СПИСОК патентов США - подгруппа МПК16 H04L29/00
|
№ п/п | Номер патента | Название патента | |||
2017 | |||||
1 | 9608945 | Sending messages to multiple receiving electronic devices using a message server | |||
2 | 9608822 | Method for generating an HTML document that contains encrypted files and the code necessary for decrypting them when a valid passphrase is provided | |||
3 | 9608810 | Systems and methods for encryption and provision of information security using platform services | |||
4 | 9602542 | Security-function-design support device, security-function-design support method, and program storage medium | |||
5 | 9602536 | Virtualized network honeypots | |||
6 | 9602508 | System and method for performing an action based upon two-party authorization | |||
7 | 9596215 | Partitioning a filter to facilitate filtration of packets | |||
8 | 9590809 | Method for operating a mobile device by means of a motor vehicle | |||
9 | 9589153 | Securing integrity and consistency of a cloud storage service with efficient client operations | |||
10 | 9589122 | Operation processing method and device | |||
11 | 9584569 | Method and system for supplying media over communication networks | |||
12 | 9584532 | Enterprise intrusion detection and remediation | |||
13 | 9584511 | Virtual verification | |||
14 | 9584315 | Order-preserving encryption system, encryption device, decryption device, encryption method, decryption method, and programs thereof | |||
15 | 9578502 | Device authentication using inter-person message metadata | |||
16 | 9578104 | Resumption of play for a content-delivery session | |||
17 | 9578065 | System and method for distributing antivirus records to user devices | |||
18 | 9578034 | Trusted peripheral device for a host in a shared electronic environment | |||
19 | 9578029 | Diameter signaling for mobile IPv4 | |||
20 | 9578019 | Method and system for managing an embedded secure element eSE | |||
21 | 9578015 | Step-up authentication for single sign-on | |||
22 | 9578007 | Secure transmission of a session identifier during service authentication | |||
23 | 9577926 | Authorizing communications between computing nodes | |||
24 | 9577835 | Online chats without displaying confidential information | |||
25 | 9576155 | Trusted computing host | |||
26 | 9571505 | Trustworthiness of processed data | |||
27 | 9571462 | Extensible personality-based messaging system in a distributed computerized infrastructure for establishing a social network | |||
28 | 9571456 | Systems and methods for fine grain policy driven clientless SSL VPN access | |||
29 | 9569539 | Unified communication audit tool | |||
30 | 9563760 | Biometric authentication for regulating access to content sources via a client device | |||
31 | 9560525 | System and method for unified authentication in communication networks | |||
32 | 9560133 | Acquiring multi-media content | |||
33 | 9560065 | Path scanning for the detection of anomalous subgraphs and use of DNS requests and host agents for anomaly/change detection and network situational awareness | |||
34 | 9560039 | Controlled discovery of SAN-attached SCSI devices and access control via login authentication | |||
35 | 9560013 | Firewall based prevention of the malicious information flows in smart home | |||
36 | 9560011 | System and method for protecting service-level entities | |||
37 | 9559849 | Service-to-service digital path tracing | |||
38 | 9554279 | Authorized areas of authentication | |||
39 | 9553869 | Method for initializing a memory area that is associated with a smart meter | |||
40 | 9552468 | Image processing apparatus and control method thereof | |||
41 | 9549319 | Presence verification within a wireless environment | |||
42 | 9548991 | Preventing application-level denial-of-service in a multi-tenant system using parametric-sensitive transaction weighting | |||
43 | 9548989 | Network monitoring apparatus and method | |||
44 | 9548975 | Authentication method, authentication system, and service delivery server | |||
45 | 9547723 | Data processing based on two-dimensional code | |||
46 | 9547614 | Device management system, communication device, device management apparatus, and control method | |||
47 | 9544394 | Network resource identification | |||
48 | 9544333 | Policy setting for content sharing of a plurality of remotely connected computing devices in physical or virtualized space | |||
49 | 9544292 | Credential management | |||
50 | 9538001 | Communication terminal, communication management system, communication system, and recording medium | |||
51 | 9537895 | System and method for securing use of a portable drive with a computer network | |||
52 | 9537874 | System for providing behavior information notification service and method for providing behavior information notification service | |||
53 | 9537856 | Redirection method for electronic content | |||
54 | 9537836 | System and method for secured content delivery | |||
55 | 9537825 | Geographic filter for regulating inbound and outbound network communications | |||
56 | 9536057 | Premises aware security | |||
2016 | |||||
57 | 9532089 | Session-based encryption for delivering content on-demand | |||
58 | 9531539 | Information processing apparatus, and information processing method | |||
59 | 9530003 | Computer system and method of securely booting a computer system | |||
60 | 9529514 | System and method for automating the management, routing, and control of multiple devices and inter-device connections | |||
61 | 9529356 | Data management system of an aircraft | |||
62 | 9525670 | Computer product, recording medium, communications apparatus, and communications method | |||
63 | 9520918 | Login via near field communication with automatically generated login information | |||
64 | 9516107 | Secure local server for synchronized online content management system | |||
65 | 9516028 | Hierarchical policy-based shared resource access control | |||
66 | 9515992 | Network environment separation | |||
67 | 9514718 | Information processing system, information processing apparatus, and information processing method | |||
68 | 9514295 | Quantified identity | |||
69 | 9503480 | Deploying policy configuration across multiple security devices through hierarchical configuration templates | |||
70 | 9503471 | Pre-processing system for minimizing application-level denial-of-service in a multi-tenant system | |||
71 | 9503453 | OTP-based authentication system and method | |||
72 | 9503262 | Transparent denial of service protection | |||
73 | 9497191 | Multiple user authentications on a communications device | |||
74 | 9497062 | System and method for secure storage, transfer and retrieval of content addressable information | |||
75 | 9491187 | APIs for obtaining device-specific behavior classifier models from the cloud | |||
76 | 9489519 | Method and apparatus for encrypting data messages after detecting infected VM | |||
77 | 9485286 | Sharing media items with pass phrases | |||
78 | 9485265 | Malicious activity detection system capable of efficiently processing data accessed from databases and generating alerts for display in interactive user interfaces | |||
79 | 9485234 | Virtualized endpoints in a multi-tenant environment | |||
80 | 9483751 | Label privileges | |||
81 | 9483093 | Electronic device and method for controlling a setting of a maximum consumption current | |||
82 | 9479936 | Electronic device and content sharing method | |||
83 | 9479533 | Time based authentication codes | |||
84 | 9479495 | Sending authentication codes to multiple recipients | |||
85 | 9479357 | Detecting malware on mobile devices based on mobile behavior analysis | |||
86 | 9474976 | Management of ancillary content delivery and presentation | |||
87 | 9471778 | Automatic baselining of anomalous event activity in time series data | |||
88 | 9471773 | Apparatus, system, and method for context-sensitive rolling password generation | |||
89 | 9471759 | Enabling device functionality based on indoor positioning system detection of physical customer presence | |||
90 | 9467473 | System and method for compact form exhaustive analysis of security policies | |||
91 | 9467456 | Single login authentication for users with multiple IPv4/IPv6 addresses | |||
92 | 9467439 | Access control method, access control system, communication terminal, and server | |||
93 | 9467424 | Methods and systems for proxying data | |||
94 | 9467291 | Information processing system, information processing method, and non-transitory computer readable medium for processing requests using an authority object | |||
95 | 9462248 | System and apparatus for managing video content recordings | |||
96 | 9462075 | Encrypted cached content system | |||
97 | 9462001 | Computer network access control | |||
98 | 9461997 | Secure authorization of modules running on virtualized hardware | |||
99 | 9461979 | Method and system for including network security information in a frame | |||
100 | 9461824 | Transmitting a document | |||
101 | 9461816 | Methods, systems and apparatus to reduce processor demands during encryption | |||
102 | 9461815 | Virtualized AES computational engine | |||
103 | 9460276 | Virtual machine system, confidential information protection method, and confidential information protection program | |||
104 | 9455986 | Method of authenticating a device to access a service | |||
105 | 9455830 | Method for securing credentials in a remote repository | |||
106 | 9455828 | Re-encryption system, re-encryption method and re-encryption program | |||
107 | 9451096 | Integrated service identity for different types of information exchange services | |||
108 | 9451091 | Systems and methods for state awareness across communication channels and statefully transitioning between communication channels | |||
109 | 9450965 | Mobile device, program, and control method | |||
110 | 9450942 | Access to resources | |||
111 | 9450925 | Methods and systems for auto-commissioning of devices in a communication network | |||
112 | 9450761 | Memory system and method of generating management information | |||
113 | 9450751 | Smart card, electronic device, and portable electronic device | |||
114 | 9444838 | Pre-processing system for minimizing application-level denial-of-service in a multi-tenant system | |||
115 | 9444800 | Virtual communication endpoint services | |||
116 | 9444787 | Non-intrusive method and apparatus for automatically dispatching security rules in cloud environment | |||
117 | 9442590 | Display device and method for controlling the same | |||
118 | 9438605 | Determining response signature commonalities | |||
119 | 9438599 | Approaches for deployment approval | |||
120 | 9438578 | Digital communication biometric authentication | |||
121 | 9438576 | Apparatus and method for validation and authorization of device and user by global positioning and non-prompted exchange of information | |||
122 | 9436815 | Block management unification system and method | |||
123 | 9432391 | Method, device and apparatus for acquiring security state of mobile terminal | |||
124 | 9432335 | Cloud-based multi-layer security architecture with firewalled virtual network portions | |||
125 | 9432197 | Wireless communications device and authentication processing method | |||
126 | 9430644 | Systems, methods, and apparatus to enhance the integrity assessment when using power fingerprinting systems for computer-based systems | |||
127 | 9430405 | Encrypted purging of data from content node storage | |||
128 | 9426174 | Protecting computing assets from segmented HTTP attacks | |||
129 | 9426171 | Detecting network attacks based on network records | |||
130 | 9426125 | Real-time reconfigurable web application firewall for a distributed platform | |||
131 | 9424113 | Virtual appliance deployment | |||
132 | 9419950 | Secure message forwarding system detecting user's preferences including security preferences | |||
133 | 9419841 | Token-based secure data management | |||
134 | 9419798 | Public encryption method based on user ID | |||
135 | 9413778 | Security policy creation in a computing environment | |||
136 | 9413724 | Cloud-based security policy configuration | |||
137 | 9407612 | Technologies for secure inter-virtual network function communication | |||
138 | 9407436 | Portable device registration system and portable device registration method | |||
139 | 9402108 | Receiver software protection | |||
140 | 9400688 | Resource restriction systems and methods | |||
141 | 9398426 | Method and apparatus for transmitting secure cell broadcast messages in a cellular communication network | |||
142 | 9398027 | Data detecting method and apparatus for firewall | |||
143 | 9398013 | System, method and computer program product for an authentication management infrastructure | |||
144 | 9398005 | Managing seed provisioning | |||
145 | 9397980 | Credential management | |||
146 | 9397838 | Credential management | |||
147 | 9397835 | Web of trust management in a distributed system | |||
148 | 9395929 | Network storage server with integrated encryption, compression and deduplication capability | |||
149 | 9391978 | Multiple access authentication | |||
150 | 9390265 | Anomalous system state identification | |||
151 | 9386293 | Method for generating and rebuilding a stereoscopic-compatible video stream and related coding and decoding devices | |||
152 | 9386044 | Correlation based security risk identification | |||
153 | 9378362 | System and method of monitoring attacks of cross site script | |||
154 | 9374305 | Packet transfer system | |||
155 | 9374219 | Method and apparatus for securing access to an integrated circuit | |||
156 | 9373096 | Smart cloud workload balancer | |||
157 | 9369526 | Distributed storage time synchronization based on retrieval delay | |||
158 | 9369444 | Remote access service inspector | |||
159 | 9367514 | Communication node and communication method | |||
160 | 9363675 | Distributed wireless security system | |||
161 | 9363257 | Secure federated identity service | |||
162 | 9361465 | Privacy-enhanced car data distribution | |||
163 | 9361439 | Virtual verification | |||
164 | 9356822 | Automated interface apparatus and method for use in semiconductor wafer handling systems | |||
165 | 9355238 | Secure authentication at a self-service terminal | |||
166 | 9350746 | Transmission network system, transmission method, and authentication information device | |||
167 | 9350721 | Air interface security method and device | |||
168 | 9349018 | Preventing content data leak on mobile devices | |||
169 | 9349005 | Preventing re-patching by malware on a computer | |||
170 | 9344500 | Distributed storage time synchronization based on storage delay | |||
171 | 9344474 | Method and system for supplying media over communication networks | |||
172 | 9344334 | Network policy implementation for a multi-virtual machine appliance within a virtualization environment | |||
173 | 9344283 | Captcha image scramble | |||
174 | 9342694 | Security method and apparatus | |||
175 | 9338160 | Certificate checkin service | |||
176 | 9336394 | Securely recovering a computing device | |||
177 | 9336025 | Systems and methods of analyzing a software component | |||
178 | 9330270 | Encryption processing device and authentication method | |||
179 | 9330260 | Detecting auto-start malware by checking its aggressive load point behaviors | |||
180 | 9325737 | Security based network access selection | |||
181 | 9325733 | Unsupervised aggregation of security rules | |||
182 | 9319493 | Communication method and information processing system | |||
183 | 9319452 | System and method for providing private session-based access to a redirected USB device or local device | |||
184 | 9319424 | Methods and systems for complying with network security requirements | |||
185 | 9313172 | Providing access to remote networks via external endpoints | |||
186 | 9313085 | DNS-based determining whether a device is inside a network | |||
187 | 9311678 | Comment plug-in for third party system | |||
188 | 9311254 | Method and apparatus for an improved access system | |||
189 | 9306985 | User configurable data storage | |||
190 | 9306933 | Ensuring network connection security between a wrapped app and a remote server | |||
191 | 9305173 | Portable authorization device for authorizing use of protected information and associated method | |||
192 | 9305168 | Modular static application security testing | |||
193 | 9301150 | Methods and apparatus for clear channel assessment | |||
194 | 9301082 | Mobile device sensor data subscribing and sharing | |||
195 | 9300690 | Secure network labeling to control inter-process communications in a multi-tenant platform-as-a-service (PaaS) system | |||
196 | 9300677 | Data security system | |||
197 | 9294470 | Certificate management method based on connectivity and policy | |||
198 | 9294439 | Systems and methods for application-based interception of SSL/VPN traffic | |||
199 | 9294273 | Method and system for conditional access to a digital content, associated terminal and subscriber device | |||
200 | 9292700 | Method and system for securing data | |||
201 | 9292467 | Mobile resource accelerator | |||
202 | 9292179 | System and method for identifying music content in a P2P real time recommendation network | |||
203 | 9288596 | Coordinator device for paired or consolidated players | |||
204 | 9288268 | Methods and apparatus to monitor shoppers in a retail environment | |||
205 | 9282116 | System and method for preventing DOS attacks utilizing invalid transaction statistics | |||
206 | 9280604 | Unified communication audit tool | |||
207 | 9278284 | UDP broadcast for a user interface in a download and configuration gaming method | |||
208 | 9277400 | Location-enabled security services in wireless network | |||
209 | 9276849 | Frame relay switched data service | |||
210 | 9270702 | Method of securing a mobile terminal | |||
211 | 9270449 | Secured communication in network environments | |||
212 | 9268926 | Privileged activity monitoring through privileged user password management and log management systems | |||
213 | 9268924 | Transmission apparatus, electronic appliance, reception apparatus, and authentication system | |||
214 | 9268918 | Encryption and decryption of a dataset in at least two dimensions | |||
215 | 9264437 | Systems and methods for providing dynamically selected media content items | |||
216 | 9264431 | Method and system for remote data access using a mobile device | |||
217 | 9264238 | Facilitating virtual personal area networks | |||
218 | 9264231 | System and method of using RFID tag proximity to grant security access to a computer | |||
219 | 9262608 | System for providing session-based network privacy, private, persistent storage, and discretionary access control for sharing private data | |||
220 | 9262128 | Information processing apparatus, information processing method and computer program | |||
221 | 9258123 | Multi-layered color-sensitive passwords | |||
222 | 9258030 | Wireless communication device | |||
223 | 9256714 | Preserving integrity of messages in a messaging oriented middleware system | |||
224 | 9253208 | System and method for automated phishing detection rule evolution | |||
225 | 9253193 | Systems and methods for policy based triggering of client-authentication at directory level granularity | |||
226 | 9253178 | Method and apparatus for authenticating a communication device | |||
227 | 9253174 | Providing a second factor authorization | |||
228 | 9251384 | Trusted peripheral device for a host in a shared electronic environment | |||
229 | 9251355 | Field level database encryption using a transient key | |||
230 | 9251325 | Verifying passwords on a mobile device | |||
231 | 9251317 | Network video messaging | |||
232 | 9246915 | Streaming media for portable devices | |||
233 | 9246910 | Determination of apparatus configuration and programming data | |||
234 | 9245148 | Secure storage and accelerated transmission of information over communication networks | |||
235 | 9240995 | Method and system for denying cable modem access to a broadband network | |||
236 | 9240993 | Method and system for in-field recovery of security when a certificate authority has been compromised | |||
237 | 9240988 | Computer system employing dual-band authentication | |||
238 | 9240886 | Authentication adaptation | |||
239 | 9240012 | Systems and methods for multifactor authentication | |||
240 | 9237018 | Multisystem biometric token | |||
241 | 9232065 | Group pseudo-profiles for online sessions | |||
242 | 9231988 | Intercluster repository synchronizer and method of synchronizing objects using a synchronization indicator and shared metadata | |||
243 | 9231972 | Malicious website identifying method and system | |||
244 | 9231947 | RFID authentication architecture and methods for RFID authentication | |||
245 | 9231934 | Control server, data processing device, and control device for data processing device | |||
246 | 9231929 | Methods and devices for security key renewal in a communication system | |||
247 | 9230066 | Assessing risk for third-party data collectors | |||
2015 | |||||
248 | 9225703 | Protecting end point devices | |||
249 | 9225588 | Alarm management apparatus and method for managing alarms | |||
250 | 9225519 | Method, system, and apparatus for enabling secure functionalities | |||
251 | 9218503 | Collection and analysis of customer data from application programming interface usage | |||
252 | 9218227 | Method and system for user-designed application deployment | |||
253 | 9215324 | Systems and methods for state awareness across communication channels and statefully transitioning between communication channels | |||
254 | 9215209 | Source request monitoring | |||
255 | 9213561 | Virtual appliance deployment | |||
256 | 9208295 | Policy-based control layer in a communication fabric | |||
257 | 9207753 | Multiple-queue multiple-resource entry sleep and wakeup for power savings and bandwidth conservation in a retry based pipeline | |||
258 | 9204297 | Information processing apparatus, information processing method, operation terminal, and information processing system | |||
259 | 9203806 | Rule swapping in a packet network | |||
260 | 9198033 | Method and apparatus for authenticating nodes in a wireless network | |||
261 | 9197910 | Business method including handshake protocol to control actors and functions to propagate acceptance of an IP license to securely authenticate software application program interfaces (APIs) | |||
262 | 9197678 | Method and system for data transmission | |||
263 | 9197668 | Access control to files based on source information | |||
264 | 9197654 | Rootkit detection by using HW resources to detect inconsistencies in network traffic | |||
265 | 9197649 | System and method for email fraud risk assessment | |||
266 | 9197625 | Cloud-based device information storage | |||
267 | 9197601 | System and method for providing a single global borderless virtual perimeter through distributed points of presence | |||
268 | 9197405 | System and method for controlling user access to encrypted data | |||
269 | 9189608 | Permission management method for applications, electronic device thereof, and computer readable medium | |||
270 | 9185140 | Reconstruction of session initiation protocol (SIP) dialogs in a SIP network | |||
271 | 9185123 | System and method for mobile identity protection for online user authentication | |||
272 | 9185088 | Secure and efficient communication through an intermediary | |||
273 | 9185039 | Application testing through object level code inspection | |||
274 | 9183841 | Identification of watermarked content | |||
275 | 9183375 | Use of resource up to extension value by subscription device | |||
276 | 9177169 | Secure digital storage | |||
277 | 9172548 | Communication apparatus, control method and storage medium | |||
278 | 9171151 | Reputation-based in-network filtering of client event information | |||
279 | 9171139 | Lock screens to access work environments on a personal mobile device | |||
280 | 9167077 | Surge protection circuit and communication apparatus | |||
281 | 9167030 | Application execution system, computer, application execution device, and control method and program for an application execution system | |||
282 | 9167000 | Dynamic threat event management system and method | |||
283 | 9166997 | Systems and methods for reducing false positives when using event-correlation graphs to detect attacks on computing systems | |||
284 | 9166793 | Efficient authentication for mobile and pervasive computing | |||
285 | 9165120 | Service manifests | |||
286 | 9161215 | Wireless device, registration server and method for provisioning of wireless devices | |||
287 | 9160769 | Managing data in a cloud computing environment using management metadata | |||
288 | 9160756 | Method and apparatus for protecting markup language document against cross-site scripting attack | |||
289 | 9160740 | Establishing secure, mutually authenticated communication credentials | |||
290 | 9160727 | Providing credential information | |||
291 | 9160711 | Internet cleaning and edge delivery | |||
292 | 9154498 | Sharable content item links with use restrictions | |||
293 | 9147086 | Trusted computing host | |||
294 | 9143941 | Secure communication by user selectable communication range | |||
295 | 9143651 | Image forming apparatus, charging information recording method, and recording medium | |||
296 | 9143512 | Communication devices, computer readable storage devices, and methods for secure multi-path communication | |||
297 | 9143379 | Power fluctuation detection and analysis | |||
298 | 9143378 | Rendering components within different browser environments | |||
299 | 9137257 | Anti-phishing filter | |||
300 | 9137245 | Login method, apparatus, and system | |||
301 | 9130982 | System and method for real-time reporting of anomalous internet protocol attacks | |||
302 | 9124622 | Detecting computer security threats in electronic documents based on structure | |||
303 | 9124421 | Data prioritization, storage and protection in a vehicular communication system | |||
304 | 9122878 | Software license management with drifting component | |||
305 | 9119067 | Embodiments of a system and method for securely managing multiple user handles across multiple data processing devices | |||
306 | 9118691 | Content distribution with mutual anonymity | |||
307 | 9118656 | Systems and methods for multi-factor authentication | |||
308 | 9118617 | Methods and apparatus for adapting the protection level for protected content | |||
309 | 9116765 | System and method for obfuscating data using instructions as a source of pseudorandom values | |||
310 | 9116715 | Systems and methods for efficiently booting and configuring virtual servers | |||
311 | 9112908 | System and method for managing TLS connections among separate applications within a network of computing systems | |||
312 | 9112907 | System and method for managing TLS connections among separate applications within a network of computing systems | |||
313 | 9107069 | Addressable radio device | |||
314 | 9106646 | Enhanced multi-factor authentication | |||
315 | 9104663 | Dynamic allocation of memory for memory intensive operators | |||
316 | 9104234 | Method and system for quantitative determination of software ease of use | |||
317 | 9100525 | Information processing apparatus, information storage apparatus, information processing system, information processing method, and program | |||
318 | 9100414 | Method and apparatus for providing a reliable voice extensible markup language service | |||
319 | 9100372 | System for determining whether or not automaton satisfies context-free grammar | |||
320 | 9100361 | Secure routing module | |||
321 | 9100277 | Client credentials data structure and method of employing the same | |||
322 | 9100184 | Instructions processors, methods, and systems to process BLAKE secure hashing algorithm | |||
323 | 9098691 | Method and apparatus for encoding and decoding data transmitted to an authentication token | |||
324 | 9092645 | Efficient multiplication, exponentiation and modular reduction implementations | |||
325 | 9088597 | Malicious activity detection of a functional unit | |||
326 | 9084112 | Secure group key agreement for wireless networks | |||
327 | 9083748 | Modelling network to assess security properties | |||
328 | 9083700 | Systems and methods for authorization of information access | |||
329 | 9083581 | System and method for providing resource sharing, synchronizing, media coordination, transcoding, and traffic management in a vehicular environment | |||
330 | 9083566 | System and method for communicating with an applet using an inline web frame in a network environment | |||
331 | 9078126 | Method of sharing a session key between wireless communication terminals using a variable-length authentication code | |||
332 | 9076016 | Anonymization as a service | |||
333 | 9071575 | Method and system for abuse route aggregation and distribution | |||
334 | 9071569 | System, method, and computer program for content metadata and authorization exchange between content providers and service providers | |||
335 | 9071439 | Method and apparatus for remote administration of cryptographic devices | |||
336 | 9069638 | Update system to synchronize changes from external sources for a java virtual machine | |||
337 | 9065806 | Internet based security information interaction apparatus and method | |||
338 | 9065656 | System and methods for managing trust in access control based on a user identity | |||
339 | 9064127 | Systems and methods for securing data in the cloud | |||
340 | 9064115 | Malware detection system and method for limited access mobile platforms | |||
341 | 9060025 | Cloud-based security policy configuration | |||
342 | 9059893 | System and method for providing private session-based access to a redirected USB device or local device | |||
343 | 9058479 | Pass-pattern authentication for computer-based security | |||
344 | 9055427 | Updating configuration parameters in a mobile terminal | |||
345 | 9055036 | Method and apparatus for transmitting a user datagram protocol message that is larger than a defined size | |||
346 | 9055006 | Techniques for traffic diversion in software defined networks for mitigating denial of service attacks | |||
347 | 9053465 | Techniques to manage event notifications | |||
348 | 9049241 | Peer discovery and secure communication in failover schemes | |||
349 | 9049170 | Building filter through utilization of automated generation of regular expression | |||
350 | 9049011 | Secure key storage and distribution | |||
351 | 9043862 | Policy control for encapsulated data flows | |||
352 | 9043594 | System and method for execution of a secured environment initialization instruction | |||
353 | 9038155 | Auditable multiclaim security token | |||
354 | 9038152 | Access to resources | |||
355 | 9037846 | Encoded database management system, client and server, natural joining method and program | |||
356 | 9032522 | PLC backplane analyzer for field forensics and intrusion detection | |||
357 | 9032489 | Method and device for proxy access of open platform | |||
358 | 9032420 | Method and management agent for event notifications correlation | |||
359 | 9032213 | Data distribution path verification | |||
360 | 9031716 | Information handling for aircraft flight decks | |||
361 | 9030112 | Illumination system, and driving device and signal transmitter device thereof | |||
362 | 9027077 | Deploying policy configuration across multiple security devices through hierarchical configuration templates | |||
363 | 9021263 | Secure data access in a dispersed storage network | |||
364 | 9015824 | Allowing a client computing device to securely interact with a private network | |||
365 | 9015483 | Method and system for secured data storage and sharing over cloud based network | |||
366 | 9015473 | Method and system for automated and secure provisioning of service access credentials for on-line services to users of mobile communication terminals | |||
367 | 9014283 | Communication system | |||
368 | 9009789 | Diameter signaling for mobile IPv4 | |||
369 | 9003508 | Methods and apparatus for enabling secure network-based transactions | |||
370 | 9003505 | Cross platform social networking authentication system | |||
371 | 9003477 | Model for managing hosted resources using logical scopes | |||
372 | 9003181 | Incorporating data into cryptographic components of an ECQV certificate | |||
373 | 8995669 | Updating shared keys | |||
374 | 8984627 | Network security management | |||
375 | 8984597 | Protecting user credentials using an intermediary component | |||
376 | 8984290 | Authenticated checkin via passive NFC | |||
377 | 8984274 | Secure data updates | |||
378 | 8978122 | Secure cross-tenancy federation in software-as-a-service system | |||
379 | 8978116 | Method and apparatus for monitoring an online identity of a user on a network | |||
380 | 8978107 | Method and system for enabling non-intrusive multi tenancy enablement | |||
381 | 8973117 | Propagating security identity information to components of a composite application | |||
382 | 8972723 | Storage device and method for providing a partially-encrypted content file to a host device | |||
383 | 8972719 | Passcode restoration | |||
384 | 8966600 | Method, apparatus and system for controlling access to computer platform resources | |||
385 | 8966256 | Transmitting a document | |||
386 | 8959608 | Single sign-on for a native application and a web application on a mobile device | |||
387 | 8959588 | Systems and methods for mitigating remote authentication service unavailability | |||
388 | 8959587 | System and method for authentication for wireless emergency services | |||
389 | 8959582 | System and method for manipulating and managing computer archive files | |||
390 | 8955059 | Authentication system, authentication method, and network storage appliance | |||
391 | 8955035 | Anonymous principals for policy languages | |||
392 | 8955032 | Assessing network and device compliance with security policies | |||
393 | 8954998 | Application of an embedded instrumentation interface definition language | |||
394 | 8954729 | Creating and using a specific user unique id for security login authentication | |||
395 | 8953794 | Apparatus and method for securing beacons | |||
396 | 8949959 | Reduced authentication times for shared-media network migration | |||
397 | 8943556 | Secure information release | |||
398 | 8943551 | Cloud-based device information storage | |||
399 | 8935803 | System and apparatus for transferring data between communication elements | |||
400 | 8935767 | Overlay human interactive proof system and techniques | |||
401 | 8935540 | Electronic device | |||
402 | 8932368 | Method for monitoring the unauthorized use of a device | |||
403 | 8931068 | Authentication process | |||
404 | 8931033 | Integrating policies from a plurality of disparate management agents | |||
405 | 8930702 | Strong authentication token with acoustic data input | |||
2014 | |||||
406 | 8925038 | Pre-authorization of bearer set-up | |||
407 | 8924724 | Document encryption and decryption | |||
408 | 8924714 | Authentication with an untrusted root | |||
409 | 8918634 | Network node with network-attached stateless security offload device employing out-of-band processing | |||
410 | 8917631 | System and method for sharing information between two or more devices | |||
411 | 8914860 | System and method for associating message addresses with certificates | |||
412 | 8914859 | Managing the progressive legible obfuscation and de-obfuscation of public and quasi-public broadcast messages | |||
413 | 8914847 | Multiple user authentications on a communications device | |||
414 | 8914639 | Method and apparatus for one-step signature trust for digitally-signed documents | |||
415 | 8913743 | Method for decrypting an encrypted packet within a wireless communication device, and corresponding device | |||
416 | 8910287 | Methods and systems for preventing malicious use of phishing simulation records | |||
417 | 8910242 | Enable/disable method of additional-function unit, system for same, program for same, as well as additional-function unit | |||
418 | 8904503 | Systems and methods for providing access to data accounts within user profiles via cloud-based storage services | |||
419 | 8904497 | Providing an operational dashboard | |||
420 | 8904491 | Network connecting device and method | |||
421 | 8903089 | Device for secure transmission recording and visualization of audiovisual programs | |||
422 | 8898739 | Intercluster relationship management | |||
423 | 8898738 | Apparatus, system and method for accessing internet webpage | |||
424 | 8897443 | Watermarking slices stored in a dispersed storage network | |||
425 | 8893295 | Secure and private location | |||
426 | 8893245 | Method and device for propagating session management events | |||
427 | 8893219 | Certificate management method based on connectivity and policy | |||
428 | 8887270 | Smart storage device | |||
429 | 8887252 | Information providing system and design information providing server | |||
430 | 8887227 | Network policy implementation for a multi-virtual machine appliance within a virtualization environtment | |||
431 | 8886933 | Streamlined provisioning and configuration of computing devices | |||
432 | 8886928 | Method and system for device authentication | |||
433 | 8881259 | Network security system with customizable rule-based analytics engine for identifying application layer violations | |||
434 | 8881241 | Method of and system for implementing privacy control | |||
435 | 8880942 | Electronic device and method of ensuring guaranteed services | |||
436 | 8875248 | Automatic resource ownership assignment system and method | |||
437 | 8875246 | Automatic resource ownership assignment system and method | |||
438 | 8874905 | Resource restriction systems and methods | |||
439 | 8874902 | Methods and systems for distributing cryptographic data to authenticated recipients | |||
440 | 8869240 | Soft method for local secure connection to a device | |||
441 | 8869233 | Policy management within a network management system | |||
442 | 8863259 | Method of controlling biometric authentication system, non-transitory, computer readable storage medium and biometric authentication system | |||
443 | 8862897 | Increasing data security in enterprise applications by using formatting, checksums, and encryption to detect tampering of a data buffer | |||
444 | 8861736 | Reliable physical unclonable function for device authentication | |||
445 | 8861434 | Method and system for improved multi-cell support on a single modem board | |||
446 | 8856535 | Determining response signature commonalities | |||
447 | 8856524 | Cryptographic methods, host system, trusted platform module, computer arrangement, computer program product and computer program | |||
448 | 8856509 | System and method for cognizant transport layer security (CTLS) | |||
449 | 8856507 | Secure identity and personal information storage and transfer | |||
450 | 8855301 | Coordinating compression information for unreliable encrypted streams through key establishment protocols | |||
451 | 8850567 | Unauthorized URL requests detection | |||
452 | 8850547 | Remote access service inspector | |||
453 | 8850228 | Computing device and method for controlling access to driver programs | |||
454 | 8850183 | Interconnect device to enable compliance with rights management restrictions | |||
455 | 8848741 | High-speed CLD-based TCP segmentation offload | |||
456 | 8844011 | IP multimedia subsystem user identity handling method and apparatus | |||
457 | 8844002 | Method and system for notification and request processing | |||
458 | 8843764 | Secure software and hardware association technique | |||
459 | 8839377 | Information sharing method and system using the same | |||
460 | 8839359 | Data processing device and data processing method | |||
461 | 8832802 | System for distribution permissions for network communications | |||
462 | 8826451 | Mechanism for facilitating communication authentication between cloud applications and on-premise applications | |||
463 | 8826433 | Security intrusion detection and response | |||
464 | 8826388 | Mobile device identify factor for access control policies | |||
465 | 8826003 | Network node with network-attached stateless security offload device employing out-of-band processing | |||
466 | 8819809 | Method and appliance for authenticating, by an appliance, a client to access a virtual private network connection, based on an attribute of a client-side certificate | |||
467 | 8819413 | Method and apparatus for collaborative claim verification | |||
468 | 8813204 | Authenticating use of a dispersed storage network | |||
469 | 8813178 | Systems and methods for preparing and submitting documents to comply with securities regulations | |||
470 | 8812840 | Method for fast pre-authentication by distance recognition | |||
471 | 8806575 | Network selection tool for information handling system | |||
472 | 8806574 | System and method for policy conformance in a web application | |||
473 | 8806567 | Using encoded identifiers to provide rapid configuration for network access | |||
474 | 8806221 | Securely recovering a computing device | |||
475 | 8806193 | Methods and apparatus for integrating digital rights management (DRM) systems with native HTTP live streaming | |||
476 | 8805938 | Enterprise service bus and message processing method thereof | |||
477 | 8804959 | Communication device, communication method, and communication system | |||
478 | 8800044 | Storing and accessing threat information for use in predictive modeling in a network security service | |||
479 | 8800009 | Virtual machine service access | |||
480 | 8799999 | Authentication method | |||
481 | 8798050 | Re-optimization of loosely routed P2MP-TE sub-trees | |||
482 | 8793765 | Data processing apparatus and computer-readable recording medium | |||
483 | 8793490 | Systems and methods for multifactor authentication | |||
484 | 8792645 | Authentication and data security for wireless networks | |||
485 | 8788833 | Electronic apparatus and communication control method | |||
486 | 8776180 | Systems and methods for using reputation scores in network services and transactions to calculate security risks to computer systems and platforms | |||
487 | 8776177 | Dynamic content preference and behavior sharing between computing devices | |||
488 | 8776168 | Applying security policy based on behaviorally-derived user risk profiles | |||
489 | 8775795 | Authenticating method and mobile terminal for code division multiple access (CDMA) evolution to packet data optimized (EVDO) network | |||
490 | 8769612 | Portable device association | |||
491 | 8767121 | Apparatus and method for converting multimedia content, and multimedia content distribution system | |||
492 | 8763150 | Correlating private affinities | |||
493 | 8763090 | Management of ancillary content delivery and presentation | |||
494 | 8762735 | Biometric authentication method and computer system | |||
495 | 8756706 | Method for securing credentials in a remote repository | |||
496 | 8752135 | Notifications in a credential production system | |||
497 | 8752123 | Apparatus and method for performing data tokenization | |||
498 | 8750507 | Dynamic group creation for managed key servers | |||
499 | 8739248 | Wireless access to device functions | |||
500 | 8738898 | Provision of secure communications connection using third party authentication | |||
501 | 8732851 | Image forming apparatus and information processing method | |||
502 | 8732793 | Method and system for improving security of the key device | |||
503 | 8726359 | Method and system for content distribution management | |||
504 | 8726352 | Administration of access control keys in a virtual world | |||
505 | 8726350 | Network selection tool for information handling system | |||
506 | 8724815 | Key management in a distributed system | |||
507 | 8719895 | Determining a policy output for a communication session | |||
508 | 8717896 | Frame relay switched data service | |||
509 | 8713642 | Collaborative computing community role mapping system and method | |||
510 | 8713317 | Method and system for encrypting data in a wireless communication system | |||
511 | 8713306 | Network decoys | |||
512 | 8707458 | Location-enabled security services in wireless network | |||
513 | 8707435 | Method and system for identifying compromised nodes | |||
514 | 8707383 | Computer workload management with security policy enforcement | |||
515 | 8707024 | Methods and systems for managing identity management security domains | |||
516 | 8707020 | Selective exposure of feature tags in a MACSec packet | |||
517 | 8701201 | Method and apparatus for privacy protection | |||
518 | 8701156 | System for data loss prevention handshake between computing systems | |||
519 | 8700890 | Secure storage and accelerated transmission of information over communication networks | |||
520 | 8695103 | Apparatus for and a method of copy-protecting a content carrying recording medium | |||
521 | 8693481 | Communication device | |||
522 | 8689322 | Authentication method for information apparatus | |||
523 | 8688967 | Secure booting a computing device | |||
524 | 8683574 | Identity driven peer-to-peer (P2P) virtual private network (VPN) | |||
525 | 8683572 | Method and apparatus for providing continuous user verification in a packet-based network | |||
526 | 8671459 | Prevention of software piracy using unique internal intelligence with every software application copy | |||
527 | 8671160 | Method for admitting an information provider to a data transmission process, and transmission device | |||
528 | 8667265 | Hardware device binding and mutual authentication | |||
529 | 8666073 | Safe handover method and system | |||
530 | 8666066 | Encoding points of an elliptic curve | |||
531 | 8654971 | Systems and methods for securing data in the cloud | |||
532 | 8650623 | Risk adaptive information flow based access control | |||
533 | 8650620 | Methods and apparatus to control privileges of mobile device applications | |||
534 | 8650404 | Communication protocol for secure communications systems | |||
535 | 8645688 | System and method for execution of a secured environment initialization instruction | |||
536 | 8644509 | Data providing process based on an IBPE scheme | |||
537 | 8640239 | Network intrusion detection in a network that includes a distributed virtual switch fabric | |||
538 | 8640186 | Pre-authorization of bearer set-up | |||
539 | 8638942 | Method and system for managing shared random numbers in secret communication network | |||
540 | 8635682 | Propagating security identity information to components of a composite application | |||
541 | 8631490 | Altering sampling rate to thwart attacks that involve analyzing hardware sensor output | |||
542 | 8631232 | Wireless personal area network accessing method | |||
543 | 8627409 | Framework for automated dissemination of security metadata for distributed trust establishment | |||
544 | 8625803 | Updating shared keys | |||
2013 | |||||
545 | 8621593 | Information processing apparatus and method, recording medium and program | |||
546 | 8621591 | Software signing certificate reputation model | |||
547 | 8621572 | Method, apparatus and system for updating authentication, authorization and accounting session | |||
548 | 8621569 | Intercluster relationship management | |||
549 | 8619983 | Digital TV conditional access system and method of using the same for transmitting and receiving digital data | |||
550 | 8615789 | Trust assertion using hierarchical weights | |||
551 | 8615659 | System and method for acquiring terminal binding key | |||
552 | 8613064 | Method and apparatus for providing a secure authentication process | |||
553 | 8607054 | Remote access to hosted virtual machines by enterprise users | |||
554 | 8601572 | Method for sharing a media collection in a network environment | |||
555 | 8601264 | Systems and methods of user authentication | |||
556 | 8601259 | Securing data in a dispersed storage network using security sentinel value | |||
557 | 8595483 | Associating a multi-context trusted platform module with distributed platforms | |||
558 | 8595478 | Wide area network with high quality of service | |||
559 | 8590027 | Secure authentication in browser redirection authentication schemes | |||
560 | 8584226 | Method and apparatus for geographically regulating inbound and outbound network communications | |||
561 | 8583940 | Electronic camera, storage medium, and data transfer method | |||
562 | 8578460 | Automating cloud service reconnections | |||
563 | 8578459 | Methods and apparatus to control network access from a user device | |||
564 | 8576712 | Method and apparatus for providing a reliable voice extensible markup language service | |||
565 | 8572696 | Contextual data aided security protection | |||
566 | 8572411 | Systems and methods for secure transaction management and electronic rights protection | |||
567 | 8572392 | Access authentication method, information processing unit, and computer product | |||
568 | 8572384 | Method and apparatus for updating an authorization key in a communication system | |||
569 | 8566925 | Systems and methods for policy based triggering of client-authentication at directory level granularity | |||
570 | 8565427 | Enforcing software independent content protection in an electronic device | |||
571 | 8560863 | Systems and techniques for datapath security in a system-on-a-chip device | |||
572 | 8555397 | Consumer-controlled data access to shared RFID data | |||
573 | 8555346 | Generating user and avatar specific content in a virtual world | |||
574 | 8553678 | Distributed codec for packet-based communications | |||
575 | 8549613 | Reverse VPN over SSH | |||
576 | 8549594 | Method of identity authentication and fraudulent phone call verification that utilizes an identification code of a communication device and a dynamic password | |||
577 | 8549587 | Secure end-to-end transport through intermediary nodes | |||
578 | 8549295 | Establishing secure, mutually authenticated communication credentials | |||
579 | 8548164 | Method and device for the encryption and decryption of data | |||
580 | 8544072 | Single sign-on service | |||
581 | 8544062 | Method and system for improving computer network security | |||
582 | 8533787 | Automatic resource ownership assignment system and method | |||
583 | 8533485 | Digital communication biometric authentication | |||
584 | 8533469 | Method and apparatus for sharing documents | |||
585 | 8528051 | Mobile terminal, server, and method for providing content information | |||
586 | 8522328 | Measurement device and method for logging use of the measurement device | |||
587 | 8522317 | Method and a device for maintaining an address translation table | |||
588 | 8522038 | Method for preventing unauthorized access to the computer system by using one-time password | |||
589 | 8522011 | Computer implemented method for authenticating a user | |||
590 | 8522007 | Dual cryptographic keying | |||
591 | 8504830 | Transfer data management system for internet backup | |||
592 | 8504818 | Method and system for reliable protocol tunneling over HTTP | |||
593 | 8503302 | Method of detecting anomalies in a communication system using numerical packet features | |||
594 | 8499035 | Methods, systems and computer readable media for providing session initiation protocol (SIP) event watcher entity information in a communications network | |||
595 | 8495721 | Data network security policies | |||
596 | 8495712 | Peer-to-peer access control method of triple unit structure | |||
597 | 8495711 | Remote roaming controlling system, visitor based network server, and method of controlling remote roaming of user devices | |||
598 | 8490189 | Using chipset-based protected firmware for host software tamper detection and protection | |||
599 | 8484696 | Secure game download | |||
600 | 8484454 | Secure offline relocation of portable software licenses | |||
601 | 8477792 | System and method for managing dynamic network sessions | |||
602 | 8474050 | System and apparatus for transferring data between communication elements | |||
603 | 8464329 | System and method for providing security for SIP-based communications | |||
604 | 8464075 | System and method for policy-driven file segmentation and inter-cloud file storage and retrieval | |||
605 | 8458777 | Remote authentication login system | |||
606 | 8453247 | Apparatus, system and method for providing security service in home network | |||
607 | 8453229 | Push type communications system | |||
608 | 8453211 | Method of obtaining proxy call session control function address while roaming | |||
609 | 8452958 | Determining certificate revocation status | |||
610 | 8452007 | Security key generating method, device and system | |||
611 | 8448220 | Merge rule wizard | |||
612 | 8443435 | VPN resource connectivity in large-scale enterprise networks | |||
613 | 8443196 | Signing method, apparatus, and system | |||
614 | 8438393 | Quadratic residue based password authenticated key exchange method and system | |||
615 | 8434142 | Method for mitigating on-path attacks in mobile IP network | |||
616 | 8429723 | Method and system for role-based access control to a collaborative online legal workflow tool | |||
617 | 8429396 | Peer discovery and secure communication in failover schemes | |||
618 | 8418243 | Systems and methods of providing an intranet internet protocol address to a client on a virtual private network | |||
619 | 8418229 | Systems and methods for performing access entitlement reviews | |||
620 | 8413229 | Method and appliance for authenticating, by an appliance, a client to access a virtual private network connection, based on an attribute of a client-side certificate | |||
621 | 8412943 | Two-way access authentication method | |||
622 | 8407475 | Augmented single factor split key asymmetric cryptography-key generation and distributor | |||
623 | 8402523 | System and method for associating message addresses with certificates | |||
624 | 8402514 | Hierarchy-aware role-based access control | |||
625 | 8401188 | System and method for partial encryption of frame-based electronic content | |||
626 | 8397282 | Dynamically adaptive network firewalls and method, system and computer program product implementing same | |||
627 | 8392983 | Trusted labeler | |||
628 | 8392982 | Systems and methods for selective authentication, authorization, and auditing in connection with traffic management | |||
629 | 8392980 | Trusted host list for TLS sessions | |||
630 | 8392616 | Method and apparatus for transmitting header-compressed packet based on retransmission mechanism | |||
631 | 8364986 | Identification-dependent communication between vehicles | |||
632 | 8359652 | Detecting anomalies in access control lists | |||
633 | 8356345 | Constructing a secure internet transaction | |||
634 | 8353017 | User password protection | |||
635 | 8353006 | Aircraft communications system using whitelists to control access and associated methods | |||
636 | 8353003 | System and method for controlling a flow of data a network interface controller to a host processor | |||
637 | 8352732 | Transmission method for conditional access content | |||
2012 | |||||
638 | 8341704 | Secure communication between client device and server device | |||
639 | 8341398 | Communication system, network device and program | |||
640 | 8341397 | Security system for handheld wireless devices using-time variable encryption keys | |||
641 | 8326767 | Customer data privacy implementation | |||
642 | 8325078 | Remote switch operator controller | |||
643 | 8321952 | Method and system for monitoring online computer network behavior and creating online behavior profiles | |||
644 | 8321683 | Electronic control device and method for operating an electric roller shutter | |||
645 | 8316431 | Concurrent IPsec processing system and method | |||
646 | 8312532 | Connection supporting apparatus | |||
647 | 8312521 | Biometric authenticaton system and method with vulnerability verification | |||
648 | 8312252 | Content receiving apparatus and method, storage medium, and server | |||
649 | 8311213 | Method for determining functions applied to signals | |||
650 | 8286227 | Enhanced multi-factor authentication | |||
651 | 8281376 | Authentication system and authentication method | |||
652 | 8281365 | Information management method, information management system, computer-readable medium and computer data signal | |||
653 | 8281123 | Apparatus and method for managing and protecting information during use of semi-trusted interfaces | |||
654 | 8272028 | Approach for managing access to electronic documents on network devices using document retention policies and document security policies | |||
655 | 8266426 | Hardware certification based on certifying development processes | |||
656 | 8266424 | Method and system for in-field recovery of security when a certificate authority has been compromised | |||
657 | 8261348 | Reception apparatus | |||
658 | 8250634 | Systems, methods, media, and means for user level authentication | |||
659 | 8250362 | Home network encryption techniques | |||
660 | 8243757 | MAC header compression using a pointer | |||
661 | 8238365 | Method and device for supporting optical transmission network service dispatch in optical synchronization network | |||
662 | 8230488 | Network system, direct-access method, network household electrical appliance, and program | |||
663 | 8230482 | System and method for manipulating and managing computer archive files | |||
664 | 8230228 | Support of tamper detection for a log of records | |||
665 | 8230222 | Method, system and computer program for deploying software packages with increased security | |||
666 | 8228225 | Remote switch operator | |||
667 | 8224973 | Techniques for timing optimization in wireless networks that utilize a universal services interface | |||
668 | 8219806 | Management system, management apparatus and management method | |||
669 | 8214878 | Policy control of virtual environments | |||
670 | 8185734 | System and method for execution of a secured environment initialization instruction | |||
671 | 8176334 | Document security system that permits external users to gain access to secured files | |||
672 | 8176321 | Safe installation of browser extensions | |||
673 | 8171563 | Secure message system with remote decryption service | |||
674 | 8171531 | Universal authentication token | |||
675 | 8171530 | Computer access security | |||
676 | 8156326 | Method to search for affinities between subjects and relative apparatus | |||
677 | 8151331 | Information providing system and design information providing server | |||
678 | 8135947 | Interconnect device to enable compliance with rights management restrictions | |||
679 | 8131994 | Dual cryptographic keying | |||
680 | 8127342 | Secure end-to-end transport through intermediary nodes | |||
681 | 8127336 | Systems and methods for policy-based service management | |||
682 | 8122492 | Integration of social network information and network firewalls | |||
683 | 8117641 | Control device and control method for information system | |||
684 | 8117459 | Personal identification information schemas | |||
685 | 8117441 | Integrating security protection tools with computer device integrity and privacy policy | |||
686 | 8112624 | Method and system for certificate revocation list compression | |||
687 | 8112484 | Apparatus and method for auxiliary classification for generating features for a spam filtering model | |||
688 | 8104074 | Identity providers in digital identity system | |||
689 | 8099781 | Method of managing and mitigating security risks through planning | |||
690 | 8099768 | Method and system for multi-protocol single logout | |||
691 | 8095787 | Systems and methods for optimizing SSL handshake processing | |||
692 | 8090942 | Method and system for asymmetrically encrypting .ZIP files | |||
2011 | |||||
693 | 8086842 | Peer-to-peer contact exchange | |||
694 | 8082581 | Management of session timeouts in an SSL VPN gateway | |||
695 | 8079076 | Detecting stolen authentication cookie attacks | |||
696 | 8078868 | Multi-party encryption systems and methods | |||
697 | 8069348 | Client digital program insertion in a conditional access module | |||
698 | 8068433 | Low power operation of networked devices | |||
699 | 8065526 | Methods and apparatus for content control using processor resource management | |||
700 | 8065522 | Method and system for virtualization of trusted platform modules | |||
701 | 8065520 | Method and apparatus for encrypted communications to a secure server | |||
702 | 8065516 | Hard disk drive with certification function | |||
703 | 8064597 | Method and system for mobile device credentialing | |||
704 | 8060744 | Computer architecture for an electronic device providing single-level secure access to multi-level secure file system | |||
705 | 8058972 | Methods and devices for enrollment and verification of biometric information in identification documents | |||
706 | 8056119 | Method and system for controlling inter-zone communication | |||
707 | 8051299 | Computer security method and computer system | |||
708 | 8051292 | System for proximity determination | |||
709 | 8042167 | Methods, systems, and computer program products for network firewall policy optimization | |||
710 | 8042157 | System for restricting data access | |||
711 | 8042155 | System and method for generating a single use password based on a challenge/response protocol | |||
712 | 8042152 | Home network system | |||
713 | 8042151 | Application context based access control | |||
714 | 8041947 | Computer architecture for an electronic device providing SLS access to MLS file system with trusted loading and protection of program execution memory | |||
715 | 8037524 | System and method for differentiated cross-licensing for services across heterogeneous systems using transient keys | |||
716 | 8037313 | Method and arrangement for real-time betting with an off-line terminal | |||
717 | 8037303 | System and method for providing secure multicasting across virtual private networks | |||
718 | 8032933 | Dynamically adaptive network firewalls and method, system and computer program product implementing same | |||
719 | 8032927 | Verification engine for user authentication | |||
720 | 8032926 | Method of configuring hierarchical network of user group and resource group and key distribution center | |||
721 | 8028168 | System and method for verification of personal identity | |||
722 | 8028163 | Method of digitally signing data and a data repository storing digitally signed data | |||
723 | 8024571 | Method of and system for watermarking application modules | |||
724 | 8024563 | Programming interface for a kernel level SSL proxy | |||
725 | 8024560 | Systems and methods for securing multimedia transmissions over the internet | |||
726 | 8023654 | Securing multimedia network communication | |||
727 | 8010793 | Data communication method and system | |||
728 | 8006312 | Data communications system, terminal, and program | |||
729 | 8006096 | Information processing apparatus | |||
730 | 8005225 | Hierarchical threshold tree-based broadcast encryption method | |||
731 | 7996912 | Method and system for monitoring online computer network behavior and creating online behavior profiles | |||
732 | 7996887 | Security of a network system | |||
733 | 7996670 | Classification engine in a cryptography acceleration chip | |||
734 | 7987513 | Data-use restricting method and computer product | |||
735 | 7987372 | Method for managing the access to a memory, by using passwords | |||
736 | 7987365 | Subscription-based computing implemented in hardware of computing device | |||
737 | 7984296 | Content protection device and content protection method | |||
738 | 7971260 | Matching session records of network users with corresponding transaction data | |||
739 | 7971238 | Two-factor authentication of a remote administrator | |||
740 | 7971056 | Direct memory access for compliance checking | |||
741 | 7970133 | System and method for secure and flexible key schedule generation | |||
742 | 7966656 | Method of coupling a switched circuit network to an internet protocol network | |||
743 | 7966655 | Method and apparatus for optimizing a firewall | |||
744 | 7962744 | Terminal communication system | |||
745 | 7958559 | Method, device and computer program product for determining a malicious workload pattern | |||
746 | 7954158 | Characterizing computer attackers | |||
747 | 7954154 | Communication system and communication apparatus | |||
748 | 7954144 | Brokering state information and identity among user agents, origin servers, and proxies | |||
749 | 7953863 | Techniques for timing optimization in wireless networks that utilize a universal services interface | |||
750 | 7945953 | Method to identify buffer overflows and RLIBC attacks | |||
751 | 7941858 | Access licensing for an automation device | |||
752 | 7940934 | System and method for securing computing management functions | |||
753 | 7937748 | Communication apparatus and communication method and computer readable medium | |||
754 | 7934093 | Assigning security levels to a shared component | |||
755 | 7930539 | Computer system resource access control | |||
756 | 7926116 | Systems and methods for dynamic decentralized load balancing across multiple sites | |||
757 | 7926111 | Determination of related entities | |||
758 | 7926086 | Access control mechanism for shareable interface communication access control | |||
759 | 7921454 | System and method for user password protection | |||
760 | 7921285 | Means of mitigating denial of service attacks on IP fragmentation in high performance IPsec gateways | |||
761 | 7917750 | Virtual user authentication system and method | |||
762 | 7917747 | Multi-party encryption systems and methods | |||
763 | 7908655 | Connectionless port scan detection on a network | |||
764 | 7908481 | Routing data to one or more entities in a network | |||
765 | 7908480 | Authenticating an endpoint using a STUN server | |||
766 | 7904958 | Spam honeypot domain identification | |||
767 | 7904946 | Methods and systems for secure user authentication | |||
768 | 7904945 | System and method for providing security for a wireless network | |||
769 | 7900242 | Modular authentication and authorization scheme for internet protocol | |||
770 | 7900040 | Atomic session-start operation combining clear-text and encrypted sessions to provide ID visibility to middleware such as load-balancers | |||
771 | 7895646 | IKE daemon self-adjusting negotiation throttle | |||
772 | 7895437 | Augmented single factor split key asymmetric cryptography-key generation and distributor | |||
773 | 7895295 | Scoring data flow characteristics to assign data flows to storage systems in a data storage infrastructure for a communication network | |||
774 | 7890995 | System and method for remote management of communications networks | |||
775 | 7890749 | System and method for providing security in a telecommunication network | |||
776 | 7886361 | Storage-medium processing method, storage-medium processing device, and program | |||
777 | 7882562 | Apparatus, system, and method for deploying iSCSI parameters to a diskless computing device | |||
778 | 7882552 | Remote administration of smart cards for secure access systems | |||
779 | 7882548 | System and method for protecting identity information | |||
780 | 7882543 | Systems and methods for added authentication in distributed network delivered half-duplex communications | |||
781 | 7882353 | Method for protecting data in a hard disk | |||
782 | 7881467 | Image forming apparatus and electronizing method for information mentioned in paper | |||
783 | 7873994 | Management of session timeouts in an SSL VPN gateway | |||
784 | 7870383 | System, method and program to update certificates in a computer | |||
785 | 7865960 | Digital literary work protection system and digital literary work protection method | |||
786 | 7865936 | System and method for controlling access to multiple public networks and for controlling access to multiple private networks | |||
787 | 7865934 | Access-control permissions with inter-process message-based communications | |||
788 | 7864957 | Methods and apparatus for secure distribution of program content | |||
2010 | |||||
789 | 7861087 | Systems and methods for state signing of internet resources | |||
790 | 7856652 | Access control management method, access control management system and terminal device with access control management function | |||
791 | 7849310 | Switching between secure and non-secure processing modes | |||
792 | 7836494 | System and method for regulating the flow of information to or from an application | |||
793 | 7832014 | System and method for providing content in two formats on one DRM disk | |||
794 | 7832007 | Method of managing and mitigating security risks through planning | |||
795 | 7827597 | Secure transport for mobile communication network | |||
796 | 7827591 | Management of hierarchical reference data | |||
797 | 7823206 | Method and apparatus for establishing a security policy, and method and apparatus of supporting establishment of security policy | |||
798 | 7822984 | Portal system, method and program, and associated user computer and content supplier | |||
799 | 7805763 | Method for distributing values for networks with mobile nodes | |||
800 | 7805608 | User privacy through one-sided cookies | |||
801 | 7805602 | Prioritized call admission control for internet key exchange | |||
802 | 7802297 | Keyboard with built in display for user authentication | |||
803 | 7801973 | Classification of information in data flows in a data storage infrastructure for a communication network | |||
804 | 7801300 | Data transmitter and data receiver | |||
805 | 7797741 | System and method for coping with encrypted harmful traffic in hybrid IPv4/IPv6 networks | |||
806 | 7797395 | Assignment of data flows to storage systems in a data storage infrastructure for a communication network | |||
807 | 7793099 | Method and system for encryption of file characteristics of .ZIP files | |||
808 | 7788703 | Dynamic authentication in secured wireless networks | |||
809 | 7788479 | Apparatus, system and method of ensuring that only randomly-generated numbers that have passed a test are used for cryptographic purposes | |||
810 | 7784088 | Method and system for managing delayed user authentication | |||
811 | 7765587 | Glyphword-based security | |||
812 | 7765584 | Simple, secure login with multiple authentication providers | |||
813 | 7761905 | Method and system for assigning access rights in a computer system | |||
814 | 7761710 | Captive portal system and method for use in peer-to-peer networks | |||
815 | 7757083 | Integrated circuit that uses a dynamic characteristic of the circuit | |||
816 | 7757075 | State reference | |||
817 | 7752445 | System and method for authentication of a hardware token | |||
818 | 7752437 | Classification of data in data flows in a data storage infrastructure for a communication network | |||
819 | 7748026 | Transparent interceptors for privacy policy implementation | |||
820 | 7739496 | Secure packet-based data broadcasting architecture | |||
821 | 7735142 | Electronic vulnerability and reliability assessment | |||
822 | 7735123 | System and method for associating message addresses with certificates | |||
823 | 7735122 | Credential mapping | |||
824 | 7734912 | Secure login using single factor split key asymmetric cryptography and an augmenting factor | |||
825 | 7734911 | Secure login using augmented single factor split key asymmetric cryptography | |||
826 | 7734906 | System and method for panel linking in a security system | |||
827 | 7725944 | Matching session records of network users with corresponding transaction data | |||
828 | 7725922 | System and method for using sandboxes in a managed shell | |||
829 | 7721322 | Enterprise service-to-service trust framework | |||
830 | 7721089 | Broadcast encryption using RSA | |||
831 | 7721087 | Cross UI platform alerting of security status | |||
832 | 7716721 | Method and apparatus for re-authentication of a computing device using cached state | |||
833 | 7716470 | Active verification of boot firmware | |||
834 | 7707619 | Method and system for troubleshooting when a program is adversely impacted by a security policy | |||
835 | 7707405 | Secure installation activation | |||
836 | 7707401 | Systems and methods for a protocol gateway | |||
837 | 7701602 | Mobile device-based printing system and method | |||
838 | 7698745 | Secure message system with remote decryption service | |||
839 | 7698730 | Service detection | |||
840 | 7694135 | Security systems and services to provide identity and uniform resource identifier verification | |||
841 | 7690034 | Using behavior blocking mobility tokens to facilitate distributed worm detection | |||
842 | 7685422 | Information processing apparatus, information processing method, and information processing program | |||
843 | 7673136 | Method for secure multicast repeating on the public Internet | |||
844 | 7669232 | Dynamic authentication in secured wireless networks | |||
845 | 7661123 | Security policy update supporting at least one security service provider | |||
846 | 7660997 | Using biometrics on pervasive devices for mobile identification | |||
847 | 7657927 | Behavior-based host-based intrusion prevention system | |||
848 | 7653934 | Role-based access control | |||
849 | 7650637 | System for ensuring quality of service in a virtual private network and method thereof | |||
850 | 7647622 | Dynamic security policy through use of empirical security events | |||
851 | 7644280 | Method and system for linking certificates to signed files | |||
2009 | |||||
852 | 7640576 | Print system, apparatus, and method for performing printing based on document information stored in document server | |||
853 | 7634803 | Method and apparatus for identifying purpose and behavior of run time security objects using an extensible token framework | |||
854 | 7631183 | System and method for retrieving related certificates | |||
855 | 7631179 | System, method and apparatus for securing network data | |||
856 | 7627894 | Method and system for authorizing access to user information in a network | |||
857 | 7627750 | Information distribution and processing system | |||
858 | 7624433 | Keyfob for use with multiple authentication entities | |||
859 | 7624421 | Method and apparatus for managing and displaying contact authentication in a peer-to-peer collaboration system | |||
860 | 7624267 | SIM-based authentication method capable of supporting inter-AP fast handover | |||
861 | 7624266 | System and method using temporary identity for authentication with session initiation protocol | |||
862 | 7617393 | Implementation and use of PII data access control facility employing personally identifying information labels and purpose serving function sets | |||
863 | 7614015 | Method and system for representing group policy object topology and relationships | |||
864 | 7613923 | Method and apparatus for controlling unsolicited messaging in real time messaging networks | |||
865 | 7610625 | Program control system, program control method and information control program | |||
866 | 7610621 | System and method for behavior-based firewall modeling | |||
867 | 7610618 | System and method for authenticating a subject | |||
868 | 7610494 | Encrypted microcode update of an optical transceiver | |||
869 | 7607008 | Authentication broker service | |||
870 | 7603486 | Network management system providing logic signals over communication lines for detecting peripheral devices | |||
871 | 7596692 | Cryptographic audit | |||
872 | 7591012 | Dynamic negotiation of encryption protocols | |||
873 | 7565692 | Floating intrusion detection platforms | |||
874 | 7562216 | System and method for applying a file system security model to a query system | |||
875 | 7555774 | Inline intrusion detection using a single physical port | |||
876 | 7552469 | Method for generating mnemonic random passcodes | |||
877 | 7551786 | System and method for efficient non-overlapping partitioning of rectangular regions of interest in multi-channel detection | |||
878 | 7546457 | System and method for execution of a secured environment initialization instruction | |||
879 | 7543148 | Audio watermarking with covert channel and permutations | |||
880 | 7543140 | Revocation of a certificate and exclusion of other principals in a digital rights management (DRM) system based on a revocation list from a delegated revocation authority | |||
881 | 7533410 | Architecture to support public voice VPN services over an IP network | |||
882 | 7529929 | System and method for dynamically enforcing digital rights management rules | |||
883 | 7529926 | Public key certification providing apparatus | |||
884 | 7512974 | Computer system and program to update SSL certificates | |||
885 | 7512230 | Method and apparatus of fast modular reduction | |||
886 | 7509490 | Method and apparatus for encrypted communications to a secure server | |||
887 | 7509486 | Encryption processor for performing accelerated computations to establish secure network sessions connections | |||
888 | 7506358 | Method and apparatus supporting network communications through a firewall | |||
889 | 7506153 | Method and system for user registration using sensor with identifier | |||
890 | 7503072 | Hardware ID to prevent software piracy | |||
891 | 7500098 | Secure mode controlled memory | |||
892 | 7496750 | Performing security functions on a message payload in a network element | |||
893 | 7490348 | Wireless network having multiple communication allowances | |||
894 | 7490347 | Hierarchical security domain model | |||
895 | 7484240 | Mechanism to allow authentication of terminated SIP calls | |||
896 | 7480797 | Method and system for preventing current-privilege-level-information leaks to non-privileged code | |||
897 | 7478428 | Adapting input to find integer overflows | |||
898 | 7478422 | Declarative language for specifying a security policy | |||
2008 | |||||
899 | 7467410 | System and method for preventing network misuse | |||
900 | 7467303 | Grid mutual authorization through proxy certificate generation | |||
901 | 7461260 | Methods and apparatus for finding a shared secret without compromising non-shared secrets | |||
902 | 7461248 | Authentication and authorization in heterogeneous networks | |||
903 | 7457956 | Securing arbitrary communication services | |||
904 | 7454797 | Secure image authentication with discrete level tamper localization | |||
905 | 7454612 | On-disk file format for a serverless distributed file system | |||
906 | 7454021 | Off-loading data re-encryption in encrypted data management systems | |||
907 | 7448067 | Method and apparatus for enforcing network security policies | |||
908 | 7441277 | Electronic deposit box system | |||
909 | 7441270 | Connectivity in the presence of barriers | |||
910 | 7441119 | Offload processing for secure data transfer | |||
911 | 7440449 | High speed switching module comprised of stacked layers incorporating t-connect structures | |||
912 | 7437766 | Method and apparatus providing deception and/or altered operation in an information system operating system | |||
913 | 7434255 | Encryption error monitoring system and method for packet transmission | |||
914 | 7428751 | Secure recovery in a serverless distributed file system | |||
915 | 7424733 | Device control system | |||
916 | 7415608 | On-disk file format for a serverless distributed file system | |||
917 | 7415606 | Method and apparatus for managing secure collaborative transactions | |||
918 | 7412604 | Using biometrics on pervasive devices for mobile identification | |||
919 | 7412600 | Approaches for automatically switching message authentication keys | |||
920 | 7409708 | Advanced URL and IP features | |||
921 | 7409704 | System and method for local policy enforcement for internet service providers | |||
922 | 7404207 | Data sharing and networking system for integrated remote tool access, data collection, and control | |||
923 | 7401355 | Firewall load balancing using a single physical device | |||
924 | 7401220 | On-disk file format for a serverless distributed file system | |||
925 | 7400733 | Key refresh at the MAC layer | |||
926 | 7400641 | Bus master for a bus for connection of sensors and/or ignition means | |||
927 | 7398554 | Secure lock mechanism based on a lock word | |||
928 | 7389534 | Method and apparatus for establishing virtual private network tunnels in a wireless network | |||
929 | 7389416 | Method of verifiably sharing a secret in potentially asynchronous networks | |||
930 | 7389274 | Integrated payment for international business reply mail | |||
931 | 7383573 | Method for transparently managing outbound traffic from an internal user of a private network destined for a public network | |||
932 | 7380279 | System for integrating security and access for facilities and information systems | |||
933 | 7380273 | Method for authenticating a user access request | |||
934 | 7376830 | System and method for routing messages | |||
935 | 7376827 | Directory-enabled network elements | |||
936 | 7372998 | System and method for efficient non-overlapping partitioning of rectangular regions of interest in multi-channel detection | |||
937 | 7366306 | Programmable logic device that supports secure and non-secure modes of decryption-key access | |||
938 | 7363654 | Data transmission system and sale managing system | |||
939 | 7363651 | System for digital content access control | |||
940 | 7363492 | Method for zero-knowledge authentication of a prover by a verifier providing a user-selectable confidence level and associated application devices | |||
941 | 7363203 | Determining event causality including employment of partitioned event space | |||
942 | 7360251 | Method and system for monitoring online behavior at a remote site and creating online behavior profiles | |||
943 | 7360244 | Method for authenticating a user access request | |||
944 | 7360084 | System, device, and method for controlling access in a multicast communication network | |||
945 | 7360083 | Method and system for providing end-to-end security solutions to aid protocol acceleration over networks using selective layer encryption | |||
946 | 7360079 | System and method for processing digital documents utilizing secure communications over a network | |||
947 | 7356838 | System and method for controlling access to digital content, including streaming media | |||
948 | 7353542 | Storage system, computer system, and method of authorizing an initiator in the storage system or the computer system | |||
949 | 7353537 | Secure transparent virtual private networks | |||
950 | 7350231 | System and method for controlling access to digital content, including streaming media | |||
951 | 7340771 | System and method for dynamically creating at least one pinhole in a firewall | |||
952 | 7340601 | Electronic certificate | |||
953 | 7334268 | Method and apparatus for data files used in the transmission of information | |||
954 | 7334260 | Information processing apparatus and method, and recording medium on which a program for executing the information processing is recorded | |||
955 | 7334255 | System and method for controlling access to multiple public networks and for controlling access to multiple private networks | |||
956 | 7334124 | Logical access block processing protocol for transparent secure file storage | |||
957 | 7328341 | Method and apparatus for protecting file system based on digital signature certificate | |||
958 | 7325135 | Method and system for authorizing reconfiguration of a vehicle | |||
959 | 7318234 | Request persistence during session authentication | |||
960 | 7318152 | Wide area network using internet with high quality of service | |||
961 | 7316029 | Network security services architecture | |||
2007 | |||||
962 | 7313827 | Apparatus and method for analysis of conversational patterns to position information and autonomic access control list management | |||
963 | 7313813 | Method and apparatus for providing and maintaining a user-interactive portal system accessible via internet or other switched-packet-network | |||
964 | 7313689 | Method, system and service for the authentication of a public key certificate | |||
965 | 7310813 | System and method for strong access control to a network | |||
966 | 7310729 | Digital rights management license delivery system and method | |||
967 | 7308706 | Associative policy model | |||
968 | 7305703 | Method and system for enforcing a communication security policy | |||
969 | 7305700 | Secure transport for mobile communication network | |||
970 | 7305553 | Manifest-based trusted agent management in a trusted operating system environment | |||
971 | 7302706 | Network-based file scanning and solution delivery in real time | |||
972 | 7302591 | Access control | |||
973 | 7302569 | Implementation and use of a PII data access control facility employing personally identifying information labels and purpose serving functions sets | |||
974 | 7302568 | Method, system, and article of manufacture for remote management of devices | |||
975 | 7299500 | Method and apparatus for secure delivery and rights management of digital content at an unsecure site | |||
976 | 7299489 | Method and apparatus for host probing | |||
977 | 7296292 | Method and apparatus in an application framework system for providing a port and network hardware resource firewall for distributed applications | |||
978 | 7296290 | Method and apparatus for handling user identities under single sign-on services | |||
979 | 7293294 | Method and apparatus for using contents | |||
980 | 7293287 | Method and system for modeling, analysis and display of network security events | |||
981 | 7293283 | Flexible electronic message security mechanism | |||
982 | 7290138 | Credentials and digitally signed objects | |||
983 | 7290134 | Encapsulation mechanism for packet processing | |||
984 | 7284269 | High-speed adaptive structure of elementary firewall modules | |||
985 | 7284268 | System and method for a routing device to securely share network data with a host utilizing a hardware firewall | |||
986 | 7284264 | Discovery of an advertising service in e-speak | |||
987 | 7284124 | Trust level based platform access regulation application | |||
988 | 7281125 | Securing sensitive configuration data remotely | |||
989 | 7278167 | Data communications system, terminal, and program | |||
990 | 7278162 | Use of a programmable network processor to observe a flow of packets | |||
991 | 7275258 | Apparatus and method for multi-threaded password management | |||
992 | 7272854 | Aliasing to prevent attacks on messaging services | |||
993 | 7272853 | Origination/destination features and lists for spam prevention | |||
994 | 7269853 | Privacy policy change notification | |||
995 | 7269847 | Firewall providing enhanced network security and user transparency | |||
996 | 7266847 | Secure message system with remote decryption service | |||
997 | 7266682 | Method and system for transmitting data from a transmitter to a receiver and transmitter and receiver therefor | |||
998 | 7260839 | System and method for secure wall | |||
999 | 7260836 | System and method for distributed authentication service | |||
1000 | 7260716 | Method for overcoming the single point of failure of the central group controller in a binary tree group key exchange approach | |||
1001 | 7257837 | Firewall penetration system and method for real time media communications | |||
1002 | 7257707 | Manifest-based trusted agent management in a trusted operating system environment | |||
1003 | 7257393 | Method and apparatus for time calibration | |||
1004 | 7254834 | Fault tolerant firewall sandwiches | |||
1005 | 7254706 | System and method for downloading of files to a secure terminal | |||
1006 | 7251825 | Method to use a virtual private network using a public network | |||
1007 | 7249378 | Firewall providing enhanced network security and user transparency | |||
1008 | 7249377 | Method for client delegation of security to a proxy | |||
1009 | 7249376 | Firewall providing enhanced network security and user transparency | |||
1010 | 7249264 | Secure IP based streaming in a format independent manner | |||
1011 | 7246233 | Policy-driven kernel-based security implementation | |||
1012 | 7240196 | Method and system for protecting ownership rights of digital content files | |||
1013 | 7240192 | Combining a browser cache and cookies to improve the security of token-based authentication protocols | |||
1014 | 7237266 | Electronic vulnerability and reliability assessment | |||
1015 | 7237264 | System and method for preventing network misuse | |||
1016 | 7237260 | Method for dynamic selection for secure and firewall friendly communication protocols between multiple distributed modules | |||
1017 | 7237110 | Authentication system, authentication apparatus, authentication target apparatus, authentication method, method of being authenticated, program and information recording medium | |||
1018 | 7237107 | Method and apparatus for discovering a trust chain imparting a required attribute to a subject | |||
1019 | 7234057 | Method for processing access-request message for packet service | |||
1020 | 7231659 | Entity authentication in a shared hosting computer network environment | |||
1021 | 7228420 | Method and system for technician authentication of a vehicle | |||
1022 | 7225330 | Security mechanism for computer processing modules | |||
1023 | 7219226 | Method and apparatus for encrypting data | |||
1024 | 7219224 | Method and apparatus for transferring fragmented audio/video control commands using an independent software layer | |||
1025 | 7216224 | Method and system for user registration using processing sensor | |||
1026 | 7210165 | Pre-licensing of rights management protected content | |||
1027 | 7206941 | Method and apparatus for validating security components through a request for content | |||
1028 | 7203964 | Method of stopping internet viruses | |||
1029 | 7185196 | Key caching system | |||
1030 | 7168090 | Mobile IP authentication | |||
2006 | |||||
1031 | 7068207 | Device for operating electronic apparatus. recorded medium and electronic apparatus | |||
1032 | 6996072 | Method and apparatus for exchange of information in a communication network | |||
2005 | |||||
1033 | 6968059 | Video information generating apparatus, video communication terminal, video distribution server, and video information system | |||
1034 | 6947895 | Distributed speech system with buffer flushing on barge-in | |||
1035 | 6910061 | Framework system and method for testing server performance under multiple workloads | |||
1036 | 6898623 | Simplified configuration of an internet-enabled device | |||
1037 | 6889267 | Asynchronous communication protocol using efficient data transfer formats | |||
1038 | 6856676 | System and method of controlling and managing voice and data services in a telecommunications network | |||
2004 | |||||
1039 | 6834316 | Data transfer controller and electronic device | |||
1040 | 6826523 | Application development interface for multi-user applications executable over communication networks | |||
1041 | 6721831 | Method for controlling bus in digital interface | |||
1042 | 6678842 | Communications system and associated deskewing methods | |||
2003 | |||||
1043 | 6665306 | Immediate cut-off protocol and interface for a packet-based bus connecting processors | |||
1044 | 6633581 | Serial communication apparatus | |||
1045 | 6611262 | Generation of a bit stream containing binary image/audio data that is multiplexed with a code defining an object in ascii format | |||
1046 | 6603488 | Browser based command and control home network | |||
2002 | |||||
1047 | 6442171 | Logical topology and address assignment for interconnected digital networks | |||
1048 | 6438591 | Entity management system | |||
2001 | |||||
1049 | 6308150 | Dynamic bit allocation apparatus and method for audio coding | |||
1050 | 6288716 | Browser based command and control home network | |||
1051 | 6219712 | Congestion control in a network | |||
1052 | 6169475 | System and method for active detection of connection to a network | |||
2000 | |||||
1053 | 6161186 | Lower power passive listen method for electronic devices | |||
1054 | 6074345 | Patient data acquisition and control system | |||
1999 | |||||
1055 | 5917856 | Method for establishing a PAM signal connection using a training sequence | |||
1056 | 5889817 | Communication system with data comparison circuit | |||
1057 | 5870429 | Apparatus method, and software modem for utilizing envelope delay distortion characteristics to determine a symbol rate and a carrier frequency for data transfer | |||
1998 | |||||
1058 | 5831517 | Message sending system | |||
1997 | |||||
1059 | 5703872 | Intelligent concentrator for multiple speed data communications systems | |||
1060 | 5692128 | Computer network with reliable and efficient removable media services | |||
1061 | 5608907 | Extensible entity management system including an information manager for obtaining, storing and retrieving information from entities | |||
1062 | 5606719 | Temporary state preservation for a distributed file service | |||
1063 | 5596720 | Redundant message processing system featuring reception server controlling communication between client and server process, and stand-by server retransmitting message with information indicating the message being a retransmitted message | |||
1996 | |||||
1064 | 5557796 | Extensible entity management system including a dispatching kernel and modules which independently interpret and execute commands | |||
1065 | 5557266 | System for cascading data switches in a communication node | |||
1066 | 5530905 | Temporary state preservation for a distributed file service which purges virtual circuit control information after expiration of time limit of inactivity | |||
1067 | 5530696 | Intelligent concentrator for multiple speed data communications systems | |||
1068 | 5495619 | Apparatus providing addressable storage locations as virtual links and storing predefined destination information for any messages transmitted on virtual links at these locations | |||
1069 | 5490271 | Remote interrupt processing over a network | |||
1995 | |||||
1070 | 5475838 | Extensible entity management system including rule-based alarms | |||
1071 | 5475819 | Distributed configuration profile for computing system | |||
1072 | 5418912 | System and method for controlling buffer transmission of data packets by limiting buffered data packets in a communication session | |||
1073 | 5408619 | Naming service database updating technique | |||
1074 | 5408609 | Computer architecture having elements distributed over and adaptable to a plurality of local area networks of various types, and a microprograms architecture therefore | |||
1075 | 5394522 | Selecting and locating graphical icon objects to define and configure the workstations in data processing networks | |||
1076 | 5386566 | Inter-processor communication method for transmitting data and processor dependent information predetermined for a receiving process of another processor | |||
1994 | |||||
1077 | 5371897 | Method for requesting identification of a neighbor node in a data processing I/O system | |||
1078 | 5361366 | Computer equipped with serial bus-connected plural processor units providing internal communications | |||
1079 | 5349675 | System for directly displaying remote screen information and providing simulated keyboard input by exchanging high level commands | |||
1080 | 5349674 | Automated enrollment of a computer system into a service network of computer systems | |||
1081 | 5345587 | Extensible entity management system including a dispatching kernel and modules which independently interpret and execute commands | |||
1082 | 5307484 | Relational data base repository system for managing functional and physical data structures of nodes and links of multiple computer networks | |||
1083 | 5307265 | Computer method and system for communication in a multi-lingual network | |||
1084 | 5303238 | Network communications intermediate interface | |||
1085 | 5293634 | System for retrieving token having a selected nest level and satisfying predetermined retrieval condition | |||
1086 | 5293488 | Message-routing apparatus | |||
1087 | 5293377 | Network control information without reserved bandwidth | |||
1088 | 5289579 | Channel adapter for broadband communications at channel speeds | |||
1993 | |||||
1089 | 5265241 | Method and apparatus for verifying the configuration of a link-connected network | |||
1090 | 5261096 | Interprocess message passing method in a distributed digital data system | |||
1091 | 5253359 | Control and maintenance subsystem network for use with a multiprocessor computer system | |||
1092 | 5247670 | Network server | |||
1093 | 5224205 | Method of combining architecturally dissimilar computing networks into a single logical network | |||
1094 | 5222242 | System for locating a node containing a requested resource and for selectively verifying the presence of the resource at the node | |||
1095 | 5218713 | Distributed data management mechanism for handling a data stream | |||
1096 | 5191651 | Apparatus and method for making of interconnected processors act like a single node in a multinode communication system | |||
1097 | 5191650 | Virtual chains for session initiation in a distributed computer network | |||
1992 | |||||
1098 | 5175800 | Expert and data base system and method for communications network | |||
1099 | 5167035 | Transferring messages between nodes in a network | |||
1100 | 5166931 | Communications network dynamic addressing arrangement | |||
1101 | 5165021 | Transmit queue with loadsheding | |||
1102 | 5165020 | Terminal device session management protocol | |||
1103 | 5163045 | Communications network arranged to transport connection oriented and connectionless messages | |||
1104 | 5151989 | Directory cache management in a distributed data processing system | |||
1105 | 5146561 | Communication network data manager system | |||
1106 | 5142683 | Intercomputer communication control apparatus and method | |||
1107 | 5142622 | System for interconnecting applications across different networks of data processing systems by mapping protocols across different network domains | |||
1108 | 5136716 | Session control in network for digital data processing system which supports multiple transfer protocols | |||
1109 | 5133053 | Interprocess communication queue location transparency | |||
1110 | 5128926 | Updating link state information in networks | |||
1111 | 5113522 | Data processing system with system resource management for itself and for an associated alien processor | |||
1112 | 5113499 | Telecommunication access management system for a packet switching network | |||
1113 | 5109483 | Node initiating XID exchanges over an activated link including an exchange of sets of binding signals between nodes for establishing sessions | |||
1114 | 5086428 | Reliable broadcast of information in a wide area network | |||
1991 | |||||
1115 | 5063523 | Network management system with event rule handling | |||
1116 | 5060150 | Process creation and termination monitors for use in a distributed message-based operating system | |||
1117 | 5058108 | Local area network for digital data processing system | |||
1118 | 5056003 | Distributed data management mechanism | |||
1119 | 5051892 | Full duplex conversation between transaction programs | |||
1120 | 5032987 | System with a plurality of hash tables each using different adaptive hashing functions | |||
1121 | 5031093 | System for establishing route by selecting minimum of time-independent link parameters of incremental values | |||
1122 | 5027269 | Method and apparatus for providing continuous availability of applications in a computer network | |||
1123 | 5025491 | Dynamic address binding in communication networks | |||
1124 | 5023780 | Method of operating a packet switching network | |||
1125 | 5010514 | Structured fields at a data stream boundary for delimiting files | |||
1126 | 5005122 | Arrangement with cooperating management server node and network service node | |||
1127 | 5003470 | Method for tying and untying path access in a CPU-based, layered communications system | |||
1128 | 5001628 | Single system image uniquely defining an environment for each user in a data processing system | |||
1129 | 4999771 | Communications network | |||
1130 | 4989139 | Map case network virtual connection interface system | |||
1990 | |||||
1131 | 4977499 | Method and apparatus for commanding operations on a computer network | |||
1132 | 4975905 | Message transmission control arrangement for node in local area network | |||
1133 | 4975904 | Local area network for digital data processing system including timer-regulated message transfer arrangement | |||
1134 | 4972437 | Method of controlling limited resource sessions in a data communications network | |||
1135 | 4949248 | System for shared remote access of multiple application programs executing in one or more computers | |||
1136 | 4941089 | Input/output network for computer system | |||
1137 | 4937737 | Process transparent multi storage mode data transfer and buffer control | |||
1138 | 4926375 | Multiple nodes broadcast communication method with receiver identification by bit position in transferred massage | |||
1139 | 4914653 | Inter-processor communication protocol | |||
1140 | 4914619 | Apparatus and method for interconnecting an application of a transparent services access facility to remote source | |||
1141 | 4914571 | Locating resources in computer networks | |||
1142 | 4905229 | Local area communication network | |||
1989 | |||||
1143 | 4888726 | Distributed processing in a cluster of industrial controls linked by a communications network | |||
1144 | 4887075 | Local area network system with a multi-computer system coupled thereto and method for controlling the same | |||
1145 | 4866664 | Intercomputer communication control apparatus & method | |||
1146 | 4853875 | Image-capable interprocessor link communications protocol | |||
1147 | 4837739 | Telemetry data processor | |||
1148 | 4835674 | Computer network system for multiple processing elements | |||
1149 | 4835673 | Method and apparatus for sharing resources among multiple processing systems | |||
1150 | 4831620 | Controller for controlling multiple LAN types | |||
1151 | 4831518 | Multiprocessor interrupt rerouting mechanism | |||
1152 | 4827411 | Method of maintaining a topology database | |||
1153 | 4823124 | Lan controller proprietary bus | |||
1154 | 4823122 | Local area network for digital data processing system | |||
1155 | 4807118 | Method for handling slot requests over a network | |||
1156 | 4805168 | Local area communication network | |||
1157 | 4800488 | Method of propagating resource information in a computer network | |||
1988 | |||||
1158 | 4794594 | Method and system of routing data blocks in data communication networks | |||
1159 | 4792921 | Network event identifiers | |||
1160 | 4791566 | Terminal device session management protocol | |||
1161 | 4780821 | Method for multiple programs management within a network having a server computer and a plurality of remote computers | |||
1162 | 4760395 | Arrangement for communications between equipment belonging to different network architectures | |||
1163 | 4736369 | Adaptive session-level pacing | |||
1164 | 4718005 | Distributed control of alias name usage in networks | |||
1987 | |||||
1165 | 4714996 | Impact calculation for version management in a distributed information service | |||
1166 | 4714995 | Computer integration system | |||
1167 | 4654654 | Data network acknowledgement arrangement | |||
1168 | 4649473 | Flexible data transmission for message based protocols | |||
1169 | 4644470 | Non-unique names for broadcast messages | |||
1170 | 4644468 | Name usage support through distributed processing networks linked by bridges and/or gateways | |||
1986 | |||||
1171 | 4620276 | Method and apparatus for asynchronous processing of dynamic replication messages | |||
1172 | 4614841 | Geographically distributed multiprocessor time-shared communication processing system | |||
1173 | 4586134 | Computer network system and its use for information unit transmission | |||
1174 | 4574284 | Communication bus interface unit | |||
1985 | |||||
1175 | 4550402 | Data communication system | |||
1176 | 4493021 | Multicomputer communication system | |||
1984 | |||||
1177 | 4463417 | Modular, processor-controlled document distribution terminal | |||
1178 | 4451827 | Local area communication network | |||
1179 | 4432057 | Method for the dynamic replication of data under distributed system control to control utilization of resources in a multiprocessing, distributed data base system | |||
1180 | 4430651 | Expandable and contractible local area network system | |||
1983 | |||||
1181 | 4423414 | System and method for name-lookup in a local area network data communication system | |||
1182 | 4412285 | Multiprocessor intercommunication system and method | |||
1183 | 4410889 | System and method for synchronizing variable-length messages in a local area network data communication system | |||
1981 | |||||
1184 | 4274139 | Digital telecommunication network having improved data processing systems | |||
© 2017, ПАТ-Инфо, В.И. Карнышев
Дата формирования списка: 03.04.2017 |