Match Document Document Title
US20150012976 Computer-implemented method and system for controlling access for a tag reader to an information page on a server system  
A computer-implemented method and server system controls access to an information page for a tag reader. The page is associated with a tag and identified by a first page identifier. A first...
US20140245392 Systems, Methods, and Computer Program Products for Authenticating Human Users of a Computer System  
A computer program product having a computer readable medium tangibly recording computer program logic for use in a secure computer system with a first human user and a second human user being...
US20150256543 TEMPORARILY PROVIDING HIGHER PRIVILEGES FOR COMPUTING SYSTEM TO USER IDENTIFIER  
A root user identifier of a computing system is disabled. Thereafter, and in response to determining that a problem with the computing system requires root privileges to the computing system to...
US20110083163 Temporarily providing higher privileges for computing system to user identifier  
A root user identifier of a computing system is disabled. Thereafter, and in response to determining that a problem with the computing system requires root privileges to the computing system to...
US20140068718 FLATTENING PERMISSION TREES IN A VIRTUALIZATION ENVIRONMENT  
A virtualization manager receives a permission request indicating a user and an entity in a virtual machine system. The virtualization manager flattens a permissions database to generate a...
US20140230017 PROGRAMMABLE SECURITY TOKEN  
Systems and methods are described for programmable security token. A programmable security token includes an input interface configured to receive post-vendor customization of a parameter used to...
US20100306828 Method for Secure Validation Utilizing Existing Validation Framework  
Granting secure access to stored digital medical information to patients or healthcare providers facilitates information exchange in healthcare. Payment for healthcare services can be accomplished...
US20140189816 EXTENDING SERVER-BASED DESKTOP VIRTUAL MACHINE ARCHITECTURE TO CLIENT MACHINES  
A server-based desktop-virtual machines architecture may be extended to a client machine. In one embodiment, a user desktop is remotely accessed from a client system. The remote desktop is...
US20140109188 Providing Remote Application Logs for Cloud Applications  
Applications and their application components are deployed on a cloud platform. The application components generate application logs on the underlying cloud runtime infrastructure of the cloud...
US20140090023 Method and Apparatus for Authenticating Location-based Services without Compromising Location Privacy  
A method and an apparatus for authenticating location-based services without compromising location privacy, which comprises a comprehensive solution that preserves unconditional location privacy...
US20110173683 SYSTEM AND METHOD FOR PROVIDING CUSTOMIZED RESPONSE MESSAGES BASED ON REQUESTED WEBSITE  
The invention describes a system, method and computer product to regulate user access to websites. The system receives a URL request by a user corresponding to a website that the user wishes to...
US20140007196 SUBSCRIBER AUTHENTICATION USING A USER DEVICE-GENERATED SECURITY CODE  
A device receives an indication that a security code is to be generated; generates the security code based on the indication; generate a message that includes the security code and an identifier...
US20130283353 SECURE ZONE FOR SECURE PURCHASES  
An apparatus according to the present disclosure may comprise a secure zone configured to execute a task having a subtask. The task and subtask may have respective executable code and may be...
US20120284190 Intersystem Single Sign-On  
Techniques for intersystem Single Sign-On use intersystem user ID mapping to map user IDs of multiple systems. In one implementation, a method obtains a user's ID information associated with a...
US20130198815 Systems and Methods for Universal Enhanced Log-In, Identity Document Verification and Dedicated Survey Participation  
Systems and methods are provided for controlling access via a computer network to a subscriber server. A log-in server receives a query to connect through the computer network to the subscriber...
US20120304256 ELECTRONIC MAIL SYSTEM AND METHOD  
A method of handling e-mail messages and a server for performing the method are disclosed. In the method comprises, receiving an e-mail message from a sender for delivery to a recipient, and...
US20130080218 CUSTOMIZED CONTENT DELIVERY SYSTEM  
A method includes receiving an access code at one or more server computers from a user device that is associated with a user. In response to receiving the access code at the one or more server...
US20120331530 AUTHENTICATION AND AUTHORIZATION IN NETWORK LAYER TWO AND NETWORK LAYER THREE  
A method may include authenticating a node over layer 2 in a network based on authentication rules; sending a node authentication code to the node; and providing layer 3 network access based on...
US20100299723 System and Method for Automated Clock Wind Back Recovery  
A method and system for automated clock wind-back recovery are disclosed. According to one embodiment, a computer-implemented method comprises requesting a license to access an application and...
US20140040617 METHOD FOR THE GENERATION OF A CODE, AND METHOD AND SYSTEM FOR THE AUTHORIZATION OF AN OPERATION  
The present invention relates to a method for generating a code and a method comprising the authorization of an operation carried out by a client on a first server. A second server generating an...
US20130111558 SECURE MACHINE ENROLLMENT IN MULTI-TENANT SUBSCRIPTION ENVIRONMENT  
In a multi-tenant environment, machines across the Internet, belonging to a particular subscription are securely enrolled with the tenant's subscription. Authentication of the machines is...
US20150222620 SYSTEM AND METHOD FOR PROVIDING APPLICATION SECURITY IN A CLOUD COMPUTING ENVIRONMENT  
In accordance with an embodiment, described herein is a system and method for providing application security in a cloud computing or other environment. A plurality of hot-spot configurations...
US20140109198 Method And System For Restricting Access To User Resources  
A user's set top box (STB), or other client, executes a shell and has an application program interface (API) by which certain features of the client can be controlled. The client is in...
US20120297460 Method And System For Restricting Access To User Resources  
A user's set top box (STB), or other client, executes a shell and has an application program interface (API) by which certain features of the client can be controlled. The client is in...
US20110113474 NETWORK SYSTEM SECURITY MANAGMENT  
A network system loads operating system (OS) software that includes a switch role tool (SRT). The SRT provides the network system with security management capability that employs a hostname...
US20140074638 CONSUMER SELF-AUTHORIZATION FOR ELECTRONIC RECORDS  
A system and method for authorizing access to a third party at least in part for medical records. The system includes at least one server that includes or is coupled to at least one central...
US20140331291 METHOD FOR GENERATING AND CHECK-CONTROLLING NETWORK IDENTITY INDENTIFICATION CODE IN NETWORK ELECTRONIC IDENTIFICATION CARD  
The present invention relates to a method for generating and check-controlling a network identity identification code in a network electronic identity. The method comprises: a server performing...
US20140289809 Cell-Phone-and Watermark-Dependent Authentication  
An improved authentication system is disclosed. In one class of embodiments, the system utilizes the distance between a user's cell phone and client's computer as an authenticating factor in an...
US20140020065 NETWORK APPLIANCE  
System, method, and device for providing services on a network. The device comprises a security assessor and a service provider unit. The security assessor is connected to the network and is...
US20120011237 SYSTEMS AND METHODS FOR TRANSFERRING REMOTE CONTEXT  
Example systems and methods provide remote context transfer and session termination. A computer-implemented method for remote context transfer between user sessions with a clinical information...
US20120110648 USER AUTHENTICATION SYSTEM AND PLANT CONTROL SYSTEM HAVING USER AUTHENTICATION SYSTEM  
A plant control system may include a manipulation monitoring terminal that includes a local user authentication unit configured to authenticate a user who logs in the manipulation monitoring...
US20110040824 Shared Server-Side Macros  
A computer-implemented method of managing computer macros is disclosed. The method comprises storing code for a macro at a location in an internet-accessible hosted computer system, and receiving...
US20140136837 METHOD FOR IDENTIFYING AND AUTHENTICATING A USER VIA A PORTABLE DEVICE  
The method comprises: a1) associating, a user server (US) in collaboration with an authoritative user server (AUS), a user's portable device (MT) with an email address; anda2) once associated,...
US20130117822 METHOD AND SYSTEM FOR SECURE TELETRANSMISSION  
A system for secure teletransmission destined for a receiving person includes a secure server comprising a program providing a redemption code and a designation code for designating an object to...
US20120317627 TOOL, METHOD AND APPARATUS FOR ASSESSING NETWORK SECURITY  
Tools and methods in which user interaction via a common user interface enables the assessing of network security prior to implementation of the network, as well as assessing the security of...
US20140310784 METHOD AND DEVICE FOR AUTHORIZING USER EQUIPMENT IN A WIRELESS COMMUNICATION SYSTEM  
The present invention relates to a method and device for authorizing user equipment (UE) in a wireless communication system. The present invention also relates to a method and device for...
US20150101026 DEVICE, SYSTEM, AND METHOD OF SOCIAL NETWORKING  
Device, system, and method of social networking and for creating and managing an online social network, which focuses on deceased persons and their remembrance and memorialization. A living person...
US20110145892 SYSTEM AND METHOD FOR CONTROLLING ACCESS TO AN ELECTRONIC MESSAGE RECIPIENT  
A system for, and method of, generating a plurality of proxy identities to a given originator identity as a means of providing controlled access to the originator identity in electronic...
US20140123228 Event Reporting and Handling  
Particular embodiments may receive and log information related to one or more events occurring on one or more client computing devices associated with a user. An event may comprise a restriction...
US20150095987 SYSTEMS AND METHODS OF VERIFYING AN AUTHENTICATION USING DYNAMIC SCORING  
Systems and methods of verifying an authentication based on dynamic scoring are disclosed in which a base verification score associated with a user is generated based on at least one...
US20140165156 USING A SESSION CONTINUITY TOKEN TO ACCESS AN ONLINE CONTENT MANAGEMENT SYSTEM  
The disclosed embodiments relate to a session continuity feature that allows a user to access an online content management system through different instances of a third-party application located...
US20110004526 PORTABLE CONSUMER DEVICE VERIFICATION SYSTEM  
A method for verifying a portable consumer device. The method includes receiving an authorization request message associated with a transaction conducted using a portable consumer device. The...
US20130125217 Authorization Control  
The application describes an attestation system (705, 707, 710) in a cloud computing environment. The authorization system is configured to allow a plurality of users (701a-d) and applications...
US20140101723 EXTENSIBLE CONFIGURATION SYSTEM TO ALLOW A WEBSITE TO AUTHENTICATE USERS BASED ON AN AUTHORIZATION PROTOCOL  
An extensible configuration system to allow a website to authenticate users based on an authorization protocol is disclosed. In some embodiments, the extensible configuration system includes...
US20120030119 SECURITY SYSTEM AND METHOD THAT ALLOWS USERS TO SECURELY SETUP AND MAINTAIN SYSTEM SECURITY FOR ALL BUSINESS SYSTEMS  
A system, method and computer-readable medium for providing comprehensive security to business systems by distributing the security for accessing the business systems across databases at a...
US20150128221 LOCATION BASED AUTHENTICATION OF USERS TO A VIRTUAL MACHINE IN A COMPUTER SYSTEM  
An apparatus and method uses location based authentication of a user accessing a virtual machine (VM) by using the physical location of the virtual machine as a criteria for the authentication....
US20150128220 LOCATION BASED AUTHENTICATION OF USERS TO A VIRTUAL MACHINE IN A COMPUTER SYSTEM  
An apparatus and method uses location based authentication of a user accessing a virtual machine (VM) by using the physical location of the virtual machine as a criteria for the authentication....
US20150261948 TWO-FACTOR AUTHENTICATION METHODS AND SYSTEMS  
A method and system for two-factor authentication used to provide a user access to a target system. After receiving an initial login for a user, a notification is sent to a user device to confirm...
US20140310781 METHODS FOR MANAGING AUTHORITY DESIGNATION OF GRAPHICAL USER INTERFACES  
According to one aspect, a graphics management system receives a first message from a first process for granting one or more rights to a second process for accessing a GUI element owned by the...
US20110219431 SYSTEM AND METHOD OF QUALITY OF SERVICE ENABLEMENT FOR OVER THE TOP APPLICATIONS IN A TELECOMMUNICATIONS SYSTEM  
A system, method, and node providing a predefined Quality of Service (QoS) level to an Over The Top (OTT) service provider in a telecommunications network. A User Equipment (UE) initiates an...