СПИСОК патентов США - подгруппа МПК16 H04L29/00



Выделить слова в названиях патентов:


№ п/п Номер патента Название патента

2017

19608945Sending messages to multiple receiving electronic devices using a message server
29608822Method for generating an HTML document that contains encrypted files and the code necessary for decrypting them when a valid passphrase is provided
39608810Systems and methods for encryption and provision of information security using platform services
49602542Security-function-design support device, security-function-design support method, and program storage medium
59602536Virtualized network honeypots
69602508System and method for performing an action based upon two-party authorization
79596215Partitioning a filter to facilitate filtration of packets
89590809Method for operating a mobile device by means of a motor vehicle
99589153Securing integrity and consistency of a cloud storage service with efficient client operations
109589122Operation processing method and device
119584569Method and system for supplying media over communication networks
129584532Enterprise intrusion detection and remediation
139584511Virtual verification
149584315Order-preserving encryption system, encryption device, decryption device, encryption method, decryption method, and programs thereof
159578502Device authentication using inter-person message metadata
169578104Resumption of play for a content-delivery session
179578065System and method for distributing antivirus records to user devices
189578034Trusted peripheral device for a host in a shared electronic environment
199578029Diameter signaling for mobile IPv4
209578019Method and system for managing an embedded secure element eSE
219578015Step-up authentication for single sign-on
229578007Secure transmission of a session identifier during service authentication
239577926Authorizing communications between computing nodes
249577835Online chats without displaying confidential information
259576155Trusted computing host
269571505Trustworthiness of processed data
279571462Extensible personality-based messaging system in a distributed computerized infrastructure for establishing a social network
289571456Systems and methods for fine grain policy driven clientless SSL VPN access
299569539Unified communication audit tool
309563760Biometric authentication for regulating access to content sources via a client device
319560525System and method for unified authentication in communication networks
329560133Acquiring multi-media content
339560065Path scanning for the detection of anomalous subgraphs and use of DNS requests and host agents for anomaly/change detection and network situational awareness
349560039Controlled discovery of SAN-attached SCSI devices and access control via login authentication
359560013Firewall based prevention of the malicious information flows in smart home
369560011System and method for protecting service-level entities
379559849Service-to-service digital path tracing
389554279Authorized areas of authentication
399553869Method for initializing a memory area that is associated with a smart meter
409552468Image processing apparatus and control method thereof
419549319Presence verification within a wireless environment
429548991Preventing application-level denial-of-service in a multi-tenant system using parametric-sensitive transaction weighting
439548989Network monitoring apparatus and method
449548975Authentication method, authentication system, and service delivery server
459547723Data processing based on two-dimensional code
469547614Device management system, communication device, device management apparatus, and control method
479544394Network resource identification
489544333Policy setting for content sharing of a plurality of remotely connected computing devices in physical or virtualized space
499544292Credential management
509538001Communication terminal, communication management system, communication system, and recording medium
519537895System and method for securing use of a portable drive with a computer network
529537874System for providing behavior information notification service and method for providing behavior information notification service
539537856Redirection method for electronic content
549537836System and method for secured content delivery
559537825Geographic filter for regulating inbound and outbound network communications
569536057Premises aware security

2016

579532089Session-based encryption for delivering content on-demand
589531539Information processing apparatus, and information processing method
599530003Computer system and method of securely booting a computer system
609529514System and method for automating the management, routing, and control of multiple devices and inter-device connections
619529356Data management system of an aircraft
629525670Computer product, recording medium, communications apparatus, and communications method
639520918Login via near field communication with automatically generated login information
649516107Secure local server for synchronized online content management system
659516028Hierarchical policy-based shared resource access control
669515992Network environment separation
679514718Information processing system, information processing apparatus, and information processing method
689514295Quantified identity
699503480Deploying policy configuration across multiple security devices through hierarchical configuration templates
709503471Pre-processing system for minimizing application-level denial-of-service in a multi-tenant system
719503453OTP-based authentication system and method
729503262Transparent denial of service protection
739497191Multiple user authentications on a communications device
749497062System and method for secure storage, transfer and retrieval of content addressable information
759491187APIs for obtaining device-specific behavior classifier models from the cloud
769489519Method and apparatus for encrypting data messages after detecting infected VM
779485286Sharing media items with pass phrases
789485265Malicious activity detection system capable of efficiently processing data accessed from databases and generating alerts for display in interactive user interfaces
799485234Virtualized endpoints in a multi-tenant environment
809483751Label privileges
819483093Electronic device and method for controlling a setting of a maximum consumption current
829479936Electronic device and content sharing method
839479533Time based authentication codes
849479495Sending authentication codes to multiple recipients
859479357Detecting malware on mobile devices based on mobile behavior analysis
869474976Management of ancillary content delivery and presentation
879471778Automatic baselining of anomalous event activity in time series data
889471773Apparatus, system, and method for context-sensitive rolling password generation
899471759Enabling device functionality based on indoor positioning system detection of physical customer presence
909467473System and method for compact form exhaustive analysis of security policies
919467456Single login authentication for users with multiple IPv4/IPv6 addresses
929467439Access control method, access control system, communication terminal, and server
939467424Methods and systems for proxying data
949467291Information processing system, information processing method, and non-transitory computer readable medium for processing requests using an authority object
959462248System and apparatus for managing video content recordings
969462075Encrypted cached content system
979462001Computer network access control
989461997Secure authorization of modules running on virtualized hardware
999461979Method and system for including network security information in a frame
1009461824Transmitting a document
1019461816Methods, systems and apparatus to reduce processor demands during encryption
1029461815Virtualized AES computational engine
1039460276Virtual machine system, confidential information protection method, and confidential information protection program
1049455986Method of authenticating a device to access a service
1059455830Method for securing credentials in a remote repository
1069455828Re-encryption system, re-encryption method and re-encryption program
1079451096Integrated service identity for different types of information exchange services
1089451091Systems and methods for state awareness across communication channels and statefully transitioning between communication channels
1099450965Mobile device, program, and control method
1109450942Access to resources
1119450925Methods and systems for auto-commissioning of devices in a communication network
1129450761Memory system and method of generating management information
1139450751Smart card, electronic device, and portable electronic device
1149444838Pre-processing system for minimizing application-level denial-of-service in a multi-tenant system
1159444800Virtual communication endpoint services
1169444787Non-intrusive method and apparatus for automatically dispatching security rules in cloud environment
1179442590Display device and method for controlling the same
1189438605Determining response signature commonalities
1199438599Approaches for deployment approval
1209438578Digital communication biometric authentication
1219438576Apparatus and method for validation and authorization of device and user by global positioning and non-prompted exchange of information
1229436815Block management unification system and method
1239432391Method, device and apparatus for acquiring security state of mobile terminal
1249432335Cloud-based multi-layer security architecture with firewalled virtual network portions
1259432197Wireless communications device and authentication processing method
1269430644Systems, methods, and apparatus to enhance the integrity assessment when using power fingerprinting systems for computer-based systems
1279430405Encrypted purging of data from content node storage
1289426174Protecting computing assets from segmented HTTP attacks
1299426171Detecting network attacks based on network records
1309426125Real-time reconfigurable web application firewall for a distributed platform
1319424113Virtual appliance deployment
1329419950Secure message forwarding system detecting user's preferences including security preferences
1339419841Token-based secure data management
1349419798Public encryption method based on user ID
1359413778Security policy creation in a computing environment
1369413724Cloud-based security policy configuration
1379407612Technologies for secure inter-virtual network function communication
1389407436Portable device registration system and portable device registration method
1399402108Receiver software protection
1409400688Resource restriction systems and methods
1419398426Method and apparatus for transmitting secure cell broadcast messages in a cellular communication network
1429398027Data detecting method and apparatus for firewall
1439398013System, method and computer program product for an authentication management infrastructure
1449398005Managing seed provisioning
1459397980Credential management
1469397838Credential management
1479397835Web of trust management in a distributed system
1489395929Network storage server with integrated encryption, compression and deduplication capability
1499391978Multiple access authentication
1509390265Anomalous system state identification
1519386293Method for generating and rebuilding a stereoscopic-compatible video stream and related coding and decoding devices
1529386044Correlation based security risk identification
1539378362System and method of monitoring attacks of cross site script
1549374305Packet transfer system
1559374219Method and apparatus for securing access to an integrated circuit
1569373096Smart cloud workload balancer
1579369526Distributed storage time synchronization based on retrieval delay
1589369444Remote access service inspector
1599367514Communication node and communication method
1609363675Distributed wireless security system
1619363257Secure federated identity service
1629361465Privacy-enhanced car data distribution
1639361439Virtual verification
1649356822Automated interface apparatus and method for use in semiconductor wafer handling systems
1659355238Secure authentication at a self-service terminal
1669350746Transmission network system, transmission method, and authentication information device
1679350721Air interface security method and device
1689349018Preventing content data leak on mobile devices
1699349005Preventing re-patching by malware on a computer
1709344500Distributed storage time synchronization based on storage delay
1719344474Method and system for supplying media over communication networks
1729344334Network policy implementation for a multi-virtual machine appliance within a virtualization environment
1739344283Captcha image scramble
1749342694Security method and apparatus
1759338160Certificate checkin service
1769336394Securely recovering a computing device
1779336025Systems and methods of analyzing a software component
1789330270Encryption processing device and authentication method
1799330260Detecting auto-start malware by checking its aggressive load point behaviors
1809325737Security based network access selection
1819325733Unsupervised aggregation of security rules
1829319493Communication method and information processing system
1839319452System and method for providing private session-based access to a redirected USB device or local device
1849319424Methods and systems for complying with network security requirements
1859313172Providing access to remote networks via external endpoints
1869313085DNS-based determining whether a device is inside a network
1879311678Comment plug-in for third party system
1889311254Method and apparatus for an improved access system
1899306985User configurable data storage
1909306933Ensuring network connection security between a wrapped app and a remote server
1919305173Portable authorization device for authorizing use of protected information and associated method
1929305168Modular static application security testing
1939301150Methods and apparatus for clear channel assessment
1949301082Mobile device sensor data subscribing and sharing
1959300690Secure network labeling to control inter-process communications in a multi-tenant platform-as-a-service (PaaS) system
1969300677Data security system
1979294470Certificate management method based on connectivity and policy
1989294439Systems and methods for application-based interception of SSL/VPN traffic
1999294273Method and system for conditional access to a digital content, associated terminal and subscriber device
2009292700Method and system for securing data
2019292467Mobile resource accelerator
2029292179System and method for identifying music content in a P2P real time recommendation network
2039288596Coordinator device for paired or consolidated players
2049288268Methods and apparatus to monitor shoppers in a retail environment
2059282116System and method for preventing DOS attacks utilizing invalid transaction statistics
2069280604Unified communication audit tool
2079278284UDP broadcast for a user interface in a download and configuration gaming method
2089277400Location-enabled security services in wireless network
2099276849Frame relay switched data service
2109270702Method of securing a mobile terminal
2119270449Secured communication in network environments
2129268926Privileged activity monitoring through privileged user password management and log management systems
2139268924Transmission apparatus, electronic appliance, reception apparatus, and authentication system
2149268918Encryption and decryption of a dataset in at least two dimensions
2159264437Systems and methods for providing dynamically selected media content items
2169264431Method and system for remote data access using a mobile device
2179264238Facilitating virtual personal area networks
2189264231System and method of using RFID tag proximity to grant security access to a computer
2199262608System for providing session-based network privacy, private, persistent storage, and discretionary access control for sharing private data
2209262128Information processing apparatus, information processing method and computer program
2219258123Multi-layered color-sensitive passwords
2229258030Wireless communication device
2239256714Preserving integrity of messages in a messaging oriented middleware system
2249253208System and method for automated phishing detection rule evolution
2259253193Systems and methods for policy based triggering of client-authentication at directory level granularity
2269253178Method and apparatus for authenticating a communication device
2279253174Providing a second factor authorization
2289251384Trusted peripheral device for a host in a shared electronic environment
2299251355Field level database encryption using a transient key
2309251325Verifying passwords on a mobile device
2319251317Network video messaging
2329246915Streaming media for portable devices
2339246910Determination of apparatus configuration and programming data
2349245148Secure storage and accelerated transmission of information over communication networks
2359240995Method and system for denying cable modem access to a broadband network
2369240993Method and system for in-field recovery of security when a certificate authority has been compromised
2379240988Computer system employing dual-band authentication
2389240886Authentication adaptation
2399240012Systems and methods for multifactor authentication
2409237018Multisystem biometric token
2419232065Group pseudo-profiles for online sessions
2429231988Intercluster repository synchronizer and method of synchronizing objects using a synchronization indicator and shared metadata
2439231972Malicious website identifying method and system
2449231947RFID authentication architecture and methods for RFID authentication
2459231934Control server, data processing device, and control device for data processing device
2469231929Methods and devices for security key renewal in a communication system
2479230066Assessing risk for third-party data collectors

2015

2489225703Protecting end point devices
2499225588Alarm management apparatus and method for managing alarms
2509225519Method, system, and apparatus for enabling secure functionalities
2519218503Collection and analysis of customer data from application programming interface usage
2529218227Method and system for user-designed application deployment
2539215324Systems and methods for state awareness across communication channels and statefully transitioning between communication channels
2549215209Source request monitoring
2559213561Virtual appliance deployment
2569208295Policy-based control layer in a communication fabric
2579207753Multiple-queue multiple-resource entry sleep and wakeup for power savings and bandwidth conservation in a retry based pipeline
2589204297Information processing apparatus, information processing method, operation terminal, and information processing system
2599203806Rule swapping in a packet network
2609198033Method and apparatus for authenticating nodes in a wireless network
2619197910Business method including handshake protocol to control actors and functions to propagate acceptance of an IP license to securely authenticate software application program interfaces (APIs)
2629197678Method and system for data transmission
2639197668Access control to files based on source information
2649197654Rootkit detection by using HW resources to detect inconsistencies in network traffic
2659197649System and method for email fraud risk assessment
2669197625Cloud-based device information storage
2679197601System and method for providing a single global borderless virtual perimeter through distributed points of presence
2689197405System and method for controlling user access to encrypted data
2699189608Permission management method for applications, electronic device thereof, and computer readable medium
2709185140Reconstruction of session initiation protocol (SIP) dialogs in a SIP network
2719185123System and method for mobile identity protection for online user authentication
2729185088Secure and efficient communication through an intermediary
2739185039Application testing through object level code inspection
2749183841Identification of watermarked content
2759183375Use of resource up to extension value by subscription device
2769177169Secure digital storage
2779172548Communication apparatus, control method and storage medium
2789171151Reputation-based in-network filtering of client event information
2799171139Lock screens to access work environments on a personal mobile device
2809167077Surge protection circuit and communication apparatus
2819167030Application execution system, computer, application execution device, and control method and program for an application execution system
2829167000Dynamic threat event management system and method
2839166997Systems and methods for reducing false positives when using event-correlation graphs to detect attacks on computing systems
2849166793Efficient authentication for mobile and pervasive computing
2859165120Service manifests
2869161215Wireless device, registration server and method for provisioning of wireless devices
2879160769Managing data in a cloud computing environment using management metadata
2889160756Method and apparatus for protecting markup language document against cross-site scripting attack
2899160740Establishing secure, mutually authenticated communication credentials
2909160727Providing credential information
2919160711Internet cleaning and edge delivery
2929154498Sharable content item links with use restrictions
2939147086Trusted computing host
2949143941Secure communication by user selectable communication range
2959143651Image forming apparatus, charging information recording method, and recording medium
2969143512Communication devices, computer readable storage devices, and methods for secure multi-path communication
2979143379Power fluctuation detection and analysis
2989143378Rendering components within different browser environments
2999137257Anti-phishing filter
3009137245Login method, apparatus, and system
3019130982System and method for real-time reporting of anomalous internet protocol attacks
3029124622Detecting computer security threats in electronic documents based on structure
3039124421Data prioritization, storage and protection in a vehicular communication system
3049122878Software license management with drifting component
3059119067Embodiments of a system and method for securely managing multiple user handles across multiple data processing devices
3069118691Content distribution with mutual anonymity
3079118656Systems and methods for multi-factor authentication
3089118617Methods and apparatus for adapting the protection level for protected content
3099116765System and method for obfuscating data using instructions as a source of pseudorandom values
3109116715Systems and methods for efficiently booting and configuring virtual servers
3119112908System and method for managing TLS connections among separate applications within a network of computing systems
3129112907System and method for managing TLS connections among separate applications within a network of computing systems
3139107069Addressable radio device
3149106646Enhanced multi-factor authentication
3159104663Dynamic allocation of memory for memory intensive operators
3169104234Method and system for quantitative determination of software ease of use
3179100525Information processing apparatus, information storage apparatus, information processing system, information processing method, and program
3189100414Method and apparatus for providing a reliable voice extensible markup language service
3199100372System for determining whether or not automaton satisfies context-free grammar
3209100361Secure routing module
3219100277Client credentials data structure and method of employing the same
3229100184Instructions processors, methods, and systems to process BLAKE secure hashing algorithm
3239098691Method and apparatus for encoding and decoding data transmitted to an authentication token
3249092645Efficient multiplication, exponentiation and modular reduction implementations
3259088597Malicious activity detection of a functional unit
3269084112Secure group key agreement for wireless networks
3279083748Modelling network to assess security properties
3289083700Systems and methods for authorization of information access
3299083581System and method for providing resource sharing, synchronizing, media coordination, transcoding, and traffic management in a vehicular environment
3309083566System and method for communicating with an applet using an inline web frame in a network environment
3319078126Method of sharing a session key between wireless communication terminals using a variable-length authentication code
3329076016Anonymization as a service
3339071575Method and system for abuse route aggregation and distribution
3349071569System, method, and computer program for content metadata and authorization exchange between content providers and service providers
3359071439Method and apparatus for remote administration of cryptographic devices
3369069638Update system to synchronize changes from external sources for a java virtual machine
3379065806Internet based security information interaction apparatus and method
3389065656System and methods for managing trust in access control based on a user identity
3399064127Systems and methods for securing data in the cloud
3409064115Malware detection system and method for limited access mobile platforms
3419060025Cloud-based security policy configuration
3429059893System and method for providing private session-based access to a redirected USB device or local device
3439058479Pass-pattern authentication for computer-based security
3449055427Updating configuration parameters in a mobile terminal
3459055036Method and apparatus for transmitting a user datagram protocol message that is larger than a defined size
3469055006Techniques for traffic diversion in software defined networks for mitigating denial of service attacks
3479053465Techniques to manage event notifications
3489049241Peer discovery and secure communication in failover schemes
3499049170Building filter through utilization of automated generation of regular expression
3509049011Secure key storage and distribution
3519043862Policy control for encapsulated data flows
3529043594System and method for execution of a secured environment initialization instruction
3539038155Auditable multiclaim security token
3549038152Access to resources
3559037846Encoded database management system, client and server, natural joining method and program
3569032522PLC backplane analyzer for field forensics and intrusion detection
3579032489Method and device for proxy access of open platform
3589032420Method and management agent for event notifications correlation
3599032213Data distribution path verification
3609031716Information handling for aircraft flight decks
3619030112Illumination system, and driving device and signal transmitter device thereof
3629027077Deploying policy configuration across multiple security devices through hierarchical configuration templates
3639021263Secure data access in a dispersed storage network
3649015824Allowing a client computing device to securely interact with a private network
3659015483Method and system for secured data storage and sharing over cloud based network
3669015473Method and system for automated and secure provisioning of service access credentials for on-line services to users of mobile communication terminals
3679014283Communication system
3689009789Diameter signaling for mobile IPv4
3699003508Methods and apparatus for enabling secure network-based transactions
3709003505Cross platform social networking authentication system
3719003477Model for managing hosted resources using logical scopes
3729003181Incorporating data into cryptographic components of an ECQV certificate
3738995669Updating shared keys
3748984627Network security management
3758984597Protecting user credentials using an intermediary component
3768984290Authenticated checkin via passive NFC
3778984274Secure data updates
3788978122Secure cross-tenancy federation in software-as-a-service system
3798978116Method and apparatus for monitoring an online identity of a user on a network
3808978107Method and system for enabling non-intrusive multi tenancy enablement
3818973117Propagating security identity information to components of a composite application
3828972723Storage device and method for providing a partially-encrypted content file to a host device
3838972719Passcode restoration
3848966600Method, apparatus and system for controlling access to computer platform resources
3858966256Transmitting a document
3868959608Single sign-on for a native application and a web application on a mobile device
3878959588Systems and methods for mitigating remote authentication service unavailability
3888959587System and method for authentication for wireless emergency services
3898959582System and method for manipulating and managing computer archive files
3908955059Authentication system, authentication method, and network storage appliance
3918955035Anonymous principals for policy languages
3928955032Assessing network and device compliance with security policies
3938954998Application of an embedded instrumentation interface definition language
3948954729Creating and using a specific user unique id for security login authentication
3958953794Apparatus and method for securing beacons
3968949959Reduced authentication times for shared-media network migration
3978943556Secure information release
3988943551Cloud-based device information storage
3998935803System and apparatus for transferring data between communication elements
4008935767Overlay human interactive proof system and techniques
4018935540Electronic device
4028932368Method for monitoring the unauthorized use of a device
4038931068Authentication process
4048931033Integrating policies from a plurality of disparate management agents
4058930702Strong authentication token with acoustic data input

2014

4068925038Pre-authorization of bearer set-up
4078924724Document encryption and decryption
4088924714Authentication with an untrusted root
4098918634Network node with network-attached stateless security offload device employing out-of-band processing
4108917631System and method for sharing information between two or more devices
4118914860System and method for associating message addresses with certificates
4128914859Managing the progressive legible obfuscation and de-obfuscation of public and quasi-public broadcast messages
4138914847Multiple user authentications on a communications device
4148914639Method and apparatus for one-step signature trust for digitally-signed documents
4158913743Method for decrypting an encrypted packet within a wireless communication device, and corresponding device
4168910287Methods and systems for preventing malicious use of phishing simulation records
4178910242Enable/disable method of additional-function unit, system for same, program for same, as well as additional-function unit
4188904503Systems and methods for providing access to data accounts within user profiles via cloud-based storage services
4198904497Providing an operational dashboard
4208904491Network connecting device and method
4218903089Device for secure transmission recording and visualization of audiovisual programs
4228898739Intercluster relationship management
4238898738Apparatus, system and method for accessing internet webpage
4248897443Watermarking slices stored in a dispersed storage network
4258893295Secure and private location
4268893245Method and device for propagating session management events
4278893219Certificate management method based on connectivity and policy
4288887270Smart storage device
4298887252Information providing system and design information providing server
4308887227Network policy implementation for a multi-virtual machine appliance within a virtualization environtment
4318886933Streamlined provisioning and configuration of computing devices
4328886928Method and system for device authentication
4338881259Network security system with customizable rule-based analytics engine for identifying application layer violations
4348881241Method of and system for implementing privacy control
4358880942Electronic device and method of ensuring guaranteed services
4368875248Automatic resource ownership assignment system and method
4378875246Automatic resource ownership assignment system and method
4388874905Resource restriction systems and methods
4398874902Methods and systems for distributing cryptographic data to authenticated recipients
4408869240Soft method for local secure connection to a device
4418869233Policy management within a network management system
4428863259Method of controlling biometric authentication system, non-transitory, computer readable storage medium and biometric authentication system
4438862897Increasing data security in enterprise applications by using formatting, checksums, and encryption to detect tampering of a data buffer
4448861736Reliable physical unclonable function for device authentication
4458861434Method and system for improved multi-cell support on a single modem board
4468856535Determining response signature commonalities
4478856524Cryptographic methods, host system, trusted platform module, computer arrangement, computer program product and computer program
4488856509System and method for cognizant transport layer security (CTLS)
4498856507Secure identity and personal information storage and transfer
4508855301Coordinating compression information for unreliable encrypted streams through key establishment protocols
4518850567Unauthorized URL requests detection
4528850547Remote access service inspector
4538850228Computing device and method for controlling access to driver programs
4548850183Interconnect device to enable compliance with rights management restrictions
4558848741High-speed CLD-based TCP segmentation offload
4568844011IP multimedia subsystem user identity handling method and apparatus
4578844002Method and system for notification and request processing
4588843764Secure software and hardware association technique
4598839377Information sharing method and system using the same
4608839359Data processing device and data processing method
4618832802System for distribution permissions for network communications
4628826451Mechanism for facilitating communication authentication between cloud applications and on-premise applications
4638826433Security intrusion detection and response
4648826388Mobile device identify factor for access control policies
4658826003Network node with network-attached stateless security offload device employing out-of-band processing
4668819809Method and appliance for authenticating, by an appliance, a client to access a virtual private network connection, based on an attribute of a client-side certificate
4678819413Method and apparatus for collaborative claim verification
4688813204Authenticating use of a dispersed storage network
4698813178Systems and methods for preparing and submitting documents to comply with securities regulations
4708812840Method for fast pre-authentication by distance recognition
4718806575Network selection tool for information handling system
4728806574System and method for policy conformance in a web application
4738806567Using encoded identifiers to provide rapid configuration for network access
4748806221Securely recovering a computing device
4758806193Methods and apparatus for integrating digital rights management (DRM) systems with native HTTP live streaming
4768805938Enterprise service bus and message processing method thereof
4778804959Communication device, communication method, and communication system
4788800044Storing and accessing threat information for use in predictive modeling in a network security service
4798800009Virtual machine service access
4808799999Authentication method
4818798050Re-optimization of loosely routed P2MP-TE sub-trees
4828793765Data processing apparatus and computer-readable recording medium
4838793490Systems and methods for multifactor authentication
4848792645Authentication and data security for wireless networks
4858788833Electronic apparatus and communication control method
4868776180Systems and methods for using reputation scores in network services and transactions to calculate security risks to computer systems and platforms
4878776177Dynamic content preference and behavior sharing between computing devices
4888776168Applying security policy based on behaviorally-derived user risk profiles
4898775795Authenticating method and mobile terminal for code division multiple access (CDMA) evolution to packet data optimized (EVDO) network
4908769612Portable device association
4918767121Apparatus and method for converting multimedia content, and multimedia content distribution system
4928763150Correlating private affinities
4938763090Management of ancillary content delivery and presentation
4948762735Biometric authentication method and computer system
4958756706Method for securing credentials in a remote repository
4968752135Notifications in a credential production system
4978752123Apparatus and method for performing data tokenization
4988750507Dynamic group creation for managed key servers
4998739248Wireless access to device functions
5008738898Provision of secure communications connection using third party authentication
5018732851Image forming apparatus and information processing method
5028732793Method and system for improving security of the key device
5038726359Method and system for content distribution management
5048726352Administration of access control keys in a virtual world
5058726350Network selection tool for information handling system
5068724815Key management in a distributed system
5078719895Determining a policy output for a communication session
5088717896Frame relay switched data service
5098713642Collaborative computing community role mapping system and method
5108713317Method and system for encrypting data in a wireless communication system
5118713306Network decoys
5128707458Location-enabled security services in wireless network
5138707435Method and system for identifying compromised nodes
5148707383Computer workload management with security policy enforcement
5158707024Methods and systems for managing identity management security domains
5168707020Selective exposure of feature tags in a MACSec packet
5178701201Method and apparatus for privacy protection
5188701156System for data loss prevention handshake between computing systems
5198700890Secure storage and accelerated transmission of information over communication networks
5208695103Apparatus for and a method of copy-protecting a content carrying recording medium
5218693481Communication device
5228689322Authentication method for information apparatus
5238688967Secure booting a computing device
5248683574Identity driven peer-to-peer (P2P) virtual private network (VPN)
5258683572Method and apparatus for providing continuous user verification in a packet-based network
5268671459Prevention of software piracy using unique internal intelligence with every software application copy
5278671160Method for admitting an information provider to a data transmission process, and transmission device
5288667265Hardware device binding and mutual authentication
5298666073Safe handover method and system
5308666066Encoding points of an elliptic curve
5318654971Systems and methods for securing data in the cloud
5328650623Risk adaptive information flow based access control
5338650620Methods and apparatus to control privileges of mobile device applications
5348650404Communication protocol for secure communications systems
5358645688System and method for execution of a secured environment initialization instruction
5368644509Data providing process based on an IBPE scheme
5378640239Network intrusion detection in a network that includes a distributed virtual switch fabric
5388640186Pre-authorization of bearer set-up
5398638942Method and system for managing shared random numbers in secret communication network
5408635682Propagating security identity information to components of a composite application
5418631490Altering sampling rate to thwart attacks that involve analyzing hardware sensor output
5428631232Wireless personal area network accessing method
5438627409Framework for automated dissemination of security metadata for distributed trust establishment
5448625803Updating shared keys

2013

5458621593Information processing apparatus and method, recording medium and program
5468621591Software signing certificate reputation model
5478621572Method, apparatus and system for updating authentication, authorization and accounting session
5488621569Intercluster relationship management
5498619983Digital TV conditional access system and method of using the same for transmitting and receiving digital data
5508615789Trust assertion using hierarchical weights
5518615659System and method for acquiring terminal binding key
5528613064Method and apparatus for providing a secure authentication process
5538607054Remote access to hosted virtual machines by enterprise users
5548601572Method for sharing a media collection in a network environment
5558601264Systems and methods of user authentication
5568601259Securing data in a dispersed storage network using security sentinel value
5578595483Associating a multi-context trusted platform module with distributed platforms
5588595478Wide area network with high quality of service
5598590027Secure authentication in browser redirection authentication schemes
5608584226Method and apparatus for geographically regulating inbound and outbound network communications
5618583940Electronic camera, storage medium, and data transfer method
5628578460Automating cloud service reconnections
5638578459Methods and apparatus to control network access from a user device
5648576712Method and apparatus for providing a reliable voice extensible markup language service
5658572696Contextual data aided security protection
5668572411Systems and methods for secure transaction management and electronic rights protection
5678572392Access authentication method, information processing unit, and computer product
5688572384Method and apparatus for updating an authorization key in a communication system
5698566925Systems and methods for policy based triggering of client-authentication at directory level granularity
5708565427Enforcing software independent content protection in an electronic device
5718560863Systems and techniques for datapath security in a system-on-a-chip device
5728555397Consumer-controlled data access to shared RFID data
5738555346Generating user and avatar specific content in a virtual world
5748553678Distributed codec for packet-based communications
5758549613Reverse VPN over SSH
5768549594Method of identity authentication and fraudulent phone call verification that utilizes an identification code of a communication device and a dynamic password
5778549587Secure end-to-end transport through intermediary nodes
5788549295Establishing secure, mutually authenticated communication credentials
5798548164Method and device for the encryption and decryption of data
5808544072Single sign-on service
5818544062Method and system for improving computer network security
5828533787Automatic resource ownership assignment system and method
5838533485Digital communication biometric authentication
5848533469Method and apparatus for sharing documents
5858528051Mobile terminal, server, and method for providing content information
5868522328Measurement device and method for logging use of the measurement device
5878522317Method and a device for maintaining an address translation table
5888522038Method for preventing unauthorized access to the computer system by using one-time password
5898522011Computer implemented method for authenticating a user
5908522007Dual cryptographic keying
5918504830Transfer data management system for internet backup
5928504818Method and system for reliable protocol tunneling over HTTP
5938503302Method of detecting anomalies in a communication system using numerical packet features
5948499035Methods, systems and computer readable media for providing session initiation protocol (SIP) event watcher entity information in a communications network
5958495721Data network security policies
5968495712Peer-to-peer access control method of triple unit structure
5978495711Remote roaming controlling system, visitor based network server, and method of controlling remote roaming of user devices
5988490189Using chipset-based protected firmware for host software tamper detection and protection
5998484696Secure game download
6008484454Secure offline relocation of portable software licenses
6018477792System and method for managing dynamic network sessions
6028474050System and apparatus for transferring data between communication elements
6038464329System and method for providing security for SIP-based communications
6048464075System and method for policy-driven file segmentation and inter-cloud file storage and retrieval
6058458777Remote authentication login system
6068453247Apparatus, system and method for providing security service in home network
6078453229Push type communications system
6088453211Method of obtaining proxy call session control function address while roaming
6098452958Determining certificate revocation status
6108452007Security key generating method, device and system
6118448220Merge rule wizard
6128443435VPN resource connectivity in large-scale enterprise networks
6138443196Signing method, apparatus, and system
6148438393Quadratic residue based password authenticated key exchange method and system
6158434142Method for mitigating on-path attacks in mobile IP network
6168429723Method and system for role-based access control to a collaborative online legal workflow tool
6178429396Peer discovery and secure communication in failover schemes
6188418243Systems and methods of providing an intranet internet protocol address to a client on a virtual private network
6198418229Systems and methods for performing access entitlement reviews
6208413229Method and appliance for authenticating, by an appliance, a client to access a virtual private network connection, based on an attribute of a client-side certificate
6218412943Two-way access authentication method
6228407475Augmented single factor split key asymmetric cryptography-key generation and distributor
6238402523System and method for associating message addresses with certificates
6248402514Hierarchy-aware role-based access control
6258401188System and method for partial encryption of frame-based electronic content
6268397282Dynamically adaptive network firewalls and method, system and computer program product implementing same
6278392983Trusted labeler
6288392982Systems and methods for selective authentication, authorization, and auditing in connection with traffic management
6298392980Trusted host list for TLS sessions
6308392616Method and apparatus for transmitting header-compressed packet based on retransmission mechanism
6318364986Identification-dependent communication between vehicles
6328359652Detecting anomalies in access control lists
6338356345Constructing a secure internet transaction
6348353017User password protection
6358353006Aircraft communications system using whitelists to control access and associated methods
6368353003System and method for controlling a flow of data a network interface controller to a host processor
6378352732Transmission method for conditional access content

2012

6388341704Secure communication between client device and server device
6398341398Communication system, network device and program
6408341397Security system for handheld wireless devices using-time variable encryption keys
6418326767Customer data privacy implementation
6428325078Remote switch operator controller
6438321952Method and system for monitoring online computer network behavior and creating online behavior profiles
6448321683Electronic control device and method for operating an electric roller shutter
6458316431Concurrent IPsec processing system and method
6468312532Connection supporting apparatus
6478312521Biometric authenticaton system and method with vulnerability verification
6488312252Content receiving apparatus and method, storage medium, and server
6498311213Method for determining functions applied to signals
6508286227Enhanced multi-factor authentication
6518281376Authentication system and authentication method
6528281365Information management method, information management system, computer-readable medium and computer data signal
6538281123Apparatus and method for managing and protecting information during use of semi-trusted interfaces
6548272028Approach for managing access to electronic documents on network devices using document retention policies and document security policies
6558266426Hardware certification based on certifying development processes
6568266424Method and system for in-field recovery of security when a certificate authority has been compromised
6578261348Reception apparatus
6588250634Systems, methods, media, and means for user level authentication
6598250362Home network encryption techniques
6608243757MAC header compression using a pointer
6618238365Method and device for supporting optical transmission network service dispatch in optical synchronization network
6628230488Network system, direct-access method, network household electrical appliance, and program
6638230482System and method for manipulating and managing computer archive files
6648230228Support of tamper detection for a log of records
6658230222Method, system and computer program for deploying software packages with increased security
6668228225Remote switch operator
6678224973Techniques for timing optimization in wireless networks that utilize a universal services interface
6688219806Management system, management apparatus and management method
6698214878Policy control of virtual environments
6708185734System and method for execution of a secured environment initialization instruction
6718176334Document security system that permits external users to gain access to secured files
6728176321Safe installation of browser extensions
6738171563Secure message system with remote decryption service
6748171531Universal authentication token
6758171530Computer access security
6768156326Method to search for affinities between subjects and relative apparatus
6778151331Information providing system and design information providing server
6788135947Interconnect device to enable compliance with rights management restrictions
6798131994Dual cryptographic keying
6808127342Secure end-to-end transport through intermediary nodes
6818127336Systems and methods for policy-based service management
6828122492Integration of social network information and network firewalls
6838117641Control device and control method for information system
6848117459Personal identification information schemas
6858117441Integrating security protection tools with computer device integrity and privacy policy
6868112624Method and system for certificate revocation list compression
6878112484Apparatus and method for auxiliary classification for generating features for a spam filtering model
6888104074Identity providers in digital identity system
6898099781Method of managing and mitigating security risks through planning
6908099768Method and system for multi-protocol single logout
6918095787Systems and methods for optimizing SSL handshake processing
6928090942Method and system for asymmetrically encrypting .ZIP files

2011

6938086842Peer-to-peer contact exchange
6948082581Management of session timeouts in an SSL VPN gateway
6958079076Detecting stolen authentication cookie attacks
6968078868Multi-party encryption systems and methods
6978069348Client digital program insertion in a conditional access module
6988068433Low power operation of networked devices
6998065526Methods and apparatus for content control using processor resource management
7008065522Method and system for virtualization of trusted platform modules
7018065520Method and apparatus for encrypted communications to a secure server
7028065516Hard disk drive with certification function
7038064597Method and system for mobile device credentialing
7048060744Computer architecture for an electronic device providing single-level secure access to multi-level secure file system
7058058972Methods and devices for enrollment and verification of biometric information in identification documents
7068056119Method and system for controlling inter-zone communication
7078051299Computer security method and computer system
7088051292System for proximity determination
7098042167Methods, systems, and computer program products for network firewall policy optimization
7108042157System for restricting data access
7118042155System and method for generating a single use password based on a challenge/response protocol
7128042152Home network system
7138042151Application context based access control
7148041947Computer architecture for an electronic device providing SLS access to MLS file system with trusted loading and protection of program execution memory
7158037524System and method for differentiated cross-licensing for services across heterogeneous systems using transient keys
7168037313Method and arrangement for real-time betting with an off-line terminal
7178037303System and method for providing secure multicasting across virtual private networks
7188032933Dynamically adaptive network firewalls and method, system and computer program product implementing same
7198032927Verification engine for user authentication
7208032926Method of configuring hierarchical network of user group and resource group and key distribution center
7218028168System and method for verification of personal identity
7228028163Method of digitally signing data and a data repository storing digitally signed data
7238024571Method of and system for watermarking application modules
7248024563Programming interface for a kernel level SSL proxy
7258024560Systems and methods for securing multimedia transmissions over the internet
7268023654Securing multimedia network communication
7278010793Data communication method and system
7288006312Data communications system, terminal, and program
7298006096Information processing apparatus
7308005225Hierarchical threshold tree-based broadcast encryption method
7317996912Method and system for monitoring online computer network behavior and creating online behavior profiles
7327996887Security of a network system
7337996670Classification engine in a cryptography acceleration chip
7347987513Data-use restricting method and computer product
7357987372Method for managing the access to a memory, by using passwords
7367987365Subscription-based computing implemented in hardware of computing device
7377984296Content protection device and content protection method
7387971260Matching session records of network users with corresponding transaction data
7397971238Two-factor authentication of a remote administrator
7407971056Direct memory access for compliance checking
7417970133System and method for secure and flexible key schedule generation
7427966656Method of coupling a switched circuit network to an internet protocol network
7437966655Method and apparatus for optimizing a firewall
7447962744Terminal communication system
7457958559Method, device and computer program product for determining a malicious workload pattern
7467954158Characterizing computer attackers
7477954154Communication system and communication apparatus
7487954144Brokering state information and identity among user agents, origin servers, and proxies
7497953863Techniques for timing optimization in wireless networks that utilize a universal services interface
7507945953Method to identify buffer overflows and RLIBC attacks
7517941858Access licensing for an automation device
7527940934System and method for securing computing management functions
7537937748Communication apparatus and communication method and computer readable medium
7547934093Assigning security levels to a shared component
7557930539Computer system resource access control
7567926116Systems and methods for dynamic decentralized load balancing across multiple sites
7577926111Determination of related entities
7587926086Access control mechanism for shareable interface communication access control
7597921454System and method for user password protection
7607921285Means of mitigating denial of service attacks on IP fragmentation in high performance IPsec gateways
7617917750Virtual user authentication system and method
7627917747Multi-party encryption systems and methods
7637908655Connectionless port scan detection on a network
7647908481Routing data to one or more entities in a network
7657908480Authenticating an endpoint using a STUN server
7667904958Spam honeypot domain identification
7677904946Methods and systems for secure user authentication
7687904945System and method for providing security for a wireless network
7697900242Modular authentication and authorization scheme for internet protocol
7707900040Atomic session-start operation combining clear-text and encrypted sessions to provide ID visibility to middleware such as load-balancers
7717895646IKE daemon self-adjusting negotiation throttle
7727895437Augmented single factor split key asymmetric cryptography-key generation and distributor
7737895295Scoring data flow characteristics to assign data flows to storage systems in a data storage infrastructure for a communication network
7747890995System and method for remote management of communications networks
7757890749System and method for providing security in a telecommunication network
7767886361Storage-medium processing method, storage-medium processing device, and program
7777882562Apparatus, system, and method for deploying iSCSI parameters to a diskless computing device
7787882552Remote administration of smart cards for secure access systems
7797882548System and method for protecting identity information
7807882543Systems and methods for added authentication in distributed network delivered half-duplex communications
7817882353Method for protecting data in a hard disk
7827881467Image forming apparatus and electronizing method for information mentioned in paper
7837873994Management of session timeouts in an SSL VPN gateway
7847870383System, method and program to update certificates in a computer
7857865960Digital literary work protection system and digital literary work protection method
7867865936System and method for controlling access to multiple public networks and for controlling access to multiple private networks
7877865934Access-control permissions with inter-process message-based communications
7887864957Methods and apparatus for secure distribution of program content

2010

7897861087Systems and methods for state signing of internet resources
7907856652Access control management method, access control management system and terminal device with access control management function
7917849310Switching between secure and non-secure processing modes
7927836494System and method for regulating the flow of information to or from an application
7937832014System and method for providing content in two formats on one DRM disk
7947832007Method of managing and mitigating security risks through planning
7957827597Secure transport for mobile communication network
7967827591Management of hierarchical reference data
7977823206Method and apparatus for establishing a security policy, and method and apparatus of supporting establishment of security policy
7987822984Portal system, method and program, and associated user computer and content supplier
7997805763Method for distributing values for networks with mobile nodes
8007805608User privacy through one-sided cookies
8017805602Prioritized call admission control for internet key exchange
8027802297Keyboard with built in display for user authentication
8037801973Classification of information in data flows in a data storage infrastructure for a communication network
8047801300Data transmitter and data receiver
8057797741System and method for coping with encrypted harmful traffic in hybrid IPv4/IPv6 networks
8067797395Assignment of data flows to storage systems in a data storage infrastructure for a communication network
8077793099Method and system for encryption of file characteristics of .ZIP files
8087788703Dynamic authentication in secured wireless networks
8097788479Apparatus, system and method of ensuring that only randomly-generated numbers that have passed a test are used for cryptographic purposes
8107784088Method and system for managing delayed user authentication
8117765587Glyphword-based security
8127765584Simple, secure login with multiple authentication providers
8137761905Method and system for assigning access rights in a computer system
8147761710Captive portal system and method for use in peer-to-peer networks
8157757083Integrated circuit that uses a dynamic characteristic of the circuit
8167757075State reference
8177752445System and method for authentication of a hardware token
8187752437Classification of data in data flows in a data storage infrastructure for a communication network
8197748026Transparent interceptors for privacy policy implementation
8207739496Secure packet-based data broadcasting architecture
8217735142Electronic vulnerability and reliability assessment
8227735123System and method for associating message addresses with certificates
8237735122Credential mapping
8247734912Secure login using single factor split key asymmetric cryptography and an augmenting factor
8257734911Secure login using augmented single factor split key asymmetric cryptography
8267734906System and method for panel linking in a security system
8277725944Matching session records of network users with corresponding transaction data
8287725922System and method for using sandboxes in a managed shell
8297721322Enterprise service-to-service trust framework
8307721089Broadcast encryption using RSA
8317721087Cross UI platform alerting of security status
8327716721Method and apparatus for re-authentication of a computing device using cached state
8337716470Active verification of boot firmware
8347707619Method and system for troubleshooting when a program is adversely impacted by a security policy
8357707405Secure installation activation
8367707401Systems and methods for a protocol gateway
8377701602Mobile device-based printing system and method
8387698745Secure message system with remote decryption service
8397698730Service detection
8407694135Security systems and services to provide identity and uniform resource identifier verification
8417690034Using behavior blocking mobility tokens to facilitate distributed worm detection
8427685422Information processing apparatus, information processing method, and information processing program
8437673136Method for secure multicast repeating on the public Internet
8447669232Dynamic authentication in secured wireless networks
8457661123Security policy update supporting at least one security service provider
8467660997Using biometrics on pervasive devices for mobile identification
8477657927Behavior-based host-based intrusion prevention system
8487653934Role-based access control
8497650637System for ensuring quality of service in a virtual private network and method thereof
8507647622Dynamic security policy through use of empirical security events
8517644280Method and system for linking certificates to signed files

2009

8527640576Print system, apparatus, and method for performing printing based on document information stored in document server
8537634803Method and apparatus for identifying purpose and behavior of run time security objects using an extensible token framework
8547631183System and method for retrieving related certificates
8557631179System, method and apparatus for securing network data
8567627894Method and system for authorizing access to user information in a network
8577627750Information distribution and processing system
8587624433Keyfob for use with multiple authentication entities
8597624421Method and apparatus for managing and displaying contact authentication in a peer-to-peer collaboration system
8607624267SIM-based authentication method capable of supporting inter-AP fast handover
8617624266System and method using temporary identity for authentication with session initiation protocol
8627617393Implementation and use of PII data access control facility employing personally identifying information labels and purpose serving function sets
8637614015Method and system for representing group policy object topology and relationships
8647613923Method and apparatus for controlling unsolicited messaging in real time messaging networks
8657610625Program control system, program control method and information control program
8667610621System and method for behavior-based firewall modeling
8677610618System and method for authenticating a subject
8687610494Encrypted microcode update of an optical transceiver
8697607008Authentication broker service
8707603486Network management system providing logic signals over communication lines for detecting peripheral devices
8717596692Cryptographic audit
8727591012Dynamic negotiation of encryption protocols
8737565692Floating intrusion detection platforms
8747562216System and method for applying a file system security model to a query system
8757555774Inline intrusion detection using a single physical port
8767552469Method for generating mnemonic random passcodes
8777551786System and method for efficient non-overlapping partitioning of rectangular regions of interest in multi-channel detection
8787546457System and method for execution of a secured environment initialization instruction
8797543148Audio watermarking with covert channel and permutations
8807543140Revocation of a certificate and exclusion of other principals in a digital rights management (DRM) system based on a revocation list from a delegated revocation authority
8817533410Architecture to support public voice VPN services over an IP network
8827529929System and method for dynamically enforcing digital rights management rules
8837529926Public key certification providing apparatus
8847512974Computer system and program to update SSL certificates
8857512230Method and apparatus of fast modular reduction
8867509490Method and apparatus for encrypted communications to a secure server
8877509486Encryption processor for performing accelerated computations to establish secure network sessions connections
8887506358Method and apparatus supporting network communications through a firewall
8897506153Method and system for user registration using sensor with identifier
8907503072Hardware ID to prevent software piracy
8917500098Secure mode controlled memory
8927496750Performing security functions on a message payload in a network element
8937490348Wireless network having multiple communication allowances
8947490347Hierarchical security domain model
8957484240Mechanism to allow authentication of terminated SIP calls
8967480797Method and system for preventing current-privilege-level-information leaks to non-privileged code
8977478428Adapting input to find integer overflows
8987478422Declarative language for specifying a security policy

2008

8997467410System and method for preventing network misuse
9007467303Grid mutual authorization through proxy certificate generation
9017461260Methods and apparatus for finding a shared secret without compromising non-shared secrets
9027461248Authentication and authorization in heterogeneous networks
9037457956Securing arbitrary communication services
9047454797Secure image authentication with discrete level tamper localization
9057454612On-disk file format for a serverless distributed file system
9067454021Off-loading data re-encryption in encrypted data management systems
9077448067Method and apparatus for enforcing network security policies
9087441277Electronic deposit box system
9097441270Connectivity in the presence of barriers
9107441119Offload processing for secure data transfer
9117440449High speed switching module comprised of stacked layers incorporating t-connect structures
9127437766Method and apparatus providing deception and/or altered operation in an information system operating system
9137434255Encryption error monitoring system and method for packet transmission
9147428751Secure recovery in a serverless distributed file system
9157424733Device control system
9167415608On-disk file format for a serverless distributed file system
9177415606Method and apparatus for managing secure collaborative transactions
9187412604Using biometrics on pervasive devices for mobile identification
9197412600Approaches for automatically switching message authentication keys
9207409708Advanced URL and IP features
9217409704System and method for local policy enforcement for internet service providers
9227404207Data sharing and networking system for integrated remote tool access, data collection, and control
9237401355Firewall load balancing using a single physical device
9247401220On-disk file format for a serverless distributed file system
9257400733Key refresh at the MAC layer
9267400641Bus master for a bus for connection of sensors and/or ignition means
9277398554Secure lock mechanism based on a lock word
9287389534Method and apparatus for establishing virtual private network tunnels in a wireless network
9297389416Method of verifiably sharing a secret in potentially asynchronous networks
9307389274Integrated payment for international business reply mail
9317383573Method for transparently managing outbound traffic from an internal user of a private network destined for a public network
9327380279System for integrating security and access for facilities and information systems
9337380273Method for authenticating a user access request
9347376830System and method for routing messages
9357376827Directory-enabled network elements
9367372998System and method for efficient non-overlapping partitioning of rectangular regions of interest in multi-channel detection
9377366306Programmable logic device that supports secure and non-secure modes of decryption-key access
9387363654Data transmission system and sale managing system
9397363651System for digital content access control
9407363492Method for zero-knowledge authentication of a prover by a verifier providing a user-selectable confidence level and associated application devices
9417363203Determining event causality including employment of partitioned event space
9427360251Method and system for monitoring online behavior at a remote site and creating online behavior profiles
9437360244Method for authenticating a user access request
9447360084System, device, and method for controlling access in a multicast communication network
9457360083Method and system for providing end-to-end security solutions to aid protocol acceleration over networks using selective layer encryption
9467360079System and method for processing digital documents utilizing secure communications over a network
9477356838System and method for controlling access to digital content, including streaming media
9487353542Storage system, computer system, and method of authorizing an initiator in the storage system or the computer system
9497353537Secure transparent virtual private networks
9507350231System and method for controlling access to digital content, including streaming media
9517340771System and method for dynamically creating at least one pinhole in a firewall
9527340601Electronic certificate
9537334268Method and apparatus for data files used in the transmission of information
9547334260Information processing apparatus and method, and recording medium on which a program for executing the information processing is recorded
9557334255System and method for controlling access to multiple public networks and for controlling access to multiple private networks
9567334124Logical access block processing protocol for transparent secure file storage
9577328341Method and apparatus for protecting file system based on digital signature certificate
9587325135Method and system for authorizing reconfiguration of a vehicle
9597318234Request persistence during session authentication
9607318152Wide area network using internet with high quality of service
9617316029Network security services architecture

2007

9627313827Apparatus and method for analysis of conversational patterns to position information and autonomic access control list management
9637313813Method and apparatus for providing and maintaining a user-interactive portal system accessible via internet or other switched-packet-network
9647313689Method, system and service for the authentication of a public key certificate
9657310813System and method for strong access control to a network
9667310729Digital rights management license delivery system and method
9677308706Associative policy model
9687305703Method and system for enforcing a communication security policy
9697305700Secure transport for mobile communication network
9707305553Manifest-based trusted agent management in a trusted operating system environment
9717302706Network-based file scanning and solution delivery in real time
9727302591Access control
9737302569Implementation and use of a PII data access control facility employing personally identifying information labels and purpose serving functions sets
9747302568Method, system, and article of manufacture for remote management of devices
9757299500Method and apparatus for secure delivery and rights management of digital content at an unsecure site
9767299489Method and apparatus for host probing
9777296292Method and apparatus in an application framework system for providing a port and network hardware resource firewall for distributed applications
9787296290Method and apparatus for handling user identities under single sign-on services
9797293294Method and apparatus for using contents
9807293287Method and system for modeling, analysis and display of network security events
9817293283Flexible electronic message security mechanism
9827290138Credentials and digitally signed objects
9837290134Encapsulation mechanism for packet processing
9847284269High-speed adaptive structure of elementary firewall modules
9857284268System and method for a routing device to securely share network data with a host utilizing a hardware firewall
9867284264Discovery of an advertising service in e-speak
9877284124Trust level based platform access regulation application
9887281125Securing sensitive configuration data remotely
9897278167Data communications system, terminal, and program
9907278162Use of a programmable network processor to observe a flow of packets
9917275258Apparatus and method for multi-threaded password management
9927272854Aliasing to prevent attacks on messaging services
9937272853Origination/destination features and lists for spam prevention
9947269853Privacy policy change notification
9957269847Firewall providing enhanced network security and user transparency
9967266847Secure message system with remote decryption service
9977266682Method and system for transmitting data from a transmitter to a receiver and transmitter and receiver therefor
9987260839System and method for secure wall
9997260836System and method for distributed authentication service
10007260716Method for overcoming the single point of failure of the central group controller in a binary tree group key exchange approach
10017257837Firewall penetration system and method for real time media communications
10027257707Manifest-based trusted agent management in a trusted operating system environment
10037257393Method and apparatus for time calibration
10047254834Fault tolerant firewall sandwiches
10057254706System and method for downloading of files to a secure terminal
10067251825Method to use a virtual private network using a public network
10077249378Firewall providing enhanced network security and user transparency
10087249377Method for client delegation of security to a proxy
10097249376Firewall providing enhanced network security and user transparency
10107249264Secure IP based streaming in a format independent manner
10117246233Policy-driven kernel-based security implementation
10127240196Method and system for protecting ownership rights of digital content files
10137240192Combining a browser cache and cookies to improve the security of token-based authentication protocols
10147237266Electronic vulnerability and reliability assessment
10157237264System and method for preventing network misuse
10167237260Method for dynamic selection for secure and firewall friendly communication protocols between multiple distributed modules
10177237110Authentication system, authentication apparatus, authentication target apparatus, authentication method, method of being authenticated, program and information recording medium
10187237107Method and apparatus for discovering a trust chain imparting a required attribute to a subject
10197234057Method for processing access-request message for packet service
10207231659Entity authentication in a shared hosting computer network environment
10217228420Method and system for technician authentication of a vehicle
10227225330Security mechanism for computer processing modules
10237219226Method and apparatus for encrypting data
10247219224Method and apparatus for transferring fragmented audio/video control commands using an independent software layer
10257216224Method and system for user registration using processing sensor
10267210165Pre-licensing of rights management protected content
10277206941Method and apparatus for validating security components through a request for content
10287203964Method of stopping internet viruses
10297185196Key caching system
10307168090Mobile IP authentication

2006

10317068207Device for operating electronic apparatus. recorded medium and electronic apparatus
10326996072Method and apparatus for exchange of information in a communication network

2005

10336968059Video information generating apparatus, video communication terminal, video distribution server, and video information system
10346947895Distributed speech system with buffer flushing on barge-in
10356910061Framework system and method for testing server performance under multiple workloads
10366898623Simplified configuration of an internet-enabled device
10376889267Asynchronous communication protocol using efficient data transfer formats
10386856676System and method of controlling and managing voice and data services in a telecommunications network

2004

10396834316Data transfer controller and electronic device
10406826523Application development interface for multi-user applications executable over communication networks
10416721831Method for controlling bus in digital interface
10426678842Communications system and associated deskewing methods

2003

10436665306Immediate cut-off protocol and interface for a packet-based bus connecting processors
10446633581Serial communication apparatus
10456611262Generation of a bit stream containing binary image/audio data that is multiplexed with a code defining an object in ascii format
10466603488Browser based command and control home network

2002

10476442171Logical topology and address assignment for interconnected digital networks
10486438591Entity management system

2001

10496308150Dynamic bit allocation apparatus and method for audio coding
10506288716Browser based command and control home network
10516219712Congestion control in a network
10526169475System and method for active detection of connection to a network

2000

10536161186Lower power passive listen method for electronic devices
10546074345Patient data acquisition and control system

1999

10555917856Method for establishing a PAM signal connection using a training sequence
10565889817Communication system with data comparison circuit
10575870429Apparatus method, and software modem for utilizing envelope delay distortion characteristics to determine a symbol rate and a carrier frequency for data transfer

1998

10585831517Message sending system

1997

10595703872Intelligent concentrator for multiple speed data communications systems
10605692128Computer network with reliable and efficient removable media services
10615608907Extensible entity management system including an information manager for obtaining, storing and retrieving information from entities
10625606719Temporary state preservation for a distributed file service
10635596720Redundant message processing system featuring reception server controlling communication between client and server process, and stand-by server retransmitting message with information indicating the message being a retransmitted message

1996

10645557796Extensible entity management system including a dispatching kernel and modules which independently interpret and execute commands
10655557266System for cascading data switches in a communication node
10665530905Temporary state preservation for a distributed file service which purges virtual circuit control information after expiration of time limit of inactivity
10675530696Intelligent concentrator for multiple speed data communications systems
10685495619Apparatus providing addressable storage locations as virtual links and storing predefined destination information for any messages transmitted on virtual links at these locations
10695490271Remote interrupt processing over a network

1995

10705475838Extensible entity management system including rule-based alarms
10715475819Distributed configuration profile for computing system
10725418912System and method for controlling buffer transmission of data packets by limiting buffered data packets in a communication session
10735408619Naming service database updating technique
10745408609Computer architecture having elements distributed over and adaptable to a plurality of local area networks of various types, and a microprograms architecture therefore
10755394522Selecting and locating graphical icon objects to define and configure the workstations in data processing networks
10765386566Inter-processor communication method for transmitting data and processor dependent information predetermined for a receiving process of another processor

1994

10775371897Method for requesting identification of a neighbor node in a data processing I/O system
10785361366Computer equipped with serial bus-connected plural processor units providing internal communications
10795349675System for directly displaying remote screen information and providing simulated keyboard input by exchanging high level commands
10805349674Automated enrollment of a computer system into a service network of computer systems
10815345587Extensible entity management system including a dispatching kernel and modules which independently interpret and execute commands
10825307484Relational data base repository system for managing functional and physical data structures of nodes and links of multiple computer networks
10835307265Computer method and system for communication in a multi-lingual network
10845303238Network communications intermediate interface
10855293634System for retrieving token having a selected nest level and satisfying predetermined retrieval condition
10865293488Message-routing apparatus
10875293377Network control information without reserved bandwidth
10885289579Channel adapter for broadband communications at channel speeds

1993

10895265241Method and apparatus for verifying the configuration of a link-connected network
10905261096Interprocess message passing method in a distributed digital data system
10915253359Control and maintenance subsystem network for use with a multiprocessor computer system
10925247670Network server
10935224205Method of combining architecturally dissimilar computing networks into a single logical network
10945222242System for locating a node containing a requested resource and for selectively verifying the presence of the resource at the node
10955218713Distributed data management mechanism for handling a data stream
10965191651Apparatus and method for making of interconnected processors act like a single node in a multinode communication system
10975191650Virtual chains for session initiation in a distributed computer network

1992

10985175800Expert and data base system and method for communications network
10995167035Transferring messages between nodes in a network
11005166931Communications network dynamic addressing arrangement
11015165021Transmit queue with loadsheding
11025165020Terminal device session management protocol
11035163045Communications network arranged to transport connection oriented and connectionless messages
11045151989Directory cache management in a distributed data processing system
11055146561Communication network data manager system
11065142683Intercomputer communication control apparatus and method
11075142622System for interconnecting applications across different networks of data processing systems by mapping protocols across different network domains
11085136716Session control in network for digital data processing system which supports multiple transfer protocols
11095133053Interprocess communication queue location transparency
11105128926Updating link state information in networks
11115113522Data processing system with system resource management for itself and for an associated alien processor
11125113499Telecommunication access management system for a packet switching network
11135109483Node initiating XID exchanges over an activated link including an exchange of sets of binding signals between nodes for establishing sessions
11145086428Reliable broadcast of information in a wide area network

1991

11155063523Network management system with event rule handling
11165060150Process creation and termination monitors for use in a distributed message-based operating system
11175058108Local area network for digital data processing system
11185056003Distributed data management mechanism
11195051892Full duplex conversation between transaction programs
11205032987System with a plurality of hash tables each using different adaptive hashing functions
11215031093System for establishing route by selecting minimum of time-independent link parameters of incremental values
11225027269Method and apparatus for providing continuous availability of applications in a computer network
11235025491Dynamic address binding in communication networks
11245023780Method of operating a packet switching network
11255010514Structured fields at a data stream boundary for delimiting files
11265005122Arrangement with cooperating management server node and network service node
11275003470Method for tying and untying path access in a CPU-based, layered communications system
11285001628Single system image uniquely defining an environment for each user in a data processing system
11294999771Communications network
11304989139Map case network virtual connection interface system

1990

11314977499Method and apparatus for commanding operations on a computer network
11324975905Message transmission control arrangement for node in local area network
11334975904Local area network for digital data processing system including timer-regulated message transfer arrangement
11344972437Method of controlling limited resource sessions in a data communications network
11354949248System for shared remote access of multiple application programs executing in one or more computers
11364941089Input/output network for computer system
11374937737Process transparent multi storage mode data transfer and buffer control
11384926375Multiple nodes broadcast communication method with receiver identification by bit position in transferred massage
11394914653Inter-processor communication protocol
11404914619Apparatus and method for interconnecting an application of a transparent services access facility to remote source
11414914571Locating resources in computer networks
11424905229Local area communication network

1989

11434888726Distributed processing in a cluster of industrial controls linked by a communications network
11444887075Local area network system with a multi-computer system coupled thereto and method for controlling the same
11454866664Intercomputer communication control apparatus & method
11464853875Image-capable interprocessor link communications protocol
11474837739Telemetry data processor
11484835674Computer network system for multiple processing elements
11494835673Method and apparatus for sharing resources among multiple processing systems
11504831620Controller for controlling multiple LAN types
11514831518Multiprocessor interrupt rerouting mechanism
11524827411Method of maintaining a topology database
11534823124Lan controller proprietary bus
11544823122Local area network for digital data processing system
11554807118Method for handling slot requests over a network
11564805168Local area communication network
11574800488Method of propagating resource information in a computer network

1988

11584794594Method and system of routing data blocks in data communication networks
11594792921Network event identifiers
11604791566Terminal device session management protocol
11614780821Method for multiple programs management within a network having a server computer and a plurality of remote computers
11624760395Arrangement for communications between equipment belonging to different network architectures
11634736369Adaptive session-level pacing
11644718005Distributed control of alias name usage in networks

1987

11654714996Impact calculation for version management in a distributed information service
11664714995Computer integration system
11674654654Data network acknowledgement arrangement
11684649473Flexible data transmission for message based protocols
11694644470Non-unique names for broadcast messages
11704644468Name usage support through distributed processing networks linked by bridges and/or gateways

1986

11714620276Method and apparatus for asynchronous processing of dynamic replication messages
11724614841Geographically distributed multiprocessor time-shared communication processing system
11734586134Computer network system and its use for information unit transmission
11744574284Communication bus interface unit

1985

11754550402Data communication system
11764493021Multicomputer communication system

1984

11774463417Modular, processor-controlled document distribution terminal
11784451827Local area communication network
11794432057Method for the dynamic replication of data under distributed system control to control utilization of resources in a multiprocessing, distributed data base system
11804430651Expandable and contractible local area network system

1983

11814423414System and method for name-lookup in a local area network data communication system
11824412285Multiprocessor intercommunication system and method
11834410889System and method for synchronizing variable-length messages in a local area network data communication system

1981

11844274139Digital telecommunication network having improved data processing systems
© 2017, ПАТ-Инфо, В.И. Карнышев
Дата формирования списка: 03.04.2017