Match Document Document Title
8474037 Stateless attestation system  
A method includes assessing a trustworthiness level of a user computer by communication between the user computer and a first server. A record indicating the trustworthiness level is sent from the...
8468354 Broker-based interworking using hierarchical certificates  
A method for authentication authorization and accounting (AAA) in an interworking between at least two networks. The at least two networks are capable of communicating with a broker and include a...
8468582 Method and system for securing electronic transactions  
A method for secure electronic transaction over a computer network, comprising: at a trusted relationship profile server computer: storing a unique identity of a trusted computing unit; generating...
8468578 Establishing access controls in a premise-based environment  
Establishing access controls includes establishing a communication session between an unrecognized user identity of a user device and a destination system through an online access provider device...
8464326 Accessing materials via voice and a menu  
A computer implemented method for accessing materials for a meeting may include receiving a call from a meeting participant by a system, wherein the meeting participant calls a prearranged...
8464065 Procedure and architecture for the protection of real time data  
The object of the present invention is to safeguard the authenticity and integrity of real-time data in a distributed real-time computer system. The present invention considers other requirements...
8464330 Agent device, image-forming-device management system, image-forming-device management method, image-forming-device management program and storage medium  
An agent device is connected with one or more image-forming devices in a local network having a firewall provided therein. A management device carries out remote management of the image-forming...
8464335 Distributed, multi-tenant virtual private network cloud systems and methods for mobile security and policy enforcement  
The present disclosure provides distributed, multi-tenant Virtual Private Network (VPN) cloud systems and methods for mobile security and user based policy enforcement. In an exemplary embodiment,...
8464313 Methods and apparatus related to transmission of confidential information to a relying entity  
In one embodiment, a method includes defining a request for confidential information from a domain of confidential information based on an input from a relying entity. The domain of confidential...
8458768 Policy-based security certificate filtering  
Policy filtering services are built into security processing of an execution environment for resolving how to handle a digital security certificate of a communicating entity without requiring a...
8458457 Method and system for certificate revocation list pre-compression encoding  
Embodiments of the present invention provide a pre-compression encoding capability for encoding a CRL, such as an X.509 CRL, stored as a file, data structure or data object in a computer system...
8456653 Data processing apparatus for producing print job data whose authority is managed by external server, and image processing apparatus for printing a print job whose authority is managed by external server  
A data processing apparatus includes a storage unit configured to store electronic data including first data for identifying policy data that is information indicating an authority for handling...
8456670 Printing device and printing system for controlling authentication print jobs  
A printing device includes a processor, an attribute managing part configured to be activated by the processor to communicate with a host device and to control an authentication printing job...
8458786 Automated dynamic tunnel management  
Systems, methods and apparatus for tunneling in a cloud based security system. In an aspect, tunnel session data describing authentication and unauthenticated sessions, and location data...
8458770 Application context based access control  
Access control for an application is described. An exemplary method includes receiving a first command of an application to invoke a function of a user interface, identifying a first authorization...
8452970 System and method for code signing  
A system and method for code signing. The entities may be software application developers or other individuals or entities that wish to have applications digitally signed. Signing of the...
8452958 Determining certificate revocation status  
A method is disclosed for obtaining certificate revocation information from a server, obtaining from a client a request for a revocation status of a certificate and notifying the client when the...
8453221 Method for improving security in login and single sign-on procedures  
In a method for improving client's login and sign-on security in accessing services offered by service providers over shared network resources such as Internet and particularly working within the...
8453211 Method of obtaining proxy call session control function address while roaming  
The present invention provides a method for obtaining a proxy call session control function address, comprising when a terminal accesses an IP multi-media subsystem through a world...
8452016 Interoperable keychest for use by service providers  
There is provided a system and method for distributors to use an interoperable key chest. There is provided a method for use by a distributor to obtain content access authorizations from a key...
8453207 Methods and systems for improving the security of secret authentication data during authentication transactions  
A method for improving the security of secret authentication data during authentication transactions is provided that includes converting the secret authentication data of a user into scrambled...
8452957 Method and nodes for providing secure access to cloud computing for mobile users  
A mobile node, a gateway node and methods are provided for securely storing a content into a remote node. The mobile node, or a gateway node of a network providing access to the mobile node,...
8453229 Push type communications system  
Systems and methods for pushing messages, arbitrated by a Control Manager, to local and remote client computer modules in a networked architecture. The messages may include voice, video, text and...
8452954 Methods and systems to bind a device to a computer system  
Methods and systems to bind a computer device to one or more computer systems, such that only an authorized computer system may access a protected portion of the device. A processor within the...
8448239 Secure controller for block oriented storage  
A storage controller includes a command pointer register. The command pointer register points to a chain of commands in memory, and also includes a security status field to indicate a security...
8447970 Securing out-of-band messages  
Securing an out-of-band message from a server to a mobile computing device. After requesting a service ticket from a trusted third party (e.g., via a pre-existing ticketing infrastructure), the...
8447969 Transfer device for sensitive material such as a cryptographic key  
Mechanisms are provided for transferring sensitive information, such as cryptographic keys, between entities. Particularly, a device is provided with a user input connected directly to a secure...
8443187 Authentication of computing devices in server based on mapping between port identifier and MAC address that allows actions-per-group instead of just actions-per-single device  
In one or more embodiments, attributes other than a supplicant's MAC address can be used for the user name in the authentication process in a network computing environment. In at least some...
8443193 State-maintained multi-party signatures  
A hash module of a mail sender creates a hash data context structure. The hash module processes the headers and the body of an e-mail message in the order required, for example by the DKIM...
8443436 Systems and methods for diverting children from restricted computing activities  
A computer-implemented method for diverting children from restricted computing activities. The method may include maintaining a list of safe computing activities, maintaining a list of restricted...
8443419 Method, device, and system for pre-authentication  
The present invention relates to mobile communications technologies, and discloses a method, device, and system for pre-authentication. A pre-authentication device receives a pre-authentication...
8443448 System and method for detection of non-compliant software installation  
A system and method for performing a security check may include using at least one processor to periodically check a status of a flag, generate and store a baseline representation of modules...
8438618 Provisioning active management technology (AMT) in computer systems  
Active management technology (AMT) may be provisioned in a client device automatically, which may provide a secure connection between the provisioning server and the client device. The client...
8438383 User authentication system  
An ID vault computer control program detects when a user's browser navigates to a third-party website that requires a user ID and password. If it hasn't done so already, it automatically requests...
8438620 Portable device for clearing access  
A portable device for activating access in or over a computer network that is connectable to a terminal, which is connected to the computer network at least temporarily. The portable device is...
8438384 System and method for performing mutual authentication  
A system and method for performing mutual authentication verifies a username and a password of a handheld device by a server, and verifies an identity of the server by the handheld device if the...
8438116 Token based new digital cash protocols  
Digital cash token protocols employ two pairs of private and public keys. Each public key is certified separately and the protocols do not use any blind signature schemes. As a result, the digital...
8438382 Credential management system and method  
A centralized credential management system includes website credentials that are stored at a vault. The website credentials are encrypted based upon a key not available to the vault and are for...
8438388 Method and apparatus for distributing certificate revocation lists (CRLs) to nodes in an ad hoc network  
A method and apparatus for distributing Certificate Revocation List (CRL) information in an ad hoc network are provided. Ad hoc nodes in an ad hoc network can each transmit one or more certificate...
8433897 Group signature system, apparatus and storage medium  
A group signature system according to one embodiment of the present invention comprises a group administrator apparatus, signer apparatuses and a verifier apparatus which can communicate with one...
8434132 Roaming between networks employing different authentication protocols  
Methods, systems, and apparatuses for receiving a first authentication message from a first authentication device of a first network employing a first authentication protocol, converting first...
8433064 Secret encryption with public or delegated comparison  
Described is a technology comprising a system in which two distrusting parties can submit sets of encrypted keywords using two independent secret keys to a third party who can decide, using only...
8433898 Trust information delivery scheme for certificate validation  
A unique TIO based trust information delivery scheme is disclosed that allows clients to verify received certificates and to control Java and Javascript access efficiently. This scheme fits into...
8433896 Simplifying addition of web servers when authentication server requires registration  
An aspect of the present invention simplifies addition of new server systems which serve web pages to client systems, when an authentication server requires registration before providing...
8433903 Asynchronous enhanced shared secret provisioning protocol  
An Asynchronous Enhanced Shared Secret Provisioning Protocol (ESSPP) provides a novel method and system for adding devices to a network in a secure manner. A registration process is launched by at...
8433286 Mobile communication network and method and apparatus for authenticating mobile node in the mobile communication network  
A method and apparatus for performing device authentication and user authentication in a mobile communication network are provided. A connection is established between an MS and an SRNC that...
8433918 Methods and systems for improving the security of password-based authentication protocols for IEEE 802.11 networks  
A password element is generated for a station running an Elliptic Curve Cryptography (ECC) or a Finite Field Cryptography (FFC) group based password authenticated protocol. A password element is...
8429726 Service provider invocation  
A service provider may provide one or more services to and/or for a client. Providing a service may involve receiving a service request including a security token at the service provider and...
8429398 Method and apparatus of providing personalized virtual environment  
An approach is provided for providing a personalized virtual environment for a visitor of a service community. A comparison is made of identification information of the visitor with contact...
8429755 System and method for receiving digital content  
A method and system for conducting a transaction involving digital content is provided. The system includes, a first user of a first mobile device connected to a network; a second user of a second...