Match Document Document Title
8572727 System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies  
Access-control and information-flow integrity policies are enforced in a computing system by detecting security-sensitive sinks in software code for an application running on the computing system...
8572754 System and method for facilitating unlocking a device connected locally to a client  
Systems and methods for facilitating unlocking a device connected locally to a client, utilizing a server located remotely from the client and the device, are provided in accordance with various...
8566579 Obfuscated authentication systems, devices, and methods  
Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an...
8566904 Enterprise biometric authentication system for a windows biometric framework  
An enterprise biometric authentication system for use with a network of client computing devices, each client computing device executing Windows® 7 operating system with Windows® Biometric...
8566602 Device, system and method for recording personal encounter history  
Provided are exemplary embodiments including a method for creating and using a personal encounter history using a communication device. The method involves the communication device receiving the...
8560836 Method and system for dynamically implementing an enterprise resource policy  
A rules evaluation engine that controls user's security access to enterprise resources that have policies created for them. This engine allows real time authorization process to be performed with...
8560848 Galois/counter mode encryption in a wireless network  
A system including a temporal key module, a nonce module, a security module, and an encryption module. The temporal key module generates a first temporal key used to encrypt a plurality of...
8560851 Managing digital certificates  
A system is provided for managing digital certificates. The system includes a host system, which includes a user interface, a plurality of disparate host certificate stores, and a management tool....
8560837 Automatically estimating clock offset  
A method, system, and program product for use in estimating clock offset in a security environment, the security environment comprising a token generator comprising a token generator clock and an...
8560849 Method and system for secure communication using hash-based message authentication codes  
A system and method for secure communication is provided. A first hash-based message authentication code is generated from a shared secret and a first counter value stored in storage of a...
8561147 Method and apparatus for controlling of remote access to a local network  
The present invention is to ensure security of a local network, e.g., a home network from remote access while allowing remote access. In a method of the present invention, if a device on the local...
8561205 Systems and methods for distributing and viewing electronic documents  
The invention relates to systems and methods for distributing and viewing electronic documents. In one embodiment, the invention provides a system for distributing electronic versions of printed...
8561142 Clustered device access control based on physical and temporal proximity to the user  
A plurality of computing devices used to access backend computing resources of an enterprise by a specific user are identified, and geo-locations of the devices at specific times are tracked. A...
8555340 Method and apparatus for determining authentication capabilities  
A method is disclosed for determining the authentication capabilities of a supplicant before initiating an authentication conversation with a client, for example, using Extensible Authentication...
8555347 Dynamic host configuration protocol (DHCP) authentication using challenge handshake authentication protocol (CHAP) challenge  
A method performed by a Dynamic Host Configuration Protocol (DHCP) server comprising receiving a DHCP DISCOVER message from a DHCP client; generating a challenge in response to the DHCP DISCOVER...
8555072 Attestation of computing platforms  
A method and apparatus for attesting the configuration of a computing platform to a verifier. A signature key (SK) is bound to the platform and bound to a defined configuration of the platform. A...
8555411 Locking mobile devices in a personal area network (PAN)  
A mobile device out of range of other devices in a wireless network may be locked to provide security.
8555350 System and method for ensuring persistent communications between a client and an authentication server  
A system for facilitating persistent communications between entities in a network. In a specific embodiment, the system is adapted to facilitate fast reauthentication of a client performed by a...
8555346 Generating user and avatar specific content in a virtual world  
Generation of user and avatar specific content in a virtual world may include generating a local attribute object. The local attribute object may comprise attributes identifying at least one of...
8555078 Relying party specifiable format for assertion provider token  
A security component may be associated with a network-enabled application. The network-enabled application may request access to restricted content from a relying party (e.g., web site). The...
8555055 Delegation model for role-based access control administration  
Role-based security architecture that facilitates delegated role assignments where role functionality is monotonically decreasing. In furtherance thereof decreasing monotonicity roles are arranged...
8549087 Methods and systems for allocating and indicating trustworthiness of secure communications  
Embodiments of the present invention enable allocating and indicating the trustworthiness of a message, especially messages that comprise content that has been digitally signed. In some...
8549613 Reverse VPN over SSH  
A system and method for enabling access to a computer server operating within a private network, in which the computer server is isolated by access restrictions that prevent incoming connections...
8548165 Method of compressing a cryptographic value  
A computer implemented method of compressing a digitally represented cryptographic value. The method comprising the steps of: (a) selecting a secret value; (b) performing a cryptographic operation...
8549605 System and method for automatically establishing new session with interactive service after previous session expiration  
A system includes a video display and a processor controlling the display. The processor accesses computer readable instructions to cause the processor to access a server associated with the...
8548170 Document de-registration  
A document accessible over a network can be registered. A registered document, and the content contained therein, cannot be transmitted undetected over and off of the network. In one embodiment, a...
8549642 Method and system for using spam e-mail honeypots to identify potential malware containing e-mails  
A method and apparatus for employing honeypot systems to identify potential malware containing messages whereby a decoy system to receive illegitimate e-mails is established. E-mails sent to the...
8549594 Method of identity authentication and fraudulent phone call verification that utilizes an identification code of a communication device and a dynamic password  
A method of identity authentication and fraudulent phone call verification uses an identification code of a communication device and a dynamic password. The “dynamic password” is directly sent to...
8543814 Method and apparatus for using generic authentication architecture procedures in personal computers  
A method and apparatus for authenticating to a third party service provider from a personal computer. The method includes authenticating, with a mobile terminal, to the service provider with a...
8543811 Efficient identity-based ring signature scheme with anonymity and system thereof  
An identity-based ring signature authentication method provides an efficient identity-based ring signature method, which has a constant number of bilinear pairing computations independent the...
8543824 Safe distribution and use of content  
A cryptographic hash of content (e.g., applications, documents, widgets, software, music, videos, etc.) is created and made available for distribution over a network (or by other means) as part of...
8543810 Deployment tool and method for managing security lifecycle of a federated web service  
A method for managing a security lifecycle of a federated web service provider (WSP) is described. The method includes populating a graphical user interface with available security mechanisms,...
8544070 Techniques for non repudiation of storage in cloud or shared storage environments  
Techniques for non-repudiation of storage in cloud or shared storage environments are provided. A unique signature is generated within a cloud or shared storage environment for each file of the...
8543816 Secure, auditable file exchange system and method  
Secure and auditable file exchange between a professional and a client, patient, colleague, or other associate of the professional may be achieved via a file exchange service that automatically...
8543837 Method of randomly and dynamically checking configuration integrity of a gaming system  
In a gaming environment, a method of periodically downloading dynamically generated executable modules at random intervals that perform system configuration integrity checks in a secure and...
8539236 Re-authentication apparatus and method in downloadable conditional access system  
Provided is a re-authentication apparatus in a Downloadable Conditional Access System (DCAS), the re-authentication apparatus includes: a receiving unit to receive a key request message from a...
8539553 System and method for managing delivery of internet content  
Disclosed are a system and method for managing delivery of pushed web content to communication devices. In an embodiment, the method comprises: uniquely identifying a communication device to which...
8539244 Server, authentication server, content delivery system, and program  
A service provider server has management means which manages a user ID corresponding to a service user and a device IDs corresponding to an information processing terminals of the service user in...
8539093 Port discovery and message delivery in a portable electronic device  
In accordance with some embodiments, a computer-implemented method for fetching email from an email server to a portable electronic device is disclosed. The method includes, at a portable...
8533786 Method and apparatus for protecting against attacks from outside content  
A method and apparatus for protecting against attacks from outside content is described. In one example, a request is received from a user to access content from a second domain. An active session...
8533070 Apparatus and method for aggregating and accessing data according to user information  
An apparatus and method for aggregating and accessing data according to user information are provided. According to one aspect, an interface device for providing data between a first device and a...
8533463 Reduced computation for generation of certificate revocation information  
A method and apparatus for propagating certificate revocation information. A first query is received regarding a revocation status of a first digital certificate. One or more additional queries...
8533459 Method and apparatus for protecting the transfer of data  
According to one embodiment, a conditional access (CA) control system comprises circuitry that is adapted to: (i) transmit information including a unique identifier assigned to a digital device...
8533801 System and method for binding a subscription-based computing system to an internet service  
A system for binding a subscription-based computer to an internet service provider (ISP) may include a binding module and a security module residing on the computer. The binding module may...
8533479 Translating information between computing devices having different security management  
A system and method for communicating a document between multiple locations is disclosed. A computing device receives, via a network, multiple portions of a document signed and/or encrypted at a...
8533458 Headend system for downloadable conditional access service and method of operating the same  
A method of operating a headend system for a downloadable conditional access service, the method including: receiving, by an Authentication Proxy (AP) server, basic authentication information from...
8533460 Key camouflaging method using a machine identifier  
A method is provided for generating a human readable passcode to an authorized user including providing a control access datum and a PIN, and generating a unique machine identifier for the user...
8527770 System and method for provisioning device certificates  
A method is provided for provisioning a device certificate on a device. The device is configured to communicate wirelessly with a plurality of backend servers via a communication network. The...
8528060 Method and system for password protocols in the bounded retrieval mode with security dictionary attacks and intrusions  
Efficient secure password protocols are constructed that remain secure against offline dictionary attacks even when a large, but bounded, part of the storage of a server responsible for password...
8528109 Optimizing amount of data passed during software license activation  
During a software activation process, a processing device may provide a software license key to be communicated to an activation authority. The software license key may be provided to the...