Match Document Document Title
US20120004931 System and Method for Form Record Processing  
A method and system for providing a form record and for processing the same. For example, a medical record form in a clinical or hospital environment is provided based on user input and is...
US20150261961 SCENARIO-BASED SECURITY METHOD AND SYSTEM  
A scenario-based security method and system are provided. The scenario-based security method includes a) establishing a correspondence table, the correspondence table records an account related to...
US20130145456 SYSTEM AND METHOD FOR AUTHENTICATING CODE EXECUTING ON COMPUTER SYSTEM  
A code authentication architecture is used to sign code by adding one or more digital signatures to it. The digital signatures identify what authority signed the code, what the code contains, what...
US20110264718 Virtual System Administration Environment For Non-Root User  
A virtual system environment in a computing system allows non-root users to perform administrative operations normally requiring root privileges. A virtual control module has a virtual file system...
US20100005522 Digital transmission system (DTS) for computer security  
This invention describes a hand held digital transmitter to transmit a signal as light (visible and invisible) or sound (audible and inaudible) or other digitized code for alphanumeric in any...
US20120095877 APPLICATION USAGE POLICY ENFORCEMENT  
Disclosed herein are systems, methods, and non-transitory computer-readable media for enforcing application usage policies. As part of an application purchase transaction, the application...
US20130167222 USING A CALL GATE TO PREVENT SECURE SANDBOX LEAKAGE  
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for enveloping a thread of execution within an IDT-based secure sandbox. In one aspect,...
US20130212674 SYSTEM AND METHOD FOR SIGNATURE PATHWAY AUTHENTICATION AND IDENTIFICATION  
A computer-implemented security system and method provides signature pathway authentication and identification. The system and method include establishing a user-defined cognitive signature...
US20120090021 Platform Specific Application Building  
Disclosed are new approaches for building an application for a specific platform. Source code files may be compiled to an intermediate module and transmitted to a build server along with metadata...
US20110078785 METHOD AND SYSTEM FOR SUPPORTING PORTABLE DESKTOP WITH ENHANCED FUNCTIONALITY  
A method is disclosed for a peripheral portable desktop device. The peripheral portable desktop device is coupled with a workstation. In a second mode of operation, a portion of the peripheral...
US20140283008 LOCKOUT-TAGOUT AND SAFETY COMPLIANCE SYSTEMS AND METHODS  
The present application discloses systems and methods for systems and methods of creating, administrating, assigning, and managing lockout-tagout (LOTO) procedures and other safety compliance...
US20130160108 EXTENSIBLE AND/OR DISTRIBUTED AUTHORIZATION SYSTEM AND/OR METHODS OF PROVIDING THE SAME  
In certain example embodiments, an extensible and/or distributed security system is provided. In certain example embodiments the security system provides authorization to a resource of a first...
US20150193612 MULTIPLE USER ACCOUNTS FOR MANAGING STORED INFORMATION IN AN IMPLANTABLE MEDICAL DEVICE SYSTEM  
Techniques for managing stored information in an implantable medical device system using multiple user accounts are described. An implantable medical device system may provide a general user...
US20110154444 METHOD AND APPARATUS FOR PROVIDING USER AUTHENTICATION BASED ON USER ACTIONS  
An approach is provided for authenticating using user actions. A prompt is initiated on a display for an input to authenticate a user. The input is received as a sequence of user actions on the...
US20090007256 Using a trusted entity to drive security decisions  
An arrangement is provided for programmatically responding to a privilege request on behalf of a user by pre-configuring a trusted entity with a list of processes requiring elevated user...
US20120079588 Methods, Systems, and Products for Identity Verification  
Methods, systems, and products verify identity of a person identification verification. A signature, representing the presence of a device, is acquired. The signature is compared to a reference...
US20120222109 PROVIDING A DECLARATION OF SECURITY REQUIREMENTS TO A SECURITY PROGRAM TO USE TO CONTROL APPLICATION OPERATIONS  
Provided are a computer program product, system, and method for providing a declaration of security requirements to a security program to use to control application operations. The application...
US20110055917 VALID ACCESS TO MOBILE DEVICE APPLICATION  
A method in a mobile device, for verifying valid access to at least one software application comprised in the mobile device. The mobile device comprises a unique hardware manufacturer identity...
US20150106871 SYSTEM AND METHOD FOR CONTROLLING ACCESS TO SECURITY ENGINE OF MOBILE TERMINAL  
Provided is a system for controlling access to a security engine of a mobile terminal including a basic operating system and a security engine in which an app ID and user authentication...
US20130061314 SECURE SOFTWARE INSTALLATION  
Embodiments of the present disclosure provide methods and systems for securely installing software on a computing device, such as a mobile device. In one embodiment, the device executes an...
US20130117840 USER-DRIVEN ACCESS CONTROL  
An access system is described herein which allows an application module to access a user-owned resource based on an indication of a user's intent to interact with the user-owned resource. For...
US20140208414 USE OF FREEFORM METADATA FOR ACCESS CONTROL  
Approaches are described for security and access control for computing resources. Various embodiments utilize metadata, e.g., tags that can be applied to one or more computing resources (e.g.,...
US20110209212 AUTHORIZATION SCHEME TO MINIMIZE THE USE OF UNAUTHORIZED MEDICAL DEVICE DISPOSABLES ON A MEDICAL DEVICE INSTRUMENT  
Systems, methods, apparatus, and computer readable media are provided for disposable component authentication with respect to a biological fluid processing device instrument. An example instrument...
US20140189850 MOBILE DEVICE SECURITY USING MULTIPLE PROFILES  
A mobile electronic device operates in accordance with at least two different application configurations. The device starts by operating in accordance with the first configuration after it...
US20140041017 LAW ENFORCEMENT AGENCY PORTAL  
Implementations of the present disclosure involve a system and/or method for providing account information for a telephone number. All users are authenticated to ensure they may access the account...
US20110119756 Method Of Managing Usage Of A Workstation And Desktop Management System Therefor  
Embodiments can disclose a method of managing usage of a workstation. The method can include: performing a desktop management sequence; performing a start-up sequence; displaying a login graphic...
US20120066315 VISUAL IDENTIFIERS AS LINKS TO ACCESS RESOURCES  
According to various embodiments, a user may wear or otherwise display a visual identifier that servers as a link to a resource. In various embodiments, a visual identifier may include an image...
US20150089633 SYSTEM AND METHOD FOR ASSET ASSIGNMENT AND REPLACEMENT  
A file cabinet drawer includes support rails supporting asset panels each with a plurality of asset positions to support respective assets and associated asset indicators. A controller activates...
US20150205943 MANIPULATION APPARATUS  
A remote manipulation apparatus includes a touch sensor and a manipulation control circuit to detect manipulation on a manipulation surface using a manipulator's finger. The touch sensor and the...
US20150101038 TERMINAL AND METHOD FOR CHECKING CALIBRATION HISTORY OF SCALE AND SYSTEM FOR MANAGING CALIBRATION HISTORY OF SCALE  
The present invention relates to a terminal for checking a calibration history of a scale, a system for managing a calibration history of a scale and a method of checking a calibration history of...
US20150128252 AUTHENTICATION CONTROL SYSTEM, AUTHENTICATION CONTROL METHOD, AND PROGRAM  
There is provided an authentication control system including an acquisition unit configured to acquire information detected by a sensor, an evaluation unit configured to evaluate suitability for...
US20100138913 MESSAGE ADMINISTRATION SYSTEM  
Methods and systems for message administration are described. In one embodiment, an application request for an application associated with an administration tool may be accessed. The application...
US20120278882 ACCESSORY DEVICE AUTHENTICATION  
An authentication controller coupled to a first communication port of a portable computing device is allowed to provide authentication on behalf of an accessory device coupled to a second...
US20120266234 Network Traffic Routing  
A service appliance is installed between production servers running service applications and service users. The production servers and their service applications provide services to the service...
US20130276097 USER AUTHENTICATION METHOD AND SYSTEM  
An electronic device includes a display, a fingerprint sensor, and a processing unit. The display invites a user for a first input fingerprint. The fingerprint sensor receives the first input...
US20150169882 SYSTEM AND METHOD FOR PROVIDING GRAPHICAL DYNAMIC USER AUTHENTICATION AND DEVICE ACCESS  
The technique relates to a system and method for providing graphical dynamic user authentication and device access. The method involves maintaining a database in an electronic device having...
US20140181954 SYSTEM FOR CONVEYING AN IDENTITY AND METHOD OF DOING THE SAME  
A system is configured to communicate an identity and perform a physical task. The system has an application controlled identity device is configured to receive and to store a user identity. An...
US20120240222 Methods and systems for preventing security breaches  
A security payload is attached to a received binary executable file. The security payload is adapted to intercept application programming interface (API) calls to system resources from the binary...
US20150261957 PROVISIONAL ADMINISTRATOR PRIVILEGES  
A system grants “provisional privileges” to a user request for the purpose of provisionally performing a requested transaction. If the provisionally-performed transaction does not put the system...
US20140109218 PROVISIONAL ADMINISTRATOR PRIVILEGES  
A system grants “provisional privileges” to a user request for the purpose of provisionally performing a requested transaction. If the provisionally-performed transaction does not put the system...
US20120240221 PROVISIONAL ADMINISTRATOR PRIVILEGES  
A system grants “provisional privileges” to a user request for the purpose of provisionally performing a requested transaction. If the provisionally-performed transaction does not put the system...
US20140223546 ACCESS CONTROL SYSTEM AND METHOD WITH GPS LOCATION VALIDATION  
An access control system and method with location validation are provided. The method can include receiving a request from an authentication factor, identifying a location module associated with...
US20150235031 PORTABLE DESKTOP DEVICE AND METHOD OF HOST COMPUTER SYSTEM HARDWARE RECOGNITION AND CONFIGURATION  
A portable desktop device and method for host computer system hardware recognition and configuration are provided. The portable desktop device causes on a first boot, the host computer system to...
US20150020191 METHOD AND SYSTEM FOR DYNAMICALLY ASSIGNABLE USER INTERFACE  
With their ubiquitous nature and perceived personalized character portable electronic devices are increasingly forming part of individual's life as applications exist for practically anything...
US20130007873 SYSTEMS AND METHODS FOR POWER-ON USER AUTHENTICATION  
Embodiments of systems and methods for power-on user authentication are disclosed. A method for power-on user authentication may comprise receiving an authentication input with a security...
US20140096234 INTELLIGENT TASK ASSIGNMENT AND AUTHORIZATION SYSTEMS & METHODS  
The present disclosure relates to computer-implemented methods and systems for intelligent task management. An example method may include identifying one or more authorized entities. The method...
US20140331314 Time and Sleep Control System and Method  
A time and sleep control system and method is disclosed. According to one embodiment, a computer-implemented method includes providing a first user interface on a computing device that provides...
US20140250306 DECISION SERVICE MANAGER  
A decision service manager authenticating at a managed system hosting a decision service, in case of a successful authentication, the decision service manager sending a first status request to the...
US20120260332 PROVIDING NOTICE OF PATENT AND OTHER LEGAL RIGHTS  
A system for providing notice of legal rights corresponding to a computing device includes presenting a notice to the user through an I/O interface. The notice is in response to an attempt by a...
US20140189852 METHOD FOR EXECUTING AN APPLICATION IN A RESTRICTED OPERATING ENVIRONMENT  
A user is presented with one or more user-level permissions in a human understandable language, where the one or more user-level permissions represent one or more application-level permissions...