Match Document Document Title
US20120042366 SECURE AND USABLE AUTHENTICATION FOR HEALTH CARE INFORMATION ACCESS  
Embodiments of the invention relate to providing a health care provider access to an electronic record of a patient may be provided. A determination is made as to whether the health care provider...
US20120004931 System and Method for Form Record Processing  
A method and system for providing a form record and for processing the same. For example, a medical record form in a clinical or hospital environment is provided based on user input and is...
US20130152193 METHOD FOR AUTHENTICATION WITH DYNAMIC AND RANDOM PASSWORDS  
An approach is provided for a method for authentication with dynamic and random passwords, which comprises acts of obtaining a code equation initially from a person through an register page of a...
US20150223891 MEDICAL CART ACCESS CONTROL  
Technology for controlling access to a portable medical cart is disclosed. A method comprises controlling the portable medical cart using a computing device. Security information can be...
US20120042378 Login system for a graphical user interface  
A user sets a design and uses that to get access to a resource. The design can include lines, and distances of lines, directions and locations. The design can require a user to select a color and...
US20130254875 System and Method for Risk Assessment of Login Transactions Through Password Analysis  
A system and method is provided for determining a risk associated with a login transaction. A password received during the login attempt and determination is made regarding whether the received...
US20140150090 CHALLENGE-RESPONSE METHODOLOGY FOR SECURING VEHICLE DIAGNOSTIC SERVICES  
A method for locally authenticating a vehicle diagnostic tool with a vehicle using a challenge-response authentication scheme includes: receiving a pairing request from the vehicle diagnostic...
US20150143510 SYSTEMS AND METHODS FOR NOTIFYING A USER OF A USER ENTRY THAT MATCHES SECURITY INFORMATION AND FOR HIDING DISPLAY OF A USER ENTRY THAT MATCHES SECURITY INFORMATION  
Systems and methods for notifying a user of a user entry that matches security information and for hiding display of a user entry that matches security information are disclosed. According to an...
US20120331549 SYSTEM AND METHOD FOR A LOG-IN PROCEDURE FOR NON-READERS  
A system and method for logging a non-reader into a corresponding user account is disclosed. A system can include a processor, a user interface, a display, and a camera. The processor can be...
US20140165169 METHOD AND SYSTEM FOR MANAGING USER LOGIN BEHAVIOR ON AN ELECTRONIC DEVICE FOR ENHANCED SECURITY  
Security is enhanced for a user of an electronic device by providing a method for managing user login behavior. When an entered password that is different from a defined password is received, the...
US20140283020 System For Binding An Accessory To A Smartphone Or Tablet PC Application  
This disclosure relates to software applications particularly for smart phone which are used to control or access hardware, particularly headsets. The software is available at no cost to anyone,...
US20140289842 SYSTEM AND METHOD FOR USER ENROLLMENT IN A SECURE BIOMETRIC VERIFICATION SYSTEM  
A computer-implemented method and system for verifying the identity of a user in an identity authentication and biometric verification system which includes collecting information from the user...
US20130239206 AUTHENTICATION USING PHYSICAL INTERACTION CHARACTERISTICS  
User physical interaction characteristics information or the way a user physically interacts with a device is analyzed to aid in authenticating a user of a device. User physical interaction...
US20150220224 SYSTEM AND METHOD FOR CURSOR-BASED APPLICATION MANAGEMENT  
A system and method of managing applications and event notifications using a cursor-based GUI, wherein the cursor-based GUI is located adjacent to the cursor and provides a user with the ability...
US20130198051 SYSTEM AND METHOD FOR CURSOR-BASED APPLICATION MANAGEMENT  
A system and method of managing applications and event notifications using a cursor-based. GUI, wherein the cursor-based GUI is located adjacent to the cursor and provides a user with the ability...
US20100318806 MULTI-FACTOR AUTHENTICATION WITH RECOVERY MECHANISMS  
A single sign on facility provides redundancy and recovery functions through the use of a plurality of identifiers. Users prove identity to relying parties by demonstrating control over each of...
US20120110662 User Indentification with Capacitive Touchscreen  
Disclosed herein are various embodiments of means and methods for verifying or authorizing one or more verified or authorized users to operate or use an electronic device containing a capacitive...
US20130340073 Identification to Access Portable Computing Device  
A portable computing device receives an identity card and restricts access to the portable computing device if the identity card is unassociated with the portable computing device. If access to...
US20130318597 COMPUTER IMPLEMENTED SECURITY METHOD AND SYSTEM  
A computer implemented security system (10) and method are disclosed. A user interface (20) is displayed on a display device (30), the user interface including a positioning guide (100) and a...
US20110173693 Assessment and analysis of software security flaws  
Security analysis and vulnerability testing results are “packaged” or “bound to” the actual software it describes. By linking the results to the software itself, downstream users of the software...
US20140068758 Method and System of Simulating a Pulse Generator on a Clinician Programmer  
The present disclosure involves a method of simulating a pulse generator on a portable electronic device. A graphical user interface is provided via a touch-sensitive screen of the portable...
US20130174251 METHODS AND SYSTEMS FOR SERVICE DELIVERY  
A system for providing a service comprising: a service provisioning control means adapted for identifying a user, and for providing services to said user; the system further comprising: a location...
US20120151575 APPARATUS AND METHOD FOR CERTIFICATING SECURITY IN PORTABLE TERMINAL  
Provided is an apparatus and method for certificating security in a portable terminal, which can enhance security in the portable terminal by multiple security certifications. An apparatus for...
US20140373132 GESTURE-BASED AUTHENTICATION WITHOUT RETAINED CREDENTIALING GESTURES  
This document describes techniques and apparatuses enabling gesture-based authentication without retained credentialing gestures. The techniques are capable of determining an identifier for a...
US20130074180 USER CERTIFICATION IN A STRUCTURE DESIGN, ANALYSIS, AND IMPLEMENTATION SYSTEM  
A computer-implemented subsystem and method is disclosed for receiving user qualification data, comparing that data to certification criteria, and providing user certification according thereto,...
US20090007256 Using a trusted entity to drive security decisions  
An arrangement is provided for programmatically responding to a privilege request on behalf of a user by pre-configuring a trusted entity with a list of processes requiring elevated user...
US20120054856 USER AND DEVICE AUTHENTICATION FOR MEDIA SERVICES  
A user obtains access to particular services levels associated with media content. A user and devices associated with the user may be authenticated to access content at a particular service level...
US20150067823 MOTION-BASED CREDENTIALS USING MAGNIFIED MOTION  
Systems and methods are provided which allow for motion-based authentication of a user using magnified motion. Very small or imperceptible motions of a user may be captured and magnified to...
US20120254956 Securely Managing Password Access to a Computer System  
A method, system or computer usable program product for providing initial access Lo the computer system in response to a user providing a first password, and upon detecting a condition meeting a...
US20150089635 SYSTEM FOR CORRELATION OF INDEPENDENT AUTHENTICATION MECHANISMS  
Described are devices, methods and non-transitory computer readable media for implementing an enhanced multi-factor authentication system. The system uses three user identifiers, and after a first...
US20130276100 METHOD AND APPARATUS FOR AUTHENTICATING PASSWORD  
Provided is a method and apparatus for authenticating a password, wherein the method includes: generating at least one input grid cell into which a password is input from among a plurality of grid...
US20150113635 APPARATUS AND METHOD FOR CONFIGURING PASSWORD AND FOR RELEASING LOCK  
Methods of configuring a different authority for a plurality of users to use at least one application in an electronic device. User inputs are received to set passwords for respective user levels,...
US20110088090 ENHANCEMENTS TO CLAIMS BASED DIGITAL IDENTITIES  
A system and method of identifying a user to a digital system is disclosed. The method includes receiving a request for a value of an identification claim of a digital identity from a relying...
US20110072511 SYSTEMS AND METHODS FOR SUPPORTING PRE-BOOT LOG IN  
In one embodiment, a system and method for supporting pre-boot log in pertain to receiving a password selected by a user for use in a pre-boot log in, determining whether the password can be...
US20110321157 SYSTEM AND METHOD FOR USER AUTHENTICATION  
A system and a related method are disclosed for authenticating a user of an electronic system. The system, and related method access (a) data relating to a defined interaction with an input device...
US20150213287 METHOD AND SYSTEM FOR MANAGING AND CONTROLLING DIRECT ACCESS OF AN ADMINISTRATOR TO A COMPUTER SYSTEM  
A method, computer program product, and computer system for managing and controlling direct access of an administrator to a computer system. An interceptor application resides on the computer...
US20150067828 INDUSTRIAL AUTOMATION AND CONTROL DEVICE USER ACCESS  
Solutions are disclosed for simplified user access to IEDs in industrial or utility operating environments such as those compatible with IEC 62351-8, having an LHMI with a restricted IED key set....
US20110113487 ICON CARD VERIFICATION SYSTEM  
An identity verification system uses a master key formed of first and second sets of symbols arranged in a one to one relationship. A distinct public key is assigned to each user of a plurality of...
US20150067824 WEARABLE USER DEVICE AUTHENTICATION SYSTEM  
Systems and methods for authenticating a user include a wearable user device receiving a first request to access a secure system. A plurality of authentication elements are then displayed on a...
US20130036462 Method and apparatus for using a multi-factor password or a dynamic password for enhanced security on a device  
Techniques for improving security on a device are disclosed. In an aspect, a multi-factor password comprising a plurality of factors may be used to improve security. Each factor may correspond to...
US20140223547 ALTERNATE GAME-LIKE MULTI-LEVEL AUTHENTICATION  
The disclosed embodiments provide a convenient way for users to access segregated work spaces on mobile devices. A game-like multi-level interactive approach is used to prompt users for input to...
US20120240223 PROCESS AND APPARATUS FOR AUTOMATICALLY IDENTIFYING USER OF CONSUMER ELECTRONICS  
A user of a device may be uniquely identified using a metric that is contingent upon the user using the device for its intended purpose without the user having to perform a separate step,...
US20150254448 Verifying Human Use of Electronic Systems  
Described herein are techniques related to verifying human use of electronic systems. This Abstract is submitted with the understanding that it will not be used to interpret or limit the scope and...
US20140283012 METHOD OF LOCKING AN APPLICATION ON A COMPUTING DEVICE  
A computer-implemented method entails steps of receiving user input signifying that an application on a computing device is to be locked and, in response to the user input, locking a user within...
US20140283013 METHOD AND APPARATUS FOR UNLOCKING A FEATURE USER PORTABLE WIRELESS ELECTRONIC COMMUNICATION DEVICE FEATURE UNLOCK  
Embodiments provide a method and apparatus for unlocking a feature of a user portable wireless electronic communication device. The user portable wireless electronic communication device can...
US20150220713 DYNAMIC ACCOUNT AUTHENTICATION USING A MOBILE DEVICE  
Providing dynamic authentication of a user requesting access to a system via a mobile device is disclosed. An account holder tailors a set of customized security challenges and responses. When a...
US20150205942 Password Authentication System And Password Authentication Method Using Consecutive Password Authentication  
Disclosed is a password authentication system and a password authentication method using continuous password authentication. In the password authentication system, a password is set using an...
US20120174215 CLIENT-SIDE CAPTCHA CEREMONY FOR USER VERIFICATION  
A facility for performing a local human verification ceremony to obtain user verification is provided. Upon determining that user verification is needed to perform an action on a computer system,...
US20140033301 MOBILE DEVICE AND PUPIL RECOGNITION METHOD  
A mobile device comprises a pupil information collecting module and a master control module, such that the pupil information collecting module may be used for collecting pupil characteristic...
US20140259154 DISPLAYING AN ICON BASED UPON USER INPUT  
Disclosed is an apparatus, system, and method for a computing device to display an icon based upon user input. The computing device may receive user input and generate an icon based upon a...