Matches 1 - 50 out of 203 1 2 3 4 5 >


Match Document Document Title
9036820 System and methods for UICC-based secure communication  
A system that incorporates the subject disclosure may include, for example, instructions which when executed cause a device processor to perform operations comprising sending a service request to...
9025769 Method of registering smart phone when accessing security authentication device and method of granting access permission to registered smart phone  
A method for registering a Smartphone when accessing security authentication device and a method for access authentication of a registered Smartphone are provided. When a Smartphone based...
8959620 System and method for composing an authentication password associated with an electronic device  
A method for composing an authentication password associated with an electronic device is implemented by a password composing system including a display, a receiving unit, and a processing unit....
8953798 Enhanced cryptographically generated addresses for secure route optimization in mobile internet protocol  
Enhanced cryptographically generated addresses (ECGAs) for MIPv6 incorporate a built-in backward key chain and offer support to bind multiple logically-linked CGAs together. Enhanced CGAs may be...
8950000 Application digital rights management (DRM) and portability using a mobile device for authentication  
A method, system, and medium are provided for operating a computing device and a mobile device to access computer software with a secure access and to access a packet network, and for operating a...
8914859 Managing the progressive legible obfuscation and de-obfuscation of public and quasi-public broadcast messages  
Obfuscating a message, in one aspect, may include detecting sensitive information in a message to be broadcast into public or quasi-public computer network environment; replacing the sensitive...
8880898 Anti-roll-back mechanism for counter  
A method of maintaining a version counter indicative of a version of memory content stored in a processing device. The method comprises selectively operating the device in a first or second mode....
8855602 Master cipher key  
A mobile telecommunications network and method of operation that includes establishing a first user plane connection between a telecommunications device registered with the network and a network...
8848912 Terminal identification method, authentication method, authentication system, server, terminal, wireless base station, program, and recording medium  
A terminal identification method is provided which enables two-way communications between terminals and a network while identifying terminal IDs and protecting privacy. Also, authentication method...
8793765 Data processing apparatus and computer-readable recording medium  
Disclosed is a data processing apparatus providing a predetermined function by executing a program for the data processing apparatus, including a first storage unit that stores encoded execution...
8775795 Authenticating method and mobile terminal for code division multiple access (CDMA) evolution to packet data optimized (EVDO) network  
The successful authenticating of a Network Access Identifier (NAI) process is enabled by an authenticating method and a mobile terminal for a Code Division Multiple Access (CDMA) EVolution to...
8776259 DRM system  
A method of and system for digital rights management, in which access to a piece of content is granted in accordance with a license owned by a license owner to a client who is a member of a...
8769612 Portable device association  
A technique that enables a portable device to be automatically associated with a plurality of computers. Information that a computer can use to authenticate a portable device and establish a...
8750506 Methods, nodes, system, computer programs and computer program products for secure user subscription or registration  
Methods and apparatus facilitate secure user subscription or registration to a service at least partly enabled in a network. The network comprises user equipment adapted to perform generic...
8745730 Secure computer provisioning and operation  
A networked computer device can be customized to contain provisioning and/or authorization logic in its firmware or the firmware of one of its subcomponents. The computer device is thus configured...
8738898 Provision of secure communications connection using third party authentication  
The present invention relates to communications, and in particular though not exclusively to forming a secure connection between two untrusted devices. The present invention provides a method of...
8732445 Information processing device, information processing method, information processing program, and integrated circuit  
An information processing terminal includes first sealed data respectively having usability conditions of matching with predetermined terminal environment information during a secure boot and...
8731521 Methods and apparatus of over-the-air programming of a wireless unit  
Facilitation of secure over-the-air programming is provided herein. A device can store a key, which can be based on a key algorithm (K-algorithm) and an identifier associated with the device. The...
8725113 User proximity control of devices  
Examples of embodiments provide systems and methods for varying the functions of an electronic device according to a physical relationship (e.g. the distance) between the electronic device and the...
8707390 System and method for secure access control in a wireless network  
Secure access to a wireless network access can be provided in a system where wireless devices access a wireless network through a wireless access point (WAP). For example, a plurality of...
8701168 Method and apparatus for associating a digital certificate with an enterprise profile  
One embodiment of the present invention provides a system that associates a digital certificate with an enterprise profile. During operation, an identity store receives a digital certificate from...
8701184 Authentication apparatus, authentication method, and computer-readable recording medium storing authentication program  
An authentication apparatus includes: a database section that stores a password; an entry section through which a password is entered; a storage section that stores an entered password which is...
8695080 Information terminal apparatus, information processing apparatus and information communication system  
When transmitting position/time information calculated by means of a GPS function to a server apparatus, authentication is carried out with the server apparatus. The position/time information may...
8683574 Identity driven peer-to-peer (P2P) virtual private network (VPN)  
Techniques for identity-based Peer-to-Peer (P2P) Virtual Private Networks (VPN's) are provided. First and second principals authenticate to a trusted third party. The first principal subsequently...
8683580 Image forming apparatus, image forming system, and authentication device  
An image forming apparatus includes: an authentication unit that can execute a login process and a logout process; an operation unit that receives an instruction for the logout process from the...
8676198 Method of supporting location privacy  
A method of supporting location privacy of a mobile station includes receiving, from a base station, a message including a temporary station identifier (TSTID) during an initial ranging procedure,...
8671457 Method and system for identifying and correcting location discrepancies for reception equipment in a content delivery network  
A method and system is provided to analyse receiver indicia of location for a set of at least one receivers to determine whether a receiver has an erroneous indicator of location. The embodiment...
8666408 Method of supporting location privacy  
A method of supporting location privacy of a mobile station includes receiving, from a base station, a temporary station identifier (TSTID) during an initial ranging procedure; transmitting a...
8656480 Method for negotiating security-related functions of subscriber station in wireless portable internet system  
The present invention relates to a subscriber station security-related parameter negotiation method in a wireless portable Internet system. The subscriber station security-related parameter...
8649763 Highly secured portable telephone system and information system  
In order to solve the problem in that information relating to a specific purpose can be saved in the internal memory of a mobile apparatus on which a permanent memory is mounted while information...
8646044 Mandatory integrity control  
The contemplated embodiments of the invention provide a method for implementing a mandatory integrity control (MIC) system that provides access control for each and every object and subject that...
8644506 Location-based security rules  
Location based security rules are provided for preventing unauthorized access to a device, application, system, content, and/or network, etc. The location-based security rules enable a user,...
8633798 Computer system with security apparatus  
A computer system includes a computer, a fingerprint reader, and a security apparatus to apply complete security for the benefit of an authorized user. The computer includes a first interface, a...
8627410 Dynamic radius  
A system includes a remote authentication dial in user service (RADIUS) server in communication with a network access server. The network access server provides an authentication request to the...
8625793 Resynchronization for push message security using secret keys  
A method for a server to initiate resynchronization with an access terminal, when synchronization has been lost, that cannot be exploited by attackers is provided. The server may provide the...
8621569 Intercluster relationship management  
Data storage and management systems can be interconnected as clustered systems to distribute data and operational loading. Further, independent clustered storage systems can be associated to form...
8620315 Multi-tiered anti-abuse registration for a mobile device user  
Various embodiments are directed to providing a multi-tiered anti-abuse approach to registration of a mobile device user. A registration service may determine whether communications with the...
8615659 System and method for acquiring terminal binding key  
A first terminal subscribes to at least one service using a service guide in which information necessary for reception of each service is stored, and sends the service guide and an identifier (ID)...
8613064 Method and apparatus for providing a secure authentication process  
A method and apparatus for providing a secure authentication process is described. In one embodiment, a method for a method for providing a secure authentication process includes monitoring login...
8613046 Far-end control method with security mechanism  
The present invention relates to a far-end control method with a security mechanism including a host transmitting an identification code through the PSTN (Public switched telephone network) to the...
8605901 System and method for provisioning a home agent in a network environment  
A method is provided in one example embodiment and includes communicating an access request to an authentication, authorization, and accounting (AAA) element. The access request is configured to...
8606237 Methods and apparatus of over-the-air programming of a wireless unit  
Systems, methods, and apparatus for facilitating secure over-the-air (OTA) programming are presented herein. A device can store a key, which can be based on a key algorithm (K-algorithm) and an...
8601571 Multi-user computer system and remote control method thereof  
A multi-user computer system and a remote control method for the multi-user computer system includes a remote controller, with an input unit that receives a remote-control password to remotely...
8595853 DRM system  
A method of and system for digital rights management, in which access to a piece of content is granted in accordance with a license owned by a license owner to a client who is a member of a...
8595485 Security management method and system for WAPI terminal accessing IMS network  
The present invention discloses a security management method and a security management system for a WAPI terminal accessing an IMS network. The method comprises: an authentication service unit...
8590028 Content licensing and conditional access using a mobile device  
Techniques and tools are described which provide control access mechanisms for contents made available by a service provider to a user. The user, after a registration process, uses a mobile...
8588743 Communication device and communication system  
A communication device capable of preventing interference due to collision of signals of a plurality of communication devices (slaves) is provided. The communication device characterized by having...
8572696 Contextual data aided security protection  
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for providing contextual data aided security protection. In one aspect, a method includes...
8559947 System and method to enable subscriber self-activation of wireless data terminals  
The present invention relates to a system and method to enable subscriber self-activation and configuration of wireless data terminals by means of an activate button provided through the User...
8553883 Method and apparatus for managing subscription credentials in a wireless communication device  
According to the teachings presented herein, a wireless communication device reverts from subscription credentials to temporary access credentials, in response to detecting an access failure. The...

Matches 1 - 50 out of 203 1 2 3 4 5 >