Match Document Document Title
US20110313836 CONTROLLING COUPON PRINTING TO MULTIPLE TYPES OF CLIENTS  
A coupon distributor controls coupon distribution via a centralized coupon distribution server. The server not only distributes coupons to the various computing devices, but also tracks the number...
US20120254612 Privacy-Preserving Probabilistic Inference Based on Hidden Markov Models  
A probability of an observation sequence stored at a client is evaluated securely with respect to a hidden Markov model (HMM) stored at a server. The server determines, for each state of the HMM,...
US20130346752 SECURE, AUDITABLE FILE EXCHANGE SYSTEM AND METHOD  
Secure and auditable file exchange between a professional and a client, patient, colleague, or other associate of the professional may be achieved via a file exchange service that automatically...
US20120047365 SECURE, AUDITABLE FILE EXCHANGE SYSTEM AND METHOD  
Secure and auditable file exchange between a professional and a client, patient, colleague, or other associate of the professional may be achieved via a file exchange service that automatically...
US20130042108 PRIVATE ACCESS TO HASH TABLES  
A server and a client mutually exclusively execute server-side and client-side commutative cryptographic processes and server-side and client-side commutative permutation processes. The server has...
US20120290844 SYSTEM AND METHOD FOR CONTROLLING MESSAGE ATTACHMENT HANDLING FUNCTIONS ON A MOBILE DEVICE  
A system and method for controlling message attachment handling functions on a mobile device is described herein. An attachment handling control can be set to identify one of a number of selected...
US20100122090 Secure Bytecode Instrumentation Facility  
A secure bytecode instrumentation facility, wherein a new code fragment is registered in an encrypted registry by first extracting a digital certificate from a specified code fragment location. A...
US20140040617 METHOD FOR THE GENERATION OF A CODE, AND METHOD AND SYSTEM FOR THE AUTHORIZATION OF AN OPERATION  
The present invention relates to a method for generating a code and a method comprising the authorization of an operation carried out by a client on a first server. A second server generating an...
US20110099377 COMPACT SECURITY DEVICE WITH TRANSACTION RISK LEVEL APPROVAL CAPABILITY  
The present invention relates to the field of securing electronic transactions and more specifically to methods to indicate and verify the approval of the risk level of a transaction and to...
US20130096998 AUTOMATED DEVICE PROVISIONING AND ACTIVATION  
A method comprising providing a plurality of links to a plurality of end-user devices communicatively coupled to a network system, a particular link of the plurality of links supporting...
US20110283106 METHOD FOR REALIZING AUTHENTICATION CENTER AND AUTHENTICATION SYSTEM  
A method for realizing an authentication center (AC) and an authentication system are disclosed. The method comprises: a UE sends an authentication request to an AC and applies for temporary...
US20100298662 SYSTEM AND METHOD FOR AUTOMATED DATA COLLECTION OF TWENTY-FOUR HOUR ULTRAFILTRATION AND OTHER PATIENT PARAMETERS USING WIRED OR WIRELESS TECHNOLOGY  
A dialysis system includes: a dialysis machine for performing a first dialysis session on a patient at a first time of a day; a remote exchange device for performing a second dialysis session on...
US20120095919 SYSTEMS AND METHODS FOR AUTHENTICATING ASPECTS OF AN ONLINE TRANSACTION USING A SECURE PERIPHERAL DEVICE HAVING A MESSAGE DISPLAY AND/OR USER INPUT  
Systems and methods for authenticating aspects of an online transaction using a secure peripheral device having a message display and/or user input are provided. One such method for establishing a...
US20130179686 Transaction Verification on RFID Enabled Payment and Transaction Instruments  
A display enabled RFID tag (DERT) receives transaction details from the reader. DERT verifies that the details match their counterparts in the reader public key certificate. The process is aborted...
US20120130905 TRANSACTION VERIFICATION ON RFID ENABLED PAYMENT AND TRANSACTION INSTRUMENTS  
A display enabled RFID tag (DERT) receives transaction details from the reader. DERT verifies that the details match their counterparts in the reader public key certificate. The process is aborted...
US20130332732 SYSTEM AND METHOD FOR GENERATING AND MANAGING PRODUCT AUTHENTICATION CODES  
A method for generating product authentication codes comprises allocating a lot identification value and a total lot size for an order of a plurality of product authentication codes, generating...
US20150058627 DATA DRIVEN SCHEMA FOR PATIENT DATA EXCHANGE SYSTEM  
A patient data exchange system comprises at least one device. Each of the devices implements an interface. When a device in the patient data exchange system publishes patient data, the device...
US20130125223 System And Method For Transparently Authenticating A User To A Digital Rights Management Entity  
Various embodiments of a system and method for transparently authenticating a user to a digital rights management entity are described. In various embodiments, a digital rights management server...
US20150001298 Systems and Methods for RFID Security  
An RFID system includes an RFID tag, an RFID reader, and a server. The RFID tag communicates to the server via encrypted information. The information may be encrypted with synchronized encryption...
US20130246791 PRIVACY-PRESERVING PUBLISH-SUBSCRIBE PROTOCOL IN A CLOUD-ASSISTED BROADCAST MODEL  
A method and system for providing privacy in a publish-subscribe protocol is provided. A server receives from a third party a topic-based key associated with a tree structure having a pseudonym of...
US20110264912 MANAGED SERVICES ENVIRONMENT PORTABILITY  
A device and method for forming a portable network environment outside a managed network environment for sharing content is provided. A portable network device enables authorized consumption of...
US20120311329 SYSTEM AND METHOD FOR SECURE INSTANT MESSAGING  
A system and method for secure instant messaging are described. For example, in one embodiment, a first user identifies a second user for an instant messaging session with the ID code of the...
US20150244713 PASSWORD SCHEME THAT CAN BE USED FOR SECURITY OF MODEMS IN AN INDEPENDENTLY OPERATED CABLE SYSTEM THAT IS SCALABLE WITH DYNAMICALLY CHANGEABLE PASSWORDS  
A password scheme is provided that can be used for security of cable modems in a cable network. In the system, the password is unique to each modem, the password is not fixed for the life of the...
US20110271108 METHOD AND SYSTEM FOR SECURE EXCHANGE AND USE OF ELECTRONIC BUSINESS CARDS  
Some embodiments provide a system that facilitates the use of an electronic business card. During operation, the system obtains one or more permissions for the electronic business card. Next, the...
US20120084563 Systems and methods for multi-factor remote user authentication  
What is disclosed is a handheld multi-factor remote user authentication card device in the form factor of a prior art one factor of “what you have” security card. The handheld multifactor...
US20120233462 METHOD AND SYSTEM FOR AUTOMATICALLY LOGGING IN A CLIENT  
A method and system for automatically logging in a client is disclosed in the present invention, mainly comprising: use encrypted ICCID for the authentification of user's identity during automatic...
US20100318806 MULTI-FACTOR AUTHENTICATION WITH RECOVERY MECHANISMS  
A single sign on facility provides redundancy and recovery functions through the use of a plurality of identifiers. Users prove identity to relying parties by demonstrating control over each of...
US20110072262 System and Method for Identifying Security Breach Attempts of a Website  
The present invention is a method, circuit and system for detecting, reporting and preventing an attempted security breach of a commercial website (for example a banking website), such as identity...
US20150215391 COMMUNICATION SYSTEM AND COMMUNICATION METHOD THEREOF  
The invention provides a communication system comprising a local device, a peer device and a server, wherein the server comprises a conversion module for converting a message to be transmitted by...
US20140351588 METHOD AND SYSTEM FOR PRODUCT AUTHENTICATION  
During manufacturing a unique encrypted authentication code is created for each product based upon device specific information relating to that product. The unique encrypted authentication code...
US20120066497 METHOD AND DEVICE FOR ENABLING PORTABLE USER REPUTATION  
The present invention relates to a method and a device adapted to determine at a party whether a set comprising at least one user pseudonym is associated with a user, wherein each of the user...
US20110208963 SECURED KVM SYSTEM HAVING REMOTE CONTROLLER-INDICATOR  
Organizations often defend against security threats by physically isolate their internal classified networks from external networks attached to the internet. To enable easy user's access to...
US20120030468 SYSTEM AND METHOD FOR OPTIMAL VERIFICATION OF OPERATIONS ON DYNAMIC SETS  
A system and method for cryptographically checking the correctness of outsourced set operations performed by an untrusted server over a dynamic collection of sets that are owned (and updated) by a...
US20140359278 Secure Remote Subscription Management  
A method and apparatus are disclosed for performing secure remote subscription management. Secure remote subscription management may include providing the Wireless Transmit/Receive Unit (WTRU)...
US20110035584 SECURE REMOTE SUBSCRIPTION MANAGEMENT  
A method and apparatus are disclosed for performing secure remote subscription management. Secure remote subscription management may include providing the Wireless Transmit/Receive Unit (WTRU)...
US20130103942 SYSTEM AND METHOD FOR PSEUDO-RANDOM POLYMORPHIC TREE CONSTRUCTION  
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for obfuscating data via a pseudo-random polymorphic tree. A server, using a seed value shared with a...
US20150012749 SECURITY IDENTITY DISCOVERY AND COMMUNICATION METHOD  
The present invention provides a security identity discovery method, through hiding or omitting MAC addresses of the first station and a second station in a frame for identity discovery between...
US20130332730 EMBEDDED MODULE SYSTEM WITH ENCRYPTED TOKEN AUTHENTICATION SYSTEM  
Method and systems for accessing and providing protected content are disclosed herein. An example system includes a client configured to access a third-party application to receive at least one...
US20150019866 Systems and Methods for Automatically Generating Top Level Index Files  
Systems and methods for automatically generating top level index files for use in adaptive bitrate streaming in accordance with embodiments of the invention are disclosed. One embodiment of the...
US20140129834 Providing User Authentication  
In particular embodiments, a user associated with a user account wishes to utilize their computing device to facilitate authentication of their identity. The user may provide a device key to an...
US20100325434 REAL-TIME DELIVERY OF LICENSE FOR PREVIOUSLY STORED ENCRYPTED CONTENT  
Content is stored as ClearText by a content provider within a trusted area. Specific content is requested by an end user, preferably via a service provider, and the requested content is encrypted...
US20140237242 COMPACT SECURITY DEVICE WITH TRANSACTION RISK LEVEL APPROVAL CAPABILITY  
The present invention relates to the field of securing electronic transactions and more specifically to systems to indicate and verify the approval of the risk level of a transaction and to...
US20120072727 MULTI-ISP CONTROLLED ACCESS TO IP NETWORKS, BASED ON THIRD-PARTY OPERATED UNTRUSTED ACCESS STATIONS  
A mechanism that allows sharing of an existing infrastructure for access to public or private IP networks, such as the public Internet or private LANs is provided. Specifically, infrastructure...
US20110087885 METHOD AND APPARATUS FOR EFFICIENT AND SECURE CREATING, TRANSFERRING, AND REVEALING OF MESSAGES OVER A NETWORK  
An encryption based method of enabling a plurality of parties to share, create, hide, or reveal message or token information over a network includes a commutative group cipher (CGC), where the...
US20110202766 METHOD AND APPARATUS FOR EFFICIENT AND SECURE CREATING, TRANSFERRING, AND REVEALING OF MESSAGES OVER A NETWORK  
An encryption based method of enabling a plurality of parties to share, create, hide, or reveal message or token information over a network includes a commutative group cipher (CGC), where the...
US20140298017 METHODS AND SYSTEMS FOR BROADCASTING PICTURES  
A method and system for broadcasting pictures across multiple user terminals are provided. The method includes generating a user signature based on information associated with the picture, and...
US20110131415 MULTIFACTOR USERNAME BASED AUTHENTICATION  
A hashed value is computed from an encrypted password value and a displayed code value from a hardware token at a client. The encrypted password value is based on a username, a context identifier,...
US20130080774 Two-stage Anonymization of Mobile Network Subscriber Personal Information  
A two-stage anonymization process is applied to monitored network traffic in which unique user identifiers, such as the MSISDN (Mobile Station International Subscriber Directory Number), are...
US20100306536 SYSTEM AND METHOD FOR ROUTING MESSAGES BETWEEN APPLICATIONS  
A system and method for enabling the interchange of enterprise data through an open platform is disclosed. This open platform can be based on a standardized interface that enables parties to...
US20130166909 Client-Side Player File and Content License Verification  
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for verifying a message based on application of a hashing algorithm. In one aspect, a method...