| Patents for H04L 29 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups (330,333) | 
|---|
| 10/30/2014 | US20140325668 Lawful Intercept Utility Application | 
| 10/30/2014 | US20140325667 Preventing identity fraud for instant messaging | 
| 10/30/2014 | US20140325662 Protecting against suspect social entities | 
| 10/30/2014 | US20140325661 Systems, methods, apparatuses, and computer program products for forensic monitoring | 
| 10/30/2014 | US20140325660 K-zero day safety | 
| 10/30/2014 | US20140325659 Malware risk scanner | 
| 10/30/2014 | US20140325657 Systems and methods for assessing security risk | 
| 10/30/2014 | US20140325656 System and method for below-operating system regulation and control of self-modifying code | 
| 10/30/2014 | US20140325655 Proxy gateway anti-virus method, pre-classifier, and proxy gateway | 
| 10/30/2014 | US20140325653 System and method for automated configuration of intrusion detection systems | 
| 10/30/2014 | US20140325652 Detection of device tampering | 
| 10/30/2014 | US20140325651 Method of defending against a spoofing attack by using a blocking server | 
| 10/30/2014 | US20140325649 Method and system to dynamically detect traffic anomalies in a network | 
| 10/30/2014 | US20140325648 Attack Defense Method and Device | 
| 10/30/2014 | US20140325647 Methods and systems for internet protocol (ip) packet header collection and storage | 
| 10/30/2014 | US20140325645 Device, system, and method of detecting hardware components | 
| 10/30/2014 | US20140325643 Detecting anomalies in work practice data by combining multiple domains of information | 
| 10/30/2014 | US20140325637 Supporting IP Address Overlapping Among Different Virtual Networks | 
| 10/30/2014 | US20140325636 Load balancing in a network with session information | 
| 10/30/2014 | US20140325635 Hardware implementation of complex firewalls using chaining technique | 
| 10/30/2014 | US20140325634 Adjusting ddos protection based on traffic type | 
| 10/30/2014 | US20140325633 Computer or microchip with its system bios protected by one or more internal hardware firewalls | 
| 10/30/2014 | US20140325632 Method for using and maintaining user data stored on a smart card | 
| 10/30/2014 | US20140325630 Method and apparatus for determining multimedia data authenticity level | 
| 10/30/2014 | US20140325629 System and method of online document storage and retrieval for use by hosting companies as a service to their clients | 
| 10/30/2014 | US20140325628 Login method, apparatus, and system | 
| 10/30/2014 | US20140325627 Authentication system and method for embedded applets | 
| 10/30/2014 | US20140325626 Method And System Using A Cyber ID To Provide Secure Transactions | 
| 10/30/2014 | US20140325625 Cyber gene identification technology based on entity features in cyber space | 
| 10/30/2014 | US20140325624 Projector projecting password | 
| 10/30/2014 | US20140325623 Authentication manager | 
| 10/30/2014 | US20140325622 Synchronizing credential hashes between directory services | 
| 10/30/2014 | US20140325621 Implementing single sign-on across a heterogeneous collection of client/server and web-based applications | 
| 10/30/2014 | US20140325620 System and method for managing heterogeneous computing environments | 
| 10/30/2014 | US20140325619 Method and system for access control | 
| 10/30/2014 | US20140325618 System and method for delivering external data to a process running on a virtual machine | 
| 10/30/2014 | US20140325617 Detecting horizontal attacks | 
| 10/30/2014 | US20140325615 Rogue access point detection | 
| 10/30/2014 | US20140325613 Method for modifying rights to security domain for smartcard, and server, smartcard, and terminal for same | 
| 10/30/2014 | US20140325612 Using social networking thresholds in access control decisions | 
| 10/30/2014 | US20140325611 Systems and Methods for Automatic Discovery of Systems and Accounts | 
| 10/30/2014 | US20140325610 Rule-based application access management | 
| 10/30/2014 | US20140325607 Programmatically enabling user access to crm secured field instances based on secured field instance settings | 
| 10/30/2014 | US20140325606 Service activation using algorithmically defined key | 
| 10/30/2014 | US20140325605 System for storage security of cloud server in cloud computing environment and method thereof | 
| 10/30/2014 | US20140325603 Processing data | 
| 10/30/2014 | US20140325602 Accessing system for vehicle network and method of controlling the same | 
| 10/30/2014 | US20140325601 Managing private information in instant messaging | 
| 10/30/2014 | US20140325600 Information level agreements for enterprise cloud data | 
| 10/30/2014 | US20140325599 Status Transfer Within a Group of Computing Entities | 
| 10/30/2014 | US20140325598 Using clock drift, clock slew, and network latency to enhance machine identification | 
| 10/30/2014 | US20140325596 Authentication of ip source addresses | 
| 10/30/2014 | US20140325594 Methods and Systems for Secured Authentication of Applications on a Network | 
| 10/30/2014 | US20140325591 Rules driven multiple passwords | 
| 10/30/2014 | US20140325590 Method of analyzing security ruleset and system thereof | 
| 10/30/2014 | US20140325589 Disposable Browsers and Authentication Techniques for a Secure Online User Environment | 
| 10/30/2014 | US20140325588 Systems and methods for network access control | 
| 10/30/2014 | US20140325587 Bioinformatic processing systems and methods | 
| 10/30/2014 | US20140325586 Method and system for evaluating security for an interactive service operation by a mobile device | 
| 10/30/2014 | US20140325570 Methods, Systems and Apparatus for Providing Video Transmissions over Multiple Media | 
| 10/30/2014 | US20140325396 Methods and systems for simultaneous display of multimedia during a video communication | 
| 10/30/2014 | US20140325394 Interactive tracking virtual world system | 
| 10/30/2014 | US20140325392 Social Aspects of Media Guides | 
| 10/30/2014 | US20140325391 System and method for updating information in an instant messaging application | 
| 10/30/2014 | US20140325383 Device, System And Method For Processing Character Data | 
| 10/30/2014 | US20140325381 Indicating a content preference | 
| 10/30/2014 | US20140325378 Method and apparatus for generating a personalized page | 
| 10/30/2014 | US20140325377 Management of multiple instances of legacy application tasks | 
| 10/30/2014 | US20140325376 Interactive Labeling System | 
| 10/30/2014 | US20140325373 Operating environment with gestural control and multiple client devices, displays, and users | 
| 10/30/2014 | US20140325369 Method, apparatus and system for management of information content for enhanced accessibility over wireless communication networks | 
| 10/30/2014 | US20140325365 Summarizing portlet usage in a portal page | 
| 10/30/2014 | US20140325346 Shortened Network Address Linking to Image Representation of Web Page | 
| 10/30/2014 | US20140325341 Social Data Overlay | 
| 10/30/2014 | US20140325326 System and Method for Managing Content on a Network Interface | 
| 10/30/2014 | US20140325307 Detecting a utilization imbalance between dispersed storage network storage units | 
| 10/30/2014 | US20140325232 Requesting and storing certificates for secure connection validation | 
| 10/30/2014 | US20140325230 Method of comparing private data without revealing the data | 
| 10/30/2014 | US20140325229 Method and system for secure digital file sharing | 
| 10/30/2014 | US20140325228 Load balancing hash computation for network switches | 
| 10/30/2014 | US20140325224 Dispersed data storage in a vpn group of devices | 
| 10/30/2014 | US20140325223 Device, system, and method of visual login and stochastic cryptography | 
| 10/30/2014 | US20140325222 Portable device, a stationary device, a digital device and a method for performing secure communication using thereof | 
| 10/30/2014 | US20140325221 Network token authentication scheme | 
| 10/30/2014 | US20140325211 Method for updating a table of correspondence between a logical address and an identification number | 
| 10/30/2014 | US20140325210 Apparatus and methods for activation of communication devices | 
| 10/30/2014 | US20140325209 System and method for managing network access based on a history of a certificate | 
| 10/30/2014 | US20140325208 Obtaining a signed certificate for a dispersed storage network | 
| 10/30/2014 | US20140325206 Digital device and method for performing secure communication using same | 
| 10/30/2014 | US20140325091 Method and apparatus for dynamic policy interworking between pcrf and nat | 
| 10/30/2014 | US20140325090 Discovery and disconnection of client addresses in an access node for an ip network | 
| 10/30/2014 | US20140325089 Method, terminal, server and system for page jump | 
| 10/30/2014 | US20140325088 System and method for long range and short range data compression | 
| 10/30/2014 | US20140325087 Apparatus and method for transparent communication architecture in remote communication | 
| 10/30/2014 | US20140325086 Method and Device for Centralized Peer Arrangement In P2P Overlay Networks | 
| 10/30/2014 | US20140325085 Communication device, method for controlling communication device, and storage medium | 
| 10/30/2014 | US20140325084 Personal Network Access Control System and Method | 
| 10/30/2014 | US20140325083 System and method for cookie-based browser identification and tracking | 
| 10/30/2014 | US20140325082 Network application device, network connection method, and network connection system | 
| 10/30/2014 | US20140325081 Method and Device for Establishing an End-to-End Communication Between Two Networks |