| Patents for H04L 29 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups (330,333) | 
|---|
| 09/18/2014 | WO2014139769A1 In-vehicle access of mobile device functions  | 
| 09/18/2014 | WO2014139646A1 Communication in a dynamic multipoint virtual private network  | 
| 09/18/2014 | WO2014139598A1 Method for authenticating a client program by a remote data processing system  | 
| 09/18/2014 | WO2014139580A1 Handling of wildcarded identities  | 
| 09/18/2014 | WO2014139462A1 Generating a host route  | 
| 09/18/2014 | WO2014139434A1 System and method for compressing data associated with a buffer  | 
| 09/18/2014 | WO2014139433A1 Mechanism and protocol to authorize bilateral sessions between websites based on open authorization  | 
| 09/18/2014 | WO2014139408A1 Method and system for securely downloading terminal master key (tmk)  | 
| 09/18/2014 | WO2014139404A1 Wire level virtualization over pci-express  | 
| 09/18/2014 | WO2014139377A1 Method and device for monitoring road flow  | 
| 09/18/2014 | WO2014139372A1 System and method for selecting and rendering content  | 
| 09/18/2014 | WO2014139344A1 Key download method, management method, download management method and device, and system  | 
| 09/18/2014 | WO2014139343A1 Key downloading method, management method, downloading management method, apparatus and system  | 
| 09/18/2014 | WO2014139342A1 Key downloading method, management method, downloading management method, device and system  | 
| 09/18/2014 | WO2014139341A1 Key management method and system  | 
| 09/18/2014 | WO2014139309A1 Information retrieval system evaluation method, device and storage medium  | 
| 09/18/2014 | WO2014139302A1 Information sharing method and system  | 
| 09/18/2014 | WO2014139298A1 Permission management method, device and system for cloud platform service  | 
| 09/18/2014 | WO2014139256A1 System and method for file transmission between mobile terminals  | 
| 09/18/2014 | WO2014139158A1 Method and apparatus to authenticate a personal device to access an enterprise network  | 
| 09/18/2014 | WO2014139142A1 Scalable avatar messaging  | 
| 09/18/2014 | WO2014138961A1 Method and apparatus for providing tenant redundancy  | 
| 09/18/2014 | WO2014138960A1 Multi-ring reliable messaging system  | 
| 09/18/2014 | WO2014138892A1 Method and apparatus for peer-to-peer file sharing  | 
| 09/18/2014 | US20140283144 Environmental monitoring device  | 
| 09/18/2014 | US20140283134 Device and Method for Asset Protection Scheme  | 
| 09/18/2014 | US20140283123 Methods and systems for detecting, verifying, preventing and correcting or resolving unauthorized use of electronic media content  | 
| 09/18/2014 | US20140283122 Delivering author specific content  | 
| 09/18/2014 | US20140283084 Automatic malignant code collecting system  | 
| 09/18/2014 | US20140283083 System and method for correlating log data to discover network vulnerabilities and assets  | 
| 09/18/2014 | US20140283080 Identifying stored vulnerabilities in a web service  | 
| 09/18/2014 | US20140283079 Stem cell grid  | 
| 09/18/2014 | US20140283078 Scanning and filtering of hosted content  | 
| 09/18/2014 | US20140283075 Storage appliance and threat indicator query framework  | 
| 09/18/2014 | US20140283074 Method and system for protective distribution system (pds) and infrastructure protection and management  | 
| 09/18/2014 | US20140283073 Managing rogue devices through a network backhaul  | 
| 09/18/2014 | US20140283071 Application malware isolation via hardware separation  | 
| 09/18/2014 | US20140283070 Computer network attribute bilateral inheritance  | 
| 09/18/2014 | US20140283069 Protecting against the introduction of alien content  | 
| 09/18/2014 | US20140283068 Protecting against the introduction of alien content  | 
| 09/18/2014 | US20140283067 Detecting the introduction of alien content  | 
| 09/18/2014 | US20140283065 Server-assisted anti-malware client  | 
| 09/18/2014 | US20140283062 Apparatus, system and method for suppressing erroneous reporting of attacks on a wireless network  | 
| 09/18/2014 | US20140283061 Attack detection and prevention using global device fingerprinting  | 
| 09/18/2014 | US20140283057 Tcp validation via systematic transmission regulation and regeneration  | 
| 09/18/2014 | US20140283054 Automatic Fraudulent Digital Certificate Detection  | 
| 09/18/2014 | US20140283053 Systems and methods for zone-based intrusion detection  | 
| 09/18/2014 | US20140283052 Heterogeneous sensors for network defense  | 
| 09/18/2014 | US20140283051 System and method thereof for mitigating denial of service attacks in virtual networks  | 
| 09/18/2014 | US20140283050 Method and apparatus for collecting information for identifying computer attack  | 
| 09/18/2014 | US20140283045 Managing virtual computing testing  | 
| 09/18/2014 | US20140283043 Systems and methods for detecting and preventing flooding attacks in a network environment  | 
| 09/18/2014 | US20140283038 Safe Intelligent Content Modification  | 
| 09/18/2014 | US20140283037 System and Method to Extract and Utilize Disassembly Features to Classify Software Intent  | 
| 09/18/2014 | US20140283035 Techniques for predicting and protecting spearphishing targets  | 
| 09/18/2014 | US20140283033 Systems and methods for tokenizing user-generated content to enable the prevention of attacks  | 
| 09/18/2014 | US20140283030 Protecting networks from cyber attacks and overloading  | 
| 09/18/2014 | US20140283029 System and method for detection of rogue routers in a computing network  | 
| 09/18/2014 | US20140283028 Malicious request attribution  | 
| 09/18/2014 | US20140283026 Method and apparatus for classifying and combining computer attack information  | 
| 09/18/2014 | US20140283004 Filtering network data transfers  | 
| 09/18/2014 | US20140283003 Self-Configuring Local Area Network Security  | 
| 09/18/2014 | US20140283002 Method and system for anonymous circumvention of internet filter firewalls without detection or identification  | 
| 09/18/2014 | US20140283001 Seamless authentication with proxy servers  | 
| 09/18/2014 | US20140283000 Proxy that Switches from Light-Weight Monitor Mode to Full Proxy  | 
| 09/18/2014 | US20140282999 Secure access to applications behind firewall  | 
| 09/18/2014 | US20140282998 Method of using a secure private network to actively configure the hardware of a computer or microchip  | 
| 09/18/2014 | US20140282997 Using Client Certificates to Communicate Trusted Information  | 
| 09/18/2014 | US20140282996 Non-transitory computer readable medium, server and system  | 
| 09/18/2014 | US20140282994 Method for calling up a client program  | 
| 09/18/2014 | US20140282993 System and Method for Physical Access Control  | 
| 09/18/2014 | US20140282992 Systems and methods for securing the boot process of a device using credentials stored on an authentication token  | 
| 09/18/2014 | US20140282990 Using an ip multimedia subsystem for http session authentication  | 
| 09/18/2014 | US20140282989 Actively Federated Mobile Authentication  | 
| 09/18/2014 | US20140282988 Retry and Snapshot Enabled Cross-Platform Synchronized Communication Queue  | 
| 09/18/2014 | US20140282986 Content service on demand  | 
| 09/18/2014 | US20140282984 Service relationship and communication management  | 
| 09/18/2014 | US20140282983 Single certificate service system and operational method thereof  | 
| 09/18/2014 | US20140282982 Managed Access to Content and Services  | 
| 09/18/2014 | US20140282981 Accessing a cloud-based service using a communication device linked to another communication device via a peer-to-peer ad hoc communication link  | 
| 09/18/2014 | US20140282980 System and method for pool-based identity authentication for service access without use of stored credentials  | 
| 09/18/2014 | US20140282979 User authentication systems for remote computers, internet applications and online services  | 
| 09/18/2014 | US20140282978 Method and apparatus for secure interaction with a computer service provider  | 
| 09/18/2014 | US20140282977 Risk assessment using social networking data  | 
| 09/18/2014 | US20140282976 System and method for secure application communication between networked processors  | 
| 09/18/2014 | US20140282975 Systems and methods for automated detection of login sequence for web form-based authentication  | 
| 09/18/2014 | US20140282974 Secure Transaction Systems and Methods  | 
| 09/18/2014 | US20140282973 Systems and methods for securely transferring authentication information between a user and an electronic resource  | 
| 09/18/2014 | US20140282972 Wireless device authentication and service access  | 
| 09/18/2014 | US20140282971 System for managing remote software applications  | 
| 09/18/2014 | US20140282970 Method and apparatus for translation of business messages  | 
| 09/18/2014 | US20140282969 Systems and methods for account recovery using a platform attestation credential  | 
| 09/18/2014 | US20140282968 Method for apparatus for routing application programming interface (api) calls  | 
| 09/18/2014 | US20140282967 Portable Platform for Networked Computing  | 
| 09/18/2014 | US20140282966 Prevention of password leakage with single sign on in conjunction with command line interfaces  | 
| 09/18/2014 | US20140282964 System and method for utilizing behavioral characteristics in authentication and fraud prevention  | 
| 09/18/2014 | US20140282963 Systems and methods for automatically logging into a user account  | 
| 09/18/2014 | US20140282962 Generation of One Time Use Login Pairs Via a Secure Mobile Communication Device for Login on an Unsecure Communication Device  | 
| 09/18/2014 | US20140282961 Systems and methods for using imaging to authenticate online users  | 
| 09/18/2014 | US20140282960 Seamless device configuration in a communication network  |