Match Document Document Title
8264721 Server apparatus, management system, and method  
A server apparatus configured to manage log information corresponding to job information transmitted from a host computer to a printer includes a storage unit storing the log information received...
8266679 Information processing apparatus and information processing system  
An information processing system is supplied capable of holding a security; and transferring an output authority which is had by a transfer source portability terminal to a transfer destination...
8259949 Methods and apparatus for protecting digital content  
A processing system to serve as a source device for protected digital content comprises a processor and control logic. When used by the processor, the control logic causes the processing system to...
8261071 Stateless human detection for real-time messaging systems  
Stateless human detection for real-time systems allows a real-time message system to challenge incoming messages suspected of being generated by an automated application. When a suspect message is...
8261061 Methods and systems for encouraging secure communications  
Embodiments of the present invention enable a user to engage in secure communications using digital certificates and other cryptographic technologies in an easy way with a minimum of distracting...
8255983 Method and apparatus for email communication  
A method of operating a user terminal connected to the Internet comprises: prior to sending an email from the user terminal to a recipient, sending an identifier of the email content and a...
8254571 Cryptographic system with halting key derivation function capabilities  
A halting key derivation function is provided. A setup process scrambles a user-supplied password and a random string in a loop. When the loop is halted by user input, the setup process may...
8255687 Enabling users to select between secure service providers using a key escrow service  
Systems and methods are described herein for enabling users to select from available secure service providers (each having a Trusted Service Manager (“TSM”)) for provisioning applications and...
8255987 Communication abuse prevention  
Communication abuse prevention techniques are described. In an implementation, a reputation level for a communication is determined based on relation information for a sender and an intended...
8243703 Communication system, management apparatus, control method therefor, storage medium, registration apparatus and base station  
A management apparatus transmits a registration message to a base station when executing a wireless parameter setting sequence. The base station registers the management apparatus upon the...
8243927 Digital video receiver, ECM extract equipment, EMM extract equipment, scramble key extract equipment, CCI extract equipment, digital video receiving system, ECM extract method, EMM extract method, scramble key extract method, CCI extract method, digital video receiving method, and recording medium  
A decryption process chip has a memory in which a first decryption control unit for decrypting a scramble key by using an ECM and an EMM is downloaded from outside and stored. A stream input unit...
8245030 Method for authenticating online transactions using a browser  
A method for performing a one-time user setup for authenticating a user and a specific computer using a service provider server and an authentication server including: receiving an identity...
8244643 System and method for processing financial transaction data using an intermediary service  
An acquirer communicates with an intermediary transaction processing service to handle financial transaction requests received from multiple points of purchase. The acquirer receives an initial...
8245029 System and method for enhanced network entrance into a wireless network  
In one embodiment, a method for wireless communication includes providing, at a base station, access to a network to a preferred endpoint. The method includes sending, at the base station, at...
8245283 Region access authorization in a virtual environment  
The passage of avatars into and out of regions in a virtual universe is regulated through the use of secure communications between and among the avatar, an authority managing of the region and a...
8245040 Secret authentication system  
An authenticated apparatus generates scrambled data from key data and authentication data, such that another key data, which configures the product data, or authentication data is obtained through...
8239671 Channel binding mechanism based on parameter binding in key derivation  
This document describes a channel binding mechanism based on parameter binding in the key derivation procedure. The method cryptographically binds access network parameters to a key without need...
8238555 Management server, communication apparatus and program implementing key allocation system for encrypted communication  
Both a management server and a validation server are installed. Both a terminal and a terminal register setting information which is usable in an encrypted communication in the management server....
8233623 Methods and systems for blackout provisioning in a distribution network  
Methods and systems for blackout provisioning in a communication network. In an aspect, a method is provided for blackout provisioning in a distribution network. The method includes determining...
8234217 Method and system for selectively providing access to content  
A method of operating a digital program playback device, including: receiving, via a first communications network, a data stream including an encrypted data portion representative of a program;...
8234698 Anonymous authentication-based private information management system and method  
An anonymous authentication-based private information management (PIM) system and method are provided. The PIM method includes receiving an anonymous certificate not including user information...
8234387 Interoperable systems and methods for peer-to-peer service orchestration  
Systems and methods are described for performing policy-managed, peer-to-peer service orchestration in a manner that supports the formation of self-organizing service networks that enable rich...
8230508 Host intrusion prevention server  
An intrusion-prevention server supporting a set of hosts comprises data filters and an engine which uses a set of encoded rules for assigning data filters to hosts according to metadata...
8230214 Systems and methods for optimizing SSL handshake processing  
A method for enabling efficient SSL handshakes through precomputing of handshake messages, the method includes: receiving, by an appliance, a server certificate identifying a server; generating,...
8229114 Identity-based key generating methods and devices  
The present invention discloses a method and device of generating asymmetrical key pair (public key and private key) based on user identity. Key Management Center (KMC) generates public/private...
8230213 Method, system and apparatus for protecting a BSF entity from attack  
A method, system and apparatus for protecting a bootstrapping service function (BSF) entity from attack includes: obtaining a first temporary identity and a second temporary identity after a user...
8229790 System for multimedia viewing based on entitlements  
An advertising control method is described. The method includes receiving an advertisement identification message (AIM) (127) at a first mobile device (125), sending the AIM from the first mobile...
8230007 Method for permitting and blocking use of internet by detecting plural terminals on network  
The present invention is related to a technology for grasping the number of a plurality of terminals of a client using a Cookie in a private network in which plural terminals are shared by...
8230122 Direct provisioning of storage devices to virtual OS partitions  
An OS instance can maintain management responsibility for SAN adapters to ensure separation and isolation of WPARs, while WPARs are given the capability of configuring an adapter (e.g., adding...
8230212 Method of indexing security keys for mobile internet protocol authentication  
The present invention provides a method involving a mobile node, a home agent, and an authentication server in a wireless communication system. The method includes generating, at the...
8230490 System and method for authentication of users in a secure computer system  
A system and method of authenticating a user in a secure computer system in which a client computer transmits to the secure computer system a request for a sign-on page, the computer system...
8230480 Method and apparatus for network security based on device security status  
A method and apparatus are provided for network security based on a security status of a device. A security update status of a device is evaluated; and one or more of a plurality of security...
8230485 Method and system for controlling access privileges for trusted network nodes  
A system and method for controlling access to a computer provides for loose security within a local network while retaining strong security against external access to the network. In one...
8225106 Differential encryption utilizing trust modes  
Systems and methods are provided for data protection across connected, disconnected, attended, and unattended environments. Embodiments of the inventions may include differential encryption based...
8225378 Auditing authorization decisions  
The auditing of authorization decisions is facilitated by integrating or coupling an audit policy to access control decisions. In an example implementation, an audit policy of an auditing scheme...
8224699 System for multimedia viewing based on entitlements  
An advertising control method is described. The method includes receiving an advertisement identification message (AIM) at a first mobile device, sending the AIM from the first mobile device to a...
8225095 Password-authenticated asymmetric key exchange  
Communicating keys between network devices on a network using asymmetric cryptographic techniques, for which asymmetric keys may be derived from a single (same) password. Knowledge or partial...
8225087 System and method for control of security configurations  
Systems and methods are disclosed for using cryptographic techniques to configure data processing systems. A configuration manager cryptographically controls the configuration of a system by...
8225086 Method and apparatus for remotely authenticating a command  
A system that remotely authenticates a command is presented. During operation, an authentication system receives the command from an intermediary system, wherein the command is to be executed on a...
8225100 Hash functions using recurrency and arithmetic  
Aspects relate to systems and methods for implementing a hash function using a stochastic and recurrent process, and performing arithmetic operations during the recurrence on portions of a message...
8218765 Information system  
A trusted service which publishes information describing security attributes of computing platforms in a defined physical area, for use by a visitor to a building, for example, who is unfamiliar...
8219802 System, method and program product for consolidated authentication  
A first computer sends a request to the second computer to access the application. In response, the second computer determines that the user has not yet been authenticated to the application. In...
8219827 Secure boot with optional components  
A method manages optional trusted components that are active within a device, such that the device itself controls the availability of trusted components. The device includes: a storing unit...
8219801 Method of authenticating digitally encoded products without private key sharing  
A method and a corresponding system for authenticating software products are proposed. A digital certificate (260) and a corresponding private key (265) required to sign each product are stored on...
8219803 System and method for unlocking content associated with media  
There is presented a system and method for unlocking a content associated with media. In one aspect, the method comprises identifying the media, generating an authentication key using at least one...
8213608 Roaming utilizing an asymmetric key pair  
Techniques for generating a portion of a split private key are provided. A first symmetric key and a second symmetric key different than the first symmetric key are generated at a first location....
8214884 Computer-based dynamic secure non-cached delivery of security credentials such as digitally signed certificates or keys  
A management server acts as a repository for a plurality of user certificates corresponding to a plurality of users. When a user wishes to access a remote computer such as a secure-enabled host...
8213618 Protecting content on client platforms  
A method, computer system, and computer-readable medium with instructions to provide a client security management layer and a content player that ensure that the content is protected from malware...
8214877 System and method for the implementation of policies  
Embodiments of the present invention provide systems and methods for developing policies which govern entities and applying the developed policies against representations of entities, where the...
8209744 Mobile device assisted secure computer network communication  
Mobile device assisted secure computer network communications embodiments are presented that employ a mobile device (e.g., a mobile phone, personal digital assistant (PDA), and the like) to assist...