Patents
Patents for H04L 29 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups (330,333)
08/2014
08/28/2014WO2014128265A1 Securing network measurements using openflow
08/28/2014WO2014128256A1 Network security system and method
08/28/2014WO2014128253A1 System and method for embedded mobile (em)/machine to machine (m2m) security, pattern detection, mitigation
08/28/2014WO2014128008A1 Generating short term base station utilization estimates for wireless networks
08/28/2014WO2014127834A1 Media distribution network system with media burst transmission via an access network
08/28/2014WO2014127826A1 Downloading to a cache
08/28/2014WO2014127782A1 Receiver with improved data packet reception
08/28/2014WO2014127659A1 Method, device, and system for processing contact information
08/28/2014WO2014127658A1 Method, apparatus and system for processing user generated content
08/28/2014WO2014127508A1 Dynamic task scheduling for multi-receive-path equalizer
08/28/2014WO2014096683A3 Method of access to a multimedia content, mobile terminal, fixed terminal and software module corresponding thereto
08/28/2014WO2014085219A3 Trust-based self-organizing wireless network
08/28/2014US20140245462 Personal site privacy policy
08/28/2014US20140245455 Privacy Preserving Interaction process for Collective Outcome
08/28/2014US20140245453 Method and apparatus for transmitting a user datagram protocol message that is larger than a defined size
08/28/2014US20140245452 Responding to a possible privacy leak
08/28/2014US20140245451 System and method for managing industrial processes
08/28/2014US20140245450 System and method for patching a device through exploitation
08/28/2014US20140245449 System, method, and software for cyber threat analysis
08/28/2014US20140245444 Memory Introspection Engine for Integrity Protection of Virtual Machines
08/28/2014US20140245443 Cyber Defense Systems And Methods
08/28/2014US20140245442 Device-specific content delivery
08/28/2014US20140245441 Apparatus for analyzing vulnerability of wireless local area network
08/28/2014US20140245438 Download resource providing method and device
08/28/2014US20140245437 Sandboxed execution of plug-ins
08/28/2014US20140245436 Method and system for detecting and responding to attacking networks
08/28/2014US20140245435 Out-of-band ip traceback using ip packets
08/28/2014US20140245428 Computer and control method thereof
08/28/2014US20140245426 Method and apparatus for providing security in an intranet network
08/28/2014US20140245425 Configurable-quality random data service
08/28/2014US20140245424 Distributed system and method for tracking and blocking malicious internet hosts
08/28/2014US20140245423 Peripheral Firewall System for Application Protection in Cloud Computing Environments
08/28/2014US20140245422 System and method for network virtualization and security using computer systems and software
08/28/2014US20140245421 Ip reflection
08/28/2014US20140245420 Web ticket based upon a symmetric key usable for user authentication
08/28/2014US20140245417 Centralized secure management method of third-party application, system and corresponding communication system
08/28/2014US20140245416 System and Method for Associating a Universal User Identification and a Domain Specific User Identification
08/28/2014US20140245415 Method and system for implementing directional publishing of information, and computer storage medium
08/28/2014US20140245413 Image forming system, image forming apparatus, and recording medium
08/28/2014US20140245412 Linking credentials in a trust mechanism
08/28/2014US20140245411 Method and apparatus for providing account-less access via an account connector platform
08/28/2014US20140245410 Method and system for authenticating a network node in a uam-based wlan network
08/28/2014US20140245409 Extension of the Attributes of a Credential Request
08/28/2014US20140245407 Single Login Procedure For Accessing Social Network Information Across Multiple External Systems
08/28/2014US20140245406 Method for Personalizing a Secure Element, Method for Enabling a Service, Secure Element and Computer Program Product
08/28/2014US20140245405 Method for transferring authorization information, relay device, and server
08/28/2014US20140245403 Method and device for processing data security channel
08/28/2014US20140245402 Authority transfer system, authority transfer method, information processing apparatus, and recording medium
08/28/2014US20140245401 Secure and efficient login and transaction authentication using iphones™ and other smart mobile communication devices
08/28/2014US20140245400 Progressive download or streaming of digital media securely through a localized container and communication protocol proxy
08/28/2014US20140245399 Information management system and information management method
08/28/2014US20140245398 M2m data management
08/28/2014US20140245397 Terminal and server for applying security policy, and method of controlling the same
08/28/2014US20140245396 System and method for integrating two-factor authentication in a device
08/28/2014US20140245395 Off-site user access control
08/28/2014US20140245394 Trust-based computing resource authorization in a networked computing environment
08/28/2014US20140245393 Methods and systems for content availability based on location
08/28/2014US20140245392 Systems, Methods, and Computer Program Products for Authenticating Human Users of a Computer System
08/28/2014US20140245391 Authentication Method
08/28/2014US20140245390 Systems and methods for providing secure multicast intra-cluster communication
08/28/2014US20140245389 System and method for proxying federated authentication protocols
08/28/2014US20140245388 Authentication apparatus, method for controlling authentication apparatus, communication apparatus, authentication system, and storage medium in which control program is stored
08/28/2014US20140245386 System and method for access control management
08/28/2014US20140245385 Method and apparatus for packet source validation architecture system for enhanced internet security
08/28/2014US20140245383 Method and apparatus for packet source validation architecture system for enhanced internet security
08/28/2014US20140245382 System and method for developing and using trusted policy based on a social model
08/28/2014US20140245381 Systems and Methods for Controlling Email Access
08/28/2014US20140245378 Secure mobile framework
08/28/2014US20140245377 Secure mobile framework
08/28/2014US20140245376 Systems and methods of risk based rules for application control
08/28/2014US20140245375 Document authority management system, terminal device, document authority management method, and computer-readable recording medium
08/28/2014US20140245374 Device and Method for Detection of Anomalous Behavior in a Computer Network
08/28/2014US20140245373 Discretionary policy management in cloud-based environment
08/28/2014US20140245372 Http password mediator
08/28/2014US20140245282 Virtual application manager
08/28/2014US20140245272 Computer program product containing instructions for providing a processor the capability of executing an application derived from a compiled form
08/28/2014US20140245191 Relationship networks having link quality metrics with inference and concomitant digital value exchange
08/28/2014US20140245189 Internet-wide professional identity platform
08/28/2014US20140245188 Systems and methods for binding online content accounts
08/28/2014US20140245187 Fast Switching Between Multiple Programs
08/28/2014US20140245186 Determining User Subscriptions
08/28/2014US20140245185 Electronic Information Collaboration System
08/28/2014US20140245184 Presenting actionable recommendations to members of a social network
08/28/2014US20140245180 Apparatus and method for providing contact-related information items
08/28/2014US20140245179 Method and apparatus for determining group decision points during a group communication session
08/28/2014US20140245173 Electronic Information Collaboration System
08/28/2014US20140245172 User interface transfer
08/28/2014US20140245166 Artwork ecosystem
08/28/2014US20140245161 Motion-Activated Display of Messages on an Activity Monitoring Device
08/28/2014US20140245150 Selective data downloading and presentation based on user interaction
08/28/2014US20140245026 System and method for resource sharing across multi-cloud arrays
08/28/2014US20140245022 Apparatus for verifying and for generating an encrypted token and methods for same
08/28/2014US20140245021 Storage system in which fictitious information is prevented
08/28/2014US20140245016 Management system and methods for object storage system
08/28/2014US20140245015 Offline file access
08/28/2014US20140245013 Method for interworking with trustzone between normal domain and secure domain, and management method of trusted application download, management server, device and system using it
08/28/2014US20140245012 Enhancing data security using re-encryption
08/28/2014US20140245011 Device and authentication method therefor
08/28/2014US20140245008 Systems and Methods for Controlling Email Access
08/28/2014US20140245007 User Authentication System