Match Document Document Title
US20150256347 APPARATUSES AND METHODS FOR CERTIFICATE GENERATION, CERTIFICATE REVOCATION AND CERTIFICATE VERIFICATION  
Apparatuses and methods for certificate generation, certificate revocation and certificate verification are provided. The certificate generation and revocation apparatus includes: a key set...
US20140317426 ENERGY SAVING CIRCUIT OF COMPUTER  
Energy saving circuit of a computer is connected between a power supply and a motherboard. The energy saving circuit includes six electronic switches and a switch. When the computer is in the...
US20110307887 DYNAMIC VIRTUAL MACHINE SHUTDOWN WITHOUT SERVICE INTERRUPTIONS  
Techniques for dynamically managing a sleep state of a virtual machine are provided. The techniques include detecting idleness of a virtual machine, putting the idle virtual machine into a sleep...
US20110271118 PASSWORD GENERATION METHODS AND SYSTEMS  
Password generation and extraction is described. In one aspect, a user inputs multiple characters, including a user password, variable characters, and multiple terminator characters. Locations of...
US20120144185 COUNTING DELEGATION USING HIDDEN VECTOR ENCRYPTION  
Counting values can be encrypted as a set of counting value cyphertexts according to a hidden vector encryption scheme using sample values of a set of samples, where each of the samples can...
US20130232337 USER TERMINAL AND METHOD FOR PLAYING DIGITAL RIGHTS MANAGEMENT CONTENT  
Disclosed herein are a user terminal and method for playing DRM content. The user terminal includes a common security platform. The common security platform includes a DRM application management...
US20130041514 HYBRID ELECTRIC GENERATOR SET  
A portable generator system provides power to a load source including an engine and a generator. The engine drives the generator to provide a generator alternating current (AC) electrical power...
US20140040641 Cable Imbalance Diagnostics Between Channels That Include Wire Pairs for Power Over Ethernet Transmission  
Cable imbalance diagnostics between channels that include wire pairs for power over Ethernet transmission. In one embodiment, measurements of one or more characteristics of a first channel that...
US20130086389 Security Token and Authentication System  
Techniques are provided for entering a secret into a security token using an embedded tactile sensing user interface with the purpose of verifying the secret against a stored representation of the...
US20130073949 SYSTEM AND METHOD TO AID ASSISTIVE SOFTWARE IN DYNAMICALLY INTERPRETING INTERNET WEBSITES AND THE LIKE  
Disclosed is a system and method for modifying the presentation of content and/or graphical elements and behavior of a digital presentation (e.g., a webpage) by identifying an information event...
US20150244663 AUTOMATIC DELIVERY SELECTION FOR ELECTRONIC CONTENT  
Computer program products and methods for the secure delivery of a message in a communication system. The method includes identifying a best method for delivery of a message including considering...
US20150156024 COMPUTER IMPLEMENTED METHOD AND A COMPUTER SYSTEM TO PREVENT SECURITY PROBLEMS IN THE USE OF DIGITAL CERTIFICATES IN CODE SIGNING AND A COMPUTER PROGRAM PRODUCT THEREOF  
A computer implemented method including a software distributor signing via a first server at least one software file using a digital certificate with a digital signature and at least one user via...
US20110246764 USER AUTHENTICATION SYSTEM  
An ID vault computer control program detects when a user's browser navigates to a third-party website that requires a user ID and password. If it hasn't done so already, it automatically requests...
US20100332832 TWO-FACTOR AUTHENTICATION METHOD AND SYSTEM FOR SECURING ONLINE TRANSACTIONS  
A two-factor authentication system is provided for securing online transactions. In the two-factor authentication system, a transaction server provides online transaction services. A mobile...
US20110138204 SYSTEM AND METHOD FOR MESSAGE QUEUE MANAGEMENT IN A POWER-SAVE NETWORK  
A method and apparatus for communicating information between networked devices. Various aspects of the present invention may comprise, for example, a first networked device communicating...
US20120137113 METHOD OF POWERING ON SERVER  
A method of powering on a server is provided, wherein the server includes power consumption modules with the same functions, connectors, and a BIOS (Basic Input/Output System). The power...
US20130346747 SYSTEMS, METHODS AND APPARATUSES FOR SECURING ROOT CERTIFICATES  
The systems, methods and apparatuses described herein provide a computing environment that manages root certificates. An apparatus according to the present disclosure may comprise a non-volatile...
US20150143090 SYSTEM AND METHOD FOR CONFIGURING AND EXECUTING SERVICES  
Systems and methods for configuring and executing services are disclosed. A plurality of services and a plurality of technology services are configured based on information stored in a knowledge...
US20140101458 CODE TAMPERING PROTECTION FOR INSECURE ENVIRONMENTS  
In the field of computer software (code) security, it is known to include verification data such as hash values in or associated with the code to allow subsequent detection of tampering by a...
US20140019748 LEVEL-TWO DECRYPTION ASSOCIATED WITH INDIVIDUAL PRIVACY AND PUBLIC SAFETY PROTECTION VIA DOUBLE ENCRYPTED LOCK BOX  
A method substantially as shown and described the detailed description and/or drawings and/or elsewhere herein. A device substantially as shown and described the detailed description and/or...
US20130055007 ESTIMATING CLOCK SKEW  
The present invention relates to a method and an apparatus for estimating a clock skew. The method comprises: obtaining a basic clock skew of each clock tree in the circuit; judging whether two...
US20110264912 MANAGED SERVICES ENVIRONMENT PORTABILITY  
A device and method for forming a portable network environment outside a managed network environment for sharing content is provided. A portable network device enables authorized consumption of...
US20110202759 CERTIFICATE REMOTING AND RECOVERY  
Certificate remoting and recovery may be provided. A computer may identify required security certificates and determine whether at least one required security certificate is not available. If the...
US20140068271 METHOD AND SYSTEM FOR MULTIPLE PASSCODE GENERATION  
This invention relates to a method and a system for generating user passcodes for each of a plurality of transaction providers from a mobile user device. A method and system for activating a...
US20120095877 APPLICATION USAGE POLICY ENFORCEMENT  
Disclosed herein are systems, methods, and non-transitory computer-readable media for enforcing application usage policies. As part of an application purchase transaction, the application...
US20150033028 METHOD FOR READING ATTRIBUTES FROM AN ID TOKEN  
A method for reading at least one attribute stored in an ID token assigned to a user involving: authenticating the user to the ID token, authenticating a first computer system to the ID token,...
US20140223191 Communication System and Authentication Card  
One of the objects of the present invention is to provide a communication system in which biometrics can be utilized without leaking to a third person so that a strict personal authentication can...
US20110107085 Authenticator relocation method for wimax system  
A method is provided for Authenticator Relocation in a communication system applying an Extensible Authentication Protocol, or the like, which provides replay protection and mitigates the rogue...
US20120278628 Digital Signature Method and System  
A digital signature method, a method for initialising a digital signature scheme, a system for digitally signing a message and a computer program product are described. At least the digital...
US20140344588 PORTABLE ELECTRONIC SYSTEM AND POWER MANAGEMENT METHOD THEREOF  
A portable electronic system and power management method thereof are disclosed. The portable electronic system includes a portable host and a portable power supply. The portable host has a main...
US20150033015 METHODS AND SYSTEMS FOR SECURELY UPLOADING FILES ONTO AIRCRAFT  
Embodiments described herein provide for a system for verifying integrity of files uplinked to a remote vehicle. The system is configured to receive a first message authentication code (MAC) for...
US20120311329 SYSTEM AND METHOD FOR SECURE INSTANT MESSAGING  
A system and method for secure instant messaging are described. For example, in one embodiment, a first user identifies a second user for an instant messaging session with the ID code of the...
US20150244713 PASSWORD SCHEME THAT CAN BE USED FOR SECURITY OF MODEMS IN AN INDEPENDENTLY OPERATED CABLE SYSTEM THAT IS SCALABLE WITH DYNAMICALLY CHANGEABLE PASSWORDS  
A password scheme is provided that can be used for security of cable modems in a cable network. In the system, the password is unique to each modem, the password is not fixed for the life of the...
US20140359332 POWER MANAGEMENT CIRCUIT FOR A SELF-POWERED SENSOR  
A power management circuit including, between a first terminal intended to be connected to an electric power generation source and a second terminal intended to be connected to a load to be...
US20150100777 Secure Federated Identity Service  
Federated identity is the means of linking a person's electronic identity and attributes, such that the user can be authenticated with a single sign-on, across multiple systems and organizations....
US20150089216 METHOD FOR CONFIGURING A REMOTE STATION WITH A CERTIFICATE FROM A LOCAL ROOT CERTIFICATE AUTHORITY FOR SECURING A WIRELESS NETWORK  
A remote station is configured with a certificate from a local root certificate authority for securing a wireless network. To configure the certificate, the remote station forwards a station...
US20120096285 Power Management Method and Portable Electronic Device Using the Same  
A power management method for a portable electronic device having a battery providing operating power includes receiving a command utilized for indicating the portable electronic device to execute...
US20140317400 SYSTEM AND METHOD FOR VALIDATION AND ENFORCEMENT OF APPLICATION SECURITY  
A system and method for validation and enforcement of application security, wherein the user credentials and the integrity of a target application are verified before the target application is...
US20120124383 SYSTEM AND METHOD FOR PROTECTING NETWORK RESOURCES FROM DENIAL OF SERVICE ATTACKS  
The present disclosure generally pertains to systems and methods for protecting network resources from denial of service attacks. In one exemplary embodiment, a responder stores an access filter...
US20120204032 Encryption key exchange system and method  
The present invention is a computer-implemented key exchange system and methods for improving the usability of encryption technologies such as Public Key Infrastructure (PKI). One aspect of the...
US20110271108 METHOD AND SYSTEM FOR SECURE EXCHANGE AND USE OF ELECTRONIC BUSINESS CARDS  
Some embodiments provide a system that facilitates the use of an electronic business card. During operation, the system obtains one or more permissions for the electronic business card. Next, the...
US20120324217 SYSTEM AND METHODS FOR FACILITATING SECURE COMMUNICATIONS ON A WEBSITE  
A system and methods for facilitating secure communications on a website are presented. The system comprising a security server configured to receive a secure message from a creator device is...
US20130103965 ACCESSORY AND HOST BATTERY SYNCHRONIZATION  
A portable electronic device that can receive power from an internal power source (such as a battery) and/or a second portable electronic device is described. In order to coordinate the power...
US20120084563 Systems and methods for multi-factor remote user authentication  
What is disclosed is a handheld multi-factor remote user authentication card device in the form factor of a prior art one factor of “what you have” security card. The handheld multifactor...
US20120011502 MANAGING UNIQUE ELECTRONIC IDENTIFICATION FOR KERNEL EXTENSIONS IN ISOLATED VIRTUAL SPACE  
Some embodiments of the inventive subject matter are directed to detecting a file that a first instance of an operating system is configured to load where the file is configured to extend...
US20070283168 Program, classification method and system  
A system and method classifies multiple pieces of private data owned by multiple entities according to data type. Each of the entities has an encryption key. A representative entity is selected...
US20120233462 METHOD AND SYSTEM FOR AUTOMATICALLY LOGGING IN A CLIENT  
A method and system for automatically logging in a client is disclosed in the present invention, mainly comprising: use encrypted ICCID for the authentification of user's identity during automatic...
US20150082059 PEER TO PEER POWER MANAGEMENT  
A system and methods for delivering power to a multitude of portable electronic devices is provided. More specifically, the system and methods provide for powering different portable electronic...
US20110302430 PEER TO PEER POWER MANAGEMENT  
A system and methods for delivering power to a multitude of portable electronic devices is provided. More specifically, the system and methods provide for powering different portable electronic...
US20120016525 ENERGY FORECASTING AND MANAGEMENT DEVICE  
A system for forecasting demand energy associated with a swimming pool and a home's HVAC unit. The pool has a circulation pump motor and the system records fluctuation in daily ambient air...