Patents Assigned to ZixCorp Systems, Inc.
-
Patent number: 9692848Abstract: According to some embodiments, a proxy server populates a proxy server cache with first user content and sends the first user content to a secure client application executing on a user's mobile device. The proxy server determines a usage pattern based on a portion of the first user content consumed by the secure client application, prioritizes unrequested user content according to the usage pattern, and populates the proxy server cache with at least a portion of the unrequested user content based on priority.Type: GrantFiled: September 24, 2014Date of Patent: June 27, 2017Assignee: ZixCorp Systems, Inc.Inventors: Deryk Shane Agnew, Alton Ray Fowler
-
Patent number: 9647971Abstract: Computer program products and methods for the secure delivery of a message in a communication system. The method includes identifying a best method for delivery of a message including considering preferences of a sender and a recipient and sending the message from the sender to the recipient using the identified method.Type: GrantFiled: March 2, 2015Date of Patent: May 9, 2017Assignee: ZixCorp Systems, Inc.Inventors: David P. Cook, Gary G. Liu, John Kalan
-
Patent number: 9602473Abstract: Methods, apparatuses, and computer program products are provided for facilitating the secure transmission and storage of data. In this regard, a method is provided that comprises causing data encrypted by a sender system to be received at a service provider system; causing the data as encrypted by the sender system to be stored at the service provider system; receiving a request for the data from a recipient system; determining the recipient system is authorized to receive the data; and causing the data as encrypted to be transmitted to the sender system.Type: GrantFiled: September 6, 2012Date of Patent: March 21, 2017Assignee: ZixCorp Systems, Inc.Inventors: David Joseph Robertson, John French Kalan, Mark Stephen DeMichele, Bryan Adam Joyner, Charles Anthony Rego, Dorwin Thomas Shields, Jr., Caleb Rhoads Spring
-
Patent number: 9516043Abstract: An auditing system and method for analyzing email, including capturing email transferred over a network and transferring the email to a data analyzer. The email can be encrypted for safe transfer to the analysis location. Once the email is delivered to the analysis location, it is decrypted and the analysis process begins. The analysis of the email includes scanning the email for specific search terms found in a lexicon and then identifying trends based on scanning results.Type: GrantFiled: October 23, 2014Date of Patent: December 6, 2016Assignee: ZixCorp Systems, Inc.Inventor: Daniel Nutkis
-
Patent number: 9509683Abstract: According to some embodiments, a method provides a designated link in a notification to an intended recipient of the message. The designated link includes a unique identifier associated with the message. Upon receiving a request to access the message, the method authenticates the request. Authentication includes verifying whether the request corresponds to the designated link provided in the notification. If the request passes authentication, the method communicates the message.Type: GrantFiled: March 13, 2015Date of Patent: November 29, 2016Assignee: ZixCorp Systems, Inc.Inventors: Dena Terry Bauckman, Nigel Paul Johnson, David Joseph Robertson
-
Patent number: 9363088Abstract: Network communication and provisioning systems and methods are provided to enable automatic provisioning of an appliance to provide encryption services for email messages and other types of electronic messages addressed to or from an email domain.Type: GrantFiled: July 22, 2010Date of Patent: June 7, 2016Assignee: ZixCorp Systems, Inc.Inventors: John Kalan, Charles A. Rego
-
Publication number: 20150201002Abstract: According to some embodiments, a delivery system comprises an interface and one or more processors. The interface is operable to receive a current preference from a recipient. The current preference indicates how the recipient prefers messages to be delivered. The processors determine whether the current preference differs from a previous preference that the delivery system associates with the recipient. The interface communicates the current preference to a plurality of senders if the current preference differs from the previous preference. The senders are configured to store the current preference in local memory and to apply the current preference from local memory in response to a future determination to send a message to the recipient.Type: ApplicationFiled: January 14, 2014Publication date: July 16, 2015Applicant: ZixCorp Systems, Inc.Inventors: Bryan Adam Joyner, Kelly Sue Morrison, David Vincent Care, Waseul Islam
-
Patent number: 8984605Abstract: According to some embodiments, a method provides a designated link in a notification to an intended recipient of the message. The designated link includes a unique identifier associated with the message. Upon receiving a request to access the message, the method authenticates the request. Authentication includes verifying whether the request corresponds to the designated link provided in the notification. If the request passes authentication, the method communicates the message.Type: GrantFiled: August 23, 2011Date of Patent: March 17, 2015Assignee: ZixCorp Systems, Inc.Inventors: Dena Terry Bauckman, Nigel Paul Johnson, David Joseph Robertson
-
Patent number: 8972717Abstract: Computer program products and methods for the secure delivery of a message in a communication system. The method includes identifying a best method for delivery of a message including considering preferences of a sender and a recipient and sending the message from the sender to the recipient using the identified method.Type: GrantFiled: March 24, 2003Date of Patent: March 3, 2015Assignee: ZixCorp Systems, Inc.Inventors: David P. Cook, Gary G. Liu, John Kalan
-
Patent number: 8954513Abstract: An auditing system and method for analyzing email, including capturing email transferred over a network and transferring the email to a data analyzer. The email can be encrypted for safe transfer to the analysis location. Once the email is delivered to the analysis location, it is decrypted and the analysis process begins. The analysis of the email includes scanning the email for specific search terms found in a lexicon and then identifying trends based on scanning results.Type: GrantFiled: May 21, 2009Date of Patent: February 10, 2015Assignee: ZixCorp Systems, Inc.Inventor: Daniel Nutkis
-
Publication number: 20140068262Abstract: Methods, apparatuses, and computer program products are provided for facilitating the secure transmission and storage of data. In this regard, a method is provided that comprises causing data encrypted by a sender system to be received at a service provider system; causing the data as encrypted by the sender system to be stored at the service provider system; receiving a request for the data from a recipient system; determining the recipient system is authorized to receive the data; and causing the data as encrypted to be transmitted to the sender system.Type: ApplicationFiled: September 6, 2012Publication date: March 6, 2014Applicant: ZIXCORP SYSTEMS, INC.,Inventors: David Joseph Robertson, John French Kalan, Mark Stephen DeMichele, Bryan Adam Joyner, Charles Anthony Rego, Dorwin Thomas Shields, JR., Caleb Rhoads Spring
-
Publication number: 20140026187Abstract: According to some embodiments, a proxy server comprises one or more processors operable to establish communication with a secure client application of a device. The client is configured with a partition that contains data received from the proxy server within the secure application. If the client passes authentication, the server communicates preview information to the client previewing files that the server received from a business server on behalf of the client. The client requests a selected file. The server renders the selected file into a first portion and a second portion based on the immediate display capabilities of the client. The server communicates the first portion, determines that a trigger point was reached, and then communicates the second portion in response to the trigger point being reached. The client is configured to delete the first portion and the second portion in response to a completion event.Type: ApplicationFiled: July 18, 2012Publication date: January 23, 2014Applicant: ZixCorp Systems, Inc.Inventors: Nigel Paul Johnson, Dorwin T. Shields, JR., Bryan Adam Joyner
-
Publication number: 20130055368Abstract: According to some embodiments, a method provides a designated link in a notification to an intended recipient of the message. The designated link includes a unique identifier associated with the message. Upon receiving a request to access the message, the method authenticates the request. Authentication includes verifying whether the request corresponds to the designated link provided in the notification. If the request passes authentication, the method communicates the message.Type: ApplicationFiled: August 23, 2011Publication date: February 28, 2013Applicant: ZixCorp Systems, Inc.Inventors: Dena Terry Bauckman, Nigel Paul Johnson, David Joseph Robertson