Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Iboss Inc patents (2015 archive)


Recent patent applications related to Iboss Inc. Iboss Inc is listed as an Agent/Assignee. Note: Iboss Inc may have other listings under different names/spellings. We're not affiliated with Iboss Inc, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "I" | Iboss Inc-related inventors


12/31/15 / #20150381584

Selectively performing man in the middle decryption

An agent on a device within a network receives a request to access a resource outside the network. A first encrypted connection is established between the device and the agent, and a second encrypted connection is established between the agent and the resource, to facilitate encrypted communication traffic between the device and the resource. ... Iboss Inc

12/31/15 / #20150381583

Selectively performing man in the middle decryption

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for selectively performing man in the middle decryption. One of the methods includes receiving a first request to access a first resource hosted by a server outside the network, determining whether requests from the client device to access the first resource outside the network should be redirected to a second resource hosted by a proxy within the network, providing a redirect response to the client device, the redirect response including the second universal resource identifier, establishing a first encrypted connected between the client device and the proxy hosting the second resource, and a second encrypted connection between the proxy hosting the second domain and the server hosting the first resource, and decrypting and inspecting the encrypted communication traffic passing between the client device and the server hosting the first resource.. ... Iboss Inc

12/31/15 / #20150381570

Selectively performing man in the middle decryption

A http request addressed to a first resource on a second device outside the network is received from a first device within the network. The http request is redirected to a third device within the network. ... Iboss Inc

12/31/15 / #20150381559

Manage encrypted network traffic using dns responses

This present disclosure generally relates to managing encrypted network traffic using domain name system (dns) responses. One example method includes requesting an address associated with the a domain name from a resolution server, the domain name included in a predetermined set of domain names for which secure requests are to be identified domain name from a resolution server; receiving a response from the resolution server including one or more addresses associated with the domain name; associating with the domain name a particular address selected from the received one or more addresses; receiving a request to resolve the domain name; sending a response to the request to resolve the domain name, the sent response including the particular address associated with the domain name; receiving a secure request for a resource, the secure request directed to the particular address associated with the domain name; and determining that the secure request is directed to the domain name based on the association between the particular address and the domain name.. ... Iboss Inc

11/26/15 / #20150341228

Network notifications

A request is received from a device within a network for a resource on server outside of the network. The resource is subject to a policy of the network. ... Iboss Inc

11/19/15 / #20150334116

Maintaining ip tables

Data including a set of one or more resources and one or more associated ip addresses is updated based on data from a dns server. A request is received from a client device for a resource identified by an ip address. ... Iboss Inc

11/19/15 / #20150334103

Device authentication using proxy automatic configuration script requests

Methods and systems for performing device authentication using proxy automatic configuration script requests are described. One example method includes generating a unique key for a client device; configuring the client device to send a request for a proxy automatic configuration (pac) script upon accessing a network, the request including the unique key; receiving, over a network, a request for the pac script including a request key; and authenticating the client device on the network if the request key matches the client device's unique key.. ... Iboss Inc

11/19/15 / #20150333980

Maintaining ip tables

Data including a set of one or more resources and one or more associated ip addresses is updated based on monitored dns responses. A request is received from a client device for a resource identified by an ip address. ... Iboss Inc

11/05/15 / #20150317713

Vehicle information delivery and management system and method

A technique and method for vehicle information delivery and management includes: receiving, by a management module of a service provider manager associated with a service provider, a notification from an application executing on a client device of an end user that vehicle data corresponding to a vehicle being viewed by the end user on a premises of the service provider has been displayed to the end user; storing, by the management module, the vehicle data corresponding to the viewed vehicle; and storing, by the management module, a time that the vehicle was viewed by the end user.. . ... Iboss Inc

10/22/15 / #20150301982

Generating proxy automatic configuration scripts

Methods and systems for generating a proxy automatic configuration (pac) script based on the location of a device. One example method includes receiving a request for a proxy automatic configuration (pac) script from a source address associated with a device; determining, based at least in part on the source address, a location of the device; generating a pac script based at least in part on the determined location of the device; and sending a response to the request for the pac script including the generated pac script.. ... Iboss Inc

09/24/15 / #20150271209

Soft website block override

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for overriding a soft website block. One of the methods includes receiving, from a user device, a request to access a resource, determining, using a first policy group for the user device, that the user device should be prevented from accessing the resource, providing, to the user device and based on determining that the user device should be prevented from accessing the resource, instructions for the presentation of a user interface including a user credentials field, receiving user credentials from the user device, determining that the user credentials are the same as credentials used to log onto the user device, and allowing the user device access to the resource.. ... Iboss Inc

09/17/15 / #20150261953

Recording activity-triggered computer video output

An application that is capable of monitoring internet or network traffic and performing recordings of computer video output based on one or more violations of network activity policies. The recording application can be installed on the computer to be recorded or another computer or server that is connected through the network to the computer to be recorded. ... Iboss Inc

09/10/15 / #20150256416

Applying policies to subnets

Associations are maintained among a plurality of subnets, policies, and client types. Each subnet has an associated client type and policy. ... Iboss Inc

08/27/15 / #20150244822

Location based network usage policies

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for location based network usage policies. One of the methods includes storing information defining a plurality of network policy groups, receiving first information indicating that a client device is connected to the network at a first physical location, and identifying a first user role associated with the client device, identifying, from among the plurality of network policy groups, a first network policy group having both (i) an associated first policy location that corresponds to the client device's first physical location, and (ii) an associated policy role that corresponds to the client device's first user role, and regulating the client device's access to resources available on the network based on the one or more network usage policies associated with the identified first network policy group.. ... Iboss Inc

07/30/15 / #20150215296

Selectively performing man in the middle decryption

A http request addressed to a first resource on a second device outside the network is received from a first device within the network. The http request is redirected to a third device within the network. ... Iboss Inc

07/30/15 / #20150215286

Selectively performing man in the middle decryption

An agent on a device within a network receives a request to access a resource outside the network. A first encrypted connection is established between the device and the agent, and a second encrypted connection is established between the agent and the resource, to facilitate encrypted communication traffic between the device and the resource. ... Iboss Inc

04/23/15 / #20150113147

Allocating a pool of shared bandwidth

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for allocating a pool of shared internet bandwidth. One of the methods includes providing a first communications channel having a first bandwidth, the first bandwidth being shared by a first group of first users, providing a second communications channel having a second bandwidth different than the first bandwidth, the second bandwidth being shared by a second group of second users, detecting that at least one first data connection for a particular first user in the first group has satisfied a first predetermined condition, and moving, based on the detecting, the at least one first data connection for the particular first user from the first communications channel to the second communications channel.. ... Iboss Inc

04/02/15 / #20150096005

Mobile device management profile distribution

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for automated mobile device management profile distribution. One of the methods includes receiving a first request for access to a first network resource from a client device, the first network resource corresponding to one of a plurality of restricted resources accessible only by devices enrolled with a mobile device management system, determining that the client device is not enrolled with the mobile device management system, preventing the client device access to the first network resource, providing to the client device a redirect to a mobile device management resource that is different from the first network resource, providing instructions for presentation of a user interface to the client device, and enrolling the client device with the mobile device management system, the enrolling comprising providing a copy of the mobile device management profile to the client device.. ... Iboss Inc

01/22/15 / #20150026240

Location based network usage policies

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for location based network usage policies. One of the methods includes storing information defining a plurality of network policy groups, receiving first information indicating that a client device is connected to the network at a first physical location, and identifying a first user role associated with the client device, identifying, from among the plurality of network policy groups, a first network policy group having both (i) an associated first policy location that corresponds to the client device's first physical location, and (ii) an associated policy role that corresponds to the client device's first user role, and regulating the client device's access to resources available on the network based on the one or more network usage policies associated with the identified first network policy group.. ... Iboss Inc








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Iboss Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Iboss Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###