Match Document Document Title
US20130173915 SYSTEM AND METHOD FOR SECURE NEWORK LOGIN  
Systems and methods for providing an expedited login process that is relatively fast and that still provides a reasonable level of security and a reasonable method for mitigating compromised login...
US20140115323 SECURE SYSTEM FOR ALLOWING THE EXECUTION OF AUTHORIZED COMPUTER PROGRAM CODE  
Systems and methods for selective authorization of code modules are provided. According to one embodiment, a trusted service provider maintain a cloud-based whitelist containing cryptographic hash...
US20130275747 ENTERPRISE ENVIRONMENT DISK ENCRYPTION  
A method for deploying a disk encryption password to a client computer includes installing a disk encryption agent on a client computer, where the agent communicates with an enterprise encryption...
US20140082350 SECURITY CREDENTIAL DEPLOYMENT IN CLOUD ENVIRONMENT  
Techniques are described for deploying a security credential for an application deployed in a cloud. An encrypted security credential is received from a remote system and is inserted into a...
US20130238894 Managing Credentials  
In a centralized credential management system, website credentials are stored in a vault storage at a vault. The website credentials are encrypted based upon a key not available to the vault and...
US20130117557 CLOUD COMPUTING SYSTEM AND CLOUD SERVER MANAGING METHOD THEREOF  
A cloud computing system is disclosed. The cloud computing system includes a management server that manages a plurality of servers and distributes service resources. Each of the servers...
US20120060025 SERVICE PROVIDER INVOCATION  
A service provider may provide one or more services to and/or for a client. Providing a service may involve receiving a service request including a security token at the service provider and...
US20150026457 CONTROLLING ACCESS BY CODE  
A novel code signing system, computer readable media, and method are provided. The code signing method includes receiving a code signing request from a requestor in order to gain access to one or...
US20140136837 METHOD FOR IDENTIFYING AND AUTHENTICATING A USER VIA A PORTABLE DEVICE  
The method comprises: a1) associating, a user server (US) in collaboration with an authoritative user server (AUS), a user's portable device (MT) with an email address; anda2) once associated,...
US20120054486 Securing A Virtual Environment And Virtual Machines  
A computer implemented method and system for securing a virtual environment and virtual machines in the virtual environment is provided. A credential authority server is provided for managing...
US20130326213 METHOD AND SYSTEM FOR AUTOMATIC GENERATION OF CONTEXT-AWARE COVER MESSAGE  
One embodiment provides a system that facilitates secure communication between a sending device and a receiving device. During operation, the system first transmits an encrypted message to a...
US20110246764 USER AUTHENTICATION SYSTEM  
An ID vault computer control program detects when a user's browser navigates to a third-party website that requires a user ID and password. If it hasn't done so already, it automatically requests...
US20110107085 Authenticator relocation method for wimax system  
A method is provided for Authenticator Relocation in a communication system applying an Extensible Authentication Protocol, or the like, which provides replay protection and mitigates the rogue...
US20150100777 Secure Federated Identity Service  
Federated identity is the means of linking a person's electronic identity and attributes, such that the user can be authenticated with a single sign-on, across multiple systems and organizations....
US20140317400 SYSTEM AND METHOD FOR VALIDATION AND ENFORCEMENT OF APPLICATION SECURITY  
A system and method for validation and enforcement of application security, wherein the user credentials and the integrity of a target application are verified before the target application is...
US20140164762 APPARATUS AND METHOD OF ONLINE AUTHENTICATION  
In a method of online authentication, digital certificates of a client device and an application server are verified when the application server receives a login request to a network application...
US20140082349 SECURITY CREDENTIAL DEPLOYMENT IN CLOUD ENVIRONMENT  
Techniques are described for deploying a security credential for an application deployed in a cloud. An encrypted security credential is received from a remote system and is inserted into a...
US20150134950 STORAGE ARRAY PASSWORD MANAGEMENT  
A system and method for generating passwords for secure login to a storage array. A randomly generated root secret is utilized along with a compartment ID to generate a root password for logging...
US20130311770 TRACING DEVICE AND METHOD  
A tracing method performed by a traceability device for validating a process having a purity of steps. During at least one step of the process, there is a step of receiving a marking message sent...
US20100325441 PRIVACY-PRESERVING FLEXIBLE ANONYMOUS-PSEUDONYMOUS ACCESS  
Systems and methods are disclosed for privacy-preserving flexible user-selected anonymous and pseudonymous access at a relying party (RP), mediated by an identity provider (IdP). Anonymous access...
US20140359278 Secure Remote Subscription Management  
A method and apparatus are disclosed for performing secure remote subscription management. Secure remote subscription management may include providing the Wireless Transmit/Receive Unit (WTRU)...
US20110035584 SECURE REMOTE SUBSCRIPTION MANAGEMENT  
A method and apparatus are disclosed for performing secure remote subscription management. Secure remote subscription management may include providing the Wireless Transmit/Receive Unit (WTRU)...
US20120198228 SYSTEM AND METHOD FOR DIGITAL USER AUTHENTICATION  
A method according to preferred embodiment can include receiving a request at a server from a private key module associated with a first user device; directing a request for a first portion of the...
US20140101438 STRUCTURE PRESERVING DATABASE ENCRYPTION METHOD AND SYSTEM  
A database encryption system and method, the Structure Preserving Database Encryption (SPDE), is presented. In the SPDE method, each database cell is encrypted with its unique position. The SPDE...
US20130238893 DIGITAL LOCKER FOR ESTATE PLANNING SYSTEM AND METHOD  
A secure system and method is presented for an individual to gather, organize, store, and share personal and asset information. The system is offered through software-as-service platform to...
US20130145148 PASSCODE RESTORATION  
A system method that includes providing a passcode to a user based on presentation of both a recovery key and an active token is described herein.
US20130067217 SYSTEM AND METHOD FOR PROTECTING ACCESS TO AUTHENTICATION SYSTEMS  
A system and method for protecting access to authentication systems. A mediator may accept original authentication credentials from a client, may process the authentication credentials to provide...
US20130031359 METHOD AND SYSTEM FOR MODULAR AUTHENTICATION AND SESSION MANAGEMENT  
Modular authentication and session management involves the use of discrete modules to perform specific tasks in a networked computing environment. There may be a separate authentication server...
US20120072714 Methods and Systems for Secure Authentication of a User by a Host System  
A method and system for securely logging onto a banking system authentication server so that a user credential never appears in the clear during interaction with the system in which a user's...
US20130232336 METHOD AND SYSTEM FOR USER AUTHENTICATION FOR COMPUTING DEVICES UTILIZING PKI AND OTHER USER CREDENTIALS  
A system and method for user authentication utilizing PKI credentials and user credentials on an electronic device comprising a mobile communication device, smart phone, a computer or other...
US20110035583 AUTHENTICATION APPARATUS, AUTHENTICATION SYSTEM, AUTHENTICATION METHOD AND COMPUTER READABLE MEDIUM  
An authentication apparatus includes an accepting unit and an instructing unit. The accepting unit accepts a request, which requests to issue an authentication medium for a second user, from a...
US20130019092 System to Embed Enhanced Security / Privacy Functions Into a User Client  
A system and method for provisioning enhanced security/privacy functions into a user client to detect, warn, and avoid man in the middle attacks and to improve privacy and security of data...
US20120331287 Provisioning a Shared Secret to a Portable Electronic Device and to a Service Entity  
Systems and methods are provided for computing a secret shared with a portable electronic device and service entity. The service entity has a public key G and a private key g. A message comprising...
US20150046697 OPERATOR ACTION AUTHENTICATION IN AN INDUSTRIAL CONTROL SYSTEM  
Operator actions and/or other commands or requests are secured via an authentication path from an action originator to a communications/control module or any other industrial element/controller....
US20120131332 Method and Apparatus for Authenticating Online Transactions Using a Browser  
A computer-implemented method for authenticating a user using a service provider server and an authentication server, the user communicating with at least one of the service provider server and...
US20130145150 CODE SIGNING SYSTEM AND METHOD  
A novel code signing system, computer readable media, and method are provided. The code signing method includes receiving a code signing request from a requestor in order to gain access to one or...
US20140244997 EMERGENCY MODE FOR IOT DEVICES  
Methods and apparatuses for implementing an emergency instruction based on an emergency message from a trusted authority source. The method includes receiving, at an Internet of Things (IoT)...
US20120297185 MAINTAINING PRIVACY FOR TRANSACTIONS PERFORMABLE BY A USER DEVICE HAVING A SECURITY MODULE  
A method and system for maintaining privacy for transactions performable by a user device having a security module with a privacy certification authority and a verifier are disclosed. The system...
US20110016311 METHOD FOR PREVENTING LAUNDERING AND REPACKAGING OF MULTIMEDIA CONTENT IN CONTENT DISTRIBUTION SYSTEMS  
A method for distributing content in a content distribution system is disclosed which comprises the steps of: encrypting at a Content Packager a content using a content encryption key to generate...
US20130121489 System And Method For Providing Content Protection Of Linearly Consumed Content With A Bidirectional Protocol For License Acquisition  
Embodiments may include a content provider system configured to provide electronic content that includes multiple encrypted content items to a playback device. A playback device may be configured...
US20110265172 METHOD AND SYSTEM FOR THIRD PARTY CLIENT AUTHENTICATION  
Methods and systems for third party client authentication of a client. A method includes displaying a user interface on a display of the client, the user interface including an option to select a...
US20140201517 METHOD AND SYSTEM FOR DISTRIBUTED OFF-LINE LOGON USING ONE-TIME PASSWORDS  
A method and a system for extending distributed logon services to an off-line computing device includes encrypting, on the off-line computing device, a one-time password (OTP), a nonce, and a...
US20150058619 SYSTEMS AND METHODS FOR IMPLEMENTING COMPUTER SECURITY  
A security server transmits a specification of a first set of files and directories to a computing device for monitoring according to a security policy. Each of the files or directories in the...
US20150149767 METHOD AND SYSTEM FOR AUTHENTICATING THE NODES OF A NETWORK  
A system and a method are provided for authenticating the nodes of a communication network in order to access the services of a service provider, and includes a collective authentication of the...
US20140289508 METHOD, CLIENT AND SYSTEM OF IDENTITY AUTHENTICATION  
A method, client device and system of identity authentication are provided. The method may include detecting a login or registration operation, to a server, via a login interface on a user...
US20150188913 METHOD AND APPARATUS FOR PROVIDING CLIENT-SIDE SCORE-BASED AUTHENTICATION  
Methods, apparatus, and systems for generating and verifying one time passwords in connection with a risk assessment are disclosed. The risk assessment may comprise a client-side risk assessment....
US20130080769 SYSTEMS AND METHODS FOR SECURING NETWORK COMMUNICATIONS  
Secure communications may be established amongst network entities for performing authentication and/or verification of the network entities. For example, a user equipment (UE) may establish a...
US20150082024 TECHNOLOGIES FOR SYNCHRONIZING AND RESTORING REFERENCE TEMPLATES  
Generally, this disclosure describes technologies for restoring and/or synchronizing templates such as biometric templates to/among one or more client devices. In some embodiments one or more...
US20120297187 Trusted Mobile Device Based Security  
A method for performing user security operations using a mobile communications device includes, storing at least one security credential for a user in the mobile communications device, receiving a...
US20100313012 LIGHT ACCESS AUTHENTICATION METHOD AND SYSTEM  
A light access authentication method and system, the method includes: the trustful third party writes the MSG cipher text formed by enciphering MSG into the first entity; the second entity attains...