430 | Bootstrap channel security arrangement for communication network | |||
1990 | |||||
| 153 | 4910777 | Packet switching architecture providing encryption across packets | |||
| 154 | 4901348 | Data transmission security arrangement for a plurality of data stations sharing access to a communication network | |||
1989 | |||||
| 155 | 4866772 | Communication system | |||
| 156 | 4823389 | Method and circuit apparatus for checking the authorization of access to a signal processing system | |||
1987 | |||||
| 157 | 4679226 | Computer security guard circuit | |||
| 158 | 4638356 | Apparatus and method for restricting access to a communication network | |||
1986 | |||||
| 159 | 4626623 | Method and apparatus for telephone access security | |||
| 160 | 4604499 | Computer telephone access security processor | |||
1985 | |||||
| 161 | 4546213 | Modem security device | |||
| 162 | 4531023 | Computer security system for a time shared computer accessed over telephone lines | |||
1984 | |||||
| 163 | 4484306 | Method and apparatus for controlling access in a data transmission system | |||
1980 | |||||
| 164 | 4193061 | Electronic authentication system | |||
1978 | |||||
| 165 | 4114139 | Security controlled information exchange system | |||
| 166 | 4093819 | Closed user group facility | |||
1976 | |||||
| 167 | 3984637 | Computer terminal security system | |||
| © 2017, ПАТ-Инфо, В.И. Карнышев
Дата формирования списка: 03.04.2017 | |||||