Match Document Document Title
US20140196110 TRUST-BASED AUTHENTICATION IN A SOCIAL NETWORKING SYSTEM  
A social networking system determines whether a user is a real public figure or is the correct “public persona” of an individual who is famous within a particular domain. The system selects one or...
US20100263022 Systems and Methods for Enhanced Smartclient Support  
Exemplary systems and methods for enhanced smartclient support are provided. In various embodiments, a method comprises receiving, by a digital device, an authentication reply message associated...
US20110185035 Universal Remote Diagnostic Access Device for Medical Equipment and Method of Use  
Embodiments of the disclosed technology comprise an intermediary device with an efficient methodology for providing secure remote access for medical equipment diagnostics. This device and method...
US20150040190 SYSTEM AND METHOD FOR PROXYING FEDERATED AUTHENTICATION PROTOCOLS  
A system and method that include receiving a service provider identity request through a federated authentication protocol; transmitting a proxy identity request to a configured identity provider;...
US20140245389 SYSTEM AND METHOD FOR PROXYING FEDERATED AUTHENTICATION PROTOCOLS  
A system and method that include receiving a service provider identity request through a federated authentication protocol; transmitting a proxy identity request to a configured identity provider;...
US20140245382 SYSTEM AND METHOD FOR DEVELOPING AND USING TRUSTED POLICY BASED ON A SOCIAL MODEL  
A trust policy is constructed based upon a social relationship between real-world entities. The trust policy may determined based upon a social network and social network maps. The social network...
US20120131332 Method and Apparatus for Authenticating Online Transactions Using a Browser  
A computer-implemented method for authenticating a user using a service provider server and an authentication server, the user communicating with at least one of the service provider server and...
US20120124646 Method and Apparatus for Authenticating Online Transactions Using a Browser  
A computer-implemented method for authenticating a user using a service provider server and an authentication server, the user communicating with at least one of the service provider server and...
US20120117609 Pluggable Claim Providers  
A server system receives and installs multiple claim provider plug-ins. Each of the claim provider plug-ins implements the same software interface. However, each of the claim provider plug-ins can...
US20110239274 Methods for acouiring an internet user's consent to be located and for authenticating the identity of the user using location information  
A method and system for acquiring an Internet user's consent to be geographically located via at least two independent sources of geographical information while at least one independent source of...
US20130133034 SYSTEMS AND METHODS FOR CREATING A TRUST INDEX WITH RESPECT TO ONLINE IDENTITIES  
A user verification engine that will verify trust worthiness (trust-level) of individuals and through that trust-level of content they produce online is disclosed herein.
US20150128217 AUTHENTICATION METHOD AND AUTHENTICATION PROGRAM  
To enhance the convenience of authentication when executing an application, an application server: acquires, from a terminal, context information indicating the status of the terminal; generates,...
US20120317630 REMOTE LOGIN ARRANGEMENT FOR HETEROGENEOUS SYSTEMS USING CENTRALIZED AUTHENTICATION  
Methods and systems for authenticating a remote user across heterogeneous authentication systems are disclosed. One method includes receiving domain user credentials at a first heterogeneous...
US20150095979 METHOD AND SYSTEM FOR MANAGING USER SECURITY PERMISSIONS FOR ACCESS TO RESOURCES  
Disclosed is a method and system of managing user security permissions for access to resources accessible over a communications network, to participate in a designated task or conversation...
US20120324550 Systems and Methods for Combining User Profiles  
Certain embodiments of the invention may include systems and methods for combining user profiles. According to an example embodiment, a method is provided for refining group content choices. The...
US20130139236 IMPOSTER ACCOUNT REPORT MANAGEMENT IN A SOCIAL NETWORKING SYSTEM  
Imposter account reports received by a social networking system are put into a report management process that routes the reports into other handling processes based upon the comparison of the...
US20140298415 METHOD AND SYSTEM FOR PROVIDING CONNECTIVITY FOR AN SSL/TLS SERVER BEHIND A RESTRICTIVE FIREWALL OR NAT  
A method and a relay service node to facilitate establishment of a secure connection between a first node within a restrictive access network, and a second node, the method accepting a control...
US20140040987 Network Application Security Utilizing Network-Provided Identities  
A network security system that correlates security-related events to individual users, as identified by a user identifier and an identity provider. The user identifier may be associated in one or...
US20120284775 METHOD FOR PROVIDING IP SERVICES TO A USER OF A PUBLIC NETWORK  
A method for providing IP services to a user of a public network is disclosed. The user accesses the public network using a user equipment which supports a first set of IP services. The network...
US20120260314 UNINTERRUPTED VIRTUAL PRIVATE NETWORK (VPN) CONNECTION SERVICE WITH DYNAMIC POLICY ENFORCEMENT  
Techniques for uninterrupted virtual private network (VPN) connection service with dynamic policy enforcement are provided. An existing VPN session between a VPN client and a VPN server detects a...
US20110277015 Proxy Server, Control Method Thereof, Content Server, and Control Method Thereof  
The present invention particularly relates, but is not limited to, a technology that facilitates the identification of a consumed content item and a user who consumed that item, and there is...
US20110107398 SYSTEM AND METHOD FOR TRANSPARENT ACCESS AND MANAGEMENT OF USER ACCESSIBLE CLOUD ASSETS  
System and method for enabling user access of cloud assets are described. In one embodiment, a method comprises authenticating a user to a system comprising a cloud computing environment in which...
US20130179943 Systems and Methods for Authentication  
A method of performing authentication involves receiving, by a station, an initiation frame and transmitting, by the station, an authentication request. The authentication request includes an...
US20130254840 PROVIDING MULTIPLE AUTHENTICATIONS TO AUTHENTICATE USERS WITH RESPECT TO A SYSTEM AND FILE SYSTEMS OFFERRED THROUGH THE SYSTEM  
Provided are a method, system, and computer program product for providing multiple authentications to authenticate users with respect to a system and file systems offered through the system. A...
US20130291087 SYSTEMS AND METHODS FOR INTEGRATING CLOUD SERVICES WITH INFORMATION MANAGEMENT SYSTEMS  
A system includes an enterprise network including an internal management system communicatively coupled thereon, the enterprise network includes security and the internal management system is...
US20120159572 COLLABORATIVE RULES BASED SECURITY  
A cloud computing security system. An access manager module includes first and second client profiles. The first client profile has a first set of rules enabling access to a first set of cloud...
US20120233660 METHOD AND APPARATUS FOR PROVIDING SECURITY FOR AN INTERNET PROTOCOL SERVICE  
A method and apparatus for providing security to an endpoint device are disclosed. For example, the method receives a signaling message by the endpoint device. The method processes the signaling...
US20150020161 REVERES ACCESS METHOD FOR SECURING FRONT-END APPLICATIONS AND OTHERS  
A System that provides a secured connection between servers on the LAN and clients on the WAN comprises the LAN (which includes LAN Server and LAN Controller) and the DMZ (which includes DMZ...
US20140282902 SPLIT AUTHENTICATION NETWORK SYSTEMS AND METHODS  
Disclosed is a system comprising: an authentication datastore; a device presence engine; a traffic monitor engine; an authentication presence monitor engine; an authentication server selection...
US20120254942 CONNECTION DESTINATION DETERMINATION DEVICE, CONNECTION DESTINATION DETERMINATION METHOD, AND SERVICE COLLABORATION SYSTEM  
A connection destination determination device includes a control unit for performing an approval determination process to determine that a user authentication state in a connection destination...
US20140109184 METHOD FOR AUTHENTICATING USERS AND DEVICES ON A COMPUTING NETWORK  
A method for authenticating users and devices on a computing network is disclosed. The method includes authenticating a user and a user's device with a computing network based upon received...
US20150089588 AIR INTERFACE SECURITY METHOD AND DEVICE  
Provided is an air interface security method. In the process of protocol transmission, the method executes: 1) a short-range coupling device sending a security parameter request message to a...
US20130318570 USING NEIGHBOR DISCOVERY TO CREATE TRUST INFORMATION FOR OTHER APPLICATIONS  
Neighbor discovery is used to create a generic trust database for other applications. As part of the neighbor discovery, each device performs classification and validation of the credentials of...
US20140181905 SYSTEM AND METHOD FOR PROVIDING A VIRTUAL PEER-TO-PEER ENVIRONMENT  
An improved system and method are disclosed for peer-to-peer communications. In one example, the method enables the creation of a virtual endpoint that may operate within a peer-to-peer network to...
US20120266213 TRUSTED HARDWARE FOR ATTESTING TO AUTHENTICITY IN A CLOUD ENVIRONMENT  
Apparatuses, computer readable media, methods, and systems are described for storing a first measurement of a virtualization platform, storing a second measurement of a measured virtual machine,...
US20150074760 System and Processing Method for Electronic Authentication Client, and System and Method for Electronic Authenication  
A system for an electronic authentication client and a processing method thereof, and a system for electronic authentication and a method thereof are disclosed. The system for the electronic...
US20100250385 METHOD AND SYSTEM FOR A COMBINATION VOUCHER  
A voucher system for redeeming vouchers via a network. The voucher has an associated voucher code that permits access to one or more first items and/or one or more second items. A redemption...
US20110231903 STREAMING MEDIA FOR PORTABLE DEVICES  
A system and method for allowing hand-held/wireless device devices to (1) provide audio/video conferencing; (2) access AV content through streaming and cloud transfer; and (3) offer hand-held and...
US20130312061 COMPUTER READABLE STORAGE MEDIA FOR MULTI-FACTOR AUTHENTICATION AND METHODS AND SYSTEMS UTILIZING SAME  
Systems and methods for providing multi-factor authentication are discloses herein. A method for multi-factor authentication may include a step for receiving an authentication window request from...
US20110283337 METHOD AND SYSTEM FOR AUTHENTICATING NETWORK NODES OF A PEER-TO-PEER NETWORK  
This invention relates to system and a method for authentication of a network node (2) which can be inserted into a peer-to-peer network (1) and to which a unique identifier is assigned which,...
US20130227669 METHOD AND SYSTEM FOR TRAFFIC ENGINEERING IN SECURED NETWORKS  
Aspects of a method and system for traffic engineering in an IPSec secured network are provided. In this regard, a node in a network may be authenticated as a trusted third party and that trusted...
US20130298192 SYSTEMS AND METHODS FOR USING REPUTATION SCORES IN NETWORK SERVICES AND TRANSACTIONS TO CALCULATE SECURITY RISKS TO COMPUTER SYSTEMS AND PLATFORMS  
Instrumented networks, computer systems and platforms having target subjects (devices, transactions, services, users, organizations) are disclosed. A security orchestration service generates...
US20140366096 TECHNIQUES FOR SHARING VIRTUAL MACHINE (VM) RESOURCES  
Techniques for sharing virtual machine (VM) resources are provided. A relative location for a resource within a VM is created; the relative location dynamically resolves to a particular physical...
US20130283346 System and Method For Rapid Authentication In Wireless Communications  
Various methods and communications devices to improve association and handoff performance of a wireless network are provided. By way of example, a modified state machine that permits reduced...
US20140373093 ONLINE SECURE TRANSACTION VERIFICATION SYSTEM PROXY SERVER AND METHOD  
In one example, a proxy server acts as a gateway to a website and modifies the traffic between a web browser on a user device and the website server, as necessary to request protection by...
US20120260310 SYSTEM AND METHOD FOR APPLYING AUTHENTICATION AND SECURITY POLICIES IN A SIP ENVIRONMENT  
The present disclosure provides a system and method for applying authentication and security policies in a SIP environment. In accordance with one embodiment, there is provided a method for use on...
US20140082697 SYSTEM ENHANCEMENTS FOR ENABLING NON-3GPP OFFLOAD IN 3GPP  
Methods and apparatuses for offloading traffic from a third generation partnership project (3GPP) access network to a non-3GPP access point (AP) are disclosed. A 3GPP access network entity may...
US20100333176 Enabling Dynamic Authentication With Different Protocols on the Same Port for a Switch  
The invention enables a client device that does not support IEEE 802.1X authentication to access at least some resources provided through a switch that supports 802.1X authentication by using...
US20150052583 METHOD AND SYSTEM FOR PROVIDING EXTENDED AUTHENTICATION  
A method and system for extending an authentication of a wireless device are disclosed. For example, the method includes authenticating access to the wireless device via a first authentication....
US20110078765 SYSTEM AND METHOD FOR ESTABLISHING HISTORICAL USAGE-BASED HARDWARE TRUST  
Establishing trust according to historical usage of selected hardware involves providing a usage history for a selected client device; and extending trust to a selected user based on the user's...