Match Document Document Title
8151317 Method and system for policy-based initiation of federation management  
A method, a system, an apparatus, and a computer program product is presented for performing federation protocol operations within a data processing system. A message is received. In response to a...
8145707 Sending digitally signed emails via a web-based email system  
The present invention provides systems and methods for allowing an Email User to create a Public Key Infrastructure (PKI) Email Account and thereafter to digitally sign, send, verify and receive...
8145908 Web content defacement protection system  
A method and mechanism for protecting a website against defacement are provided. A content owner may associate content with a digital signature. The digital signature allows a recipient of the...
8145899 Creation of user digital certificate for portable consumer payment device  
A method for creating a digital certificate for a user issued by a reliant party, where the reliant party relies on an established cryptographic infrastructure by a registration or certificate...
8146143 Fraud detection  
In some embodiments, techniques for information security include receiving information related to an authentication credential, wherein the information is related to a failed authentication...
8145709 Communications system providing enhanced client-server communications and related methods  
A communications system may include an application server and at least one communications device for processing requests from one another. The communications device may process requests using an...
8145897 Direct anonymous attestation scheme with outsourcing capability  
A Direct Anonymous Attestation (DAA) scheme using elliptic curve cryptography (ECC) and bilinear maps. A trusted platform module (TPM) may maintain privacy of a portion of a private membership key...
8138923 RFID security system and method, including security stamp  
Embodiments of an RFID security system and method are described herein. Embodiments include an RFID security server or appliance and RFID security software. In an embodiment, the RFID security...
8141144 Security policy management for network devices  
The present invention provides a system and method for use within a computer network that allows for automated provisioning, configuration, and maintenance of the servers and other devices...
8141134 Authentication engine for enrollment into a computer environment  
Embodiments of the invention are generally directed to a system and method for enrolling a user into an authentication system. In some embodiments of the invention, a user completes a first...
8136150 User role mapping in web applications  
Roles and policies are used to provide display and access to data in a flexible manner. Users and/or web applications can be mapped to user roles that dictate which displays or other application...
8134972 Communication system and gateway apparatus  
A relay gateway apparatus (HandOver-Gateway (HO-GW) is provided between heterogeneous access networks (a WiMAX access network and a UMB access network). The HO-GW performs conversion of a movement...
8132016 Method, system, and computer program product for the authentication of multiple users in a common session  
A first information handling system (“IHS”) receives identification information of a first user of a second IHS. The first IHS initiates a network session in response to authenticating the...
8132001 Secure telephony service appliance  
Secure telephony service appliances are created from computing devices. The computing devices have restricted access to their hardware and software. The computing devices perform VOP functions to...
8132007 PANA authentication method and system  
A Protocol for carrying Authentication for Network Access (PANA) authentication system is provided. The system includes: a PANA client (PaC) which establishes, with a PANA authentication agent...
8132017 Method and apparatus for securely synchronizing password systems  
A centralized password repository (CPR) provides network users with a password portal through which the user can manage password access to domains and applications on the network. A subset of the...
8131996 Distributed management of a certificate revocation list  
In a method for managing a Certificate Revocation List (CRL), a first device (31, 61) receives the CRL (33, 67) which comprises at least one revoked certificate identifier (SNi). An integrity...
8132226 System, method and computer program product for an authentication management infrastructure  
A system, method and computer program product that utilizes measurements for the authentication of users to enterprise resources. The system includes an authentication server that stores the...
8127124 Remote configuration of computing platforms  
An embodiment of the invention relates to a computing platform (10) having an attribute (241) that is configurable by a remote system (350), the computing platform (10) storing a first verifier...
8122245 Anonymity revocation  
Methods and systems for anonymity revocation, enabling a trusted entity to identify a user computer within an anonymous system. A system comprises an attester computer providing attestation value...
8117442 Data processor  
A data processor is connected to and communicating with an external device having at least one predetermined communication/authentication method. A first assigning unit assigns a first level of...
8116450 System and method for utility sampling for trust metrics in pki  
A method for measuring trust in a transaction over a public key certificate network includes associating each edge KA→KB of an public key certificate network connecting two public keys KA and KB...
8117461 Method of randomly and dynamically checking configuration integrity of a gaming system  
In a gaming environment, a method of periodically downloading dynamically generated executable modules at random intervals that perform system configuration integrity checks in a secure and...
8117444 Host computer, mobile communication device, program, and recording medium  
The object of the present invention is to provide an authentication system capable of achieving suitable authentication processing while guaranteeing the maximum convenience for the customer. A...
8116453 Gaming console-specific user authentication  
Systems, methods, and computer program products are provided for user authentication required for conducting online financial institution transactions. The disclosed embodiments leverage the...
8112627 System for self-service recharging and method for the same  
The present invention discloses a method for self-service recharging and a system for the same, relating to the security communications of online banking. The system comprises a client and a...
8112630 Device, system, and method for reporting execution flow of program  
A device, system, and method for reporting an execution flow of a program is provided. The system for reporting an execution flow of a program includes a program-providing server that provides a...
8108917 Management apparatus  
There is provided a management apparatus, which comprises a transmission condition judgment unit which refers to a target digital certificate and judges whether a predetermined transmission...
8108907 Authentication of user database access  
A database system and method combines the ability to concurrently utilize LDAP based authentication and operating system-based authentication. The database authentication tries both methods of...
8108922 Customizable sign-on service  
Techniques are described for providing customizable sign-on functionality, such as via an access manager system that provides single sign-on functionality and other functionality to other services...
8108668 Associating a multi-context trusted platform module with distributed platforms  
In one embodiment, the present invention includes a method for creating an instance of a virtual trusted platform module (TPM) in a central platform and associating the instance with a managed...
8104072 Apparatus and methods for authenticating voice and data devices on the same port  
Embodiments of the present invention allow authorization for a particular device or user to have access into a particular network so as to be bound to a specific domain or VLAN (virtual local area...
8102544 Image processing apparatus, image processing method, and computer-readable storage medium for computer program  
A terminal is provided with an image obtaining portion that obtains an image including a code representing a location of a web page, a web page obtaining portion that obtains the web page based on...
8103868 Sender identification system and method  
A database is queried based upon data contained in a message to obtain sender identification information, at least part of which is not contained in the message as it was sent. The sender...
8103246 Systems and methods for remote user authentication  
Systems for methods for remote user authentication by using a cellular phone and an authentication system that generates and uses transient pass codes. The Authentication system is used to store a...
8099609 Information processing apparatus and key recovery method  
According to one embodiment, an information processing apparatus includes a receiving device including a tuner unit which receives broadcast program data, a first nonvolatile memory which stores...
8099368 Intermediary service and method for processing financial transaction data with mobile device confirmation  
A transaction processing service operates as an intermediary between acquirers of financial transaction requests and issuing institutions that process the financial transaction requests. The...
8098819 Method, system and securing means for data archiving with automatic encryption and decryption by fragmentation of keys  
In the method for data archiving with automatic en- and decryption data (9, 10) are exchanged between a client station (1) and an archive station (4). A securing means (2) connected between the...
8099787 Knowledge-based and collaborative system for security assessment of web applications  
A standardized system for assessing the security of web based applications which has a component for collecting information regarding threat and vulnerabilities to web applications is described....
8099593 System and method for retrieving related certificates  
A system and method for searching and retrieving certificates, which may be used in the processing of encoded messages. In one embodiment, a certificate synchronization application is programmed...
8099764 Secure push and status communication between client and server  
Systems and methods of authentication and authorization between a client, a server, and a gateway to facilitate communicating a message between a client and a server through a gateway. The client...
8095960 Secure synchronization and sharing of secrets  
Techniques are provided for secure synchronization and sharing of secrets. A first principal acquires an encrypted access key to a secret store of a second principal. The first principal contacts...
8090854 Service providing method  
The frequency of reading, by users, Web sites managed by Web masters is increased. A server computer of a service provider providing a variety of services can be accessed from one of the Web sites...
8089661 Embedding authentication information to prevent document spoofing  
In a computer system in which information represented by digital data is output to plural pages of recording medium, and then information on the plural pages of recording medium is read to use...
8086535 Decoupling rights in a digital content unit from download  
Systems and methods for enabling a user to obtain rights in a legitimate copy of a digital content unit without downloading the copy from a digital content store are provided. The systems and...
8086847 Computer program product and computer system for peer-to-peer communications  
An encrypted request for peer-to-peer communication includes a requesting peer encrypting a requested peer identification using a public key of a security agent. The requesting peer sends the...
8086868 Data communication method and system  
Public-key cryptography is realized by means of PKI in which biometrics data, in which biological information of users is converted to numerical values, are used to authenticate users that...
8086853 Automatic centralized authentication challenge response generation  
A centralized challenge response verification server such as a RADIUS server is used to generate challenge responses as well as to verify challenge responses. In this way, the requirement for all...
8082213 Method and system for personalized online security  
Various embodiments of the present invention provide strong authentication of users on behalf of commercial entities and other parties to electronic transactions. In these embodiments of the...
8078538 Systems and methods for remotely authenticating credit card transactions  
A system for remotely authenticating credit card transactions of a consumer comprises at least one subsystem that alerts the consumer via a communication device of the consumer when a credit card...