Matches 1 - 50 out of 443 1 2 3 4 5 6 7 8 9 >


Match Document Document Title
US20120042366 SECURE AND USABLE AUTHENTICATION FOR HEALTH CARE INFORMATION ACCESS  
Embodiments of the invention relate to providing a health care provider access to an electronic record of a patient may be provided. A determination is made as to whether the health care provider...
US20120192264 PRINTER CAPABLE OF AUTHENTICATING USER, PRINT MANAGEMENT SYSTEM INCLUDING THE PRINTER AND COMPUTER READABLE DEVICE STORING USER AUTHENTICATION PROGRAM  
In a printing apparatus, a controller authenticates a user with using first authentication information, and printing is allowed according to successful authentication using the first...
US20140215601 AUTHENTICATION USING A SUBSET OF A USER-KNOWN CODE SEQUENCE  
Authentication in a system includes presenting information to a user containing a partial sequence of a passcode along with distractors. The user is challenged to identify the partial sequence...
US20150261961 SCENARIO-BASED SECURITY METHOD AND SYSTEM  
A scenario-based security method and system are provided. The scenario-based security method includes a) establishing a correspondence table, the correspondence table records an account related to...
US20140173713 Verification Code Generation and Verification Method and Apparatus  
The present invention discloses a verification code generation and verification method, including: displaying a verification code display region on a touch display module, where the verification...
US20140013415 AUTOMATIC GENERATION OF SECURITY CHECKS  
The embodiments encompass an apparatus for generating security checks including a model editor configured to annotate at least one element in an architectural source model with security...
US20150220224 SYSTEM AND METHOD FOR CURSOR-BASED APPLICATION MANAGEMENT  
A system and method of managing applications and event notifications using a cursor-based GUI, wherein the cursor-based GUI is located adjacent to the cursor and provides a user with the ability...
US20150082420 Security Certificates For System-On-Chip Security  
A SoC includes multiple hardware modules that are implemented on a substrate. The hardware modules include a plurality of hardware and software security features and the SoC provides one or more...
US20120151575 APPARATUS AND METHOD FOR CERTIFICATING SECURITY IN PORTABLE TERMINAL  
Provided is an apparatus and method for certificating security in a portable terminal, which can enhance security in the portable terminal by multiple security certifications. An apparatus for...
US20120054856 USER AND DEVICE AUTHENTICATION FOR MEDIA SERVICES  
A user obtains access to particular services levels associated with media content. A user and devices associated with the user may be authenticated to access content at a particular service level...
US20130185787 Safely Executing an Untrusted Native Code Module on a Computing Device  
A system that safely executes a native code module on a computing device. During operation, the system receives the native code module, which is comprised of untrusted native program code...
US20120222109 PROVIDING A DECLARATION OF SECURITY REQUIREMENTS TO A SECURITY PROGRAM TO USE TO CONTROL APPLICATION OPERATIONS  
Provided are a computer program product, system, and method for providing a declaration of security requirements to a security program to use to control application operations. The application...
US20130326611 VARIABLE-STRENGTH SECURITY BASED ON TIME AND/OR NUMBER OF PARTIAL PASSWORD UNLOCKS  
An authentication scheme for unlocking a computing system may require a shortened password in some cases. For example, the computing system may be configured to determine a time that a user has...
US20140259151 ARRANGEMENTS FOR IDENTIFYING USERS IN A MULTI-TOUCH SURFACE ENVIRONMENT  
Arrangements to identify, in some form, multiple participants by an interactive surface system utilizing multi-touch technology are disclosed. The interactive surface system could identify,...
US20150106871 SYSTEM AND METHOD FOR CONTROLLING ACCESS TO SECURITY ENGINE OF MOBILE TERMINAL  
Provided is a system for controlling access to a security engine of a mobile terminal including a basic operating system and a security engine in which an app ID and user authentication...
US20140325638 COMPUTING DEVICE SECURITY  
Techniques for providing security for a computing device are described herein. In one example, a maintenance issue for the computing device is detected. Additionally: a maintenance credential...
US20130167220 Secure Operation of Transitory Computer Applications  
A security application is described for determining conditions within a computer application that would create the desire to allow or disallow access to certain system functions or features by the...
US20140090050 SYSTEMS AND METHODS FOR IDENTIFYING UNAUTHORIZED USERS OF AN ELECTRONIC DEVICE  
This is generally directed to identifying unauthorized users of an electronic device. In some embodiments, an unauthorized user of the electronic device can be detected by identifying particular...
US20140283012 METHOD OF LOCKING AN APPLICATION ON A COMPUTING DEVICE  
A computer-implemented method entails steps of receiving user input signifying that an application on a computing device is to be locked and, in response to the user input, locking a user within...
US20100313028 Electronic Signature Method and Electronic Signature Tool  
The present invention provides an electronic signature method and an electronic signature tool. The method includes: outputting verification prompt information; receiving verification confirmation...
US20120210419 SECURITY MANAGEMENT FOR AN INTEGRATED CONSOLE FOR APPLICATIONS ASSOCIATED WITH MULTIPLE USER REGISTRIES  
A system for security management for applications associated with multiple user registries can include an integrated console configured to host a one or more applications or resource objects in...
US20120278882 ACCESSORY DEVICE AUTHENTICATION  
An authentication controller coupled to a first communication port of a portable computing device is allowed to provide authentication on behalf of an accessory device coupled to a second...
US20120246714 Dynamic Password Strength Dependent On System State  
An approach is provided by detecting password entries by a user of a system with each of the password entries corresponding to a password entered when invoking a password enabled application on...
US20140250521 RULE BASED ACCESS FOR REMOVABLE STORAGE  
Various techniques and solutions are described for rule-based access to removable storage devices. For example, a request can be received to perform a file system operation using a removable...
US20140245429 VISUALLY REPRESENTING AND MANAGING ACCESS CONTROL OF RESOURCES  
An approach is provided for controlling access to a resource. Visual representations of the resource and an entity are included in a display. A movement in the display of the entity representation...
US20140013417 GESTURE INPUT DEVICE AND METHOD FOR CONTROLLING GESTURE INPUT DEVICE  
A gesture input device that controls a control device on the basis of a gesture action of a user has a gesture detecting unit that detects a gesture from an image picked up by a camera, a first...
US20080083027 Document Editing Environment that Varies Based Upon Security Level of User Who Performs the Editing  
A document editing environment is provided that varies based on the type of user. One of a plurality of different types of security levels are assigned to different users who edit documents. A...
US20110167187 CONNECTORS IN A PORTABLE DEVICE  
Circuits, methods, and apparatus that allow a portable electronic device to be placed in a second electronic device in more than one orientation. One example allows a portable computing device to...
US20150113632 IDENTITY AUTHENTICATION SYSTEM  
According to one embodiment, an identity authentication system includes a detecting unit that detects an identity theft by determining whether a photographing target is a living body or a...
US20120030752 Computer keyboard with ultrasonic user proximity sensor  
A terminal for a computer system includes a keyboard incorporating modules for performing two factor authentication (TFA) for log-on of a user. TFA preferably combines a fingerprint scan with the...
US20110154479 IMAGE FORMING APPARATUS AND IMAGE FORMING METHOD  
According to one embodiment, an image forming apparatus includes, a log authentication information acquiring unit configured to acquire log authentication information indicating whether or not to...
US20130198833 SECURELY EXECUTING AN APPLICATION ON A COMPUTER SYSTEM  
A method of and system for securely executing an application on a computer system such that a user of the computer system cannot access or view unauthorized content available on the computer...
US20140317415 MULTI-TOUCH METHODS AND DEVICES  
The present disclosure relates to a multi-touch method, configured to a touch panel. The method comprises: applying a first object to touch a first image on the touch panel for inputting a first...
US20140075545 SECURELY EXECUTING AN APPLICATION ON A COMPUTER SYSTEM  
A method of and system for securely executing an application on a computer system such that a user of the computer system cannot access or view unauthorized content available on the computer...
US20150186631 COMPUTER KEYBOARD WITH ARTICULATED ULTRASONIC USER PROXIMITY SENSOR  
A computer keyboard supports an ultrasonic user presence detector (UPD) that is rotatable and supported on the upper surface of the keyboard, adjacent to the uppermost row of keys and located...
US20130103943 DISPLAYING PRIVATE INFORMATION USING ALTERNATE FRAME SEQUENCING  
Private information can be displayed using alternate frame sequencing to prevent unauthorized viewing. The private information can be ascertained by an authorized user using an active shutter...
US20140366123 Wearable Device Multi-mode System  
Systems and techniques are disclosed for detecting whether a wearable computing device is worn by a user or not. The detection can be made based on whether the device is secured to a user or based...
US20140150084 USER AUTHENTICATION APPARATUS OF PORTABLE TERMINAL  
A user authentication apparatus safely uses resources by forming a communication channel between a plurality of execution environments through user authentication in a portable terminal providing...
US20110047613 SYSTEMS AND METHODS FOR PROVIDING AN ISOLATED EXECUTION ENVIRONMENT FOR ACCESSING UNTRUSTED CONTENT  
A sandbox tool can cooperate with components of a secure operating system to create an isolated execution environment for accessing untrusted content without exposing other processes and resources...
US20140041015 Systems and Methods of Exchanging Information for a Reward  
Systems and methods for exchanging information for access to a computing resource are provided herein. Methods may include receiving a request to access a computing resource, the computing...
US20120246476 MULTI-APPLICATION SMART CARD, AND SYSTEM AND METHOD FOR MULTI-APPLICATION MANAGEMENT OF SMART CARD  
A multi-application smart card and a multi-application management system and method for the smart card are provided. The multi-application smart card comprises a management device for the...
US20130283367 METHOD OF MANAGING VIRTUAL COMPUTER, COMPUTER SYSTEM AND COMPUTER  
A method of managing a virtual computer in a computer system including a plurality of computers, each of the computer storing a program for realizing a virtualization management module for...
US20110113485 CREDENTIAL DEVICE PAIRING  
In one or more implementations, a computing device receives an indication that a device is attempting to pair with the computing device. If a user is not currently authenticated with respect to...
US20130326612 Apparatus and Method for Forming Secure Computational Resources  
A computer implemented method includes collecting logged operations associated with a computation resource. Permitted operations for the computation resource are inferred based at least in part on...
US20120304280 PRIVATE AND PUBLIC APPLICATIONS  
Designating applications for public access or private access on a computing device is disclosed. An application on the computing device is designated for private functionality or public...
US20150242645 Incentive-Based App Execution  
Systems and methods of a personal daemon, executing as a background process on a mobile computing device, for providing personal assistant to an associated user is presented. Also executing on the...
US20140259148 APPLICATION FORENSICS  
Disclosed herein are systems, methods, and software for facilitating application forensics. In least one implementation, the identity of a user associated with an attempt to access an application...
US20110093939 RESOURCE ACCESS BASED ON MULTIPLE CREDENTIALS  
A collection of multiple user credentials each associated with one of multiple different users is obtained at a device, and one or more of the multiple user credentials are verified. The...
US20140304806 SECURITY MEDIA AND AUTHENTICATION SYSTEM INCLUDING THE SAME  
Disclosed is a security media which can increase a user's convenience without needing for the user to directly input a security code to a touch screen. The security media includes a plate and a...
US20090190805 SYSTEM AND METHOD FOR FINGERPRINT RECOGNITION  
A fingerprint recognition system for an electronic device includes an input module, a computational module, and a database. The input module receives initial and subsequent fingerprint templates,...

Matches 1 - 50 out of 443 1 2 3 4 5 6 7 8 9 >