AcclaimIP-ad

Match Document Document Title
8868902 Characteristically shaped colorgram tokens in mobile transactions  
A transaction security process includes authentication and identification parts for pushing an encrypted colorgram for user authentication and persona descriptors for user identification from a...
8869242 Authentication in heterogeneous IP networks  
The invention proposes a system for authenticating and authorizing network services comprising: a mobile device being adapted to, upon receipt of an information message indicating at least one...
8863263 Server apparatus and program for single sign-on  
A server apparatus includes an analyzer unit which analyzes log-in information for a server received from a client, determines an authentication scheme of the server, and extracts, from the log-in...
8863255 Security credential deployment in cloud environment  
Techniques are described for deploying a security credential for an application deployed in a cloud. An encrypted security credential is received from a remote system and is inserted into a...
8862871 Network with protocol, privacy preserving source attribution and admission control and method  
A device implemented, carrier independent packet delivery universal addressing networking protocol for communication over a network between network nodes utilizing a packet. The protocol has an IP...
8862866 Method and apparatus for providing an adaptable security level in an electronic communication  
A method of communicating in a secure communication system, comprises the steps of assembling a message at a sender, then determining a security level, and including an indication of the security...
8863307 Authenticating users based upon an identity footprint  
Disclosed are various embodiments of generating a user signature associated with a user and authenticating a user. At least one behavior associated with at least one sensor in a computing device...
8863237 Remote-session-to-go method and apparatus  
Examples of systems and methods are provided for communication and for facilitating establishing a remote session between a client device and a remote server. The system may facilitate...
8863112 Information processing apparatus and controlling method thereof  
An application program determines, based upon a user's operation that has been received during execution, whether installation of an extension function is necessary, saves information identifying...
8856528 Challenge-response system for maintenance operations via responder for telecommunications cabinet  
Method of performing a challenge-response process, comprising, in this sequence, the steps of a) providing a first challenge-response pair (50) on a source device (10), assigned to a responding...
8856957 Federated identity broker  
A federated identity system is described. A federated identity broker registers a first customer as an identity provider and a second customer as an identity consumer. The federated identity...
8856512 Method and system for enterprise network single-sign-on by a manageability engine  
A manageability engine (ME) receives an authentication response from a user during pre-boot authentication and registers the user with a key distribution center (KDC), indicating that the user has...
8855312 Mobile trust broker  
A method performed by a first computing device is disclosed. The method includes (a) establishing a proximity-based communications channel between the first computing device and a second computing...
8856923 Similarity-based fraud detection in adaptive authentication systems  
Similarity-based fraud detection techniques are provided in adaptive authentication systems. A method is provided for determining if an event is fraudulent by obtaining a plurality of tagged...
8856524 Cryptographic methods, host system, trusted platform module, computer arrangement, computer program product and computer program  
A cryptographic method is provided for a host system having an associated trusted platform module. A first contribution to a message is computed by the TPM based on a first secret parameter stored...
8856544 System and method for providing secure virtual machines  
The present invention provides improved security in a virtual machine. By extending the capabilities of modern secure processors, privacy of computation is provided from both the owner of the...
8856907 System for and methods of providing single sign-on (SSO) capability in an application publishing and/or document sharing environment  
A client-server computing system includes a computer cluster for hosting certain resources, applications, programs, processes, files, and/or data that are published to users who are accessing the...
8850043 Network security using trust validation  
In certain embodiments, a method includes receiving a communication session request from a requesting node. The communication session request is received via a network facilitating communication...
8850186 Change in identification information causing request for new certificate issuance  
An information processing apparatus that communicates using an electronic certificate is provided. When identification information is configured that identifies the information processing...
8850021 Device discovery in a ubiquitous computing environment  
Technologies are generally described for methods, instructions, and client applications for device discovery in a ubiquitous computing environment. In some examples, the methods, instructions, and...
8850185 Post attack man-in-the-middle detection  
Technologies are described herein for post attack man-in-the-middle detection. A first computer receives and stores public key certificates when connections are established. The first computer...
8850524 Methods of resetting passwords in network service systems including user redirection and related systems and computer-program products  
Resetting a password for a network service account may include redirecting the user to a password reset tool, wherein the user is blocked from network access other than the password reset tool...
8850230 Cloud-based movable-component binding  
This document describes tools capable of enabling cloud-based movable-component binding. The tools, in some embodiments, bind protected media content to a movable component in a mobile computing...
8850545 Systems and methods for securing network communications  
Secure communications may be established amongst network entities for performing authentication and/or verification of the network entities. For example, a user equipment (UE) may establish a...
8850200 Method and apparatus for secure communications through a trusted intermediary server  
A method and apparatus for a trusted intermediary server to assist with the secure exchange of data across a communications network, and in particular a packet-based network, such as the public...
8850540 Method and device for verifying dynamic password  
The examples of the present invention provide a method and device for verifying a dynamic password. In the method and device, some algorithm parameters can be exchanged in public by using a DH...
8850208 Certificate crosschecking by multiple certificate authorities  
Embodiments relate to a method for generating a set of authentication certificates by a set of certificate authority devices. The method includes receiving, by the set of certificate authority...
8843413 Binding content to a domain  
The present invention provides for a digital rights management system with a centralized domain service capable of creating and managing membership criteria for joining a domain in accordance with...
8843739 Anti-tamper device, system, method, and computer-readable medium  
An anti-tamper hardware security device that communicates with a host machine, including a host interface coupled to the host machine and configured to receive an access request from the host...
8844011 IP multimedia subsystem user identity handling method and apparatus  
A method of enabling users of a third party Internet service, who are not necessarily subscribers of an IP Multimedia Subsystem, IMS, network, to access services provided by the IMS network. The...
8837726 Content protection key encryptor for security providers  
Techniques are provided to receive at an encryption device from a control device an encryption request comprising a message and an identifier for a device. The control device and the device are...
8838959 Method and apparatus for securely synchronizing password systems  
A centralized password repository (CPR) provides network users with a password portal through which the user can manage password access to domains and applications on the network. A subset of the...
8838966 One-time use authorization codes with encrypted data payloads for use with diagnostic content supported via electronic communications  
In one embodiment, a computing apparatus that receives respective unique identifiers corresponding to a machine and a diagnostic tool and a requested parameter setting for configuring a machine...
8839385 Systems and methods for implementing device-specific passwords  
Each of multiple computing devices of a user is registered by obtaining therefrom identifying indicia, obtaining from the user a device-specific password for the computing device, and storing the...
8838961 Security credential deployment in cloud environment  
Techniques are described for deploying a security credential for an application deployed in a cloud. An encrypted security credential is received from a remote system and is inserted into a...
8839358 Progressive authentication  
Progressive authentication is generally employed to establish the authenticity of a user, such as a user of a computing device, or a user that wants to access a proprietary data item, software...
8839357 Method, system, and computer-readable storage medium for authenticating a computing device  
A method, system, and computer-readable storage medium for authenticating a computing device are provided. According to embodiments of the invention, a first computing device generates a message...
8837732 Method and device for data processing in a wireless network  
A method and a device for data processing in a wireless network are provided, wherein a direct connection between two mobile terminals is set up based on a seed information provided by the...
8838960 Network identity management system and method  
Users of Internet services (e.g., SKYPE messaging service, GOOGLETALK messaging service, AOL INSTANT MESSENGER messaging service, and MICROSOFT MESSENGER messaging service) that are initially...
8839393 Authentication policy usage for authenticating a user  
A method and system for authenticating a user. A first server of multiple servers generates an authentication policy table by inserting into the authentication policy table an authentication...
8832451 Packet source authentication method using single-buffered hash in multicast environment and apparatus for the same  
A source authentication method and apparatus according to the present invention are disclosed. The source authentication method is performed with respect to a transmission packet on a message...
8832811 Network access control for trusted platforms  
In response to a request received at an authentication server from a client to enter a network, the authentication server transmits a network access control (NAC) request to the client using a NAC...
8832806 User authentication management  
End users of a multi-factor authentication service can utilize an account management service, and third-party website can register to utilize the multi-factor authentication service. Registering a...
8832802 System for distribution permissions for network communications  
A system can control whether a recipient of an electronic message (e.g., a text message, a multimedia message, an e-mail message, etc.) with a forwarding-restricted attachment is permitted to...
8832788 Automated human assisted authentication  
A server computing system receives a request to authenticate the identity of a user. The user may wish to perform an action that requires the user's identity to first be verified. In response to...
8826004 Method and system for printing transaction documents using a multi-vendor secure printer under control of a printer authority  
A low-cost, network based, secure printer that can provide multiple vendors with independent protected access, as authorized by a secure printer authority, is provided. The secure printer...
8825928 Facilitating and authenticating transactions through the use of a dongle interfacing a security card and a data processing apparatus  
A device or “dongle” (30) is provided for controlling communications between a Subscriber Identity Module (or SIM) (12), such as of the type used in a GSM cellular telephone system, and a...
8826399 Systems and methods for fast authentication with a mobile device  
A system for authenticating a user to a service includes a service, an authentication server and a device. The service includes first signal interface, first processing hardware and first user...
8826014 Authentication of remote host via closed ports  
A method, system and apparatus for authenticating a communication request sent from a client computing device. The communication request is initially blocked by a firewall preventing delivery to a...
8826397 Secure remote authentication through an untrusted network  
A method for securely authenticating a user of a consumer device at an access device comprising the following steps. First, a dynamic data element and a first set of transactional information is...