Match Document Document Title
8527755 Methods and systems for effecting transmitter and receiver synchronization between a transmitter and a receiver of a transmitter/receiver network  
Methods for effecting transmitter and receiver synchronization are disclosed. A method includes reading an authentication key value that is calculated by a receiver that is to receive protected...
8528078 System and method for blocking unauthorized network log in using stolen password  
The authenticity of a website is determined using a unique string of characters known only to the user and the website on each page of the website that is displayed to the user, with a false site...
8522010 Providing remote user authentication  
Providing a remote computer user authentication service involves providing a reference to a user authentication service in a host server's source code (e.g., website source code). Further,...
8521133 System, method and terminal for communication between WAPI terminals  
The present invention provides a system, method and terminal for communication between WAPI terminals, and the method includes: a calling terminal that has a WAPI function sending a WAPI link...
8520850 Downloadable security and protection methods and apparatus  
Methods and apparatus for control of data and content protection mechanisms across a network using a download delivery paradigm. In one embodiment, conditional access (CA), digital rights...
8522037 Motion-detecting device user authentication  
Systems, methods, and computer program products are provided for user authentication required for conducting online financial institution transactions. The disclosed embodiments leverage the...
8522043 Hardware-based computer theft deterrence  
A hardware-based security module is used to protect an electronic device, especially a portable electronic device. The security module may determine either via timeout of a watchdog timer or via...
8522328 Measurement device and method for logging use of the measurement device  
In a method for managing use information of a measurement device, an operating interface of the device is locked before the device is operated. When a user starts to use the device, the method...
8516244 System, apparatus and method for decentralizing attribute-based encryption information  
A method for secure transmission of a message encrypted under an attribute based encryption scheme is provided. A first and a second authority parameter may be received from one or more...
8516239 Virtual authentication proxy server and terminal authentication server  
A virtual authentication proxy server includes an authentication request acceptance unit, a terminal authentication program transmission unit and an authentication result transmission unit. When...
8516481 Virtual machine manager system and methods  
Embodiments of the disclosure describe system and methods for virtualized system. In this regard, the virtualized system comprises a virtual machine manager (VMM), the virtual machine manager...
8515996 Secure configuration of authentication servers  
Embodiments of the invention are directed to automatically populating a database of names and secrets in an authentication server by sending one or more lists of one or more names and secrets by a...
8510784 Information processing apparatus, content reproduction apparatus, information providing apparatus, device control apparatus, cooperative processing system, and program  
In a cooperative processing system for performing cooperative process between a portable terminal and a television terminal through a service server and a device control server, content and...
8510559 Secure session key generation  
A method and apparatus for securing the interface between a Universal Integrated Circuit Card (UICC) and a Terminal in wireless communications is disclosed. The security of Authentication and Key...
8510565 Bidirectional entity authentication method based on the credible third party  
A bidirectional entity authentication method based on the credible third party includes the steps that: entity A receives message 1 sent from entity B including the authentication parameters of...
8510820 System and method for embedded authentication  
Various systems and methods of embedded authentication are described herein. One method of the preferred embodiment can include receiving at an authentication server a transaction token from a...
8509440 PANA for roaming Wi-Fi access in fixed network architectures  
A network component comprising at least one processor configured to implement a method comprising deriving a Master Session Key (MSK) using a secret key and at least one parameter obtained from an...
8510228 Transfer method of electronic cash  
A card to card transfer method used in the financial system is provided in the present invention, and comprises an initializing step, a transferring step and a transaction confirming step, wherein...
8505086 Managing communications between robots and controllers  
The present disclosure is directed to a system and method for managing communications with robots. In some implementations, a computer network, where operators interface with the network to...
8504830 Transfer data management system for internet backup  
Erroneous deletion of data due to a collision of digest information during data de-duplication using digest information is prevented. When backup data is stored on a backup server 1100, digest...
8504840 Content defacement protection system  
A method and mechanism for protecting a website against defacement are provided. A content owner may associate content with a digital signature. The digital signature allows a recipient of the...
8505067 Service level network quality of service policy enforcement  
Embodiments of the invention provide systems and methods for providing service level, policy-based QoS enforcement on a network or networks. According to one embodiment, a system can comprise at...
8505089 Image forming apparatus and control method for image forming apparatus  
An image forming apparatus includes a display unit, a login information storage unit, a login information reception unit, a login authentication unit, an authorization limitation information...
8499147 Account management system, root-account management apparatus, derived-account management apparatus, and program  
A root-account management apparatus generates an electronic signature based on a survival condition and a secret key when an authentication result of a user of a client apparatus is proper, and...
8499061 Method for inserting a new device in a community of devices  
The invention relates to a method for inserting a new device in a community of devices wherein each device of the community is able to store insertion requests received from at least one new...
8499149 Revocation for direct anonymous attestation  
Direct Anonymous Attestation involves a Signer using a credential supplied by an Issuer to anonymously prove to a Verifier, on the basis of a public key of the Issuer, the Issuer's attestation to...
8499152 Data positioning and alerting system  
A file policy is created for each confidential file in a server computer including a list of events and a corresponding action. The file policies for the confidential files are sent to each client...
8499148 System and method for virtual team collaboration in a secure environment  
A computing platform for facilitating dynamic connection and collaboration of users to transact services in a secure computing environment. The users include service providers and service...
8495712 Peer-to-peer access control method of triple unit structure  
This invention relates to a peer-to-peer access control method of a triple-unit structure for safely implementing bidirectional authentication between the terminal and the network. According to...
8495711 Remote roaming controlling system, visitor based network server, and method of controlling remote roaming of user devices  
An authorization assisting device sends to the VBN server an authorization request for access to the WAN by a requesting user device. A registration driver has a set of assignable IP address...
8495729 System for and method of authenticating device and user in home network  
A system for authenticating a device and a user in a home network. The home network manages one or more devices through a home server. The system includes a service device for providing service...
8495360 Method and arrangement for providing a wireless mesh network  
A method and an arrangement are provided wherein a newly added mesh node does not require a link to the AAA server for the purpose of authentication. Authentication is carried out using a node...
8495730 Dynamically constructed capability for enforcing object access order  
Proposed is a Capability Management System (CMS) in a distributed computing environment that controls access to multiple objects by multiple subjects based upon a specified access order. A...
8495371 Network device authentication  
In general, this disclosure relates to maintaining security between an optical network terminal (ONT) and an optical network aggregation device in an Active Ethernet network. An optical network...
8488794 Method for access control to a scrambled content  
A method for access control to a digital scrambled content distributed to a set of installed reception terminals including one master terminal and at least one slave terminal dependent on the...
8489876 Secure anonymity in a media exchange network  
A method for communicating of information in a communication network is disclosed and includes receiving media containing a security code from a first communication device at a third communication...
8490172 Methods, systems, and computer readable media for adaptive assignment of an active security association instance in a redundant gateway configuration  
According to one aspect, the subject matter described herein includes a method for communicating an encrypted data packet. The method includes steps occurring at a first gateway node. The method...
8484460 Post attack man-in-the-middle detection  
Technologies are described herein for post attack man-in-the-middle detection. A first computer receives and stores public key certificates when connections are established. The first computer...
8484708 Delegating authentication using a challenge/response protocol  
A method for delegating authentication using a challenge/response protocol is provided. The method may initiate with a challenge/response sequence between a client application and a server...
8482768 Print job management using memory boxes  
Secrecy of printed matter is raised and charges for a storing area are more accurately charged. According to the invention, a printing apparatus is instructed so as to store print data...
8484673 Method for the allocation and management of subscriptions for the reception of broadcast products  
A method to reduce bandwidth necessary for renewal of subscriptions for reception of broadcast services including: defining a plurality of sets of subscriber identification numbers, each set being...
8484459 Secure transfer of information  
Disclosed is a method for secure transfer of information through a centralized system. The method comprising: maintaining user account information, a user account of a certain user comprising at...
8478989 Method and apparatus to authenticate and authorize user access to a system  
A method, apparatus, and system are provided for authenticating a user. According to one embodiment, a request for authentication of a user is received via a secondary site, the request for...
8478988 System and method for authentication of a communication device  
A system and method for authentication of a communication device is disclosed. A system that incorporates teachings of the present disclosure may include, for example, a communication device...
8478981 Method of adding a postscript message to an email  
A system and method providing for appending of a note or instruction to the contents of an email such that the note or instructions is only appended to emails of selected recipients of a group of...
8478973 System and method for providing a secure application fragmentation environment  
System and method for providing and using expanded memory resources secure application environment is disclosed. An embodiment comprises a system and method for providing secure application...
8478993 System and method for distributing and creating presentations  
A slide customization system, comprising an administrator, wherein at least one information presentation is received at the administrator, at least one database, wherein the at least one...
8478266 Method and system for anonymous operation of a mobile node  
A mobile node and its home system generate synchronized time-based codes at periodic time intervals. Each time-based code is valid for a predetermined time period. To facilitate anonymous...
8478995 Method of encrypting and transferring data between a sender and a receiver using a network  
A method of encrypting and transferring data between a sender and a receiver using a network thereby transferring data in a secure manner includes the steps of a server receiving from the sender...
8478990 Mobile transaction methods and devices with three-dimensional colorgram tokens  
A transaction security process includes authentication and identification parts for pushing an encrypted colorgram for user authentication and persona descriptors for user identification from a...