Match Document Document Title
8788836 Method and apparatus for providing identity claim validation  
A method and apparatus for providing claim validation without storing user information within the IDM system. During enrollment, the IDM system creates a hash representative of the identification...
8788808 Authenticating digitally encoded products without private key sharing  
A method and a corresponding system for authenticating software products are proposed. A digital certificate and a corresponding private key required to sign each product are stored on a server...
8788811 Server-side key generation for non-token clients  
A method and system for server-side key generation for non-token clients is described.
8782425 Client-side CAPTCHA ceremony for user verification  
A facility for performing a local human verification ceremony to obtain user verification is provided. Upon determining that user verification is needed to perform an action on a computer system,...
8780906 Third party VPN certification  
A virtual private network (VPN) over a telecommunications network is created by sending a request from a first VPN device to a second VPN device for establishing a VPN between the first and second...
8782768 Systems and methods for accessing a virtual desktop  
Methods, computer-readable storage medium, and systems described herein facilitate enabling access to a virtual desktop of a host computing device. An authentication system receives one of an...
8782397 Compact attribute for cryptographically protected messages  
A system and associated method for verifying a signature of a signed message having a compact attribute. Components of the compact attribute of the signed message appear in a predefined order...
8782743 Methods and apparatus for use in a generic bootstrapping architecture  
According to an aspect of the present invention there is provided a method of obtaining authentication information for use in a Generic Bootstrapping Architecture, GBA, employed in a network with...
8782398 Secure user presence detection and authentication  
This disclosure relates generally to a system and method for authenticating an electronic device may comprise a server configured to transmit an encrypted object, the encrypted object having an...
8782399 Automated secure DNSSEC provisioning system  
A system and method that maintains a secure chain of trust from domain name owner to publication by extending the trust placed in existing cryptographic identity systems to the records published...
8782396 Authentication with physical unclonable functions  
Physical Unclonable Functions (PUFs) for authentication can be implemented in a variety of electronic devices including FPGAs, RFIDs, and ASICs. In some implementations, challenge-response pairs...
8780905 Third party VPN certification  
A virtual private network (VPN) over a telecommunications network is created by sending a request from a first VPN device to a second VPN device for establishing a VPN between the first and second...
8782394 Centralized authentication system  
Centralized authentication systems are provided. A representative system, among others, includes an authentication registration system, a content provider and an internet server. The mobile...
8775814 Personalized biometric identification and non-repudiation system  
A system and a method for providing a personalized biometric identification system to facilitate in securing critical transactions have been disclosed. The system includes a server which captures...
8776180 Systems and methods for using reputation scores in network services and transactions to calculate security risks to computer systems and platforms  
Instrumented networks, computer systems and platforms having target subjects (devices, transactions, services, users, organizations) are disclosed. A security orchestration service generates...
8775793 Flexible node identity for telecom nodes  
Features of a node (800) is enabled/disabled under a license between a node vendor and a service provider. A license manager (810) enforces the license to appropriately enable and disable the node...
8776174 Security memory access method and apparatus  
Various embodiments comprise apparatuses and methods to allow access to a memory device by an external device. A method includes receiving, at the memory device, a request from the external device...
8775795 Authenticating method and mobile terminal for code division multiple access (CDMA) evolution to packet data optimized (EVDO) network  
The successful authenticating of a Network Access Identifier (NAI) process is enabled by an authenticating method and a mobile terminal for a Code Division Multiple Access (CDMA) EVolution to...
8775794 System and method for end to end encryption  
Systems and methods for end-to-end encryption are disclosed. According to one embodiment, a method for device registration includes (1) an application executed by a computer processor receiving a...
8775321 Systems and methods for providing notification of and access to information associated with media content  
Certain embodiments provide a user notification such as a cue in a media content player. The notification or cue indicates that there is additional content available for a piece of media being...
8776190 Multifactor authentication for programmatic interfaces  
Systems and methods provide logic that validates a code generated by a user, and that executes a function of a programmatic interface after the user code is validated. In one implementation, a...
8776192 Methods, systems, and computer program products for automatically verifying and populating digital certificates in an encryption keystore  
Methods for automatically verifying and populating an encryption keystore are provided. Pursuant to these methods, the keystore may be automatically checked to determine if it is missing a...
8769262 VPN connection system and VPN connection method  
For establishing a VPN connection in the call-back type, a VPN server establishes an always-on connection through a unique protocol different from the electronic mail delivery system. A client...
8769618 Method and apparatus for secure authorization  
A method for authorizing access to a first computing device is provided. The method comprises the first computing device forming a challenge, encoding the challenge into a symbol, and displaying...
8769646 System and method for associating a universal user identification and a domain specific user identification  
There is presented a system and method for associating a domain transcendent identification (ID) of a user and a domain specific ID of the user, the system comprising an ID association server...
8769612 Portable device association  
A technique that enables a portable device to be automatically associated with a plurality of computers. Information that a computer can use to authenticate a portable device and establish a...
8769261 Subscriber-specific enforcement of proxy-mobile-IP (PMIP) instead of client-mobile-IP (CMIP)  
A method provides subscriber-specific activation of network-based mobility management using an authentication server. According to the method, network-based mobility management is enforced, even...
8769283 MTC device authentication method, MTC gateway, and related device  
Embodiments of the present invention provide an MTC device authentication method, an MTC gateway, and a related device, which are used to solve a problem that direct interaction between a large...
8769629 User sensitive filtering of network application layer  
In one embodiment, a method includes receiving authorization data at a local node of a network. The authorization data indicates a particular network address of a different node in the network and...
8763097 System, design and process for strong authentication using bidirectional OTP and out-of-band multichannel authentication  
Systems and methods of authentication according to the invention are provided comprising a user, a service client, a service server, a portable communications device and an authentication server,...
8763100 Entity authentication method with introduction of online third party  
An entity authentication method by introducing an online third party includes the following steps: 1) an entity B sends a message 1 to an entity A; 2) the entity A sends a message 2 to a trusted...
8762708 Secure content distribution system  
In accordance with one aspect of the invention, a system is provided that includes a database configured to store data according to a first encryption protocol such as an FDE HDD protocol. The...
8762730 System and method to establish and/or manage a trusted relationship between a host to storage array controller and/or a storage array to storage array controller  
A method for establishing a secure connection between a first computer and a second computer, comprising the steps of (A) generating a signature authentication pair on the first computer, (B)...
8763088 Distributed authentication, authorization and accounting  
In some embodiments, computer systems, storage mediums, and methods are provided for controlling a connecting device's access to a plurality of computer networks. In other embodiments, the...
8762717 Authentication device  
According to one embodiment, a device includes a cell array including an ordinary area, a hidden area, and an identification information record area in which identification information which...
8762709 Cloud computing method and system  
Methods and systems integrating sensitive or private data with cloud computing resources while mitigating security, privacy and confidentiality risks associated with cloud computing. In one...
8761168 Third party VPN certification  
A virtual private network (VPN) over a telecommunications network is created by sending a request from a first VPN device to a second VPN device for establishing a VPN between the first and second...
8756429 Tunable encryption system  
A method, programmed medium and system are provided for enabling a user to choose a user-preferred encryption type from among a plurality of encryption types listed in a user's Kerberos...
8756674 System and methods for online authentication  
A method of authenticating a network client to a relying party computer via a computer server comprises the computer server receiving a transaction code from a token manager via a first...
8756697 Systems and methods for determining vulnerability to session stealing  
Systems and methods for determining vulnerability to session stealing are disclosed. An example method includes intercepting, at a first computing device, an intercepted packet sent from a client...
8756431 Remote access privileges renewal  
A secure access system includes at least one lock, at least one electronic key with stored information assigned to a user and a system administration for administering user access privileges. A...
8756676 System and method for secure message reply  
A system and method whereby an unregistered, anonymous user at an organization's website makes a submission/inquiry and is able to access a secure response containing private information without...
8756428 Authentication method for an electronic document and verification method of a document thus authenticated  
A computerized authentication method of an electronic document, in particular a file designed to be on-board an aircraft. The method includes generating a digital signature of the electronic...
8750522 Method and security system for the secure and unequivocal encoding of a security module  
A method and security system is provided for the secure and unequivocal encoding of a security module, for example, a chip card. A security module may be personalized during the manufacturing...
8751791 Method and device for confirming authenticity of a public key infrastructure (PKI) transaction event  
A method and device for confirming authenticity of a public key infrastructure (PKI) transaction event between a relying node and a subject node in a communication network enables improved network...
8751792 Method and system for entity public key acquiring, certificate validation and authentication by introducing an online credible third party  
A method and system for entity public key acquiring, certificate validation and authentication by introducing an online credible third party is disclosed. The method includes the following steps:...
8750512 Authenticating an ephemeral Diffie-Hellman using a trusted third party  
Authentication of parties through a trusted intermediary is described. The standard Ottway-Rees authentication protocol is modified to provide authentication between A and B using intermediary T...
8752154 System and method for authenticating a user  
According to one embodiment, a system including a memory and a processor is provided. The memory may be operable to store a plurality of accounts. Each account may be associated with a user and...
8751794 System and method for secure nework login  
Systems and methods for providing an expedited login process that is relatively fast and that still provides a reasonable level of security and a reasonable method for mitigating compromised login...
8745730 Secure computer provisioning and operation  
A networked computer device can be customized to contain provisioning and/or authorization logic in its firmware or the firmware of one of its subcomponents. The computer device is thus configured...