Match Document Document Title
8543819 Secure authenticated distance measurement  
The invention relates to a method for a first communication device to performing authenticated distance measurement between said first communication device and a second communication device,...
8543813 Method and apparatus to implement valid mobile ticket transfer  
Computer-implemented methods and apparatus to perform a valid transfer of an electronic mobile ticket on a mobile device by a ticketing application system of a ticket processing center. One method...
8543820 Tag generation apparatus, tag verification apparatus, communication system, tag generation method, tag verification method, and recording medium  
The tag generation apparatus of the present invention includes a hash unit (12) that applies a hash function to a message to generate a hash value, a random number encryption unit (14) that...
8543816 Secure, auditable file exchange system and method  
Secure and auditable file exchange between a professional and a client, patient, colleague, or other associate of the professional may be achieved via a file exchange service that automatically...
8543837 Method of randomly and dynamically checking configuration integrity of a gaming system  
In a gaming environment, a method of periodically downloading dynamically generated executable modules at random intervals that perform system configuration integrity checks in a secure and...
8539226 Certificate management and transfer system and method  
A method and system for Certificate management and transfer between messaging clients are disclosed. When communications are established between a first messaging client and a second messaging...
8539236 Re-authentication apparatus and method in downloadable conditional access system  
Provided is a re-authentication apparatus in a Downloadable Conditional Access System (DCAS), the re-authentication apparatus includes: a receiving unit to receive a key request message from a...
8537841 Connection support apparatus and gateway apparatus  
A problem is to provide a connection support apparatus and a gateway apparatus in which management of information is easy and remote access from a user terminal to the gateway apparatus can be...
8539093 Port discovery and message delivery in a portable electronic device  
In accordance with some embodiments, a computer-implemented method for fetching email from an email server to a portable electronic device is disclosed. The method includes, at a portable...
8539603 System and method for secure communication  
A system for secure communication comprises a secure electronic messaging server which is accessible by the public and a database for storing data of messaging users. The data comprises the...
8538012 Performing AES encryption or decryption in multiple modes with a single instruction  
A machine-readable medium may have stored thereon an instruction, which when executed by a machine causes the machine to perform a method. The method may include combining a first operand of the...
8533829 Method for monitoring managed device  
A method for monitoring the managed devices comprises that the manage center preserves the integrality list in advance, which includes the system integrality values of the managed devices and the...
8533461 Wireless local area network terminal pre-authentication method and wireless local area network system  
A method for pre-authenticating a wireless local area network terminal and a wireless local area network system. The pre-authentication method includes after a current access point (AP) which has...
8533832 Network infrastructure validation of network management frames  
A detection-based defense to a wireless network. Elements of the infrastructure, e.g., access points or scanning-only access points, detect intruders by detecting spoofed frames, such as from...
8533849 Traitor tracing in a content protection system  
A method for detecting at least one traitor computer system among a plurality of receiver computer systems including: assigning a version of protected content to each of the plurality of receiver...
8533476 System, method and computer readable medium for message authentication to subscribers of an internet service provider  
An internet service provider (ISP) is configured to provide notification messages such as service updates to subscribers via redirected web pages. In order for the web pages to be treated as...
8533474 Generating session keys  
A method and apparatus for generating shared session keys. The method and apparatus does not rely on strong random number generation. The first node sends a timestamp and random sequence to the...
8533812 Systems and methods for securing access to kernel devices  
A computer-implemented method for securing access to kernel devices may include (1) identifying a context proxy privileged to access a secure device interface for a device, (2) receiving a request...
8533792 E-mail based user authentication  
E-mail based user authentication is described herein. A user can access resources of a service provider by submitting only an e-mail address to which the user has access. The service provider...
8533475 Method for pairing and authenticating one or more medical devices and one or more remote electronic devices  
A method for authenticating a medical device and a remote electronic device may include generating a PIN code by one device, capturing the generated PIN code with the other device, checking...
8528096 Secure universal serial bus (USB) storage device and method  
A secure Universal Serial Bus (USB) storage device includes a memory controller capable of storing data in and retrieving data from a memory. The secure USB storage device also includes a USB...
8528044 Information processing apparatus and control method  
An information processing apparatus that can easily and safely transmit data. A registering unit registers first authentication information in association with user information indicating a first...
8528104 Security and ticketing system control and management  
A security device of this invention includes a nonvolatile storage unit 22 for storing a validity check unit including a counter updated every time signature function means 30 is called up, a...
8527760 Determining trust data for devices in a network  
In an embodiment, a first device detects a first interaction between the first device and a second device. The first device assigns a first rating of the first interaction. The first device...
8528102 Method and system for protection of customer secrets in a secure reprogrammable system  
Methods and systems for protection of customer secrets in a secure reprogrammable system are disclosed, and may include controlling, via hardware logic and firmware, access to customer specific...
8527887 Device and method for improving efficiency of entering a password using a key-limited keyboard  
A method is provided for reducing a number of keys that a user is required to depress on a device having a keyboard with a limited number of keys when the user enters a password. The method...
8527778 Apparatus and method for preventing falsification of black box data  
Provided are an apparatus and method for preventing falsification of black box data. The apparatus for preventing falsification of black box data includes a driving information storage module and...
8527767 System and method for processing encoded messages for exchange with a mobile data communication device  
A system and method are provided for pre-processing encrypted and/or signed messages at a host system before the message is transmitted to a wireless mobile communication device. The message is...
8527766 Reducing leakage of information from cryptographic systems  
A system is described for reducing leakage of meaningful information from cryptographic operations. The system uses a pairwise independent hash function to generate a modified secret key SK′...
8527751 Systems and methods for secure and certified electronic messaging  
The present disclosure provides systems and methods for secure and certified electronic messaging from a plurality of users to one or more electronic mailboxes and the like using a combination of...
8521877 Method for configuring access rights, control point, device and communication system  
In a method for configuring access rights, a UPnP (Universal Plug and Play) device receives CPID information sent by a first CP without administrator rights, wherein the CPID information comprises...
8522201 Methods and apparatus for sub-asset modification  
Methods and apparatus for on-the-fly identification of sub-asset modifications in a data pipeline are described.
8522349 Detecting and defending against man-in-the-middle attacks  
A system, method and program product for defending against man in the middle (MITM) attacks directed at a target server. A system is provided that includes an activity recording system that...
8522019 Method and apparatus to create trust domains based on proximity  
Devices and methods use close range communication links, e.g., near field communication (NFC) links, to authenticate communication devices to one another to create or join a new device to a trust...
8522028 Method for secure data exchange between two devices  
This invention concerns a safe data exchange method between two devices locally connected to one another. In a preferred embodiment, the first device (10) is a security module containing a first...
8521183 Localized detection of mobile devices  
Various aspects are disclosed herein for detection of mobile devices. Detection of mobile devices can be localized to an environment that is radio frequency enclosed. Within this environment, any...
8522027 Method for authenticating an entity by a verifier  
A method for authenticating an entity by a verifier, the entity having an identifier, the verifier having a pair of private and public keys, comprising: sending to the entity a first random number...
8522043 Hardware-based computer theft deterrence  
A hardware-based security module is used to protect an electronic device, especially a portable electronic device. The security module may determine either via timeout of a watchdog timer or via...
8522026 Automatic authentication method and system in print process  
This invention provides an automatic authentication method and system in a print process, which can obviate the need for user's input operations of the user ID and password and can improve...
8522025 Authenticating an application  
One aspect of the invention discloses a method of authenticating an application. The method comprising performing, with a server application, bootstrapping procedures between the server...
8516555 Method and system for authenticating pay-per-use service using EAP  
A method and system for authenticating a pay-per-use service using an extensible authentication protocol (EAP). The method includes requesting a client to provide an EAP ID to be used in the...
8516068 System and method for processing messages being composed by a user  
A system and method for processing messages being composed by a user of a computing device (e.g. a mobile device). Embodiments are described in which the performance of certain tasks is initiated...
8516259 Verifying authenticity of voice mail participants in telephony networks  
A method includes receiving an authentication certificate of a voice mail account holder and/or an authentication certificate of a caller wanting to leave a voice mail message the holders' voice...
8516602 Methods, apparatuses, and computer program products for providing distributed access rights management using access rights filters  
An apparatus may include a processor configured to generate an access rights filter based upon a set of access rights settings. The processor may be further configured to generate an authorization...
8515072 Method and apparatus for providing secure communications for mobile communication devices  
A method and apparatus that enables secure communications from a wireless communication device is disclosed. The method may include receiving a signal to transmit data, wherein the data is at...
8516606 Systems and methods for challenge-response animation and randomization testing  
Systems and methods are provided for challenge/response animation. In one implementation, a request for protected content may be received from a client, and the protected content may comprise...
8515069 Method and apparatus for encrypting/decrypting packet data of precise time synchronization protocol and time synchronization system  
A method and an apparatus for encrypting/decrypting packet data of a precise time synchronization protocol and a time synchronization system are illustrated. The method is suitable for the time...
8510844 Authorized content verification method, content transmission/reception system, transmitter, and receiver  
In a system which attaches update information required to create a content key used for content encryption/decryption to encrypted content and transmits the encrypted content, there is used an...
8510560 Efficient key establishment for wireless networks  
A method and apparatus for deriving an encryption key for use between two stations in a wireless network using information intrinsic to one of the stations, without exchanging pairwise transient keys.
8509427 Hybrid mode cryptographic method and system with message authentication  
An encryption and authentication technique that achieves enhanced integrity verification through assured error-propagation using a multistage sequence of pseudorandom permutations. The method...