Match Document Document Title
US20110314515 INTEGRATED PHYSICAL AND LOGICAL SECURITY MANAGEMENT VIA A PORTABLE DEVICE  
Integrated physical and logical security management is extended to a mobile device, such as a portable wireless device or radio The Mobile-IMPACT solution extends the reach of authonzed users to...
US20100162355 TRANSCRIPTION DATA SECURITY  
A computer program product for use with dictated medical patient information resides on a computer-readable medium and comprises computer-readable instructions for causing a computer to analyze...
US20100162354 TRANSCRIPTION DATA SECURITY  
A computer program product for use with dictated medical patient information resides on a computer-readable medium and comprises computer-readable instructions for causing a computer to analyze...
US20140047505 Automated Entity Verification  
Some embodiments provide a verification system for automated verification of entities. The verification system automatedly verifies entities using a two part verification campaign. One part...
US20110067086 Using Metadata In Security Tokens to Prevent Coordinated Gaming In A Reputation System  
To prevent gaming of a reputation system, a security token is generated for a security module using metadata about the client observed during the registration of the security module. The...
US20140020056 INTEGRATED PHYSICAL ACCESS CONTROL AND INFORMATION TECHNOLOGY (IT) SECURITY  
Embodiments described herein provide security for a user integrated technology (IT) account by integrating a facility's physical access controls with its IT security system to provide...
US20130276058 DOCUMENT VERIFICATION WITH DISTRIBUTED CALENDAR INFRASTRUCTURE  
Transformations of digital records are used as lowest level inputs to a tree data structure having a root in a core system and having nodes computed as digital combinations of child node values. A...
US20120233658 GENERATING LOG WITH LOCATION AND ACCELEROMETER HISTORY  
A method and system for generating a log with location and accelerometer history and verifying the authenticity of the user based on the log. A stroke and capture module captures stroke data from...
US20150007262 SECURE EXECUTION AND UPDATE OF APPLICATION MODULE CODE  
A dynamic root of trust can be injected in an application module on a client device using a backend server and can be continuously monitored to ensure authenticity, integrity and confidentiality...
US20100313196 MANAGING SECURELY INSTALLED APPLICATIONS  
Embodiments of the present disclosure provide methods and systems for managing securely installed applications. After installation, an installation framework performs a bind process to correlate...
US20130347063 HANDLING CLAIMS TRAVERSING SECURITY BOUNDARIES  
Sharing security claims across different security contexts. A method includes, for a first security context, identifying a first set of security claims. The method further includes for the first...
US20110239272 NON-NUMERIC PERSONAL IDENTIFICATION  
Various methods and systems are provided for allowing a user to select a non-numeric PIN or password and use that to access content instead of a conventional numerical PIN. A series of visual,...
US20150040185 VISUALIZATION OF ACCESS PERMISSION STATUS  
Queries regarding access permissions of users and rights to directories in a complex enterprise are executed in near real-time, using lookups to tables that form a condensed database maintained...
US20120167171 Voice-capable system and method for authentication query recall and reuse prevention  
A system and method for use with a voice-capable system, includes but is not limited to a method including receiving an authentication request by the voice-capable system from a user...
US20130117813 KILL SWITCH SECURITY METHOD AND SYSTEM  
The present invention provides, in at least one embodiment, a system and method to bolster website and mobile authentication providing an additional security layer for access to password protected...
US20050028008 System for accessing digital assets  
A system for accessing digital assets. The system includes an access control mechanism that permits specification of one of a number of kinds of access by a particular user to a particular asset....
US20140289796 RECONCILIATION OF ACCESS RIGHTS IN A COMPUTING SYSTEM  
Systems and methods are provide for reconciling access rights of a computing system are described. Access right information that respectively corresponds to access rights of a computing system may...
US20110154436 Provider Management Methods and Systems for a Portable Device Running Android Platform  
A provider management method conforming to an Android platform is provided. An authentication procedure is performed between a consumer and a provider, wherein the authentication procedure is...
US20120054741 USER AUTHENTICATION VIRTUAL MACHINE  
A computer system includes an authentication service running in a virtual machine. The authentication service uses the hardware components of the computer system in performing a user...
US20120204223 SYSTEM FOR MANAGING DIGITAL INTERACTIONS  
A system for managing digital interactions comprising an identity module for creating an identity, wherein the identity includes a unique identifier associated with a first party and a plurality...
US20130160078 USER AUTHENTICATION APPARATUS AND METHOD THEREOF  
A user authentication apparatus includes an information collection unit which collects user information from a plurality of personal devices of a user within a predetermined distance, and a...
US20120096516 Software Signing Certificate Reputation Model  
A request from a software developer is received to digitally sign software included in the request. A security policy associated with the software developer is accessed where the security policy...
US20120198518 OBSERVABLE MOMENT ENCRYPTION  
A method, system and apparatus for encrypting a consumer identification number contained in a portable consumer device by gradually changing a consumer identification number when an observable...
US20110179465 APPARATUS, AND AN ASSOCIATED METHOD, FOR FACILITATING SECURE OPERATIONS OF A WIRELESS DEVICE  
An apparatus, and an associated method, facilitates security at a wireless device, such as a wireless device comprising a mobile computing platform. A security decision engine is provided that...
US20080130898 Identifiers in a communication system  
A method and apparatus including units configured to send a request from a first network entity to a user equipment for an identifier and receive a message indicating that a public key is required...
US20130205359 Policy and compliance management for user provisioning systems  
A user provisioning system is extended to enable account reconciliation to occur in conjunction with a provisioning request. In response to a user provisioning request, a determination is made...
US20140282863 Document Verification With Distributed Calendar Infrastructure  
Transformations of digital records are used as lowest level inputs to a tree data structure having a root in a core system and having nodes computed as digital combinations of child node values....
US20140259103 ACCESS CONTROL, ESTABLISHING TRUST IN A WIRELESS NETWORK  
A wireless access point provides a subscriber access to use of a core network. Several techniques are implemented to build trust that the subscriber is connected with and using a safe wireless...
US20120042356 MANAGEMENT DEVICE OF EMISSION AMOUNT OR REDUCTION AMOUNT OF GREENHOUSE GASES, AND MANAGEMENT METHOD  
A management device of the emission amount or reduction amount of greenhouse gases including: a communication unit that performs communication with an IC card on which an ID and history...
US20130185764 FILE SYSTEM ACCESS FOR ONE OR MORE SANDBOXED APPLICATIONS  
Methods, systems, and machine-readable storage medium are described wherein, in one embodiment, identifiers, such as bookmarks, are used to allow access to files or folders in a sandboxed...
US20120117618 METHOD FOR CALIBRATING A TEMPERATURE FLOAT OF A ONE TIME PASSWORD TOKEN AND A ONE TIME PASSWORD TOKEN THEREOF  
A method for calibrating a temperature float of a one time password token and a device thereof are provided in the invention relating to the information security field. The method includes steps:...
US20140157363 METHODS AND SYSTEMS FOR SECURE STORAGE SEGMENTATION BASED ON SECURITY CONTEXT IN A VIRTUAL ENVIRONMENT  
A computer system identifies a request to place a workload in a hypervisor-based host. The computer system identifies a security level of the workload. The computer system identifies a security...
US20130332992 METHODS AND SYSTEMS FOR IDENTIFYING A TRUSTABLE WORKFLOW BASED ON A COMPREHENSIVE TRUST MODEL  
Methods and systems for identifying a trustable workflow based on a comprehensive trust model. One or more trustable links between two or more abstract services among a number of combinations of...
US20130152194 SYSTEM, METHOD AND SOFTWARE FOR CONTROLLING ACCESS TO VIRTUAL MACHINE CONSOLES  
A system and method for controlling access to virtual machine consoles. The system includes a console access controller configured to register an owner to a virtual machine to open a defined limit...
US20140317679 SYSTEM AND METHOD FOR CREATING SECURE APPLICATIONS  
A method for generating a secure application is described herein. The method can include the steps of obtaining a target application and decomposing the target application into original files that...
US20100299674 METHOD, SYSTEM, GATEWAY DEVICE AND AUTHENTICATION SERVER FOR ALLOCATING MULTI-SERVICE RESOURCES  
In the field of network communications, a method, a system, a gateway device, and an authentication server for allocating multi-service resources while multiple services of a same user access to a...
US20110258698 Tailored System Management Interface  
Processes and techniques for tailoring operations management in a system are described. The processes and techniques allow a user to customize operations management based on the user's function...
US20140325593 USER SECURITY COMPARISON AND REVERSION  
A web interface may generate reports regarding changes in user security parameters in a computer network. The report may ease administrator's duties analyzing log files to determine the...
US20120060030 SYSTEM AND METHOD OF PROVIDING TRUSTED, SECURE, AND VERIFIABLE OPERATING ENVIRONMENT  
A method and system of synergizing hardware, firmware, software, and useful feature(s) into a trusted, secure, and verifiable operating environment (TSVOE) that is critical for businesses and...
US20120054829 HOST USABILITY AND SECURITY VIA AN ISOLATED ENVIRONMENT  
Architecture that addresses security concerns while still providing transparent user experience with ability to perform tasks. When a user machine is considered incompliant or compromised due to,...
US20150074757 Certisafe, a novel Credential Authentication Process and System ( CAPS )  
Certisafe is a novel Credential Authentication Process and System (CAPS), where a CertiSafe ID is generated once and only once the Issuer confirms the Authenticity of the Credential of a...
US20150135280 Managing Social Network Accessibility Based on Age  
When a user having an age less than a threshold age (a child user) attempts to access an online service or perform actions using the online service, the online service obtains parental...
US20110214158 WIRELESS COMMUNICATIONS SYSTEM PROVIDING MOBILE DEVICE AUTHENTICATION BYPASS BASED UPON USER-WEARABLE SECURITY DEVICE AND RELATED METHODS  
A wireless communications system may include a user-wearable device including a clasp having open and closed positions, a first wireless security circuit (WSC), and a first controller coupled to...
US20150121455 Methods and Systems for Selectively Obtaining End User Authentication Before Delivering Communications  
Methods of operating a communications service are provided in which a communication that is addressed to a user of a communication service is received. A determination is made that end user...
US20140325594 Methods and Systems for Secured Authentication of Applications on a Network  
A secured communication network can include a server including an authentication backend, the authentication backend configured to communicate with an authentication front end of a communication...
US20120117619 SECURE NETWORK CONNECTION ALLOWING CHOICE OF A SUITABLE SECURITY ALGORITHM  
The invention provides for a method for use in a mobile radio communications device network connection procedure and including the step of, at a network, sending to a mobile radio communications...
US20130166917 AUTHENTICATED CHECKIN VIA PASSIVE NFC  
The present disclosure involves a method of verifying user check-ins to a venue. The method includes initializing a digital check-in chain for a venue. The method includes expanding,...
US20060200855 Electronic verification systems  
A verification system which can be used over electronic networks, such as the Internet, to help prevent phishing, electronic identity theft, and similar illicit activities, by verifying the...
US20140040982 Functionality Watermarking and Management  
A method, system and non-transitory computer-readable medium product are provided for functionality watermarking and management. In the context of a method, a method is provided that includes...
US20130055302 TRUSTED CONTENT ACCESS MANAGEMENT USING MULTIPLE SOCIAL GRAPHS ACROSS HETEROGENEOUS NETWORKS  
A method, system, and computer readable storage device (that stores the method) extract connectivity information from multiple telecommunication services, provided by a single multiple service...