Matches 1 - 50 out of 293 1 2 3 4 5 6 >


Match Document Document Title
US20110047381 SAFEMASHUPS CLOUD TRUST BROKER  
The present invention provides a new method for policy enforcement in a virtualized or cloud environment. We break down the environment into layers, which are further sub-divided into security...
US20120095919 SYSTEMS AND METHODS FOR AUTHENTICATING ASPECTS OF AN ONLINE TRANSACTION USING A SECURE PERIPHERAL DEVICE HAVING A MESSAGE DISPLAY AND/OR USER INPUT  
Systems and methods for authenticating aspects of an online transaction using a secure peripheral device having a message display and/or user input are provided. One such method for establishing a...
US20100332832 TWO-FACTOR AUTHENTICATION METHOD AND SYSTEM FOR SECURING ONLINE TRANSACTIONS  
A two-factor authentication system is provided for securing online transactions. In the two-factor authentication system, a transaction server provides online transaction services. A mobile...
US20110179275 TOOLS FOR GENERATING PKI EMAIL ACCOUNTS  
The present invention provides systems and methods for allowing an Email User to create a Public Key Infrastructure (PKI) Email Account and thereafter to digitally sign, send, verify and receive...
US20120173877 METHOD AND APPARATUS FOR BUILDING A HARDWARE ROOT OF TRUST AND PROVIDING PROTECTED CONTENT PROCESSING WITHIN AN OPEN COMPUTING PLATFORM  
A system architecture provides a hardware-based root of trust solution for supporting distribution and playback of premium digital content. In an embodiment, hardware root of trust for digital...
US20120089519 SYSTEM AND METHOD FOR SINGLE USE TRANSACTION SIGNATURES  
A system and method for providing transaction-level security, such as authentication, authorization, or non-repudiation of business-related and other transactions, using shared keys and single use...
US20150222439 COMPUTER IMPLEMENTED SYSTEM AND METHOD FOR LIGHTWEIGHT AUTHENTICATION ON DATAGRAM TRANSPORT FOR INTERNET OF THINGS  
A computer implemented system and method for lightweight authentication on datagram transport for internet of things provides a robust authentication scheme based on challenge-response type of...
US20140337626 CONTENT REPRODUCING DEVICE, CONTENT REPRODUCING METHOD, AND CONTENT REPRODUCING SYSTEM  
According to one embodiment, a content reproducing device is provided with connection unit and reproducing unit. The connection unit connects a license server and removable medium to each other in...
US20120089837 KEYLESS CHALLENGE AND RESPONSE SYSTEM  
A confidential information exchange between a sender and a receiver may be conducted without the use of encryption keys. The information is coded with a Challenge-Response Table that is shared...
US20130054969 Secured privileged access to an embedded client on a mobile device  
Disclosed is an apparatus and method to access privileges of Virtual Mobile Management (VMM) client in mobile device. A disclosed example method contains an assigning embedded stub to raise the...
US20060155993 Service provider anonymization in a single sign-on system  
A method for sign-on in a network based communications environment is described. Authentication of a first entity is requested by a second entity for accessing a service to be provided by the...
US20110119489 NETWORK AND METHOD FOR ESTABLISHING A SECURE NETWORK  
The invention relates to a network with a first node (102) comprising first pre-distributed keying material being assigned to the first node before the first node is connected to the network and a...
US20060155996 System and method for constraint resolution  
A method of determining the compatibility of respective information associated with at least two parties is described. The method comprises: a first and second party each expressing their...
US20140281541 AUTHENTICATION FOR RELAY DEPLOYMENT  
Techniques for proving enterprise mode security for relays are disclosed. For example, enterprise mode security based on IEEE 802.1x is provided for relays or other similar devices to extend the...
US20110252240 Mobile Device Management  
Methods and apparatuses that enroll a wireless device into an enterprise service with a management server addressed in a management profile are described. The enrollment may grant a control of...
US20110107099 PRE-AUTHENTICATION METHOD, AUTHENTICATION SYSTEM AND AUTHENTICATION APPARATUS  
A pre-authentication method and an authentication system related to the mobile communications field are disclosed. The pre-authentication method includes: when a mobile node (MN) enters a visited...
US20110179274 Shared secret verification method and system  
Method for shared secret verification e.g. to be applied in secure data exchange, in which at least two parties, hereinafter indicated as Alice and Bob, each have a secret while their challenge is...
US20110213976 METHOD FOR DOWNLOADING CONDITIONAL ACCESS SYSTEM FOR DIGITAL BROADCASTING  
The present invention relates to a method of downloading a conditional access system (CAS) for digital broadcasting in a digital broadcasting system. More specifically, the present invention...
US20110145579 PASSWORD AUTHENTICATION METHOD  
There is provided an authentication method which is secure against various attacks such as a KCI attack on a public network, and can reduce a required calculation amount compared to a conventional...
US20130007453 Lattice scheme for establishing a secure multi-identity authentication context  
This disclosure describes a secure and computationally-efficient method to establish a single authentication context for multiple identities. The method is implemented in an authentication system...
US20140250301 NETWORK CODING-BASED ANONYMOUS COMMUNICATION  
A computer-based peer-to-peer anonymous networking using a coding scheme with a formal information theoretic security characterization to construct a corresponding overlay subgraph is presented. A...
US20110035592 AUTHENTICATION METHOD SELECTION USING A HOME ENHANCED NODE B PROFILE  
An authentication method selection using a home enhanced Node B (H(e)NB) profile is disclosed. A method for selecting an H(e)NB authentication method includes authenticating at least one of the...
US20120159170 METHOD OF AUTHENTICATING VEHICLE COMMUNICATION  
A vehicle communication authentication system performs mutual authentication with an authentication subject by performing a user subscriber identify module (USIM)-based authentication protocol in...
US20110078438 ENTITY BIDIRECTIONAL-IDENTIFICATION METHOD FOR SUPPORTING FAST HANDOFF  
An entity bidirectional-identification method for supporting fast handoff involves three security elements, which includes two identification elements A and B and a trusted third party (TP). All...
US20120023334 METHODS FOR ANONYMOUS AUTHENTICATION AND KEY AGREEMENT  
Methods for anonymous authentication and key exchange are presented. In one embodiment, a method includes initiating a two-way mutual authentication between a device and a remote entity. The...
US20130007434 LOCAL SECURITY KEY GENERATION  
A calling device may obtain a first calling security parameter by registering with a network and obtain a second calling security parameter in response to causing an application authentication...
US20120166801 MUTUAL AUTHENTICATION SYSTEM AND METHOD FOR MOBILE TERMINALS  
Provided is a technique for mutual authentication between different kinds of objects (devices, apparatuses, users, etc.) by expanding the kinds of objects that are subject to authentication, such...
US20120096267 CREDENTIAL GENERATION SYSTEM AND METHOD FOR COMMUNICATIONS DEVICES AND DEVICE MANAGEMENT SERVERS  
Systems and methods are described for establishing credentials at a device and at a device management server for the purpose of exchanging secure credentials in order to mutually authenticate the...
US20130227290 Communication Apparatus and Communication Method  
According to an embodiment, a communication apparatus includes a security control unit. The security control unit establishes first and second secure communication channels to a first server which...
US20110231650 USE AND GENERATION OF A SESSION KEY IN A SECURE SOCKET LAYER CONNECTION  
The invention describes a method and system for verifying the link between a public key and a server's identity without relying on the trustworthiness of the root certificate of the server's...
US20150074403 METHOD AND APPARATUS FOR MUTUAL AUTHENTICATION  
Disclosed is a method for mutual authentication between a station, having a digital rights agent, and a secure removable media device. The digital rights agent is configured to initiate mutual...
US20150046710 Industrial control system redundant communications/control modules authentication  
A set of redundant industrial control system communications/control modules includes at least a first communications/control module and a second communications/control module. The first and second...
US20120297193 MTC DEVICE AUTHENTICATION METHOD, MTC GATEWAY, AND RELATED DEVICE  
Embodiments of the present invention provide an MTC device authentication method, an MTC gateway, and a related device, which are used to solve a problem that direct interaction between a large...
US20110035593 ESTABLISHING SECURE MUTUAL TRUST USING AN INSECURE PASSWORD  
A process for establishing secure mutual trust includes generating a one-time-password. The one-time-password is transferred between the devices in a communication occurring off of the network....
US20150113275 TAMPER-RESISTANT AND SCALABLE MUTUAL AUTHENTICATION FOR MACHINE-TO-MACHINE DEVICES  
An authentication request message is sent from a first computing device to a second computing device, wherein the first computing device and the second computing device communicate via a...
US20060195695 Techniques for verification of electronic device pairing  
Techniques for verification of device pairing.
US20140006784 TECHNIQUES FOR USER-VALIDATED CLOSE-RANGE MUTUAL AUTHENTICATION  
A close-range mutual authentication system is described. A method may comprise receiving encoded connection information at a close-range input device of a client mode electronic device from a...
US20070234052 Electromechanical lock system  
The present invention is an electromechanical lock system which includes an electromechanical lock and a release device for releasing the electromechanical lock. In one embodiment of the...
US20140082362 METHOD OF ANONYMOUS ENTITY AUTHENTICATION USING GROUP-BASED ANONYMOUS SIGNATURES  
Methods for anonymous authentication and key exchange are presented. In one embodiment, a method includes initiating a two-way mutual authentication between a first entity and a second entity. The...
US20110138183 METHOD FOR ENSURING SECURITY AND PRIVACY IN A WIRELESS COGNITIVE NETWORK  
In some embodiments, authentication, confidentiality, and privacy are enhanced for a wireless network of cognitive radios by encryption of network management and control messages as well as data...
US20140115335 SECURE MACHINE-TO-MACHINE COMMUNICATION PROTOCOL  
A task list server supports secure asynchronous communications between both a workstation and one or more machines. The task list server stores requests and responses initiated by either side and...
US20110167269 NETWORK DEVICE AUTHENTICATION  
In general, this disclosure relates to maintaining security between an optical network terminal (ONT) and an optical network aggregation device in an Active Ethernet network. An optical network...
US20110167268 NETWORK DEVICE AUTHENTICATION  
In general, this disclosure relates to maintaining security between an optical network terminal (ONT) and an optical network aggregation device in an Active Ethernet network. An optical network...
US20110191585 Device Authentication  
Authentication of two devices in communication with a third device is achieved where the first and second devices each possess a shared secret value. The authentication includes communication of...
US20150121068 APPARATUS AND METHOD FOR IMPLEMENTING COMPOSITE AUTHENTICATORS  
A system, apparatus, method, and machine readable medium are described for implementing a composite authenticator. For example, an apparatus in accordance with one embodiment comprises: an...
US20140101446 SECURE CLIENT-SIDE KEY STORAGE FOR WEB APPLICATIONS  
Implementations of the present disclosure include methods, systems, and computer-readable storage mediums for secure client-side key storage for authentication tracking. Implementations include...
US20110022843 SECURITY IN A MOBILE COMMUNICATION SYSTEM  
When a mobile terminal (10), having a basic identity module (12) operative according to a first security standard, initiates a service access, the home network (30) determines whether the mobile...
US20120079274 Key Agreement and Transport Protocol with Implicit Signatures  
A key establishment protocol between a pair of correspondents includes the generation by each correspondent of respective signatures. The signatures are derived from information that is private to...
US20100268951 METHOD OF HANDOVER  
A method for quickly performing a handover in a wireless access system is disclosed. The method for quickly performing a handover includes transmitting a handover request message to a serving base...
US20120144197 POINT-TO-POINT COMMUNICATION METHOD IN A WIRELESS SENSOR NETWORK AND METHODS OF DRIVING COORDINATORS AND COMMUNICATION DEVICES IN THE WIRELESS SENSOR NETWORK  
The present invention relates to a point-to-point communication method that performs mutual authentication and creates link keys without using a master key. The point-to-point communication method...

Matches 1 - 50 out of 293 1 2 3 4 5 6 >