AcclaimIP-ad

Match Document Document Title
US20140189838 Access method,and system and mobile intelligent access point  
An access method is disclosed. The method includes: a mobile intelligent access point accesses a network through at least two wireless technologies; a User Equipment (UE) establishes a connection...
US20130159123 CONTENT ACCESS MANAGEMENT IN A SOCIAL NETWORKING SYSTEM FOR LOCALLY STORED CONTENT  
A content access management system receives an access determination requested identifying an access rule and a requesting user. The access rule may be created in advance by the content owner at...
US20150007263 Maintaining Privacy in a Multi-Tenant Cloud Service Participating in a Federated Identity Platform  
Embodiments conceal or obfuscate tenancy in a multi-tenant cloud service participating in a federated identity platform. A cloud service receives a request for a document from a first entity. The...
US20140196113 Secure on-demand supply method and system and traffic type acquisition method  
A secure on-demand supply method is disclosed. The method includes: a configuration parameter of a security function module is determined according to a security level set for requested traffic by...
US20130276063 METHOD AND SYSTEM FOR ESTABLISHING WIRELESS LOCAL AREA NETWORK LINK BETWEEN PORTABLE TERMINALS  
A method of establishing a WLAN link between portable terminals using a cellular network and a sound, the method including: transmitting a connection request message including a first partial...
US20140013391 METHODS AND SYSTEMS FOR INTERNET SECURITY VIA VIRTUAL SOFTWARE  
A method for providing internet security via multiple user authorization in virtual software. Each of two users are provided with a non-transitory tangible storage medium. The first user inputs...
US20120222097 SYSTEM AND METHOD FOR USER CLASSIFICATION AND STATISTICS IN TELECOMMUNICATION NETWORK  
The embodiments herein relate to user data management in a telecommunications network and, more particularly, to classifying users in a telecommunications network and subsequently leveraging the...
US20120317615 USE OF USER LOCATION INFORMATION FOR REMOTE ACTIONS  
Architecture that provides location broker services which share the user location with other parties (e.g., based on user consent). Stationary computing devices can also determine the location of...
US20110289564 SYSTEM AND METHOD FOR PROVIDING AUTHENTICATION CONTINUITY  
A computer-implemented method may include receiving first monitored information relating to a user at a time of initial user authentication with a particular application or resource. It may be...
US20130117826 HOME REALM DISCOVERY IN MIXED-MODE FEDERATED REALMS  
The authentication of identities within a realm in which some identities are authenticated using direct authentication, and some identities are authenticated using federated authentication....
US20130046980 HOME NODE-B APPARATUS AND SECURITY PROTOCOLS  
A method for authenticating a home nodeB/home evolved node B (H(e)NB) with a network is disclosed. The method includes securely storing H(e)NB location information in a Trusted Environment (TrE);...
US20140032897 SECURELY ESTABLISHING A COMMUNICATION CHANNEL BETWEEN A SWITCH AND A NETWORK-BASED APPLICATION USING A UNIQUE IDENTIFIER FOR THE NETWORK-BASED APPLICATION  
A network-based application can establish a secure network connection to a switch. A unique identifier (UID) is generated for the network-based application, and a secure authentication request is...
US20140020060 QUALITY OF SERVICE APPLICATION  
A first network device receives an authentication request, from a second network device, to authenticate a user device and a first over-the-top application, stored on the user device, to determine...
US20140215559 SYSTEM AND METHOD FOR ADAPTIVE MULTIFACTOR AUTHENTICATION  
In one embodiment, a method includes receiving a request for wireless connection from a supplicant device via a service path. The service path includes a peer-to-peer communication path. The...
US20150149767 METHOD AND SYSTEM FOR AUTHENTICATING THE NODES OF A NETWORK  
A system and a method are provided for authenticating the nodes of a communication network in order to access the services of a service provider, and includes a collective authentication of the...
US20150113596 AUTHENTICATION SERVER SYSTEM FOR PERFORMING CONTROL OF NOTIFICATIONS DURING SERVICE USE, CONTROL METHOD, AND STORAGE MEDIUM  
When authentication processing is performed without requesting a user to input authentication information and receiving the authentication information in response to authentication processing...
US20150058924 Security Model for a Layout Engine and Scripting Engine  
Various embodiments provide an interface between a Web browser's layout engine and a scripting engine. The interface enables objects from the layout engine to be recognized by a memory manager in...
US20110307700 SYSTEM AND METHOD FOR PERFORMING TWO FACTOR AUTHENTICATION AND DIGITAL SIGNING  
The present invention relates to a system (10) operable to perform two factor authentication. The system (10) comprises a browser means (12), a server means (14) connected to the browser means...
US20110191822 CONTROLLED USE MEDICAL APPLICATION  
In an example, a plurality of virtualized medical application containers can be stored on one or more servers, wherein each server includes a memory, and wherein each virtualized medical...
US20110202269 MOBILE GAMING, HOSPITALITY AND COMMUNICATIONS APPLIANCE  
Methods and systems provided herein provide a user device that is capable of offering its user an extraordinary experience while staying at a hospitality vendor. In particular, the user is allowed...
US20150067783 SYSTEM AND METHOD FOR A CLOUD COMPUTING ABSTRACTION LAYER  
According to one system of the invention, the system provides a cloud-computing service from a cloud-computing environment comprising a plurality of cloud-computing resources. The system may...
US20140310773 BROWSER ACCESS TO NATIVE CODE DEVICE IDENTIFICATION  
A thick client installed on a client device includes a network protocol server that serves thin client requests for digital fingerprints of the client device. A thin client requests a digital...
US20130080769 SYSTEMS AND METHODS FOR SECURING NETWORK COMMUNICATIONS  
Secure communications may be established amongst network entities for performing authentication and/or verification of the network entities. For example, a user equipment (UE) may establish a...
US20150215291 SECURE DECENTRALIZED CONTENT MANAGEMENT PLATFORM AND TRANSPARENT GATEWAY  
An apparatus and method for private, peer-to-peer, and end-to-end content delivery, management, and access is disclosed. Content examples may include encrypted email, Instant Messaging (IM), and...
US20150082384 Mobile-Device-Based Trust Computing  
In one embodiment, a method includes receiving a request to access a shared device. The request may include data uniquely identifying a first user of the social-networking system. The first user...
US20140201809 Characteristics of Security Associations  
Authentication of a user or a wireless transmit/receive unit may be based on an obtained measure of authentication strength, which may referred to as an assurance level. For example, a user, via a...
US20120233683 System and Method to Support Identity Theft Protection as Part of a Distributed Service Oriented Ecosystem  
A system and method to support identity theft protection and, in particular, to a system and method for supporting identity theft protection as part of a distributed service oriented ecosystem in...
US20140047506 LICENCE MANAGEMENT SYSTEM, LICENSE MANAGEMENT METHOD, AND CLIENT DEVICE  
At the time of license authentication for a PC software product, an inquiry about the license authentication date of an MFP software product included in a combined product is made to an MFP in...
US20100325697 MULTILAYER ACCESS CONTROL SECURITY SYSTEM  
A computer-based system provides secure, configurable access to computer network resources. A human-readable language is provided for defining access policy rules. Rules in this language are...
US20120167177 METHOD CLIENT AND SYSTEM FOR AUTHENTICATION OF A LOW-SECURITY CLIENT AND A HIGH-SECURITY CLIENT IN A MOBILE RADIO NETWORK  
A method for authentication of a high-security client and a low-security client in a high-security mobile radio network includes: transmitting a request for authentication from a base station to...
US20140380418 System and method for verifying the legitimacy of requests sent from clients to server  
Disclosed herein are method and system that can be used for: preventing brute force attacks against passwords; preventing denial of service attacks by flooding; restricting bots from spamming...
US20140130127 Risk Adjusted, Multifactor Authentication  
A computer-implemented method comprising: receiving, from a device used by a user, a request to access a resource hosted by a computer system; identifying, by the computer system, a level of risk...
US20150150090 SYSTEM AND METHOD FOR IDENTITY AND REPUTATION SCORE BASED ON TRANSACTION HISTORY  
Techniques for electronic signature process management are described. Some embodiments provide an electronic signature service (“ESS”) configured to manage electronic identity cards. In some...
US20140331282 Methods and Systems for Identifying, Verifying, and Authenticating an Identity  
A method of authenticating the identity of a user is disclosed. The method may include registering a user, where registering the user includes receiving identification of a plurality of...
US20150143461 IDENTITY CONFIRMATION METHOD AND IDENTITY CONFIRMATION SYSTEM  
An identity confirmation method and a identity confirmation system which do not require users to remember passwords, and automatically update credentials for use in identity confirmation, without...
US20140366093 APPARATUS AND METHOD FOR VIRTUAL DESKTOP SERVICE  
Disclosed herein are a method and architecture capable of efficiently providing virtual desktop service. A service architecture for virtual desktop service according to the present invention...
US20140181907 Persistent Public Machine Setting  
Disclosed herein are methods for protecting user information on a client device that may have a plurality of users. A user interface with a public machine designation portion is presented to a...
US20140237550 SYSTEM AND METHOD FOR INTELLIGENT WORKLOAD MANAGEMENT  
The system and method for intelligent workload management described herein may include a computing environment having a model-driven, service-oriented architecture for creating collaborative...
US20140137195 SYSTEM AND METHOD FOR VERIFIED SOCIAL NETWORK PROFILE  
A method for verifying the on-line identity of a subscribed user and securely displaying an indicia in connection with that user's on-line content, wherein the indicia includes an aspect...
US20140181906 SYSTEM FOR SECURE ENROLLMENT AND SECURE VERIFICATION OF NETWORK USERS BY A CENTRALIZED IDENTIFICATION SERVICE  
A system and method for providing, as a service over a computer network (especially a packet-switched computer network) to a body of merchants connected to the computer network, verification of...
US20110277014 NODE AUTHENTICATION  
A requester node requesting a service in a peer-to-peer network transmits a request to a service provider node. The request may include a communication history of the requester node identifying...
US20140130133 METHOD OF SECURING NETWORK ACCESS RADIO SYSTEMS  
A method of providing security for network access radio systems and associated access radio security systems used with the systems. The method includes connecting an access radio having a radio...
US20130312063 SECURE NETWORK CONNECTION  
The invention provides for a method for use in a mobile radio communications network connection procedure and including the step of rejecting at a mobile radio communications device a handover...
US20120117623 SECURE NETWORK CONNECTION  
The invention provides for a method for use in a mobile radio communications network connection procedure and including the step of rejecting at a mobile radio communications device a handover...
US20140130126 SYSTEMS AND METHODS FOR AUTOMATICALLY IDENTIFYING AND REMOVING WEAK STIMULI USED IN STIMULUS-BASED AUTHENTICATION  
Systems and methods for identifying a weak stimulus in a stimulus-based authentication system is provided. Counters are associated with each stimulus used in the authentication and a first counter...
US20120036549 METHOD AND APPARATUS FOR INTERACTING WITH A SET-TOP BOX BASED ON SENSOR EVENTS FROM A USER DEVICE  
An approach is provided for controlling a set-top box based on sensor triggered events on a user device. A set-top box receives a control message from a user device, wherein the control message...
US20110184804 METHOD AND APPARATUS FOR QUEUING USER ACTION PRIOR TO AUTHENTICATION  
A system and method for queuing a user's selection of a good or service. In a preferred embodiment a user is presented with a dynamic matrix of images during a user identity authentication...
US20150188944 SYSTEM AND METHOD FOR HARDWARE-BASED TRUST CONTROL MANAGEMENT  
A trust control management method for security, operable on a computer system generates a unique Trust ID value by combining user-defined values with hardware-specific values associated with the...
US20140366090 UNAUTHENTICATED ACCESS TO ARTIFACTS IN COMMERCE NETWORKS  
The disclosed embodiments provide a system that facilitates business interaction. During operation, the system identifies a non-registered entity associated with an interaction within a commerce...
US20060225128 Measures for enhancing security in communication systems  
A method, communication device, intermediary device, system, and computer program product for providing security of operations on a connection between a first peer entity and a second peer entity...