Match Document Document Title
8824679 Methods and apparatus for protecting digital content  
A processing system to serve as a source device for protected digital content comprises a processor and control logic. When used by the processor, the control logic causes the processing system to...
8819424 Token-based authentication using middle tier  
An intermediary system that facilitates a connection request from a client to a server. The intermediary system may participate in either or both of a token creation phase and a server connection...
8819416 Method and system for modular authentication and session management  
Modular authentication and session management involves the use of discrete modules to perform specific tasks in a networked computing environment. There may be a separate authentication server...
8819413 Method and apparatus for collaborative claim verification  
A method and apparatus for providing collaborative claim verification using an identification management (IDM) system. The IDM system collaborates with at least one trusted authority that provides...
8819781 Management of network devices within a dispersed data storage network  
A method of managing devices in a dispersed data storage network is disclosed. A device list is maintained including entries for every device in the dispersed data storage network. Each entry...
8819415 Method and device for authenticating personal network entity  
A method of authenticating a Personal Network Entity (PNE) is provided. The method includes transmitting a PNE serial number (SNPNE) to a CPNS (Converged Personal Network Service) server by a...
8819796 Authentication system and method  
Security is improved as compared to the security of conventional authentication systems, only by requesting a user to perform operations involving the same number of operations as that of the...
8819793 Systems and methods for secure and efficient enrollment into a federation which utilizes a biometric repository  
A method includes receiving data related to an individual, the data comprising a plurality of elements of personally-identifying information (PII). The method further includes building, via the...
8819422 System and methods for access control based on a user identity  
System and methods for access control in a Universal Plug and Play (UPnP) network are based on a user identity. A control point has an identity assertion capability for identifying a user. The...
8819414 Threat mitigation in a vehicle-to-vehicle communication network  
A method is provided for obtaining a certificate revocation list (CRL) for a vehicle in a vehicle-to-vehicle communication system. A portable security unit is provided to access secured operations...
8812851 Method for reading an attribute from an ID token  
The invention relates to a method for reading at least one attribute stored in an ID token (106, 106′) using first (136), second (150) and third (100) computer systems, wherein the third computer...
8813174 Embedded security blades for cloud service providers  
A policy manager generates a uniform cloud service and information security policy based on a plurality of access contexts. The policy manager distributes the uniform cloud service and information...
8812836 Secure remote subscription management  
A method and apparatus are disclosed for performing secure remote subscription management. Secure remote subscription management may include providing the Wireless Transmit/Receive Unit (WTRU)...
8813191 Method and apparatus for controlling the number of devices installed in an authorized domain  
The number of devices installed in an Authorized Domain is controlled by a master device functionality. This master devices stores ceiling values for the total number Totaljimit of devices to be...
8812688 Method and apparatus for providing shared connectivity  
An approach is provided for providing shared path connectivity among devices. A connection sharing platform determines to specify at least one group of devices, the at least one group including at...
8813189 System and method for capturing network traffic  
In certain embodiments, a method includes receiving, by a capture device, traffic flows transmitted by a plurality of client devices, each of the traffic flows being associated with one of the...
8811620 Secure sharing of item level data in the cloud  
Implementations of the present disclosure are directed to sharing data in a supply chain, the data corresponding to an item having a tag associated therewith. Methods include determining a random...
8812857 Smart card renewal  
A method includes storing creating a smart card with an expiration date and renewing the smart card after the expiration date. The smart card may be created with data stored upon the smart card...
8813243 Reducing a size of a security-related data object stored on a token  
Embodiments of the present invention provide a method and system, including a client and security token, for reducing a size of a security-related object stored in the token. The object is stored...
8813237 Thwarting cross-site request forgery (CSRF) and clickjacking attacks  
Embodiments of the invention generally relate to thwarting fraud perpetrated with a computer by receiving a request from a computer to perform a transaction. Embodiments of the invention may...
8805596 Remote wind turbine reset system and method  
The present invention includes a Computer Assisted Reset (CAR) system that allows a central operations team to remotely reset turbine faults across multiple wind turbine platforms and SCADA...
8806195 User interface generation in view of constraints of a certificate profile  
User interface generation in view of constraints of a certificate profile is described.
8806193 Methods and apparatus for integrating digital rights management (DRM) systems with native HTTP live streaming  
Methods and apparatus for integrating digital rights management (DRM) systems with native HTTP live streaming. Several methods for integrating a DRM system with HTTP live streaming on an operating...
8804953 Extensive ciphertext feedback  
Some embodiments of a method and apparatus for encrypting and decrypting data have been presented. In one embodiment, a stream cipher is run in parallel with a block cipher to output a stream of...
8806192 Protected authorization for untrusted clients  
One or more techniques and/or systems are provided for securely authorizing a client to consume data and/or services from a service provider server while mitigating burdensome requests made to a...
8806194 Method for authenticating low performance device  
The present invention relate to a method for authenticating a low performance device, and more particularly, to a device authenticating method, in which a low performance device such as a smart...
8804965 Methods for decrypting, transmitting and receiving control words, recording medium and control word server to implement these methods  
A method of transmitting control words to terminals that are mechanically and electronically independent of one another includes transmitting, to a terminal, an absent control word in response to...
8806614 Image processing apparatus, controlling method of image processing apparatus, and computer program  
In a case where a plurality of users are made correspondent to one IC card, user changeover is performed without a logout process. When the IC card is passed over a card reader while a user is...
8806608 Authentication server and method for controlling mobile communication terminal access to virtual private network  
The present invention discloses an authentication server and a method for controlling a mobile communication terminal access to a virtual private network (VPN). The authentication server comprises...
8799998 Methods for controlling a traffic of an authentication server  
A method for controlling the traffic of an authentication server and an authentication access apparatus, wherein a local area network token bucket including a high priority token bucket and a low...
8800009 Virtual machine service access  
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for accessing services from a virtual machine. One of the methods includes receiving requests for...
8799656 Methods for anonymous authentication and key agreement  
Methods for anonymous authentication and key exchange are presented. In one embodiment, a method includes initiating a two-way mutual authentication between a device and a remote entity. The...
8798273 Extending credential type to group Key Management Interoperability Protocol (KMIP) clients  
A key management protocol (such as KMIP) is extended to provide an extended credential type to pass information from clients to the server to enable the server to deduce pre-provisioned...
8799675 System and method for electronic certification and authentication of data  
A system and method for authenticating data. Data may be received that is individually encrypted in a first encryption layer by each of a plurality of users using user-specific private keys. The...
8799444 Automated host discovery and path tracing by network management server  
One embodiment described relates to an automated method of host discovery and path tracing by a network management server. The method includes discovery of a location in the network of a source...
8799647 Systems and methods for application identification  
Systems and methods for application identification in accordance with embodiments of the invention are disclosed. In one embodiment, a user device includes a processor and memory configured to...
8799999 Authentication method  
There is provided a method (100) of authenticating a first device (120) to a second device (110) based on a number of data elements and based on a predefined recombination function known by the...
8800049 Licensing and certificate distribution via secondary or divided signaling communication pathway  
In one embodiment, the present invention is directed to the use of separate communication pathways over different types of networks to handle bearer and control signaling in connection with a...
8799985 Automated security classification and propagation of virtualized and physical virtual machines  
Architecture that provides additional data that can be obtained and employed in security models in order to provide security to services over the service lifecycle. The architecture automatically...
8799646 Methods and systems for authenticating devices  
A computer-implemented method for authenticating devices may include (1) identifying a request from a device for a credentialing service to issue a credential to the device, the request including...
8799648 Wireless network controller certification authority  
A controller for a wireless network includes processing elements, an interface for communication with access points for the wireless network, and an interface to another network. The processing...
8798272 Systems and methods for managing multiple keys for file encryption and decryption  
Systems and methods for managing multiple keys for file encryption and decryption may provide an encrypted list of previously used keys. The list itself may be encrypted using a current key. To...
8793487 Binding a digital certificate to multiple trust domains  
A public key infrastructure comprising a participant that issues digital certificates. Each digital certificate can be relied upon in at least two different trust domains. The public key...
8793486 Systems and methods for optimizing SSL handshake processing  
A method for buffering SSL handshake messages prior to computing a message digest for the SSL handshake includes: conducting, by an appliance with a client, an SSL handshake, the SSL handshake...
8793782 Enforcing a health policy in a local area network  
A method for injecting a security token into an authentication protocol response is disclosed. An authentication protocol response from a node requesting access to a network is intercepted. It is...
8793506 Mechanism for facilitating encryption-free integrity protection of storage data at computing systems  
A mechanism is described for facilitating encryption-free integrity protection of storage data at computing systems according to one embodiment. A method of embodiments of the invention includes...
8792416 Mobile communication system, mobile communication method, distribution server, radio network controller and mobile station  
In a mobile communication system, a radio device is configured to transmit notification information transmitted from a distribution server, to a mobile station, by use of broadcast communication....
8788830 Method and apparatus for logging based identification  
A method and apparatus for logging based identification are described. In one embodiment, the method comprises extracting entries of a hash chained log that represents a series of previous...
8788807 Privacy protection in communication systems  
Methods and apparatus for protecting user privacy in a shared key system. According to one aspect, a user generates a derived identity based on a key and a session variable, and sends the derived...
8789143 Method and apparatus for token-based conditioning  
According to one embodiment, an apparatus may store a plurality of tokens indicating a user is requesting access to a resource over a network. The apparatus may determine a condition associated...