Match Document Document Title
US20150256542 USER AUTHENTICATION  
Method and system for user authentication are described. The method comprises receiving an authentication code from an application server seeking authentication of the user. Further, a private key...
US20100306832 METHOD FOR FINGERPRINTING AND IDENTIFYING INTERNET USERS  
Various aspects of the present system provide methods and systems for identifying an individual who operates a remote computer. One aspect provides a technique to generate fingerprint of computer...
US20120084570 Remote Resources Single Sign On  
Exemplary techniques for enabling single sign-on to an operating system configured to conduct a remote presentation session are disclosed. In an exemplary embodiment, a user credential can be...
US20110154025 COMPUTER IMPLEMENTED METHOD FOR AUTHENTICATING A USER  
The invention relates to a computer implemented method for performing a user authentication, wherein an asymmetric cryptographic key pair is associated with the user, said key pair comprising a...
US20070300074 Trusted evidence cameras and related methods and computer program products  
Digital Cameras configured to verify authenticity of digital photos taken with the digital camera and related methods and computer program products are provided. GPS information associated with a...
US20150205976 SECURE ACCESS TO HEALTHCARE INFORMATION  
A system and method for providing or exchanging healthcare information (e.g., medical information) to authorized users in a secure manner. The method is implemented in a computer infrastructure...
US20110083170 User Enrollment via Biometric Device  
A web-enabled application identifies a biometric device installed in a client device. The system identifies biometric information associated with a user and creates a biometric template associated...
US20130097427 Soft-Token Authentication System  
A system for authenticating a user and his local device to a secured remote service with symmetrical keys, which utilizes a PIN from the user and a unique random value from the local device in...
US20120017094 MANAGING USER ACCOUNTS  
The present disclosure relates to managing user accounts in one or more computer systems. In general, one aspect of the subject matter described in this specification can be embodied in methods...
US20060075250 Touch panel lock and unlock function and hand-held device  
A lock and unlock function triggered by a touch panel of a hand-held device. The hand-held device detects a pattern input from the touch panel, and execute the lock/unlock function to enable or...
US20130198522 SYSTEMS AND METHODS FOR FILE ACCESS AUDITING  
Systems and methods for providing an auditing file system for theft-prone devices are disclosed. The auditing file system supports fine-grained file auditing: a user may obtain reliable, explicit...
US20110239000 PASSWORD-PROTECTED PHYSICAL TRANSFER OF PASSWORD-PROTECTED DEVICES  
A method for password-protected physical transfer of password-protected devices including at a receiving location, generating at least one security file including an encrypted element generated...
US20110072274 DISTRIBUTED SYSTEM FOR MULTI-FUNCTION SECURE VERIFIABLE SIGNER AUTHENTICATION  
A distributed multi-function secure system for verifiable signer authentication having a personal private key stored in a secure storage of a mobile device where the mobile device connects to a...
US20110314294 PASSWORD CHECKING  
A method is disclosed for password checking. After input is received, a proposed password included in the input is parsed into symbols. At least one of the symbols includes two or more characters....
US20130031371 Software Run-Time Provenance  
An executing first computing module verifies the run-time provenance of an unverified second computing module. A signed certificate identifying an author of the second computing module is received...
US20070022472 Method and system for ordering, loading and using admission tickets  
Method and system for ordering, loading and using admission tickets for access to access-controlled service devices, in which admission tickets are ordered from a reservation center through...
US20100325693 REMOTE AUTHORIZATION FOR OPERATIONS  
Techniques for the remote authorization of secure operations are provided. A secure security system restricts access to a secure operation via an access key. An authorization acquisition service...
US20140040628 USER-CONVENIENT AUTHENTICATION METHOD AND APPARATUS USING A MOBILE AUTHENTICATION APPLICATION  
Methods, apparatus, and systems for securing application interactions are disclosed. Application interactions may be secured by, at a user authentication device, capturing a signal emitted by an...
US20110213985 TWO FACTOR AUTHENTICATION SCHEME  
An improved method is provided for generating an authentication factor for authenticating a user. The method includes: assigning a unique identifier to a user of the computing resource;...
US20110119494 METHOD AND APPARATUS FOR SHARING LICENSES BETWEEN SECURE REMOVABLE MEDIA  
A method and an apparatus for sharing a license between SRMs are disclosed. The method includes: a DRM agent obtains the license from a first SRM, and sets the license to a forwarding state...
US20110087888 AUTHENTICATION USING A WEAK HASH OF USER CREDENTIALS  
Methods and apparatus for logging into a computer. The computer receives a username and password. The computer determines whether a user with the username is authorized to access the computer. If...
US20110283110 Secure Communications  
Systems and methods are described for communicating between a client machine and a server. A security token message may be transmitted from the server to the client machine. The security token...
US20110055553 Method for controlling user access in sensor networks  
A method for implement an energy-efficient user access control to wireless sensor networks is disclosed. A user creates a secret key and sending it to a sensor. The sensor builds a first MAC value...
US20120089847 METHOD OF OBTAINING AUTHORIZATION FOR ACCESSING A SERVICE  
Methods and devices for obtaining authorization for a requestor to access a service are provided. In accordance with one embodiment, there is provided a method comprising receiving a requestor...
US20050154894 Access protection  
An access protection system for a computer, the invention taking which takes advantage of the fact that every transportable storage medium has an individual identifier. This individual identifier...
US20060191013 Offering different product costs options based on privacy policy acceptance  
A system for enabling configuration of an information handling system which includes a configurator, a support authorization module for enabling a user to authorize access to the information...
US20140006794 PRIVATE/PUBLIC GESTURE SECURITY SYSTEM AND METHOD OF OPERATION THEREOF  
A secure communication method including: obtaining sensor information of at least one user, the sensor information including one or more of image information or depth information; recognizing at...
US20120272067 AUTHENTICATION METHOD  
Method enabling a user to verify the operation of a personal cryptographic device, comprising the following steps: a) a user (2) enters an access request in a terminal (3) (100), d) a personal...
US20100169721 SYSTEM AND METHOD FOR UPDATING A COMPENSATION VALUE OF A MEASUREMENT MACHINE  
A system and method for updating a compensation value of a measurement machine provides a host computer to generate an authorization code document according to an ID input by a user and encrypts...
US20110010556 System and Method of Secure Authentication Information Distribution  
A system and method of distributing authentication information for remotely accessing a computer resource. A request for authentication information, including identity information, is received...
US20140250304 User Authentication System and Method for Encryption and Decryption  
A system configured to authenticate a user for encryption or decryption includes a user authentication apparatus, a computer-readable medium operable to communicate with the user authentication...
US20120110337 METHOD AND SYSTEM FOR RESTRICTING EXECUTION OF VIRTUAL APPLICATIONS TO A MANAGED PROCESS ENVIRONMENT  
Methods and systems for restricting the launch of virtual application files. In one embodiment, a launching application is signed with a digital signature. When the launching application launches...
US20100306548 SYSTEM AND METHOD FOR SECURING THE LIFE-CYCLE OF USER DOMAIN RIGHTS OBJECTS  
In a method for enabling support for backwards compatibility in a User Domain, in one of a Rights Issuer (RI) and a Local Rights Manager (LRM), a Rights Object Encryption Key (REK) and encrypted...
US20110191592 Secure Access by a User to a Resource  
A method for allowing user access to a resource includes a large number of arrays of elements which are generated and stored for each user for use in a series of log-in sessions. A user input...
US20150143129 Secure mobile identity  
A “Secure Mobile Identity System” that enables the creation of secure digital credentials on mobile devices, prevents identity theft, prevents fraudulent financial transactions, protects privacy,...
US20100318881 Flexible Node Identity for Telecom Nodes  
Features of a node (800) is enabled/disabled under a license between a node vendor and a service provider. A license manager (810) enforces the license to appropriately enable and disable the node...
US20120239939 Secure Resume for Encrypted Drives  
Systems, methods and products are described that provide secure resume for encrypted drives. One aspect provides a method including: receiving an indication to resume from a suspended state at a...
US20120265996 Permitting Access To A Network  
Method and communication system for permitting access to a network via an access point, wherein the method comprises determining, at a first node of the communication system, at least one...
US20130019102 System and method for encrypted smart card pin entry  
A smart card, system, and method for securely authorizing a user or user device using the smart card is provided. The smart card is configured to provide, upon initialization or a request for...
US20140068247 SECURITY DEVICE ACCESS  
Technology is described to control a security device providing access to a restricted resource. The method can include generating a plurality of security access codes at a security locking device...
US20070143624 Client-side captcha ceremony for user verification  
A facility for performing a local human verification ceremony to obtain user verification is provided. Upon determining that user verification is needed to perform an action on a computer system,...
US20100064354 MAIDSAFE.NET  
This invention is a network that is defined by its novel approach to privacy, security and freedom for its users. Privacy by allowing access anonymously, security by encrypting and obfuscating...
US20050246548 Method for verifying a first identity and a second identity of an entity  
A method for verifying a first identity and a second identity of an entity, said method comprising: receiving first identity information at a checking entity; sending second identity information...
US20120239938 LOCAL STORAGE OF INFORMATION PEDIGREES  
This disclosure describes techniques for dynamically assembling and utilizing a pedigree of a resource. A pedigree of a resource is a set of statements that describe a provenance of the resource....
US20140040627 PROCESS AND SYSTEM FOR STRENGTHENING PASSWORD SECURITY  
A process and a system that create and encrypt rich formatted passwords that increase password strength and security in some embodiments are disclosed. The process increases password security by...
US20060218407 Method of confirming the identity of a person  
Methods and systems for confirming the identity of a person include receiving identifying information of the person, receiving an electronic device identifier, checking a database for a recorded...
US20050105119 Easy scan kiosk for low volume document scanner  
A method for storing scanned document on a media (80) includes coding a personal identification number (PIN) to the media, the media is then inserted into a scanner (70). The PIN is verified and...
US20060117187 Internet method of protecting subscriber information  
A method and apparatus for providing subscriber information by a first party to a second party in conjunction with a call placed through the Internet. The method includes the steps of the first...
US20140089671 Multi-Tiered Authentication Methods For Facilitating Communications Amongst Smart Home Devices and Cloud-Based Servers  
Apparatus, systems, methods, and related computer program products for synchronizing distributed states amongst a plurality of entities and authenticating devices to access information and/or...
US20050005127 Method of verifying entitlement to participate in a gaming event from a remote location  
In a first step (S1), a prospective gaming patron preferably enrolls to establish entitlement to participate in a gaming event. This step includes the patron providing a variety of information,...