Match Document Document Title
8429403 Systems and methods for provisioning network devices  
A method performed by a network device may include generating and storing a first public key and a first private key in a first device, transmitting a serial number and the first public key from...
8424060 Trusted network access controlling method based on tri-element peer authentication  
A trusted network access controlling method based upon tri-element peer authentication comprises: Firstly initializing creditability collectors and a creditability verifier; then carrying out a...
8424053 Method of dynamically updating network security policy rules when new network resources are provisioned in a service landscape  
A computer-implemented method is provided for updating network security policy rules when network resources are provisioned in a service landscape instance. The method includes categorizing...
8418226 Persistent servicing agent  
A tamper resistant servicing Agent for providing various services (e.g., data delete, firewall protection, data encryption, location tracking, message notification, and updating software)...
8417941 Apparatus and method to prevent man in the middle attack  
A system, peripheral device, and method for authenticating an encryption key before transmitting encrypted messages containing sensitive information are provided. Authentication of a client device...
8418233 Rule based extensible authentication  
A system, apparatus, and method are directed to managing access to a resource using rule-based deep packet extractions of a credential. A network device, such as a traffic management device, is...
8412927 Profile framework for token processing system  
Embodiments of the present invention provide a profile framework for handling enrollment requests. In particular, when a token processing system receives an enrollment request, it selects an...
8413213 System, method and device for secure wireless communication  
Embodiments of the present invention provide a method, apparatus and system for selecting a wireless communication device for establishing a connection. The method according to some exemplary...
8412928 One-time password authentication employing local testing of candidate passwords from one-time password server  
A computing system has a local computing domain coupled to a one-time password (OTP) server. The OTP server maintains user-specific secret data used in a one-time-password (OTP) process to...
8412933 Enabling users to select between secure service providers using a key escrow service  
Systems and methods are described herein for enabling users to select from available secure service providers (each having a Trusted Service Manager (“TSM”)) for provisioning applications and...
8407475 Augmented single factor split key asymmetric cryptography-key generation and distributor  
A system for authenticating communication network users includes a user-associated user station communicatively coupled to an authenticating station via the communication network. The...
8407463 Method of authentication of users in data processing systems  
A method of authentication of users in a data processing system is provided. The method includes a “Challenge” univocally associated with a user to be authenticated; processing the “Challenge” to...
8407478 Control message signature for device control  
A method of controlling a peripheral device includes generating, in a host processor, a control message for transmission to the peripheral device, and calculating a signature for the control...
8402265 Image forming apparatus, image processing system, method for controlling image processing system, and storage medium  
At an apparatus, a reading unit reads a document a generation unit and generates a content data from the document and an encryption unit performs encryption processing on the content data using an...
8402274 System and method of sharing contents data in network  
A technique for sharing contents data in a network. In order to easily share the contents data in the network without using a physical media apparatus or a personal computer, a contents data...
8402079 Security and report generation system for networked multimedia workstations  
A method for providing security in a networked multimedia computing system is provided wherein an administrative workstation is challenged by a network workstation when the administrative...
8402558 Securing digital content system and method  
A system and method of encrypting digital content in a digital container and securely locking the encrypted content to a particular user and/or computer or other computing device is provided. The...
8397279 Method and system of network integrity via digital authorization (NIDA) for enhanced internet security  
A novel method for online authentication of an authorized website is described to prevent the circulation of forged web pages on the World Wide Web. The novel feature of the instant invention is...
8397277 Multi-functional peripheral, authentication server and system  
In a multi-functional peripheral capable of performing user authentication processing in cooperation with an authentication server and processing in cooperation with an external application, a...
8396211 System and method for dynamic modification of allowable electronic message properties  
A system and method for dynamically and automatically updating the appropriate fields on the message application screen of an electronic message to show which of the appropriate service book,...
8397060 Requesting digital certificates  
A method for requesting a certificate from a certificate issuer for a public key that is associated with a corresponding private key stored by a storing entity, the method comprising: generating...
8397058 System and method for communication between smart cards  
A method and system which provides communication between a first portable device and a second portable device. The first portable device stores a first sequence number and a first key, and the...
8397059 Methods and apparatus for implementing authentication  
A proxy (e.g., a switch) resides in a respective network environment between one or more clients and multiple servers. One purpose of the proxy is to provide the clients a unified view of a...
8388448 Methods and devices for downloading games of chance  
The present invention provides methods, devices and systems for downloading gaming software. According to some implementations of the invention, gaming software is continuously transmitted on a...
8392723 Information processing apparatus and computer readable medium for preventing unauthorized operation of a program  
An information processing apparatus includes an information acceptance unit, a calculation unit and an encryption unit. The information acceptance unit accepts information relevant to a program....
8392710 Entity bidirectional-identification method for supporting fast handoff  
An entity bidirectional-identification method for supporting fast handoff involves three security elements, which includes two identification elements A and B and a trusted third party (TP). All...
8392716 Communication apparatus, digital signature issuance method and apparatus, and digital signature transmission method  
An initiator shares y_ir with a responder, calculates HASH_I on the basis of y_ir, and sends HASH_I to an IKE proxy server. The initiator receives a digital signature SIG_S generated for HASH_I...
8392713 Secure offline activation process for licensed software application programs  
A computer readable medium for activating a software application for execution on a designated computer, where the computer readable medium has stored thereon computer executable instructions for...
8392979 Document processing automated system and image forming apparatus  
It is facilitated to execute a workflow requiring user authentication. When an IC card reading/writing apparatus reads information recorded in an IC card owned by a user, an image forming...
8386774 Logging system and method based on one-way hash function  
A logging system and method based on a one-way hash function are described. The system includes a user system, a trusted third party, and a verifier. The method includes the following steps. The...
8386773 Verification methods and apparatus for use in providing application services to mobile communication devices  
A mobile communication device operates in a wireless communication network with use of a communication service provided by a service provider (e.g. a wireless carrier for voice telephony, or data...
8386775 Tolerant key verification method  
A tolerant key verification method is provided. The tolerant key verification method comprises the following steps. A first key is generated instantly according to first characteristic values from...
8386389 Service delivery systems and methods  
Service delivery systems and methods are described. In one aspect, a service delivery system includes a set of tokens, a database, multiple terminals, and a service manager. Each of the tokens...
8386793 Method and apparatus for implementing electronic seal  
A method provided herein includes the following steps: storing seal data of an electronic seal, a digital certificate, electronic signature program and a private key of a sealer in an external...
8380981 System and method that uses cryptographic certificates to define groups of entities  
A system and method for issuing a cryptographic certificate includes describing one or more prerequisite condition on the cryptographic certificate. The one or more prerequisite conditions...
8380622 Secure electronic payment messaging system with reconcilable finality  
A transfer network system for providing communications between commercial buyers and suppliers and their respective banks is provided. Client systems in communication with the transfer network...
8380979 Methods, systems, and computer program products for invoking trust-controlled services via application programming interfaces (APIs) respectively associated therewith  
A trust evaluation may be obtained for a network element in a communication network. Based on this trust evaluation, one or more services may be invoked to address the risk that a potentially...
8380985 Certificate validation method and certificate validation server and storage medium  
A certificate validation method for causing a certificate validation server to receive a certificate validation request from a given terminal device, build a certification path of from a first...
8378782 System and method for locking and unlocking access to an electronic device  
The disclosure relates to a system and method for unlocking and unlocking access to a device. The system comprises: a graphical user interface (GUI) module providing instructions to a...
8374354 System and method to pass a private encryption key  
A method includes receiving, via a network, a request to provision and provide a private key, the private key being for use with a public and private key system. The method further includes...
8370266 Authentication-authorization system for mobile communication terminal and method therefor  
An authentication-authorization system for a mobile communication terminal and a method therefor are provided. When a mobile communication terminal is in a connect state, code data randomly...
8370265 System and method for managing status of a payment instrument  
A transaction processing service operates as an intermediary between acquirers of financial transaction requests and issuing institutions that process the financial transaction requests. The...
8370926 Systems and methods for authenticating users  
A computer-implemented method for authenticating users may include identifying an image associated with a user for mutual assurance during an authentication process. The computer-implemented...
8370638 Derivative seeds  
A method of generating authentication seeds for a plurality of users, the method involving: based on a single master seed, generating a plurality of derivative seeds, each one for a corresponding...
8364951 System for digital rights management using distributed provisioning and authentication  
A digital rights management system (DRM) for restricting and permitting content access in a digital content distribution network such as a network used to deliver television programming. The DRM...
8364967 Multi-step digital signature method and system  
A multi-step signing system and method uses multiple signing devices to affix a single signature which can be verified using a single public verification key. Each signing device possesses a share...
8364952 Methods and system for a key recovery plan  
Methods, systems and computer readable mediums are provided for recovering subject keys and/or certificates for a token. A unique identifier associated with the token is obtained. The token is...
8365258 Multi factor authentication  
In one embodiment, a network element comprises one or more processors, and a memory module communicatively coupled to the processor. The memory module comprises logic instructions which, when...
8359643 Group formation using anonymous broadcast information  
A number of devices co-located at a geographic location can broadcast and receive tokens. Tokens can be exchanged using a communication link having limited communication range. Tokens that are...
8359464 Quarantine method and system  
A quarantine method and system for allowing a client terminal to connect to a user network. An authentication apparatus recognizes that a communication means of the client terminal has been...