Match Document Document Title
8688974 Method for managing wireless multi-hop network key  
A method for managing wireless multi-hop network key is applicable to a security application protocol when a WAPI frame method (TePA, an access control method based on the ternary peer-to-peer...
8688973 Securing communications sent by a first user to a second user  
A computer-implemented method of securing communications sent by a first user to a second user may include receiving, by a first user from a trusted third party, at least one public cryptographic...
8688461 Electronic registry for authenticating transferable records  
An electronic registry stores information relating to a transferable electronic record and the controller of an authoritative copy of the transferable electronic record. The electronic registry...
8689285 Rule-based derived-group security data management  
Methods for rule-based group security data management and corresponding systems and computer-readable mediums. A method includes receiving a complex rule set corresponding to at least one...
8689301 SIP signaling without constant re-authentication  
A proxy server causes an authentication authority to authenticate a client in response to a first Session Initiation Protocol (SIP) request of the client on a connection. It does not cause the...
8689302 System, method and program for user authentication, and recording medium on which the program is recorded  
A method, and system, and computer program product for authenticating a user. A first server of a plurality of servers receives an access request from the user to access a federated computing...
8688834 Dynamic host configuration and network access authentication  
According to some embodiments, systems and methods for binding dynamic host configuration and network access authentication are provided related to, inter alia, interactions between a PAA (PANA...
8689008 Operating system  
A new and improved operating system comprising a series of self-contained interconnected modules and service layers for connecting proprietary systems together and extracting and translating data...
8683550 System and method for validating a user of an account using a wireless device  
The disclosure provides a system and method of authenticating a user to a network. For the method, if a request for a resource initiated by the device is related to a restricted resource, then the...
8683194 Method and devices for secure communications in a telecommunications network  
A secure communications method is provided for use in a telecommunications network, wherein a transaction between an entity A and an entity B of the network comprises: entity A sending an...
8683197 Method and apparatus for providing seamless resumption of video playback  
Video data files are provided to a user for playback. Once playback begins, the methods and apparatus of the present invention enable a user to interrupt the video playback function and quickly...
8683560 Techniques for credential generation  
Systems and methods for managing credentials distribute the credentials to subsets of a set of collectively managed computing resources. The collectively managed computing resources may include...
8683195 System and method for reducing fraud  
Pirated certificates may be published or become available in an environment which includes computer networks and websites. An information appliance connected to the environment searches for...
8683226 Automatic provisioning in mobile to mobile platforms  
Systems and methods for automatically provisioning devices that do not include or cannot provide a unique hardware identifier over a machine-to-machine network. A device or application may provide...
8683580 Image forming apparatus, image forming system, and authentication device  
An image forming apparatus includes: an authentication unit that can execute a login process and a logout process; an operation unit that receives an instruction for the logout process from the...
8683571 System and method for authentication of users in a secure computer system  
A system and method for authenticating a user in a secure computer system. A client computer transmits a request for a sign-on page, the secure computer system responds by transmitting a prompt...
8677115 Methods for verifying system integrity  
A request is received from a client for accessing a resource provided in a network, the request including credential data representing system integrity of at least one component running on the...
8677462 Efficient and secure renewal of entitlements  
A method for granting a grace period entitlement, the method comprising receiving a grace period entitlement message, establishing whether a grace period flag indicates that a grace period may be...
8676187 Dynamic binding of service on bearer  
Methods that facilitate automatic selection of service bearers in a mobile based on user-initiated policies and service-provider-initiated policies set forth in a policy document are described...
8675871 Protecting a control vector in an optional block of a standard key block  
A computer program product is provided and includes a tangible storage medium readable by a processing circuit and on which instructions are stored for execution by the processing circuit for...
8677466 Verification of digital certificates used for encrypted computer communications  
A digital certificate may be extracted from communications between a web browser and a web server computer. The digital certificate may be verified independent of the web browser by comparing the...
8675878 Interoperable keychest for use by service providers  
There is provided a system and method for distributors to use an interoperable key chest. There is provided a method for use by a distributor to obtain content access authorizations from a key...
8677116 Systems and methods for authentication and verification  
Computer systems and methods are provided for authenticating a user seeking to conduct at least one interaction with a secured capability provided by a computer. The method includes receiving a...
8667154 Authentication of unknown parties in secure computer communications  
Authentication of an unknown party in a secure computer communication may be performed even without consulting a public whitelist of trusted parties. A digital certificate from an unknown party...
8666894 Systems and methods for remotely authenticating credit card transactions  
A system for remotely authenticating credit card transactions of a consumer comprises at least one subsystem that alerts the consumer via a communication device of the consumer when a credit card...
8667278 Information processing apparatus and data transmission method of information processing apparatus  
An apparatus stores first divided trust information which is one portion resulting from division of trust information generated by a transmission target apparatus that is a transmission target for...
8667151 Bootstrapping method for setting up a security association  
In one embodiment, a method of the invention has the steps of: (A) establishing an access-layer security association (SA) between a mobile node (MN) and an authentication authorization accounting...
8667576 Method for preventing data in a computer system from being accessed by unauthorized user  
A computer system is provided comprising a non-volatile storage medium and a processor. The processor acquires authentication information from a first removable storage device, stores the...
8667270 Securely upgrading or downgrading platform components  
A method for securely altering a platform component is provided, comprising: assigning certificates for public encryption and signature verification keys for the device; assigning certificates for...
8667573 Validating the origin of web content  
Described herein is a technique of protecting users against certain types of Internet attacks. The technique involves obtaining certificates from visited web sites and qualifying communications...
8655957 System and method for confirming that the origin of an electronic mail message is valid  
A system and method for preventing e-mail spoofing, in which a receiving e-mail checking server system sends a message to a confirmation server associated with a network domain of the sending...
8656155 Dynamic generation and processing of certificate public information directories  
Digital certificate public information is extracted using a processor from at least one digital certificate stored within at least one digital certificate storage repository. The extracted digital...
8656154 Cloud based service logout using cryptographic challenge response  
A cloud based service use may be logged into the service through multiple client devices simultaneously. Methods, systems, and computer program products base upon cryptographic challenge response...
8655318 Method and system for anonymous operation of a mobile node  
A mobile node and its home system generate synchronized time-based codes at periodic time intervals. Each time-based code is valid for a predetermined time period. To facilitate anonymous...
8656171 Method, apparatus, and system for configuring key  
A method, an apparatus, and a system for configuring a key are provided. The method includes the following steps. A mobile node (MN) and an authentication authorization accounting home server...
8656153 Authentication access method and authentication access system for wireless multi-hop network  
Authentication access method and authentication access system for wireless multi-hop network. Terminal equipment and coordinator have the capability of port control, the coordinator broadcasts a...
8649519 Method and apparatus for secure distribution of digital content  
A method and apparatus for secure distribution of digital content is provided. In accordance with at least one embodiment, an intermediate device maintains an authorized content sink list which it...
8649520 Method and system for establishing real-time trust in a public network  
An authentication method sends an open request to a common directory server for a first key, the first key being a trusted embedded authentication common directory service key wrapped in a public...
8650392 Ticket authorization  
A method for issuing tickets in a communication system comprising a plurality of nodes that are capable of establishing a communication connection between two or more clients, the method...
8650391 Systems and methods for securely providing and/or accessing information  
The invention is directed to a system for use with a first device in communication with a second device. The system includes a storage medium that is connectable with the first device, a hardened,...
8650393 Authenticator  
According to one embodiment, a method for authenticating a device, wherein the device holds secret identification information, encrypted secret identification information, and key management...
8645697 Message authorization  
In some embodiments, a technique for authorizing a subsequent message comprises receiving a request to authorize a subsequent message, determining whether the request is valid, and authorizing the...
8646039 Automated peer authentication  
An apparatus and methods are disclosed for performing peer authentication without the assistance of a human “guard.” In accordance with the illustrative embodiments, a peer is selected from a...
8644507 Game apparatus, system and method for improving in-game communications during a game  
The present invention is directed to a game apparatus, system and method for improving in-game communications, more specifically a game apparatus, system and method for allowing players to...
8645683 Verified navigation  
In some embodiments, techniques for computer security comprise detecting an attempt of a traversal associated with a link and a link destination, receiving an intended destination, comparing the...
8646057 Authentication and authorization of user and access to network resources using openid  
A method includes receiving by an OpenID network device a user log in; logging in, by the OpenID network device, the user to an OpenID account; receiving, by the OpenID network device and from a...
8638762 System and method for network integrity  
A technique for maintaining network integrity is disclosed. A system according to the technique may include a wired network, a switch, and a wireless access point. The switch can be coupled to the...
8639800 Method and device for determining network device status  
Disclosed is a method of transparently detecting authentication status of endpoint devices in a network. This method may be used for differentiating guest or rogue endpoints from enterprise endpoints.
8639928 System and method for mounting encrypted data based on availability of a key on a network  
A system and a method are provided for retrieving decryption keys from a secure location that is separate from the encrypted data. In particular, for each decryption key, there is an associated...
8640213 Method and system for automatic authentication  
A system and method for automatic authentication includes automatically calculating a security code on a computer running a security program. The security program resides on the same computer as a...