Match Document Document Title
9043591 Image forming apparatus, information processing method, and storage medium  
An image forming apparatus that communicates with an external apparatus includes receiving local login information regarding a local login to the image forming apparatus, determining, if a request...
9043873 Method and apparatus for rejecting untrusted network  
A method of accessing a communication system and a communication device for performing the same are disclosed. The method includes transmitting, by a communication device to a node of a...
9038156 Automatic sign in of a user at multiple endpoints  
The present disclosure is directed to methods and systems for user registration, where a user is logged in to a first device in communication with a server, including: receiving an anonymous...
9037859 Processing of communication device signatures for use in securing nomadic electronic transactions  
A method for execution in a communication device, which comprises receiving a first data set and a second data set over a first communication path; receiving a series of requests over local...
9036820 System and methods for UICC-based secure communication  
A system that incorporates the subject disclosure may include, for example, instructions which when executed cause a device processor to perform operations comprising sending a service request to...
9032501 Cryptographic protocol for portable devices  
Embodiments are directed towards communicating using a mobile device that performs actions including. A mobile device may be provisioned with an access point such that a provisioning key and a...
9026786 System for ensuring that promises are kept in an anonymous system  
Described is a system, method, and computer program product for ensuring that promises are kept in an anonymous system. A verifiable interaction is established between at least two users. Each...
9026788 Managing credentials  
In a centralized credential management system, website credentials are stored in a vault storage at a vault. The website credentials are encrypted based upon a key not available to the vault and...
9027086 Securing organizational computing assets over a network using virtual domains  
A method for connecting to a trust broker system is disclosed. The electronic device stores encrypted identifying information for a plurality of client systems authorized to interact with the...
9026785 Method and apparatus for smart-key management  
A method and an apparatus for smart key management are disclosed. The apparatus for smart key management can receive a smart key duplicate request message from a user terminal, perform user...
9025769 Method of registering smart phone when accessing security authentication device and method of granting access permission to registered smart phone  
A method for registering a Smartphone when accessing security authentication device and a method for access authentication of a registered Smartphone are provided. When a Smartphone based...
9026787 Secure access using location-based encrypted authorization  
Embodiments of the present invention disclose a method, computer program product, and system for location-based authorization to access a resource. A first computer receives a request to access a...
9021254 Multi-platform user device malicious website protection system  
A security system for defending online users against fraudsters and malicious websites comprises a back-end network server and appropriate apps for each protected user device. An otherwise...
9021264 Method and system for cloud based storage  
A method is disclosed wherein a first virtual machine is provided in execution. A storage area network for storing of data of the first virtual machine is also provided. A second virtual machine...
9020149 Protected storage for cryptographic materials  
Disclosed are various embodiments for obtaining a service request from a client, the service request including plaintext data to be encrypted and associated metadata. Ciphertext data is generated...
9021255 Techniques for multiple independent verifications for digital certificates  
A method includes (a) receiving, at a computing device, a first certificate signing request (1CSR) from a certificate authority (CA), the 1CSR including an embedded second certificate signing...
9015813 Systems and methods for authentication, verification, and payments  
Computer systems and methods are provided for authenticating a user seeking to conduct at least one interaction with a secured capability provided by a computer. The method includes providing a...
9015819 Method and system for single sign-on  
A method and a system for single sign-on are provided by the present invention, wherein the method comprises: a terminal sending an authentication request carrying a user identity identification...
9009837 Automated security assessment of business-critical systems and applications  
Systems and methods which provide a new application security assessment framework that allows auditing and testing systems to automatically perform security and compliance audits, detect technical...
9009486 Biometric authentication apparatus, biometric authentication method, and computer readable storage medium  
An authentication processing device receives biometric data to be checked from a biometric measuring device; transforms the biometric data that is input from the biometric measuring device by...
9009459 Systems and methods for neutralizing file-format-specific exploits included within files contained within electronic communications  
A computer-implemented method for neutralizing file-format-specific exploits contained within electronic communications may include (1) identifying an electronic communication, (2) identifying at...
9003491 Secure push and status communication between client and server  
Systems and methods of authentication and authorization between a client, a server, and a gateway to facilitate communicating a message between a client and a server through a gateway. The client...
9003191 Token-based authentication using middle tier  
An intermediary system facilitates a connection request from a client to a server. The intermediary system may participate in either or both of a token creation phase and a server connection...
9002319 Integrating a mobile hotspot into a larger network environment  
Integration of a mobile hotspot into a service provider network is disclosed. A network node establishes a first wireless communication link with a mobile hotspot device. The mobile hotspot device...
9003493 Automatic authorization of users and configuration of software development environment  
Automatic authorization of users and configuration of a software development environment can include selecting a task defined within a project plan of a software system under development, wherein...
9003188 Recording medium device, terminal device, distribution device, control method, and program recording medium  
When the terminal device attempts to use a special content, which has an attribute including information distinguishing the special content from regular contents and is stored in the recording...
9003494 Automatic authorization of users and configuration of software development environment  
Automatic authorization of users and configuration of a software development environment can include selecting a task defined within a project plan of a software system under development, wherein...
8997241 Secure information handling system matrix bar code  
An information handling system analyzes secondary information captured with an image of a two-dimensional barcode to perform a function. For example, a mobile phone camera captures an image of a...
8997201 Integrity monitoring to detect changes at network device for use in secure network access  
In one embodiment, a method includes initiating integrity monitoring at a network device, continuously monitoring the network device to detect changes at the network device over a period of time,...
8997195 Access to vaulted credentials using login computer, mobile computing device, and manager computing device  
In an example computer-implemented method, a password management (PM) server receives an access request message from a login computer at which a resource requiring vaulted credentials has been...
8996860 Tolerance factor-based secret decay  
Session-specific information stored to a cookie or other secure token can be selected and/or caused to vary over time, such that older copies will become less useful over time. Such an approach...
8996859 Authentication system, authentication method and computer readable medium  
An authentication apparatus includes an accepting unit and an instructing unit. The accepting unit accepts a request, which requests to issue an authentication medium for a second user, from a...
8995661 Information provision system, provision information copying device, user terminal device and user management device  
A content encryption device generates encrypted content and an encrypted content copying device copies the encrypted content on an information storage medium. The storage medium is sold at a...
8996861 Secure communications system for mobile devices  
A comprehensive solution for providing secure mobile communication is provided. The system includes techniques for authentication and control of communication end-points; chain of trust to ensure...
8990902 Client authentication during network boot  
A secure mechanism for performing a network boot sequence and provisioning a remote device may use a private key of a public key/private key encryption mechanism to generate a command by a server...
8990575 Apparatus and method for electronic signature verification  
An apparatus for electronic signature verification, including a grouping unit to group, into at least one group, a plurality of kernels included in an application to which electronic signature...
8990554 Network optimization for secure connection establishment or secure messaging  
A first device is configured to receive an instruction to establish a secure connection with a second device or to send a secure message to the second device. The instruction may include a secure...
8990555 Centralized key management  
A first network device is configured to receive a first request for a first secret key, generate the first secret key, and send the first secret key to a second network device and a first user...
8990557 Identity assertion framework  
Systems and methods for implementing an identity assertion framework to authenticate a user in a federation of security domains are provided. A first security token service (STS) is configured to...
8984276 System and method for device registration and authentication  
Systems and methods for device registration and authentication are disclosed. In one embodiment, a method for authentication of a device may include (1) receiving, at a mobile device, a first...
8984278 Code signing system and method  
A novel code signing system, computer readable media, and method are provided. The code signing method includes receiving a code signing request from a requestor in order to gain access to one or...
8984277 Reduced authentication times in constrained computer networks  
In one embodiment, a capable node in a low power and lossy network (LLN) may monitor the authentication time for one or more nodes in the LLN. The capable node may dynamically correlate the...
8984619 Methods, systems, and computer readable media for adaptive assignment of an active security association instance in a redundant gateway configuration  
According to one aspect, the subject matter described herein includes a method for communicating an encrypted data packet. The method includes steps occurring at a first gateway node. The method...
8978149 Media content device, system and method  
Media content is provided using metric-apportioning. In accordance with one or more embodiments, remote-user interface circuits are authenticated and remote access is provided to different sets of...
8977235 Establishment of secure communication  
An exemplary method and apparatus are provided for establishing a communication between a first communication terminal and a second communication terminal over a network. A server dynamically...
8977844 Smartcard formation with authentication keys  
An embodiment generally relates to a method of managing tokens. The method includes detecting a presence of a token at a client and determining a status of the token. The method also includes...
8977845 Methods and apparatus for access control in service-oriented computing environments  
Improved access control techniques for use in a service-oriented computing environment are disclosed. For example, one method for authenticating a client in a service-oriented environment, wherein...
8973102 Systems and methods for authenticating a user and device  
Systems and methods for authenticating a user request for authentication are provided. An authentication device that may be part of such a system includes a network interface component coupled to...
8972719 Passcode restoration  
A system method that includes providing a passcode to a user based on presentation of both a recovery key and an active token is described herein.
8973111 Method and system for securing electronic transactions  
A method for secure electronic transaction over a computer network, comprising: at a trusted relationship profile server computer: storing a unique identity of a trusted computing unit; generating...