Patent application number | Description | Published |
20110063093 | SYSTEM AND METHOD FOR PERFORMING SERIALIZATION OF DEVICES - A serialization service module is provided for configuring an asset management system to provide a secure means of generating, assigning to chips (or other electronic objects or devices), and tracking unique serial numbers. To provide this service, a controller is used to define a product model, then to define one or more serialization schemas to be bound to each product model. Each serialization schema contains a range of serial numbers for a particular product. The serial number schemas are sent over a secure, encrypted connection to appliances at the manufacturer's location. Agents can then request serial number values by product name. The serial numbers are generated by the appliance, metered, and provided to the agents. The serial numbers are then injected sequentially into each die in a chip manufacturing process using the agent. | 03-17-2011 |
20120078998 | SYSTEM AND METHOD FOR ENABLING VPN TUNNEL STATUS CHECKING - A method and apparatus for virtual private network (‘VPN’) liveness checking, the method, upon expiration of a timer, sending, over a VPN tunnel, a request to a server located behind a terminator of the VPN; checking whether a response to the request is received within a time interval; if a response to the request is received, resetting the timer; and if a response to the request is not received within the time interval, resending the request if a request count is less than a set number of requests; or providing an inactive tunnel indication to a VPN client manager if the request count equals the set number of requests. | 03-29-2012 |
20130215740 | METHOD AND APPARATUS FOR AUTOMATIC VPN LOGIN ON INTERFACE SELECTION - A method and device for automatic login of a virtual private network on an interface change, the method: associating a virtual private network profile with a plurality of connection interfaces, each connection interface within the plurality of connection interfaces having a priority; monitoring the plurality of connection interfaces for availability; if a connection interface with a higher priority than the connection interface currently used by the virtual private network becomes available, utilizing the higher priority connection interface for the virtual private network; and if the connection interface currently used by the virtual private network becomes unavailable, transferring the virtual private network to a highest priority available connection interface within the plurality of connection interfaces. | 08-22-2013 |
20130219173 | DESIGNATION OF CLASSES FOR CERTIFICATES AND KEYS - Plural modes of operation may be established on a mobile device. Specific modes of operation of the mobile device may be associated with specific spaces in memory. By using a “class” designation within the existing certificate store structure and key store structure, certificates and keys can be assigned to one space among plural spaces. Accordingly, a personal certificate store and a personal key store may exist in a personal space. Similarly, a corporate certificate store and a corporate key store may exist in a corporate space. APIs designed to work within such a system may be arranged to employ a “class” attribute when managing certificates and cryptographic keys. | 08-22-2013 |
20130219455 | CERTIFICATE MANAGEMENT METHOD BASED ON CONNECTIVITY AND POLICY - Plural modes of operation may be established on a mobile device. Specific modes of operation of the mobile device may be associated with specific spaces in memory. By associating the existing certificate store structure and key store structure with a mode of operation, certificates and keys can be assigned to one space among plural spaces. Furthermore, management (viewing/importation/deletion) of certificates associated with specific modes of operation may be controlled based on the presence or absence of a mobile device administration server and the status (enabled/disabled) of an IT policy. | 08-22-2013 |
20130219465 | METHOD AND APPARATUS FOR SEPARATION OF CONNECTION DATA BY PERIMETER TYPE - A method and a mobile device having a plurality of modes of operation, the method associating each connection interface on the mobile device with one of a plurality of modes; and restricting access to a profile for each connection interface on the mobile device to only a subset of applications based on the mode associated with the profile. | 08-22-2013 |
20140003359 | MANAGING MULTIPLE FORWARDING INFORMATION BASES | 01-02-2014 |
20140047534 | Filtering Network Packets in Multiple Forwarding Information Base Systems - In some implementations, a method for routing communication includes determining a binding interface for a communication session based on a forwarding information base (FIB) and a destination for the communication session. The communication session is from an application running on user equipment (UE), and the binding interface is included in a virtual private network (VPN) tunnel established through an Internet Protocol (IP) security (IPsec) interface. Whether to filter the communication session is determined based on which perimeter of the UE includes the binding interface and which perimeter of the UE includes the IPsec interface. | 02-13-2014 |
20140207943 | METHOD AND SYSTEM FOR MANAGING A VPN CONNECTION - A method and computing device configured to send and receive traffic over a virtual private network (VPN) connection, the computing device having a processor; and a communications subsystem, where the method determines that a first trigger had been met; monitors whether data traffic exists over the VPN connection for a first time period; and if no data traffic exists over the VPN connection for the first time period, disconnects the VPN connection. | 07-24-2014 |
20150074754 | CERTIFICATE MANAGEMENT METHOD BASED ON CONNECTIVITY AND POLICY - Plural modes of operation may be established on a mobile device. Specific modes of operation of the mobile device may be associated with specific spaces in memory. By associating the existing certificate store structure and key store structure with a mode of operation, certificates and keys can be assigned to one space among plural spaces. Furthermore, management (viewing/importation/deletion) of certificates associated with specific modes of operation may be controlled based on the presence or absence of a mobile device administration server and the status (enabled/disabled) of an IT policy. | 03-12-2015 |