Matches 1 - 50 out of 398 1 2 3 4 5 6 7 8 >


Match Document Document Title
US20150178510 METHOD AND SYSTEM FOR CHILD AUTHENTICATION  
Methods and systems for child authentication are described. In one embodiment, a communication enablement request may be received to enable electronic communications between a first child and a...
US20110035799 METHOD AND SYSTEM FOR CHILD AUTHENTICATION  
Methods and systems for child authentication are described. In one embodiment, a communication enablement request may be received to enable electronic communications between a first child and a...
US20140215604 AUTOMATED ROLE ADJUSTMENT IN A COMPUTER SYSTEM  
An embodiment of the invention is associated with a system having a role for controlling user access, the role comprising users, permissions, and a set of rules. The embodiment records each of a...
US20140215603 AUTOMATED ROLE ADJUSTMENT IN A COMPUTER SYSTEM  
An embodiment of the invention is associated with a system having a role for controlling user access, the role comprising users, permissions, and a set of rules. The embodiment records each of a...
US20140150093 ELECTRONIC MODULE FOR MAKING A MESSAGE ACCESSIBLE TO A TARGETED OPERATING SYSTEM  
An electronic module that includes means for determining an operating system targeted by a message received by a transmitter-receiver of an electronic device, from among at least a Rich-OS...
US20130031624 APPLICANT SCREENING  
A system of screening servers, screener client computers, and screening kiosks distribute an applicant screening process among multiple sites and multiple participants. To facilitate and secure...
US20110055919 System and Method for the Designation of Items in a Virtual Universe  
The present invention enables items in a Virtual Universe to be tagged as available for pickup by one or more designated users. The present invention permits a designated user to be alerted that...
US20120240224 SECURITY SYSTEMS AND METHODS FOR DISTINGUISHING USER-INTENDED TRAFFIC FROM MALICIOUS TRAFFIC  
Security systems and methods distinguish user-intended input hardware events from malicious input hardware events, thereby blocking resulting malicious output hardware events, such as, for...
US20100031351 Security-activated production device  
Methods and systems for a security-activated production device include but are not limited to obtaining access to an object data file configured to produce one or more objects on the production...
US20110215921 SYSTEMS FOR WIRELESS AUTHENTICATION BASED ON BLUETOOTH PROXIMITY  
A method and apparatus for wireless authentication, secure automatic access to application and to systems and for providing an alarm to users upon detecting that a monitored device is not within a...
US20110138461 EXECUTION ENVIRONMENT FILE INVENTORY  
A method is described to maintain (including generate) an inventory of a system of a plurality of containers accessible by a computer system. At least one container is considered to determine...
US20120047575 SYSTEMS AND METHODS FOR PERFORMING ACCESS ENTITLEMENT REVIEWS  
Embodiments of the invention relate to risk assessments and, more particularly to performing access risk assessments based on identified outliers.
US20100319068 METHOD AND SYSTEM FOR PERFORMING DELEGATION OF RESOURCES  
A method for performing delegation of resources, in particular services, wherein a user—resource owner—has access to a resource offered by a service provider and wherein the resource is delegated...
US20120030756 User Permissions In Computing Systems  
A system and method of verifying accuracy of permission and access levels in a mainframe system are presented. The system and method may include receiving a plurality of records including a user...
US20110055918 ACCESS CONTROL MODEL OF FUNCTION PRIVILEGES FOR ENTERPRISE-WIDE APPLICATIONS  
Techniques are provided for access control in a system. A request is received for checking whether a subject has a privilege for a resource. A security class that defines a plurality of privileges...
US20110004934 Computer Access Educational Tools System  
Computers are currently often used for entertainment when they have been primarily provided to the user—often a child—primarily for education or work use. This invention aims to build in a gateway...
US20130007878 CENTRALIZED LICENSING SERVICES  
Methods and devices are provided for central management of licenses, particularly those relating to wagering games. A license proxy deployed in and/or dedicated to a gaming establishment may...
US20100325724 SCOPE MODEL FOR ROLE-BASED ACCESS CONTROL ADMINISTRATION  
Architecture that provides centrally located role-based administration where role assignments that are used to calculate scopes for each operation and create a filtered request that only returns...
US20120246718 Method and System for Implementing Collaboration and Crowd-Sourced Distribution on a Content Management System  
Systems and methods are provided for delegating permissions of a content provider for a content item to a delegate. In a graphical interface, a content selection input is configured to receive a...
US20130247177 APPARATUS AND METHOD OF CONTROLLING PERMISSION TO APPLICATIONS IN A PORTABLE TERMINAL  
An apparatus and method of controlling permission to an application in a portable terminal, the apparatus including a controller for, when requested for an invocation of a specific function...
US20100088760 DEBUG SECURITY LOGIC  
A system comprises debug logic usable to debug the system. The system also comprises processing logic capable of accessing the debug module using electronic signals. The system further comprises...
US20110138460 SYSTEM AND METHOD FOR LOADING APPLICATION CLASSES  
In an application, variants of a class may be generated and associated with different security permissions for the application. When a class is to be loaded, a determination is made as to the...
US20110072513 PROVISIONAL ADMINISTRATOR PRIVILEGES  
A system grants “provisional privileges” to a user request for the purpose of provisionally performing a requested transaction. If the provisionally-performed transaction does not put the system...
US20130152194 SYSTEM, METHOD AND SOFTWARE FOR CONTROLLING ACCESS TO VIRTUAL MACHINE CONSOLES  
A system and method for controlling access to virtual machine consoles. The system includes a console access controller configured to register an owner to a virtual machine to open a defined limit...
US20110258698 Tailored System Management Interface  
Processes and techniques for tailoring operations management in a system are described. The processes and techniques allow a user to customize operations management based on the user's function...
US20110061102 License management server, license management method, and computer program product  
A license management server connected to an MFP includes an activating unit that, upon receiving an application activation request from the MFP, accesses a license management DB, and, when the...
US20110296523 ACCESS CONTROL MANAGEMENT MAPPING RESOURCE/ACTION PAIRS TO PRINCIPALS  
The access control management technique described herein manages access control to one or more resources. Rather than mapping individuals or groups to permissions, the technique maps each...
US20150089637 System, Method and Apparatus for Simultaneous Definition and Enforcement of Access-control and Integrity Policies  
Access-control and information-flow integrity policies are enforced in a computing system by detecting security-sensitive sinks in software code for an application running on the computing system...
US20110126282 System, Method and Apparatus for Simultaneous Definition and Enforcement of Access-control and Integrity Policies  
Access-control and information-flow integrity policies are enforced in a computing system by detecting security-sensitive sinks in software code for an application running on the computing system...
US20100030982 BACKING UP DIGITAL CONTENT THAT IS STORED IN A SECURED STORAGE DEVICE  
A third party facilitates preparation of a backup SSD for backing up a source SSD. Digital data of the source SSD, which includes protected and sensitive data and information, is copied to the...
US20110078046 ENHANCED SUPPLIER CATALOG COLLABORATION  
One embodiment of the invention includes a computer-implemented method for supplier update of a procurement system. The method includes providing a customizable procurement entity to a supplier,...
US20110016510 SECRET INFORMATION MANAGEMENT APPARATUS, INFORMATION PROCESSING APPARATUS, AND SECRET INFORMATION MANAGEMENT SYSTEM  
Secret key backup is safely implemented even if a role base access structure in which the access structure is specified using roles is used. An all combination generating unit 107 obtains a backup...
US20130014252 PORTABLE COMPUTER ACCOUNTS  
User accounts, authentication information and user home directories are stored on an external storage media that can be transferred from one device to another. Measures are included for detecting...
US20110072512 APPARATUS AND METHOD FOR PROVIDING COMMUNICATION SERVICE USING COMMON AUTHENTICATION  
In an environment including a first service providing system and a second service providing system, the first service providing system forwards common authentication information received from a...
US20140082723 ACCESS CONTROL TO OPERATING MODULES OF AN OPERATING UNIT  
The invention relates to an operating unit (1) for a production plant (2). The operating unit (1) comprises an authorization receiving module (71) so as to receive authorization identifications...
US20110276604 REPUTATION BASED ACCESS CONTROL  
The reputation based access control system of the present invention allows or denies access to a requested controlled resource to a requesting subject based upon predetermined associations between...
US20130247176 NON-TRANSITORY COMPUTER READABLE MEDIUM STORING ACCESS RIGHTS UPDATE PROGRAM, ACCESS RIGHTS MANAGEMENT SYSTEM, AND ACCESS RIGHTS UPDATE METHOD  
Provided is a non-transitory computer readable medium storing an access rights update program causing a computer to be executed as: an acquisition unit that acquires access rights update...
US20070061881 Verifying identities  
A sign is sent to a user of a system. Depending upon whether there is an indication received that the sign went to an address that is not associated with the user a level of authenticity is...
US20120167158 SCOPED RESOURCE AUTHORIZATION POLICIES  
Resource authorization policies and resource scopes may be defined separately, thereby decoupling a set of authorization rules from the scope of resources to which those rules apply. In one...
US20140208419 User Authentication  
Disclosed is a method for providing a user access to a computer system comprising a plurality of services and a plurality of authentication levels, the method comprising dynamically monitoring a...
US20150101042 TAG BASED PERMISSION SYSTEM AND METHOD FOR VIRTUALIZED ENVIRONMENTS  
A virtualized computing system includes a plurality of inventory objects and an access control subsystem that manages permissions to perform actions on the inventory objects using corresponding...
US20140331316 Functionality Watermarking and Management  
A method, system and non-transitory computer-readable medium product are provided for functionality watermarking and management. In the context of a method, a method is provided that includes...
US20140289846 FACILITATING REVIEW OF ACCESS RIGHTS IN A COMPUTING SYSTEM  
Systems and methods for facilitating reviews of IAM information are described. A list of pending reviews of respective access rights of a computing system may be provided to a display device for...
US20080178285 Provisional administrator privileges  
A system grants “provisional privileges” to a user request for the purpose of provisionally performing a requested transaction. If the provisionally-performed transaction does not put the system...
US20120066744 USER AUTHENTICATION AND ACCESS CONTROL SYSTEM AND METHOD  
A system and method for permitting user access to a computer controlled device. A display device displays a group of items to the user. Some of the items are known to the user and some are unknown...
US20120102567 Hybrid System Implementing Distinct and Co-existing Application Execution Environments and Methods for Implementing the Same  
A hybrid system is provided. The system includes a computing device implementing a first application execution environment (AEE) and a second AEE. The first AEE is configured to be isolated from...
US20110071811 USING EVENT CORRELATION AND SIMULATION IN AUTHORIZATION DECISIONS  
Performance impacting operations (e.g., maintenance operations) performed on a system can, depending on a current state of the system, heavily impact the performance of the system, thus affecting...
US20120254992 Providing greater access to one or more items in response to determining device transfer  
A computationally implemented method includes, but is not limited to: determining that a computing device associated with a first user and that was in possession of a second user has been...
US20140173720 SYSTEM AND METHOD FOR CONTROLLING THE ON AND OFF STATE OF FEATURES AT RUNTIME  
Methods and systems are provided for turning on and off features at run time. The method includes providing a unique enabling predicate (e.g., an “if enabled” statement) for one or more executable...
US20090150986 User Authorization Using An Automated Turing Test  
Methods, apparatus, and products are disclosed for user authorization using an automated Turing Test that include: selecting, by an automated Turing Test module, a challenge token, the challenge...

Matches 1 - 50 out of 398 1 2 3 4 5 6 7 8 >