Match Document Document Title
8971537 Access control protocol for embedded devices  
The client requests from the authentication and authorization server a capability for accessing the target server. The authentication and authorization server sends client a capability (capC,S)...
8966246 System and method for checking digital certificate status  
A method for handling digital certificate status requests between a client system and a proxy system is provided. The method includes the steps of receiving at the proxy system digital certificate...
8966248 Secure software file transfer systems and methods for vehicle control modules  
A server includes an import module that receives a first content file and a first instruction file from a design network. The first instruction file includes a first set of parameters. A job...
8966599 Automatic token renewal for device authentication  
Approaches are described for automatically generating new security credentials, such as security tokens, which can involve automatically re-authenticating a user (or client device) using a...
8959581 Switching apparatus, authentication server, authentication system, authentication method, and computer program product  
A switching apparatus includes an authentication client unit that requests user authentication to a user authentication server that performs user authentication of the switching apparatus, and,...
8959598 Wireless device authentication between different networks  
A method and system for roaming between heterogeneous networks. The method involves authenticating a mobile communication device on a first network, and providing the device with a single-use...
8959335 Secure password-based authentication for cloud computing services  
Secure password-based authentication for cloud service computing. A request for cloud computing resource access includes a derivative password that contains a parameter that the recipient may...
8959343 Authentication system, method and device  
An authentication system, method and device are provided in the present application. The authentication system includes an Application Server (AS) for providing non Internet protocol Multimedia...
8959304 Management of data processing security in a secondary processor  
A data processing apparatus comprises a primary processor, a secondary processor configured to perform secure data processing operations and non-secure data processing operations and a memory...
RE45381 Network correction security system and method  
A network correction security system. The network correction security system connected between a network node and a security-related external system, detects attacks on the network node, corrects...
8959180 Proxy for tolerating faults in high-security systems  
One or more requests are received from a first system. The requests are queued in a queue. A serialization group is determined for a request and the request is associated with the determined...
8954742 Method and apparatus for digital authentication of valuable goods  
A method for digital certification of authenticity of a physical object, and corresponding computer program and storage device, as well as to the use of the method for digital certification of...
8954729 Creating and using a specific user unique id for security login authentication  
A method of monitoring all network login activity, which includes a real-time analysis of intercepting all network login activity, analyzing network login activity, authenticating network login...
8954759 Secure spin torque transfer magnetic random access memory (STTMRAM)  
A magnetic memory device includes a main memory made of magnetic memory, the main memory and further includes a parameter area used to store parameters used to authenticate data. Further, the...
8955062 Method and system for permitting access to resources based on instructions of a code tagged with an identifier assigned to a domain  
A method including: assigning identifiers to respective domains, where each of the domains is allocated a corresponding set of resources, and where the resources in the sets of resources are...
8954728 Generation of exfiltration-resilient cryptographic keys  
Improved techniques are provided for the generation of exfiltration-resilient cryptographic keys. A method is provided for generating exfiltration-resilient cryptographic keys for authentication...
8955085 Device registration system, device registration server, device registration method, device registration program, storage medium, and terminal device  
In a device registration system, user authentication and device authentication of a CE device are executed in a single session, and the user and the CE device are associated with each other if...
8954730 Establishing historical usage-based hardware trust  
Establishing trust according to historical usage of selected hardware involves providing a usage history for a selected client device; and extending trust to a selected user based on the user's...
8949597 Managing certificates on a mobile device  
A system or method of remotely managing security certificates on a mobile device is provided. Certificates on a mobile device may be added to, deleted from, or updated by a server that manages...
8949957 Method and system for creating a mobile internet protocol version 4 connection  
A method for creating a unique and secure mobile internet protocol version 4 connection for a packet data network is provided. The method includes generating an extended master session key to...
8949949 Network element authentication in communication networks  
In an embodiment, a method enables authentication of devices connected to a network. The method also enables the devices to digitally sign communication on the network with private keys. When a...
8949598 Method and apparatus for secured embedded device communication  
In a computing device that includes a host operating system and a management engine separate from the host operating system, if the primary operating system is not operating, a management engine...
8949930 Template representation of security resources  
Systems and methods are described for enabling users to model security resources and user access keys as resources in a template language. The template can be used to create and update a stack of...
8949938 Mechanisms to use network session identifiers for software-as-a-service authentication  
Techniques are provided for authenticating a subject of a client device to access a software-as-a-service (SaaS) server. A network access device receives a request from a client device to...
8949596 Encryption-based session establishment  
A first server is configured to receive a first token from a user device, determine whether the first token is valid, request the user device to provide a set of credentials to a second server,...
8949593 Authentication system for terminal identification information  
An authentication system receives encrypted terminal identification information and terminal identification information, from a transmission terminal, and determines whether decrypted...
8949595 Mutual authentication apparatus and method in downloadable conditional access system  
A mutual authentication method in a Downloadable Conditional Access System (DCAS) is provided. The mutual authentication method may receive authentication-related information about authentication...
8943309 Cookie security system with interloper detection and remedial actions to protest personal data  
A server receives a request from the client. The request includes a cryptographically protected object that includes a respective user identifier and validation value. When the respective user...
8943318 Secure messaging by key generation information transfer  
A system is configured to receive a first authentication request from a first device, authenticate the first device, establish a secure connection with the first device based on authenticating the...
8943551 Cloud-based device information storage  
Device information for each of multiple devices associated with a user account is maintained by a cloud service. The device information can include credential information allowing the device to be...
8943565 Recovery of information from commercial web portals  
Novel tools and techniques for automated recovery of information from commercial web portals, including commercial web portals requiring credentials for access. In some instances images are...
8943323 System and method for provisioning device certificates  
A method is provided for provisioning a device certificate. A device certificate request is transmitted from a communication device to a server in a communication network using an established...
8938805 Detection of tampering with software installed on a processing device  
A processing device comprises a processor coupled to a memory and implements a host-based intrusion detection system configured to permit detection of tampering with at least one software...
8938613 Techniques for secure message offloading  
Techniques for secure message offloading are presented. An intermediary is transparently situated between a user's local messaging client and an external and remote messaging client. The user...
8935525 Trust information delivery scheme for certificate validation  
A unique TIO based trust information delivery scheme is disclosed that allows clients to verify received certificates and to control Java and Javascript access efficiently. This scheme fits into...
8935756 Providing multiple authentications to authenticate users with respect to a system and file systems offered through the system  
Provided are a method, system, and computer program product for providing multiple authentications to authenticate users with respect to a system and file systems offered through the system. A...
8935751 Method for extending the fragment mapping protocol to prevent malicious access to virtualized storage  
Extensions to the Fragment Mapping Protocol are introduced which protect a disk array from malicious client access by exporting file system access information to the storage device. FMP requests...
8930696 System and method for exchanging secure information between secure removable media (SRM) devices  
A system and method for exchanging secure information between Secure Removable Media (SRM) devices. An initialization operation is performed between the SRM devices. After a mutual authentication...
RE45327 Apparatus, systems and methods to provide authentication services to a legacy application  
Authentication credentials from legacy applications are translated to Kerberos authentication requests. Authentication credentials from the legacy application are directed to an authentication...
8929942 Wireless communication device  
According to an aspect of the present invention, there is provided a wireless communication device including: a cable port to which an external device is connected; a reading unit that reads...
8924713 Method and system for state machine security device  
A security device may be utilized to provide security measures to an electronic device that may incorporate the security device or be coupled to it. The security measures may comprise...
8925053 Internet-accessible service for dynamic authentication and continuous assertion of trust level in identities  
An authentication technique involves receiving an authentication request which includes a set of authentication factors and performing, in response to the authentication request, an authentication...
8924710 Method and apparatus for providing session key for WUSB security and method and apparatus for obtaining the session key  
A wireless universal serial bus (WUSB) security is provided. A method of providing a session key to be used during a session between a host and a device creates the session key based on a seed key...
8924712 Using QR codes for authenticating users to ATMs and other secure machines for cardless transactions  
Systems, apparatus, methods, and computer program products for using quick response (QR) codes for authenticating users to ATMs and other secure machines for cardless transactions are disclosed....
8924711 Hack-deterring system for storing sensitive data records  
A mobile communication system comprising a multiplicity of mobile devices, and a server communicating with the mobile devices via a communication network, and a central database which is in data...
8918636 Systems and methods for protecting alternative streams in adaptive bitrate streaming systems  
Systems and methods for performing adaptive bitrate streaming using alternative streams of protected content in accordance with embodiments of the invention are described. One embodiment includes...
8918637 Remote authentication system  
One embodiment of the invention is directed to a method including receiving an alias identifier associated with an account associated with a presenter, determining an associated trusted party...
8918846 Method and system for secure mobile messaging  
A system and method for securely storing, retrieving and sharing data using PCs and mobile devices and for controlling and tracking the movement of data to and from a variety of computing and...
8914859 Managing the progressive legible obfuscation and de-obfuscation of public and quasi-public broadcast messages  
Obfuscating a message, in one aspect, may include detecting sensitive information in a message to be broadcast into public or quasi-public computer network environment; replacing the sensitive...
8914628 Method and apparatus for providing radio communication with an object in a local environment  
A method and apparatus for providing radio communication with an electronic object in a local environment are disclosed. For example the method receives via a mobile endpoint device of a user at...