Match Document Document Title
US20120227098 SHARING USER ID BETWEEN OPERATING SYSTEM AND APPLICATION  
One or more techniques and/or systems are disclosed for authenticating a user of an application using an operating system. A user can log onto their device, such as at power-up, using a...
US20150207631 ACCESSORY IDENTIFICATION FOR MOBILE COMPUTING DEVICES  
Embodiments disclosed herein provide for identification processes and/or procedures for accessories coupled with a mobile computing device. During identification an accessory can communicate lingo...
US20150180868 Security Token Caching in Centralized Authentication Systems  
Methods, systems, and devices for determining a time-expiry algorithm based on a cached and verified security token, a disposition of the security token, and a cache table, where the disposition...
US20150012996 SERVICE PROVIDER INVOCATION  
A service provider may provide one or more services to and/or for a client. Providing a service may involve receiving a service request including a security token at the service provider and...
US20140289838 SYSTEM AND METHOD FOR PROVIDING A REST-BASED MANAGEMENT SERVICE IN A TRAFFIC DIRECTOR ENVIRONMENT  
Described herein are systems and methods for providing software administration tools, for use in administering server configurations, such as in a traffic director or other type of server...
US20130081128 SYSTEM AND METHOD FOR PROVIDING A REST-BASED MANAGEMENT SERVICE IN A TRAFFIC DIRECTOR ENVIRONMENT  
Described herein are systems and methods for providing software administration tools, for use in administering server configurations, such as in a traffic director or other type of server...
US20130117822 METHOD AND SYSTEM FOR SECURE TELETRANSMISSION  
A system for secure teletransmission destined for a receiving person includes a secure server comprising a program providing a redemption code and a designation code for designating an object to...
US20130111574 SYSTEM FOR THE DISPLAY, BY A USER, OF MULTIMEDIA CONTENT ITEMS  
A system for the display, by a user, of multimedia content items, including a network which comprises: a server with a memory in which the multimedia content items are saved, at least one device...
US20120124656 Method and system for mobile device based authentication  
In this specification, access may be provided to secure systems by authentication using mobile devices. Users may register a mobile device and password with an authentication system. To access a...
US20120095919 SYSTEMS AND METHODS FOR AUTHENTICATING ASPECTS OF AN ONLINE TRANSACTION USING A SECURE PERIPHERAL DEVICE HAVING A MESSAGE DISPLAY AND/OR USER INPUT  
Systems and methods for authenticating aspects of an online transaction using a secure peripheral device having a message display and/or user input are provided. One such method for establishing a...
US20130125223 System And Method For Transparently Authenticating A User To A Digital Rights Management Entity  
Various embodiments of a system and method for transparently authenticating a user to a digital rights management entity are described. In various embodiments, a digital rights management server...
US20110296512 METHOD FOR READING ATTRIBUTES FROM AN ID TOKEN  
The invention relates to a method for reading at least one attribute stored in an ID token where the ID token is associated with a user, having the following steps: the user is authenticated to...
US20130263242 TENANT DRIVEN SECURITY IN A STORAGE CLOUD  
Tenant driven security in a storage cloud is provided. A method includes determining whether a tenant places a physical key into a slot associated with a hard disk provided by a service provider....
US20150007301 Identity-independent authentication tokens  
Identity-independent authentication tokens enable issuance of a single strong credential that can be mapped to an individual at each of multiple accounts within the online world. An issuer...
US20120151077 Systems And Methods For Distributed Authentication Of Video Services  
Various embodiments of the present invention provide systems and methods for providing distributed authentication of subscribers of a content operator to a content provider. In particular...
US20150106907 METHOD AND SYSTEM FOR SECURE CO-BROWSING OF PATIENT RECORDS ON COMMUNICATION DEVICES  
A method and system are provided for co-browsing of patient records on communication devices. The method includes setting up a communication session between a first communication device and one or...
US20140337956 SYSTEM AND METHOD FOR MULTIFACTOR AUTHENTICATION AND LOGIN THROUGH SMART WRIST WATCH USING NEAR FIELD COMMUNICATION  
A system and method for multifactor authentication and login using a smart wrist watch with at least one NFC (Near Field Communication) technology tag, with a computing device such as mobile, pda,...
US20150039908 System and Method for Securing A Credential Vault On A Trusted Computing Base  
A method for utilizing a secure credential vault on a mobile computing device includes: prompting a user for and receiving from the user a credential vault password; prompting a user for and...
US20150101034 SYSTEM AND METHOD FOR A FACET SECURITY FRAMEWORK  
An example method is provided and includes intercepting an action request from an entity for an action to be performed with respect to a resource in a cloud environment, where the action request...
US20120272307 Multi-Factor Authentication Using A Smartcard  
Methods and systems are provided for non-cryptographic capabilities of a token such as a smartcard to be used as an additional authentication factor when multi-factor authentication is required....
US20140096223 AUTOMATED SECURITY TOKEN ADMINISTRATIVE SERVICES  
This invention provides a system, method and computer program product to allow a user to access administrative security features associated with the use of a security token. The administrative...
US20120124657 AUTOMATED SECURITY TOKEN ADMINISTRATIVE SERVICES  
This invention provides a system, method and computer program product to allow a user to access administrative security features associated with the use of a security token. The administrative...
US20140096219 Assisted Registration of Audio Sources  
Systems and methods are provided for assisting a user with setting up an audio system with audio content services the user is already registered with. One method may involve receiving a list of a...
US20150058964 Streaming Music Using Authentication Information  
Systems and methods are provided for assisting a user with setting up an audio system with audio content services the user is already registered with. One method may involve receiving a list of a...
US20130104219 CENTRALIZED AUTHENTICATION FOR MULTIPLE APPLICATIONS  
Network applications can provide network security without containing any security code or otherwise verifying the authenticity of each request that they receive for service. Instead, a single,...
US20120265997 PRIVACY-PRESERVING FLEXIBLE ANONYMOUS-PSEUDONYMOUS ACCESS  
Systems and methods are disclosed for privacy-preserving flexible user-selected anonymous and pseudonymous access at a relying party (RP), mediated by an identity provider (IdP). Anonymous access...
US20140115683 SYSTEMS AND METHODS FOR PEER-TO-PEER ONLINE VERIFICATION USING THIRD PARTY AUTHENTICATION  
The present disclosure is directed to methods and systems for indicating bias-less trust levels to online users for the purpose of facilitating safe and secure online purchase transactions within...
US20120278876 SYSTEM, METHOD AND BUSINESS MODEL FOR AN IDENTITY/CREDENTIAL SERVICE PROVIDER  
A methodology, system and business model are disclosed for facilitating a fully automated electronic identity service between a group of consumers and a group of service providers. The system...
US20140337955 AUTHENTICATION AND AUTHORIZATION WITH A BUNDLED TOKEN  
Authentication and authorization can be performed with a bundled token, which encapsulates two or more security tokens in a single security token. The bundled token can be supplied in response to...
US20110023103 METHOD FOR READING ATTRIBUTES FROM AN ID TOKEN  
The invention relates to a method for reading at least one attribute stored in an ID token (106, 106′), wherein the ID token is assigned to a user (102), comprising the following steps:...
US20110126275 SYSTEM AND METHOD FOR DISCOVERY ENRICHMENT IN AN INTELLIGENT WORKLOAD MANAGEMENT SYSTEM  
The system and method described herein for discovery enrichment in an intelligent workload management system may include a computing environment having a model-driven, service-oriented...
US20140245417 CENTRALIZED SECURE MANAGEMENT METHOD OF THIRD-PARTY APPLICATION, SYSTEM AND CORRESPONDING COMMUNICATION SYSTEM  
A technique is provided for performing a centralized secure management on a third-party application. The technique includes receiving, by the centralized secure management system, an identity, an...
US20130312077 USER AUTHENTICATION  
A user authentication method and system. A computing system receives from a user, a first request for accessing specified functions executed by a specified software application. The computing...
US20130340063 SYSTEMS AND METHODS FOR ACCESSING A VIRTUAL DESKTOP  
Methods, computer-readable storage medium, and systems described herein facilitate enabling access to a virtual desktop of a host computing device. An authentication system receives one of an...
US20130047247 ACCESS MANAGEMENT SYSTEM, ACCESS MANAGEMENT METHOD, ACCESS MANAGEMENT SERVER, COOPERATION SERVER, AND COMPUTER-READABLE MEDIUM  
A system includes an access management server and a cooperation server, wherein the access management server comprises issuance unit that issues a token corresponding to the managed user account...
US20150229638 MOBILE CLOUD SERVICE ARCHITECTURE  
Techniques are described for implementing a cloud computer system to facilitate communication between a computing device (e.g., a mobile computing device) and enterprise computer systems. In...
US20150052592 Methods and Systems for Using Derived User Accounts  
Methods, systems and articles of manufacture consistent with features of the present invention allow the generation and use of derived user accounts, or DUA, in a computer system comprising user...
US20120254971 CAPTCHA METHOD AND SYSTEM  
A CAPTCHA method executed by a CAPTCHA system is provided, comprising: receiving a CAPTCHA request comprising category information of an application service from an application server; responding...
US20140282989 Actively Federated Mobile Authentication  
To make a trusted web service call, a client application sends a series of messages to obtain tokens that allow service requests to pass through a service relay. The user obtains a first security...
US20130007846 Methods and Arrangements for Authorizing and Authentication Interworking  
This disclosure relates to a portable communication device and a network-side authorization server, and to methods therein. By splitting the functionality of an OAuth authorization server and...
US20100319064 DIGITAL CONTENT ACQUISITION SYSTEM AND TECHNIQUES  
A network- and/or client-side digital content acquisition system facilitates automatic and simplified transactions, between a user of a consumer electronic device (“CED”) and a digital content...
US20140245418 AUTOMATIC SIGN IN OF A USER AT MULTIPLE ENDPOINTS  
The present disclosure is directed to methods and systems for user registration, where a user is logged in to a first device in communication with a server, including: receiving an anonymous...
US20140337958 SECURITY FRAMEWORK FOR HTTP STREAMING ARCHITECTURE  
Methods and apparatus for preventing unauthorized access to online content, including in particular streaming video and other media, are provided. In various embodiments, techniques are provided...
US20140123263 COMPUTER-IMPLEMENTED METHOD FOR MOBILE AUTHENTICATION AND CORRESPONDING COMPUTER SYSTEM  
In one embodiment of the present invention a computerized method includes receiving at a personal-mobile device a first communication, which includes information for requesting user verification...
US20130091559 Computer-Implemented Method for Mobile Authentication and Corresponding Computer System  
In one embodiment of the present invention a computerized method includes receiving at a personal-mobile device a first communication, which includes information for requesting user verification...
US20140047522 REQUEST AUTHENTICATION TOKEN  
An authentication mechanism for use in network-based services generates an authentication token. The authentication token is provided to a client device as part of the code comprising a content...
US20100313258 IDENTIFYING SYNONYMS OF ENTITIES USING A DOCUMENT COLLECTION  
Identifying synonyms of entities using a collection of documents is disclosed herein. In some aspects, a document from a collection of documents may be analyzed to identify hit sequences that...
US20150200780 IDENTIFICATION AND/OR AUTHENTICATION METHOD  
A computer-implemented authentication method allows a user having a personal electronic device (PED) to login to a recipient system. The user establishes an account on an authentication server,...
US20150215312 SYSTEM AND METHOD FOR SECURE SINGLE OR MULTI-FACTOR AUTHENTICATION  
The present invention utilizes token-based authentication to verify the identity of a user computer. A host server computer transmits a main challenge via light code to an ancillary computer or...
US20110078779 Anonymous Preservation of a Relationship and Its Application in Account System Management  
Disclosed is a system or method of using hash functions to preserve a relationship. A relationship is anonymously preserved by storing the hash result of a relationship token that comprises a...