AcclaimIP-ad

Match Document Document Title
US20150193278 ADMINISTERING A LOCK FOR RESOURCES IN A DISTRIBUTED COMPUTING ENVIRONMENT  
In a distributed computing environment that includes compute nodes, where the compute nodes execute a plurality of tasks, a lock for resources may be administered. Administering the lock may be...
US20150193277 ADMINISTERING A LOCK FOR RESOURCES IN A DISTRIBUTED COMPUTING ENVIRONMENT  
In a distributed computing environment that includes compute nodes, where the compute nodes execute a plurality of tasks, a lock for resources may be administered. Administering the lock may be...
US20140359721 Live Tiles Without Application-Code Execution  
This document describes techniques enabling live tiles without application-code execution. These techniques permit live content to be presented in tiles without executing code of applications...
US20120278101 SYSTEM AND METHOD FOR CREATING TRUSTED USER COMMUNITIES AND MANAGING AUTHENTICATED SECURE COMMUNICATIONS WITHIN SAME  
A system and method of creating trusted communities of users and managing communications by and between said trusted users are disclosed. In one embodiment, a system is depicting implementing a...
US20110271325 User Configuration File for Access Control for Embedded Resources  
Multimedia content is featured on user pages of an online social network using embed codes that are generated using a configuration file associated with the source ID for the multimedia content...
US20110167476 MESSAGE DELIVERY SYSTEM AND DELIVERY METHOD  
A message delivery system for delivering a message to a user includes: a plurality of delivery systems (300A, 300B) which are run by a plurality carriers respectively and deliver information to...
US20140007196 SUBSCRIBER AUTHENTICATION USING A USER DEVICE-GENERATED SECURITY CODE  
A device receives an indication that a security code is to be generated; generates the security code based on the indication; generate a message that includes the security code and an identifier...
US20140137196 METHOD FOR INTERNET TRANSACTIONS  
The present invention consists of a computer security method that enables all users of a computer application to enjoy superior security levels when sensitive information is being exchanged with...
US20130198815 Systems and Methods for Universal Enhanced Log-In, Identity Document Verification and Dedicated Survey Participation  
Systems and methods are provided for controlling access via a computer network to a subscriber server. A log-in server receives a query to connect through the computer network to the subscriber...
US20120096531 Multimedia Aggregation in an Online Social Network  
Multimedia content is featured on user pages of an online social network using embed codes that are generated using a configuration file associated with the source ID for the multimedia content...
US20120317627 TOOL, METHOD AND APPARATUS FOR ASSESSING NETWORK SECURITY  
Tools and methods in which user interaction via a common user interface enables the assessing of network security prior to implementation of the network, as well as assessing the security of...
US20130185765 METHODS AND SYSTEMS FOR RESTRICTING ELECTRONIC CONTENT ACCESS BASED ON GUARDIAN CONTROL DECISIONS  
Methods, computer-readable media, and systems are provided to facilitate a second user to allow or deny a first user, such as a child, from accessing content by proving the second user with a...
US20110321145 Method for Ensuring Security of Computers Connected to a Network  
A network authentication method is disclosed. A transmission-side client and a reception-side client have the same password. The transmission-side client transmits multiple authentication packets...
US20150082383 System and Method for Controlling Access to an Electronic Message Recipient  
A system for, and method of, generating a plurality of proxy identities to a given originator identity as a means of providing controlled access to the originator identity in electronic...
US20110138446 SYSTEM AND METHOD FOR PROVIDING USER AUTHENTICATION AND IDENTITY MANAGEMENT  
A distributed client/server system comprises a network of servers and clients, such as the Internet, in which user access to certain restricted resources is controlled by a logon procedure that...
US20140123228 Event Reporting and Handling  
Particular embodiments may receive and log information related to one or more events occurring on one or more client computing devices associated with a user. An event may comprise a restriction...
US20120095919 SYSTEMS AND METHODS FOR AUTHENTICATING ASPECTS OF AN ONLINE TRANSACTION USING A SECURE PERIPHERAL DEVICE HAVING A MESSAGE DISPLAY AND/OR USER INPUT  
Systems and methods for authenticating aspects of an online transaction using a secure peripheral device having a message display and/or user input are provided. One such method for establishing a...
US20140237552 AUTHENTICATING MEDIUM, AUTHENTICATING TERMINAL, AUTHENTICATING SERVER, AND METHOD FOR AUTHENTICATION BY USING SAME  
The present invention relates to an authenticating medium, an authenticating terminal, an authenticating server, and a method for authentication by using same. According to the present invention,...
US20120304255 Systems and Methods for Authenticating Mobile Device Communications  
Embodiments of the invention provide systems and methods for authenticating mobile device communications. A mobile device to which a message will be communicated may be identified. Based upon a...
US20150046978 Electronic Messaging Exchange  
A computer-implemented system and method for secure electronic message exchange including coupling a control platform to a workstation of a plurality of workstations via a communications medium,...
US20140020063 Electronic Messaging Exchange  
A computer-implemented system and method for secure electronic message exchange including coupling a control platform to a workstation of a plurality of workstations via a communications medium,...
US20130179954 Computer Implemented System and Method for Providing Users with Secured Access to Application Servers  
A computer implemented system and method for providing users with secured access to application servers have been disclosed. The system and method envisaged by the present disclosure are not...
US20110119482 Method and system for establishing a communications pipe between a personal security device and a remote computer system  
A method and a system is provided for establishing a communications path over a communications network between a personal security device (PSD) and a remote computer system without requiring the...
US20140245385 METHOD AND APPARATUS FOR PACKET SOURCE VALIDATION ARCHITECTURE SYSTEM FOR ENHANCED INTERNET SECURITY  
A router in a global computer network for enhanced Internet security provides for an adaptation of major routers of the global computer network with a packet source validation function. The...
US20100095350 UNIVERSALLY USABLE HUMAN-INTERACTION PROOF  
Disclosed is a system and method for generating a universally usable, completely automated public turing test to tell a computer and a human apart (CAPTCHA). The universally usable CAPTCHA uses...
US20120204229 METHOD AND SYSTEM FOR AUTHENTICATING AN END USER  
A method and associated system for authenticating an end user. A selected subset of root nodes of a set of root nodes in a server mask is received, the selected subset of root nodes having been...
US20110078766 SYSTEM AND METHOD FOR BOOKMARKING AND TAGGING A CONTENT ITEM  
The present invention is directed towards systems and methods for saving and tagging a content item available on a computer network, including saving and bookmarking a reference to a content item....
US20140325589 Disposable Browsers and Authentication Techniques for a Secure Online User Environment  
Disclosed herein are systems and methods that allow for secure access to websites and web-based applications and other resources available through the browser. Also described are systems and...
US20110214160 Method for Increasing Security in a Passive Optical Network  
A method for security in a passive optical network is disclosed. The method includes, at an optical line termination (OLT): detecting an optical termination device and establishing a connection...
US20090217352 Web managed multimedia asset management method and system  
A system for multimedia asset management includes: multimedia assets stored in storage locations, the assets containing collections of associated multimedia files and metadata; a web portal in...
US20080209514 Digital Asset Distribution System  
Digital asset distribution systems and methods are provided. The method may include receiving a digital asset and associated permissions from each of a plurality of publishers, and hosting the...
US20120131647 System and Methods for Facilitating Secure Communications on a Website  
A system and methods for facilitating secure communications on a website are presented. The system comprising a security server configured to receive a secure message from a creator device is...
US20110093921 MULTI-FUNCTIONAL PERIPHERAL AND MULTI-FUNCTIONAL PERIPHERAL CONTROL SYSTEM  
This invention provides a multi-functional peripheral and a multi-functional peripheral control system that manage a total number of output sheets of a user strictly and accurately even when an...
US20140040973 METHOD FOR CONTROLLING INITIAL ACCESS RIGHTS TO OPEN MOBILE ALLIANCE DEVICE MANAGEMENT SERVERS  
A client device and a server device communicate using an Open Mobile Alliance (OMA)-Device Management (DM) protocol. The client device is configured to grant the desired access rights to a newly...
US20150170534 Learning Management Systems and Methods  
The present invention encompasses a computer implemented LMS that allows learners to securely login and obtain access to online training courses, community message boards, a library of resources...
US20130111551 Method for Securing Computers from Malicious Code Attacks  
A computer readable storage medium has instructions that, when executed by a host computer cause the host computer to perform a method of write protecting the storage medium and therefore...
US20140096219 Assisted Registration of Audio Sources  
Systems and methods are provided for assisting a user with setting up an audio system with audio content services the user is already registered with. One method may involve receiving a list of a...
US20110032939 NETWORK SYSTEM, PACKET FORWARDING APPARATUS, AND METHOD OF FORWARDING PACKETS  
A network system includes: a first network; an authentication server; a second network; a network; and a packet forwarding apparatus, wherein the packet forwarding apparatus includes: a forwarding...
US20130081108 Providing Operation Services for Networks via Operations Service Servers  
Systems and methods of provide operations services for networks through an operations service switch. Multiple customers of the operations service may obtain operations service through the...
US20130104219 CENTRALIZED AUTHENTICATION FOR MULTIPLE APPLICATIONS  
Network applications can provide network security without containing any security code or otherwise verifying the authenticity of each request that they receive for service. Instead, a single,...
US20130347070 SYSTEM AND METHOD FOR EMBEDDING FIRST PARTY WIDGETS IN THIRD-PARTY APPLICATIONS  
Methods and systems provide embeddable user interface widgets to third-party applications so that the widgets can be securely embedded in, and securely used from within, the third-party...
US20150058926 Shared Page Access Control Among Cloud Objects In A Distributed Cloud Environment  
A management system in a distributed cloud environment that includes a plurality of cloud object, may administer shared page access control among cloud objects. Such shared access control...
US20110038480 SECURITY METHOD IN WIRELESS COMMUNICATION SYSTEM HAVING RELAY NODE  
A security method in a wireless communication system is provided, which is used for providing a plurality of security associations between a user equipment, a relay node, and a base station node...
US20130024916 System and Method for Verification, Authentication, and Notification of Transactions  
A system and method are provided for verifying, authenticating, and providing notification of a transaction such as a commercial or financial transaction, with and/or to at least one party...
US20120219127 Method and system for implementing aggregate endpoints on IMS networks  
A method and system are adapted to provide telephony services to aggregate endpoints on an Internet Protocol Multimedia Subsystem (IMS) network. The method includes assigning one or multiple PUIDs...
US20150143465 SYSTEMS AND METHODS FOR SECURITY TIERING IN PEER-TO-PEER NETWORKING  
A method may also include receiving from each of one or more of potential peer information handling systems a connection request comprising a peer minimum acceptable security level for the peer...
US20140208383 SYSTEMS AND METHODS FOR SECURITY TIERING IN PEER-TO-PEER NETWORKING  
A method may also include receiving from each of one or more of potential peer information handling systems a connection request comprising a peer minimum acceptable security level for the peer...
US20140026194 ePHI-COMPLIANT GATEKEEPER SYSTEM & METHODS  
An ePHI-compliant gatekeeper system that provides single, controlled access, editable in real-time, to an individual patient's medical information that remains remotely stored within internal...
US20150180845 ELECTRONIC MAIL SYSTEM AND METHODS  
Disclosed is an envelope content splitting (ECS) technology, including systems and methods, which can enable secure sending, retrieving and updating of emails. In addition, users of the ECS...
US20140189796 GROUP DEFINITION MANAGEMENT SYSTEM  
A group definition management system can easily acquire correspondence between an internal ID and an external ID and easily reflect information of a group definition for the internal ID to an...