Match Document Document Title
8745409 System and method for securing portable data  
A data storage device that can be reversibly associated with one or more of a plurality of hosts. A “trusted” host on which the device is mounted is allowed access to a secure data area of the...
8744075 Quantum public key encryption system  
Provided is a key generation apparatus that generates, based on a generated random number, quantum gates Ui, L and R corresponding respectively to m types of unitary operations Ui corresponding to...
8745718 Delivery of authentication information to a RESTful service using token validation scheme  
Information useful for authenticating an entity is sent over a back channel during the authentication of an entity to a RESTful service. The delivery of the entity-related information is triggered...
8745372 Systems and methods for securing data in motion  
Systems and methods are provided for distributing trust among a set of certificate authorities. One approach provides methods and systems in which the secure data parser is used to distribute...
8745379 Systems and methods for securing data in motion  
Two approaches are provided for distributing trust among a set of certificate authorities. Each approach may be used to secure data in motion. One approach provides methods and systems in which...
8745377 Network system, certificate management method, and certificate management program  
A network system includes a management apparatus and multiple apparatuses. The management apparatus includes a preparation instruction unit to transmit an instruction to prepare a certificate...
8738920 Information processing apparatus and authentication information migration method  
An information processing apparatus of the present invention converts user authentication information based on a second one-way function into a second converted value if authentication with a...
8738899 System and method for unlocking content associated with media  
There is presented a system and method for unlocking a content associated with media. In one aspect, the method comprises identifying the media, generating an authentication key using at least one...
8739252 System and method for secure remote access  
System, method, and apparatus for providing access to remote computing services are described. The method includes authenticating a user and a client device; establishing a connection to a server...
8738911 Secure socket layer keystore and truststore generation  
A method for managing keystore information on a computing device may include requesting a keystore from a distribution system, receiving the keystore from the distribution system, and populating a...
8738900 Method and devices for secure communications in a telecommunications network  
A method for secure communications in a telecommunications network is disclosed. The network comprises a group of servers Si, referred to as Authorization Servers. For a transaction between an...
8738898 Provision of secure communications connection using third party authentication  
The present invention relates to communications, and in particular though not exclusively to forming a secure connection between two untrusted devices. The present invention provides a method of...
8738909 Forwarding E-mail from a wireless device  
A system and method of sending an e-mail message associated with a wireless device is provided. A request to forward or reply to an original e-mail message is sent from the wireless device to a...
8738897 Single sign-on functionality for secure communications over insecure networks  
Techniques for identity techniques for single sign-on functionality for secure communications over insecure networks are provided. A principal achieves single sign-on access to a server via a...
8732456 Enterprise environment disk encryption  
A method for deploying a disk encryption password to a client computer includes installing a disk encryption agent on a client computer, where the agent communicates with an enterprise encryption...
8732451 Portable secure computing network  
As provided herein, when using an untrusted network connection, a secure online environment can be created for a remote machine by connecting to a trusted computer with a trusted network...
8732464 Bidirectional entity authentication method with introduction of online third party  
An entity bidirectional authentication method by introducing an online third party includes the following steps: 1) an entity B sends a message 1 to an entity A; 2) the entity A sends a message 2...
8731194 Method of establishing security association in inter-rat handover  
A method of establishing security association during handover between heterogeneous networks in a radio access system is disclosed. A method of establishing security association before handover...
8732459 Security system for handheld wireless devices using time-variable encryption keys  
In one embodiment, the invention provides a portable wireless personal communication system for cooperating with a remote certification authority to employ time variable secure key information...
8726334 Model based systems management in virtualized and non-virtualized environments  
Architecture that provides model-based systems management in virtualized and non-virtualized environments. A security component provides security models which define security requirements for...
8726009 Secure messaging using a trusted third party  
A system and method to send a secure message from a sender to a recipient using strong encryption protocols without the need for the recipient to create a public/private key pair and by using a...
8719577 System and method for multi-certificate and certificate authority strategy  
Operations or functions on a device may require an operational certificate to ensure that the user of the device or the device itself is permitted to carry out the operations or functions. A...
8719901 Secure consultation system  
A secure consultation system is disclosed that enables an owner entity to securely store its most secure and private data such that designated entities of the owner entity and a consultant entity...
8719575 Method of secure broadcasting of digital data to an authorized third party  
The invention relates to a method of secure broadcasting of encrypted digital data of a proprietary entity, these data being stored in a storage module (6) of a server (5), comprising: the...
8719128 Computer-facilitated secure account-transaction  
The handling of accounts and account transactions are implemented using a variety of different systems and methods. According to one embodiment a computer-facilitated system is implemented for...
8713307 Computer system and volume migration control method using the same  
A computer system regarding which there is no possibility that data loss or data leakage will occur caused by volume migration is provided. The computer system includes: a memory resource to be...
8710952 RFID reader revocation checking using low power attached displays  
A method of authenticating a radio frequency identification (RFID) reader to efficiently and timely check of revocation status of the RFID reader includes the steps of checking whether a given...
8713321 Method and apparatus for verifiable generation of public keys  
The invention provides a method of verifiable generation of public keys. According to the method, a self-signed signature is first generated and then used as input to the generation of a pair of...
8713658 System for and method of providing single sign-on (SSO) capability in an application publishing environment  
A client-server computing system includes a computer cluster for hosting certain resources, applications, programs, processes, files, and/or data that are published to users who are accessing the...
8706642 Apparatus, system, and method for securely authorizing changes to a transaction restriction  
An apparatus, system, and method are disclosed for securely authorizing changes to a transaction restriction. A security module securely stores encryption keys for a payment instrument. The...
8707404 System and method for transparently authenticating a user to a digital rights management entity  
Various embodiments of a system and method for transparently authenticating a user to a digital rights management entity are described. In various embodiments, a digital rights management server...
8707388 System, method and computer program product for an authentication management infrastructure  
A system and method for allowing a user to access enterprise resources comprising authentication devices and an authentication server. The authentication devices allow a user to enter...
8705735 Implicit certificate scheme  
A method of generating a public key in a secure digital communication system, having at least one trusted entity CA and subscriber entities A. The trusted entity selects a unique identity...
8707390 System and method for secure access control in a wireless network  
Secure access to a wireless network access can be provided in a system where wireless devices access a wireless network through a wireless access point (WAP). For example, a plurality of...
8707027 Automatic configuration and provisioning of SSL server certificates  
A method and apparatus for automatically configuring and provisioning cryptographic certificates is described. A certificate management sensor receives instructions from a first computing device...
8701158 Information processing system, apparatus, method, and program storage medium  
An information processing system includes a plurality of information processing apparatuses, each apparatus including a transmission unit and a verification unit, and a plurality of authentication...
8701203 Computer system and method of controlling the same  
A computer system including that restricts access of an unauthorized. The computer system preferably includes: a system unit; an identification information storage unit storing user identification...
8700893 Key certification in one round trip  
Certification of a key, which a Trusted Platform Module (TPM) has attested as being non-migratable, can be performed in a single round trip between the certificate authority (CA) and the client...
8700920 System and method for content protection on a computing device  
Systems and methods for handling user interface field data. A system and method can be configured to receive input which indicates that the mobile device is to enter into a protected mode. Data...
8701178 Method and system for managing mobility of access terminal using proxy mobile internet protocol in a mobile communication system, and method for allocating home address of access terminal for the same  
A method for managing mobility of an Access Terminal (AT) using a Proxy Mobile Internet Protocol in a mobile communication system. Access authentication is performed between the AT and an...
8699710 Controlled security domains  
A security domain control method includes defining a sequential series of security domains; designating one of the security domains as a current domain; generating a plurality of security tokens...
8700533 Authenticating licenses for legally-protectable content based on license profiles and content identifiers  
The disclosed technology can mitigate the risk of infringing a content owner's rights in legally-protectable content by operating as a trusted, third-party license authority between content owners...
8700898 System and method for multi-layered sensitive data protection in a virtual computing environment  
Systems and methods for providing sensitive data protection in a virtual computing environment. The systems and methods utilize a sensitive data control monitor on a virtual appliance machine...
8699711 Method and apparatus to implement security in a long term evolution wireless device  
A wireless transmit receive unit (WTRU) is configured to receive unciphered and ciphered messages. The unciphered messages include identity requests, authentication requests, non-access stratum...
8701184 Authentication apparatus, authentication method, and computer-readable recording medium storing authentication program  
An authentication apparatus includes: a database section that stores a password; an entry section through which a password is entered; a storage section that stores an entered password which is...
8694773 Method of preventing unauthenticated viewing using unique information of secure micro  
A method of verifying a validity of a Secure Micro (SM) is provided. The method of verifying a validity of an SM, the method including: storing and maintaining a validity verification message used...
8694771 Method and system for a certificate-less authenticated encryption scheme using identity-based encryption  
A method of verifying public parameters from a trusted center in an identity-based encryption system prior to encrypting a plaintext message by a sender having a sender identity string may...
8695088 Dynamically constructed capability for enforcing object access order  
Proposed is a Capability Management System (CMS) in a distributed computing environment that controls access to multiple objects by multiple subjects based upon a specified access order. A...
8695078 Group formation using anonymous broadcast information  
A number of devices co-located at a geographic location can broadcast and receive tokens. Tokens can be exchanged using a communication link having limited communication range. Tokens that are...
8695071 Authentication method  
A system and method whereby the identity of a person, entity, device or the like attempting to gain access to a secured resource may be securely authenticated includes a means for receiving from a...