Match Document Document Title
US20130024925 LIGHTWEIGHT DIRECTORY ACCESS PROTOCOL (LDAP) PROXY  
Two factor LDAP authentication systems and methods are presented. In one embodiment, implementation of a method for authenticating a user through a two factor process includes: at an LDAP proxy...
US20120042366 SECURE AND USABLE AUTHENTICATION FOR HEALTH CARE INFORMATION ACCESS  
Embodiments of the invention relate to providing a health care provider access to an electronic record of a patient may be provided. A determination is made as to whether the health care provider...
US20130139239 DUAL CODE AUTHENTICATION SYSTEM  
A verification method and system are disclosed that verify a user. The user is provided a verification code via, for example, a website, to be communicated to a provided electronic contact via a...
US20120137353 METHOD AND SYSTEM FOR ABSTRACTED AND RANDOMIZED ONE-TIME USE PASSWORDS FOR TRANSACTIONAL AUTHENTICATION  
A security system and method for authenticating a user's access to a system is disclosed. The security system receives an authentication request from the user and responds by generating a security...
US20120137352 METHOD AND SYSTEM FOR ABSTRACTED AND RANDOMIZED ONE-TIME USE PASSWORDS FOR TRANSACTIONAL AUTHENTICATION  
A security system and method for authenticating a user's access to a system is disclosed. The security system receives an authentication request from the user and responds by generating a security...
US20130173915 SYSTEM AND METHOD FOR SECURE NEWORK LOGIN  
Systems and methods for providing an expedited login process that is relatively fast and that still provides a reasonable level of security and a reasonable method for mitigating compromised login...
US20130254858 Encoding an Authentication Session in a QR Code  
A system and method is provided for authenticating logins. An authentication server may receive a request for an authentication code from a requesting site, wherein the request is associated with...
US20130055370 SECURITY FOR FUTURE LOG-ON LOCATION  
A system includes a location look-up module that determines a current location for a user log-on to the network, and determines a next location of the user log-on to the network. An analyzer...
US20150172273 SYSTEMS AND METHODS FOR SECURE PASSWORD ENTRY  
Systems and methods for secure password entry are provided. When a user wishes to log in or otherwise authenticate as an authorized user of a system using a password, the system can provide an...
US20140173707 Disabling Unauthorized Access To Online Services  
The present invention relates to a method that enables a user to easily, quickly, and securely disable access to any or all of the online services they use by means of an application managed by a...
US20140317714 Configuration of Accessories for Wireless Network Access  
A portable computing device can enable an accessory to access a wireless network. In particular, the portable computing device can provide a wireless network access credential to the accessory....
US20150244698 User identity authenticating method and device for preventing malicious harassment  
A user identity authenticating method and device for preventing malicious harassment are described. The method includes: after a user logs in an internet website, unique first authentication code...
US20150143497 IDENTITY AUTHENTICATION BY USING HUMAN BIOLOGICAL CHARACTERISTIC  
A human biological characteristic file corresponding to a particular identity is received and used as a base file. A characteristic code to be authenticated is obtained according to a human...
US20140181941 METHOD AND APPARATUS FOR A SECURE PUBLIC IDENTIFICATION TAG  
A method and apparatus for a secure public identification tag on a sticker, bracelet or temporary tattoo, or other temporary tag. The tag includes a two-dimensional bar code with embedded public...
US20110167485 SYSTEM AND METHOD FOR TOY ADOPTION AND MARKETING  
Provided are a method and computer system that provide a virtual world. A server of the computer system includes a storage subsystem that stores two or more items of different personalized...
US20140380444 OUT-OF-BAND CHALLENGE QUESTION AUTHENTICATION  
A system and method for challenge question authentication comprises determining whether a log-in attempt requires additional authentication. A user attempts to log-in using a first application and...
US20140259135 METHOD AND SYSTEM FOR SIMPLIFIED USER REGISTRATION ON A WEBSITE  
A method and system for providing secure registration with a target website computer in which a user logs into a trusted partner website computer, which returns a link to the target website...
US20150237040 DEVICE AUTHENTICATION IN AD-HOC NETWORKS  
Technologies are generally described for methods and systems effective to authenticate an invited device. In some examples, a method for authenticating an invited device may include receiving, by...
US20150040204 METHOD AND SYSTEM FOR ABSTRACTED AND RANDOMIZED ONE-TIME USE PASSWORDS FOR TRANSACTIONAL AUTHENTICATION  
A security system and method for authenticating a user's access to a target system is disclosed. The security system receives an authentication request from the user and generates a security...
US20130333008 ENHANCED 2CHK AUTHENTICATION SECURITY WITH QUERY TRANSACTIONS  
A security server receives a request of a user to activate a secure communications channel over the network and, in response, transmits an activation code for delivery to the user via another...
US20140033288 Systems and Methods for Enhanced Engagement  
In some embodiments, a method comprises displaying a pre-registration invitation on a first digital device connected to a wireless network, determining one or more wireless network identifiers...
US20110022414 METHOD AND APPARATUS FOR PERSONALLY CONTROLLED SHARING OF MEDICAL IMAGE AND OTHER HEALTH DATA  
A method and apparatus for personally controlled sharing of medical image and other health data are disclosed. According to one aspect, the subject matter described herein includes a method for...
US20150150107 SYSTEMS AND METHODS FOR UNIVERSAL ENHANCED LOG-IN, IDENTITY DOCUMENT VERIFICATION, AND DEDICATED SURVEY PARTICIPATION  
Systems and methods are provided for controlling access via a computer network to a subscriber server. A log-in server receives a query to connect through the computer network to the subscriber...
US20130191904 Systems and Methods for Universal Enhanced Log-In, Identity Document Verification and Dedicated Survey Participation  
Systems and methods are provided for controlling access via a computer network to a subscriber server. A log-in server receives a query to connect through the computer network to the subscriber...
US20140298435 Authentication using three-dimensional structure  
A user can be authenticated via traversal of a three-dimensional structure and entry of an authentication code. For example, a user-entered authentication code can be compared to an authentication...
US20140059665 FRAUD-PROOF LOCATION IDENTIFICATION SYSTEM  
Systems and methods for facilitating check-ins that are resistant to common fraud scenarios while also being relatively inexpensive. One or more embodiments include displaying unique tokens in...
US20120096532 Multimedia Aggregation in an Online Social Network  
Multimedia content is featured on user pages of an online social network using embed codes that are generated using a configuration file associated with the source ID for the multimedia content...
US20120096531 Multimedia Aggregation in an Online Social Network  
Multimedia content is featured on user pages of an online social network using embed codes that are generated using a configuration file associated with the source ID for the multimedia content...
US20120227097 Providing Subscriber Consent in an Operator Exchange  
A method and system for providing a record of consent in scenarios in which the user and a device may have to perform a function that involves two entities that don't trust each other or are not...
US20150012991 SERVICE PROVIDER INVOCATION  
A service provider may provide one or more services to and/or for a client. Providing a service may involve receiving a service request including a security token at the service provider and...
US20140201826 ID USAGE TRACKER  
There is provided a system and computer program product for using a multi-user operating system. A user attempts to access the multi-user operating system. The system prompts the user to enter a...
US20140101744 DYNAMIC INTERACTIVE IDENTITY AUTHENTICATION METHOD AND SYSTEM  
An identity authentication system includes a storage unit, a display character set generation unit, a display unit and a password authentication unit. An identity authentication method includes...
US20120180115 METHOD AND SYSTEM FOR VERIFYING A USER FOR AN ONLINE SERVICE  
A system and method for verifying a user of an online or web service. According to an embodiment, a web page is provided to user for capturing an image of the user together with an embedded...
US20110314111 SYSTEMS AND METHODS FOR FACILITATING RELATIONSHIP MANAGEMENT  
Messages exchanged among users of a relationship management and work collaboration system are organized within user-defined, secure communication channels organized according to user-defined...
US20110088085 PROTECTING PASSWORD FROM ATTACK  
A password may be provided along with a validation code, which can help prevent the password from being sent to the wrong recipient. When a password is created, a validation code may be created...
US20130244901 METHOD AND SYSTEM FOR PROGNOSIS AND TREATMENT OF DISEASES USING PORTFOLIO OF GENES  
This disclosure generally relates to a method, a system and a kit for diagnosing and treating various disease conditions using the gene expression value in a given sample obtained from a subject....
US20110302645 Multi-Channel Multi-Factor Authentication  
Systems and methods for authenticating electronic transactions are provided. The authentication methods employ a combination of security features and communication channels. These security...
US20110302644 Multi-Channel Multi-Factor Authentication  
Systems and methods for authenticating electronic transactions are provided. The authentication methods employ a combination of security features and communication channels. These security...
US20130298210 CERTIFICATE BASED CONNECTION TO CLOUD VIRTUAL MACHINE  
In an environment that includes a host computing system that executes virtual machines, and a secure cloud computing channel that communicatively couples the host to a client computing system that...
US20120233681 METHOD AND SYSTEM OF USER AUTHENTICATION USING A PORTABLE AUTHENTICATOR  
Systems and methods are provided for facilitating access to an electronic device. Password information is stored on the electronic device, and on a portable authenticator. When a user attempts to...
US20110321145 Method for Ensuring Security of Computers Connected to a Network  
A network authentication method is disclosed. A transmission-side client and a reception-side client have the same password. The transmission-side client transmits multiple authentication packets...
US20110023101 SINGLE LOGIN PROCEDURE FOR ACCESSING SOCIAL NETWORK INFORMATION ACROSS MULTIPLE EXTERNAL SYSTEMS  
A social networking system contains information describing users of the social network and various connections among the users. A user can access multiple external systems that communicate with...
US20110277023 Audible authentication for wireless network enrollment  
Described herein are one or more techniques for using an audible authentication of a wireless device for enrollment onto a secure wireless network. With one or more described techniques, an...
US20150096002 Method of Criminal Profiling and Person Identification Using Cognitive/Behavioral Biometric Fingerprint Analysis  
A method of criminal profiling and person identification that utilizes an online identity software-based solution which focuses on the cognitive/behavioral aspects of an individual who is...
US20130347091 Single-Channel Multi-Factor Authentication  
Systems and methods for authenticating electronic transactions are provided. The authentication methods employ a combination of security features. These security features can be based, for...
US20150089613 METHOD AND SYSTEM FOR PROVIDING ZERO SIGN ON USER AUTHENTICATION  
An approach for receiving a request for an authentication code for presentation in an authentication user interface, wherein the request is from a relying party and wherein the authentication user...
US20140237575 Login Security with Short Messaging  
Additional security is provided for on-line account users beyond that which is otherwise conventionally provided by, e.g., longer passwords, passwords that include both characters and numbers,...
US20140237552 AUTHENTICATING MEDIUM, AUTHENTICATING TERMINAL, AUTHENTICATING SERVER, AND METHOD FOR AUTHENTICATION BY USING SAME  
The present invention relates to an authenticating medium, an authenticating terminal, an authenticating server, and a method for authentication by using same. According to the present invention,...
US20130067546 TRANSACTION AUTHENTICATION MANAGEMENT SYSTEM WITH MULTIPLE AUTHENTICATION LEVELS  
An operating system of an information handling system (IHS) initializes a security tool to provide security management during user-to-user transactions. The security tool may determine the user's...
US20140165174 COMPUTER SYSTEM AUTHENTICATION USING SECURITY INDICATOR  
A method to authenticate a first computer system over a network to a second computer system is disclosed. A login user interface (UI) is presented to a user of the first computer system while...