AcclaimIP-ad

Match Document Document Title
US20150047031 SECURING EXECUTION OF CUSTOMER-SUPPLIED NETWORK PAGE GENERATION CODE  
Disclosed are various embodiments for securing execution of page generation code supplied by customers. The page generation code may be instrumented with code that facilitates monitoring of one or...
US20110196731 SECURE COUPON DISTRIBUTION  
Systems and method are provided for ensuring secure and validated coupon generation and distribution, and the prevention of fraudulent coupon printing. A Uniform Resource Locator (URL) is provided...
US20150220748 3D PRINTING IN MARKETPLACE ENVIRONMENTS  
Systems, methods, and media for authorizing 3D printing services in a marketplace environment are provided. In one example, a system comprises a computing device that implements a 3D printing...
US20120029938 Anonymous Healthcare and Records System  
Described herein is using cryptographic techniques (anonymous proof systems) to ensure the anonymity of health records when processing payment claims related to insurers and pharmacies. A patient...
US20150193622 CODE PROPERTY ANALYSIS FOR SECURITY MITIGATIONS  
Attempts to make code secure often are associated with performance penalties. To facilitate striking an acceptable balance between performance and security, vulnerable areas of source code are...
US20140245440 Software Inspection System  
A method for software inspection analyzes a body of computer code to assess whether the body of computer code contains malware. Various embodiments extract the executable elements of the body of...
US20130024925 LIGHTWEIGHT DIRECTORY ACCESS PROTOCOL (LDAP) PROXY  
Two factor LDAP authentication systems and methods are presented. In one embodiment, implementation of a method for authenticating a user through a two factor process includes: at an LDAP proxy...
US20120222127 AUTHENTICATING A WEB PAGE WITH EMBEDDED JAVASCRIPT  
A method for detecting if a digital document (e.g. an HTML document) is changed by others than authenticated script code (e.g. JavaScript code) is presented. The method includes loading the...
US20110099629 AUTHENTICATING A WEB PAGE WITH EMBEDDED JAVASCRIPT  
A method for detecting if a digital document (e.g. an HTML document) is changed by others than authenticated script code (e.g. JavaScript code) is presented. The method comprises loading the...
US20110219447 Identification of Unauthorized Code Running in an Operating System's Kernel  
Computer implemented methods, system and apparatus for managing execution of a running-page in a virtual machine include associating an execution trace code with the running page by a security...
US20130055409 DYNAMIC REDEMPTION CODES  
Information regarding a redemption code may include at least one parameter associated with certain redeemable content. Requests may be received from a user. The request may concern access to...
US20120255027 DETECTING CODE INJECTIONS THROUGH CRYPTOGRAPHIC METHODS  
Code injection is detected based on code digests associated with hashes of selected portions of content supplied to clients by a server. A client receives the content and generates a corresponding...
US20150113626 Customized Log-In Experience  
Techniques for a customized log-in experience are described in which, script associated with a log-in page is configured to recognize a domain identifier associated with a user log-in attempt via...
US20150012976 Computer-implemented method and system for controlling access for a tag reader to an information page on a server system  
A computer-implemented method and server system controls access to an information page for a tag reader. The page is associated with a tag and identified by a first page identifier. A first...
US20120011560 Dynamic Policy Trees for Matching Policies  
A system and method is provided for evaluating one or more security policies. Security policies may be analyzed to determine one or more policy attributes based on which one or more policy trees...
US20110246235 MULTI-FACTOR AUTHENTICATION FOR REMOTE ACCESS OF PATIENT DATA  
The present disclosure is directed to authenticating a mobile device and a user of the mobile device to receive patient data from a clinical information system of a medical facility. In some...
US20120042366 SECURE AND USABLE AUTHENTICATION FOR HEALTH CARE INFORMATION ACCESS  
Embodiments of the invention relate to providing a health care provider access to an electronic record of a patient may be provided. A determination is made as to whether the health care provider...
US20140033304 METHOD AND APPARATUS FOR PREVENTING AN IDT-BASED SECURITY SANDBOX FROM CAUSING A KERNEL PANIC WHEN USING A CALL GATE  
A method and apparatus for preventing an IDT-based security sandbox from causing a kernel panic when using a call gate is disclosed. The method comprises receiving a request from an application to...
US20150180855 DUAL CODE AUTHENTICATION SYSTEM  
A verification method and system are disclosed that verify a user. The user is provided a verification code via, for example, a website, to be communicated to the system via an application on a...
US20110251854 PC-BASED ACCESS METHOD BETWEEN ELECTRONIC MEDICAL RECORD SYSTEM AND INTERNET-BASED PERSONAL HEALTH RECORD ACCOUNT  
A PC-based access method between an EMR system and an Internet-based PHR account is disclosed. A doctor inquires and creates the EMR data on a patient recorded in the EMR system of a...
US20140250512 USER AUTHENTICATION  
User Authentication A mobile user authentication application is operable to perform one or more of the following operations: •authenticate a user in a voice call to a telephony service, by passing...
US20140380508 METHOD AND SYSTEM FOR AUTHENTICATING USER IDENTITY  
Embodiments of the present application relate to a method for authenticating user identity, a system for authenticating user identity, and a computer program product for authenticating user...
US20120192264 PRINTER CAPABLE OF AUTHENTICATING USER, PRINT MANAGEMENT SYSTEM INCLUDING THE PRINTER AND COMPUTER READABLE DEVICE STORING USER AUTHENTICATION PROGRAM  
In a printing apparatus, a controller authenticates a user with using first authentication information, and printing is allowed according to successful authentication using the first...
US20150154360 SYSTEMS AND METHODS FOR SECURE EXCHANGES OF INFORMATION  
The disclosure herein pertains to systems and methods for communicating information regarding patients which include authorizing a plurality of care providers to access an informational interface...
US20120180114 Method and System for Subscriber to Log in Internet Content Provider (ICP) Website in Identity/Location Separation Network and Login Device Thereof  
The present invention provides a method and system for a user to log in an Internet Content Provider (ICP) website in an identification location separation network and a login device thereof. The...
US20130191918 Identifying Trojanized Applications for Mobile Environments  
Trojanized apps for mobile environments are identified. Multiple apps for a specific mobile environment are obtained from one or more external sources. Code and digital signers are extracted from...
US20140245392 Systems, Methods, and Computer Program Products for Authenticating Human Users of a Computer System  
A computer program product having a computer readable medium tangibly recording computer program logic for use in a secure computer system with a first human user and a second human user being...
US20130205388 SELECTIVE RANDOMIZATION FOR NON-DETERMINISTICALLY COMPILED CODE  
A method and an apparatus for runtime compilation that generates non-deterministic and unpredictable code to protect against un-trusted code attacks are described. The runtime compilation may be...
US20130127615 Sanitization compliance monitoring system with security enhancements  
A sanitization compliance monitoring system comprises care giver badges, patient bed beacons associated with patient beds, dispenser beacons associated with sanitization dispensers, and a central...
US20150193278 ADMINISTERING A LOCK FOR RESOURCES IN A DISTRIBUTED COMPUTING ENVIRONMENT  
In a distributed computing environment that includes compute nodes, where the compute nodes execute a plurality of tasks, a lock for resources may be administered. Administering the lock may be...
US20150193277 ADMINISTERING A LOCK FOR RESOURCES IN A DISTRIBUTED COMPUTING ENVIRONMENT  
In a distributed computing environment that includes compute nodes, where the compute nodes execute a plurality of tasks, a lock for resources may be administered. Administering the lock may be...
US20150242650 DOCUMENT CONTROL BASED ON COPYRIGHT PERMISSION WHEN PRINTING COMPILATION OF WORKS  
A method for controlling copyright permissions when assembling multiple copyrighted works into a compiled file. The copyright permission level of each file is analyzed, either based on the...
US20130174280 DOCUMENT CONTROL BASED ON COPYRIGHT PERMISSION WHEN PRINTING COMPILATION OF WORKS  
A method for controlling copyright permissions when assembling multiple copyrighted works into a compiled file. The copyright permission level of each file is analyzed, either based on the...
US20150205951 SYSTEMS AND METHODS FOR SQL QUERY CONSTRAINT SOLVING  
The present invention relates to systems and methods for analyzing SQL queries for constraint violations, which may indicate injection attacks. The systems and methods tokenize a SQL query to...
US20150256543 TEMPORARILY PROVIDING HIGHER PRIVILEGES FOR COMPUTING SYSTEM TO USER IDENTIFIER  
A root user identifier of a computing system is disabled. Thereafter, and in response to determining that a problem with the computing system requires root privileges to the computing system to...
US20110083163 Temporarily providing higher privileges for computing system to user identifier  
A root user identifier of a computing system is disabled. Thereafter, and in response to determining that a problem with the computing system requires root privileges to the computing system to...
US20140359721 Live Tiles Without Application-Code Execution  
This document describes techniques enabling live tiles without application-code execution. These techniques permit live content to be presented in tiles without executing code of applications...
US20140068718 FLATTENING PERMISSION TREES IN A VIRTUALIZATION ENVIRONMENT  
A virtualization manager receives a permission request indicating a user and an entity in a virtual machine system. The virtualization manager flattens a permissions database to generate a...
US20140230017 PROGRAMMABLE SECURITY TOKEN  
Systems and methods are described for programmable security token. A programmable security token includes an input interface configured to receive post-vendor customization of a parameter used to...
US20100306828 Method for Secure Validation Utilizing Existing Validation Framework  
Granting secure access to stored digital medical information to patients or healthcare providers facilitates information exchange in healthcare. Payment for healthcare services can be accomplished...
US20150113589 AUTHENTICATION SERVER ENHANCEMENTS  
A set of authentication server configuration rules are implemented. The authentication server configuration rules utilize regular-expression based commands. A running log of commands entered by...
US20150178510 METHOD AND SYSTEM FOR CHILD AUTHENTICATION  
Methods and systems for child authentication are described. In one embodiment, a communication enablement request may be received to enable electronic communications between a first child and a...
US20110035799 METHOD AND SYSTEM FOR CHILD AUTHENTICATION  
Methods and systems for child authentication are described. In one embodiment, a communication enablement request may be received to enable electronic communications between a first child and a...
US20150046992 INDEPENDENT ADMINISTERING OF VERIFIED USER-CONTROLLED ELECTRONIC IDENTIFICATIONS UTILIZING SPECIFICALLY PROGRAMMED COMPUTER-IMPLEMENTED METHODS AND COMPUTER SYSTEMS  
In some embodiments, the instant invention provides for a central identification management computer system that includes at least: a computer programmed with software instructions that at least...
US20130036473 SYSTEM AND METHOD FOR BRANCH FUNCTION BASED OBFUSCATION  
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for obfuscating branches in computer code. A compiler or a post-compilation tool can obfuscate branches by...
US20140366134 Malicious Code Blocking Method Using Management System for Monitoring Status of Vaccine  
The present invention relates to a malicious code blocking method using a management system for monitoring a state of a vaccine, and more specifically, to a malicious code blocking method using a...
US20120278101 SYSTEM AND METHOD FOR CREATING TRUSTED USER COMMUNITIES AND MANAGING AUTHENTICATED SECURE COMMUNICATIONS WITHIN SAME  
A system and method of creating trusted communities of users and managing communications by and between said trusted users are disclosed. In one embodiment, a system is depicting implementing a...
US20150013011 MODULAR STATIC APPLICATION SECURITY TESTING  
Methods, systems, and computer-readable storage media for analyzing source code of an application. In some implementations, actions include determining, for at least one procedure invoked by the...
US20130167244 System for Managing Risk in Employee Travel  
A system for managing risk in employee travel may control access by users to the travel risk management system. The travel risk management system may receive and store company information for a...
US20140189816 EXTENDING SERVER-BASED DESKTOP VIRTUAL MACHINE ARCHITECTURE TO CLIENT MACHINES  
A server-based desktop-virtual machines architecture may be extended to a client machine. In one embodiment, a user desktop is remotely accessed from a client system. The remote desktop is...